- Patterson CakeDFIR Principal Consultant, Avertium
Patterson has worked in information-technology for more than two decades, focusing on information-security for the past several years, specializing in the development of incident-response teams, programs and processes. Before joining Avertium, he was a Senior Security Consultant for Haven Information Security, a Senior Security Engineer for A...
- Thomas StoneCyber Security Advisor, Check Point Security
Tom Stone is a seasoned cyber security advisor with more than 20 years of experience across the industry with a specialized focus on email and collaboration. Currently, Tom leads business development for Avanan, a Check Point Company, the world’s leading provider of advanced cyber security solutions. In his role, Tom works closely with custom...
- Juman Doleh-AlomaryDirector of Cybersecurity, Little Caesars Enterprises
Juman Doleh-Alomary is the Director of Cybersecurity GRC at Little Caesar's Enterprises and an active volunteer board member of the ISACA Detroit and the CSA-Detroit Boards. With over 15 years of experience in audit, security, investigation, compliance, and privacy policy/standards, Juman most recently held the position of Director of IT Aud...
- SolomonSecurity, Cyral
Solomon has over 20 years' experience as a security leader at such companies as Microsoft, IBM, VMware, and Facebook.
- Chris LaFleurManager-Threat IR & Forensic, Trend Micro
Chris LaFleur has spent the last three years working to prevent and eradicate threat actors such as Ryuk, Conti, and Lockbit. Chris began his career at Trend Micro in Threat Support, and is now running the Incident Response team. He was a key part of the making a method on how to predict customer attacks with the Smart Protection Early warnin...
- Shawn HeckmasterCISO, Forrest T. Jones & Company
Shawn Heckmaster, Chief Information Security Officer for Forrest T. Jones & Company in Kansas City, MO has over 30 years of progressive information technology and security experience. He has worked across multiple private and government sectors, from the Department of the Army, Department of Defense, Black & Veatch and the Jones family of co...
- Moderator: Tami SpellmanDirector, IT Security, Caleres, Inc.
Experienced Cybersecurity leader with over 20 years serving various industries. Background includes leading teams in Information Assurance, Security Operations, Threat & Vulnerability Management and Cybersecurity Consulting.
- Marc RogersSr. Director, Cybersecurity Strategy, Okta
Marc Rogers is Senior Director of Cybersecurity Strategy at Okta. With a career that spans more than twenty years, he has been hacking since the 80’s and is now a white-hat hacker renowned for hacking technology like Apple's TouchID and the Tesla Model S. Prior to Okta, Marc served as the Head of Security for Cloudflare and spent a decade man...
- Severin SimkoEngineer, Google Cloud Security
Severin worked at Siemplify for nearly 3 years, 2.5 years of which were spent at TIP where he was team led for a team that was responsible for all integrations that Siemplify had. Nowadays he is focusing his work on Sales Engineering at Google Cloud Security and has been doing so for nearly half a year. Prior to that, Severin was working for ...
- Moderator: Karly TarsiaContent Strategist, SecureWorld
Karly Tarsia is a Content Strategist at SecureWorld. Her focus is on bringing smart minds together to discuss challenges and insights the InfoSec community finds helpful and informative. Karly’s career began after she graduated from the University of Oregon in public relations where she worked with clients in technology, financial and consume...
- Robert "Teall" RistSecurity Engineer, Cybereason
With over 34 years of industry experience, Robert “Teall” Rist has been immersed in all things security since originally beginning his career in law enforcement. In the 27 years since, he has joined multiple start ups and enterprise companies such as Verizon, CA Technologies, NetIQ, and IBM. While at IBM, Robert was a black-belt level subject...
- Faye FrancyExecutive Director, The Automotive Information Sharing and Analysis Center (Auto-ISAC)
- Tamara ShoemakerCybersecurity Training Leader, The Automotive Information Sharing and Analysis Center (Auto-ISAC)
Tamara Shoemaker is a diligent and self-motivated Cyber Security Specialist offering 25 years of combined experience in Cyber Security and Administrative Management for large and small corporations aiming to amplify the use and knowledge of security. Relentless dedication to leading teams to balance meticulous attention to quality with a sens...
- Michael RoytmanChief Data Scientist, Kenna Security (a Cisco company)
Michael Roytman is a recognized expert in cybersecurity data science. At Kenna Security, Michael is responsible for building the company's core analytics functionality focusing on security metrics, risk measurement, and vulnerability measurement.
Named one of Forbes' 30 Under 30, Michael's strong entrepreneurship skills include foundin...
- Roger BrassardSr. Product Manger, OpenText
Roger is a 22-year veteran product manager who specializes in capturing customer and partner concerns, staying abreast of industry trends including regulatory changes, and translating that information into cross-functional development teams to solve the cybersecurity business problems of today and tomorrow. At OpenText Security Solutions, he ...
- Mike WilkinsonDirector, Digital Forensics & Incident Response, Avertium
Michael leads the Digital Forensics and Incident Response team at Avertium. The team is dedicated to helping clients investigate and recover from IT security incidents on a daily basis.
Michael has over 20 years’ experience in the IT industry and has been conducting digital investigations since joining the NSW Police State Electronic E...
- Ray YepesCISO, State of Colorado
Yepes is the Chief Information Security Officer for the State of Colorado. Before joining the Governor’s Office for the State of Colorado, Ray served as the Chief Information Security Officer for the Texas Department of Family and Protective Services, the third largest agency in the Lone Star State. Ray holds a Master of Science in criminal j...
- Jaimin ShahCISO, American First Finance
Jaimin Shah is an experienced security and technology leader in developing global information security and privacy program with diverse experience in various industries including Real Estate, Airline, Retail, Banking and Hospitality. Jaimin has over 25 years of extensive, strategic leadership experience in being a trusted advisor in the field...
- Sonja HammondVP & CISO, National Veterinary Associates
Sonja Hammond is the Vice President, Chief Information Security Officer at National Veterinary Associates. As an information and cyber security leader, Sonja brings experience from the financial, healthcare, manufacturing, and computing industries. An additional benefit that Sonja possesses is an information technology (IT) background with ha...
- Moderator: David BelangerCSO, Bestow
Dave Belanger has over 25 years of experience in Security and Technology Leadership roles. Dave is the Chief Security Officer for Bestow. In his prior roles, he served as Information Security Officer for a Technology Company operating in the corrections and public safety industry and as CISO for Maxor National Pharmacy Services. He was also t...
- Chad RienerthSpecial Agent, Chicago Field Office, U.S. Secret Service
SA Rienerth serves on the Cyber Fraud Task Force (CFTF).
- Joe DabrowskiDirector, Strategy & GTM, Rubrik
Joe leads America's Sales Strategy at Rubrik, working with enterprise customers and federal agencies on leveraging the Rubrik Data Security platform to drive cyber resiliency. Joe is an accomplished technology executive with 20 years’ experience. Previously, he served in sales and leadership positions at NetApp, Splunk, and EMC. Joe resides ...
- Paul HammonsPrincipal Sales Engineer, Imperva
Paul has been working at Imperva for 10 years and he has seen it all. He started in IT Security roles in the mid-90s helping customers visualize, protect, and secure their environments. Having previously worked at companies like e-Security, Novell, Varonis, and various other startups, Paul has personally implemented security solutions on five...
- Bryant SchuckSr. Product Manager, Checkmarx
Bryant Schuck is a Senior Product Manager for Checkmarx, where he is responsible for both the API Security and IAST products. Bryant has several years of experience in product management, software engineering, and agile ranging from being a co-founder of a startup to running teams for Fortune 500 companies. In his free time, Bryant enjoys tin...
- Derek J. MayerAssistant Special Agent in Charge, Chicago Field Office, U.S. Secret Service
Assistant Special Agent in Charge
- Ryan LeirvikCybersecurity Author
CEO of Neuvik and author of the book “Understand, Manage, and Measure Cyber Risk”. Past adventures include growing a cyber research and development company, serving as Chief of Staff and Associate Director of Cyber for the U.S. Department of Defense, and sparking a fondness for technology problem-solving at IBM.
- Alex BergerSr. Director, Product Marketing, Open Systems
With nearly a decade of experience in the cybersecurity industry, Alex Berger joined Open Systems to lead Product Marketing in 2021. Throughout his career, he has worked on a wide range of solutions spanning identity and access management, network security, cloud workload protection, data access governance and more. In his spare time, he enjo...
- Moderator: Rebecca RakoskiCo-Founder & Managing Partner, XPAN Law Partners
Rebecca L. Rakoski, Esq., is the managing partner at XPAN Law Partners. Rebecca counsels and defends public and private corporations, and their boards, during data breaches and responds to state/federal regulatory compliance and enforcement actions. She manages the intersection of state, federal, and international regulations that affect the ...
- Moderator: Glenn KapetanskyCTO, Trexin Group
Glenn Kapetansky has a passion for building systems, organizations, and teams, and has done so across a number of business sectors, technologies, and roles. For over 20 years, Glenn has advised senior executives and built teams throughout the delivery cycle: strategy, architecture, development, quality assurance, deployment, operational suppo...
- Dr. Srini VadlamaniCTO & Co-Founder, Cyral
Dr. Srinivas Vadlamani is a hands-on expert in designing databases, big data management systems, and security solutions. He is the cofounder and CTO of Cyral, a venture-backed data security startup. He was most recently the founder and chief architect at Imanis Data, a big data protection pioneer that was acquired by Cohesity. He was previous...
- Bob SkinnerSecurity Principal, Insight
Bob Skinner has worked for over 30 years in Information Technology and Security in highly complex and regulated industries such Financial Services & Banking, Defense, Telecommunications, and Airline Transportation. His technical experience includes Systems Administration, Database Design, Application Development, and IT Auditing. As a consu...
- Chad MaskillCyber Hero, ThreatLocker
Chad Maskill has two decades of experience in consultation and client management. In his current role, Chad reaches out to assist businesses in hardening their environment preventing ransomware and malicious attacks. Chad has devoted his career to implementing client driven solutions, working with everyone from Ford Motor Company, Tesla, Infi...
- Dan JaniczekSolutions Director, Deepwatch
Dan Janiczek is a seasoned Solutions Architect who takes a unique approach to engaging with customers on complex security problems. Coming from a background in Psychology he brings a fresh perspective to the unique challenges faced by organizations today, understanding the people and technology components of a successful security program. As ...
- Brian Myers, Esq.Litigation Attorney, Octillo Law
Brian is a seasoned litigation attorney representing clients of all sizes - from sole proprietorships to Fortune 500 companies - in complex litigation matters. He has guided clients through all stages of the litigation process, including trials and arbitrations in both state and federal courts and before multiple administrative agencies throu...
- Michael StoneSenior Solutions Engineer, Automox
Michael Stone is a Senior Solutions Engineer and joined Automox in 2021. His passion is helping organizations reduce their potential attack surfaces beginning with a simple philosophy: Start by Locking the Front Door! Michael has focused on the field of cybersecurity with a focus on endpoint management for over 15 years with a number of indus...
- Christopher FielderField CTO, Arctic Wolf
Christopher Fielder has been in the cybersecurity world for over 20 years with experience from a range of military, government, and corporate environments. Christopher holds 18 industry certifications including the CISSP, GPEN, GISP, GCFE, GSEC, GCIH, CEH, and more; along with a Master’s Degree in Information Security. Today he is the Field C...
- Rodrique BoutrosGlobal Telco/SI Architects, Americas Sales, Check Point
Rodrique has been with Check Point Software for nine years. He has more than 18 years of industry experience in IT networking and network security. The past four years, he has been focused on cloud security, supporting the Check Point field as a Data Center Virtualization and Cloud Security Solution Architect within the Americas.
- Mark ScranoInformation Security Manager, Cobalt
Mark Scrano is an information security manager at Cobalt, the leading pentest as a service company, where he focuses on maintaining network security, threat management and mitigation, vulnerability assessments, amongst other responsibilities. With over 15 years of experience he’s worked at notable companies including Vimeo, Paxos, and General...
- Laura D. PfisterAssistant U.S. Attorney, Northern District of Georgia, United States Attorneys' Offices
As a federal prosecutor in the United States Attorney’s Office for the Northern District of Georgia, Laura is a member of the Cyber and Intellectual Property Section. She has investigated and prosecuted a variety of cyber-enabled crimes, including ransomware attacks, corporate sabotage, and computer hacking, as well as cyber fraud schemes, su...
- Terry McGrawExecutive Consultant CTU/IR, Secureworks
Terrence "Terry" McGraw is a retired Lieutenant Colonel from the United States Army and now serves as a senior executive Incident Response Consultant. He has more than 20 years of experience providing expertise in cybersecurity architectural design and operations in both commercial and government sectors.
Terry previously served as pre...
- Ivan RighiSenior Cyber Threat Intelligence Analyst, Digital Shadows
Ivan Righi is a Senior Cyber Threat Intelligence Analyst at Digital Shadows, where he conducts research on cyber-threats affecting Digital Shadows' customers. Ivan earned his Master of Science degree in Cybersecurity from the University of Dallas, and holds a Bachelor of Science degree from Abilene Christian University. He also has a graduate...
- Zach BullinerSr. Special Agent, Digital Evidence Forensic Laboratory, United States Secret Service
Zach Bulliner has been a Special Agent with the Secret Service since 2002, when he started in the Nashville Field Office. In 2008, he was transferred to Washington D.C., where he spent three years in the Cyber Intelligence Section (CIS) at Secret Service Headquarters before spending six years on Presidential Protection. He served on President...
- Dana K. MotleyFounder & Owner, Motley Matrix LLC
Motley Matrix is a unique digital marketing, social media and cyber intelligence small business. Current contracts support defense community collaborations, organizations within the CVE space, law enforcement and homeland security directives. Presentations and products leverage social media intelligence, cyber-social threat investigation, ope...
- Jim DoggettChief Security Officer, Semperis
Jim Doggett is high energy leader focused on embedding risk management, security, and compliance into the business fabric to efficiently manage risks. Retired partner from EY where he spent 27 years helping clients through financial audits and building and sustaining security, risk and controls. Served as global leader of Information Risk and...
- Bob RenySales CTO & Principal Engineer, Exabeam
Bob Reny is a recent addition to the CTO team at Exabeam. His 27 years of experience in information technology starting in systems administration and security in the US Air Force. This started a path for all things security, focusing on computer and networks. Bob has done network security design, firewall architecture, IPS deployment, network...
- Joshua ReedNetwork Intrusion Forensic Analyst, United States Secret Service
Josh Reed has over 15 years law enforcement experience and began working with the USSS in 2013. He is a certified computer, mobile device, skimming device examiner, and holds several professional certifications. He is an instructor at the National Computer Forensic Institute (NCFI) and has testified multiple times in state, local, and federal...
- Lynn DohmExecutive Director, Women in CyberSecurity - WiCyS
Lynn Dohm brings more than 25 years of organizational and leadership experience to the WiCyS team as the Executive Director. She has long been committed to cybersecurity education and for the last 14 years held active roles in grant-funded programs and nonprofits that assist in providing educational solutions for the cybersecurity workforce. ...
- Moderator: Jordan FischerCyber Attorney, Global Leader of Privacy Practice Group, Octillo Law
Jordan Fischer leads Octillo Law's Global Privacy Team, where she represents clients in cross-border data management, creating cost-effective and business-oriented approaches to cybersecurity, data privacy, and technology compliance. Recognized as a Super Lawyers Rising Star – Technology Law, Jordan practices in many jurisdictions throughout ...
- Matthew EddinsSpecial Agent, Charlotte Field Office, U.S. Secret Service; North Carolina Cyber Fraud Task Force (CFTF)
- Moderator: Mike MuscatellSr. Director, Cyber Security, Acumatica, Inc.
Mike Muscatell is a seasoned IT veteran with more than 21 years in the Information Security field. He is a certified ethical hacker (CEH). Was honored as top 100 professionals in the Information Security field by Strathmore's for 2014. Member of a number of security organizations, including InfraGard and the U.S. Chamber of Commerce Cyber Com...
- Ran BarthDirector of Security Engineering, Salt Security
Ran is an Enterprise Security Expert with many years of experience helping Fortune 500 companies secure their data and applications. Ran has detailed knowledge of Enterprise Security best practices and technologies and has been focused on the creation and deployment of solutions protecting networks, systems, and information assets with focus ...
- Chad BarrDirector of Governance & Compliance, Risk Advisory Services, AccessIT Group
Chad Barr is the Director of Governance & Compliance for the Risk Advisory Services practice at AccessIT Group (AITG) AITG). Chad is an experienced information security leader with an extensive background in security
engineering, project management, network administration and compliance. Through his many years of experience, Chad has es... - Moderator: Frank DePaolaVP, CISO, Enpro
Frank is the CISO at EnPro Industries (NPO). He is passionate about striking balance between the responsible use of technology and effective risk management. In his role, Frank is responsible for defining, championing, and executing the cybersecurity and regulatory compliance strategies, programs, and initiatives globally, in deep collaborati...
- Vitaliy ShtymManager, Cloud Architect, Trend Micro
Vitaliy Shtym is a Cybersecurity Practitioner with over 10 years of experience, 5 of which have been at Trend Micro. Vitaliy has been in multiple customer facing roles to address cybersecurity challenges in organization of all sizes. He focuses on architecting optimal security solutions for customers leveraging Public and Hybrid Cloud. With p...
- Jovonni PharrEngineer, Scientist, Founder of GACWR, Georgia Cyber Warfare Range (GACWR)
Jovonni Pharr is a software/hardware engineer with a focus on Research & Development (R&D) in emerging technologies. He enjoys building solutions in Electronics, Materials Science, and Intelligent Systems. Some of his research focuses on areas in Computer Science, Human Behavioral Psychology, and Artificial Intelligence. He Graduated from Gor...
- Aaron RoseSecurity Architect, US Public Sector, Office of the CTO, Check Point Software Technologies
Aaron Rose is a Cyber Security Evangelist, Security Architect & Member of the Office of the CTO at Check Point Software Technologies. A subject matter expert in Cloud, Internet of Things, and Application security; Aaron has focused his career on securing organizations & their resources beyond the perimeter of the traditional network firewall...
- Rob VanderberryRegional Sales Manager, Thales
Rob Vanderberry is celebrating his 26th year of technology sales and consultation, experienced in selling solutions to businesses and public sector organizations as manufacturer rep, distributor and reseller. Rob has a passion for helping organizations achieve successful business outcomes through optimized blends of technology, knowledge and...
- Leo HowellCISO, Georgia Institute of Technology
Leo Howell is a visionary information security leader who is passionate about the "I" in IT as he believes that data leveraged as a strategic asset is a major competitive benefit to any organization. Leo has over 24 years of service in IT and currently serves as the chief information security officer for Georgia Institute of Technology where ...
- Brett PriceCISSP | CISM, Sr. Cybersecurity Consultant, Risk Advisory Services , AccessIT Group
Brett Price is a Senior Cybersecurity Consultant for the Risk Advisory Services practice at AccessIT Group (AITG). Brett is a knowledgeable cybersecurity consultant with over twenty years of experience and an extensive background in security consulting, network engineering/administration and cybersecurity best practices. Brett’s skills range ...
- David OrtegaPrincipal Solution Architect, Digital Identity and Security, Thales Cloud Security
David Ortega been a cybersecurity professional for more than 20 years with deep expertise in digital innovation utilizing modern cloud, data, and security solutions. David has had the pleasure of working with various industry leaders in finance, healthcare, government, higher education, and manufacturing services. His highly sought-after expe...
- Simon HillHead of Legal & Compliance, Certes Networks
As VP of Legal and Compliance for Certes Networks, Simon assists with Regulatory and Compliance matters, Intellectual Property and interpretation of Security and Compliance Framework requirements. Simon has extensive international experience as a technology lawyer, working in multiple jurisdictions including the European Union, Japan, India ...
- Justin HarrisDirector of Product Management, Delinea
Justin Harris is a 20+ year technology veteran with a wide range of vertical industry exposure that has a knack for understanding how market trends introduce market needs. In his role as Director of Product at Delinea he leads the Vault portfolio of products such as Secret Server and DevOps Secure Vault. Justin’s area of expertise includes br...
- Eric WaltersDirector, Cybersecurity & IT Infrastructure, Burns & McDonnell
A seasoned information technology leader with over 25 years of information security experience. Capable of translating low level security details into executive level business decisions. Believes good compliance does not mean good security, nor does good security mean good risk management. Passionate for employee development. Experience inclu...
- Rodney PattisonSr. Security Architect, Capgemini
Executive with multi-industry and multi-national IT service delivery experience. Global consulting background with expert level understanding and experience in IT strategy & governance, directing large, complex change initiatives. Business advisor developing lasting relationships by taking responsibility for customer satisfaction and conveyin...
- Moderator: Jennifer HarmonInformation Security Analyst, Ascend Learning
Superior problem-solving skills and experience securing complex systems. A skilled Incident Manager of hosted systems with an emphasis on supporting both Linux and Windows Operating Systems secure availability.
- Moderator: Maria SinghWomen in Security KC, President
With more than 10 years of experience in the telecommunications industry & specifically 6 years in the Cybersecurity space. Experienced, thought leader, cybersecurity professional with operational experience in building successful processes and leading projects in vulnerability scanning, vulnerability management, access management, privacy an...
- Wally BitoutVP Global Business Development, Seclore
Wally Bitaut has worked in the content and collaboration industry for over 30 years, starting with FileNet Corporation (now an IBM Company) in Executive Leadership roles across Marketing, Sales, Product Management, Professional Services, and as a Board member. Today, Wally is the Global VP of Business Development at Seclore. His focus is to c...
- McClellan 'Mac' PlihcikSr. Special Agent, U.S. Secret Service, North Carolina Cyber Fraud Task Force (CFTF), Charlotte Field Office
- Jose FerreiraSr. Director, Security Solutions, East, Sirius, a CDW Company
Ferreira helps enterprises develop and maintain proactive security programs. He has over two decades of IT security experience and works with organizations to understand their assets, identify security gaps, and define the people, processes and technology that can facilitate mitigation and support business goals. He focuses on the development...
- Jonathan BritoManager, Third-Party Risk Management, Synctera
Jonathan Brito oversees Third-Party Risk Management at Synctera. Synctera connects community banks with FinTechs, allowing the bank to grow and the FinTech to launch quickly. Our processes streamline day-to-day processes like reconciliation, operations, and regulatory compliance for FinTech Banking. Jonathan Brito possesses over a decade of e...
- Isaac HannaganSr. Solutions Architect, ReliaQuest
Isaac Hannagan is a security professional with nearly a decade of experience spanning SIEM and the security industry supporting, architecting, and scaling solutions and services. Isaac has spent several years working in the SIEM vendor space supporting LogRhythm’s strategic enterprise environments as a Technical Account Manager before helping...
- Nick WormserManaging Director, Palatin Group SK
Mr. Wormser has over 20 years of military and international security experience. He spent a decade in the French military where he was deployed to a host of foreign countries, serving as a team leader of a long-range reconnaissance and patrol unit (LRRP), conducting counter-narcotics and anti-terrorism operations, and training of host-country...
- Christopher SandersPresident, The Palatin Group LTD
Mr. Sanders is currently the President of The Palatin Group LTD, an intelligence and corporate security advisory headquartered in Arlington, VA with offices in Bratislava, Slovakia and Zurich, Switzerland with partner offices around the globe. A seasoned security management consultant and executive with over 25 years of domestic and internati...
- Allen SautterPrincipal Security Advisor, AWS; Former CISO, Federal Reserve Bank of Atlanta
- David BarrishSenior Solutions Engineer, Okta
David is an Information Technology professional with over 20 years of experience in pre-sales engineering and software deployment in the Identity Access Management space. He has worked for many of the top IAM companies over his career and enjoys sharing his deep knowledge and experience to make customers successful.
- Moderator: Phread CichowskiSr. Security Architect, SecureWorks
Phread Cichowski has over 35 years of experience ranging from software development to data center management. Having worked for some of the leading technology companies in the world, his broad range of experience allows him to provide a well-balanced perspective leveraging bleeding-edge technology in critical high-availability IT environments...
- Kara L. Hilburger, Esq.Privacy Compliance & Digital Accessibility Team Leader, Beckage Law
Kara advises and counsels clients on the development and implementation of enterprise-wide data security and privacy programs and regulatory compliance under federal, state and international privacy laws, including the European Union’s General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA), Virginia Consumer Dat...
- Winston LalgeeSecurity Engineering Manager, Check Point
Winston has almost 20 years of experience in the ICT industry; designing and implementing network security solutions for large enterprise environments. Today, he is a Security Engineering Manager with Check Point Software and is currently supporting a unique set of strategic accounts. He provides thought leadership; helping his customers unde...
- Mike RomanSr. Sales Engineer, Orca Security
Mike is a Senior Sales Engineer at Orca Security who is responsible for helping organizations identify risks in their cloud environments and enhance their cloud security posture. Prior to joining Orca, Mike spent five years at Splunk where he partnered with organizations on their cloud journey in areas that included Security and Observability...
- Jon PoonVP of Security Services, Novacoast
Jon's background is in Computer Science and was a software developer building web and mobile applications before moving into the security industry. He has been working with SIEM technologies for over a decade and has worked with hundreds of customers over that time building out SOC and SOC teams.
- Steve BooneHead of Product, Checkmarx
Over the last decade, Steve Boone has helped hundreds of global clients with their strategic adoption of secure DevOps best practices. A frequent speaker at DevOps Enterprise Summit, and DevOps World, Steve has shared his expertise on Secure Continuous Delivery, Value Stream Management, and Agile best practices. Today, Steve is the Head of Pr...
- Jake MunroeSenior Product Marketing Manager, Recorded Future
Jake is a Senior Product Marketing Manager at Recorded Future and has held various roles across the security space in consulting, marketing, and sales. Prior to joining the private sector, he served as a Navy Intelligence Analyst with an extensive background in counterterrorism, cyber threat intelligence, and open-source intelligence investig...
- Tony AllegratiCloud Systems Engineer, Fortinet
Tony Allegrati is an experienced Sales Engineer with over 15 years of sales in both medium and enterprise accounts. Specialties: Presales demonstrations, evaluation, installations, training and support of IT security technology. 3+ years of work experience with Cloud Technologies and security for Cloud.
- Dave KleinDirector, Cyber Evangelist, Cymulate
21+ year veteran high tech leader with a proven track record of revenue generation in sales and demand generation in marketing. Successful in creating and conveying solution messaging for business and technical decision makers, analysts and channel partners. Energized teacher for field enablement.
- Carlton JonesRegional Vice President, Qualys
Carlton Jones is Vice President of Northeast Enterprise Field Team. Over 20 years of Security leadership experience, in Fusion Centers, Incident Response, Insider Threat, and Attack Surface Management. Carlton designs solutions at scale for the largest brands and technology providers in the world. His background as a practitioner and consulta...
- Mick LeachHead of Security Operations, Abnormal Security
Mick Leach is the Head of Security Operations at Abnormal Security. Prior to joining Abnormal, he held several security positions with Fortune 500 organizations, including Alliance Data and Nationwide Insurance and served in the United States Army for over 8 years.
Mick is a seasoned IT security leader with an extensive background in...
- Nick DulavitzGlobal Director, Channel Solutions Engineering, CyberArk
Nick Dulavitz, Global Director of Channel Solutions Engineering, has been with CyberArk for the past 8 years. Nick has worked with some of the largest global organizations helping them to achieve their identity security goals. In his current role, he is responsible for leading a global team that focuses on technical go to market enablement f...
- Mike McKeownNational Sales Executive, BTB Security, LLC
A 1980 graduate of St. Joseph's University, Mike has a 30+ year career of marketing and selling technology goods and services to SMB and Fortune 500 clients. While resident in the Great Philadelphia area, Mike has sold services nationwide. After owning his own business for 18+ year in technology services, Mike has been selling incident respon...
- Elizabeth SylvesSr. Consultant, North America, CSC
Elizabeth Sylve is Senior Business Consultant for Enterprise Businesses at CSC where she helps and advises Senior IT and Cyber Security Professionals mitigate risk in front of the firewall. She is also a speaker for Global Antifraud and Phishing Solutions, former 8-year VP of IT Technology consultant at FuturTech Consulting, LLC, and has 24 y...
- Krista ArndtDirector, Security Risk & Compliance, Voyager Digital
Krista Arndt is the Director of Security GRC at Voyager Digital. Krista enjoys helping organizations manage the challenge of maintaining an effective Cybersecurity program while enabling business initiatives within the confines of heavily regulated and emerging industries. Krista has over 13 years of Cybersecurity experience within regulated ...
- Valentina FloresCEO, Red Sentry
Valentina Flores is CEO of Red Sentry, a vulnerability scanning and penetration testing company that keeps organizations secure 24/7/365 by actually mimicking hackers. Formerly a cybercrime detective on a federal task force, Valentina fought against these criminals her whole career, and has unique insight into the minds and tactics of attacke...
- James BearceVP, Professional Services, AccessIT Group
James Bearce is Vice President of Professional Services at AccessIT Group, bringing more than 20 years of information technology and cybersecurity development, operations and leadership experience in the financial services industry and in cybersecurity advisory and managed services. Prior to joining AccessIT Group, Jim was responsible for lea...
- Jim ChrisosPrincipal Engineer, Exabeam
Jim officially started working in security as an analyst at a large MSSP. This experience enabled him to gain employment at large global organizations as an analyst before becoming an incident handler. It was in his capacity as an incident handler where he witnessed, first hand, nation state attacks. This left such a profound impact on Jim th...
- Sean BoulterPrincipal Security Engineer, Salt Security
Sean Boulter is a technical leader with Salt Security where he helps his customers protect their APIs from abuse and keep their customers’ data secure. His career in IT and consulting spans three decades and covers a wide variety of infrastructure platforms and several industries including fintech, finserv, insurance, healthcare, medtech, and...
- Matt BarnettCEO, SEVN-X
Matt is the Chief Executive Officer at SEVN-X. As a certified forensic analyst, former Law Enforcement Officer, and expert field operator, Matt lead's SEVN-X's Incident Response, Forensics, and Physical Security practices.
- Nick RagoPrincipal Security Engineer, Salt Security
Nick is a startup veteran and Internet technology entrepreneur with over 25 years of application development, testing, and cyber security experience. He is recognized as an industry expert in API development, API management, and API security. At Salt, Nick is helping guide and positively influence how organizations protect themselves from tod...
- Moderator: Gus ChiarelloDirector, Security Architecture, AccessIT Group
Gus Chiarello is the Director of Security Architecture and part of the technology consulting leadership team at AccessIT Group (AITG). Gus has over 10 years of experience in risk management and 16 years in IT professional services leading the development of AppSec MDR, MSP, and MSSP service practices. Through leveraging his background in both...
- Ray CanzaneseDirector of Netskope Threat Labs, Netskope
Ray is the Director of Netskope Threat Labs, which specializes in cloud-focused threat research. His background is in software anti-tamper, malware detection and classification, cloud security, sequential detection, and machine learning.
- Stephen FitzgeraldSr. Sales Engineer, Orca Security
From writing detection rules and automations for SOC teams to assisting with compliance initiatives, cloud security has always been the focus of Stephen's career. Currently Stephen serves as a Senior Solutions Engineer at Orca helping customers architect and operationalize the Orca platform, as well as providing risk assessment reviews and gu...
- Trenton IveyCounter Threat Unit Researcher, Secureworks
Trenton has had the privilege of working with teams of skilled hackers to legally compromise some of the largest organizations in the world. Trenton has also worked on several high-profile incident-response engagements to help provide the adversarial mindset as organizations respond and recover. While his focus is currently offensive research...
- Eric GauthierVP, Infrastructure & Security, Emsi Burning Glass
Eric Gauthier, CISSP, is a technology leader with 20 years’ experience working at the intersection of Information Security, IT, and DevOps. Eric is both a technical architecture and security leader having held positions in various settings including the corporate, academic, and service provider spaces building security programs, leading secur...
- Selva Vinothe MahimaidasCISO, Houghton Mifflin Harcourt
Selva Vinothe Mahimaidas is an Information Security Leader with more than 20 years of experience in all phases of information security. Selva currently serves as Chief Information Security Officer (CISO) at Houghton Mifflin Harcourt, an American publisher of textbooks, instructional technology materials, assessments, reference works, and fict...
- Moderator: Andrew SmeatonCISO, DataRobot
Andrew holds over 22 years of experience in the banking, financial services, and healthcare industries. He is experienced in all facets of IT/IS Security & Risk Management including acquisitions and disaffiliations, and has a track record of developing and implementing security strategies from inception through execution. In addition to his c...
- Sandra CavazosVP, Product Security and Privacy, Comcast
Sandra Cavazos serves as VP, Product Security and Privacy at Comcast. She leads Secure Development Lifecycle (SDL), including threat modeling, pen testing, SDL coaching, DevSecOps tooling, security developer training, and executive reporting. Sandra began her career as an engineer at Intel’s largest wafer manufacturing facility, improving qua...
- Tal KollenderCo-Founder & CEO, CISO, Gytpol
Tal is the CEO and co-founder of Gytpol. In her teenage years, she was a professional hacker, always on the hunt to crack open what seemed impossible, always on the lookout for IT challenges. As part of her army service, she was recruited to the Israel Air-Force having her sights set on becoming a fighter pilot. Later, the IDF re-assigned her...
- Michael HowdenDirector of Security Services, Novacost
Michael Howden brings broad and deep experience in technology, strategy, and security with almost 30 years of experience focusing on global upgrades, migrations, and consolidations for several hundred large enterprises. He is a transformational change agent, leading teams of top tier consultants, building world-class cybersecurity programs fo...
- Moderator: Peter KurekCybersecurity Threat Hunter and Incident Responder, Eversource Energy
- Moderator: Terry OlaesDirector, North America Systems Engineering, Skybox Security
Terry Olaes is director of North America systems engineering at Skybox Security. With more than 20 years of experience in IT, his expertise includes IT/OT convergence, audit and compliance, data breaches, and incident management. Working on the ground floor at a manufacturing plant, serving as a systems engineer, and managing large security t...
- Sean RaffettoStrategic Business Manager, WithSecure
Sean works with organizations across the globe partnering with them to provide tailored Consulting security services enabling security teams to keep up with the rapid pace of change in the cyber threat landscape. With over a decade of experience working with enterprise level solutions, Sean specializes in implementing proactive and defense cy...
- Trevor WelshGlobal Security Strategist, Google Cloud Security
Trevor is a Global Security Strategist with Google Cloud Security. Trevor leverages extensive experience in public sector, financials, retail / logistics, manufacturing, healthcare, and high tech to solve complex security analytics challenges. A former leader with Anomali, and companies like Splunk, ArcSight, and Fortinet, Trevor brings insig...
- Stephen ClarkDirector of Cloud Security Sales, Fortinet
Stephen Clark has over 25 years experience in the information security space having spent time at Check Point, Cisco, and Palo Alto Networks. Stephen also spent time working in the security consulting field working primarily with the Fortune 1000.
He is presently the Director of Cloud Security Sales for Fortinet. Today he helps manag...
- Jeffrey MorissetteTechnical Staff Assistant (Special Agent), Boston Field Office, United States Secret Service
Prior Federal Employment
United States Border Patrol (USBP) – Casa Granda Station, AZ
Employed as an agent of the U.S. Border Patrol, July 1997 – January 2000
Training: US Border Patrol Academy (6 months), Charlestown, SCCurrent Federal Employment
United States Secret Service (USSS) – Boston Field OfficeMonsurat OttunChief Information Security, Data Privacy, and Risk Management Strategist, City of Providence, RIJonathan TrullSVP, Customer Solutions Architecture and Engineering, QualysJonathan Trull is a longtime security practitioner and CISO with over 18 years of experience in the cybersecurity industry and is currently the Senior Vice President of Customer Solutions Architecture and Engineering at Qualys. His career has spanned operational CISO and infosec roles with the State of Colorado, Qualys, Optiv, and Microsoft....
Michael MeltzSenior Sales Engineer, Open SystemsMike Meltz has worked in the IT Security and infrastructure space for over 25 years and he specializes in the design and implementation of enterprise-level Cybersecurity technologies and business process improvements. His goal is to remain focused on creating a secure and quality-driven user experience while helping the organization grow and ...
Abel MoralesPrincipal Security Engineer, ExabeamAbel Morales is a Senior Security Engineer based in Atlanta, GA. Prior to Exabeam, Abel has over ten years of experience in information security in companies such as Verizon, Syniverse, McKesson and InterContinental Exchange (NYSE). In his previous role, he was responsible for managing incidents, performing technical analysis, and communicati...
Darren CarrollManaging Principal - Security Services, InsightDarren is a risk management and information security leader with diverse global experience in operational, technical, management, and presales roles. He has had the pleasure to build and lead multiple diverse, dynamic, high-performing teams. Throughout his career, he has provided consultative thought leadership, strategic direction, and tacti...
Eoin HinchyFounder, TinesBefore founding Tines in early-2018, Eoin worked in various enterprise security teams. He was a senior engineer in eBay Inc.’s Global Threat Management team, and most recently as DocuSign’s senior director of security operations, he led the company’s incident response, security tooling, threat intel/hunting, and forensics programs. Eoin has t...
Brian BlackDirector of Sales Engineering, Deep InstinctBrian is a Philadelphia based Distinguished Sales Engineer with 20+ years of experience in Cybersecurity and Intelligence. Brian leads Deep Instinct’s security engineering team, overseeing North and South American territories. He is a thought leader and technology evangelist with a wealth of knowledge on AI, Deep Learning, and Machine Learnin...
Lokesh AggarwalCEO & President, Apexa IQLokesh Aggarwal has over 20+ years of hands-on experience in developing technology plans, prioritizing IT initiatives and coordinating the evaluation, deployment, and management of current and future technologies. He has a track record of guiding large scale transformations and projects through the development of IT capability roadmaps, deplo...
Rich SchofieldPrincipal Security Architect, SysdigRich Schofield is a Principal Security Architect at Sysdig. Based in Boston. Rich has over 25 years experience in DevOps and Security at companies large and small, including HPE, Opsware and BBN. Over the past 4 years at Sysdig he has focused on security and visibility for Cloud and Kubernetes environments.
Greg McCarthyCISO, City of BostonGreg McCarthy is the first Chief Information Security Officer for the City of Boston and career public servant. Since joining the City of Boston’s Cybersecurity Team in 2010, Greg has managed the implementation of numerous information security solutions, developed the City's first cybersecurity awareness program for employees and successfully...
April Boyd-NoronhaProgram Director, Cybersecurity, University of Saint MaryApril, also known as The STEM Broker, is currently the Global Diversity & Inclusion Advisor and Board Member of the XR Safety Initiative (XRSI), the first global non-profit with the mission of helping build safe and inclusive realities. In her role, she continues to advise the CyberXR Coalition, launched by XRSI, where she helped lead the lau...
Christine GordonDirector, Global Cyber Governance Center, Cboe Global MarketsChristine is an Information Security leader with experience in the security, governance, and technology domains. Christine is currently the Director of the Global Cyber Governance Center at Cboe Global Markets, one of the world’s largest exchange holding companies. Christine holds a Master's in Management and Leadership from Webster Universit...
Dr. Margery SendzeTechnology Leader, I/O PsychologistDr. Sendze is a technology leader with more than 20 years of delivering business value by enabling high-performing teams. Dr. Sendze currently serves as a technology manager and leverages organizational psychology to drive organizational change and talent engagement and retention strategies in the technology workforce. She holds a B.A and an ...
Moderator: Kennetra PulliamsCommunications Specialist, Big 12 Now / ESPN+Kennetra Pulliams has more than 20 years of experience as a broadcast journalist. She graduated from The University of Texas at Austin. Her career has taken her from Texas to Virginia to Kansas City. Kennetra spent more than a decade working at Spectrum Sports, a regional broadcast network. There, she had to opportunity to cover the Kansas Ci...
Dr. Cheryl CooperBusiness Information Security Officer (BISO), T-MobileDr. Cooper holds a doctorate in Computer Science. She holds a Master of Science in Criminal Justice and a Master of Arts in Business Administration. She has earned several security certifications; Certified Information System Security Professional (CISSP), Certified Information Systems Security Auditor (CISSA), and Certified Data Privacy Solu...
Keith DalySenior Principal Engineer, ForgeRockKeith Daly is currently a Senior Principal Sales Engineer for ForgeRock.
Over the past 20 years, Keith has been on all sides of the Identity Management space in numerous industries, with roles ranging from systems architect within leading corporations, to developer and team lead at systems integrators, to technical sales and engineerin...
David MonnierCyber Fellow, CymruDavid has been with Team Cymru since 2007. Prior, he served in the US Marine Corps as a Non-Commissioned Officer. He then worked at Indiana University where he helped to build some of the most powerful computational systems of their day. He transitioned to cybersecurity and helped launch the Research and Education Networking ISAC. At Team Cym...
Rick RutledgeSales Engineer, ArmisRick Rutledge is currently a Sales Engineer at Armis where he is helping customers monitor unmanageable devices for anomalous activity. Previously, Rick was an SE with Phantom Cyber for over six years, working to automate security responses for many of the largest companies around the United States. Rick has also been an SE with Tufin Technol...
Jared AblonPresident & Co-Founder, HackEDUJared Ablon is the President and co-founder of HackEDU. His experience includes serving as a CISO, leading cybersecurity teams at the Department of Defense, and founding two companies. Jared has a CISSP, MBA and an MS in Applied and Computational Mathematics focusing on computer/cyber security, and was named CISO of the Year by the Los Angele...
James CussonSecretariat Security Liason, Massachusetts Executive Office of Health and Human ServicesBrendan "Casey" McGeeAssistant to the Special Agent in Charge, United States Secret ServiceWith over 21 years of federal law enforcement experience, ATSAIC McGee leads U.S. Secret Service (USSS) efforts to increase public and private partnership in the investigation of complex transnational criminal investigations involving the use of digital assets.
In an executive developmental role, ATSAIC McGee served as the Advisor to t...
Bob AdamsSecurity Strategist, MimecastBob Adams is a Cyber Security Strategist at Mimecast. Originally joining Mimecast nearly 7 years ago as a Sales Engineer, Bob was recruited to Product Management after developing various unique ways of investigating cyber-attacks and highlighting Mimecast’s services. Bob now continues to use his time to help educate companies on protecting th...
Delbert A. RollRetired U.S. Army, former member of the Intelligence CommunityDel is a recently retired, senior leader with 20 years of Federal Government service having served in Washington, D.C. and internationally. Concurrently, he served 23 years as a commissioned Army officer in austere and hostile environments around the globe. Command assignments in both conventional and special operations forces. He is recogniz...
Derek MelberChief Technology & Security Strategist, TenableDerek Melber is an accomplished Chief Technology and Security Strategist, Advisor, and Professional Speaker with more than 25 years of success across the computer & network security industries. As a 17X Microsoft MVP, leveraging extensive experience in unifying products, marketing, sales, and content, he is a valuable advisor for any organiza...
Neal HumphreyArea VP - Security Strategist, DeepwatchNeal Humphrey has been active in the security industry for nearly 20 years. He has reviewed Security from the Application layer, to the Transport Layer, to Cyber Threat Intelligence, and finally to the Human. Over the last 20 years he has worked with customers from the Global 100 down to the SMB market to identify and solve Cyber Security O...
Jarret WrightDirector of Cybersecurity, Massachusetts Port AuthorityPrior to his role as Director of Cybersecurity at MassPort, Jarret has served as Deputy Director of Corporate Security for over 2 years where he focused on maintaining a
safe and secure environment at all Massport facilities while working with departments, law enforcement partners, and stakeholders to strengthen our capabilities to prev...Dr. Caroline McGroary, PhD, FCAFulbright Scholar, Boston College Cybersecurity Graduate ProgramsDr. Caroline McGroary is a Chartered Accountant and an Assistant Professor of Accounting at Dublin City University (DCU), Ireland. She has a Ph.D. in Professional Accounting Education and was recently awarded a Fulbright Scholarship by the Fulbright Commission of Ireland. Caroline will spend the coming year at Boston College as a Fulbright Sc...
Simon TaylorCEO & Founder, HYCU, Inc.Simon Taylor is the CEO of HYCU where he creates and executes on the vision and strategy for one of the world's leading multi-cloud backup and recovery SaaS businesses. Prior to HYCU, Simon held senior executive positions at Comtrade Software including President and CEO as well as Chief Strategy Officer of The Comtrade Group where he evaluate...
Kwan LinPrincipal Data Scientist, Rapid7Kwan is the Principal Data Scientist on the Rapid7 Labs Research and Advocacy team. He routinely monitors and analyzes large-scale honeypot and Internet-scan data using statistical and machine learning methods. Recently, Kwan helped Rapid7 launch Project Doppler, a platform tool that enables customers to assess their public internet exposure....
Professor Kevin R. Powers, J.D.Founder and Director, Master of Science in Cybersecurity Policy & Governance Program, Boston CollegeKevin is the founder and director of the Master of Science in Cybersecurity Policy and Governance Program at Boston College, and an Assistant Professor of the Practice at Boston College Law School and in Boston College’s Carroll School of Management’s Business Law and Society Department. Along with his teaching at Boston College, Kevin is a C...
Chris A. QuintanillaManaging Director, Saperde; Chief of Staff, Philadelphia InfraGardChris has over 25 years’ experience in the IT field and is a Certified Information Systems Security Professional (CISSP). He has served as a senior project manager and engineer for several federal and municipal governments’ IT projects, as a network and systems engineer for IBM's Education and Training Division, and as an adjunct faculty mem...
Jon FredricksonVP & Chief Risk Officer, Blue Cross & Blue Shield of Rhode IslandJon Fredrickson is Vice President & Chief Risk Officer for Blue Cross & Blue Shield of Rhode Island. He graduated from the University of Rhode Island with a B. A. in Economics. During the past 15 years of working in the IT security field, Jon has developed a pragmatic approach to implementing cyber security solutions and assisting his organiz...
Danny JenkinsCEO & Co-Founder, ThreatLockerDanny Jenkins is the CEO and Co-Founder of ThreatLocker, a cybersecurity firm providing Zero Trust endpoint security. Danny is a leading expert in cybersecurity with over two decades of experience in building and securing corporate networks, including many roles on red teams and blue teams. He is dedicated to educating industry professionals ...
Bill BowmanCISO, EmburseBill Bowman has been the first CISO at five different organizations over the last 20 years. He has been in Educational Technology, Financial Technology, and B2B Growth companies. He was the founding President for the (ISC)2 Eastern Massachusetts organization 10 years ago. Bill lives in Framingham with his wife and five children.
Katherine ChipdeySr. Solutions Engineer, AutomoxKatherine Chipdey manages the Enterprise Solutions Engineer Team here at Automox, where she is working to simplify IT operations, increase security, and bridge that gap between security and IT for their prospects and customers alike. In this role, Katherine has most enjoyed using her background and experiences in the the field to speak with h...
Stephen FrethemSenior Director of Sales Enablement, VaronisStephen has worked in the IT Industry since 2000 and in the security industry for the previous eight. Based out of the Twin Cities, Stephen has spent time at some of the largest organizations including Target, US Bank, Honeywell, and United Health Group. In his current role at Varonis, Stephen works with organizations around the US helping or...
Tim HennesseySr. Director of SOC Services, Novacoast10+ years of managed security expertise.
Jamie ZajacVice President, Product, Recorded FutureJamie Zajac has over 10 years of experience in security and data protection roles and is currently the Vice President of Product Management for Recorded Future, an advanced security intelligence company. Jamie holds a B.S. in Meteorology and Computer Science from Embry-Riddle Aeronautical University and a MBA from UMass.
Michael MeisAssociate CISO, The University of Kansas Health SystemMichael is an Army veteran with over 13 years' experience and has a passion for architecting security programs, leading people, and developing world-class security teams. During his career, Michael previously partnered with the USDA CISO to develop one of the largest consolidations of security services in the federal government. Michael also ...
Ashley BullSolutions Engineer, TessianAshley is a Solutions Engineer at Tessian, providing customers with solutions to address their email security objectives. She is responsible for leading technical product demonstrations and evaluations, and is an expert in email security, endpoint security, insider threats, and behavior analytics and Human Layer Security. Prior to joining Tes...
Chris GriffithVP of Product, BalbixChris Griffith leads product management for Balbix. Chris brings over 15 years as a product, business development and strategy leader in security and technology. Prior to Balbix, Chris led tech alliances for Hewlett Packard Enterprise’s (HPE) security portfolio. Chris also ran product management for HPE’s Data Security business and drove stra...
Lisa PlaggemierExecutive Director, National Cybersecurity AllianceLisa Plaggemier is the Executive Director at the National Cybersecurity Alliance. Lisa is a trailblazer in security awareness and education and is a prominent security influencer with a proven track record of engaging and empowering businesses and their employees to protect themselves and their data. Lisa has held executive roles with the For...
David BarkerHead of Application Security, GoodLeap LLCDavid Barker is Head of Application Security for GoodLeap LLC, a Fintech company providing a point-of-sale platform for sustainable home solutions. GoodLeap marks David’s fourth creation of a Code-to-Cloud Application Security program. His pedigree includes companies like Dell EMC, Stanley Black & Decker, and PTC. David has both an MBA and an...
Richard BerthaoCybersecurity Advisor, U.S. Cybersecurity & Infrastructure Security Agency (CISA)Richard Berthao is the CISA Cybersecurity Advisor (CSA) for Connecticut. He manages the major cyber engagements in Connecticut with additional support to Region 1, championing cyber resilience to public and private sector partners. His career began over 25 years ago as an IT specialist in the private sector. Additionally, he spent 19 years as...
Christopher ZellVP, Cyber Operations and Analysis, Dell TechnologiesChris is currently Vice President, Cyber Operations and Analysis, for Dell Technologies. In this role, Chris leads the strategy and optimization of Dell's Cyber Security Operations (CSIRT, eFI, Security Assurance and Vulnerability Management) globally. Prior to joining Dell, Chris served at the first CISO for the Wendy's company, where he spe...
Margaret WhiteSVP & BISO, Wells FargoMargaret White is currently Senior Vice President, Business Information Security Officer (BISO) for Wells Fargo’s Enterprise Functions. In this role, Margaret leads execution of cybersecurity posture and strategy for enterprise-wide cybersecurity engagements and provides bi-directional transparency to Enterprise Functions CEOs and CIOs. Prior...
Peter LiuTechnical Account Manager, QualysPeter Liu has been with Qualys in the Pre-Sales TAM role for over four years. He loves helping customers evaluate Qualys to make the decision to adopt Qualys as a security platform that allows you to tackle current security challenges such as vulnerability management or global IT asset management. Prior to Qualys, he spent six years in the di...
Kevin BrennanSpecial Agent, FBI, Seattle Field OfficeFBI Special Agent Kevin Brennan is currently assigned to the Seattle Field Office to investigate computer intrusions. He is also an FBI cyber instructor, teaching about cybercrime investigations to local, state, federal, and international law enforcement agencies. Prior to joining the FBI in 2006, he worked for IBM Global Services.
Loris DegioanniCTO & Founder, SysdigLoris Degioanni is the Chief Technology Officer (CTO) and founder of Sysdig, the secure DevOps leader. He is also the creator of the popular open source troubleshooting tool, sysdig, and the open source container security tool, Falco. Prior to founding Sysdig, Loris co-created Wireshark, the open source network analyzer, which today has 20+ m...
Evan TegethoffVP of Solutions Consulting, BitSightEvan Tegethoff is Vice President of Solutions Consulting at BitSight. He previously held leadership roles in Risk and Compliance Practice Management at Optiv, Accuvant, and Forsythe Technologies. He has developed Third Party Risk approaches for numerous large organizations. Additionally, he led consulting teams focused on compliance, risk man...
Justin HenkelHead of CISO Center of Excellence, OneTrustJustin Henkel is an information security thought leader, subject matter expert, and Head of OneTrust's Security Center of Excellence. Justin has a proven track record planning, developing, building, and monitoring portfolios of work to secure IT infrastructure to meet federal and state cybersecurity standards, guidelines, and best practices. ...
Chuck BrooksCybersecurity influencer, author, presidential appointee, and Georgetown University cyber facultyNamed Top Tech Person To Follow by LinkedIn, Named Top 5 Cybersecurity Exec to Watch, Georgetown U Faculty, 2X Presidential Appointee, FORBES Contributor, Cybersecurity, Emerging Tech SME, Influencer
Nick OlmstedSr. Systems Engineer, Arctic WolfNick Olmsted is a senior systems engineer with Arctic Wolf who brings 19 years of experience architecting, implementing, and developing secure technology solutions for enterprises. Nick started his career as a developer learning how to develop secure applications for clients around the globe. He then moved into a systems engineer role to help...
Michael JohnsAssistant Special Agent in Charge, United States Secret ServiceMichael brings over 24 years of experience with the Secret Service that includes leadership roles both in the protective arena and investigative front. Currently, he leads the Secret Service's Outreach Program, focusing on private and public sector partner growth. He is also the Executive Director for the Secret Service's Cyber Investigative ...
Curtis BarkerField CTO; VP, Product and Solution Architecture, RezilionCurtis has spent the past 10 years in technical sales and product management. Prior to Rezilion, Curtis spent 6 years at Symantec to manage their emerging mobile security products and went on to lead the Symantec product portfolio in their Asia Pacific region based in Singapore. Curtis transferred to Symantec HQ in Mountain View, California i...
Michael GorelikCTO, MorphisecMichael Gorelik is CTO of Morphisec, where he leads the malware research operation and sets technology strategy. He has extensive experience leading diverse cybersecurity software development projects and experience in the software industry in general. Prior to Morphisec, Michael was the VP R&D at MotionLogic GmbH and before that served in se...
Tom BowyerDevSecOps Engineer, AutomoxTom Bowyer is a versatile Security Engineer who enjoys working with engineering, product, and infrastructure teams to ensure safe and efficient code lands in production. He has extensive experience deploying, securing and breaking SaaS applications on different operating systems and cloud hosting providers. Tom also enjoys building and breaki...
Greg MaplesPrincipal Security Architect, GigamonGreg Maples, CISSP, is Principal Security Architect for Gigamon. He has been involved in computer networking since his involvement in the original ARPANet project that became the Internet. He has been specializing in security protocols and web/DDOS issues for many years, and has more recently been focusing on threat detection in a Zero-Trust ...
Tim KeelerFounder & CEO, Remediant, Inc.Tim Keeler worked at Genentech/Roche from 2000 to 2012 and was a leader on the Security Incident Response Team. After this experience, Tim moved deeper into the Enterprise Security realm, leaving Roche in 2012 to focus on security consulting. His clients included UCSF, Genentech/Roche, Gilead Sciences, and CardioDX. Tim is a GX-certified Secu...
Tom DixonSecurity Engineer, CorelightTom has 15 years of experience in the security industry, beginning his career as an Analyst at what is now the U.K. MOD Joint Cyber Unit. After seven years in the military, he left to join Sourcefire as a Security Engineer. Cisco acquired Sourcefire in 2013, and he joined a small global team working with Cisco's top 28 accounts, ultimately le...
Dan KaplanSolutions Engineer, OktaDan is a Solutions Engineer for Okta and aligns identity-related technical requirements to business outcomes for Okta US West commercial customers and prospects. He is an Okta-certified consultant and developer familiar with Zero Trust methods used by Okta's ecosystem of customers, partners, and prospects.
Jim JohnsonDirector of Systems Engineering, Arctic WolfJim Johnson has been working to end cybercrime for the past two decades. His career started at Blue Coat, where he helped customers with their struggles to mitigate risk in the early days of web filtering. Since then, he has worked with customers of all sizes and verticals providing solutions from F5, Forescout, and now Arctic Wolf. As the Di...
Maggie MacAlpineSecurity Strategist, CybereasonMaggie MacAlpine is a security strategist at Cybereason and one of the co-founders of the DEF CON Voting Village. Over the course of 10 years spent in the field of cybersecurity, MacAlpine has been a contributing researcher on the "Security Analysis of the Estonian Internet Voting System" in partnership with the University of Michigan, co-aut...
Sean ScrantonCyber Liability National Practice Leader, RLI Insurance CompanyCyber Liability National Practice Leader (current).
IT Security / IT Auditor at RLI for 8 years.
Network / security consulting / auditor for financial institutions, government for 9 years.
Network / firewall administrator in healthcare for 7 years.Designations - CPCU, RPLU+, CISSP, CISM, CISA, CRISC, CSXF, MBA
Akshay KumarProduct Manager, Partners, PKWAREAkshay Kumar serves as the product lead for Hadoop Distributed File Systems (HDFS) and cloud storage modules, in addition to growing key partnerships with companies like AWS and IBM. Prior to joining PKWARE via the Dataguise acquisition in 2020, Akshay built his data security background as a solutions architect, where he implemented hybrid de...
Steve KinmanField CISO, SnykSteve Kinman is a dedicated technology leader, with 20+ years of innovative, compliance-driven security strategy knowledge and the ability to deliver scalable, principle-based security and privacy programs focused on business requirements. Most recently, he led a security program transformation at Zalando SE in Berlin, Germany, joining as the...
Keith ChapmanCybersecurity Specialist, Infoscitex CorporationKeith has been a team lead for a security operations center, where he was a mentor and an incident response and threat intelligence subject matter expert and facilitated tabletop exercises. He currently works in a GRC role. He has the CISSP and Certified Threat Intelligence Analyst certifications. He also serves as a Cyber Teen Education chai...
Jasmine NoelSr. Product Marketing Manager, ReversingLabsJasmine Noel is Senior Product Marketing Manager at ReversingLabs. Her career began as an industry analyst covering IT technologies. She then founded Ptak, Noel & Associates to provide research and marketing services to Fortune500 and startup technology firms. Prior to ReversingLabs, Noel also held product marketing roles in growth companies,...
Travis DyePrincipal Solutions Architect, ArmisTravis Dye is a Principal Solutions Architect for Armis focusing on strategic customers with challenging security projects. His passion is to help organizations with large and complex network environments find effective, real-world approaches to improve their network security programs. Prior to his current role he worked with security teams t...
Eve MalerCTO, ForgeRockEve Maler is a globally recognized strategist, innovator, and communicator on digital identity, security, privacy, and consent, with a passion for fostering successful ecosystems and individual empowerment. She has 20 years of experience innovating and leading standards such as SAML and User-Managed Access (UMA), and has also served as a Forr...
Krishna KsheerabdhiVP, Product Marketing, Encryption, Thales GroupKrishna has more than 25 years of experience leading Engineering and Business Strategy teams, including evaluating and integrating several key Thales acquisitions. Krishna has a Ph.D. in Computer Science and has worked on various topics, from compilers for supercomputers to operating systems for smart cards, leading skunkworks innovation proj...
Matt DowningDirector, Threat Hunting Operations, ReversingLabsMatt is Director of Threat Hunting Operations at ReversingLabs where he helps to operationalize the implementation of ReversingLabs tools and massive dataset to help make networks more secure. Matt is a dedicated blue teamer and threat hunter. Prior to his role at ReversingLabs, Matt held many roles supporting threat research and security ope...
Toby ZimmererDirector, Cybersecurity Due Diligence, RSM USToby Zimmerer is a Director of Cybersecurity Due Diligence in the Transaction Advisory Services Practice of RSM US, where he assists organizations with identifying and addressing the potential cybersecurity risks during mergers and acquisitions. He has over 22 years of professional experience developing information security strategies, design...
John M. WilkeSr. Product Marketing Manager, OktaJohn Wilke is a Senior Product Marketing Manager at Okta who is currently focused on aligning the impact of Okta's SaaS solutions with the core business goals of Okta's most strategic customers. He was previously responsible for the expansion of Okta's Business Value team for the West Coast and Asia Pacific regions.
Cory SutliffTechnical Director, AttackIQPractice Lead for Technical Account Management at AttackIQ. Cory has 20+ years' experience in IT focusing on security, seven+ years with the DoD. He has spent the last two years at AttackIQ delivering Security Optimization (BAS).
John PrewettSr. IT Security Engineer, UnitedHealth GroupJohn Prewett is a security technologist with over 20 years’ experience helping private sector, government agencies, and educational institutions identify risk and improve their security postures. John's latest passion is code writing, software engineering best practice, and otherwise improving the overall relationship between security practit...
Joey PeloquinPrincipal Cloud Architect, Sales Engineering, GigamonJoey Peloquin is an information and cyber security veteran, evolving over the years to specialize in multiple domains, including network, application, mobile, and for the last seven years, cloud security and architecture. Joey has held a variety of leadership roles over his career including security product ownership, head of consulting servi...
Matthew Alec AlvaradoSolutions Architect, Digital ShadowsAlec Alvarado has a unique blend of both private and public sector cyber threat intelligence (CTI) experience with 10 years serving in multiple all-source intelligence positions with the United States Army Reserve and 5 years in varying CTI positions with Digital Shadows. A career sparked by a discovered passion for intelligence analysis and ...
Bridget KravchenkoCISO, MeritorBridget Kravchenko is the Senior Director, Chief Information Security Officer for Meritor, responsible for information security, IT risk, and compliance globally. She has responsibility for developing a strategic security plan, security metrics, security programs, risk management, and incident response.
Bridget has served in a CISO or...
Laura ClarkCSO, State of Michigan - Department of Technology, Management and BudgetChief Security Officer for the Michigan Department of Technology, Management & Budget, Laura Clark brings a unique blend of strengths that include leadership, vision, and strategic and tactical planning, along with the ability to promote collaboration at all levels to support high-level, critical state-wide projects to successful completion.<...
Karl BernardIT Security Architect, University of Texas Health Science Center at Houston (UTHealth)Karl Bernard, CISSP, is an IT Security Architect at UTHealth with 30 years of IT experience, with 20 years in Information Security. His experience runs the full gamut of IT Security: he has implemented new technologies, such as network monitoring products and web application firewalls; performed risk assessments; coordinated large DR tests; l...
Shafia ZubairManager, Information Security, MorningstarShafia is a Manager of Information Security at Morningstar, where she is responsible for the Information Security program management and governance. This requires working across security operations, threat intel, application security, compliance, and with the product teams to ensure secure, resilient, and recoverable applications. Prior to Mo...
Tim MackeyPrincipal Security Strategist, SynopsysTim Mackey is a principal security strategist within the Synopsys CyRC (Cybersecurity Research Center). He joined Synopsys as part of the Black Duck Software acquisition where he worked to bring integrated security scanning technology to Red Hat OpenShift and the Kubernetes container orchestration platforms. As a security strategist, Tim appl...
Sam CurryChief Security Officer, CybereasonSam Curry is CSO at Cybereason and has over 25 years of IT security industry experience. Curry served as CTO and CSO at Arbor Networks, where he was responsible for the development and implementation of Arbor’s technology, security, and innovation roadmap. Previously, he spent more than seven years at RSA (the Security Division of EMC) in a v...
Alex JonesInformation Security Manager, Cobalt.ioAlex Jones is an Information Security professional with eight plus years of direct security and compliance experience. He also has an extensive background in media, audio, and communications prior to working in the security field. He is currently the Information Security Manager for the leading Pentest as a Service Company, Cobalt.io. Prior t...
Jason RiveraDirector, Strategic Threat Advisory Group, CrowdStrikeJason Rivera has over 15 years of experience innovating at the intersection of security operations and technology. He was a former Intelligence Officer/Captain in the U.S. Army, had assignments with the National Security Agency (NSA) and U.S. Cyber Command (USCYBERCOM), and served in combat tours overseas. He has experience in the private sec...
Jeremy C. SheridanAssistant Director, Office of Investigations, United States Secret ServiceJeremy Sheridan is the Assistant Director of the Office of Investigations at the United States Secret Service. In this role, he leads more than 160 Secret Service field offices and directs the Secret Service's network of Cyber Fraud Task Forces (CFTFs) in their investigations of sophisticated computer and financial crimes. He also works to en...
Pascal GeenensGlobal Director, Threat Intelligence, RadwarePascal Geenens helps execute Radware's thought leadership on today’s security threat landscape. Pascal brings over two decades of experience in many aspects of IT. As part of the Radware Security Research team, he develops and maintains the IoT honeypots and actively researches IoT malware. Pascal discovered and reported on BrickerBot, perfor...
Michael SchladtPrincipal Cybersecurity Researcher, General Electric Gas PowerMike Schladt, CISSP, GREM, is an information security researcher and engineer with over 12 years' experience performing malware analysis, reverse engineering, digital forensics, and incident response. Previous roles include leading malware analysis at the USAF National Air and Space Intelligence Center, as well as heading the development of e...
Deepthi MenonDirector of Information Security, Ambra HealthDeepthi Menon serves as Director of Information Security at Ambra Health. Ambra Health is an innovative software company that provides solutions for medical image sharing of DICOM and non-DICOM data between patients, physicians, and hospitals. Deepthi has more than 12 years of experience in information security. She has her Masters in Informa...
Eric BottsDirector, Global Cybersecurity Program, University of St. ThomasEric Botts is Director, Global Cyber Security Program, and Assistant Professor of International Studies at the University of St. Thomas, teaching courses on Cyber Warfare, Cyber Ethics, Enterprise Cybersecurity, and Digital Governance. Adjunct Lecturer at the University of Houston Downtown, teaching a course on Organizational Resilience in th...
Andrew JarrettProgram Manager, Cyber Readiness Center, Texas A&M Engineering Extension ServiceAndrew Jarrett of the TEEX Cyber Readiness Center is a former firefighter, current member of a Type II/Type III Incident Management Team (IMT) and has recently been deployed as a member of Texas Division of Emergency Management (TDEM) Incident Support Teams (ISTs) for COVID response. As the Cyber Enterprise Program Manager at the TEEX CRC, he...
Russell DowdellDirector, Sales Engineering, SecureLinkFor nearly a decade, Russell has worked with SecureLink customers and organizations looking to improve third-party security. He has been an integral part of the implementation, support, and solution engineering for customers ranging from large healthcare vendors to small towns. In his current role, Russell and his team help organizations iden...
Marcus GwynSr. Federal Sales Engineer, SonicWallMarcus Gwyn has worked in cybersecurity sales for 10 years and in the Federal space for five of those years. He is the lead Sales Engineer on the SonicWall Federal team and has worked with Federal customers in Civilian, DOD, and Intel spaces. Marcus enjoys following trends in the threat landscape and learning more about cybersecurity. In his ...
Marina LiangSr. Security Engineer, AutomoxMarina is a Security Engineer on the Automox SecOps team where she is passionate about all things security. Previously, she worked as a Threat Researcher, focusing on detections and prevention rules for commodity threats and common living off the land attacks (LOLbins). Before that, Marina served as a Sr. Threat Analyst on a managed SOC, tria...
James McGrilSecurity Solutions Architect, RadwareJames is a Security Solutions Architect and one of Radware’s thought leaders in Network and Application Security. He's been with Radware for nearly 10 years. James is a self-described geek and enjoys learning about application security and building web applications using the latest technologies. In his off time, James enjoys hiking, surfing, ...
Kevin WilsonSr. Product Manager, Area 1 SecurityThroughout his 14 years in cybersecurity, Kevin has been an Analyst and Engineer in various organizations, such as the U.S. Navy, First Data, and Lowe’s. Previously, he served as the Global Information Security Officer at Guess? Inc. and a Product Manager for McAfee.
Baseer BalazadehSr. Technical Marketing Engineer, GigamonBaseer Balazadeh has worked in IT management and implementation for more than 15 years. His experiences range from hands-on work on application architectures to development with DevOps best practices to network security and application migration into the public cloud IaaS. He has a bachelor's degree in computer system networking engineering f...
Moderator: Joel CaminerSr. Director of Cybersecurity Education, NYU TandonJoel Caminer is the Director of Cybersecurity Education at NYU Tandon. Joel has 20+ years of experience in Financial Services, IT, and Consulting, and has led many strategic initiatives across the IT Risk and cybersecurity spectrum. He previously served as the Global Head of Technology Risk Management at TD Securities; VP of Information Risk ...
Liat KrawczykAVP, Emerging Tech, Cyber NYC, New York City Economic Development CorporationLiat Krawczyk is Assistant Vice President for Emerging Tech at the NYCEDC where she led the workforce arm of Cyber NYC, NYC's signature program to grow its cybersecurity ecosystem. She is also the founder and head of the women.nyc Childcare Innovation Lab. Prior to joining NYCEDC, Liat grew startups, social-enterprises, and innovation ecosyst...
Jim RouthPrivate Sector Security & Risk Advisor and Board Member; Former Risk Leader, Mass Mutual and AetnaJim Routh serves as a security & risk advisor and Board member for several companies, and is the former CISO for MassMutual, CSO at Aetna, and Global Head of Application and Mobile Security for JP Morgan Chase. He also was the CISO for KPMG, DTCC, and American Express and has more than 30 years of experience in information technology and info...
Geoff BrownCISO, City of New York; Head of NYC Cyber CommandGeoff Brown was appointed Chief Information Security Officer for the City of New York in 2016, a position focused on cybersecurity and aggregate information risk across all 100+ NYC departments and agencies. In July 2017, Mayor de Blasio established New York City Cyber Command, led by Geoff and charged with setting Citywide cybersecurity poli...
Nasir MemonVice Dean for Academics & Student Affairs; Head of Tandon Online, New York University Tandon School of EngineeringNasir Memon is Vice Dean for Academics & Student Affairs, Head of Tandon Online, and a Professor of Computer Science at NYU Tandon. He introduced cybersecurity studies to NYU Tandon in 1999. He is co-founder of NYU's Center for Cyber Security (CCS) & the founder of the OSIRIS Lab, CSAW, and NYU Tandon Bridge & Cyber Fellows programs at NYU. H...
Tom RoehDirector, Systems Engineering - Public Sector Technical Practice, ExtraHopTom currently leads the ExtraHop Public Sector technical practice as Director of Systems Engineering. He has spent most of his 20-year career looking at networks, protocols, and packets in one way or another. Tom has a passion for utilizing data-driven techniques to solve the complex problems faced by modern IT practitioners. When he's not wo...
Moderator - Tina ThorstensonExecutive Public Sector Strategist, CrowdStrikeTina Thorstenson, Public Sector Strategist, sits on the Public Sector Industry Business Unit at CrowdStrike, where she provides strategic advisory services related to enterprise cybersecurity solutions for Public Sector organizations across Federal, State and Local, Higher Education, and Healthcare. Just prior to joining CrowdStrike, she serv...
Jonathan EhretVice President, Strategy & Risk, RiskRecon, a Mastercard companyJonathan has been a third-party risk practitioner since 2004. He is co-founder and former president of the Third-Party Risk Association. He has deep experience building and running third-party risk programs in finance and healthcare. He started with RiskRecon in April, 2020.
Deborah WatsonResident CISO, ProofpointDeborah Watson is a Resident CISO at Proofpoint with more than 20 years of experience as a cybersecurity leader focused on corporate information security strategy, compliance, security architecture, and data privacy and protection. Deborah led cybersecurity strategy programs for public and private sector organizations across the Fortune 1000....
Keval ShahSr. Sales Engineer, GigamonWith over 12 years of technical consulting and solution engineering experience in the field of Enterprise Networking & Security, Keval has enjoyed architecting and transforming businesses. Prior to Gigamon, Keval spent a decade at Cisco. He holds a Masters in Science, Electrical Engineering, from University of Southern California and a Master...
Sowmya KarmaliDirector, Product Management, CrowdStrikeSowmya Karmali is a Director of Product Management at CrowdStrike and is responsible for Falcon Horizon (CSPM) and Falcon Discover for Cloud. She has over 20 years of product development and management experience covering cloud, data, and IoT, and has worked in startups and large organizations. Prior to CrowdStrike, Sowmya held product leader...
Spencer ParkerSr. Director, Product Management, CrowdStrikeWith over 20 years of product management experience at Cisco, Websense, and most recently Sophos before joining CrowdStrike in 2017, Spencer has been instrumental in leading the Intel/Falcon X and Mobile solutions. Spencer holds a B.S. in Molecular Biology from the University of Portsmouth.
Michael RasmussenDirector, ISSA InternationalMichael Rasmussen is an internationally recognized pundit on governance, risk management, and compliance (GRC). With 27+ years of experience, he helps organizations improve risk and compliance processes, design and implement GRC architecture, and select technologies that are effective, efficient, and agile. As a sought-after keynote speaker, ...
Igor SorkinSr. Solutions Engineer, OktaIgor is a 25-year Kansas City IT professional with background across Telecom, Fin-Tech, and Security Technology companies focusing on Software Development, Enterprise Architecture, Security, and Identity and Access Management. A member of Okta's Enterprise Solutions team since 2019, Igor has been helping companies in the Central region to vis...
Rich GuthCMO, CloudPassageRich has built a 25-year career in Silicon Valley bringing new B2B software technologies to market including Big Data, Analytics, Business Intelligence, Java development tools, interactive development environments. and web application servers. He has held sales, product management, product marketing, solutions marketing, partner marketing, GM...
Mike AsaroSr. Named Account Manager, ProofpointMike Asaro is an Insider Threat Management and DLP Specialist at Proofpoint. Before joining Proofpoint earlier this year, he spent almost 10 years with an industry leading traditional DLP vendor. Throughout his career in cybersecurity, he’s managed and supported many organizations in the Southwest region across multiple verticals. As a San Di...
Prakash NagpalVP of Marketing, AppaegisPrakash Nagpal is VP of Marketing at Appaegis, where he is responsible for bringing the next generation of Zero Trust Secure Application Access solutions to market. His mission is to help customers realize the vision of securing applications and data without compromising user experience, with a Zero Trust application centric approach to secur...
Joel HollenbeckRegional Director, Security Engineering, Check Point Evangelist, Check Point Software TechnologiesJoel Hollenbeck is a Cyber Security Visionary with the Office of the CTO at Check Point Software Technologies Inc., the worldwide leader in securing the internet. His background includes over 20 years of experience deploying application protection and network-based security. Joel has been securing networks and systems since 1994, including de...
Steve Velazquez, CISSP, CISMSr. Solutions Engineer, OktaSteve is a Sr. Solutions Engineer at Okta helping enterprise customers with their identity and access management needs. In his previous life, Steve has served as a CISO / VP of Information Security, Data Center Manager, and held various Security, Windows, and Network Engineering roles.
Donovan StevensSolutions Engineer, SpyCloudDonovan is a Solutions Engineer at SpyCloud and has been in the tech industry since the mid nineties. He has worked in various industries and for companies ranging from start-ups to those listed in the Fortune 50. His career has taken him all over the world, including a four-year stint in South-Africa where he worked for the South-African gov...
Brian LinderEmerging Threats Cybersecurity Evangelist, Office of the CTO, Check Point Software TechnologiesBrian Linder is an Emerging Threats Expert and Evangelist in Check Point’s Office of the CTO, specializing in the Modern Secured Workforce. Brian has appeared multiple times on CNBC, FOX, ABC, NBC, CBS, and NPR Radio, and hosts Check Point’s CoffeeTalk Podcast and Weaponizers Underground, and has teamed on keynote CyberTalks at Check Point’s ...
Michael McGinnisSr. Sales Engineer, LogRhythmA Senior Sales Engineer for LogRhythm, Michael McGinnis has worked in IT Security for over 15 years, specializing in SIEM technology for the past 10. Michael’s experience began as a Security Architect for the largest hospital network in the Midwest where he developed and matured a security posture that is the framework used by many hospital s...
Kristen CooperDirector of Product Marketing, SiemplifyProduct marketing specialist with over 15 years of experience at emerging and growing cybersecurity and SaaS companies. Currently heading up product marketing at Siemplify. SecOps solution specialist. Remote work advocate.
Pedro VazquezDirector of Cybersecurity, Waddell & ReedAs the Director of Cyber Security for Waddell & Reed, Pedro is tasked with leading IR, SECOPS, Vulnerability Management, Security Automation, and IAM. Pedro has previously provided security services for the DoD, IRS, DST, and SS&C.
Jay BivensSr. Systems Engineer - GA, GigamonJay Bivens started his technology career working in IT stationed aboard the USS WASP (LHD-1) back in 1993. With a background expertise in email security and Advanced Threat Protection, his career spans several areas including Cloud Access Security Brokers, Web Application Firewalls, and Application Delivery Controllers. Jay has earned GIAC Ce...
John WeilerChairman of the Board, CMMC Center of ExcellenceJohn Weiler is currently the CEO and CIO of a congressionally charted IT "do tank" called IT-AAC. He has forged partnerships with two dozen leading non-profits and federal agencies committed to the Digital Transformation of the federal IT sector.
He has 40 years of IT Management, Solution Engineering, and Architecture experiences, cove...
Ryan AlemanDirector, Solution Architect , ArmisRyan Aleman is a Director of Solutions Architect at Armis. In this role, Ryan is at the forefront of the developing landscape of unagentable devices. With an extensive background in security and technical environment management, Ryan has worked extensively to find passive, agentless security solutions in the medical, industrial, and IoT space...
John SwenssonEnterprise Customer Success Manager, CloudPassageJohn Swensson is the Customer Success Manager at CloudPassage and is responsible for all customer support initiatives. John’s information security career spans two decades and includes a broad number of business environments. John and the CloudPassage teams have worked together creating groundbreaking security solutions across a range of indu...
Harrison ParkerSolutions Architect, SiemplifyHarrison holds a Bachelor's in Computer Science from Harvard University.
Chris PinVP, Security and Privacy, PKWAREChris Pin serves as PKWARE’s VP, Security and Privacy. In this role, Chris drives value and awareness for all PKWARE customers regarding the various challenges that both privacy and security regulations bring to the data-driven world. He works closely with all customers and potential customers to help them better understand how PKWARE solutio...
Jose BarajasTechnical Director of NA, Sales Engineering, AttackIQJose Barajas is Technical Director, NA Sales Engineering AttackIQ. He has over a decade of experience as a security researcher reverse-engineering malware and developing security controls and analytics. At AttackIQ, he now focuses on improving security control efficacy through attacker behavior emulation and establishing continuous security v...
Christopher A. HartFormer Chairman, National Transportation Safety Board; Founder, Hart Solutions LLPChristopher A. Hart is the founder of Hart Solutions LLP, which specializes in improving safety in a variety of contexts, including the safety of automation in motor vehicles, workplace safety, and process safety in potentially hazardous industries.
Mr. Hart is also Chairman of the Washington Metrorail Safety Commission, a three-jurisd...
Bruno AlmeidaCloud Overlay Sales Engineer, GigamonBruno Almeida is a Sales Engineer at Gigamon, where he partners with customers to help them ensure continuous security and monitoring of cloud and data center services during their digital transformation journeys. He has over a decade of experience in the IT infrastructure space. Before joining Gigamon, Bruno worked for several firms in the m...
Crane HassoldDirector of Threat Intelligence, Abnormal SecurityCrane Hassold is the Director of Threat Intelligence at Abnormal Security, where he leads a team responsible for researching enterprise-focused cyber threats. Prior to joining the private sector in 2015, Crane served as an Analyst at the Federal Bureau of Investigation for more than 11 years, providing strategic and tactical analytical suppor...
Larry ChinskiVice President, Global IAM Strategy and Customer Advocacy, One IdentityLarry Chinski has over 20 years in the Identity and Access Management industry and travels globally to help complex organizations understand emerging trends, the current threat landscape, and how to leverage technology platforms to resolve issues related to cybersecurity as well as operational efficiency.
Todd BearmanVP & CISO, Global Infrastructure and Security Solutions, TE ConnectivityTodd Bearman is the Chief Information Security Officer for TE Connectivity with responsibility for Information Security globally across nearly 150 countries with 75,000 employees.
Todd is responsible for ensuring collaboration and risk management across the corporate functions and business units where he leverages his leadership, techn...
Mariana PereiraDirector, Email Security Products, DarktraceMariana is the Director of Email Security Products at Darktrace, with a primary focus on the capabilities of AI cyber defenses against email-borne attacks. Mariana works closely with the development, analyst, and marketing teams to advise technical and non-technical audiences on how best to augment cyber resilience within the email domain, an...
Chris ChristensenSr. Business Consultant, Cybersecurity, Honeywell Building SolutionsChris Christensen is the Cybersecurity Business Consultant for Honeywell Building Solutions (Americas) and specializes in securing Operational Technology (OT) and Industrial Control Systems (ICS) Chris passionately believes that cybersecurity is everyone's shared responsibility and through awareness, education, accountability and positive rei...
Alex KirkGlobal Principal Engineer, CorelightAlex Kirk is an open source security veteran, with a combined 17 years at Sourcefire, Cisco, Tenable, and now Corelight, where he serves as Global Principal for Suricata. Formerly a malware zookeeper and IDS signature writer, today he spends his time helping SOC analysts and advising on security policy for government agencies, universities, a...
Stephen GatesSecurity Evangelist & Sr. Solution Specialist, Checkmarx Inc.Stephen Gates brings more than 15 years of information security experience to his role as Security Evangelist and Senior Solution Specialist at Checkmarx. He is an SME with an extensive hands-on background in security and is a well-known writer, blogger, presenter, and published author who is dedicated to conveying facts, figures, and informa...
Tommy ToddVice President of Security, Code42Tommy Todd is Vice President of Security at Code42 with over 20 years of cybersecurity experience, primarily focused on data privacy and data protection strategies. Prior to Code42, Tommy served in security roles at Symantec, Ionic Security, and Optiv as well as many other firms. Throughout his career, he has acted as a leader, mentor, engine...
C. Michael TracySr. Solutions Engineer, SpyCloudAn experienced security architect, specializing in Identity Governance, Access Management, and Multi-Factor Authentication, C. Michael Tracy has over 20 years of diverse technology experience with roles at Microsoft, Wells Fargo Bank, HID Global, and DigitalPersona. At SpyCloud, C. Michael helps clients safeguard the identities of their emplo...
Scott ShackelfordCybersecurity Program Chair, Indiana UniversityProfessor Scott J. Shackelford serves on the faculty of Indiana University where he is Cybersecurity Program Chair along with being the Executive Director of the Ostrom Workshop. He is also an Affiliated Scholar at both the Harvard Kennedy School’s Belfer Center for Science and International Affairs and Stanford’s Center for Internet and Soci...
Tina MeekerSr. Director, Information Security, Sleep NumberTina is currently the Sr. Director of Information Security at Sleep Number Corporation and has held executive cybersecurity leadership positions at Best Buy, Shutterfly, and Target Corporation. Tina holds a B.A. in Organizational Behavior from St. Scholastica and an MBA from Augsburg University. Tina also maintains active CISSP and CIPP/US ce...
Theodore PetersonDirector, Information Security, DatasiteTheodore Peterson, CISSP, has over 30 years of IT and Information Security experience. He has a BA from the University of Minnesota and an MBA from Augsburg College. He currently is the Director Information Security for Datasite.
Joseph CarsonChief Security Scientist & Advisory CISO, DelineaJoseph Carson has more than 25 years of experience in enterprise security, an InfoSec Award winner, author of "Privileged Account Management for Dummies" and "Cybersecurity for Dummies." He is a CISSP and an active member of the cyber community, speaking at conferences globally. He’s an advisor to several governments, as well as to critical i...
Piyali DasSr. Director, Information Security Risk Management, The College BoardPiyali Das has a proven 16-year track record of leading Information Security and Information Technology enterprise-wide initiatives. This includes success in risk-based prioritization of security initiatives and the resolution of complex issues cost effectively. She has also directed complex cross-functional projects across the enterprise res...
Brian CoulsonPrincipal Threat Research Engineer, LogRhythmAs Principal Threat Research Engineer in LogRhythm Labs, Brian works to keep abreast of current cyberthreats and news, develop threat detection and response content, and demonstrate how we detect and respond to threats. In this role, he regularly engages with the LogRhythm Community and offers advice and solutions to remediate common security...
Sajed NaseemCISO, New Jersey CourtsSajed Naseem ("Saj") is the Chief Information Security Officer (CISO) of New Jersey Courts. He has over 20 years of experience with information security and IT across many industries. As the CISO of the New Jersey Courts, he has focused on Cybersecurity Readiness & Performance, Information Governance, and Network Security. Sajed holds Masters...
Erich KronSecurity Awareness Advocate, KnowBe4Erich Kron is a veteran information security professional with over 20 years’ experience in the medical, aerospace manufacturing and defense fields. He is the former security manager for the 2nd Regional Cyber Center-Western Hemisphere and holds CISSP, CISSP-ISSAP, MCITP and ITIL v3 certifications, among others. He has managed the technical i...
Mike StacySr. Director, Enterprise Security Strategy, ProofpointMike works with customers and oversees technical strategy for areas which include cloud security, advanced email defense, SOAR, browsing security, and SDP. Prior to joining Proofpoint, Mike held numerous technical leadership and product strategy roles across a variety of solutions.
Chris PoulinDirector, Technology & Strategy / Deputy CTO, BitSightChris is Director of Technology & Strategy, as well as the Deputy CTO, at BitSight Technologies, guiding enterprises in assessing risk metrics and managing third-party relationships. He's been in cybersecurity for over 35 years, in both technical roles as a developer for the DoD intelligence community, and in executive positions, such as CSO ...
Terry RaySVP, Strategy and Imperva Fellow, ImpervaTerry Ray is the SVP and Imperva Fellow for Imperva Inc. As a technology fellow, Terry supports all of Imperva’s business functions with his years of industry experience and expertise. Previously he served as Chief Technology Officer where he was responsible for developing and articulating the company’s technical vision and strategy, as well ...
Sudeep VenkateshChief Product Officer, Egress Software Technologies LtdSudeep Venkatesh is a noted expert on data protection, bringing two decades of industry and technology experience in this area. His expertise spans the protection of data in both structured and unstructured data ecosystems, with an emphasis on solving real-world business problems through encryption, authentication and key management. He has a...
Jayson SalazarSr. Security Automation Engineer, GitLab Inc.Former software engineer and penetration tester, nowadays Sr. Security Automation Engineer at GitLab.
George J. SmithSr. Security Consultant, GigamonGeorge has 35 years of industry experience planning, designing, installing, and analyzing LAN, WAN infrastructures, peripherals, and tools for wired and wireless infrastructures. An enthusiast for technology and customers alike, he keeps his skills sharp by looking around corners to see what technology and business challenges are coming down ...
Meera RaoSr. Director, Product Management, SynopsysMs. Meera Rao is a Senior Director of Product Management, focusing on DevOps solutions at Synopsys, Inc. Ms. Meera has over 20 years of experience in software development organizations in a variety of roles including Architect, Lead Developer, and Project Manager, and Security Architect. Ms. Meera has been working as a trusted adviser to Fort...
Morgan WrightChief Security Advisor, SentinelOneMorgan is an internationally recognized expert on cybersecurity strategy, cyberterrorism, national security and intelligence. He currently serves as Chief Security Advisor for SentinelOne, Senior Fellow at The Center for Digital Government, and is the chief technology analyst for Fox News and Fox Business. Morgan's landmark testimony before C...
Belinda Enoma, CIPP/USFounder & Writer, istartandfinish.comBelinda Enoma is a privacy and cybersecurity consultant with a legal and technology background. She offers virtual privacy and cybersecurity services including risk mitigation solutions and building privacy programs from scratch. She is a writer, corporate trainer, lifestyle strategist, mentor, and coach to women in the cybersecurity and data...
Roger GrimesData-Driven Defense Evangelist, KnowBe4Roger Grimes is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 10 books and over 1,000 magazine articles on computer security. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. Grimes holds a bach...
Nimmy ReichenbergCMO, SiemplifyNimmy Reichenberg oversees strategy and marketing for Siemplify, the leading independent provider of Security Orchestration, Automation, and Response (SOAR). A cybersecurity industry veteran, Nimmy has more than 15 years of experience helping enterprises around the world tackle their security challenges. Nimmy started his careers as a securit...
Riley BruceSecurity Community Evangelist, Manager, Code42Riley is a Security Community Evangelist at Code42, where he enjoys educating Security and IT teams through engaging technical content and presentation. Previously, Riley served in both customer support and customer education roles at Code42. In his spare time, he enjoys photography, travel, and relaxing at the lake in northern Wisconsin with...
Justin WynnSr. Security Consultant, CoalfireAs a Senior Security Consultant, Justin Wynn is responsible for actively compromising and reporting on virtual environments typically encountered at Fortune 500 companies. Justin performs wireless, physical, red team and social engineering engagements. Justin also conducts research to include the production of open-source models for printing/...
Gary DeMercurioDirecting, Center of Excellence for Red Team, Social Engineering, and Physical Penetration Testing, CoalfireGary DeMercurio runs one of the largest groups in Coalfire Labs as a Director, where he leads Coalfire’s “Center of Excellence” for Red Teaming, Social Engineering and Physical Penetration. At Coalfire, Gary manages day-to-day business involved with FedRAMP, PCI, HIPPA, and penetration testing, while helping to spearhead the physical and soci...
Amber VanderburgFounder, The Pathwayz GroupAmber Vanderburg is a multi award winning international businessperson, keynote speaker, and founder of The Pathwayz Group. In 2016, she left her job in corporate HR to become the only female, only American, and only blonde Academy elite football coach for the Adidas Gameday Academy/Paris Saint Germain Academy in Bangalore, India. She worked ...
Brian VecciField CTO, VaronisAs Field CTO at Varonis, Brian supports a wide range of security and technology initiatives by helping Varonis’ customers and partner get the most out of the company’s products. In his 20-year technical career, Brian served as a developer, tech architect, engineer and product manager for companies in financial services, legal, and cybersecuri...
Dave PresuhnSr. Security Engineer, Boston ScientificDave has been working in IT since the last millennium. In his current role, he manages the device management system for medical devices. He has worked primarily in healthcare throughout his IT career.
Brian AndersonDirector of Technology, Office of the CTO, ImpervaBrian Anderson has over 16 years' experience in technology, working with networks, systems, application development, and security specializing in automation. Brian has worked to architect, attack, integrate, and secure networks and applications for emergency notification systems, government environments, healthcare organizations, transactiona...
VJ ViswanathanPartner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)VJ Viswanathan is a seasoned technology executive recognized and awarded for innovation, business capability transformation and thoughtful mentorship. Most recently, VJ is the founding partner at CYFORIX, a global cybersecurity research, advisory & strategic consulting firm delivering solutions to public and private sectors. He also serves as...
Mark SangsterVice President and Industry Security Strategist, eSentireMark Sangster is the author of "NO SAFE HARBOR: The Inside Truth About Cybercrime and How to Protect Your Business." He is an award-winning speaker at international conferences and prestigious stages including the Harvard Law School and RSA Conference, and author on various subjects related to cybersecurity. His thought provoking work and per...
Jason GeorgiGlobal Field CTO, Prisma Access, Palo Alto NetworksJason is an accomplished technology executive with over 25 years of experience driving innovation and transformation initiatives across global organizations. Jason collaborates with CIOs, CTOs, and other technology leaders on strategies aimed at enabling business outcomes.
Jason is currently the Global Field Chief Technology Officer fo...
Eric BodkinDirector, Endpoint Recovery Services, CrowdStrikeEric Bodkin leads the delivery of Endpoint Recovery Services for CrowdStrike. Based out of the greater Denver area, Eric leads service engagements focused on the rapid recovery and remediation of endpoints in response to a cyber incident. Eric has more than 15 years of experience in incident response, forensic investigation, cybersecurity ope...
Jonathan EchavarriaEnterprise Architect, ReliaQuestJonathan Echavarria is an Enterprise Architect at ReliaQuest that has spent his career building and breaking a variety of environments. In his current role, Echavarria leverages this experience to orchestrate business strategy alignment with technological enablement. During his time at ReliaQuest, Jonathan has held various positions with resp...
Chris PittmanSenior Manager, Sales Engineering, BlackBerryChris Pittman has worked in enterprise information technology since 1993 and has specialized in cyber security for the last 14 years. He worked in security and controls and incident response for the Ford Motor Company before moving to the security vendor space in 2008. As a sales engineer at BlackBerry Cylance, he provides technical and secur...
Rori PerkinsSenior Manager, InfoSec Awareness and Analytics, Columbia SportswearRori is an expert in organizational change management with a focus on security awareness and driving human behavior.
Brennan O'BrienDirector, Information Security, Risk & Compliance, Columbia SportswearBrennan is the head of Information Security for Columbia Sportswear Company and a 20-year veteran of cybersecurity in verticals including apparel, logistics, healthcare, and financial services.
Paul RichExecutive Director, Data Management & Protection, JPMorgan ChasePaul Rich joined JPMorgan Chase & Co. in 2019 as Executive Director, Data Management & Protection, with the mission of tackling the management of all unstructured data within the company. Paul is passionate about data security, privacy, principle-based design and goal-setting, and has over thirty years of technology experience. During the mor...
Mike DeNapoliSr. Solution Architect, CymulateMike DeNapoli has spent over two decades working with companies from mom and pop shops to Fortune 100 organizations;advising on issues from Business Continuity Planning, to Cloud Transformation, to Real-World Cybersecurity. He is currently a Senior Solution Architect with Cymulate Breach and Attack Simulation;helping customers and partners k...
Nigel ThompsonVice President, Solutions Marketing, BlackBerryNigel Thompson is responsible for the product position and messaging of BlackBerry® Spark. He is a regular thought leadership speaker, experienced on topics impacting governments and businesses worldwide, including cybersecurity trends, workflow reformation and harnessing IoT to accelerate digital transformation.
As BlackBerry has tr...
Jeremiah SahlbergManaging Director - Federal, Third Party Risk, TevoraJeremiah Sahlberg has more than 20 years of security experience. Sahlberg is an executive security consultant and advises clients on establishing security programs and compliance management. He holds CISSP, CISM, PCI QSA and HITRUST certifications.
Previously, Sahlberg held the Senior Director of Protect Operations at NBCUniversal a...
David HawkinsDirector, Consulting Engineer, BitSightDavid Hawkins has been in the security industry for just over 20 years. His background includes both IT security as well as physical security. David has served as the Technical Vice Chair of the Open Security Exchange, co-authoring the PHISBITs security protocol which was intended to help integrate physical and IT security.
On the Info...
Brian RobisonChief Evangelist & Sr. Director, Product Marketing, BlackBerryBrian Robison is the Senior Director, Product Marketing and Chief Evangelist at BlackBerry (formerly Cylance), where he educates the world that preventing cybersecurity threats is actually possible and a much better approach than detecting and responding after an attack. With over 20 years' of cybersecurity experience, Robison is a regular sp...
Kevin BocekVP, Security Strategy & Threat Intelligence, VenafiKevin Bocek is a leading subject matter expert in machine identity protection. With more than 16 years in the IT security industry, Kevin has been featured in The Wall Street Journal, The New York Times and The Washington Post, among many others. Before joining Venafi in 2012, Kevin spent almost two decades working for several leading IT secu...
Katrina WattsCyber Security Threat Analyst, Oil and Natural Gas Information Sharing and Analysis Center (ONG-ISAC)Katrina Watts works as a Threat Analyst with the ONG-ISAC and focuses on curating and sharing qualitative intelligence related to cyber threats to the oil and natural gas supply chain. Prior to joining the ONG-ISAC, Katrina worked as an Incident Response Analyst for a mid-size corporation and separately as a contractor. Additionally, Katrina ...
Travis HerrmannInformation Security Advisor, Devon Energy CorporationTravis has been with Devon Energy for 20 years, being a pioneering member of the Information Security team. Currently, Travis supports the Incident Response, Hunt, and Intelligence functions at Devon, serves on the ONG-ISAC Information Sharing committee, and holds multiple industry security certifications.
Dr. Shaneé DawkinsComputer Scientist, Visualization and Usability Group, National Institute of Standards and Technology (NIST)Dr. Shaneé Dawkins is a Computer Scientist in the Visualization and Usability Group at the National Institute of Standards and Technology (NIST). She performs research focusing on human centered design and leads the NIST Phish Scale research effort. Shaneé received her M.S. and Ph.D. in Computer Science at Auburn University, and B.S. in Compu...
Ansh PatnaikHead of Product Marketing, Google Cloud SecurityAnsh Patnaik, former Chief Product Officer for Chronicle, is now the head of product marketing for Google Cloud Security. Previously, he was VP of Product Management at Oracle where he defined and launched their Security Analytics Cloud service. Over the last 20 years, Ansh has held product management, marketing and sales engineering roles at...
Adam GatesSr. Sales Engineer, MalwarebytesWith over 20 years of experience in technology, Adam Gates serves as a senior technical member of Malwarebytes Field Sales Team providing support for customers in North America. Prior to Malwarebytes, Adam has held various senior system engineering positions and consulting roles at Dell, Microsoft, IBM, Atos, and Mimecast. Adam lives in Dalla...
Myriah V. Jaworski, Esq., CIPP/US, CIPP/EMember, Litigation Team Lead, Octillo LawMyriah Jaworski leads Octillo Law's Privacy Litigation Team, where she represents clients in data breach actions, technology disputes, and in the defense of consumer class actions and related regulatory investigations stemming from alleged privacy torts and violations of the TCPA, BIPA, IRPA, and other state and federal privacy laws. Myriah a...
Stuart WagnerSr. Director, IT Security & Compliance at Enterprise Products, Chairman, ONG-ISACStuart served as a Board Member of ONG-ISAC for over five years and became Chairman in June 2018. He has attended the FBI CISO Academy, has served as President of the award-winning South Texas Chapter of the Information Systems Security Association (ISSA), and is a member of ISACA and InfraGard. Stuart has developed and led information securi...
Angela HaunExecutive Director, ONG-ISACAngela Haun became the Executive Director of the Oil and Natural Gas Information Sharing and Analysis Center (ONG-ISAC) in September 2018. Ms. Haun joined the ISAC after a 20-year career as a Special Agent with the FBI. She brought extensive experience in cybersecurity and protecting critical assets from her work at the FBI, along with her le...
Brad BeutlichVice President, Western and LATAM Sales, EntrustBrad Beutlich is an information security professional who has worked with numerous U.S. based companies over the past 20 years, providing security solutions ranging from end-point to data security. The last 13 years, he has worked for Entrust providing security solutions that protect customer data, financial transactions, and IoT device manuf...
Sivan TehilaDirector of Solution Architecture, Perimeter 81Sivan Tehila is the Director of Solution Architecture at Perimeter 81, a leading Secure Access Service Edge (SASE) provider, and a cybersecurity expert with over 14 years of industry experience. Sivan served in the IDF as an Intelligence Officer and then in various field positions, including Information Security Officer, CISO of the Research ...
Christopher HassDirector of Information Security and Research, AutomoxChris Hass is an extremely driven and proven information security professional with extensive experience in Malware Reverse Engineering, Threat Intelligence, and Offensive Security Operations. In his current role, Chris serves as Director of Information Security and Research at Automox. In addition to being a former cybersecurity analyst for ...
Julia VooCyber Fellow, Harvard Kennedy School, Belfer Center for Science and International AffairsJulia Voo is a Cyber Fellow and leads the team behind Belfer's National Cyber Power Index. She was formerly the Research Director for the China Cyber Policy Initiative.
Her areas of research concern geotech strategy including the Digital Silk Road, industrial policy, and technical standards for strategic technologies.
Voo has re...
Tony AnscombeChief Security Evangelist, ESETTony Anscombe is Global Security Evangelist and Industry Partnerships Ambassador for EST, where he serves to increase ESET’s public awareness initiatives and strengthen relationships with new and existing partners.
Anscombe joined ESET from Avast (which acquired his former employer AVG) where he held the title of Senior Security Evange...
Tom UtleySr. Presales Systems Engineer, Arctic WolfTom Utley is a senior presales systems engineer with Arctic Wolf Networks based out of the Charlotte area. Tom is a subject matter expert in Managed Detection & Response (MDR) and Managed Risk for mid-size enterprise organizations. Prior to Arctic Wolf, Tom held senior engineering positions at Sandvine as a sales engineer and solution archite...
Allan LiskaSr. Security Architect, Recorded FutureAllan Liska is a senior security architect at Recorded Future. Allan has more than 15 years of experience in information security and has worked as both a security practitioner and an ethical hacker. Through his work at Symantec, iSIGHT Partners, FireEye, and Recorded Future, Allan has helped countless organizations improve their security pos...
Richard MelickSr. Technical Product Marketing Manager, AutomoxRichard Melick has spent over a decade advancing through the security industry with his considerable experience and considerable focus on the stories surrounding ransomware, hacking, and cyber attacks. He has been a security speaker on five continents and has even advised royalty on how to make and distribute ransomware.
Etay MaorChief Security Officer, IntSightsEtay Maor is Chief Security Officer at IntSights. As CSO, Etay leads the security advisory practice at IntSights where he works with CISOs and other senior cybersecurity executives to develop risk management-based cybersecurity programs. Etay has extensive experience in cybersecurity having worked at IBM, Trusteer, and RSA. Etay holds a BA in...
Gina ScintaSr. Solutions Architect, ThalesGina Scinta is a Senior Solutions Architect with the Thales, DIS, Cloud Protection and Licensing business line. She has over 30 years of experience in the IT profession, encompassing pre/post sales engineering support for Commercial and Federal territories. For the past 10 years, she has focused on providing solutions for protecting data usin...
Rick HollandCISO and VP of Strategy, Digital ShadowsRick has more than 15 years' experience working in information security. Before joining Digital Shadows, he was a vice president and principal analyst at Forrester Research, providing strategic guidance on security architecture, operations, and data privacy. Rick also served as an intelligence analyst in the US Army. He is currently co-chair ...
Chris GoettlSr. Director, Product Management, IvantiChris Goettl is the Director of Product Management for security products at Ivanti. Chris has over 15 years of experience working in IT, where he supports and implements security solutions for Ivanti customers and guides the security strategy and vision for Ivanti security products. He is also a security evangelist speaking at security events...
Lee PsinakisCloud Security Sales Specialist, Check Point Software TechnologiesLee is a Cloud Security Specialist engaging with Check Point customers in the southeast to enable and accelerate their digital transformation and cloud initiatives, by designing secure, compliant solutions to protect their corporate assets and data in the public cloud.
Before joining Check Point, Lee held Sales, Management and Business...
Eric SkinnerVP, Strategy, Trend MicroEric Skinner is VP of Market Strategy at Trend Micro, helping shape Trend’s solution offerings, growth plans and go-to-market approach. Previously at Trend Micro, Eric has been responsible for global product marketing. Prior to Trend Micro, Eric held senior management positions in a health care mobile startup and at digital identity solutions...
Tim O'ConnorManager of Knowledge Services, Cadre Information SecurityTim O’Connor works for Cadre Information Security as the lead of knowledge services and vCISO team member. He is a professional public speaker, has been working in IT for 20+ years and holds a number of certifications including PCI-QSA, CISA, CISSP, CTT+, MCSE, CISSO, CWNE, Security+ and CISSM. Tim has authored over a dozen books, has written...
James EllisDetective First Lieutenant, Commander, Michigan Cyber Command Center (MC3), Michigan State PoliceDetective First Lieutenant Jim Ellis is the commander of the Michigan State Police Cyber Section within the Intelligence Operations Division. He leads a cyber team of 56 MSP members located at 7 offices throughout Michigan. He has oversight over the Michigan Cyber Command Center (MC3), Computer Crimes Unit (CCU), and the Michigan region of th...
Edward RobertsDirector of Product Marketing, ImpervaEdward Roberts leads Product Marketing for Imperva Advanced Bot Protection. Prior to Imperva he led marketing at Distil Networks and has over twenty years of experience in technology marketing. Previously he worked for Juniper Networks, heading up Product Marketing for the Counter Security team. Before that he ran marketing for Mykonos Softw...
Ran RosinDirector, Product Management, ImpervaRan Rosin Joined Imperva two years ago and is currently leading the Cloud Data Security solution. Prior to joining Imperva, Ran founded and lead two start-ups in the area of mobile Application and IoT.
Phillip WylieLead Curriculum Developer, Point3 FederalPhillip Wylie is the Lead Curriculum Developer for Point3 Federal, Adjunct Instructor at Dallas College, and The Pwn School Project founder. With over 22 years of experience, he has spent the last eight plus years as a pentester. His passion for mentoring and education inspired him to start teaching and to found The Pwn School Project, a bi-m...
Tod BeardsleyDirector of Research, Rapid7Tod Beardsley is the director of research at Rapid7. He has over 20 years of hands-on security experience, stretching from in-band telephony switching to modern IoT implementations. He has held IT Ops and IT Security positions in large organizations such as 3Com, Dell, and Westinghouse, as both an offensive and defensive practitioner. Today, ...
Glenn KapetanskyCSO, Trexin ConsultingGlenn Kapetansky has a passion for building systems, organizations, and teams, and has done so across a number of business sectors, technologies, and roles. For over 20 years, Glenn has advised senior executives and built teams throughout the delivery cycle: strategy, architecture, development, quality assurance, deployment, operational suppo...
Eric WolffSr. Product Marketing Manager, Cloud and App-layer Data Protection, Thales Cloud SecurityEric Wolff is a Senior Product Marketing Manager for Thales application-layer data protection and solutions for public cloud security. He has over 20 years’ experience in threat intelligence management, network security, application acceleration, enterprise-class storage area networking, storage virtualization, data-management applications, a...
Kelsey NelsonSr. Product Marketing Manager, OktaKelsey Nelson is a Senior Product Marketing Manager at Okta, leading workforce IT and security solutions, including getting beyond the buzzword of "Zero Trust." Prior to joining Okta, she led product and business communications at tech startups varying from enterprise software to edtech to consumer music hardware, and prior to that taught sec...
David MassonDirector of Enterprise Security, DarktraceDavid Masson is Darktrace’s Director of Enterprise Security, and has over two decades of experience working in fast moving security and intelligence environments in the UK, Canada and worldwide. With skills developed in the civilian, military and diplomatic worlds, he has been influential in the efficient and effective resolution of various u...
Susan HansonVice President, Human Resources, Provation MedicalSusan has over 20 years of healthcare experience in Human Resources and Compliance. Susan joined the Provation team in 2017 and brings her experience of building and growing high-performing teams with a dynamic, results-oriented culture and strong leadership. Susan also has experience in healthcare compliance specifically in HIPAA and HITECH ...
Paul LanziCo-Founder & COO, RemediantPaul Lanzi, is the co-founder and COO of Remediant. Remediant is a cybersecurity startup focused on delivering a new approach Privileged Access Management. Paul and his co-founder at Remediant, Tim Keeler, worked together in the IT departments of several biotechs including Genentech, Roche and Gilead Sciences before starting Remediant. At eac...
Adam WaltmanSr. Sales Engineer, MalwarebytesAdam has over 20 years of experience in technology and serves as a senior technical member of the Malwarebytes field sales organization, providing expertise to customers in the Eastern U.S. Prior to joining Malwarebytes almost 5 years ago, Adam’s travels took him from various operational roles to other pre-sales engineering roles with Symante...
Eddie DoyleGlobal Security Strategist, Check Point Software TechnologiesEdwin Doyle communicates with international leaders in cybersecurity, cyber forensics, and cyber law enforcement, across the world. Taking best practices for threat mitigation from the industry’s finest CISOs and from police and military cyber command, Edwin’s responsibilities include sharing cyber defense tactics with media, government agenc...
Andre AlvesCloud Security Architect, Trend MicroAndre Alves has been helping companies to achieve safer environments for information exchange for over 10 years. Has always enjoyed tinkering with computers and being on the edge of new technologies, even back as a nerdy teenager in Brazil. Andre is a certified AWS Solutions Architect and Hybrid Cloud Security trainer.
Nathan WenzlerChief Security Strategist, Tenable, Inc.Nathan Wenzler is the Chief Security Strategist at Tenable, the Cyber Exposure company. Nathan has over two decades of experience designing, implementing, and managing both technical and non-technical security solutions for IT and information security organizations. He has helped government agencies and Fortune 1000 companies alike build new ...
Mike LloydCTO, RedSeal NetworksDr. Mike Lloyd has more than 25 years of experience in the modeling and control of fast-moving, complex systems. He has been granted 21 patents on security, network assessment, and dynamic network control. Before joining RedSeal, Mike Lloyd was Chief Technology Officer at RouteScience Technologies (acquired by Avaya), where he pioneered self-...
Mark OstrowskiHead of Engineering, East US, Check Point Software TechnologiesMark Ostrowski is the Head of Engineering for the East region of US at Check Point Software Technologies. Mark has over 20 years' experience in IT security and has helped design and support some of the largest security environments in the country. As an evangelist at Check Point Software, Mark provides thought leadership for the IT security i...
Davitt J. PotterDirector, MSSP and Channels, Americas, Digital ShadowsBorn and raised in the Black Hills of South Dakota, Davitt has over 25 years of experience in the OEM, VAR & MSSP channels realm. From starting as a field services engineer fresh from school at the South Dakota School of Mines and Technology, and eventually defining and managing IT operations and strategy for numerous companies in a CTO capac...
Michael LopezDirector of Cloud Services, AccessIT GroupMike Lopez, Director of Cloud Services at AccessIT Group, has a history of designing cloud architecture with a security focused approach for government and fortune 500 clients. He has worked with private and public cloud environments including AWS, Azure, Oracle, and Google Cloud. Mike leads AccessIT Group’s Cloud practice by helping its cust...
Gillian LockwoodEnterprise Information Security Program Administration and Governance, Partners HealthcareBrian CareyManager, Advisory Services, Rapid7Brian Carey is a Rapid7 Manager of Advisory Consulting, specializing in: Security Program Assessments, Security Program Development, Risk Management, Vulnerability Management Program Development, Security Awareness and Policy Development. Before joining Rapid7 Brian was Information Security Director and interim Security Officer at LafargeHolc...
Adam WinnProduct Manager, Cisco Umbrella, CiscoAdam Winn is the platform product management lead for Cisco Umbrella. He got into cloud security product management in 2013 and never looked back. In 2016, he joined OpenDNS shortly before it was rebranded as Cisco Umbrella. He is a life-long California resident and a fan of live music (and can't wait for it to come back).
Yuk Fai ChanCo-Leader, OWASP Toronto ChapterYuk Fai Chan is Co-Leader of the OWASP Toronto chapter, where he actively promotes software security within the Toronto community. Professionally, Yuk Fai is a Co-Founder at Proack Security Inc., a Toronto-based information security consulting firm. He specializes in application security, penetration testing, threat modelling, security incide...
Bobby ModhaSecurity Consultant, Security CompassBobby Modha is a Security Consultant with Security Compass. He specializes in security assessments in the application security space including web application, APIs and mobile app penetration testing. In his spare time, Bobby enjoys working on personal projects such as developing scripts and participating in capture-the-flags.
Jeremy CastlemanCloud Security Specialist, Check Point Software TechnologiesJeremy Castleman is the Cloud Security Specialist supporting the Cloud Team for Check Point Software Technologies. Jeremy brings 15 years of experience in technology sales, marketing, business development and cloud migration services in the partner ecosystem. He has worked in multiple countries around the world, in various markets, and across...
Achint SehgalGlobal Head of Solutions Engineering, OneTrustAchint Sehgal, CIPP/E, CIPM, serves as a Global Head of Solutions Engineering for OneTrust Vendorpedia—a purpose-built software designed to operationalize third-party risk management. In his role, Sehgal advises companies throughout their third-party risk management implementations to help meet requirements relating to relevant standards, fra...
Robert WongExecutive Vice-President, Chief Information Officer, Toronto HydroRobert Wong is EVP & CIO at Toronto Hydro, responsible for information technology, operational technology, cyber security, and telecommunications. Robert was also Chief Risk Officer, responsible for corporate enterprise risk management, strategic planning, corporate governance, and business continuity.
Robert is on the Board of Directo...Lois TulloExecutive in Residence, Global Risk Institute; CFRO/CCO, Novera Capital, Risk Management Faculty, Schulich School of Business, York UniversityGuidePoint SecurityNick RitterCISO, First Financial BankNick Ritter is the leader for Product & Industrial Security teams within GE. He is responsible for the product security program across GE commercial products, third party and supply chain security, manufacturing security, application security, and attack simulation (Red Team). Nick is also a key risk advisor to GE’s global CISO. He has almost...
James GoepelTreasurer and Member, Board of Directors, Cybersecurity Maturity Model Certification (CMMC) Accreditation BodyJames Goepel is Treasurer and Member, Board of Directors for the CMMC-AB. He is also an adjunct professor of Cybersecurity at Drexel University and CEO of Fathom Cyber, a trusted agent for senior management and developer of defensible cybersecurity strategies. Jim earned his BSECE from Drexel and his JD and LLM degrees from George Mason Unive...
Edward EttorreOperational Risk Consultant, Wells FargoEd is an Operational Risk Consultant working within the Technology Information Security group. He has been with Toastmasters International (TMI) since 1997 and has multiple certifications from TMI. Ed is a resourceful, creative, and solution-oriented person who was frequently able to come up with new and innovative approaches to his assigned ...
Devon CampbellDigital Forensic Examiner, TransPerfect Legal SolutionsDevon Campbell is a Digital Forensic Examiner at TransPerfect Legal Solutions in the Forensic Technology and Consulting division. Devon has experience conducting forensic examinations of mobile devices, computers, social media data, cloud-based data, and email data. Prior to joining TransPerfect Legal Solutions, Devon earned her Master's degr...
Christina GriffinIT Security and Risk Manager, Chatham FinancialCybersecurity professional specializing in risk management and information security. She holds an MBA, a master’s in information technology leadership, and also has a CISSP certification. She has professional experience working in both higher education and finance industries and is currently employed as an IT Risk and Security Manager at Chat...
Tedrick HoushPartner, Lathrop GPM LLPTedrick Housh (CIPP/US, CIPP/E) leads the Global Privacy, Cybersecurity & Data Protection practice at Lathrop GPM. He advises companies on data – its collection, storage, protection, use, transfer and disclosure. He assists clients with data security incident response. He drafts Information Security Policies, Incident Response Plans, and the ...
Steve HengeliAttorney at Law, PolsinelliWith a background in computer programming, Steve Hengeli takes a problem-solving approach to privacy, data security, and technology transactions. Steve works with clients in a variety of highly-regulated and innovative industries to develop strategies to address U.S. and international regulations relating to privacy and information technolog...
Nan L. GrubeConsulting Attorney, PBL ConsultingOwner of consulting firm PBL, Nan Grube partners with businesses of all sizes to solve privacy, business, and litigation challenges with a view of larger picture and attention to detail. She has the compassion and capacity to help her clients during some of the most stressful business events they will encounter by explaining in understandabl...
Scott LalibertePresident, ISSA Delaware Valley ChapterScott Laliberte, President of ISSA Delaware Valley Chapter for over 10 years, has grown the chapter significantly by creating a collaborative community for Cyber Security professionals to share their knowledge and experience and satisfy their CPE needs. Scott also leads Protiviti’s Emerging Technology practice where he enables clients to leve...
Jason PatelChief Technology Officer, EnsightenAs Chief Technology Officer Jason leads the Product and Engineering teams at Ensighten. Being part of Ensighten’s development team over six years ago when the Tag Management Platform was first designed gives him a unique perspective and experience on all our solutions; he has hence been influential in designing and implementing the majority o...
Sunny NotaniSpecial Agent, United States Secret ServiceSunny Notani has worked as a Special Agent for the United States Secret Service for 18 years. SA Notani was initially assigned to the New York Field Office (NYFO) for eight years. During his time in the NYFO, SA Notani specialized in Financial Institution Fraud, Electronic Crimes, Network Intrusions, and Social Engineering. SA Notani was assi...
Steve MagowanDirector, Data Protection and Resiliency, Royal Bank of CanadaSteve Magowan is Director of Data Protection with the Royal Bank of Canada. A Veteran of the Canadian Airforce, since retiring Steve has spent the past 20 years engaged in a wide assortment of Risk Focused, Data Protection, Security Architecture & Enterprise Risk Management initiatives.
Including the remediation of active security...
MJ CouldridgeDirector, Business Development, Canadian Cyber Threat ExchangeMJ Couldridge is the Director of Business Development for the Canadian Cyber Threat Exchange. The CCTX is Canada’s threat sharing hub for all companies doing business in Canada. It provides analysis and enables collaboration of cyber security insights impacting Canada. Providing both a cross-industry and by-industry context, it serves small, ...
Sabrina StanichCybersecurity Manager, DarktraceSabrina Stanich is a Cyber Security Manager at Darktrace, the world’s leading machine learning company for cyber defense. She has worked extensively with clients across numerous industry verticals, from financial services to manufacturing, helping them deploy Darktrace’s Enterprise Immune System, the only AI technology capable of detecting an...
Will MishraCybersecurity Manager, DarktraceWill Mishra is a Cyber Security Manager at Darktrace, the world’s leading machine learning company for cyber defense. He has worked extensively with clients across numerous industry verticals, from financial services to healthcare, helping them deploy Darktrace’s Enterprise Immune System, the only AI technology capable of detecting and autono...
Taylor LehmannCISO, athenahealthTaylor Lehmann is the VP and Chief Information Security Officer at athenahealth, a healthcare information technology organization with headquarters in Watertown, MA and operations around the world. Taylor has been in information security and risk management for over 15 years. He was most recently the CISO at Wellforce, an eastern MA-based, Tu...
Myles KellermanChief Cybersecurity Analyst, Alpine SecurityMyles Kellerman is the Chief Cybersecurity Analyst at Alpine Security. He has over 15 years of IT/Cyber experience in the commercial and DoD sectors. Myles’ extensive background in cybersecurity includes a degree in Information System Security and multiple certifications including CISSP, CEH, CPT, CHFI, and CFR. Myles leads and performs many ...
Lauren ProvostProfessor, Computer Science, Western Governors UniversityDr. Lauren E. Provost is an ethical hacker, author and professor. She directs The Ethical Hackers Cybersecurity organization, a virtual community for educators and industry providing comprehensive planning and risk management updates, network and cloud security knowledge and information on other cybersecurity topics such as general penetratio...
Sam RastogiProduct Marketing Director, IllumioSam Rastogi is a veteran of the security industry with 18+ years experience marketing leading security products at Illumio, Palo Alto Networks, Cisco Systems, HP Enterprise, McAfee, Juniper Networks, and Oracle. Sam is a Product Marketing Director at Illumio, where he is responsible for leading go-to-market and marketing activities for zero t...
Leland DeanVP, Global Corporate Security, Bank of New York MellonLeland is the Vice President of Global Corporate Security for Bank of New York Mellon. He is responsible for physical protection and investigations of the southwest part of the United States, Mexico, Chile, Argentina, and Brazil (LaTAM).
Leland graduated with a Bachelor’s of Science degree from Sam Houston State University in Criminal ...
Torry CrassAgency CISO, N.C. State Board of ElectionsTorry Crass currently serves as the Agency CISO at the North Carolina State Board of Elections and member of the CISO team at Woodstar Labs, a division of Associated Universities, Inc.
Torry has more than 20 years of experience in the IT field and over 10 years of cybersecurity experience. Prior to joining Woodstar Labs, Torry was a CI...
Brian NeesbyCIO, N.C. State Board of ElectionsBrian Neesby is the CIO of the State Board of Elections. Prior to this role, he was the Chief Data Officer. Brian has served as a fact witness, been deposed several times, and executed declarations on behalf of the State Board concerning his knowledge of North Carolina’s Statewide Voter Registration Database. He investigated data discrepanc...
Michael DickersonDirector, Mecklenburg County Board of ElectionsMichael Dickerson is currently the Director of Elections for Mecklenburg County and has held this position since 1998.
Prior to coming to Charlotte, Mr. Dickerson was with the Federal Election Commission as a Deputy Assistant Staff Director. Mr. Dickerson spent 14 years at the Federal Election Commission.Currently he is a membe...
Karen Brinson BellExecutive Director, N.C. State Board of ElectionsKaren Brinson Bell was appointed executive director of the State Board of Elections on May 13, 2019, and began her tenure on June 1. As the state’s chief elections official, she leads about 70 full-time employees at the state agency, which is charged with administering elections and overseeing the 100 county boards of elections, as well as ca...
Patrick GannonPublic Information Officer, N.C. State Board of ElectionsPatrick Gannon has been the public information officer at the State Board of Elections since October 2016, just before the presidential election. He came to the State Board after a 17-year career in journalism, most recently as editor of The Insider State Government News Service and syndicated columnist covering state politics for the Capitol...
Boris VishnevskyBoard Member and Technology Strategist, Cloud Security Alliance - Delaware Valley (CSA-DV)Boris Vishnevsky, MBA, CISSP, DIA is a board member and advisor of the Cloud Security Alliance- Delaware Valley Chapter, Distinguished IT Architect of the Open Group and is a frequent speaker and presenter, taking part in review panels and advising innovative Cyber Security Companies. Mr. Vishnevsky is a solutions principal advising companie...
Marc TabagoSolutions Engineer, Trend MicroAs a Solutions Engineer, Marc Tabago works with enterprises to solidify and strengthen their digital security policies against malicious threat actors. However, he believes that having a concrete digital security posture starts at the use case level, driven and experienced by its users and not simply read off a PowerPoint slide. Once the dust...
Justin BourgeoisSales Engineer, MimecastJustin Bourgeois is a Solution Engineer at Mimecast. He has a background in implementation project management, IT consulting and has spent his off time programming as a hobby. Justin’s main responsibility is educating people about the ever-evolving threat landscape that not only threatens their infrastructure but also their partners and the g...
Joe ZurbaCISO, Harvard Medical SchoolIn his role as the leader of Information Security at Harvard Medical School, Joe Zurba has been responsible for defining and building capabilities to meet the requirements of an extraordinarily diverse community of clinical and research faculty, students, and staff. Joe develops strategy, improves capabilities, and manages risk for all inform...
Michael AnayaSupervisory Special Agent, Cyber, FBI (Prior)Michael is the Head of Cyber Risk at Expanse (one of Forbes' 25 fastest-growing venture-backed startups likely to reach a $1 billion valuation). He leads a large team of analysts who identify vulnerabilities in large Fortune 500 companies' and government agencies’ vast online presence. He also has 14 years of FBI experience as a Special Agent...
Tony HowlettCISO, SecureLinkTony Howlett is a published author and speaker on various security, compliance, and technology topics. He serves as President of (ISC)2 Austin Chapter and is an Advisory Board Member of GIAC/SANS. He is a certified AWS Solutions Architect and holds the CISSP and GNSA certifications, and a B.B.A in Management Information Systems. Tony is curre...
Ian WoolleyChief Revenue Officer, EnsightenIan’s impressive background and management expertise in digital marketing and advertising are fueling his success in driving adoption of Ensighten’s solutions worldwide. Ian started his career at Dun & Bradstreet Europe before working at Interpublic Group’s Draft Digital as Managing Director. After building his own premium publisher business,...
Samara WilliamsThreat Intel Engineer, Cardinal HealthSamara works for Cardinal Health, as a Threat Intelligence Engineer. As an engineer, Samara collects and assesses a wide range of threats to the healthcare industry. She specializes in MITRE ATT&CK, threat actor reporting, strategic program design/implementation, and fostering relationships within the organization. Samara is passionate about ...
Melisa OzcanCybersecurity Account Executive, DarktraceMelisa Ozcan is a Cyber Security Account Executive at Darktrace, the world’s leading AI company for cyber defense. At Darktrace, Melisa works with leading organizations in a range of industries from private equity to media and entertainment to deploy and operationalize cutting edge technologies. During Melisa’s tenure at Darktrace, the compan...
Kelley MisataCEO, Sightline SecurityDr. Kelley Misata, CEO of Sightline Security, President and Executive Director of OISF (Suricata), and former Director of Communication of The Tor Project - a cyber and information security executive with 15+ years of experience in cyber and information security, marketing, and communications. Expert in bridging the gap between technical and ...
Sergeant Michael DavisCyber Investigator at the Houston Police Department, Criminal Intelligence Division and Fusion Center UnitSgt. Davis is assigned to the Houston Police Department Criminal Intelligence Division – Fusion Center Unit a total of 10 ½ years both as an officer and supervisor. He has worked Financial Crimes, Human Trafficking, Counter-Terror, Violent Crimes, and Cyber cases. He is currently the Cyber/Analysis and Open Source Unit supervisor for the Ho...
Michael ButterfieldRegional Architect - Mid-Atlantic, Check Point Software TechnologiesMichael Butterfield is Security Architect at Check Point, where he supports 30+ engineering teams responsible for hundreds of customers across the Mid-Atlantic. He is primarily focused on helping enterprises design, consolidate, and integrate security controls into emerging technology platforms. Over an 18-year career in cybersecurity, Michae...
Andrew HooverSr. Member, Technical Staff, CERT Division, Software Engineering Institute - Carnegie Mellon UniversityAndrew Hoover is a Senior Engineer with the CERT Division of Carnegie Mellon University’s Software Engineering Institute. As a member of the Cybersecurity Assurance Team, he performs risk and resilience management work for a variety of organizations, mostly relating to critical infrastructure protection. Andrew has 16 years of experience in i...
Katie StewartSr. Member, Technical Staff, CERT Division, Software Engineering Institute - Carnegie Mellon UniversityKatie Stewart is a senior member of the technical staff within the CERT® Division at the Software Engineering Institute (SEI), a unit of Carnegie Mellon University in Pittsburgh, PA. She has more than 15 years of experience advising clients in engineering, information technology, and telecommunications industries. Katie’s current research int...
Juan MarinSales Engineer Manager, IntSightsA cybersecurity professional and avid technologist advocate with 10 years of experience in effective cyber-security practices, advanced threat prevention, malware and incident response; Juan has worked with the likes of McAfee/Intel Security and Trend Micro in the past, fulfilling technical sales, advisory and customer success roles, and toda...
John AmaralHead of Product, Cloud Security, CiscoJohn Amaral is the Head of Product for Cisco Cloud Security. In this role, he is responsible for product management, planning and strategy for Cisco's leading cloud security offerings including Cisco Umbrella and Cisco Cloudlock. John joined Cisco through the acquisition of Cloudlock, where he was Head of Product; responsible for product deve...
Stacy HarperPartner, Spencer Fane LLPStacy Harper is a Partner with Spencer Fane LLP where she counsels organizations on regulatory compliance, health care reimbursment, and cybersecurity strategies. Stacy co-chairs the firm's data privacy and cybersecurity practice. as a former health care compliance officer, Stacy regularly works with clients to assess data-related risks, and ...
Rick DotenCISO, Carolina Complete Health; VP, Information Security, Centene Corp.Rick is CISO of Carolina Complete Health, a state healthcare plan, for Centene Corporate. Rick has run ethical hacking, application security, incident response & forensics, and risk management teams throughout his 25 years in IT Security. Rick has been the first CISO for two companies. He has also consulted as a virtual CISO for many industri...
Dr. Atefeh (Atty) MashatanFounder & Director, Cybersecurity Research Lab, Ryerson UniversityDr. Atefeh (Atty) Mashatan is the Founder and Director of the Cybersecurity Research Lab at Ryerson University. SC Magazine recognized her as one of top five Women of Influence in Security globally in 2019. She joined the School of Information Technology Management of Ryerson University in 2016 focusing on Information Systems Security, Crypto...
Rob DalzellBISO, Bank of AmericaRob Dalzell is a cybersecurity professional with over 30 years of Information Technology and Cybersecurity experience. He has thrived in the following cybersecurity based arenas: BISO, Third Party Defense, Vulnerability Management, Identity and Access management, Responsible Vulnerability Disclosure, email encryption and general security awar...
Tammy KlotzCISO, CovantaPrior to Covanta, Tammy was responsible for the cybersecurity program at Versum Materials, which included Information Risk Management, Plant Cybersecurity, as well as IT Security, Risk & Compliance activities. She was with Versum since their start-up in October 2016 and was responsible for standing up all security services required for the ne...
Pete MurphyIT Advisory Executive, CareSourcePete Murphy is a well-established leader, builder and collaborator with high standards for personal integrity and a bias for action. He has demonstrated senior level leadership experience building, growing, improving and operating business systems and processes as a CIO, CTO, CISO, Risk Leader and Data and Analytics executive.
He speci...Joshua CloudDirector of Information Security, NFIJoshua Cloud is currently serving as the director of information security for NFI. He has over 20 years of infrastructure and security leadership experience spanning professional services, manufacturing, retail, and logistics industries in countries all over the world. Cloud is a transformational security leader with a business focus who evan...
Paul IhmeCo-Founder & President of Consulting Services, SoteriaPaul is an accomplished Security Professional with 14 years of experience in multiple information technology domains, specializing in computer network exploitation, computer network defense and security incident response. His expertise includes planning, coordinating and performing offensive computer operations.
Paul leads the firm’s ma...Douglas JamborSr. Cybersecurity Manager - IT Advisory, Dixon Hughes Goodman LLPDouglas has 13 years of penetration testing experience in the information technology field, focusing on information systems security and information security risk management. He is DHG’s cybersecurity subject leader and manager over all of the firm’s technical cybersecurity services, which includes internal, external, wireless and web applica...
Trend MicroKevin DreyerIT Director & CISO, Maple Reinders GroupKevin Dreyer is an IT Director and CISO with over 25 years of industry experience for a General Contractor securing a national network and its 400 users across a hybrid cloud infrastructure. He fell in love with computers at age 12 when a cousin introduced him to programming, and has never looked back. Having dropped out of college due to the...
Jana WhiteCOO, Alpine SecurityJana White is the Chief Operating Officer of Alpine Security. Jana has an extensive background in banking, compliance, and loss prevention and serves as one of the virtual CISOs for Alpine Security clients. Jana has degrees in criminal justice and cybersecurity and is certified as a crime scene evidence technician. She also holds many cyber...
Olivera ZatezaloChief Security Officer, Huawei CanadaOlivera Zatezalo is the Chief Security Officer at Huawei Canada, and her responsibility is to ensure Huawei Canada’s operations is compliant with Canadian cyber security laws and regulations. With over 20 years of experience in the telecommunication industry, Olivera is best known for creating value through collaborative leadership style, agi...
Kenrick BagnallDetective Constable, Coordinated Cyber Centre (C3), Toronto Police Service, Former VP of IT at Capital G BankKenrick has been a member of the Toronto Police Service since April of 2006 and currently serves as an investigator in the Coordinated Cyber Centre (C3) section of Intelligence Services. Before this Kenrick spent 20 years in the Information Technology industry primarily in the financial services sector, holding positions of Senior Network Ana...
Tamika PuckettRisk Manager, Corporate Security, ZoomAs the City of Chicago’s Chief Risk Officer, Ms. Puckett was responsible for implementing and managing the city’s enterprise risk management governance framework, including the implementation of policies and procedures to identify and manage organizational risks. A career risk manager, Ms. Puckett possesses over 15 years of experience managin...
Tanya Tipper-LusterIT Audit/Advisory Professional, Wyndham DestinationsTanya Tipper-Luster has spoken at cyber conferences such as the (ISC)2 Security Congress and was featured as a cybersecurity expert in the Orlando Business Journal. She is a Cybersecurity Audit thought leader and visionary. She represents the alignment of emerging technology, critical business processes and key cybersecurity controls to infl...
Robert RybaSr. IT Audit / Advisory, Wyndham DestinationsRobert Ryba has spoken at cyber conferences such as the (ISC)2 Security Congress. He is a Certified Public Accountant and Certified Information Systems Auditor with an Internal Audit and Cybersecurity background. As a millennial who is deeply passionate about information technology, he is motivated to learn why millennials are so indifferent...
Ethan StrayerSr. IT Advisory Analyst, Wyndham DestinationsEthan Strayer has spoken at cyber conferences such as the (ISC)2 Security Congress. Ethan is a Certified Information Systems Auditor, Cybersecurity and Information Technology (IT) Governance Risk and Compliance professional. He supports the Company's risk tolerance while also improving the IT posture of the organization. Ethan specializes in...
Chris TurleyLeader, RISC Education & Awareness, FISI lead the Risk, Information Security, and Compliance Education & Awareness team for FIS, a financial services leader focused on payments, banking, and investments. My team is responsible for providing education & awareness for our 55,000+ colleagues located in offices across the globe. My career was focused in security and audit space previo...
Brian ColemanAssociate CIO, Information Security Officer , University of Massachusetts Medical SchoolBrian is a seasoned leader, Chief Information Security Officer, and IT executive. His experience spans Insurance, Financial Services, Health Care, and Cloud Security. His specialty is optimizing Information Security and Risk Management / Compliance organizations, his passion is employee mentorship, continuous improvement and process developme...
Donna RossSVP & CISO, Radian GroupDonna L. Ross was appointed to her current position as Senior Vice President, Chief Information Security Officer in July 2016. In this role she is responsible for Radian’s information security program and business compliance, as well as the enterprise project management and initiative governance programs.
Donna is a senior security and...
Moderator: Nancy HunterVP & CISO, Federal Reserve Bank of PhiladelphiaNancy Hunter is the VP, CISO and Data Privacy Security Officer at the Federal Reserve Bank of Philadelphia. With more than 25 years of experience in technology including 15 years in Information Security, Nancy joined the Federal Reserve Bank in 2017 where is accountable for Information Security Operations and Consulting, Information Risk Mana...
Mark Eggleston, CISSP, GSEC, CHPSCISO, CSCMark Eggleston is the chief information security officer (CISO) for CSC, responsible for the global security and privacy program design, operations and continual maturation. As a senior executive specializing in security and privacy program development and management, Mark’s unique background and expertise in information technology, program, ...
Joshua SorensonSr. Director, Global Security, EquifaxJoshua is a Global Information Security Leader with 14 years of professional experience. Joshua currently serves as Equifax's Senior Director of Global Mainframe Security where he has responsibility for transforming zSeries platform security around the world. Prior to joining Equifax, Joshua served in security leadership roles, leading transf...
Ted DemopoulosPrincipal, Demopoulos AssociatesTed Demopoulos’ professional background includes over 35 years of experience in Information Security and Business, including over 30 years as an independent consultant. Ted helped start a successful information security company, was the CTO at a "textbook failure" of a software startup, and has advised several other startups. He is a frequent...
Joel LoweDirector of Physical and Cyber Security, Red VenturesJoel Lowe has more than 14 years of experience in remediating threats, vulnerability management, risk management, data privacy, and information security programs. These programs focus on overseeing private data protection, corporate governance, risk management strategy, Certification & Accreditation, Incident Response, forensics and executive...
Canadian Cyber Threat Exchange (CCTX)The Canadian Cyber Threat Exchange (CCTX) is a sharing hub and collaboration organization that provides insight into cyber events directly impacting Canadian business, along with mitigation options and tools to combat identified threats. Learn about the CCTX and enjoy a special, CCTX-hosted guest presentation. Details available soon.
Ken E. SiglerBoard of Advisors, University of Detroit Mercy, Center for Cybersecurity and Intelligence StudiesKen Sigler has served as a full-time faculty member of the Computer Information Systems program at the Auburn Hills Michigan campus of Oakland Community College since 2001, while his primary research is in the area of cybersecurity education, policy, and management; software management; and software assurance. Ken serves as the Liaison for th...
Daniel GoldenbergDirector, IT Infrastructure, Barton AssociatesDan is a business results-focused information technology leader with a background in information security, infrastructure, and technical operations; experiences range from fledgling start-ups to enterprise corporate environments.
Tammy MoskitesPonemon Institute Distinguished Fellow, Career CISO & Former CISO, Time Warner Cable; CEO & Founder, CyAllianceTammy is the CEO and Founder of CyAlliance. She is a strategic advisor to companies, vendors and startups by leading, building and scaling security offerings while providing CISO as a Service and virtual CISO (vCISO) services for companies worldwide. With her 30 years of experience, she is noted by her peers to be a results-driven and passion...
Adam KarcherCyber Special Agent, FBISpecial Agent Adam Karcher has been with the FBI for over 16 years running cyber investigations and operations across the full spectrum of criminal and national security programs. SA Karcher's experience spans local field investigations to national and international strategic engagement against the most sophisticated cyber threats. His curren...
Matt DonatoCo-Founder & Managing Partner, HuntSourceMatt Donato is a Co-Founder & Managing Partner of HuntSource- the preeminent Executive Search and Talent Solutions firm with a niche focus in Cyber Security & Data Intelligence. Matt possesses fifteen years of experience in executive recruiting, talent solutions, workforce planning, and talent management. He is a thought leader and recruiting...
Helen OakleyLeader in CybersecurityHelen Oakley is a cybersecurity enthusiast, researcher and educator. Helen is a well-known expert in Toronto’s cybersecurity community, and a regular speaker at Elevate, SecTor, and corporate cybersecurity and technology events; she is currently on the advisory board for SiberX’s “Canadian Women in Cybersecurity” conference. Helen holds a lea...
(ISC)2 Local ChapterThe International Information System Security Certification Consortium, or (ISC)², is a non-profit organization which specializes in training and certifications for cybersecurity professionals. It has been described as the "world's largest IT security organization."
Joe ProvostInformation Security, Avidia BankJoe's been in cyber since the internet was a piece of string tied between two soup cans! He's a former Army warrant officer (network warfare), MIT Lincoln Laboratory IAM, IBM (XForce Cyber Range) “The Cave” member, teaches professional ED at MIT with the Geospatial Cyber Security group, and has a Masters in Cyber from Utica College. His forme...
Michael MeyerChief Risk and Innovation Officer, MRS BPO, LLCMichael Meyer, MPSTM, CISSP, CIPP/US, CIPM, FIP, CISM, CRVPM II, CRISC, CISA, is the Chief Risk and Innovation Officer of MRS BPO. He is responsible for overseeing the company’s enterprise innovation, risk management and security initiatives for its Fortune clients. Michael has been with MRS for over 20 years and previously served in the Chie...
Don McKeownInformation Security Manager, Wolters Kluwer HealthDon McKeown is currently an information security manager for a provider of healthcare solutions that facilitate effective clinical decisions. There he developed and teaches a threat modeling course, teaches code scanning, contributes to corporate application security advisory committees, and consults for technical and product teams. Previousl...
Doug GrahamChief Security and Privacy Officer, LionbridgeDoug is the Chief Security and Privacy Officer at Lionbridge Technologies, a global leader in localization and data training. He has over 20 years of global experience in the enterprise security space and brings a balance of leadership, customer focus, and technical expertise to the table. He previously served as CSO of Nuance Communications ...
Gabriel DoncelDirector, Information Security, Drexel UniversityGabriel Doncel joined Drexel University in 2019 where is currently Director of Information Security. He is also part of the University of Delaware and Wilmington University Adjunct Faculty. As a member of the Information Security team at Drexel, and working closely with the campus community and outside parties, his focus is to protect the peo...
Margarita RiveraVP, Information Security, Risk & Compliance, LMC (a Lennar Company)An Information Security Executive with over 15 years of experience, Margarita Rivera has thrived her entire career on solving complex problems. Margarita has dedicated her professional journey to building Information Security Risk, Compliance and Privacy Programs and continues to do so as the Head of Information Security at LMC, a Lennar Corp...
Brendan CampbellAVP, Global Technology Governance & Control, ManulifeBrendan Campbell is currently the leader for Manulife’s Global Technology Governance & Control function and has prior experience across audit, risk management, information security. He is a part of the Global Technology Executive team and is responsible for leading the execution of risk activities globally. In addition, he is responsible for ...
Mike Ste MarieElection Security Partnership Program Manager, Office of the Secretary, Commonwealth of MassachusettsMike has over 17 years of experience in the Information Security field, working in multiple industries around the Boston area. He has helped build and improve information security programs, deploy and manage awareness training to over 1,000 staff members, as well audit networks against the CIS Controls. He holds the CISSP certification, has a...
Adel DaneshCISO, Analytics 4 LifeAdel Danesh has over 20 years of experience in IT and information security. Over the course of his professional career, he has been holding information security leadership roles in various organizations and spearheaded mission critical security and infrastructure projects. In his current job, Adel is a CISO at Analytics For Life, a medical re...
Dominique WestSr. Cloud Security Consultant, EY, Instructor, Georgia Institute of TechnologyDominique West is a senior consultant for Ernst & Young based in Atlanta, GA. She has eight years of experience in Information Technology, five of which are in cybersecurity with her experience spanning over risk assessments, vulnerability assessments, incident and response, and cloud transformation & security across the commercial industries...
Daniel PepperPartner, BakerHostetlerDan Pepper is a partner on BakerHostetler's Privacy and Data Protection team. Utilizing 25 years of comprehensive experience in information technology, data privacy, and cybersecurity law, Dan advises clients on proactive data security practices, data breach incident response, and regulatory compliance. He frequently handles security incident...
Michael EffiongHead of Cybersecurity, Tango NetworksMichael Effiong is Head of Cybersecurity at Tango Networks, where he is in charge of the Cybersecurity department, developing policies, security awareness training, network architecture, vulnerability analysis, and governance and compliance. He reports to the COO/CISO. Michael holds a masters degree in cybersecurity from University of Dallas,...
Arif HameedSr. Director, Client Security, Equifax CanadaArif Hameed is Senior Director at Equifax, where he leads a team that handles client cybersecurity due diligence activities including questionnaires, audits, remediation support, security schedules, etc. Prior to his role at Equifax, he worked at two of the largest banks in Canada in Security Advisory, IT Risk, Third Party Cyber Risk, and IT ...
Imran AhmadPartner/ Attorney, Blake, Cassels & Graydon LLPImran has a business law practice with a specialization in technology, cybersecurity, and privacy law. As part of his cybersecurity practice, Imran works closely with clients to develop and implement practical strategies related to cyber threats and data breaches. He advises on legal risk assessments, compliance, due diligence and risk alloca...
J. Zhanna Malekos SmithReuben Everett Cyber Scholar and Researcher, Duke University Center on Law & TechnologyJ. Zhanna Malekos Smith, J.D., served as a captain in the U.S. Air Force Judge Advocate General’s Corps and is a delegate in Stanford University’s U.S.-Russia Forum. She received a B.A. from Wellesley College, an M.A. and A.K.C. from King’s College London, Department of War Studies, and J.D. from the University of California, Davis School of ...
Larry SnyderAssociate Professor, Bloomsburg University of PennsylvaniaProfessor Larry Snyder has nearly two decades of experience in law enforcement, fraud, and auditing in the US Army and a variety of industries, and 15 years in the field of cybersecurity education. Larry believes that cybersecurity strategists must have a broad understanding of the cyber issues facing organizations, as well as the skills need...
Ryan HausknechtInstructor, University of North Carolina at CharlotteRyan Hausknecht specializes in red teaming as a Security Consultant at SpecterOps and is an instructor for cybersecurity at UNC Charlotte. He is a former Forensic Consultant, Information Security Analyst, and Penetration Tester who has dealt with clients ranging from local government to enterprise-sized businesses. Ryan graduated Summa Cum La...
Stephen PurpuraFounder, [Stealth Mode]Stephen Purpura is an American entrepreneur and an applied machine learning researcher. He has co-founded four companies that focus on evolving the future of work, including Context Relevant (renamed Versive and acquired by eSentire) and SkyEye LLC (also acquired). He holds degrees from Harvard University’s Kennedy School of Government and th...
Karen HolmesVP and CISO, TrueBlue Inc.Karen Holmes is the Vice President and CISO at global staffing company TrueBlue, where she is responsible for Cybersecurity, Technology Governance, Risk and Compliance, Networking, and Telecommunications. On a mission to drive automation and orchestration, she is focused on improving overall seamless and secure user experiences while creating...
Tom BechtoldDigital Event Director, SecureWorldTom has been part of the SecureWorld team for over 14 years. He has launched several of the regional conferences we hold today. Tom is currently responsible for SecureWorld Digital, which provides educational content to the SecureWorld audience. He produces, executes, and moderates the majority of the Remote Sessions webcasts while also worki...
Garrett WhitneyCIO, Delta Dental of WashingtonGarrett Whitney is the Chief Information Officer at Delta Dental of Washington, the largest dental benefits provider in Washington State. He developed a passion for technology at an early age by learning to program Pascal, C, and 8086 Assembly languages prior to graduating high school. Garrett is a veteran of the United States Navy, specializ...
Kat JungckPrincipal Enterprise Security Architect, F5 NetworksKat is an experienced cybersecurity practitioner with a background in both enterprise cybersecurity and secure product development with deep domain experience in cloud security, identity and access management, and secure product development. Kat enjoys working with local cybersecurity chapters and programs to recruit and develop the next gen...
Brian SheaDirector of Security - GRC, MicrosoftBrian is an IT Executive with 25 years of experience from IT Operations and Support, Security, through Compliance, Risk Management, and Technology Innovation. As part of his tenure at Microsoft he has been supporting Supply Chain security and compliance for the last 7 years including hardware supply chain, software supply chain, and vendor /...
Sean VenturaCISO, AtmoseraSean has over 30 years of experience in the Information Technology field, with a focus on information security best practices and compliance. He currently serves as the Chief Information Security Officer at Atmosera, implementing and maintaining the company’s security posture, while providing security and compliance expert advisory to Atmoser...
Mukesh DixitCTO, Washington State Department of Labor and IndustriesChief Technology Officer at Washington State Department of Labor and Industries. Expert level grasp on IT Security governance and management of security in application, infrastructure and cloud domains. Spearheaded teams to do FedRAMP assessments of major cloud service provider giants in the industry. Certifications include CISSP, CCSP, CISA,...
Austin McBrideThreat Data Scientist, Cisco UmbrellaAustin McBride is a Threat Data Scientist at Cisco Umbrella who identifies unclassified threat vectors, discovers emerging trends in malware distribution, and analyzes and evaluates the impact of security threats on customers. His current research focuses on the significance of cryptocurrency in the ever-evolving threat landscape, which abets...
Burak SerdarCo-Founder, ConsentGridBurak is one of the co-founders and the technical lead at Cloud Privacy Labs. He has more than 25 years of experience as a software engineer and recently left his position at Red Hat as Principal Software Applications Engineer. His work includes large scale back-end applications for distributed environments and open-source tools for enterpris...
Jaymin DesaiThird-Party Risk Offering Manager, OneTrustJaymin Desai is a Certified Information Privacy Professional (CIPP/E , CIPM) and the Third Party Risk Offering Manager at OneTrust—the #1 most widely used privacy, security, and third-party risk technology platform. In this role, Desai oversees a global professional services team of privacy certified consultants focused on formulating efficie...
Clint SowadaDirector of Product Security, CollibraAs the Director of Product Security at Collibra, Clint Sowada is responsible for delivering secure applications and protecting customer’s data. He has been in the security industry for nearly a decade and has proven track record in building secure SDLC programs at companies that range from endpoint protection to large scale cloud service prov...
Ashish PopliDirector of Product Security, Privacy & Compliance, UiPathAshish thrives on pragmatism, innovation and building teams that deliver a promise. He started his career over 20 years ago, as a computer scientist in upstate NY, and since then has been learning the 'art of impossible', by wearing multiple hats, including writing code, conducting pen tests, finding and fixing security bugs, building and shi...
Dr. Ben EdwardsSr. Data Scientist, Cyentia InsituteDr. Benjamin Edwards joined Cyentia at the beginning of 2019 as hire #1. He was formerly with IBM Research, where he worked in applying advanced machine learning techniques to solve real world security problems and shaped the next generation of analytical security models. Before that he received his Ph.D. from the University of New Mexico wit...
Jeff RaymondSales Engineer, AvananJeff Raymond is a Seattle, WA based Cloud Security Engineer at Avanan. While working for companies ranging from security giants to start-ups, he has found his passion in protecting organizations from phishing attacks and securing their cloud applications. Outside of work, he can either be found snowboarding or wakesurfing (depending on the se...
Justin SchluesslerData Protection Officer, Compassion InternationalJustin Schluessler has served with Compassion International, a global child development non-profit, for 21 years. Starting in IT and then transitioning to Risk Management, Justin was the organization’s very first information security employee—building a comprehensive security and compliance program from the ground up. In his current role as ...
Jerry VergerontAttorney, Vergeront Law, PLLCJerry Vergeront is the founder and attorney at Vergeront Law, PLLC. With over 25 years in Information Security before becoming an attorney, he brings an industry understanding to data security, privacy, and compliance law.
Tim DanksVP, Risk Management & Partner Relations, Huawei Technologies (USA)As VP Risk Management & Partner Relations Mr. Danks is responsible for understanding and managing business risks in the context of cybersecurity and privacy across Huawei USA businesses and toward external stakeholders. Further, he is responsible for developing and enhancing partner relationships towards key external stakeholders across acade...
Bruce PotterCISO, ExpelBruce Potter is the CISO at Expel. Previously, Bruce co-founded Ponte Technologies, a cybersecurity research and engineering company. He also served as the senior technical advisor to the members of President Obama’s Commission on Enhancing National Cyber Security, and co-founded the Shmoo Group in 1996.
Anand SinghCISO, Alkami TechnologyDr. Anand Singh is an information security executive with a history of bridging the gap between IT and business. He has led significant enterprise transformations on behalf of Fortune 20 companies. He has also driven success of several early stage companies and has shaped Information Security industry in his illustrious career. He is currentl...
Drew SimonisVP & Deputy CISO, Hewlett Packard EnterpriseDrew Simonis is a Vice President and serves as the Deputy CISO at Hewlett Packard Enterprise (HPE). He has worked in some of the largest and most complex environments in the public sector and the private sector with firms such as IBM, AT&T, EDS and Symantec. Prior to joining HPE, Drew spent 8 years as the CISO for Willis Group Holdings (now W...
Robert WaldenChief Information Officer, EpsilonRobert Walden is the Chief Information Officer at Epsilon where he is responsible for cybersecurity, data center and public cloud infrastructure services, and network services. Additionally, Robert is responsible for providing all IT workplace services for a global user base. Robert has been delivering business value through technology for ov...
Tianne StrombeckSr. Principal, Security Risk Management, VerizonTia Strombeck, MBA, CISSP, currently manages a risk management team focused on governance and cross-organizational programs. Tia has 20+ years experience in information security. She has focused on building cross-organizational relationships to help other business teams understand the importance and value of security initiatives. She has work...
Michael BlahaSr. Director, Cloud Operations, NucleusHealthMichael Blaha is currently Sr. Director of Cloud Operations and Security at NucleusHealth. Throughout his career, Michael has made a focus of integrating security and cloud native principles into his delivery and operations teams in both the healthcare payer and healthcare Software-as-a-Service space.
Ian SchnellerSVP Global Information Security, Financial InstitutionA 20+ year information security veteran, Ian has served in many leadership positions to include CIO/CISO. Ian also led a multi-billion dollar mission charged with developing and operating advanced cyber capabilities for the Undersecretary of Defense (Intelligence), the DoD Chief Information Officer, and the Secretary of the Air Force. In this...
Craig SwinteckIS Manager, Town of Castle RockCraig Swinteck has a comprehensive background in IT operations and cybersecurity, with a career spanning across entrepreneurship, small businesses to global corporations, serving the public in local and federal government, and providing cybersecurity guidance in challenging industries such as Finance, Healthcare, and Manufacturing. Craig’s pa...
Joe DietzNetwork Security Architect, CenturyLinkA technology focused senior level IT security professional with an excellent balance of business experience and knowledge of systems/network security. Always conducting oneself with integrity and ethical behavior following the motto of “Always do the right thing.”
Diana HennelCTO, Catalyst Corporation Federal Credit UnionDiana Hennel is currently the Chief Technology Officer for Catalyst Corporate Federal Credit Union. In her role, Diana is responsible for the long-term strategic direction and implementation of technology strategy, security, and processes. She oversees the corporate’s network operations, technology development and information systems securit...
Joshua CarlsonData Privacy and Technology Law Attorney, The Carlson FirmJoshua Carlson is a privacy lawyer but also is a technologist and understands sytem engineering, he has for a long time held his CISSP, CIPP, CIPP/G, CIPP/E and provides guidance and advisory to organizations around the world.
Jay JacobsChief Data Scientist & Co-Founder, Cyentia InstituteJay is a Co-founder and Chief Data Scientist at Cyentia Institute, a research firm dedicated to advancing the state of information security knowledge and practice through data-driven research. Prior to Cyentia, Jay served as the Lead Data Analyst on the Verizon Data Breach Investigations Report and is the co-founder of the Society for Informa...
Christopher CalarcoSpecial Agent / Private Sector Coordinator, FBI DenverSpecial Agent (SA) Christopher A. Calarco has been in law enforcement for 25 years. He was previously a local and federal prosecutor, and has been an Agent for the FBI for over 20 years. SA Calarco has investigated a number of matters to include reactive violent crimes, gangs, organized crime, fraud and major theft. SA Calarco was also a m...
Scott BennettVP, Applications, Lear CorporationScott Bennett leads Lear Corporation’s global applications as the Vice President of Applications, Deployment and Development. Prior to joining Lear Corporation, he served as the Global Chief Information Officer to International Automotive Components Group, a $6 billion Tier 1 automotive supplier. Before that, Scott was the North America CIO...
Zahira (Zah) GonzalvoSVP and Chief Information Security & Privacy Officer, Flagstar BankZah joined Flagstar Bank Information Security & Privacy team in 2018 as a Senior Vice President and Chief Information Security & Privacy Officer. Prior to her CISO role, Zah was the head of ERM and the Operational Risk teams since 2013 when she joined Flagstar Bank. Zah was the Strategy Leader for Diversity and Inclusion (D&I) for the Bank si...
Janet LawlessCEO & Founder, Center for Threat IntelligenceJanet is CEO and Founder of Center for Threat Intelligence. Janet established a team of intelligence experts to build a cutting-edge threat intelligence consulting, training and a certification program for Certified Threat Intelligence Professionals (CTIP). We are a proud provider for The National Initiative for Cybersecurity Education (NICE)...
Jason RaderDirector, Network & Cloud Security, Insight Cloud + Data Center TransformationJason Rader joined Insight in 2015 as the National Practice Director of Security. He is charged with managing Insight’s security portfolio including strategic consulting offerings and technology focused solutions. Jason has over 20 years experience and has a deep understanding of the skills, tools, and methodologies required to deliver true s...
Dennis HodgesCIO, Inteva ProductsDennis Hodges is the Chief Information Officer for Inteva Products, LLC, a position he has held since March 1, 2008. Prior to this assignment Dennis was Chief Information Officer for Delphi Interiors and Closures. Prior to joining Inteva, Dennis served as the Global Business Systems Director at Huntsman Corporation. He began his career at She...
Tammylynne JonasCIO, Self Esteem BrandsTammylynne Jonas (TLJ) is a seasoned digital and technology executive with almost 20 years of experience leading large, international teams. TLJ is the Global CIO for Self Esteem Brands, the parent company for Anytime Fitness. In this role, TLJ has responsibility for multiple franchise brands, with almost 5000 locations across almost 40 count...
Brenden SmithCISO, FirstBankBrenden Smith is the Chief Information Security Officer at FirstBank. Having spent the last 10 years at FirstBank he is passionate about their community involvement and “Banking for Good” philosophy. In his current role Brenden is focused on aligning security with the needs of the business to help drive better business outcomes through better...
Christopher RileyCISO, Ntirety (formerly HOSTING.com)Chris is a seasoned IT Strategist with 20 years of leadership experience in Project & Program Management, Technology & Infrastructure, and Security & Governance. He creates and scales internal technology operations for sustained hyper-growth, builds security operations for Managed Security Provider and spearheads Compliance certification pro...
Ronald WilliamsonInformation Security Officer, Medical College of WisconsinRonald Williamson has over 20 years’ experience in Information Technology and Information Security. He has held roles within the banking, retail, and healthcare industry. Currently, he is Information Security Officer at the Medical College of Wisconsin. Driven by a belief in promoting a strategic vision and utilizing best practices to accompl...
Bill MeredithCloud Security Engineer, Charles SchwabBill Meredith has over 25 years of experience designing, implementing, and supporting IT solutions for large enterprises, of which 10 years have been in the cybersecurity area. He is a cybersecurity professional with experience across a diverse set of cyber domains and industries such as Cloud Security, Financial, Forensics Investigation, Te...
Panel DiscussionKevin BeaverIndependent Information Security Consultant, Principle Logic, LLCKevin Beaver, CISSP is an information security consultant, writer, and professional speaker with Atlanta, GA-based Principle Logic, LLC. • With over 31 years in IT and 25 years in security, Kevin specializes in independent security assessments and virtual CISO consulting work to help businesses uncheck the boxes that keep creating a false sen...
Doug BoykinSolutions Engineer, OneTrustDoug Boykin serves as a Privacy Engineer at OneTrust – the #1 most widely used privacy, security and third-party risk technology platform. In his role, Boykin advises many of the world's leading organizations on CCPA, GDPR and ePrivacy (Cookie Law) solution implementations, focused on formulating efficient and effective responses to data prot...
John CallaghanSr. Security Engineer in SOC Operations, Forensics, and Threat Hunting, Pulte Financial ServicesAs a security practitioner of 30 years, Jack's experience began in the 80s with commercial and military venues, and expanding in early days of the Internet. It continued to be shaped by the growth of malware and data breaches as global threats against business, nations, and individuals. While developing some of the earliest proactive IPS syst...
Patrick BenoitVP, Global GRC & BISO, CBREPatrick is the Global Head of Cyber Governance, Risk, and Compliance / Business Information Security Officer for CBRE. He was formerly the Deputy CISO for Cheetah Digital. He has been an Executive Business Partner at Experian; a Customer Delivery Executive and Service Delivery Leader at Dell; and owned a technology consulting company. He is a...
Jeff KenneyCIO/CISO, Grasshopper Bank30+ years IT and Information Security practice. CIO/CISO at the first digital commercial bank in the US. Previously served as the Global Head of Wealth Technology for Thomson Reuters wealth management business line. Lead a team of over 380 developers and technologists supporting the TR BETA, BETA Online, and Thomson One products. Previously t...
Dale DrewChief Security Officer, Zayo GroupDale is currently the Chief Security Officer of Zayo Group, Inc, a global telecommunications service provider based in Boulder, Colorado. Dale is an accomplished and experienced corporate security executive with 31 years of experience in developing critical global security programs, having worked in Federal/State Law Enforcement and with Inte...
Rob WalkSr. Security Engineer, TenableRob is a passionate technologist focusing on solutions at the intersection of business and technology. He has over 20 years of industry experience architecting, deploying, and consulting on enterprise solutions. In his current role as a Sr. Security Engineer for Tenable, he helps organizations reduce risk due to Cyber Exposure.
Kelce WilsonGeneral Counsel, InfraGard North TexasKelce S. Wilson was in the U.S. Air Force, both active duty and reserves, retiring as a Lieutenant Colonel. He has a B.S., M.S. and PhD in electrical engineering, an M.B.A., a J.D., US PTO patent practitioner registration, and is a certified privacy professional with CIPP-US, CIPP-E, and CIPM. During his military and engineering career he wor...
TJ GonenCo-Founder , Protego LabsTJ is a subject matter expert on cloud security who has decades of experience solving enterprise problems with innovative solutions. His current project, Protego Labs, is two years in the making. With Protego, TJ has developed an award-winning platform that automates security for serverless applications. The combination of reduced development...
Book SigningParthasarathi ChakrabortyDirector, Security Architecture, Bank of MontrealPartha has over 20 years of cyber security leadership experience in financial services industry. An active speaker and panelist in cyber security conferences around the world. Very much passionate about learning new technologies and writing on recent cyber trends. Currently heading up infrastructure security architecture for Bank of Montreal....
Rob MaynardSolutions Architect, Trend MicroRob Maynard is a sales engineer and DevOps SME for Trend Micro. He has been in the IT field for over 11 years working with various cloud, automation, and virtualization technologies. He lives in Michigan with his wife and two children.
Jennifer ReichertsCertified Ethical Hacker, Healthcare Information Security AnalystJennifer Reicherts is an Information Security Analyst with over 16 years of experience working in the Healthcare and Public Health sector. Her passions include IoT cybersecurity and threat intelligence. Jennifer is a Certified Ethical Hacker (CEH) and an Executive Board Member of InfraGard Minnesota Member Alliance.
Michael HiskeyChief Marketing Officer, AvananMichael Hiskey is a long-time data, analytics, cloud, and AI industry executive. An accomplished writer and speaker, he has published articles in Forbes, InfoWorld, TechCrunch, ITProPortal, etc. He spends his time thinking about how these innovations impact B2B organizations and their customers. Michael has a background in enterprise technolo...
Rebecca HarnessVP & CISO, QuickbaseRebecca Harness is VP & Chief Information Security Officer for Quickbase and Founder/Principal of Pericuro. Rebecca has an established 20+ year career in information technology with the past ten years specifically focused on information security and compliance. An accomplished entrepreneur, Rebecca has founded and led two successful technolog...
Scott HoggChair Emeritus, Rocky Mountain IPv6 Task ForceScott Hogg is CTO and a co-founder of HexaBuild.io, an IPv6 consulting and training firm. He is a CCIE #5133 and CISSP #4610 with over 25 years of network and security experience. He is the author of the a Cloud Guru course, “Rapidly Deploying IPv6 on AWS.” Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), and a member o...
Joseph MarentetteMIM, Network Engineer 3, Washington University in St. LouisJoe Marentette, MIM (WashU IT Network Engineer 3), has worked for the university for over 20 years. Joe leads the design and engineering of the WashU enterprise network and the research network. Joe has a long history of collaboration with the Information Security department, and most recently built the data collection network to capture netw...
Eddie HoFormer CIO & COO, Los Alamos National BankEddie Ho is the former COO and CIO for Los Alamos National Bank in New Mexico and CIO and CISO at OmniAmerican Bank in Texas. Prior to banking leadership roles, Eddie was in Technology Risk Management, cyber security, and Enterprise Architecture for IBM, Dell, Grant Thornton, and Blockbuster. Eddie is a board member for ePayAdvisors and is a ...
Marc AshworthCISO & SVP, First BankMarc Ashworth, Senior Vice President and Chief Information Security Officer at First Bank, is a respected professional with over 25 years of experience in cyber and physical security, IT/security architecture, business and departmental strategy, budgeting, project management and is a public speaker. He is a board member of St. Louis Chapter ...
Frank LeyvaSystems Engineer, RadwareFrank Leyva is a Systems Engineer with Radware, a market leader in cybersecurity with a focus on Network and Application level availability, and security. Prior to that, he was a subject matter expert in network security defense with a leading anti-malware company, performing advanced threat analysis, deep packet inspection, and creating hack...
Rod AdayCISO, Dexia Crédit LocalRod Aday is the CISO, Head of Operational Risk and Information Security for Dexia Credit Local, NY Branch. He is an experienced security professional with many years of experience in information security/cybersecurity, business continuity, operational risk and information technology. As a CISO in the financial services sector, Rod has built I...
Mark NagielCISO, Supreme LendingMark is currently serving as the Chief Information Security Officer at Supreme Lending. Prior to Supreme Lending, Mark Served as the CISO at Prime Lending, Head of Information Security at MetroPCS (a T-Mobile division), VP of Information Technology and VP of Information Security at InCharge Institute, Head of NEC Information Security Consulti...
Beth YoungSr. Security Incident Response Consultant, AflacBeth Young has 20 years of cyber security experience. She is currently a Senior Security Incident Response Consultant with Aflac. Beth has previously worked for a financial services company and for one of the Information Sharing and Analysis centers. She just completed her Masters in Applied Data Science from Syracuse University. She has prev...
Christopher McMahonSpecial Agent, Global Investigative Operations Center, United States Secret ServiceChris McMahon is a Special Agent for the United States Secret Service. Prior to joining the Secret Service, Chris was a Prince George’s County, MD Police Officer. Chris is a well-seasoned criminal investigator specializing in cyber-enabled financial fraud, money laundering, credit card/ID fraud among other crimes. Chris began his Secret Servi...
Siam LuuLead Security Architect, Colorado Judicial DepartmentSiam Luu has worked information security for over 8 years beginning as an analyst, graduating to an engineer, and currently is employed as a security architect. He has worked in both the public and private sectors in a myriad of different careers and locations in both technical and non-technical roles. At present, he has his CISSP certificati...
Melissa Van BuhlerCybersecurity & Data Privacy Attorney, Focal LawMelissa’s legal practice focuses on cybersecurity, privacy, and regulatory compliance. Her key strength is helping organizations achieve cyber resiliency through legal and regulatory compliance.
Before joining Newman Du Wors in 2018, she served more than 15 years as a Judge Advocate General officer in the United States Army where she s...
Quin DeVriesUX Researcher, Automotive Cybersecurity, Mitsubishi Electric Automotive AmericaQuin DeVries is exploring the realm where technology and human behavior meet to create engaging user experiences. As a curious researcher, he is eager to tackle the challenges of today and the future.
His research background includes topics in design thinking and ideation in engineering, managerial accounting and neuropsychology, and ...
Alan BerryVice President, Cybersecurity, Centene CorporationAlan Berry is the Vice President for Cybersecurity at Centene Corporation. He leads the Cyber Incident Response, Security Strategy, and Threat and Vulnerability Management teams, as well as the Business Resilience and Crisis Management teams. Alan brings 30 years of experience in cyber operations, communications, and command and control. Prio...
Matthew ClaphamDirector of Cybersecurity, GE HealthcareMatt Clapham is a Directory of Cybersecurity at GE Healthcare. He and his team make products more secure.
Michael RogersDirector, Cyber Defense, Optum / UHGMichael Rogers is on a mission to make organizations more secure by executing on the basics of cybersecurity. He is a certified nerd with nearly 20 years of IT experience, and has spent the last decade developing his understanding of information security, business strategy, and communications. Mike earned his MBA from the Carlson School of Ma...
David StaussPartner, Husch Blackwell LLPDavid is the leader of Husch Blackwell’s national privacy and data security practice group. Accredited by the International Association of Privacy Professionals as a Fellow of Information Privacy, Certified Information Privacy Professional/United States, and Certified Information Privacy Technologist, David brings to the table a deep engageme...
Marc HarwinInformation Security Professional, Harwinet LLCMarc Harwin is an Information Security Professional with more than 20 years of experience. He has worked to improve Information Security at multiple Fortune 500 organizations with a focus on:
- Security Operations
Speaker Directory