The Keynote

The keynote programme at Cyber Security Atlanta is focused on helping organisations protect themselves and their organisations from cybercrime, cyber terrorism and human factors.

The Keynote Theater at Cyber Security Atlanta invovles a deep analysis on the latest attack vectors and techniques hackers, nation states and social engineers are using against organizations like yours. This unique theater showcases some of the best new technologies and practices in the industry, enabling you understand the impact and capabilities of machine learning and artificial intelligence based defences. There is also be some incredibly valuable insight in to building cyber teams and company culture to ensure that the entire organization are working together to stay protected. The programme for 2018 is a mixture of demonstrations, presentations and panel debates from a world class line up of experts.

Keynote Speakers

Brandon Helms
Brandon Helms

Chief Operations Officer  Rendition Infosec

View

Brandon Helms

Brandon Helms is an American cyber security professional who has dedicated most of his career to leading some of the most advanced cyber operations for both Department of Defense and private sector. Brandon was a Chief Petty Officer in the United States Navy where he ran IT and security operations for fast attack submarines and transitioned into the Technical Director at the National Security Agency. Afterwards, Brandon entered the private sector as the Business Information Security Officer for Palantir Technologies where he embedded with numerous Nation States and Fortune 500 companies to increase their security defenses while minimizing their risk profiles. Today, Brandon is the Chief Operations Officer for Rendition Infosec, LLC where he focuses most of his attention training the next generation of cyber security professionals.

Cameron Armstrong
Cameron Armstrong

Director of Channel Sales Darktrace

View

Cameron Armstrong
Chris Calvert
Chris Calvert

Co-Founder & VP, Product Strategy Respond Software

View

Chris Calvert
DeBrae Kennedy-Mayo
DeBrae Kennedy-Mayo

Research Faculty Member  Georgia Institute of Technology

View

DeBrae Kennedy-Mayo

DeBrae Kennedy-Mayo is a Research Faculty Member at the Georgia Institute of Technology, where she engages in research on legal and policy issues concerning cybersecurity and privacy. Peter Swire and Kennedy-Mayo are the co-authors of the 2018 edition of U.S. Private Sector Privacy: Law and Practice for Information Privacy Professionals, IAPP’s book used by those studying for privacy certification. With Swire, Kennedy-Mayo also co-authored the 2017 Emory Law Journal article entitled, “Why Both the EU and US are ‘Stricter’ than Each Other for the Privacy of Government Requests for Information.” This article examined privacy protections provided in EU law as well as those that exist in US law.

Kennedy-Mayo has been an attorney for 15 years. She has spent most of her career working in government, acting as both an Assistant Attorney General for the State of Georgia and as an Assistant District Attorney in several Georgia counties. Kennedy-Mayo’s first professional paper was entitled “In Search of a Balance Between Police Power and Privacy in the Cybercrime Treaty.” The paper was published in the Richmond Journal of Law and Technology in 2002.

Kennedy-Mayo graduated with honors from Emory’s School of Law in 2001. She currently lives in Savannah with her husband, Garrett, and her two sons.

Dr. Calvin Nobles
Dr. Calvin Nobles

Cybersecurity Professional / Strategist 

View

Dr. Calvin Nobles
Elizabeth Wharton
Elizabeth Wharton

VP, Strategy  Prevailion, Inc.

View

Elizabeth Wharton
IJay Palansky
IJay Palansky

Partner Armstrong Teasdale, LLP

View

IJay Palansky
John Summers
John Summers

VP & Chief Technology Officer Akamai

View

John Summers

John oversees the security and technology strategy for Akamai’s web security and web performance solutions.  He is a frequent speaker on the topics of Internet threats, enterprise security and the digital transformation of enterprise infrastructures to become more secure and resilient in the cloud-first, SaaS-first, mobile-first world we live in today.

Prior to his current role, John led the development of Akamai’s Enterprise Security and Web Security products which consist of cloud-based threat protection, identity and access management, web application security and DDoS defense services that leverage Akamai’s unique distributed computing platform to provide a global layer of security that scales on demand. John is a patent holder on Akamai’s distributed web application firewall technology.

John joined Akamai to manage the Web Acceleration products from 2007 until 2011, during which time that business grew 30 fold.

Prior to Akamai, John led Managed Security Services businesses at Unisys and at Genuity.

John holds degrees in physics and computer science from the University of Pennsylvania.  He was a member of the 1980 U.S. Olympic Team and a three time U.S. National Ice Dance Champion.

Joshua Crumbaugh
Joshua Crumbaugh

Chief Hacker/CEO PeopleSec

View

Joshua Crumbaugh

Joshua Crumbaugh is an engaging and internationally respected cybersecurity subject matter expert, author, keynote and public speaker. During Joshua's ethical hacking career he has never encountered a single network that could keep him or his teams out. He has also accomplished a number of impressive social engineering feats, such as: talking his way into bank vaults, fortune 500 data centers, corporate offices, restricted areas of casinos and more. His experience in all things security led him to realize something had to change. This was the catalyst that led him to found PeopleSec where he is the CEO and Chief Hacker. Joshua is internationally recognized as one of the world's most accomplished social engineers and the world's leading expert on cybersecurity awareness.

Kathy Winger
Kathy Winger

Attorney at Law Law Offices of Kathy Delaney Winger

View

Kathy Winger
Kevin Mitnick
Kevin Mitnick

Chief Executive Officer Mitnick Security

View

Kevin Mitnick

Kevin is the world's most famous hacker, bestselling author, and the top cyber security speaker. Once one of the FBI's Most Wanted because he hacked into 40 major corporations just for the challenge, Kevin is now a trusted security consultant to the Fortune 500 and governments worldwide. Kevin and The Global Ghost Team™ now maintain a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into using a combination of technical exploits and social engineering.

Kevin's presentations are akin to "technology magic shows" and include live demonstrations of the latest hacks and cyber threats.

Madison Hogan
Madison Hogan

Founding Staff Writer  Atlanta Inno,

View

Madison Hogan

Madison Hogan is the founding staff writer at Atlanta Inno, a sister site to the Atlanta Business Chronicle covering tech, startups and innovation. Madison is the author of the Beat, a daily newsletter dedicated to providing the latest news in Atlanta tech, and a weekly tech column in the Atlanta Business Chronicle. A graduate of Indiana University-Bloomington’s Media School, Madison has covered crime, government, business and more during her journalism career. In addition to being a native Atlantan, Madison is a hip-hop fanatic, pop culture guru and connoisseur of all things Southern. Follow @madisonhogan for tech updates, memes and sarcasm

Mark Gelhardt
Mark Gelhardt

VP, Global Technology Governance  Gelhardt Group, LLC

View

Mark Gelhardt

Colonel Gelhardt has had a long successful Army career, the pinnacle of his success was being nominated and selection to work at the White House as the CIO/CISO equivalent, supporting President Clinton, the VP, the White House Staff, and the U.S. Secret Service managing all the classified automation and telecommunications. Colonel Gelhardt is a combat veteran.

Since retiring from the service Mark has held multiple leadership positions in IT and InfoSec.  CIO/CSO for World Airways – the largest US wide body long-hall charter airline.  CTO (Global Operations)/CISO for InterCall - the world’s largest conferencing company.  Chief Information Security Officer for TravelClick - a Software as a Service company in the hospitality space.  Consulted as the Interim CISO for the Georgia Lottery & NCR.  Currently Mark is the VP, Global Technology Governance for US Bank/Elavon – Elavon is fifth largest credit card processor.

Mark is the author of “My time at the Clinton White House” which was published the summer of 2018.  Mark’s second and third books are in the making.  Mark’s honors include being a published author, a key note speaker, and panel member in the IT, InfoSec, and political areas.  Mark has been awarded CISO of the year finalist 2013, Global CISO of the year finalist 2014, and a National InfoSec Project award winner in 2013 and a finalist InfoSec Project award winner in 2015.  Marks military honors include the Presidential Service Badge, the Legion of Merit, the Soldiers Medal (highest peace time valor award) and more.

Peter Chestna
Peter Chestna

Director of Developer Engagement Veracode

View

Peter Chestna

As Director of Developer Engagement, Pete provides customers with practical advice on how to successfully roll out developer-centric application security programs. Relying on more than 10 years of direct AppSec experience as both a developer and development leader, Pete provides information on best practices amassed from working with Veracode’s 1,000+ customers.

Robert Gibbons
Robert Gibbons

Chief Technology Officer Datto

View

Robert Gibbons

Robert is responsible for managing Datto’s development and infrastructure initiatives in support of its comprehensive data backup and protection platform.

Prior to Datto, Robert spent 15 years as a software engineer and CTO leading teams of developers building high-uptime enterprise applications for Fortune 500 clients, including building one of the highest trafficked web advertising distribution networks and an enterprise digital asset management system deployed to thousands of end-users.

Robert holds a B.S. in Policy Analysis and Management from Cornell University, a J.D. from Fordham University, and an M.S. in Computer Science from New York University.

Rohit Ghai
Rohit Ghai

President  RSA (a Dell Technologies Business)

View

Rohit Ghai

Rohit Ghai most recently served as president of Dell EMC’s Enterprise Content Division (ECD), where he was instrumental in setting a compelling vision, transforming go-to-market and revitalizing the portfolio for the digital era through strategic partnerships and acquisitions.  Ghai was responsible for all aspects of the ECD business, including setting strategic vision, sales and services, channel strategy, product development, marketing, finance, support and customer success. 

Previously, Ghai was chief operating officer of ECD, and responsible for the division's strategy, development and marketing of all products and solutions. He joined EMC in December 2009 to run product development.

He has more than 20 years of experience in IT in both startup and big company settings, with expertise in digital transformation in highly regulated markets, and knowledge across software, and systems and security.  Ghai joined Dell EMC from Symantec, where he held a variety of senior engineering and general management roles. Previously, he was at Computer Associates in a number of senior management roles in the BrightStor and eTrust business units, and led the CA India operations as chief technology officer. Ghai joined CA through the acquisition of Cheyenne Software – a startup in the backup and data protection space. 

Ghai holds a master’s degree in Computer Science from the University of South Carolina and a bachelor's degree in Computer Science from the Indian Institute of Technology (IIT), Roorkee.  

Wes Knight
Wes Knight

CISO Georgia Department of Revenue

View

Wes Knight

Wes has been involved in IT for over 35 years starting out with IBM in Atlanta. After leaving IBM in 1996, Wes started a company doing Network and Network Security consulting and training. This eventually evolved to focus on Security including Assessments and Forensics. Wes remains a certified instructor in Ethical Hacking and Forensic Investigation.

Wes has held several positions in IT and Information Security since joining the DOR eleven years ago. He is currently the Chief Information Security Officer and manages the DOR Office of Information Security. The OIS is responsible for maintaining the security of taxpayer and motor vehicle information and approximately $25 billion in annual taxes received; ensuring that DOR complies with applicable State and Federal regulations, and conducting the forensics needed for criminal investigations.

Wes serves on several Executive Advisory Committees and the Evanta CISO Governing Body. He was awarded the 2018 Information Security Executive Southeast People Choice Award. This award was voted on by his peers and recognizes the ISE® Executive Nominee who exemplifies the attributes of a leader in the information security industry

Wes and his wife Elizabeth have been married for 45 years and have 5 children and 11 grandchildren.

ISSA Speakers

Alex Wood
Alex Wood

 

View

Alex Wood
Andrew Weiss
Andrew Weiss

Lead Federal Solutions Engineer Docker

View

Andrew Weiss

Andrew leads the Federal solutions engineering team at Docker. He is an (ISC)² Certified Authorization Professional (CAP) and an active participant in the Federal IT security and compliance ecosystem. Andrew is also a core contributor to the NIST Open Security Controls Assessment Language (OSCAL)

Anne Marie Colombo
Anne Marie Colombo

Cybersecurity Solution Advisor SAP

View

Anne Marie Colombo

Anne Marie is a Cybersecurity Solution Advisor working for the CIO, SAP America aligning cybersecurity best practices, thought leaders, partners, solutions for holistic enterprise security for customers. She is focused on cybersecurity and identity solutions. Her background includes providing solutions in the areas of data protection, identity, multi-factor authentication and encryption to secure SAP and other applications. She holds a Certified Information Security Systems Professional (CISSP) certification from ISC2. She currently serves as the President of the Metro Atlanta Information Systems Security Association (ISSA) chapter as well as on the board of the Technology Association of Georgia (TAG) Information Security Society. She has worked in the software industry for over twenty five years and holds a bachelor degree in Business Administration with a focus on Management Information Systems from Madonna University in Livonia, Michigan and is currently enrolled in the Georgia State University Masters of Information Systems program with a focus area of Cybersecurity.

Barbara Key
Barbara Key

Senior Director of Security Product Marketing  Extrahop

View

Barbara Key
Brandon Levene
Brandon Levene

Head of Applied Intelligence Virus Total

View

Brandon Levene
Brian Rasco
Brian Rasco

Manager/Architect II Information Security - Enterprise UAB Medicine

View

Brian Rasco
Brian Ruf
Brian Ruf

FedRAMP / OSCAL Liaison FedRAMP PMO

View

Brian Ruf

Brian began his 30 year IT career as a programmer and network engineer. In the late 90’s he was part of a core team applying cyber security to a (then) next generation air traffic control system. Since 2000, he has led efforts for government agencies, pharmaceutical companies, telecommunication providers, and financial institutions on topics involving the intersection of risk management, cyber security, system development lifecycle methodologies, and process re-engineering. Brian joined the FedRAMP PMO in July 2015, where he was instrumental in the success of FedRAMP Accelerated and related improvements. Brian represents FedRAMP on the OSCAL development team.

CA Washington
CA Washington

Founder Image & Etiquette Institute

View

CA Washington
Cameron Williams
Cameron Williams

CTO OverWatch ID

View

Cameron Williams

For more than 25 years, Cameron Williams has helped enterpise clients like IBM, Wells Fargo, Sony, BP, and dozens others keep their data safe and secure from data breaches, hacks, ransomware, and spear-phishing. As OverWatchID’s CTO, Cam leads all product design and product development, and is responsible for ensuring that that OverWatchID’s cloud-based converged identity security platform is meeting existing and future threats to identity security

Candy Alexander
Candy Alexander

Virtual CISO and Executive Cyber Security Consultant 

View

Candy Alexander

Ms. Alexander has 30 years of information security experience working for various high-tech companies. Ms. Alexander is very active within the profession and is the newly elected ISSA International President. She has held several positions as CISO (Chief Information Security Officer) for which she developed and managed Corporate Security Programs. She is now working as a Virtual CISO and Executive Cyber Security consultant assisting companies large and small to improve their potential risks through effective security initiatives.

Christopher Mandelaris
Christopher Mandelaris

CISO Chemical Bank

View

Christopher Mandelaris
Cornel du Preez
Cornel du Preez

Senior Penetration Testing Engineer NorthState Technology Solutions

View

Cornel du Preez
Daniel Ziesmer
Daniel Ziesmer

President Centripetum

View

Daniel Ziesmer
David Hogue
David Hogue

Technical Director, Cybersecurity Threat Operations Center NSA

View

David Hogue

Mr. Dave Hogue is currently serves as the Technical Director for the NSA’s Cybersecurity Threat Operations Center (NCTOC), a dynamic, national-level entity that serves at the forefront in the fight against malicious cyber activity through integrated cybersecurity operations. Previously, Mr. Hogue was the Technical Director of the Analysis Group within the National Security Agency (NSA) Threat Operations Center (NTOC), charged to deliver vital threat intelligence across a multitude of threat actors and technologies. While in this position, Mr. Hogue also served as a corporate officer, leading agency-wide efforts such as NSA’s response in delivering foundational technical analysis and attribution of the 2014 Sony Pictures Entertainment (SPE) computer network attack (CNA).

David Schroth
David Schroth

CISA Design Compliance and Security, LLC

View

David Schroth

David is an experienced IT advisor with experience in IT auditing, compliance, security and risk management. He has a significant amount of experience SSAE 18 attestations (SOC 1/2/3), IT vendor management and compliance assurance program management. David focuses on building proactive compliance programs for organizations with legal and regulatory requirements.

David Walterrmire
David Walterrmire

Lead, Standards and Outreach for the Security Automation Program; Technical Lead, Open Security Controls Assessment Language  National Institute of Standards and Technology

View

David Walterrmire
Debbie Christofferson
Debbie Christofferson

 

View

Debbie Christofferson

Fortune 500 enterprise wide Information Security Manager with experience across the US, Europe and Asia. Strategic security leader and consultant with broad comprehensive security and risk management experience. Know security from the ground up and what it takes to succeed. Certifications: CISSP, CISM. Strong collaborator and high energy leader. 2018 book published: “Women in Security”. Debbie also has facilitated CISM certification exam prep workshops since 2005, and speaks and writes on cyber security. She leads as an International Board Director and Distinguished Fellow for Information Systems Security Association (ISSA); Chairs the board's CISO Advisory Council for the CISO Executive Forum. Debbie is co-founder of the local Cloud Security Alliance chapter.

Dr. Branden Williams
Dr. Branden Williams

Director, Cyber Security Union Bank

View

Dr. Branden Williams
Dr. Curtis Campbell
Dr. Curtis Campbell

VP, Manager of IT Procurement and Vendor Management Atlantic Capital Bank

View

Dr. Curtis Campbell

Dr. Curtis Campbell is a 28 year Cybersecurity, Compliance, and IT professional chartered with accountability and oversight of Procurement, Risk and Compliance, and Vendor Management strategies based on balancing risk, compliance, profitability and value add. She works with executive leadership to define strategic change management, developing recommendations related to processes and standards. Dr. Campbell believes communication with Lines of Business by helping others understand technical solutions in familiar terms fosters good relationships and serves to strengthen internal teams. Her experience includes governance, risk, and compliance in vendor relationships. As Manager of Atlantic Capital’ Vendor Management Program, Dr. Campbell drives best practices in information security evaluation, and risk management for third party relationships in a regulatory environment. Her experience includes writing policies and procedures and assessing and monitoring risk in regulatory environments. Dr. Campbell is a thought leader on cybersecurity and the human connection between trust and unintentional insider threats in an ever-changing cybersecurity footprint. She has published research and journal articles on cybersecurity. Recent publications include: “Solutions for Counteracting Human Deception in Social Engineering Attacks”; “Securing the Remote Employee: Protecting the Human Endpoint in the Cybersecurity Environment”; and “Securing the Vendor: Changing the Dynamic of the Infosec Relationship”. She holds Bachelor and Master’s degrees from the University of TN and a Doctorate in Organizational Leadership in Information Systems Technology.

Dr. Shawn Murray
Dr. Shawn Murray

Principal Scientist US Missile Defense Agency

View

Dr. Shawn Murray

Dr. Murray is a Principal Scientist at the US Missile Defense Agency and is a Director on the International Board for ISSA International. He has worked with the FBI, CIA, NSA in various rolls supporting cybersecurity initiatives globally. He is also the CEO and Chief Academic Officer for Murray Security Services. He has over 20 years of experience in IT and Cybersecurity.

Faraz Aladin
Faraz Aladin

Director, Product Marketing Illumio

View

Faraz Aladin

Faraz Aladin is part of Illumio’s product and technical marketing team. He has more than 25 years of industry experience having worked at industry leaders as well as start-ups. His subject matter expertise spans across Networking & Cloud Infrastructure, Data Center Architectures, Security and Collaboration technologies. He is a CCIE and holds an engineering degree from Bombay University.

Felice Flake
Felice Flake

CEO ScySec LLC

View

Felice Flake

Felice Flake, Candidate, MBA, MSci, B.A., CEO of ScySec LLC, is a highly sought after and proven leader in the security field. Felice has extensive experience in both the government and private sectors. She is the President of the Tampa Bay ISSA Chapter, and the Chairperson of the International Chapters Sub-Committee, ISSA International, Chairperson. She also serves as the Chairperson of the Scholarships & Awards Committee, Women in Defense-Central Florida Chapter, and the Peerlyst Tampa Ambassador. Some of Felice’s most recent speaking engagements include the Tampa Small Business Symposium, Tampa (ISC)2 B-Sides event, and the 2018 Women in Cybersecurity Conference (WiCyS) Conference in Chicago. She is a contributing author to the 2016 book, Women in Security. Felice is a member of the National CyberWatch Center's Curriculum Standards Panel (NCC-CSP) for the Cybersecurity Foundation Series. Felice is also an invited member of the University of South Florida Cybersecurity Education Advisory Board, the Tampa Military Spouse Economic Empowerment Zone (MSEEZ) Working Group, and the University of South Florida Cybersecurity for Executives Advisory Committee. She is also a nominee for the “2018 Tampa Bay Business Woman of the Year” Award and serves on the leadership team for the 2018 Diana Initiative Conference co-located with DEFCON.

Gordon Shelvin
Gordon Shelvin

President and Chief Scientist  Security and Analytics, LLC

View

Gordon Shelvin

Gordon W. Skelton, CISSP, PhD, Computer Science, University of South Africa. Extensive experience in software development, cyber security, data analytics. Served as VP for IS, Mississippi Valley Title Insurance, adjunct professor at Belhaven College, University of Mississippi’s Telecommunications Graduate Program, full professor in the ECE Department, Jackson State University. Taught computer programming, data analytics, cyber security courses, directed research for US Army Space and Missile Command, US Department of Homeland Security, and US Army Corps Engineer Research and Development Center (ERDC). Lead Investigator cyber security and data analytics. 2017 established Security and Analytics, LLC, concentrating on cyber security data analytics.

Guy Fillippelli
Guy Fillippelli

Vice President of user and Data Security Forepoint

View

Guy Fillippelli

Guy Filippelli is VP Solutions for Forcepoint’s Insider Threat and Data Security business. An experienced software entrepreneur, Guy has 15 years of experience building software teams to solve some of the world’s most challenging data and integration problems, most recently as Founder and CEO of RedOwl, which was acquired by Forcepoint in August 2017. Prior to RedOwl, Guy co-founded Berico Technologies, a high-end engineering firm that services the federal government, and launched Oxpoint Holdings, an investment arm that has invested in and incubated multiple private ventures. In 2007, Guy received the National Intelligence Medallion, the nation’s highest award for non-governmental personnel, for his efforts in Iraq as the analytic lead of NSA’s RT-RG program.

Jeff Neithercutt
Jeff Neithercutt

Cyber Security and Law Enforcement Expert Public Consulting Group

View

Jeff Neithercutt
Jeffrey Man
Jeffrey Man

InfoSec Curmudgeon Online Business Systems

View

Jeffrey Man
Juan Asenjo
Juan Asenjo

Senior Manager for Solutions Marketing Thales eSecurity

View

Juan Asenjo

Juan Asenjo, Ph.D., CISSP has worked in the information security field for over 25 years – in government, military, and the private sector. As Senior Manager for Solutions Marketing at Thales eSecurity, he brings to market and evangelizes cryptographic integrations with technology partner solutions, focusing on identity management, authentication, and encryption. Holding a Ph.D. in Information Science, a Masters’ in Business, and a Bachelors’ in Engineering, he helps technology companies reach more customers with integrated solutions that reduce risk and enhance security.

Ken Dunham
Ken Dunham

Senior Director of Technical Cyber Threat Intelligence Optiv

View

Ken Dunham

Ken Dunham brings more than 28 years of business, technical and leadership experience in cyber security, incident response and cyber threat intelligence to his position as senior director of technical cyber threat intelligence for Optiv. In this role, he is responsible for the strategy and technical leadership to mature Optiv’s data integration and innovation of intelligence-based security solutions. He also runs his own advanced intelligence response company, 4D5A Security LLC, and a non-profit for incident responders around the world called Rampart Research. Mr. Dunham has a long history of innovation for nascent technologies and solutions such as creation of training programs for U2, Warthog, and Predator systems for the USAF, responsible disclosure (iDEFENSE), and cyber threat intelligence (iSIGHT Partners). He is a widely published author with thousands of security articles and multiple books on topics ranging from Darknet disclosures to mobile threats and mitigation of malware.

Kenneth Geers
Kenneth Geers

Chief Research Scientist Comodo Cybersecurity

View

Kenneth Geers

Kenneth Geers (PhD, CISSP): Comodo Cybersecurity Chief Research Scientist, NATO Cyber Centre Ambassador, Atlantic Council Senior Fellow, Digital Society Institute-Berlin Affiliate. 20 years US Government (US Army, NSA, NCIS, NATO). Author “Strategic Cyber Security”, Editor “Cyber War in Perspective”, Editor “The Virtual Battlefield”, Technical Expert “Tallinn Manual”, many articles and chapters on international and cyber security.

Kevin Bocek
Kevin Bocek

 

View

Kevin Bocek
Larry Homoth
Larry Homoth

Director of Sales SecurityIQ

View

Larry Homoth

Larry Homuth is Director of Sales for SecurityIQ, InfoSec Institute’s security awareness training and phishing simulation solution. Larry has provided engineering product development professional services consulting for the largest names in consumer electronics, energy, and aerospace and defense. Additionally, Larry has guided implementation of enterprise software systems for quality and inspection management at 4 of the 5 largest pharmaceutical organizations globally. Based in Madison, Larry consults on business process automation and regulatory compliance through the deployment of SaaS solutions.

Loren Roberts
Loren Roberts

 

View

Loren Roberts
Marci McCarthy
Marci McCarthy

 

View

Marci McCarthy
Mark Weatherford
Mark Weatherford

SVP, Chief Cybersecurity Strategist vArmour

View

Mark Weatherford

Mark Weatherford is SVP and Chief Cybersecurity Strategist at vArmour. He has more than 20 years of security operations leadership and executive-level policy experience in some of the largest and most critical public and private sector organizations in the world. Prior to vArmour, he was a Principal at The Chertoff Group an in 2011, was appointed by President Obama as the DHS’s first Deputy Under Secretary for Cybersecurity. Before DHS, he was VP and Chief Security Officer at the North American Electric Reliability Corporation (NERC). Prior to NERC, he was appointed by Governor Schwarzenegger as California’s first Chief Information Security Officer (CISO) and was also the first CISO for the State of Colorado. A former U.S. Navy cryptologist, Mr. Weatherford led the United States Navy’s Computer Network Defense operations and the Naval Computer Incident Response Team. Mr. Weatherford holds a master’s degree from the Naval Postgraduate School and holds the CISSP certification. He was awarded SC Magazine’s “CSO of the Year” award in 2010, named one of the “10 Most Influential People in Government Information Security” by GovInfoSecurity in both 2012 and 2013, selected for the 2013 CSO Compass Award, and presented the 2017 SC Media Reboot ‘Influencer’ Leadership Award.

Marnie Wilking
Marnie Wilking

CISO Orion Health

View

Marnie Wilking
Mary Ann Davidson
Mary Ann Davidson

CSO Oracle

View

Mary Ann Davidson

Mary Ann Davidson is the chief security officer at Oracle, responsible for Oracle software security assurance. She represents Oracle on the board of directors of the Information Technology Information Sharing and Analysis Center (IT-ISAC), and serves on the international board of the Information Systems Security Association (ISSA). She has been named one of Information Security’s top five "Women of Vision," is a Federal 100 Award recipient from Federal Computer Week, and was recently named to the ISSA Hall of Fame. Davidson has served on the Defense Science Board and was a member of the Center for Strategic and International Studies Commission on Cybersecurity for the 44th Presidency. She has testified on cybersecurity to the US House of Representatives (Energy and Commerce Committee, Armed Services Committee, and Homeland Security Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology), and the US Senate Committee on Commerce, Science, and Technology. Davidson has a BS in mechanical engineering from the University of Virginia and an MBA from the Wharton School of the University of Pennsylvania. She received the Navy Achievement Medal when she served as a commissioned officer in the US Navy Civil Engineer Corps.

Matthew Dobbs
Matthew Dobbs

CTO - X-Force Command Center IBM Security

View

Matthew Dobbs
Michael Angelo
Michael Angelo

Chief Security Architect Microfocus/NetIQ

View

Michael Angelo

Michael F. Angelo CRISC, CISSP has over 30 years of information assurance experience. Michael has served as a trusted security advisor and security architect with leading corporations and government entities. He has acted as a technical adviser in the development of US national and international export controls. Currently chairs the ISSA International Webinar committee. Amongst his accomplishments he is an ISSA Fellow, and is named on the ISSA Hall of FAME for his contributions to the security community. In addition, he currently holds 61 US Granted Patents. His current work encompasses certifications, SDL, Threat Modeling, AppSec / DevOPS, as well as and Software Supply Chain analysis. Michael is a veteran moderator and has appeared at numerous International conference and in a multitude of International Web Conferences.

Michael Melore CISSP
Michael Melore CISSP

Cyber Security Advisor  IBM

View

Michael Melore CISSP
Michael Raggo
Michael Raggo

CSO 802 Secure, Inc.

View

Michael Raggo
Michael Wylie
Michael Wylie

Security Consultant Corporate Blue

View

Michael Wylie
Michaela Iorga
Michaela Iorga

Senior Security Technical Lead for Cloud Computing National Institute of Standards and Technology

View

Michaela Iorga
Paul Flanagan
Paul Flanagan

Assistant Professor of Law Drexel Law School

View

Paul Flanagan
Rachael Lyon
Rachael Lyon

Chief Scientist Forcepoint

View

Rachael Lyon
Reg Harnish
Reg Harnish

CEO GreyCastle Security

View

Reg Harnish

Reg Harnish is the CEO of GreyCastle Security, a leading cybersecurity risk assessment, advisory and mitigation firm headquartered in Troy, New York. Under his leadership, the company has experienced six consecutive years of triple-digit growth and countless industry accolades.

Ricardo Johnson
Ricardo Johnson

Sr. Director, Security, Risk & Compliance CrowdStrike

View

Ricardo Johnson

Ricardo Johnson, Sr. Director of Security, Risk and Compliance for CrowdStrike Inc., has more than 18 years of experience in the fields of privacy, information security and risk. Previously, he served as the Director of Global Compliance for Ryder, where some of his responsibilities included overseeing privacy and security compliance for the company’s inaugural BYOD, mobile marketing, social media and cloud migration programs, along with other regulatory mandates such as export controls and Anti-bribery and PCI. Prior to Ryder, Ricardo served as the Chief Privacy & IT Compliance Officer for Burger King Corporation. Ricardo has also been a guest speaker on privacy, security and risk topics at the Visa PCI Symposium, WorldCompliance Summit, IAPP, Cloud Security Alliance (CSA), Institute of Internal Auditors (IIA) and Compliance Elliance.

Rick Redman
Rick Redman

Senior Security Consultant KoreLogic Inc.

View

Rick Redman
Sam Pickles
Sam Pickles

Co-Founder and CTO RedShield Security

View

Sam Pickles

Sam Pickles has provided IT and security services for banking, government and service provider clients for over seventeen years across Europe, Asia Pacific and the United States. During this period, Sam built and ran some of the world’s largest web application firewall gateways, conducted penetration testing of networks, applications and hardware devices and currently focuses on advanced techniques for web application vulnerability shielding.

Sandy Carielli
Sandy Carielli

Director of Security Technologies Entrust Datacard

View

Sandy Carielli
Timothy Kosiba
Timothy Kosiba

Chief, Computer Network Operations NSA

View

Timothy Kosiba

Mr. Kosiba is the Chief of Computer Network Operations (CNO). Prior to his arrival, he was the Deputy Director of the NSA/CSS Commercial Solutions Center (NCSC) and the Chief of the Network Solutions Office within the NCSC. He was the Chief of the Special US Liaison Officer (SUSLOC) in Canberra, Australia from June 2012 to July 2015. Mr. Kosiba has 29 years of Federal Government service with the last 21 years in technical management/leadership positions. During his career at NSA, he has served in technical leadership positions requiring collaboration responsibilities with domestic and foreign government representatives. Mr. Kosiba was selected for the Defense Intelligence Senior Level (DISL) Service position in March 2012. Prior to being assigned as the SUSLOC, Mr. Kosiba served as the Technical Director for the Requirements and Targeting (R&T) Office in the Tailored Access Operations (TAO) organization at the National Security Agency from August 2010 to June 2012. Prior to that tour, he served as the Plans and Policy Technical Director for USCYBERCOM, and as the Technical Director for the Joint Functional Component Command for Network Warfare (JFCC-NW) from December 2007 to August 2010. Mr. Kosiba has frequently represented NSA and USCYBERCOM at The White House and other government sponsored deliberations relating to cyber activities.

Tracy Reinhold
Tracy Reinhold

Chief Security Officer Everbridge

View

Tracy Reinhold
Tyler Cohen Wood
Tyler Cohen Wood

Executive Director Cyber Workforce Program CyberVista

View

Tyler Cohen Wood

Tyler Cohen Wood is a cyber-authority with 18 years of highly technical experience, 13 of which were spent working for the Department of Defense (DoD). As a cyber, Intelligence, national security expert, author and public speaker, she is relied on to provide unique insight into cyber threats, cyber warfare, mitigating cyber risk, national security, and ensuring industries have the tools they need to defend themselves in the digital world. Tyler sits on several cyber advisory boards, including CyberSat and The Internet of Things Consortium.

Winn Schwartu
Winn Schwartu

‘Founder The Security Awareness Company’

View

Winn Schwartu

The Keynote Seminars

  • Wed 17th Oct 08:30 - 10:00
  • HOW HACKERS ATTACK AND HOW TO FIGHT BACK: With Live Hacking Demonstrations of the Current Threats to You and Your Organization Kevin Mitnick  |   Mitnick Security  |   The Keynote

    The Keynote Theatre

    Wed 17th Oct 08:30 to 10:00

    HOW HACKERS ATTACK AND HOW TO FIGHT BACK: With Live Hacking Demonstrations of the Current Threats to You and Your Organization

    It takes one to know one.

    People are the weakest link. They can be manipulated or influenced into unknowingly helping hackers break into their organization’s computers. You’ll learn how easily you can be an unsuspecting victim who can be manipulated into handing over the keys the kingdom, if you haven’t done so already. In this engaging and demonstration-rich experience, Kevin Mitnick illustrates how a hacker’s thought process works and how they ply their tradecraft. You just might realize that you—like almost everyone else on the planet—have a misplaced reliance on security technology, which has now become ineffective against a motivated hacker using a technique called "social engineering."

    Kevin is uniquely qualified to take you inside the mind of a hacker, as it takes one to know one. He was once the FBI’s Most Wanted, although he never stole for profit or damaged systems. He is the most elusive computer break-in artist in history because he hacked into the NSA and more than 40 major corporations just for the fun and adventure.  Kevin is `now a trusted security consultant to Fortune 500 companies and governments worldwide, and he leads the world’s top security penetration testing team and they maintains a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into using a combination of technical exploits and social engineering. 

    Kevin is the worldwide authority on social engineering and constantly improves and updates this highly effective and acclaimed "security awareness" presentation that illustrates the latest threats and risks most people don’t even know exist.

    Speaker

    Photo Speaker Name Profile
    Kevin Mitnick Kevin Mitnick View Profile
  • Wed 17th Oct 10:10 - 10:40
  • A New Approach to Managing Digital Risk Rohit Ghai  |   RSA (a Dell Technologies Business)  |   The Keynote

    The Keynote Theatre

    Wed 17th Oct 10:10 to 10:40

    A New Approach to Managing Digital Risk

    Technology continues to propel entire industries through digital transformations, escalating digital risk, and prompting questions from the C-suite, the BOD, regulators and policy makers. Cyber-risk is the largest facet of digital risk we face going forward. Since cybersecurity is now squarely a business issue; it needs to be managed as such. A business-driven approach to managing digital risk entails taking a risk orientation to designing and operating your security operations. This approach is the only way to ensure that technologies like machine learning and data continue to propel us to our digital future.
     

    Speaker

    Photo Speaker Name Profile
    Rohit Ghai Rohit Ghai View Profile
  • Wed 17th Oct 11:30 - 12:00
  • AI-Based Autonomous Response: Are Humans Ready?

    The Keynote Theatre

    Wed 17th Oct 11:30 to 12:00

    AI-Based Autonomous Response: Are Humans Ready?

    Global ransomware attacks like WannaCry already move too quickly for humans to keep up, and even more advanced attacks are on the horizon. Cyber security is quickly becoming an arms race — machines fighting machines on the battleground of corporate networks. Algorithms against algorithms.
     
    Artificial intelligence-based cyber defense can not only detect threats as they emerge but also autonomously respond to attacks in real time. As the shortage of trained cyber analysts worsens, the future of security seems to be automatic. But are humans ready to accept the actions machines would take to neutralize threats? In this presentation, we will discuss our lessons learned and explore several use-cases in which autonomous response technology augmented human security teams.

  • Wed 17th Oct 01:00 - 01:30
  • Cloud Security: Adopt Zero Trust by Putting Asset-Level Safeguards in Place John Summers   |   Akamai   |   The Keynote

    The Keynote Theatre

    Wed 17th Oct 01:00 to 01:30

    Cloud Security: Adopt Zero Trust by Putting Asset-Level Safeguards in Place

    Information systems security is intended to protect assets that matter – infrastructure, data, applications, and users. But network perimeters are permeable, and assets are increasingly distributed in the cloud. Today's challenge is to implement security policies and controls that are effective, consistent, and portable to wherever the assets are. John Summers will discuss how to take security to the next level with zero trust approaches that raise visibility, protect key assets, simplify network and infrastructure management, and enable fast-paced digital business.

    Speaker

    Photo Speaker Name Profile
    John Summers John Summers View Profile
  • Wed 17th Oct 01:40 - 02:10
  • Brain Wars: Simple Cyber Terrorism Life Hacks for Everyday People

    The Keynote Theatre

    Wed 17th Oct 01:40 to 02:10

    Brain Wars: Simple Cyber Terrorism Life Hacks for Everyday People

    Explicitly designing cyberterrorist attacks that bypass physical harm to individuals and focus on their psychological aspects are here to stay. These types of cyberattacks are deemed as less harmful types of cyberattacks or cybercrime as opposed to non-lethal cyberterrorism. The perception of disruption associated with these types of cyberattacks is much lower than cyberterrorism attacks resulting in actual physical damage. Exploiting human vulnerabilities is easier than exploiting system vulnerabilities and the potential outcome of such cyberattacks is grossly underestimated. Humans are the critical infrastructure of society and the effects of phycological disruption can outweigh the effects of physical harm.

  • Wed 17th Oct 02:20 - 02:50
  • Shifting the Human Factors Paradigm in Cybersecurity Dr. Calvin Nobles  |     |   The Keynote

    The Keynote Theatre

    Wed 17th Oct 02:20 to 02:50

    Shifting the Human Factors Paradigm in Cybersecurity

    This presentation emphasizes the need to break the inertia regarding human factors in cybersecurity by leveraging organizational platforms to educate and address human-centric problems in cybersecurity. Shifting the paradigm on human factors in cybersecurity centers on developing an executive-led platform to address (a) human-centered cybersecurity approaches, (b) the need for human factors assessments, (c) increased appreciation for humans factors as a science, and (d) human derailments in information security. Cybersecurity leaders and practitioners continue to admire the human factors problem without exploring the root-level causes of human-enabled mistakes. One way to address human factors is through an organizational platform. 

    Speaker

    Photo Speaker Name Profile
    Dr. Calvin Nobles Dr. Calvin Nobles View Profile
  • Wed 17th Oct 03:00 - 03:50
  • Providing Access as well as Protection in a Hyper-Connected World

    The Keynote Theatre

    Wed 17th Oct 03:00 to 03:50

    Providing Access as well as Protection in a Hyper-Connected World

    As employees and customers demand improved connectivity, mobile solutions and instant access to information, IT leaders face the issue of privacy in an increasingly connected world. How should CIOs think differently to better protect valuable corporate assets while providing access and service? In this session, Ryan Loy surveys the current digital landscape, offering an overview of behavioral risks to security, mitigation strategies and key questions to benchmark yourself and your organization. Learn how to break away from traditional methods and embrace the societal shift toward a digital generation.

  • Thu 18th Oct 08:30 - 09:20
  • Panel: What happened Atlanta? Tech Leaders  |  The Keynote

    The Keynote Theatre

    Thu 18th Oct 08:30 to 09:20

    Panel: What happened Atlanta?

    In March of this year the city of Atlanta was hit by a Ransomware attack that crippled many of the city’s services and programs. The exact monetary cost of the attack is yet to be accurately assessed however it is thought to be in the millions. In this lively discussion find the answers to the questions that dominate the aftermath.

    What is Ransomware and why is it so dangerous?

    • Is it ever acceptable to pay a ransom?
    • Why did it take so long to get Atlanta up and running again?
    • Are we going to see a similar attack in another US city?
    • Can Atlanta now be confident that a similar attack will never occur again?

    Speakers

    Photo Speaker Name Profile
    Brandon Helms Brandon Helms View Profile
    DeBrae Kennedy-Mayo DeBrae Kennedy-Mayo View Profile
    Elizabeth Wharton Elizabeth Wharton View Profile
    Madison Hogan Madison Hogan View Profile
    Wes Knight Wes Knight View Profile
  • Thu 18th Oct 09:30 - 10:00
  • The Most Stressful CIO job in the World – being CIO of the Clinton White House Mark Gelhardt  |   Gelhardt Group, LLC   |   The Keynote

    The Keynote Theatre

    Thu 18th Oct 09:30 to 10:00

    The Most Stressful CIO job in the World – being CIO of the Clinton White House

    Colonel Mark Gelhardt is the Former CIO of The White House during President Clinton's administration. He will talk about what it takes to handle the most stressful CIO job in the world. Working so closely with President Clinton, Colonel Gelhardt has a rare insight to the inner working of the White House, and the outstanding military support provided to the Commander-in-Chief. He has some great stories that he will share from his book “My Time at the Clinton White House”.

    Speaker

    Photo Speaker Name Profile
    Mark Gelhardt Mark Gelhardt View Profile
  • Thu 18th Oct 10:50 - 11:20
  • Cybersecurity and Data Breaches from a Business Lawyer’s Perspective Kathy Winger  |   Law Offices of Kathy Delaney Winger  |   The Keynote

    The Keynote Theatre

    Thu 18th Oct 10:50 to 11:20

    Cybersecurity and Data Breaches from a Business Lawyer’s Perspective

    The session covers recent data breach cases, the significant change to the legal landscape that is occurring in the cybersecurity and data breach arena and the fact that no company, whether small, medium or large, is immune from liability. It  discusses current and future cybersecurity/data breach legislation and the FTC’s role in regulatory and enforcement actions related to cybersecurity and data breaches. It covers steps that businesses can take to protect themselves before, during and after a data breach and the legal significance of cybersecurity best practices. Finally, it discusses liability for third party vendor breaches and the ins and outs of cyber insurance.  

    Speaker

    Photo Speaker Name Profile
    Kathy Winger Kathy Winger View Profile
  • Thu 18th Oct 11:30 - 12:00
  • How to Rob a Bank over the Phone Joshua Crumbaugh  |   PeopleSec  |   The Keynote

    The Keynote Theatre

    Thu 18th Oct 11:30 to 12:00

    How to Rob a Bank over the Phone

    This talk is 50% real audio from a social engineering engagement and 50% lessons learned from the call. During this call, Joshua talks a VP at a bank into giving up full access to his computer and eventually facilities. At one point during the call, the antivirus even triggers. This is an intense call with a ton of valuable lessons for any social engineer or defender looking to enhance tradecraft or better detect social engineering attacks.

    Speaker

    Photo Speaker Name Profile
    Joshua Crumbaugh Joshua Crumbaugh View Profile
  • Thu 18th Oct 01:00 - 01:30
  • The Confluence Of Data Security Challenges

    The Keynote Theatre

    Thu 18th Oct 01:00 to 01:30

  • Thu 18th Oct 01:40 - 02:10
  • In Praise of Private Clouds: A Case Study Robert Gibbons  |   Datto  |   The Keynote

    The Keynote Theatre

    Thu 18th Oct 01:40 to 02:10

    In Praise of Private Clouds: A Case Study

    Robert Gibbons, Datto’s CTO, will discuss the security and infrastructure advantages of migrating data from a public to a private cloud based on his own experience. Having recently transferred 12 PB of data out of Amazon Web Service, Gibbons will discuss the motivations, challenges, and lessons learned from moving billions of SaaS data objects, one of the largest data migrations in history.

    Speaker

    Photo Speaker Name Profile
    Robert Gibbons Robert Gibbons View Profile
  • Thu 18th Oct 02:20 - 02:50
  • Panel The Year Ahead Tech Leaders  |  The Keynote

    The Keynote Theatre

    Thu 18th Oct 02:20 to 02:50

    Panel The Year Ahead

    As little as 5 years ago Cyber Security Breaches were seen as a relatively rare occurrence however we now see major breaches reported on a weekly and sometimes even daily basis. This trend does not seem to be slowing so what do we need to be mindful of in the year ahead?

    Join a team of experts for a in depth discussion about what security managers need to be mindful of in the year ahead

    Speakers

    Photo Speaker Name Profile
    Cameron Armstrong Cameron Armstrong View Profile
    Chris Calvert Chris Calvert View Profile
    IJay Palansky IJay Palansky View Profile
    Peter Chestna Peter Chestna View Profile
    Wes Knight Wes Knight View Profile
Top