2018 Speakers

2019 speakers will be announced soon.

Kevin Mitnick
Kevin Mitnick

Chief Executive Officer Mitnick Security

View

Kevin Mitnick

Kevin is the world's most famous hacker, bestselling author, and the top cyber security speaker. Once one of the FBI's Most Wanted because he hacked into 40 major corporations just for the challenge, Kevin is now a trusted security consultant to the Fortune 500 and governments worldwide. Kevin and The Global Ghost Team™ now maintain a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into using a combination of technical exploits and social engineering.

Kevin's presentations are akin to "technology magic shows" and include live demonstrations of the latest hacks and cyber threats.

Andrew Tsonchev
Andrew Tsonchev

Director of Technology, Darktrace Industrial Darktrace

View

Andrew Tsonchev
Dr. Calvin Nobles
Dr. Calvin Nobles

Cybersecurity Professional / Strategist 

View

Dr. Calvin Nobles
Dr. Gordon Skelton
Dr. Gordon Skelton

President Security and Analytics, LLC

View

Dr. Gordon Skelton
Rohit Ghai
Rohit Ghai

President  RSA (a Dell Technologies Business)

View

Rohit Ghai

Rohit Ghai most recently served as president of Dell EMC’s Enterprise Content Division (ECD), where he was instrumental in setting a compelling vision, transforming go-to-market and revitalizing the portfolio for the digital era through strategic partnerships and acquisitions.  Ghai was responsible for all aspects of the ECD business, including setting strategic vision, sales and services, channel strategy, product development, marketing, finance, support and customer success. 

Previously, Ghai was chief operating officer of ECD, and responsible for the division's strategy, development and marketing of all products and solutions. He joined EMC in December 2009 to run product development.

He has more than 20 years of experience in IT in both startup and big company settings, with expertise in digital transformation in highly regulated markets, and knowledge across software, and systems and security.  Ghai joined Dell EMC from Symantec, where he held a variety of senior engineering and general management roles. Previously, he was at Computer Associates in a number of senior management roles in the BrightStor and eTrust business units, and led the CA India operations as chief technology officer. Ghai joined CA through the acquisition of Cheyenne Software – a startup in the backup and data protection space. 

Ghai holds a master’s degree in Computer Science from the University of South Carolina and a bachelor's degree in Computer Science from the Indian Institute of Technology (IIT), Roorkee.  

Mark Gelhardt
Mark Gelhardt

VP, Global Technology Governance  Gelhardt Group, LLC

View

Mark Gelhardt

Colonel Gelhardt has had a long successful Army career, the pinnacle of his success was being nominated and selection to work at the White House as the CIO/CISO equivalent, supporting President Clinton, the VP, the White House Staff, and the U.S. Secret Service managing all the classified automation and telecommunications. Colonel Gelhardt is a combat veteran.

Since retiring from the service Mark has held multiple leadership positions in IT and InfoSec.  CIO/CSO for World Airways – the largest US wide body long-hall charter airline.  CTO (Global Operations)/CISO for InterCall - the world’s largest conferencing company.  Chief Information Security Officer for TravelClick - a Software as a Service company in the hospitality space.  Consulted as the Interim CISO for the Georgia Lottery & NCR.  Currently Mark is the VP, Global Technology Governance for US Bank/Elavon – Elavon is fifth largest credit card processor.

Mark is the author of “My time at the Clinton White House” which was published the summer of 2018.  Mark’s second and third books are in the making.  Mark’s honors include being a published author, a key note speaker, and panel member in the IT, InfoSec, and political areas.  Mark has been awarded CISO of the year finalist 2013, Global CISO of the year finalist 2014, and a National InfoSec Project award winner in 2013 and a finalist InfoSec Project award winner in 2015.  Marks military honors include the Presidential Service Badge, the Legion of Merit, the Soldiers Medal (highest peace time valor award) and more.

Cameron Armstrong
Cameron Armstrong

Director of Channel Sales Darktrace

View

Cameron Armstrong
David Masson
David Masson

Director of Enterprise Cyber Security Darktrace

View

David Masson

David Masson is Darktrace’s Director of Enterprise Cyber Security and has over two decades of experience working in fast moving security and intelligence environments in the UK, Canada and world-wide. With skills developed in the civilian, military and diplomatic worlds, he has been influential in the efficient and effective resolution of various unique national security issues. Dave is an operational solutions expert and has a solid reputation across the UK and Canada for delivery tailored to customer needs. In recent years he has advised many government institutions on Insider Threat, helping them to reduce their vulnerability and level of risk. He holds a Master's degree from Edinburgh University.

IJay Palansky
IJay Palansky

Partner Armstrong Teasdale, LLP

View

IJay Palansky
Patrick Gray
Patrick Gray

IT Security Consultant 

View

Patrick Gray
Ryan Loy
Ryan Loy

Chief Information Officer  EBSCO

View

Ryan Loy
DeBrae Kennedy-Mayo
DeBrae Kennedy-Mayo

Research Faculty Member  Georgia Institute of Technology

View

DeBrae Kennedy-Mayo

DeBrae Kennedy-Mayo is a Research Faculty Member at the Georgia Institute of Technology, where she engages in research on legal and policy issues concerning cybersecurity and privacy. Peter Swire and Kennedy-Mayo are the co-authors of the 2018 edition of U.S. Private Sector Privacy: Law and Practice for Information Privacy Professionals, IAPP’s book used by those studying for privacy certification. With Swire, Kennedy-Mayo also co-authored the 2017 Emory Law Journal article entitled, “Why Both the EU and US are ‘Stricter’ than Each Other for the Privacy of Government Requests for Information.” This article examined privacy protections provided in EU law as well as those that exist in US law.

Kennedy-Mayo has been an attorney for 15 years. She has spent most of her career working in government, acting as both an Assistant Attorney General for the State of Georgia and as an Assistant District Attorney in several Georgia counties. Kennedy-Mayo’s first professional paper was entitled “In Search of a Balance Between Police Power and Privacy in the Cybercrime Treaty.” The paper was published in the Richmond Journal of Law and Technology in 2002.

Kennedy-Mayo graduated with honors from Emory’s School of Law in 2001. She currently lives in Savannah with her husband, Garrett, and her two sons.

Robert Gibbons
Robert Gibbons

Chief Technology Officer Datto

View

Robert Gibbons

Robert is responsible for managing Datto’s development and infrastructure initiatives in support of its comprehensive data backup and protection platform.

Prior to Datto, Robert spent 15 years as a software engineer and CTO leading teams of developers building high-uptime enterprise applications for Fortune 500 clients, including building one of the highest trafficked web advertising distribution networks and an enterprise digital asset management system deployed to thousands of end-users.

Robert holds a B.S. in Policy Analysis and Management from Cornell University, a J.D. from Fordham University, and an M.S. in Computer Science from New York University.

John Summers
John Summers

VP & Chief Technology Officer Akamai

View

John Summers

John oversees the security and technology strategy for Akamai’s web security and web performance solutions.  He is a frequent speaker on the topics of Internet threats, enterprise security and the digital transformation of enterprise infrastructures to become more secure and resilient in the cloud-first, SaaS-first, mobile-first world we live in today.

Prior to his current role, John led the development of Akamai’s Enterprise Security and Web Security products which consist of cloud-based threat protection, identity and access management, web application security and DDoS defense services that leverage Akamai’s unique distributed computing platform to provide a global layer of security that scales on demand. John is a patent holder on Akamai’s distributed web application firewall technology.

John joined Akamai to manage the Web Acceleration products from 2007 until 2011, during which time that business grew 30 fold.

Prior to Akamai, John led Managed Security Services businesses at Unisys and at Genuity.

John holds degrees in physics and computer science from the University of Pennsylvania.  He was a member of the 1980 U.S. Olympic Team and a three time U.S. National Ice Dance Champion.

Diana Candela
Diana Candela

Associate Director, Security & Privacy Protiviti

View

Diana Candela
Kathy Winger
Kathy Winger

Attorney at Law Law Offices of Kathy Delaney Winger

View

Kathy Winger
Peter Chestna
Peter Chestna

Director of Developer Engagement Veracode

View

Peter Chestna

As Director of Developer Engagement, Pete provides customers with practical advice on how to successfully roll out developer-centric application security programs. Relying on more than 10 years of direct AppSec experience as both a developer and development leader, Pete provides information on best practices amassed from working with Veracode’s 1,000+ customers.

Brian Contos
Brian Contos

CISO & VP Technology Innovation Verodin

View

Brian Contos
Joshua Crumbaugh
Joshua Crumbaugh

Chief Hacker/CEO PeopleSec

View

Joshua Crumbaugh

Joshua Crumbaugh is an engaging and internationally respected cybersecurity subject matter expert, author, keynote and public speaker. During Joshua's ethical hacking career he has never encountered a single network that could keep him or his teams out. He has also accomplished a number of impressive social engineering feats, such as: talking his way into bank vaults, fortune 500 data centers, corporate offices, restricted areas of casinos and more. His experience in all things security led him to realize something had to change. This was the catalyst that led him to found PeopleSec where he is the CEO and Chief Hacker. Joshua is internationally recognized as one of the world's most accomplished social engineers and the world's leading expert on cybersecurity awareness.

Rod Simmons
Rod Simmons

Director of Product Management  BeyondTrust

View

Rod Simmons
Tal Melamed
Tal Melamed

Head of Security Research  Protego Labs

View

Tal Melamed
Joe Gray
Joe Gray

Founder, Blogger, & Podcaster Advanced Persistent Security

View

Joe Gray

Joe Gray joined the U.S. Navy directly out of High School and served for 7 years as a Submarine Navigation Electronics Technician. Joe is currently a Senior Security Architect and maintains his own blog and podcast called Advanced Persistent Security. In his spare time, Joe enjoys attending information security conferences, contributing blogs to various outlets, training in Brazilian Jiu Jitsu (spoken taps out A LOT!), and flying his drone. Joe is the inaugural winner of the DerbyCon Social Engineering Capture the Flag (SECTF) and was awarded a DerbyCon Black Badge. Joe has contributed material for the likes of AlienVault, ITSP Magazine, CSO Online, and Dark Reading.

Tony Perri
Tony Perri

CMO Perri Marketing, Inc.

View

Tony Perri
Timo Tiitinen
Timo Tiitinen

Sr. Sales Engineer Forcepoint

View

Timo Tiitinen
Ryan Spelman
Ryan Spelman

Senior Director, Business Development Center for Internet Security

View

Ryan Spelman
Ado Kukic
Ado Kukic

Developer Evangelist Auth0

View

Ado Kukic
Adrejia L. A. Boutté Swafford
Adrejia L. A. Boutté Swafford

Defense Attorney  Christovich & Kearney, LLP

View

Adrejia L. A. Boutté Swafford
Austin Eppstein
Austin Eppstein

Regional Director Darktrace

View

Austin Eppstein
Bhavdip Rathod
Bhavdip Rathod

Solution Architect (Identity and Access Management)  Sailpoint Technologies, Inc.

View

Bhavdip Rathod

Bhavdip is an experienced cyber security technologist and architect through combined experience in Identity and Access Management. Bhavdip has strong understanding and in-depth experience of Identity and Access Management (IAM) Frameworks and industry best practices. He has developed various technical IAM frameworks for better automation and efficient execution of corporate Identity and Access Management programs across the industry. Bhavdip served as an SME on the largest and most complex IAM Implementations for various retail, financial, healthcare, education and manufacturing organizations in last 10 years. He is passionate about providing innovative solutions to the companies in the field for their most complex challenges in the IAM and Cyber Security areas.
 
Bhavdip holds a Master of Science degree with Commendation from University of Hertfordshire in UK.

Brandon Helms
Brandon Helms

Chief Operations Officer  Rendition Infosec

View

Brandon Helms

Brandon Helms is an American cyber security professional who has dedicated most of his career to leading some of the most advanced cyber operations for both Department of Defense and private sector. Brandon was a Chief Petty Officer in the United States Navy where he ran IT and security operations for fast attack submarines and transitioned into the Technical Director at the National Security Agency. Afterwards, Brandon entered the private sector as the Business Information Security Officer for Palantir Technologies where he embedded with numerous Nation States and Fortune 500 companies to increase their security defenses while minimizing their risk profiles. Today, Brandon is the Chief Operations Officer for Rendition Infosec, LLC where he focuses most of his attention training the next generation of cyber security professionals.

Bruce Macdonald
Bruce Macdonald

Sr. IAM Project Architect Hitachi ID

View

Bruce Macdonald
Cameron Williams
Cameron Williams

CTO OverWatch ID

ISSA Speaker

View

Cameron Williams

For more than 25 years, Cameron Williams has helped enterpise clients like IBM, Wells Fargo, Sony, BP, and dozens others keep their data safe and secure from data breaches, hacks, ransomware, and spear-phishing. As OverWatchID’s CTO, Cam leads all product design and product development, and is responsible for ensuring that that OverWatchID’s cloud-based converged identity security platform is meeting existing and future threats to identity security

Chris Calvert
Chris Calvert

Co-Founder & VP, Product Strategy Respond Software

View

Chris Calvert
Chris Stoneff
Chris Stoneff

VP, Security Solutions Bomgar

View

Chris Stoneff
Craig Kaplan
Craig Kaplan

 Darktrace

View

Craig Kaplan
Elizabeth Wharton
Elizabeth Wharton

VP, Strategy  Prevailion, Inc.

View

Elizabeth Wharton
Greg Sparrow
Greg Sparrow

Senior Vice President & General Manager CompliancePoint

View

Greg Sparrow
Jeramy Schmitt
Jeramy Schmitt

Vice President of Education and Enablement BeyondTrust

View

Jeramy Schmitt
Julie Starr
Julie Starr

Security and Compliance Specialist Google Cloud

View

Julie Starr

Julie is a Security and Compliance Specialist, continuing in a long career where she's helped all manner of organizations understand how to best manage security considerations. She has worked for vendors such as VMware, Cisco, Palo Alto Networks, Blue Coat, Check Point, and Sun Microsystems. She began her career in IT with Georgia Tech; was adjunct faculty at North Carolina State University teaching networking and security classes. Julie holds a Bachelor of Computer Engineering from Georgia Tech; a Masters in Computer Science from NCSU; is a CISSP; and is a member of ACM, IEEE, ISSA, and AFCEA.

Keith Mokris
Keith Mokris

Sr Manager, Product Marketing Twistlock

View

Keith Mokris

Keith Mokris leads Product Marketing at Twistlock to tell the story around how enterprises can leverage the Twistlock cloud native cybersecurity platform to secure their modern applications. Previously, Keith was in charge of product marketing at NowSecure, helping enterprises integrate mobile application security testing into their development pipelines and isolate critical vulnerabilities via penetration testing. In his free time, he is a landscape and street photographer.

Madison Hogan
Madison Hogan

Founding Staff Writer  Atlanta Inno,

View

Madison Hogan

Madison Hogan is the founding staff writer at Atlanta Inno, a sister site to the Atlanta Business Chronicle covering tech, startups and innovation. Madison is the author of the Beat, a daily newsletter dedicated to providing the latest news in Atlanta tech, and a weekly tech column in the Atlanta Business Chronicle. A graduate of Indiana University-Bloomington’s Media School, Madison has covered crime, government, business and more during her journalism career. In addition to being a native Atlantan, Madison is a hip-hop fanatic, pop culture guru and connoisseur of all things Southern. Follow @madisonhogan for tech updates, memes and sarcasm

Mark Stanford
Mark Stanford

Systems Engineering Manager Cisco Security

View

Mark Stanford
Meera Rao
Meera Rao

Senior Principal Consultant Synopsys Software Integrity Group

View

Meera Rao
Nikhil Ollukaren
Nikhil Ollukaren

Application security Consultant  Optiv Security Inc.

View

Nikhil Ollukaren
Paul Willard
Paul Willard

Regional Cybersecurity Lead  Cisco Security

View

Paul Willard
Roger Harris
Roger Harris

Senior Sales Engineer ProtectWise

View

Roger Harris

Roger Harris has been assisting customers in expert Network Forensics for more than a decade including security incident response, high speed packet capture, precision timing and open source implementations. Before joining ProtectWise, he provided global customer consulting for Napatech, FireEye, nPulse and Endace as well as engineering leadership at managed-services provider Orange.

Ryan Merrick
Ryan Merrick

Sr. Strategic Engineer  SentinelOne

View

Ryan Merrick
Sam Elliott
Sam Elliott

Sr. Director of Security Product Management Bomgar

View

Sam Elliott
Sean Blenkhorn
Sean Blenkhorn

Vice President, Sales Engineering & Advisory Services eSentire

View

Sean Blenkhorn
Tim Mackey
Tim Mackey

Technical Evangelist Black Duck by Synopsys

View

Tim Mackey
Todd Bursch
Todd Bursch

Manager, Solution Architects Forcepoint

View

Todd Bursch
Todd O’Boyle
Todd O’Boyle

 Watchguard

View

Todd O’Boyle

Todd O’Boyle is Director of Product Management at WatchGuard. Prior to WatchGuard, Todd was a co-founder and CTO at Strongarm, which was acquired by WatchGuard in January of 2018. Prior to founding Strongarm, Todd spent 15 years at The MITRE Corporation, providing technical support to the US Department of Defense and the Intelligence Community, where he split his time between real-world cyber operations and research. He served as principal investigator for a project developing methods to improve how operators respond to adversaries, researched software protections used by adversaries, developed techniques for profiling network flow data to identify adversary activity, and built some of the original computer forensics tools. Todd has a Bachelor of Science, Computer Science from Purdue University.

Todd Weller
Todd Weller

Chief Strategy Officer  Bandura Systems

View

Todd Weller
Wes Knight
Wes Knight

CISO Georgia Department of Revenue

View

Wes Knight

Wes has been involved in IT for over 35 years starting out with IBM in Atlanta. After leaving IBM in 1996, Wes started a company doing Network and Network Security consulting and training. This eventually evolved to focus on Security including Assessments and Forensics. Wes remains a certified instructor in Ethical Hacking and Forensic Investigation.

Wes has held several positions in IT and Information Security since joining the DOR eleven years ago. He is currently the Chief Information Security Officer and manages the DOR Office of Information Security. The OIS is responsible for maintaining the security of taxpayer and motor vehicle information and approximately $25 billion in annual taxes received; ensuring that DOR complies with applicable State and Federal regulations, and conducting the forensics needed for criminal investigations.

Wes serves on several Executive Advisory Committees and the Evanta CISO Governing Body. He was awarded the 2018 Information Security Executive Southeast People Choice Award. This award was voted on by his peers and recognizes the ISE® Executive Nominee who exemplifies the attributes of a leader in the information security industry

Wes and his wife Elizabeth have been married for 45 years and have 5 children and 11 grandchildren.

Winn Schwartu
Winn Schwartu

‘Founder The Security Awareness Company’

ISSA Speaker

View

Winn Schwartu
Anne Marie Colombo
Anne Marie Colombo

Cybersecurity Solution Advisor SAP

ISSA Speaker

View

Anne Marie Colombo

Anne Marie is a Cybersecurity Solution Advisor working for the CIO, SAP America aligning cybersecurity best practices, thought leaders, partners, solutions for holistic enterprise security for customers. She is focused on cybersecurity and identity solutions. Her background includes providing solutions in the areas of data protection, identity, multi-factor authentication and encryption to secure SAP and other applications. She holds a Certified Information Security Systems Professional (CISSP) certification from ISC2. She currently serves as the President of the Metro Atlanta Information Systems Security Association (ISSA) chapter as well as on the board of the Technology Association of Georgia (TAG) Information Security Society. She has worked in the software industry for over twenty five years and holds a bachelor degree in Business Administration with a focus on Management Information Systems from Madonna University in Livonia, Michigan and is currently enrolled in the Georgia State University Masters of Information Systems program with a focus area of Cybersecurity.

Brian Ruf
Brian Ruf

FedRAMP / OSCAL Liaison FedRAMP PMO

ISSA Speaker

View

Brian Ruf

Brian began his 30 year IT career as a programmer and network engineer. In the late 90’s he was part of a core team applying cyber security to a (then) next generation air traffic control system. Since 2000, he has led efforts for government agencies, pharmaceutical companies, telecommunication providers, and financial institutions on topics involving the intersection of risk management, cyber security, system development lifecycle methodologies, and process re-engineering. Brian joined the FedRAMP PMO in July 2015, where he was instrumental in the success of FedRAMP Accelerated and related improvements. Brian represents FedRAMP on the OSCAL development team.

CA Washington
CA Washington

Founder Image & Etiquette Institute

ISSA Speaker

View

CA Washington
Candy Alexander
Candy Alexander

Virtual CISO and Executive Cyber Security Consultant 

ISSA Speaker

View

Candy Alexander

Ms. Alexander has 30 years of information security experience working for various high-tech companies. Ms. Alexander is very active within the profession and is the newly elected ISSA International President. She has held several positions as CISO (Chief Information Security Officer) for which she developed and managed Corporate Security Programs. She is now working as a Virtual CISO and Executive Cyber Security consultant assisting companies large and small to improve their potential risks through effective security initiatives.

Cornel du Preez
Cornel du Preez

Senior Penetration Testing Engineer NorthState Technology Solutions

ISSA Speaker

View

Cornel du Preez
Daniel Ziesmer
Daniel Ziesmer

President Centripetum

ISSA Speaker

View

Daniel Ziesmer
David Hogue
David Hogue

Technical Director, Cybersecurity Threat Operations Center NSA

ISSA Speaker

View

David Hogue

Mr. Dave Hogue is currently serves as the Technical Director for the NSA’s Cybersecurity Threat Operations Center (NCTOC), a dynamic, national-level entity that serves at the forefront in the fight against malicious cyber activity through integrated cybersecurity operations. Previously, Mr. Hogue was the Technical Director of the Analysis Group within the National Security Agency (NSA) Threat Operations Center (NTOC), charged to deliver vital threat intelligence across a multitude of threat actors and technologies. While in this position, Mr. Hogue also served as a corporate officer, leading agency-wide efforts such as NSA’s response in delivering foundational technical analysis and attribution of the 2014 Sony Pictures Entertainment (SPE) computer network attack (CNA).

David Schroth
David Schroth

CISA Design Compliance and Security, LLC

ISSA Speaker

View

David Schroth

David is an experienced IT advisor with experience in IT auditing, compliance, security and risk management. He has a significant amount of experience SSAE 18 attestations (SOC 1/2/3), IT vendor management and compliance assurance program management. David focuses on building proactive compliance programs for organizations with legal and regulatory requirements.

Debbie Christofferson
Debbie Christofferson

 

ISSA Speaker

View

Debbie Christofferson

Fortune 500 enterprise wide Information Security Manager with experience across the US, Europe and Asia. Strategic security leader and consultant with broad comprehensive security and risk management experience. Know security from the ground up and what it takes to succeed. Certifications: CISSP, CISM. Strong collaborator and high energy leader. 2018 book published: “Women in Security”. Debbie also has facilitated CISM certification exam prep workshops since 2005, and speaks and writes on cyber security. She leads as an International Board Director and Distinguished Fellow for Information Systems Security Association (ISSA); Chairs the board's CISO Advisory Council for the CISO Executive Forum. Debbie is co-founder of the local Cloud Security Alliance chapter.

Dr. Branden Williams
Dr. Branden Williams

Director, Cyber Security Union Bank

ISSA Speaker

View

Dr. Branden Williams
Dr. Curtis Campbell
Dr. Curtis Campbell

VP, Manager of IT Procurement and Vendor Management Atlantic Capital Bank

ISSA Speaker

View

Dr. Curtis Campbell

Dr. Curtis Campbell is a 28 year Cybersecurity, Compliance, and IT professional chartered with accountability and oversight of Procurement, Risk and Compliance, and Vendor Management strategies based on balancing risk, compliance, profitability and value add. She works with executive leadership to define strategic change management, developing recommendations related to processes and standards. Dr. Campbell believes communication with Lines of Business by helping others understand technical solutions in familiar terms fosters good relationships and serves to strengthen internal teams. Her experience includes governance, risk, and compliance in vendor relationships. As Manager of Atlantic Capital’ Vendor Management Program, Dr. Campbell drives best practices in information security evaluation, and risk management for third party relationships in a regulatory environment. Her experience includes writing policies and procedures and assessing and monitoring risk in regulatory environments. Dr. Campbell is a thought leader on cybersecurity and the human connection between trust and unintentional insider threats in an ever-changing cybersecurity footprint. She has published research and journal articles on cybersecurity. Recent publications include: “Solutions for Counteracting Human Deception in Social Engineering Attacks”; “Securing the Remote Employee: Protecting the Human Endpoint in the Cybersecurity Environment”; and “Securing the Vendor: Changing the Dynamic of the Infosec Relationship”. She holds Bachelor and Master’s degrees from the University of TN and a Doctorate in Organizational Leadership in Information Systems Technology.

Dr. Shawn Murray
Dr. Shawn Murray

Principal Scientist US Missile Defense Agency

ISSA Speaker

View

Dr. Shawn Murray

Dr. Murray is a Principal Scientist at the US Missile Defense Agency and is a Director on the International Board for ISSA International. He has worked with the FBI, CIA, NSA in various rolls supporting cybersecurity initiatives globally. He is also the CEO and Chief Academic Officer for Murray Security Services. He has over 20 years of experience in IT and Cybersecurity.

Jeff Neithercutt
Jeff Neithercutt

Cyber Security and Law Enforcement Expert Public Consulting Group

ISSA Speaker

View

Jeff Neithercutt
Jeffrey Man
Jeffrey Man

InfoSec Curmudgeon Online Business Systems

ISSA Speaker

View

Jeffrey Man
Juan Asenjo
Juan Asenjo

Senior Manager for Solutions Marketing Thales eSecurity

ISSA Speaker

View

Juan Asenjo

Juan Asenjo, Ph.D., CISSP has worked in the information security field for over 25 years – in government, military, and the private sector. As Senior Manager for Solutions Marketing at Thales eSecurity, he brings to market and evangelizes cryptographic integrations with technology partner solutions, focusing on identity management, authentication, and encryption. Holding a Ph.D. in Information Science, a Masters’ in Business, and a Bachelors’ in Engineering, he helps technology companies reach more customers with integrated solutions that reduce risk and enhance security.

Kenneth Geers
Kenneth Geers

Chief Research Scientist Comodo Cybersecurity

ISSA Speaker

View

Kenneth Geers

Kenneth Geers (PhD, CISSP): Comodo Cybersecurity Chief Research Scientist, NATO Cyber Centre Ambassador, Atlantic Council Senior Fellow, Digital Society Institute-Berlin Affiliate. 20 years US Government (US Army, NSA, NCIS, NATO). Author “Strategic Cyber Security”, Editor “Cyber War in Perspective”, Editor “The Virtual Battlefield”, Technical Expert “Tallinn Manual”, many articles and chapters on international and cyber security.

Larry Homoth
Larry Homoth

Director of Sales SecurityIQ

ISSA Speaker

View

Larry Homoth

Larry Homuth is Director of Sales for SecurityIQ, InfoSec Institute’s security awareness training and phishing simulation solution. Larry has provided engineering product development professional services consulting for the largest names in consumer electronics, energy, and aerospace and defense. Additionally, Larry has guided implementation of enterprise software systems for quality and inspection management at 4 of the 5 largest pharmaceutical organizations globally. Based in Madison, Larry consults on business process automation and regulatory compliance through the deployment of SaaS solutions.

Loren Roberts
Loren Roberts

 

ISSA Speaker

View

Loren Roberts
Marci McCarthy
Marci McCarthy

 

ISSA Speaker

View

Marci McCarthy
Mark Weatherford
Mark Weatherford

SVP, Chief Cybersecurity Strategist vArmour

ISSA Speaker

View

Mark Weatherford

Mark Weatherford is SVP and Chief Cybersecurity Strategist at vArmour. He has more than 20 years of security operations leadership and executive-level policy experience in some of the largest and most critical public and private sector organizations in the world. Prior to vArmour, he was a Principal at The Chertoff Group an in 2011, was appointed by President Obama as the DHS’s first Deputy Under Secretary for Cybersecurity. Before DHS, he was VP and Chief Security Officer at the North American Electric Reliability Corporation (NERC). Prior to NERC, he was appointed by Governor Schwarzenegger as California’s first Chief Information Security Officer (CISO) and was also the first CISO for the State of Colorado. A former U.S. Navy cryptologist, Mr. Weatherford led the United States Navy’s Computer Network Defense operations and the Naval Computer Incident Response Team. Mr. Weatherford holds a master’s degree from the Naval Postgraduate School and holds the CISSP certification. He was awarded SC Magazine’s “CSO of the Year” award in 2010, named one of the “10 Most Influential People in Government Information Security” by GovInfoSecurity in both 2012 and 2013, selected for the 2013 CSO Compass Award, and presented the 2017 SC Media Reboot ‘Influencer’ Leadership Award.

Marnie Wilking
Marnie Wilking

CISO Orion Health

ISSA Speaker

View

Marnie Wilking
Mary Ann Davidson
Mary Ann Davidson

CSO Oracle

ISSA Speaker

View

Mary Ann Davidson

Mary Ann Davidson is the chief security officer at Oracle, responsible for Oracle software security assurance. She represents Oracle on the board of directors of the Information Technology Information Sharing and Analysis Center (IT-ISAC), and serves on the international board of the Information Systems Security Association (ISSA). She has been named one of Information Security’s top five "Women of Vision," is a Federal 100 Award recipient from Federal Computer Week, and was recently named to the ISSA Hall of Fame. Davidson has served on the Defense Science Board and was a member of the Center for Strategic and International Studies Commission on Cybersecurity for the 44th Presidency. She has testified on cybersecurity to the US House of Representatives (Energy and Commerce Committee, Armed Services Committee, and Homeland Security Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology), and the US Senate Committee on Commerce, Science, and Technology. Davidson has a BS in mechanical engineering from the University of Virginia and an MBA from the Wharton School of the University of Pennsylvania. She received the Navy Achievement Medal when she served as a commissioned officer in the US Navy Civil Engineer Corps.

Matthew Dobbs
Matthew Dobbs

CTO - X-Force Command Center IBM Security

ISSA Speaker

View

Matthew Dobbs
Michael Wylie
Michael Wylie

Security Consultant Corporate Blue

ISSA Speaker

View

Michael Wylie
Michaela Iorga
Michaela Iorga

Senior Security Technical Lead for Cloud Computing National Institute of Standards and Technology

ISSA Speaker

View

Michaela Iorga
Paul Flanagan
Paul Flanagan

Assistant Professor of Law Drexel Law School

ISSA Speaker

View

Paul Flanagan
Reg Harnish
Reg Harnish

CEO GreyCastle Security

ISSA Speaker

View

Reg Harnish

Reg Harnish is the CEO of GreyCastle Security, a leading cybersecurity risk assessment, advisory and mitigation firm headquartered in Troy, New York. Under his leadership, the company has experienced six consecutive years of triple-digit growth and countless industry accolades.

Ricardo Johnson
Ricardo Johnson

Sr. Director, Security, Risk & Compliance CrowdStrike

ISSA Speaker

View

Ricardo Johnson

Ricardo Johnson, Sr. Director of Security, Risk and Compliance for CrowdStrike Inc., has more than 18 years of experience in the fields of privacy, information security and risk. Previously, he served as the Director of Global Compliance for Ryder, where some of his responsibilities included overseeing privacy and security compliance for the company’s inaugural BYOD, mobile marketing, social media and cloud migration programs, along with other regulatory mandates such as export controls and Anti-bribery and PCI. Prior to Ryder, Ricardo served as the Chief Privacy & IT Compliance Officer for Burger King Corporation. Ricardo has also been a guest speaker on privacy, security and risk topics at the Visa PCI Symposium, WorldCompliance Summit, IAPP, Cloud Security Alliance (CSA), Institute of Internal Auditors (IIA) and Compliance Elliance.

Rick Redman
Rick Redman

Senior Security Consultant KoreLogic Inc.

ISSA Speaker

View

Rick Redman
Sam Pickles
Sam Pickles

Co-Founder and CTO RedShield Security

ISSA Speaker

View

Sam Pickles

Sam Pickles has provided IT and security services for banking, government and service provider clients for over seventeen years across Europe, Asia Pacific and the United States. During this period, Sam built and ran some of the world’s largest web application firewall gateways, conducted penetration testing of networks, applications and hardware devices and currently focuses on advanced techniques for web application vulnerability shielding.

Sandy Carielli
Sandy Carielli

Director of Security Technologies Entrust Datacard

ISSA Speaker

View

Sandy Carielli
TaI Guest
TaI Guest

Principal Product Manager Beyond Trust (Bomgar)

View

TaI Guest

Tal Guest is the Principal Product Manager at Bomgar, overseeing the strategy and direction of the company’s cybersecurity products. He works with his colleagues at Bomgar to plan and execute go to market strategies. Mr. Guest has more than 20 years of experience in the technology industry, working in various capacities ranging from hands-on technical work to managing a team of highly skilled engineers. He has a Bachelor of Business degree from Mississippi State focused on information systems and makes his home in Madison, MS.

Timothy Kosiba
Timothy Kosiba

Chief, Computer Network Operations NSA

ISSA Speaker

View

Timothy Kosiba

Mr. Kosiba is the Chief of Computer Network Operations (CNO). Prior to his arrival, he was the Deputy Director of the NSA/CSS Commercial Solutions Center (NCSC) and the Chief of the Network Solutions Office within the NCSC. He was the Chief of the Special US Liaison Officer (SUSLOC) in Canberra, Australia from June 2012 to July 2015. Mr. Kosiba has 29 years of Federal Government service with the last 21 years in technical management/leadership positions. During his career at NSA, he has served in technical leadership positions requiring collaboration responsibilities with domestic and foreign government representatives. Mr. Kosiba was selected for the Defense Intelligence Senior Level (DISL) Service position in March 2012. Prior to being assigned as the SUSLOC, Mr. Kosiba served as the Technical Director for the Requirements and Targeting (R&T) Office in the Tailored Access Operations (TAO) organization at the National Security Agency from August 2010 to June 2012. Prior to that tour, he served as the Plans and Policy Technical Director for USCYBERCOM, and as the Technical Director for the Joint Functional Component Command for Network Warfare (JFCC-NW) from December 2007 to August 2010. Mr. Kosiba has frequently represented NSA and USCYBERCOM at The White House and other government sponsored deliberations relating to cyber activities.

Tyler Cohen Wood
Tyler Cohen Wood

Executive Director Cyber Workforce Program CyberVista

ISSA Speaker

View

Tyler Cohen Wood

Tyler Cohen Wood is a cyber-authority with 18 years of highly technical experience, 13 of which were spent working for the Department of Defense (DoD). As a cyber, Intelligence, national security expert, author and public speaker, she is relied on to provide unique insight into cyber threats, cyber warfare, mitigating cyber risk, national security, and ensuring industries have the tools they need to defend themselves in the digital world. Tyler sits on several cyber advisory boards, including CyberSat and The Internet of Things Consortium.

Alex Wood
Alex Wood

 

ISSA Speaker

View

Alex Wood
Barbara Key
Barbara Key

Senior Director of Security Product Marketing  Extrahop

ISSA Speaker

View

Barbara Key
Brian Rasco
Brian Rasco

Manager/Architect II Information Security - Enterprise UAB Medicine

ISSA Speaker

View

Brian Rasco
Dillip Thakur
Dillip Thakur

Principal Consultant Dimension Data

View

Dillip Thakur
Dillip Thakur
Dillip Thakur

Principal Consultant  Dimension Data

View

Dillip Thakur
Felice Flake
Felice Flake

CEO ScySec LLC

ISSA Speaker

View

Felice Flake

Felice Flake, Candidate, MBA, MSci, B.A., CEO of ScySec LLC, is a highly sought after and proven leader in the security field. Felice has extensive experience in both the government and private sectors. She is the President of the Tampa Bay ISSA Chapter, and the Chairperson of the International Chapters Sub-Committee, ISSA International, Chairperson. She also serves as the Chairperson of the Scholarships & Awards Committee, Women in Defense-Central Florida Chapter, and the Peerlyst Tampa Ambassador. Some of Felice’s most recent speaking engagements include the Tampa Small Business Symposium, Tampa (ISC)2 B-Sides event, and the 2018 Women in Cybersecurity Conference (WiCyS) Conference in Chicago. She is a contributing author to the 2016 book, Women in Security. Felice is a member of the National CyberWatch Center's Curriculum Standards Panel (NCC-CSP) for the Cybersecurity Foundation Series. Felice is also an invited member of the University of South Florida Cybersecurity Education Advisory Board, the Tampa Military Spouse Economic Empowerment Zone (MSEEZ) Working Group, and the University of South Florida Cybersecurity for Executives Advisory Committee. She is also a nominee for the “2018 Tampa Bay Business Woman of the Year” Award and serves on the leadership team for the 2018 Diana Initiative Conference co-located with DEFCON.

Gordon Shelvin
Gordon Shelvin

President and Chief Scientist  Security and Analytics, LLC

ISSA Speaker

View

Gordon Shelvin

Gordon W. Skelton, CISSP, PhD, Computer Science, University of South Africa. Extensive experience in software development, cyber security, data analytics. Served as VP for IS, Mississippi Valley Title Insurance, adjunct professor at Belhaven College, University of Mississippi’s Telecommunications Graduate Program, full professor in the ECE Department, Jackson State University. Taught computer programming, data analytics, cyber security courses, directed research for US Army Space and Missile Command, US Department of Homeland Security, and US Army Corps Engineer Research and Development Center (ERDC). Lead Investigator cyber security and data analytics. 2017 established Security and Analytics, LLC, concentrating on cyber security data analytics.

Guy Fillippelli
Guy Fillippelli

Vice President of user and Data Security Forepoint

ISSA Speaker

View

Guy Fillippelli

Guy Filippelli is VP Solutions for Forcepoint’s Insider Threat and Data Security business. An experienced software entrepreneur, Guy has 15 years of experience building software teams to solve some of the world’s most challenging data and integration problems, most recently as Founder and CEO of RedOwl, which was acquired by Forcepoint in August 2017. Prior to RedOwl, Guy co-founded Berico Technologies, a high-end engineering firm that services the federal government, and launched Oxpoint Holdings, an investment arm that has invested in and incubated multiple private ventures. In 2007, Guy received the National Intelligence Medallion, the nation’s highest award for non-governmental personnel, for his efforts in Iraq as the analytic lead of NSA’s RT-RG program.

Ken Dunham
Ken Dunham

Senior Director of Technical Cyber Threat Intelligence Optiv

ISSA Speaker

View

Ken Dunham

Ken Dunham brings more than 28 years of business, technical and leadership experience in cyber security, incident response and cyber threat intelligence to his position as senior director of technical cyber threat intelligence for Optiv. In this role, he is responsible for the strategy and technical leadership to mature Optiv’s data integration and innovation of intelligence-based security solutions. He also runs his own advanced intelligence response company, 4D5A Security LLC, and a non-profit for incident responders around the world called Rampart Research. Mr. Dunham has a long history of innovation for nascent technologies and solutions such as creation of training programs for U2, Warthog, and Predator systems for the USAF, responsible disclosure (iDEFENSE), and cyber threat intelligence (iSIGHT Partners). He is a widely published author with thousands of security articles and multiple books on topics ranging from Darknet disclosures to mobile threats and mitigation of malware.

Kevin Bocek
Kevin Bocek

 

ISSA Speaker

View

Kevin Bocek
Kevin Dempsey
Kevin Dempsey

Sr Security Services Architect Dimension Data

View

Kevin Dempsey
Michael Raggo
Michael Raggo

CSO 802 Secure, Inc.

ISSA Speaker

View

Michael Raggo
Rachael Lyon
Rachael Lyon

Chief Scientist Forcepoint

ISSA Speaker

View

Rachael Lyon
Tracy Reinhold
Tracy Reinhold

Chief Security Officer Everbridge

ISSA Speaker

View

Tracy Reinhold
Brandon Levene
Brandon Levene

Head of Applied Intelligence Virus Total

ISSA Speaker

View

Brandon Levene
Christopher Mandelaris
Christopher Mandelaris

CISO Chemical Bank

ISSA Speaker

View

Christopher Mandelaris
David Walterrmire
David Walterrmire

Lead, Standards and Outreach for the Security Automation Program; Technical Lead, Open Security Controls Assessment Language  National Institute of Standards and Technology

ISSA Speaker

View

David Walterrmire
Faraz Aladin
Faraz Aladin

Director, Product Marketing Illumio

ISSA Speaker

View

Faraz Aladin

Faraz Aladin is part of Illumio’s product and technical marketing team. He has more than 25 years of industry experience having worked at industry leaders as well as start-ups. His subject matter expertise spans across Networking & Cloud Infrastructure, Data Center Architectures, Security and Collaboration technologies. He is a CCIE and holds an engineering degree from Bombay University.

Michael Angelo
Michael Angelo

Chief Security Architect Microfocus/NetIQ

ISSA Speaker

View

Michael Angelo

Michael F. Angelo CRISC, CISSP has over 30 years of information assurance experience. Michael has served as a trusted security advisor and security architect with leading corporations and government entities. He has acted as a technical adviser in the development of US national and international export controls. Currently chairs the ISSA International Webinar committee. Amongst his accomplishments he is an ISSA Fellow, and is named on the ISSA Hall of FAME for his contributions to the security community. In addition, he currently holds 61 US Granted Patents. His current work encompasses certifications, SDL, Threat Modeling, AppSec / DevOPS, as well as and Software Supply Chain analysis. Michael is a veteran moderator and has appeared at numerous International conference and in a multitude of International Web Conferences.

Michael Melore CISSP
Michael Melore CISSP

Cyber Security Advisor  IBM

ISSA Speaker

View

Michael Melore CISSP
Andrew Weiss
Andrew Weiss

Lead Federal Solutions Engineer Docker

ISSA Speaker

View

Andrew Weiss

Andrew leads the Federal solutions engineering team at Docker. He is an (ISC)² Certified Authorization Professional (CAP) and an active participant in the Federal IT security and compliance ecosystem. Andrew is also a core contributor to the NIST Open Security Controls Assessment Language (OSCAL)

Top