ISSA Theater 1 - Professional Development

ISSA Theater 1 - Professional Development Speakers

Anne Marie Colombo
Anne Marie Colombo

Cybersecurity Solution Advisor SAP

View

Anne Marie Colombo

Anne Marie is a Cybersecurity Solution Advisor working for the CIO, SAP America aligning cybersecurity best practices, thought leaders, partners, solutions for holistic enterprise security for customers. She is focused on cybersecurity and identity solutions. Her background includes providing solutions in the areas of data protection, identity, multi-factor authentication and encryption to secure SAP and other applications. She holds a Certified Information Security Systems Professional (CISSP) certification from ISC2. She currently serves as the President of the Metro Atlanta Information Systems Security Association (ISSA) chapter as well as on the board of the Technology Association of Georgia (TAG) Information Security Society. She has worked in the software industry for over twenty five years and holds a bachelor degree in Business Administration with a focus on Management Information Systems from Madonna University in Livonia, Michigan and is currently enrolled in the Georgia State University Masters of Information Systems program with a focus area of Cybersecurity.

CA Washington
CA Washington

Founder Image & Etiquette Institute

View

CA Washington
Candy Alexander
Candy Alexander

Virtual CISO and Executive Cyber Security Consultant 

View

Candy Alexander

Ms. Alexander has 30 years of information security experience working for various high-tech companies. Ms. Alexander is very active within the profession and is the newly elected ISSA International President. She has held several positions as CISO (Chief Information Security Officer) for which she developed and managed Corporate Security Programs. She is now working as a Virtual CISO and Executive Cyber Security consultant assisting companies large and small to improve their potential risks through effective security initiatives.

Daniel Ziesmer
Daniel Ziesmer

President Centripetum

View

Daniel Ziesmer
Debbie Christofferson
Debbie Christofferson

 

View

Debbie Christofferson

Fortune 500 enterprise wide Information Security Manager with experience across the US, Europe and Asia. Strategic security leader and consultant with broad comprehensive security and risk management experience. Know security from the ground up and what it takes to succeed. Certifications: CISSP, CISM. Strong collaborator and high energy leader. 2018 book published: “Women in Security”. Debbie also has facilitated CISM certification exam prep workshops since 2005, and speaks and writes on cyber security. She leads as an International Board Director and Distinguished Fellow for Information Systems Security Association (ISSA); Chairs the board's CISO Advisory Council for the CISO Executive Forum. Debbie is co-founder of the local Cloud Security Alliance chapter.

Dr. Curtis Campbell
Dr. Curtis Campbell

VP, Manager of IT Procurement and Vendor Management Atlantic Capital Bank

View

Dr. Curtis Campbell

Dr. Curtis Campbell is a 28 year Cybersecurity, Compliance, and IT professional chartered with accountability and oversight of Procurement, Risk and Compliance, and Vendor Management strategies based on balancing risk, compliance, profitability and value add. She works with executive leadership to define strategic change management, developing recommendations related to processes and standards. Dr. Campbell believes communication with Lines of Business by helping others understand technical solutions in familiar terms fosters good relationships and serves to strengthen internal teams. Her experience includes governance, risk, and compliance in vendor relationships. As Manager of Atlantic Capital’ Vendor Management Program, Dr. Campbell drives best practices in information security evaluation, and risk management for third party relationships in a regulatory environment. Her experience includes writing policies and procedures and assessing and monitoring risk in regulatory environments. Dr. Campbell is a thought leader on cybersecurity and the human connection between trust and unintentional insider threats in an ever-changing cybersecurity footprint. She has published research and journal articles on cybersecurity. Recent publications include: “Solutions for Counteracting Human Deception in Social Engineering Attacks”; “Securing the Remote Employee: Protecting the Human Endpoint in the Cybersecurity Environment”; and “Securing the Vendor: Changing the Dynamic of the Infosec Relationship”. She holds Bachelor and Master’s degrees from the University of TN and a Doctorate in Organizational Leadership in Information Systems Technology.

Jeffrey Man
Jeffrey Man

InfoSec Curmudgeon Online Business Systems

View

Jeffrey Man
Marci McCarthy
Marci McCarthy

 

View

Marci McCarthy
Mark Gelhardt
Mark Gelhardt

VP, Global Technology Governance  Gelhardt Group, LLC

View

Mark Gelhardt

Colonel Gelhardt has had a long successful Army career, the pinnacle of his success was being nominated and selection to work at the White House as the CIO/CISO equivalent, supporting President Clinton, the VP, the White House Staff, and the U.S. Secret Service managing all the classified automation and telecommunications. Colonel Gelhardt is a combat veteran.

Since retiring from the service Mark has held multiple leadership positions in IT and InfoSec.  CIO/CSO for World Airways – the largest US wide body long-hall charter airline.  CTO (Global Operations)/CISO for InterCall - the world’s largest conferencing company.  Chief Information Security Officer for TravelClick - a Software as a Service company in the hospitality space.  Consulted as the Interim CISO for the Georgia Lottery & NCR.  Currently Mark is the VP, Global Technology Governance for US Bank/Elavon – Elavon is fifth largest credit card processor.

Mark is the author of “My time at the Clinton White House” which was published the summer of 2018.  Mark’s second and third books are in the making.  Mark’s honors include being a published author, a key note speaker, and panel member in the IT, InfoSec, and political areas.  Mark has been awarded CISO of the year finalist 2013, Global CISO of the year finalist 2014, and a National InfoSec Project award winner in 2013 and a finalist InfoSec Project award winner in 2015.  Marks military honors include the Presidential Service Badge, the Legion of Merit, the Soldiers Medal (highest peace time valor award) and more.

Mark Weatherford
Mark Weatherford

SVP, Chief Cybersecurity Strategist vArmour

View

Mark Weatherford

Mark Weatherford is SVP and Chief Cybersecurity Strategist at vArmour. He has more than 20 years of security operations leadership and executive-level policy experience in some of the largest and most critical public and private sector organizations in the world. Prior to vArmour, he was a Principal at The Chertoff Group an in 2011, was appointed by President Obama as the DHS’s first Deputy Under Secretary for Cybersecurity. Before DHS, he was VP and Chief Security Officer at the North American Electric Reliability Corporation (NERC). Prior to NERC, he was appointed by Governor Schwarzenegger as California’s first Chief Information Security Officer (CISO) and was also the first CISO for the State of Colorado. A former U.S. Navy cryptologist, Mr. Weatherford led the United States Navy’s Computer Network Defense operations and the Naval Computer Incident Response Team. Mr. Weatherford holds a master’s degree from the Naval Postgraduate School and holds the CISSP certification. He was awarded SC Magazine’s “CSO of the Year” award in 2010, named one of the “10 Most Influential People in Government Information Security” by GovInfoSecurity in both 2012 and 2013, selected for the 2013 CSO Compass Award, and presented the 2017 SC Media Reboot ‘Influencer’ Leadership Award.

Mary Ann Davidson
Mary Ann Davidson

CSO Oracle

View

Mary Ann Davidson

Mary Ann Davidson is the chief security officer at Oracle, responsible for Oracle software security assurance. She represents Oracle on the board of directors of the Information Technology Information Sharing and Analysis Center (IT-ISAC), and serves on the international board of the Information Systems Security Association (ISSA). She has been named one of Information Security’s top five "Women of Vision," is a Federal 100 Award recipient from Federal Computer Week, and was recently named to the ISSA Hall of Fame. Davidson has served on the Defense Science Board and was a member of the Center for Strategic and International Studies Commission on Cybersecurity for the 44th Presidency. She has testified on cybersecurity to the US House of Representatives (Energy and Commerce Committee, Armed Services Committee, and Homeland Security Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology), and the US Senate Committee on Commerce, Science, and Technology. Davidson has a BS in mechanical engineering from the University of Virginia and an MBA from the Wharton School of the University of Pennsylvania. She received the Navy Achievement Medal when she served as a commissioned officer in the US Navy Civil Engineer Corps.

Tracy Reinhold
Tracy Reinhold

Chief Security Officer Everbridge

View

Tracy Reinhold
Winn Schwartu
Winn Schwartu

‘Founder The Security Awareness Company’

View

Winn Schwartu

ISSA Theater 1 - Professional Development Seminars

  • Wed 17th Oct 08:30 - 09:30
  • Cyber-Enabled Economic Warfare: 21st Century Battleground Mark Weatherford  |   vArmour  |   ISSA Theater 1 - Professional Development

    ISSA Theater 1 - Professional Development Theatre

    Wed 17th Oct 08:30 to 09:30

    Cyber-Enabled Economic Warfare: 21st Century Battleground

    Economic warfare has been practiced since almost the beginning of time through various means including blockades, trade embargoes, and freezing capital assets. The Foundation for the Defense of Democracies has defined a new kind of warfare termed Cyber-Enabled Economic Warfare (CEEW). CEEW is distinguished from other types of cyber-attacks by the motivation and strategy of the nation-state attacker. CEEW is a hostile strategy involving attack(s) against a nation using cyber technology with the intent to weaken its economy and thereby reduce its political and military power. This talk will provide a foundation for what CEEW is, along with some classic examples and justification for broadening our scope to view certain cyber events not as isolated security incidents, but rather as events that when aggregated, form campaigns of 'death by a thousand cuts.'

    Speaker

    Photo Speaker Name Profile
    Mark Weatherford Mark Weatherford View Profile
  • Wed 17th Oct 09:40 - 11:10
  • Women in Security Panel: Strategies to Step up Your A-Game Tech Leaders  |  ISSA Theater 1 - Professional Development

    ISSA Theater 1 - Professional Development Theatre

    Wed 17th Oct 09:40 to 11:10

    Women in Security Panel: Strategies to Step up Your A-Game

    This panel's purpose is to showcase achievements by women in security in technology and innovation, and presents a picture that others can follow into the future. We will demonstrate the diverse segments of the field, opportunities, and talents and skills that open the doors. We will present developments and advancements in cybersecurity, and share these women's insights who are leading the way. This panel examines core areas of development in security, emphasizing the pivotal contributions of women to the field’s evolution, how security is created, where innovation occurs, what the underpinnings are, and who supports it and how. We will present an overview of the cyber security field. Female security professionals will share their own stories of technology and innovation in security today; the foundation, where research is headed, and the emerging trends. Women currently make up a very small pocket of cyber security staffing. We aim to increase the visibility of women in the field and their contributions and encourage other females to join the field, from executive leadership, to engineers, analysts and researchers.

    Speakers

    Photo Speaker Name Profile
    Anne Marie Colombo Anne Marie Colombo View Profile
    Debbie Christofferson Debbie Christofferson View Profile
    Dr. Curtis Campbell Dr. Curtis Campbell View Profile
    Mary Ann Davidson Mary Ann Davidson View Profile
  • Wed 17th Oct 11:20 - 12:10
  • The Changing Role of the CSO in Today's Corporate Landscape Tracy Reinhold  |   Everbridge  |   ISSA Theater 1 - Professional Development

    ISSA Theater 1 - Professional Development Theatre

    Wed 17th Oct 11:20 to 12:10

    The Changing Role of the CSO in Today's Corporate Landscape

    The role of the Chief Security Officer has continued to evolve in complexity, but also in terms of its importance to the creation of business value. In order to remain successful and keep up with today’s technology landscape, CSOs must reinvent themselves to bridge the gap between the office of the CIO, the office of the CISO, and the office of the CSO--between business optimization and business resiliency. This session will discuss how CSOs can reinvent their security programs to support their organization’s services, processes and facilities to optimize their business for resiliency and success. The session will incorporate Tracy's role as CSO of Everbridge, the leader in critical event management, as well as lessons learned from Fannie Mae’s creative approach to leveraging new technology in the age-old financial industry. It will provide best practices for CSOs looking to be seen as a key partner by leadership, such as focusing on innovation, ROI and new technological advancements.

    Speaker

    Speaker Name Profile
    Tracy Reinhold View Profile
  • Wed 17th Oct 12:00 - 01:00
  • Help! My Coffee Maker is trying to hurt me! Or When Security becomes a matter of Safety! Candy Alexander  |     |   ISSA Theater 1 - Professional Development

    ISSA Theater 1 - Professional Development Theatre

    Wed 17th Oct 12:00 to 01:00

    Help! My Coffee Maker is trying to hurt me! Or When Security becomes a matter of Safety!

    Not too long ago, not implementing good security was just that. Sure, it may have led to the theft of your identify and ruined your credit, but today we are entering into a new world – that of the IoT (Internet of Things). This new world we are moving towards will mean the interconnectivity of innocuous objects to provide convenience beyond our imaginations. BUT, at what cost to our personal safety. In this panel discussion, we will explore the potential safety concerns and how we can address them before our coffee makers unite against us!

    Speaker

    Photo Speaker Name Profile
    Candy Alexander Candy Alexander View Profile
  • Wed 17th Oct 02:40 - 03:30
  • Does DoD Level Security Work in the Real World? Jeffrey Man  |   Online Business Systems  |   ISSA Theater 1 - Professional Development

    ISSA Theater 1 - Professional Development Theatre

    Wed 17th Oct 02:40 to 03:30

    Does DoD Level Security Work in the Real World?

    After spending nearly 13 years working for the Department of Defense, I ventured out into the private sector to consult and advise on matters of information security. On many occasions, after explaining some basic security concept to a customer and outlining what they need to do to be secure, I often heard the retort, “yeah, but we don’t need DoD level security.” Well, after twenty years in the private sector, and especially over the past 2-3 years with the proliferation of data breaches against major companies, I find myself wanting to reply, “yeah, you really DO need DoD level security!” What does this mean? Probably not what you are thinking. This talk will start with an overview of the foundational nature of data security, highlight the major tenets or goals of data security, introduce the risk equation, discuss how and why so many companies so often fail at implementing the basics of data security, and explore some ways that a DoD-centric approach to data security might be implemented in the private sector. Brainstorming, discussion, dissension all welcome. Hint: This ain’t about Cyber!   

    Speaker

    Photo Speaker Name Profile
    Jeffrey Man Jeffrey Man View Profile
  • Wed 17th Oct 03:40 - 04:30
  • Secure Tomorrow’s Promotion Today CA Washington  |   Image & Etiquette Institute  |   ISSA Theater 1 - Professional Development

    ISSA Theater 1 - Professional Development Theatre

    Wed 17th Oct 03:40 to 04:30

    Secure Tomorrow’s Promotion Today

    “Secure Tomorrow's Promotion Today” is an interactive session designed to equip attendees with the tools they need to use their Appearance, Relationships and Credibility (A.R.C.) to support their most important career goals.
    The Art of A.R.C. is the flagship training program of The Image & Etiquette Institute and participants interested in securing leadership roles, and upward mobility should attend. Although technical skills are of the utmost importance, this session will help information security professionals pair their brain power with brand power to build relationships more authentically and create the credibility they need to excel.

    Speaker

    Photo Speaker Name Profile
    CA Washington CA Washington View Profile
  • Thu 18th Oct 08:30 - 09:30
  • Keynote Speaker Winn Schwartu  |   The Security Awareness Company’  |   ISSA Theater 1 - Professional Development

    ISSA Theater 1 - Professional Development Theatre

    Thu 18th Oct 08:30 to 09:30

    Speaker

    Photo Speaker Name Profile
    Winn Schwartu Winn Schwartu View Profile
  • Thu 18th Oct 09:40 - 11:10
  • The Future of the CISO: Championing Security, Driving Business and Promoting Diversity Marci McCarthy  |     |   ISSA Theater 1 - Professional Development

    ISSA Theater 1 - Professional Development Theatre

    Thu 18th Oct 09:40 to 11:10

    The Future of the CISO: Championing Security, Driving Business and Promoting Diversity

    The role of the Chief Information Security Officer has evolved significantly over the last decade. According to the 2017 State of Cyber Security study, the percentage of organizations with a CISO increased from 50% to 65% between 2016 and 2017. The need for highly skilled and dedicated information security leaders has become a crucial necessity. Despite this, minority representation in cybersecurity continues to lag behind at 26%, with only 23% of that amount holding a role of director or above, according to (ISC)²’s 2018 report, “Innovation Through Inclusion: The Multicultural Cybersecurity Workforce.” As the roles and functions expected of a CISO continue to change to encompass not only championing security but also driving and enabling business, does that also leave room for promoting diversity in leadership roles throughout the tech industry? Join our panel as we look at the evolving role of the CISO and discuss what the future of security, business and diversity holds for this increasingly critical role.

    Speaker

    Photo Speaker Name Profile
    Marci McCarthy Marci McCarthy View Profile
  • Thu 18th Oct 01:00 - 02:30
  • IT & InfoSec Support to the Commander-in-Chief Mark Gelhardt  |   Gelhardt Group, LLC   |   ISSA Theater 1 - Professional Development

    ISSA Theater 1 - Professional Development Theatre

    Thu 18th Oct 01:00 to 02:30

    IT & InfoSec Support to the Commander-in-Chief

    Colonel Gelhardt is a retired Army Officer and war veteran. While in the Army Colonel Gelhardt was nominated and selected to work at the White House as the Chief Information Officer (CIO) equivalent for the Clinton White House from 1995 through 1999. Colonel Gelhardt was responsible for all classified Information Technology and Communications used by the President, Vice President, White House Staff, and the Secret Service. Colonel Gelhardt's mission was to provide safe and secure instantaneous communications and 5 minute hard copy, anytime, anywhere in the world to the Commander-in-Chief. Colonel Gelhardt, will explain not only the support he provided to the Command-in-Chief but will explain all the military support it takes to make sure your government works. Since Mark’s retirement from the Army he has been a successful CIO, CTO, CSO, and CISO in several global companies. Mark Gelhardt is a speaker and Author.

    Speaker

    Photo Speaker Name Profile
    Mark Gelhardt Mark Gelhardt View Profile
  • Thu 18th Oct 02:40 - 03:30
  • Death by a Thousand Paper Cuts: The Small Business Security Problem Daniel Ziesmer  |   Centripetum  |   ISSA Theater 1 - Professional Development

    ISSA Theater 1 - Professional Development Theatre

    Thu 18th Oct 02:40 to 03:30

    Death by a Thousand Paper Cuts: The Small Business Security Problem

    Imagine a massive technology infrastructure that is barely secured, seldom monitored, and its security risks almost completely unknown... more critically, it supports 1/3 of the entire U.S. workforce every day, and is used by 98% of all businesses in the United States. There’s just one problem, it’s real: it is the infrastructure of U.S. businesses with less than 100 employees. Small businesses are absolutely critical to every economic sector and the success of every large enterprise in existence, but seldom have the resources to invest in expensive technical solutions or security and risk management staff. In this session, the presenter unveils a potential security disaster waiting to happen, its importance to the future of security for all businesses, and how even small and large organizations can work together to find cost-effective solutions to establishing critical security controls.

    Speaker

    Photo Speaker Name Profile
    Daniel Ziesmer Daniel Ziesmer View Profile
Top