Speakers

Almazova

Victoria Almazova

Microsoft

Sr Security Architect

Victoria Almazova

Title: The Practical Side of DevSecOps Abstract: DevOps practices are in a place; containers are everywhere, pipelines are flying. We do Agile. We do DevOps. Now we try to follow...

Read More about Victoria Almazova

Rich Baich

Rich Baich

AIG

CISO

Rich Baich

Rich Baich is AIG’s Chief Information Security Officer. In this role, he is responsible for developing, implementing, and operating an information security strategy to address AIG’s cyber risks. He...

Read More about Rich Baich

Brannon

Mike Brannon

National Gypsum

Dir, Infrastructure Security

Mike Brannon

Cyber Insurance Panelist Bio: Mike Brannon is an experienced IT professional and long-term employee at National Gypsum Company (NGC). Branon leaxds the teams that provide infrastructure and...

Read More about Mike Brannon

Amy Braswell

Amy Braswell

TIAA Bank

CISO

Amy Braswell

Bio: Amy Braswell is the Chief Information Security Officer at TIAA Bank. In this role, Amy and her team are responsible for all aspects of information and cyber security. Her team manages security...

Read More about Amy Braswell

Roger Callahan

Information Assurance Advisory, LLC

Managing Director

Roger Callahan

Cyber Insurance Panel Bio: Roger Callahan has over 50 years of prior experience spanning executive management and engineering responsibilities within both the National Security community and the...

Read More about Roger Callahan

Chen

Jay Chen

Prisma Cloud and Unit 42

Cloud Security Researcher

Jay Chen

Title: From API Information Leakage to Pwned AWS Accounts Abstract: In this talk, I will show a set of AWS resource policy APIs that can be abused to leak the existing users and roles in...

Read More about Jay Chen

Chestna

Pete Chestna

Checkmarx

CISO, North America

Pete Chestna

Title: Securing Generation DevOps  - The Cloud Developer Abstract: Requirements on developers has shifted over the last 5 years. Team sizes are shrinking but responsibilities are...

Read More about Pete Chestna

Chetal

Aradhna Chetal

TIAA

Sr Dir, Exec Cloud Services & Cybersecurity Technology

Aradhna Chetal

Title: Cloud Native technologies (Containers and Microservices): Security & Compliance Abstract: Industry experts talk about the future of computing, they typically aren’t just...

Read More about Aradhna Chetal

Claypoole

Ted Claypoole

Womble Bond Dickinson

Partner

Ted Claypoole

Title:  Making Security & Legal Best Friends  Abstract: Regulation, legal judgements, settlements, and common practices define today's "best practices" in cyber and...

Read More about Ted Claypoole

Da Costa

Vinicius Da Costa

Bank of America

SVP, Senior Technology Manager

Vinicius Da Costa

Title:  TBD Abstract:  TBD Bio: Vinicius Da Costa is a senior vice president at Bank of America, responsible for delivering Zero Trust Architecture. Vinicius is an...

Read More about Vinicius Da Costa

DeWeese

Julia DeWeese

National Cyber-Forensics and Training Alliance

Intelligence Analyst, Malware and Cyber Threats

Julia DeWeese

Title: A Bizarre Call Detonates BazarLoader Malware Abstract: Bio:  Julia DeWeese is an Intelligence Analyst for the Malware and Cyber Threats team at the National Cyber-...

Read More about Julia DeWeese

Flanagan

Kevin Flanagan

Palo Alto Networks

Systems Engineering Director

Kevin Flanagan

Title: Ransomware 2021 - Anatomy of a DoppelPaymer Attack Abstract: 2020 was challenging enough as it was, but the number of ransomware attacks continues to grow and exacerbate one of the...

Read More about Kevin Flanagan

Freund

Jack Freund

VisibleRisk

Head of Cyber Risk Methodology

Jack Freund

Title:  Abstract:  Bio: Over the course of his career in technology and risk, Dr. Jack Freund has become a leading voice in cyber risk measurement and management. As Head of Cyber...

Read More about Jack Freund

Furtick

Chris Furtick

Fortalice Solutions

Director, Incident Response and Planning

Chris Furtick

Topic: Ransomeware Abstract: TBD Bio: Chris Furtick is a proven information security leader with a consultative voice able to bridge the gap between technology and business outcomes. A...

Read More about Chris Furtick

Carrie Gates

Carrie Gates

Bank of America

SVP - Global Information Security

Carrie Gates

Dr. Carrie Gates joined Bank of America in October 2018 as a Senior Vice President in Global Information Security. She has established a research program, working in partnership with...

Read More about Carrie Gates

Gillam

Jason Gillam

Secure Ideas

CIO

Jason Gillam

Title: This is Your Circus AND Your Monkeys: Managing Supply Chain Risk Abstract: We all depend on 3rd parties to provide products, services, and equipment. Whether or not you...

Read More about Jason Gillam

Mike Horn

TwinWave Security

CEO

Mike Horn

Title: Peek-a-boo: How Attackers Hide Threats Behind Well Known Services Abstract: Bio: With over 20 years experience in cybersecurity, and as a founder of two cybersecurity startups...

Read More about Mike Horn

Inskeep

Todd Inskeep

Innovate Solutions

Founder and Sr Dir

Todd Inskeep

Title: Making Security & Legal Best Friends  Abstract: Regulation, legal judgements, settlements, and common practices define today's "best practices" in cyber and information...

Read More about Todd Inskeep

Jinks

Tommy Jinks

Bank of America

SVP, Senior Technology Manager

Tommy Jinks

Title: Abstract: Bio: Tommy Jinks is a senior vice president and Information Security researcher at Bank of America. Tommy has more than 25 years of experience working with...

Read More about Tommy Jinks

Johnson

Kevin Johnson

Secure Ideas

CEO

Kevin Johnson

Bio: Kevin Johnson is the Chief Executive Officer of Secure Ideas. Kevin has a long history in the IT field including system administration, network architecture and application development. He has...

Read More about Kevin Johnson

Malik

Bill Malik

Trend Micro

VP, Infrastructure Strategies

Bill Malik

Title: Abstract: Bio: William Malik is VP of Infrastructure Strategies at Trend Micro. As a founder of Gartner’s Information Security Strategies service in the mid-1990s, Bill has deep...

Read More about Bill Malik

Matre

Kerry Matre

Mandiant

Sr. Director, Product and Services Marketing

Kerry Matre

Title: Why MTTR Doesn’t Belong in a SOC Abstract: Good metrics are elusive in the world of Security Operations. Organizations often fall back on reporting fit for network operations that can...

Read More about Kerry Matre

Menicucci

Dan Menicucci

Microsoft

Chief Security Advisor, Financial Services

Dan Menicucci

Title: Zero Trust Abstract:  Bio: Dan Menicucci is the Microsoft Chief Security Advisor for Financial Services.  He is part of a group of cybersecurity experts, former CISOs, and...

Read More about Dan Menicucci

Murphy

Brandon Murphy

Cowbell Cyber

VP, Sales

Brandon Murphy

Brandon joined Cowbell Cyber as the VP of Sales in November of 2019, shortly after the founding of the company. He spent the majority of his career in the insurance industry, including four years at...

Read More about Brandon Murphy

Nunez

Yonesy Nunez

Jack Henry & Associates

CISO

Yonesy Nunez

Title: TBD Abstract: TBD Bio: Yonesy Núñez is the Chief Information Security Officer of Jack Henry & Associates (Jack Henry). In this role, he is responsible for ensuring effective business...

Read More about Yonesy Nunez

Palanisamy

Murali Palanisamy

AppViewX

Chief Solutions Officer

Murali Palanisamy

Title: Secure and Manage IoT Devices – Build a Strong Public Key Infrastructure (PKI) for IoT Abstract: The Internet of Things (IoT) is the next wave of innovation that connects the world at...

Read More about Murali Palanisamy

Pillitiere

Anthony Pillitiere

Horizon3.ai

CoFounder and CTO

Anthony Pillitiere

Title: Viewing Security Through the Eyes of an Attacker Abstract: Bio: "Anthony "Tony P" Pillitiere is the co-founder and Chief Technology Officer at Horizon3.ai, a cyber security company...

Read More about Anthony Pillitiere

Ramzan

Zulfikar Ramzan

RSA

CDO

Zulfikar Ramzan

Title: TBD Abstract: TBD Bio: As Chief Digital Officer, Zulfikar Ramzan leads RSA IT, Security and Risk Office, Cloud Transformation Organization, Facilities, and RSA Labs (a forward-...

Read More about Zulfikar Ramzan

Sentonas

Mike Sentonas

CrowdStrike

CTO

Mike Sentonas

Title: TBD Abstract: TBD Bio: Mike Sentonas is CrowdStrike’s Chief Technology Officer. Previously, he served as Vice President, Technology Strategy at CrowdStrike. With over 20 years’...

Read More about Mike Sentonas

Shareef

Syed Shareef

AWS

Sr. Security Solutions Analyst

Syed Shareef

Title: Operational Resilience from Ransomware Attacks in the Cloud Abstract: Building for operational resilience helps us quickly resume business operations and reduce the impact of...

Read More about Syed Shareef

Sheinis

Richard Sheinis

Hall Booth Smith, P.C.

Partner

Richard Sheinis

Cyber Insurance Panel Bio: Mr. Sheinis is a graduate of the Duke University School of Law. He is a Certified Information Privacy Professional (CIPP-US), a Certified Information Privacy...

Read More about Richard Sheinis

Stu Solomon

Recorded Future

COO

Stu Solomon

Title: Intelligence-Led Security: Building a Foundation for Proactive and Persistent Risk Mitigation  Abstract: In today's hyper-distributed world, where risk factors are spread over physical...

Read More about Stu Solomon

Springett

Steve Springett

ServiceNow

Service Manager, Product Security

Steve Springett

Title: SBOMs and CycloneDX Abstract: Bio: Steve Springett educates teams on the strategy and specifics of developing secure software. He practices security at every stage of the...

Read More about Steve Springett

Erika Totaro

National Cyber-Forensics Training Alliance

Intelligence Analyst, Malware and Cyber Threats

Erika Totaro

Title: A Bizarre Call Detonates BazarLoader Malware Abstract: Bio: Erika Totaro is an Intelligence Analyst for the Malware and Cyber Threats team at the National Cyber-Forensics and...

Read More about Erika Totaro

Wang

Yongge Wang

CCI

Professor

Yongge Wang

Dr. Yongge Wang is a professor at UNC Charlotte. Dr. Wang has published extensively on research topics including algorithmic information theory, cryptography, and post-quantum security. Dr. Wang has...

Read More about Yongge Wang