2020
Todd Inskeep
Title: Making Security & Legal Best Friends Abstract: Regulation, legal judgements, settlements, and common practices define today’s “best practices” in cyber and information security programs. The best security tool is not enough unless its aligned to evolving legal practices. Make the company lawyer your friend and get their help mapping your program to standards defined […]
David Kennedy
David Kennedy is a cybersecurity authority whose mission is to drive the industry forward and make the world a more secure place. In addition to creating two large-scale cybersecurity firms, David has testified before Congress on issues of national security and has appeared as a subject matter expert on hundreds of national news and TV […]
Amelie Koran
Amélie Koran is a Senior Technology Advocate at Splunk, focused on helping organizations transform, grow and secure themselves in the ever-evolving world of technologies and their accompanying challenges. She arrives at Splunk after nearly 25 years as a technologist, from systems administration and engineering to executive technology leadership in various industries, academia, NGOs, and the […]
Warren Kruse
Warren Kruse provides Electronic Discovery, Data Forensics, Cyber Security/Incident Response and Consulting services to assist with litigation, compliance, and investigations. He is an author of the book “Computer Forensics: Incident Response Essentials,” published by Addison Wesley, and was the technical editor of the book “Computer Forensic Jumpstart.” Warren is also a Ranked Professional Adviser in […]
Ryan MacDougall
Ryan MacDougall is a subject matter expert in areas of network penetration testing, application security, protocol analysis and social engineering. Mr. MacDougall directed technical operations and built and secured large networks for the financial and telecommunications industries, whose area of focus covers 6 countries; consisting of 3 data centers and 8 regional offices. In his […]
Peter Makohon
Peter Makohon established and leads Wells Fargo’s Cyber Threat Management organization. Peter has global responsibility for monitoring the threat landscape, performing security assessments, and directing company-wide efforts to develop & continuously improve security capabilities that mitigate the organization’s exposure to cyber-attacks and exploits. Peter has over 25 years of industry expertise in areas such as […]
Tiffany McLee
TIFFANY MCLEE is a Fraud Threat Intelligence Manager for Ally Financial. In her role, Tiffany is responsible for identifying how fraud is perpetrated and/or attempted across Ally’s core businesses and leading cross-functional teams to a consensus on mitigation options and action plans. Previously, Tiffany was a Team Lead for the Cyber Financial (CyFin) Program at […]
Mark Miller
Mark Miller speaks and writes extensively on DevOps and Security, hosting panel discussions on tools and processes within the DevSecOps Software Supply Chain. He actively participates in the DevOps/DevSecOps communities by building DevOps tracks at security conferences such as RSA Conference, InfoSec Europe, CD Summit, AppSec USA and AppSec EU. Mark is co-founder of All […]
Hardik Modi
Hardik Modi is AVP Engineering – Threat and Mitigation Products at NETSCOUT. Abstract: Threat to Network Availability during the Covid-19 Pandemic The Internet has been central to many aspects of life during the pandemic. Work, education, shopping, healthcare, entertainment – all of these quickly moved online, allowing us some ability to continue with these activities, […]
Heather Moye
Panel Abstract: How Banks Combat Business Email Compromise (BEC) Schemes This roundtable discussion will explore the role of banks in responding to and working to prevent business email compromise (BEC) schemes – a widespread type of cybercrime that tricks victims into misdirecting large payments, often using fraudulent emails. The speakers will address not only the […]