Skip to main content
Register for 2019
Browse Schedule
Browse By Date
Saturday, October 6, 2018
Sunday, October 7, 2018
Monday, October 8, 2018
Tuesday, October 9, 2018
Wednesday, October 10, 2018
Monday, October 28, 2019
Browse by Tracks
Browse By Speakers
Browse By Session Type
My Schedule
Login required
Login
Toggle navigation
Home
Register for 2019
Browse Schedule
Browse By Date
Saturday, October 6, 2018
Sunday, October 7, 2018
Monday, October 8, 2018
Tuesday, October 9, 2018
Wednesday, October 10, 2018
Monday, October 28, 2019
Browse by Tracks
Browse By Speakers
Browse By Session Type
My Schedule
Login required
Please Be Advised: Please note that favoriting a session does not mean you have reserved a seat. All sessions are first come, first serve onsite. Pre-Conference Trainings and Workshops require pre-registration.
Browse by Speaker
Browse by Speaker
0
results found.
Type here to filter the list
All
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
Antova, Galina
Claroty
1413 - The ICS Threat Horizon: What's Out There and How Do We Prepare?
Location: Floor 2: Galerie 1
Galina Antova
Favorite
2313 - Exploring New Reference Architecture for ICS Cybersecurity
Location: Floor 2: Galerie 1
Galina Antova
Favorite
Ayoub, Rob
IDC
1214 - Working for the Dark Side: Jobs in Security Sales and Marketing
Location: Floor 2: Galerie 2
Rob Ayoub
Favorite
B
Bandler, John
Bandler Law Firm and Bandler Group
1412 - Information Security and the Law: New Trends from the Perspective of Lawyers and CISSPs
Location: Floor 2: Galerie 5
John Bandler
Favorite
Barker, Jessica
Cygenta
Closing Keynote: Dr. Jessica Barker
Location: Floor 3- Grand Ballroom
Jessica Barker
Favorite
Barlow-Wilcox, Clayton
ACTIVECYBER
1114 - Is Your Team Breadth or Depth the Key to Security Program Success?
Location: Floor 2: Galerie 2
Clayton Barlow-Wilcox
Favorite
Bartholomew, John
SecurityMetrics, Inc.
ST03 - 2018: Still Vulnerable: A Live Hacking Demonstration
Location: Solutions Theater- Booth #224 (Expo Hall)
John Bartholomew
Favorite
Bateman, Anita
Dana
2118 - Incident Response: Is Your Process Real or on Paper Only?
Location: Floor 2: Galerie 6
Anita Bateman
Favorite
Beam, Bruce
(ISC)2
1215 - Risk Management from Incident to the Boardroom
Location: Floor 2: Galerie 3
Bruce Beam
Favorite
Beevers, Mike
CISSP w/ Access On-Demand 2-Day Training- Mike Beevers
Location: Floor 2: Galerie 4
Mike Beevers
Favorite
CISSP w/ Access On-Demand 2-Day Training- Mike Beevers
Location: Floor 2: Galerie 4
Mike Beevers
Favorite
Bergh, Julie
ibm
3414 - Digitial Certificates 101
Location: Floor 2: Galerie 2
Julie Bergh
Favorite
Block, Edward
Foley Gardere
2412 - Spaghetti: State, Federal, PCI-DSS, GDPR, CSL and More Breach Notification Disarray
Location: Floor 2: Galerie 5
Edward Block
Favorite
Bower, Mark
Egress Software Technologies
3515 - Containing Insider Threats Through User-Centric Machine Learning and AI
Location: Floor 2: Galerie 3
Mark Bower
Favorite
Brannon, Mike
National Gypsum
2210 - How I Learned to Love the Cloud
Location: Floor 3: Mardi Gras: Salon D
Mike Brannon
Favorite
Braunton, Gregory
Catholic Health Intiatives
1318 - In-House Digital Forensics Team: A Modern Information Security Program 'Must Have'
Location: Floor 2: Galerie 6
Gregory Braunton
Favorite
Brooks, Helen
Freddie Mac
1114 - Is Your Team Breadth or Depth the Key to Security Program Success?
Location: Floor 2: Galerie 2
Helen Brooks
Favorite
Brown, Christopher
FireEye
2315 - Why People, Process, Technology Need Revising
Location: Floor 2: Galerie 3
Christopher Brown
Favorite
Burr, William
Self
3214 - Password Whiplash
Location: Floor 2: Galerie 2
William Burr
Favorite
Butts, Derrick
Truth Initiative
2414 - Cyber-Martial Arts - Mastering Security-Life Balance
Location: Floor 2: Galerie 2
Derrick Butts
Favorite
C
Cabrera, Ed
Trend Micro
1313 - Driving Change in Intelligent Transportation Systems (ITS) Security
Location: Floor 2: Galerie 1
Ed Cabrera
Favorite
Campagna, Rich
Bitglass
ST05 - CASB Use Cases: How Your Peers are Securing Their Cloud Footprint
Location: Solutions Theater- Booth #224 (Expo Hall)
Rich Campagna
Favorite
Campbell, Bill
Predictable Solutions, LLC
2212 - Professional Ethics and You
Location: Floor 2: Galerie 5
Bill Campbell
Favorite
Campbell, Curtis
Atlantic Capital Bank
2215 - Women in Security: Changing the Face of Technology and Innovation
Location: Floor 2: Galerie 3
Curtis Campbell
Favorite
Carmakal, Charles
Mandiant
2413 - Leveraging ICS Attacks for Economic Warfare
Location: Floor 2: Galerie 1
Charles Carmakal
Favorite
Carnes, John
Anthem, Inc
2411 - Bugging Yourself - Devices That Are Listening and What It Means for Information Security
Location: Floor 3: Mardi Gras: Salon E
John Carnes
Favorite
3115 - Working Anywhere - Managing Risk with a Virtual Workforce
Location: Floor 2: Galerie 3
John Carnes
Favorite
Catteddu, Daniele
Cloud Security Alliance
2410 - Achieving GDPR Compliance with the CSA Code of Conduct
Location: Floor 3: Mardi Gras: Salon D
Daniele Catteddu
Favorite
Cerin, Biljana
(ISC)2
3212 - GDPR Core Principles and How to Efficiently Apply Them in Your Organization
Location: Floor 2: Galerie 5
Biljana Cerin
Favorite
Chiew, Vincent
Axis Cogni-Solve Ltd.
3513 - Harmonizing ICS Security with Enterprise Security
Location: Floor 2: Galerie 1
Vincent Chiew
Favorite
Christofferson, Debbie
Cloud Security Alliance
2215 - Women in Security: Changing the Face of Technology and Innovation
Location: Floor 2: Galerie 3
Debbie Christofferson
Favorite
Cole, William
Attivo Networks
2317 - Viruses, Trojans, Worms, Malware and Ransomware: What's Next and Are We Prepared?
Location: Floor 3: Mardi Gras H, G, F
William Cole
Favorite
Contesti, Diana
DLConsulting Inc
2510 - How Can We Help the Membership Succeed? An Ask from the (ISC)² Regional Councils
Location: St. Charles (Floor 41)
Diana Contesti
Favorite
2610 - CISO Forum
Location: St. Charles (Floor 41)
Diana Contesti
Favorite
Corbin, Bartley
DELL
3011 - Cyber Resiliency Keys to Survive Post-Breach Scenario with Incident Response Planning
Location: Floor 2 - Studio 3 & 4
Bartley Corbin
Favorite
Cosman, Eric
ISA-99 / IEC-62443
2313 - Exploring New Reference Architecture for ICS Cybersecurity
Location: Floor 2: Galerie 1
Eric Cosman
Favorite
Crane, Earl
Emergynt
2112 - The Security Executive's Journey
Location: Floor 2: Galerie 5
Earl Crane
Favorite
Craven, Patrick
Center for Cyber Safety and Education
2115 - Making Cybersecurity Personal
Location: Floor 3: Mardi Gras: Salons D/E
Patrick Craven
Favorite
2119 - How to Be a Community Rockstar: Panel Discussion
Location: Floor 3: Mardi Gras: Salon D
Patrick Craven
Favorite
Cullen, Cindy
NDegrees, Inc
1217 - Build Your Own Nearly Free Vulnerability Testing Environment/Cyber Range
Location: Floor 3: Mardi Gras H, G, F
Cindy Cullen
Favorite
Cunningham, Craig
CCSP Cloud Security Crash Course 2-Day Training- Craig Cunningham
Location: Floor 2: Galerie 6
Craig Cunningham
Favorite
CCSP Cloud Security Crash Course 2-Day Training- Craig Cunningham
Location: Floor 2: Galerie 6
Craig Cunningham
Favorite
D
Danhieux, Pieter
Secure Code Warrior
Improving Software Security in an Agile Environment: A Case Study
Location: Floor 3: Mardi Gras B
Pieter Danhieux
Favorite
Davenport, Todd
TSYS
2119 - How to Be a Community Rockstar: Panel Discussion
Location: Floor 3: Mardi Gras: Salon D
Todd Davenport
Favorite
Demopoulos, Ted
Demopoulos Associates
1414 - So, You Want to be an Infosec Consultant?
Location: Floor 2: Galerie 2
Ted Demopoulos
Favorite
Diamond, Deidre
CyberSN and Brainbabe
2114 - STEAM – Why Not?
Location: Floor 2: Galerie 2
Deidre Diamond
Favorite
2214 - Job Searching is Broken, It's Not You
Location: Floor 2: Galerie 2
Deidre Diamond
Favorite
Dukes, Curtis
Center for Internet Security
3312 - Adopting Security Automation Standards: Lower TCO with Increased Situational Awareness
Location: Floor 2: Galerie 5
Curtis Dukes
Favorite
Dunlap, Brandon
ISC2
2411 - Bugging Yourself - Devices That Are Listening and What It Means for Information Security
Location: Floor 3: Mardi Gras: Salon E
Brandon Dunlap
Favorite
3115 - Working Anywhere - Managing Risk with a Virtual Workforce
Location: Floor 2: Galerie 3
Brandon Dunlap
Favorite
Dwivedi, Ashish
CA Technologies
3311 - How Blockchain is Revolutionizing Cybersecurity
Location: Floor 3: Mardi Gras: Salon E
Ashish Dwivedi
Favorite
E
Easttom, Chuck
CEC-Security LLC
2211 - An Exploration of Quantum Computing and Post-Quantum Cryptography
Location: Floor 3: Mardi Gras: Salon E
Chuck Easttom
Favorite
Evans, Jackie
Mayo Clinic
3114 - The Elusive IAM Professional: If You Can't Find 'Em, Create 'Em!
Location: Floor 2: Galerie 2
Jackie Evans
Favorite
F
Fedorko, Joe
Office of the Staff Judge Advocate, Fort Drum, NY
1412 - Information Security and the Law: New Trends from the Perspective of Lawyers and CISSPs
Location: Floor 2: Galerie 5
Joe Fedorko
Favorite
Ferguson, Dave
Qualys
ST02 - Case Studies in Cloud-Based Web Application Security Testing
Location: Solutions Theater- Booth #224 (Expo Hall)
Dave Ferguson
Favorite
Fowler, Summer
CERT at Carnegie Mellon University
1114 - Is Your Team Breadth or Depth the Key to Security Program Success?
Location: Floor 2: Galerie 2
Summer Fowler
Favorite
Friedman, Joe
ICE - New York Stock Exchange
3316 - Application Security Design Patterns: Pick a Language, Any Language
Location: Floor 2: Galerie 4
Joe Friedman
Favorite
Frommel, Theresa
State of Missouri
1115 - Enterprise Security Awareness Program That Works
Location: Floor 2: Galerie 3
Theresa Frommel
Favorite
Fusco, Pamela
CBG
2215 - Women in Security: Changing the Face of Technology and Innovation
Location: Floor 2: Galerie 3
Pamela Fusco
Favorite
G
Geers, Kenneth
Comodo
2416 - World Map of Malware: The Geography of Hostile Code
Location: Floor 2: Galerie 4
Kenneth Geers
Favorite
Gennuso, Kevin
DICK'S Sporting Goods
3117 - Deploying Deceptive Systems: Luring Attackers Out from the Dark
Location: Floor 3: Mardi Gras H, G, F
Kevin Gennuso
Favorite
Ginzberg, Ruth
University of Wisconsin System
1310 - Partly Cloudy With A Slight Chance of Contract Enforcement
Location: Floor 3: Mardi Gras: Salon D
Ruth Ginzberg
Favorite
Giordano, Scott
Spirion LLC
1216 - You Want to Do What with My Cell Phone? Privacy Rights at Border Crossings 2018 Update
Location: Floor 2: Galerie 4
Scott Giordano
Favorite
1416 - Information Security Requirements Under the GDPR: What We Know, Six Months In
Location: Floor 2: Galerie 4
Scott Giordano
Favorite
Gupta, Sarbari
Electrosoft Services, Inc.
3410 - Protect Cloud Data from Prying Eyes!
Location: Floor 3: Mardi Gras: Salon D
Sarbari Gupta
Favorite
H
Haley, Kevin
Symantec
3217 - Jacked, Extorted and Destroyed – The New Risks of Ransomware & Cryptojacking Explained
Location: Floor 3: Mardi Gras H, G, F
Kevin Haley
Favorite
Harris, Shawn
Starbucks Coffee Company
2411 - Bugging Yourself - Devices That Are Listening and What It Means for Information Security
Location: Floor 3: Mardi Gras: Salon E
Shawn Harris
Favorite
3115 - Working Anywhere - Managing Risk with a Virtual Workforce
Location: Floor 2: Galerie 3
Shawn Harris
Favorite
Hay, Andrew
LEO Cyber Security
3112 - Why Your Company Needs an Outside Security Advisory Board
Location: Floor 2: Galerie 5
Andrew Hay
Favorite
3317 - CANCELLED - 'I' Before 'R' Except After 'IOC' - CANCELLED
Location: Floor 3: Mardi Gras H, G, F
Andrew Hay
Favorite
Hayward, Lucie
Kroll Cyber Security LLC
3015 - The Art & Science of Incident Response
Location: Floor 2: Studio 9
Lucie Hayward
Favorite
Hernandez, Steven
US Department of Education
2610 - CISO Forum
Location: St. Charles (Floor 41)
Steven Hernandez
Favorite
Hilton, Dimitrios
LOGIS
3014 - Introduction to PCI DSS Credit Card Security
Location: Floor 2 - Studio 3 & 4
Dimitrios Hilton
Favorite
Horton, Maria
EmeSec Inc.
3412 - Through the Looking Glass: The New Future of Compliance and Security is Now
Location: Floor 2: Galerie 5
Maria Horton
Favorite
Howlett, Tony
Codero
2119 - How to Be a Community Rockstar: Panel Discussion
Location: Floor 3: Mardi Gras: Salon D
Tony Howlett
Favorite
Huntington, Chris
Nexigen Communications
1315 - Creating Board-Friendly Risk Assessments
Location: Floor 2: Galerie 3
Chris Huntington
Favorite
J
Jackson, Graham
(ISC)2
1412 - Information Security and the Law: New Trends from the Perspective of Lawyers and CISSPs
Location: Floor 2: Galerie 5
Graham Jackson
Favorite
Jackson, Kevin
CCSP Cloud Security Crash Course 2-Day Training- Kevin Jackson
Location: Floor 2: Galerie 3
Kevin Jackson
Favorite
CCSP Cloud Security Crash Course 2-Day Training- Kevin Jackson
Location: Floor 2: Galerie 3
Kevin Jackson
Favorite
Jacobs, Erin
Urbane Security
2610 - CISO Forum
Location: St. Charles (Floor 41)
Erin Jacobs
Favorite
Jaffe, Seth
LEO Cyber Security
1118 - Incident Response from Compliance to Execution: Lessons from NASA's Mission Control
Location: Floor 2: Galerie 6
Seth Jaffe
Favorite
Joe, Herbert
Yonovitz & Joe, L.L.P.
1316 - From Katz to Carpenter: How SCOTUS Views Privacy & Evolving Technology
Location: Floor 2: Galerie 4
Herbert Joe
Favorite
3218 - CyberTheft of Trade Secrets and Attorneys’ Ethical Considerations to Data Breaches
Location: Floor 2: Galerie 6
Herbert Joe
Favorite
Johnson, Kevin
Secure Ideas, LLC
Hands-On OWASP Top 10 Training- Kevin Johnson
Location: Floor 2: Galerie 1
Kevin Johnson
Favorite
Hands-On OWASP Top 10 Training- Kevin Johnson
Location: Floor 2: Galerie 1
Kevin Johnson
Favorite
2417 - Gulliver's Travels: Security Exploits and Vulnerabilities Around the Globe
Location: Floor 3: Mardi Gras H, G, F
Kevin Johnson
Favorite
Johnson, Steve
HNTB Corporation
1311 - Is Your Car Leaking Your Secrets? Privacy Concerns for Connected Vehicles.
Location: Floor 3: Mardi Gras: Salon E
Steve Johnson
Favorite
K
Keliiaa, Curtis
Sandia National Laboratories
3511 - Broadband, Information Technology, & Operational Technology Multi-Domain Security
Location: Floor 3: Mardi Gras: Salon E
Curtis Keliiaa
Favorite
Kesterson, Hoyt
Terra Verde
3214 - Password Whiplash
Location: Floor 2: Galerie 2
Hoyt Kesterson
Favorite
Kilman, Dominique
CrowdStrike
1218 - Can Machine Learning Identify Previously Compromised Systems?
Location: Floor 2: Galerie 6
Dominique Kilman
Favorite
Kim, Lee
HIMSS
2116 - Sharing with Care: The Key to Healthcare Cybersecurity is You
Location: Floor 2: Galerie 4
Lee Kim
Favorite
Koger, Scott
NOAA.GOV
3213 - Develop and Defend DR Strategies by Examining Disasters and Demystifying Common Myths
Location: Floor 2: Galerie 1
Scott Koger
Favorite
Kolga, Rene
Nyotron
ST07 - Can Security Be Easy? Mapping Legitimate OS Behavior
Location: Solutions Theater- Booth #224 (Expo Hall)
Rene Kolga
Favorite
Kottke, Rob
Cardconnect
3014 - Introduction to PCI DSS Credit Card Security
Location: Floor 2 - Studio 3 & 4
Rob Kottke
Favorite
Kraemer, Stephen
Ports of Auckland
2113 - Securing Critical National Infrastructure of Automated Ports
Location: Floor 2: Galerie 1
Stephen Kraemer
Favorite
Kumar, Ajoy
DTCC
2610 - CISO Forum
Location: St. Charles (Floor 41)
Ajoy Kumar
Favorite
Kumar, Shreyas
Uber Technologies Inc.
3210 - Best Practices for Identity and Access Management for Public Cloud
Location: Floor 3: Mardi Gras: Salon D
Shreyas Kumar
Favorite
Kurmi, Ashish
Uber Technologies Inc.
3210 - Best Practices for Identity and Access Management for Public Cloud
Location: Floor 3: Mardi Gras: Salon D
Ashish Kurmi
Favorite
L
Lackey, Zane
Signal Sciences
3516 - How to adapt the SDLC for DevSecOps
Location: Floor 2: Galerie 4
Zane Lackey
Favorite
Lakhani, Aamir
Fortinet
3211 - Rise of the Machines
Location: Floor 3: Mardi Gras: Salon E
Aamir Lakhani
Favorite
Landry, Brett
University of Dallas
3213 - Develop and Defend DR Strategies by Examining Disasters and Demystifying Common Myths
Location: Floor 2: Galerie 1
Brett Landry
Favorite
Lee, Sarah
Mississippi State University
2114 - STEAM – Why Not?
Location: Floor 2: Galerie 2
Sarah Lee
Favorite
Leifheit, Glenn
Microsoft
2510 - How Can We Help the Membership Succeed? An Ask from the (ISC)² Regional Councils
Location: St. Charles (Floor 41)
Glenn Leifheit
Favorite
2610 - CISO Forum
Location: St. Charles (Floor 41)
Glenn Leifheit
Favorite
3010 - A Crash Course in Mentorship
Location: Floor 2 - Studio 2
Glenn Leifheit
Favorite
Lesteven, Didier
WALLIX
3314 - Reality Check: Can we maintain ICS performance and increase security?
Location: Floor 2: Galerie 2
Didier Lesteven
Favorite
Levene, Brandon
Chronicle
ST08 - Hunting with VirusTotal Enterprise
Location: Solutions Theater- Booth #224 (Expo Hall)
Brandon Levene
Favorite
Lewis, Hillary
Freddie Mac
2610 - CISO Forum
Location: St. Charles (Floor 41)
Hillary Lewis
Favorite
3512 - What’s All The Fuss About Risk?
Location: Floor 2: Galerie 5
Hillary Lewis
Favorite
Lieber, Kurt
Aetna
2217 - Automating Security Controls Using Models and Security Orchestration
Location: Floor 3: Mardi Gras H, G, F
Kurt Lieber
Favorite
Linde, Matt
IOR Analytics
ST01 - Case Study: Achieve Enterprise View of Sensitive Data Usage on a Budget
Location: Solutions Theater- Booth #224 (Expo Hall)
Matt Linde
Favorite
Lovitt, Ciera
Center for Cyber Safety and Education
2115 - Making Cybersecurity Personal
Location: Floor 3: Mardi Gras: Salons D/E
Ciera Lovitt
Favorite
Luallen, Matthew
CYBATI
3113 - Current and Next Generation of Cyber Physical System Cybersecurity (ICS/SCADA/IIoT)
Location: Floor 2: Galerie 1
Matthew Luallen
Favorite
M
Malisow, Ben
CCSP Cloud Security Crash Course 2-Day Training- Ben Malisow
Location: Floor 2: Galerie 2
Ben Malisow
Favorite
CCSP Cloud Security Crash Course 2-Day Training- Ben Malisow
Location: Floor 2: Galerie 2
Ben Malisow
Favorite
Martincavage, Christopher
BAE Systems Applied Intelligence
ST04 - Don’t Let Your IoT Devices Turn Against You!
Location: Solutions Theater- Booth #224 (Expo Hall)
Christopher Martincavage
Favorite
McCumber, John
(ISC)²
2311 - Today’s Attitudes, Tomorrow’s Opportunities: (ISC)² Tracks The Trends in the Cybersecurity Workforce
Location: Floor 3: Mardi Gras: Salon E
John McCumber
Favorite
McGann, Chuck
McGann Group LLC
2610 - CISO Forum
Location: St. Charles (Floor 41)
Chuck McGann
Favorite
McGonigal, Jane
Keynote Luncheon: Jane McGonigal
Location: Floor 3- Grand Ballroom
Jane McGonigal
Favorite
McNamee, Kevin
Nokia
2117 - Exploring Smartphone Ransomware
Location: Floor 3: Mardi Gras H, G, F
Kevin McNamee
Favorite
McQuiggan, James
Siemens Gamesa Renewable Energy
1413 - The ICS Threat Horizon: What's Out There and How Do We Prepare?
Location: Floor 2: Galerie 1
James McQuiggan
Favorite
2510 - How Can We Help the Membership Succeed? An Ask from the (ISC)² Regional Councils
Location: St. Charles (Floor 41)
James McQuiggan
Favorite
3413 - One CyberSecurity Standard to Rule Them All?!
Location: Floor 2: Galerie 1
James McQuiggan
Favorite
Meeker, Tina
Beacon Information Security, LLC
2415 - Are We Hiring Too Many Doppelgängers? How the Diversity Gap Impacts Cybersecurity
Location: Floor 2: Galerie 3
Tina Meeker
Favorite
Mehta, Shreyans
Stealth Security
ST06 - How To Stop Bots Breaking Bad
Location: Solutions Theater- Booth #224 (Expo Hall)
Shreyans Mehta
Favorite
Miller, Ben
Dragos, Inc
2213 - How to Respond to Industrial Intrusions
Location: Floor 2: Galerie 1
Ben Miller
Favorite
Moore, Morgan
RLI Corp
3518 - Insuring Your Cyber Assets
Location: Floor 2: Galerie 6
Morgan Moore
Favorite
Moose, Lisa
OOAC, LLC
3315 - The Costs of Convenience – Measuring Consequences of Cyber Security Policy Conflicts
Location: Floor 2: Galerie 3
Lisa Moose
Favorite
Morrison, Dawn
Alabama State Department of Education
2114 - STEAM – Why Not?
Location: Floor 2: Galerie 2
Dawn Morrison
Favorite
Moulin, Josh
Gartner
1418 - Detect Intruders Using Network Behavior Analytics
Location: Floor 2: Galerie 6
Josh Moulin
Favorite
Murray, William
2212 - Professional Ethics and You
Location: Floor 2: Galerie 5
William Murray
Favorite
N
Neal, Andrew
TransPerfect Legal Solutions
2318 - Investigating the Future: The Forensics, Investigations and Compliance of Tomorrow
Location: Floor 2: Galerie 6
Andrew Neal
Favorite
3012 - Forensics in Action: Looking for Restricted Data Across Your Enterprise
Location: Floor 2: Studio 9
Andrew Neal
Favorite
Nealon, Richard
(ISC)2 Ethics Committee
2212 - Professional Ethics and You
Location: Floor 2: Galerie 5
Richard Nealon
Favorite
P
Palmore, M. K.
Federal Bureau of Investigation
3118 - Risk Management and the Cyber Threat Landscape
Location: Floor 2: Galerie 6
M. K. Palmore
Favorite
Payton, Theresa
Fortalice Solutions
Keynote: Theresa Payton
Location: Floor 3- Grand Ballroom
Theresa Payton
Favorite
Pearlson, Keri
MIT
1415 - Building a Culture of Cybersecurity
Location: Floor 2: Galerie 3
Keri Pearlson
Favorite
Peck, Jared
Fortune 500 Company
1417 - Raising the Dead to Save the Living: Active Defense and Cyber Deception Anyone Can Do
Location: Floor 3: Mardi Gras H, G, F
Jared Peck
Favorite
Poore, Ralph
PCI Security Standards Council
3214 - Password Whiplash
Location: Floor 2: Galerie 2
Ralph Poore
Favorite
Q
Quinn, Michael
Kroll Cyber Security LLC
3015 - The Art & Science of Incident Response
Location: Floor 2: Studio 9
Michael Quinn
Favorite
R
Raggo, Michael
802 Secure, Inc.
3313 - IoT and IIoT Wireless Network Threats and Countermeasures
Location: Floor 2: Galerie 1
Michael Raggo
Favorite
Remes, Wim
NRJ Security
2212 - Professional Ethics and You
Location: Floor 2: Galerie 5
Wim Remes
Favorite
Richmond, Congressman Cedric
Opening Keynote: Congressman Cedric Richmond
Location: Floor 3- Grand Ballroom
Congressman Cedric Richmond
Favorite
Romeo, Christopher
Security Journey
3216 - Building an AppSec Program with a Budget of $0: Beyond the OWASP Top 10
Location: Floor 2: Galerie 4
Christopher Romeo
Favorite
Rosenberg Wilbanks, Linda
Department of Education Federal Student Aid
2610 - CISO Forum
Location: St. Charles (Floor 41)
Linda Rosenberg Wilbanks
Favorite
Rudd, Gordon
RCB Bank
3013 - CISO Workshop
Location: Floor 2 - Studio 2
Gordon Rudd
Favorite
S
Sandage, Tim
Amazon Web Services
1410 - AWS Security Automation and Orchestration (SAO) – SecOPs & DevOps Better Together
Location: Floor 3: Mardi Gras: Salon D
Tim Sandage
Favorite
Sanford, Adriana
Loyola Marymount University/ Pepperdine University
2215 - Women in Security: Changing the Face of Technology and Innovation
Location: Floor 2: Galerie 3
Adriana Sanford
Favorite
Sangster, Mark
eSentire
3318 - Who’s Watching the Watchers: What Happens When Your Security Provider Compromises Your Network?
Location: Floor 2: Galerie 6
Mark Sangster
Favorite
Scambray, Joel
NCC Group
2216 - Pen Test Stats Reloaded: Two Years in the Life of a Hacking Team
Location: Floor 2: Galerie 4
Joel Scambray
Favorite
Scanlon, Thomas
Software Engineering Institute - Carnegie Mellon University
3416 - There Is No Plug & Play: Tips for Implementing Automated Software Security Testing Tools
Location: Floor 2: Galerie 4
Thomas Scanlon
Favorite
Schnitter, Mark
Centric Consulting
1315 - Creating Board-Friendly Risk Assessments
Location: Floor 2: Galerie 3
Mark Schnitter
Favorite
Scranton, Sean
RLI Corp
3518 - Insuring Your Cyber Assets
Location: Floor 2: Galerie 6
Sean Scranton
Favorite
Shaikh, Tariq
Aetna
3514 - Implementing a Successful Privileged Access Management Program - Lessons Learned
Location: Floor 2: Galerie 2
Tariq Shaikh
Favorite
Shakarian, Paulo
CYR3CON
3417 - When Patching 'Critical' Vulnerabilities Doesn't Cut It
Location: Floor 3: Mardi Gras H, G, F
Paulo Shakarian
Favorite
Shema, Mike
Cobalt.io
3116 - DevOps Is Automation, DevSecOps Is People
Location: Floor 2: Galerie 4
Mike Shema
Favorite
Silbert, Justin
LEO Cyber Security
3517 - Color Wars: Designing a Battlefield for Red Team that Maximizes Value for Blue Team
Location: Floor 3: Mardi Gras H, G, F
Justin Silbert
Favorite
Sills, Tim
Accudata Systems
3310 - Performing AWS Cloud Security Audits
Location: Floor 3: Mardi Gras: Salon D
Tim Sills
Favorite
Smith, Sharon
C-Suite Results
1114 - Is Your Team Breadth or Depth the Key to Security Program Success?
Location: Floor 2: Galerie 2
Sharon Smith
Favorite
Smith, Tyler
John Deere Financial
1210 - Lessons Learned: Building a Cloud Security Program in the Financial Services Industry
Location: Floor 3: Mardi Gras: Salon D
Tyler Smith
Favorite
Snow, Selvan
Starbucks
1111 - 'Computer, Order Me a Latte ... and a Pen Test!': IoT Security Best Practices
Location: Floor 3: Mardi Gras: Salon E
Selvan Snow
Favorite
Sosa, Jennifer
TransPerfect Legal Solutions
2318 - Investigating the Future: The Forensics, Investigations and Compliance of Tomorrow
Location: Floor 2: Galerie 6
Jennifer Sosa
Favorite
3012 - Forensics in Action: Looking for Restricted Data Across Your Enterprise
Location: Floor 2: Studio 9
Jennifer Sosa
Favorite
Soto, Rod
JASK.AI
3411 - Replacing SOC1: Building a Culture of Machine Learning in Security Processes
Location: Floor 3: Mardi Gras: Salon E
Rod Soto
Favorite
Speake, Graham
Accenture
1113 - IoT and Cloud Computing: Improving or Reducing Security in Industrial Systems?
Location: Floor 2: Galerie 1
Graham Speake
Favorite
Steinke, Elena
National Board Women's Society of Cyberjutsu
2114 - STEAM – Why Not?
Location: Floor 2: Galerie 2
Elena Steinke
Favorite
Stoffell, Kevin
Battelle Memorial Institute
Security-Architecture with CISSP-ISSAP- Kevin Stoffell
Location: Floor 2: Galerie 5
Kevin Stoffell
Favorite
Security-Architecture with CISSP-ISSAP- Kevin Stoffell
Location: Floor 2: Galerie 5
Kevin Stoffell
Favorite
3415 - Preparing Your Cyber Workforce for the Internet of Things (IoT) Influx
Location: Floor 2: Galerie 3
Kevin Stoffell
Favorite
Strand, John
Black Hills Information Security
1317 - If I Wake Evil
Location: Floor 3: Mardi Gras H, G, F
John Strand
Favorite
Sturgeon, Victor
Health Care Service Corporation
3217 - Jacked, Extorted and Destroyed – The New Risks of Ransomware & Cryptojacking Explained
Location: Floor 3: Mardi Gras H, G, F
Victor Sturgeon
Favorite
T
Tarala, James
Enclave Security
1112 - Understanding the CIS Controls: Cyber Hygiene and Standards of Care
Location: Floor 2: Galerie 5
James Tarala
Favorite
Tarala, Kelli
Enclave Security
1112 - Understanding the CIS Controls: Cyber Hygiene and Standards of Care
Location: Floor 2: Galerie 5
Kelli Tarala
Favorite
tychansky, richard
Identity Dynamics Corp.
Containers in the Cloud: Applied Threat Modeling
Location: Northern D+DE Corridor
richard tychansky
Favorite
1116 - Privacy Engineering for Machine Learning Solutions
Location: Floor 2: Galerie 4
richard tychansky
Favorite
2111 - Gladiators and Onions on the Dark Web: Breaking Botnet Command and Control
Location: Floor 3: Mardi Gras: Salon E
richard tychansky
Favorite
2310 - Jazz Up Enterprise Cloud Applications: Going Serverless, Securely
Location: Floor 3: Mardi Gras: Salon D
richard tychansky
Favorite
3111 - Great Scott! Quantum Cryptography is Fully Operational!
Location: Floor 3: Mardi Gras: Salon E
richard tychansky
Favorite
U
Uttreja, Nitin
CA Technologies
3311 - How Blockchain is Revolutionizing Cybersecurity
Location: Floor 3: Mardi Gras: Salon E
Nitin Uttreja
Favorite
V
Veltsos, Chris
Minnesota State University, Mankato
2610 - CISO Forum
Location: St. Charles (Floor 41)
Chris Veltsos
Favorite
Von Geldern, Erik
FXCM
2411 - Bugging Yourself - Devices That Are Listening and What It Means for Information Security
Location: Floor 3: Mardi Gras: Salon E
Erik Von Geldern
Favorite
3115 - Working Anywhere - Managing Risk with a Virtual Workforce
Location: Floor 2: Galerie 3
Erik Von Geldern
Favorite
W
Walker, Tim
University of Florida
2312 - Multi-Tiered Risk Management: It Never Really Was Just About Information Technology
Location: Floor 2: Galerie 5
Tim Walker
Favorite
Westphal, Kristy
HealthEquity
1117 - Debunked! Threat Hunting is No Ghost Story
Location: Floor 3: Mardi Gras H, G, F
Kristy Westphal
Favorite
2418 - Your Table Tops Are...ZZZZZZZZ
Location: Floor 2: Galerie 6
Kristy Westphal
Favorite
White, Tim
Qualys
1312 - Selecting Controls for Regulatory Compliance Leveraging NIST 800.53 Control Objectives and Other Best Practices
Location: Floor 2: Galerie 5
Tim White
Favorite
Widup, Suzanne
Verizon Enterprise Solutions
2316 - Proposed Categorization of Data Breach Impact
Location: Floor 2: Galerie 4
Suzanne Widup
Favorite
Wilcox, Spencer
PNM Resources
1413 - The ICS Threat Horizon: What's Out There and How Do We Prepare?
Location: Floor 2: Galerie 1
Spencer Wilcox
Favorite
Williams, Crystal
Infinite Innovations LLC, Women's Society of Cyberjutsu
2114 - STEAM – Why Not?
Location: Floor 2: Galerie 2
Crystal Williams
Favorite
Williams, Marv
Cognizant Technologies
1212 - Ramping onto the Blockchain: Risks, Rewards and Minefields
Location: Floor 2: Galerie 5
Marv Williams
Favorite
Winkler, Ira
Secure Mentem
2218 - Hacking Closed Networks
Location: Floor 2: Galerie 6
Ira Winkler
Favorite
Winward, Ron
Radware
1213 - The DNA of Modern IoT Attack Botnets
Location: Floor 2: Galerie 1
Ron Winward
Favorite
Woerner, Ron
RWX Security Solutions
2314 - Cybersecurity Tips, Tools and Techniques Every CISSP Needs in Their Security Toolkit
Location: Floor 2: Galerie 2
Ron Woerner
Favorite
3215 - The Trusted Security Advisor – Increase Your Influence to Make a Difference
Location: Floor 2: Galerie 3
Ron Woerner
Favorite
Z
Zadeh, Joseph
JASK.AI
3411 - Replacing SOC1: Building a Culture of Machine Learning in Security Processes
Location: Floor 3: Mardi Gras: Salon E
Joseph Zadeh
Favorite
Back to Top