Jerry Dixon

Chief Information Security Officer, CrowdStrike

Jerry Dixon is the chief information security officer at CrowdStrike, with more than two decades of cybersecurity experience on the front lines of incident response, cyber crisis management, national cybersecurity policy and critical infrastructure protection.
 
Previously, he served as vice president, cyber threat intelligence and incident response at American Express, where he spearheaded the creation of forward-looking strategies to operationalize threat intelligence and prevent breaches.
 
Dixon has held multiple leadership positions at top-tier security companies and government agencies, including director-level positions at the Department of Homeland Security National Cyber Security Division and United States Computer Emergency Readiness Team. He is considered one of the foremost industry experts on risk mitigation, incident response and proactive security.





Jeff Williams

Co-Founder and Chief Technology Officer, Contrast Security

Jeff brings more than 20 years of security leadership experience as co-founder and Chief Technology Officer of Contrast. In 2002, Jeff co-founded and became CEO of Aspect Security, a successful and innovative consulting company focused on application security. Jeff is also a founder and major contributor to OWASP, where he served as the Chair of the OWASP Board for 8 years and created the OWASP Top 10, OWASP Enterprise Security API, OWASP Application Security Verification Standard, XSS Prevention Cheat Sheet, and many other widely adopted free and open projects. Jeff has a BA from Virginia, an MA from George Mason, and a JD from Georgetown.





Ehab Al-Shaer

Professor, UNC Charlotte

Ehab Al-Shaer is a Professor in Computer Science, the director of the Cyber Defense and Network Assurability (CyberDNA) Center, and the director of NSF IUCRC Center on Security Configuration Analytics and Automation in UNC Charlotte. His area of research expertise includes security analytics and automation, auto-resiliency, configuration verification and hardening for enterprise and cloud computing, cyber agility & moving target defense, security & resiliency of smart grid and IoT systems, security & resiliency metrics, and next-generation intrusion detection. Dr. Al-Shaer has edited/co-edited more than 9 books, and published about 190 refereed journals and conferences papers in his area. He was designated as a Subject Matter Expert (SME) in the area of security analytics and automation in DoD Information Assurance Newsletter published in 2011. He received the IBM Faculty Award in 2012. I was the General Chair of ACM Computer and Communication in 2009 and 2010 and NSF Workshop in Assurable and Usable Security Configuration in 2008. Dr. Al-Shaer was also the PC chair for many other conferences and workshops including ACM/IEEE SafeConfig 2009 and 2013, IEEE Integrated Management 2007, IEEE POLICY 2008, and others. Since he joined UNC Charlotte in 2009, Dr. Al-Shaer has received a total research funding of more than $8M from various government and industry sources including NSF, NSA, AFRL, ARO, Duke Energy, IBM, Bank of America, Wells Fargo, BB&T, RTI, DTCC and others.





Leonard Bailey

Department of Justice

Mr. Bailey is Special Counsel for National Security in the Computer Crime and Intellectual Property Section.  He has prosecuted computer crime cases and routinely advises on cybersecurity, searching and seizing electronic evidence, and conducting electronic surveillance.  He has managed DOJ cyber policy as Senior Counselor to the Assistant Attorney General for the National Security Division and then as an Associate Deputy Attorney General.  He has also served as Special Counsel and Special Investigative Counsel for DOJ’s Inspector General.

Mr. Bailey is a graduate of Yale University and Yale Law School.  He has taught law courses at Georgetown Law School and Columbus School of Law in Washington, D.C.

 

 





Timothy Bhatt

Chief Information Security Officer , Ally Financial

Tim Bhatt is currently the Chief Information Security Officer for Ally Financial where he is responsible for the strategy, execution, and operations for Information Security, IT Risk Management, Disaster Recovery, Business Continuity, and Enterprise Architecture.

Prior to this role, Bhatt served as the Chief Enterprise Architect for Ally Financial and Technology Executive for eCommerce and Deposits for Ally Bank.  Under Bhatt’s leadership, the teams evaluated leading edge technologies, implemented innovative opportunities to enable strategic business objectives, and established Technology Governance and Information Security Standards across Ally’s business lines and functions.

Bhatt has a diverse technology background in network, system, and security administration, and application development, having held positions at Bank of America – eCommerce Technology, JP Morgan Chase - Consumer Internet Group, and Lockheed Martin - Management and Data Systems.

Bhatt holds a Bachelor’s degree in Computer Engineering from Lehigh University, and a Master’s degree in Software Engineering from Pennsylvania State University.





Carl Cahill

Director, Cybersecurity Architecture and Assessment, Duke Energy

Carl is an information security leader with seventeen years’ experience in the Cybersecurity field. He is a bits and bytes guy who wrote his first program in seventh grade. Since then, Carl learned firewalls, monitoring, certificate management and Active Directory through hands-on experience. He has spent the last thirteen years at Duke Energy architecting solutions for mergers, divestitures, identity management, smart grid, cloud and virtualization.  Carl is a member of the Indiana Energy Association and Electric Power Research Institute’s Cybersecurity Committees. He has a B.A from Belmont Abbey College and holds a variety of industry certifications including CISSP and MCSE.





Roger Callahan

Managing Director, Information Assurance Advisory, LLC

Roger Callahan has over 50 years of prior experience spanning executive management and engineering responsibilities within both the National Security community and the Financial Services industry. He served as the Director for Information Assurance in the Office of the Assistant Secretary of Defense for Command, Control, Communications and Intelligence (1995-1998). At Bank of America (1998-2008) he was a Senior Vice President within the Corporate Information Security Organization and was responsible for developing the Bank of America information security policy and program foundations. Since 2008, he has provided cybersecurity-related advice and support to a variety of clients through his consulting organization.





Michelle Coviello

Vice President of Client Development, HireNetworks

Michelle is currently the VP of Client Development for HireNetworks, an IT executive recruiting and staffing firm based in Raleigh.  She is a Certified Personnel Consultant with almost 20 years of experience in the executive technology search business.  Prior employers include DCRI, a national personnel and employment services company, and the Sapient Corporation, a Cambridge, MA based software consulting firm. She has been a Board Member and President of the North Carolina Association of Staffing Professionals (NCASP).  She was named the NCTA - North Carolina Technology Association’s Ambassador of the Year for 2014.  She was a co-founder and President of the CRTEC (Charlotte Regional Technology Executives Council) organization in Charlotte.  She is also an active member of SIM Charlotte, Apparo, and Ballantyne IT.  She received a BA degree in Economics from Boston College and lives in Charlotte, NC with her husband and two children.





Chris Howser

VP Technology Manager, Wells Fargo





Louis Lyons

Founder & Chief Operating Officer, and Counsel, Illumina Consulting Group, Inc.

Louis M. Lyons, II is a founder, Chief Operating Officer, and Counsel for Illumina Consulting Group, Inc., a Maryland-based real-time Big Data streaming-analytics company. ICG’s LUX technology is patented software that correlates and analyzes large volumes of fast-moving, ever-changing data from hundreds of sources – right now. It powers Clairvoyance™, an innovative early-warning solution based on motivational analytics and organizational data that detects and stops insider threats before they occur.

Before joining ICG, Louis spent nearly 20 years at Ernst & Young, LLP, in a variety of operational roles for its U.S. and global tax line of service. He was director of EY’s technology services delivery organization for the Americas Tax practice, where his teams helped pioneer tax data analytics and visualization, cloud computing, robotics automation, and experimental cognitive computing applications for the business. He is a licensed attorney in Maryland where he lives with his wife, Christy, and two children.





Jim Maloney

Chief Information Security Officer, AvidXchange

Jim Maloney joined AvidXchange in April 2016 as Chief Information Security Officer. He has more than 30 years of IT experience, with the past 15 years being focused on information security, privacy and risk management. Recent positions Maloney has held include CISO for Mercury Payment Systems, Head of Security Solutions for retail banking at Barclays Bank, and Global Head of Information Security for Amazon.com. Maloney has current certifications including CISSP, CIPP/US, CIPP/E, CISM and CGEIT. He holds a master of science in management from Stanford University, an MBA from City University, a master of science in engineering from Northwestern University and a bachelor of science in system design from Marquette University. He is also a member of the FBI InfraGard program.



Abhishek Mehta CEO Tresata headshot

Abhishek Mehta

CEO & Co-Founder, Tresata

Abhishek Mehta is the CEO of Tresata, a predictive analytics company redefining business with a deep understanding of customer behavior. Launched in 2011, he has shaped Tresata into one of the most innovative, and fastest growing software companies in the world with a vision to ‘enrich life’.

Abhishek is recognized as one of the most influential thinkers, visionaries, and practitioners in the world of Big Data. He is known both as a radical technology expert and practical, in-the-trenches business leader. His expertise was honed as a known disruptor in classic business and technology roles at Bank of America, Cognizant Technology Solutions and Arthur Andersen and varied academic jaunts at MIT, SRCC & ICAI.

A passionate supporter of entrepreneurship in the SouthEast, Abhishek has been included in numerous lists of the top innovators, leaders and disruptors of our generation. He is a much sought after speaker on the topics of big data analytics, emerging business models and all customary intersections of the two.

About Tresata: Tresata is the leading predictive analytics platform for understanding and monetizing customer behaviors with a singular goal – to enrich lifeTM. This is achieved with great purity, precision, and personalization by Tresata’s analytics engines that have automated the discovery of knowledgeTM from raw data to actionable insight. For more information, visit tresata.com or contact curious@tresata.com

 





Maneesha Mithal

Associate Director, Division of Privacy & Identity Protection, Federal Trade Commission

Maneesha Mithal is the Associate Director of the Federal Trade Commission’s Division of Privacy and Identity Protection, which focuses on consumer privacy, data security, and credit reporting issues. In this capacity, she has managed significant initiatives, including reports on Big Data, the data broker industry, the Internet of Things, consumer privacy, facial recognition, and mobile privacy disclosures. She has testified before Congress on data security, connected
cars, facial recognition, and identity theft. She has also supervised Commission investigations that resulted in consent orders against companies such as Wyndham, Google, Facebook, Twitter, Lifelock, Equifax, HTC, and Snapchat. She has held numerous positions at the Commission, including Chief of Staff of the Bureau of Consumer Protection, and Assistant Director of the International Division of Consumer Protection. Prior to joining the Commission 1999, Ms. Mithal was an attorney at the Washington law firm of Covington Burling. Ms. Mithal earned her law degree from the Georgetown University Law Center and her undergraduate degree from Georgetown University.





Don Murdoch

Security Operations , SLAIT Consulting

Don Murdoch, GSE, is a seasoned IT leader with 25 years of IT and InfoSec experience, with the most recent decade as IT/InfoSec security Director, Enterprise and Security architect in the healthcare industry. Don also has significant experience as an instructor and course developer for SANS and other leading security organizations. Don is currently managing the security operations center for SLAIT Consulting.





Pete Murphy

Chief Information Officer, Cardinal Innovations

Pete Murphy joined Cardinal Innovations Healthcare as Chief Information Officer in 2011. He oversees technology delivery, data science and advanced analytics, enterprise project management and technology risk management services for the enterprise. Under his leadership, Cardinal Innovations is unsurpassed in providing state-of-the-art technology and business solutions in support of state government programs, behavioral health providers and plan members across North Carolina. 


Murphy has more than 30 years of experience in technology management, information security and risk management roles that include IT service management, selected business application portfolios, customer service desk, end-user support, messaging systems, mobile technology, voice and data telecommunications, data centers and technology supplier management. Before joining Cardinal Innovations, he held several significant roles as a member of the Executive Management Team at TIAA-CREF, including Chief Information Security Officer, Chief Technology Officer and as a Director for the TIAA-CREF Life Insurance Company. Prior to TIAA-CREF, he held positions of increasing responsibility with Bank of America and AmSouth Bank (now Regions Financial).

Murphy is a sought-out technology expert and was selected to write the foreword for Foundstone's Hacking Exposed, one of the best-selling international computer security publications. He also is a patent holder in the area of risk and control assessment. 

Murphy currently serves on the Health Informatics Advisory Board at the University of North Carolina at Charlotte, the Appalachian State University Computer Information Science Advisory Board, Learning Help Centers of Charlotte Board, and Chairs the Board for One7 Academy, Inc. He holds Certified Information Systems Auditor and Certified Information Security Manager certifications from the Information Systems Audit and Control Association.​​

 

 





Allen O'Rourke

Attorney, Litigation and Cybersecurity, Womble Carlyle Sandridge & Rice LLP

Allen O’Rourke is an attorney at Womble Carlyle Sandridge & Rice, LLP, who helps clients affected by data breaches and cyberattacks. Working with clients’ legal and information security teams, Allen investigates cybersecurity incidents, coordinates the remediation of breaches, interfaces with law enforcement as needed, and ensures compliance with applicable data breach laws and regulations. He also handles government investigations, regulatory enforcement actions, consumer class actions, and other cybersecurity litigation. He also provides counsel on active network defense, electronic evidence gathering, and related legal issues. Prior to joining Womble Carlyle, Allen was a Computer Hacking and Intellectual Property (CHIP) prosecutor at the U.S. Attorney’s Office for the District of Columbia, where he conducted numerous investigations into corporate data breaches, business email compromise schemes, “dark web” criminal forums, money laundering using Bitcoin, terrorist use of the Internet, and other cybercrime. He received two Special Achievement awards for his work to combat cybercrime. Before becoming a prosecutor, Allen clerked for Judge Anita Brody on the U.S. District Court for the Eastern District of Pennsylvania and for Judge Allyson Duncan on the U.S. Court of Appeals for the Fourth Circuit. He graduated from Harvard Law School in 2008.





Jim Peterman

Director, Product Security, Oracle Communications

Jim Peterman is Director of Product Security at Oracle’s Communications Global Business Unit.  In this role, Jim is responsible for helping product teams meet the industry’s stringent security requirements through the application of innovative security design, analysis, test and support methods.    He leads a team that helps assess the security impact of emerging technologies and formulates security strategies for on-premise, virtual and cloud-based environments.  Jim has worked in a variety of Government and Industry positions as design engineer, engineering manager and product manager, dealing with numerous telecommunications, networking, digital electronics, software engineering, and signal processing topics.  In addition to research and development, Jim has also been involved with engineering process improvement and quality initiatives serving as an ISO-9001 Internal Auditor and Team Leader.  He currently supports Oracle’s TL-9000 and ISO-27001 certification activities.  Jim is active in the Institute of Electrical and Electronics Engineers (IEEE) having served as Region 3 Student Professional Awareness Conference coordinator and enjoys speaking to student branches about career and professional issues and continuing education.  Jim is a member of the Tennessee Tech Electrical and Computer Engineering Industrial Advisory Board.  He holds BSEE and MSEE degrees from Tennessee Tech and an MBA from Regis University in Denver.  





Brian Proctor

Business Development Manager, SecurityMatters

Brian’s entire career has been focused on securing electric utility systems, networks, and assets. He spent the majority of his career (13+ years) as a ICS/SCADA cybersecurity engineer and cybersecurity team lead working for two progressive California Investor Owned Utilities (IOUs). In February of 2017 he joined SecurityMatters as their Business Development Manager to help promote passive ICS/SCADA network security monitoring, asset inventory, and situational awareness within the industrial control system security community. 

Brian holds a variety of technical certifications including the Global Industrial Control System Professional (GISCP), Certified Information Systems Security Professional (CISSP), Certified in Risk and Information Systems Control (CRISC), and is certified in project management from University of California at Irvine.  In 2013, Brian was presented with the Critical Infrastructure Private Sector award from Securing our eCity a San Diego based Cybersecurity non-profit organization. In 2016, Brian was a co-inventor of a R&D magazine top 100 award winner for one of the top inventions of the year relating to a GPS anti-spoofing mitigation technology.





David Rogers

Vice President, Cloud Security Business Development, Optiv

 

David Rogers is a global executive with over 20 years of diverse experience in technology. A career that began as a systems engineer has grown to sales, sales leadership, sales transformation and executive leadership for some of the most influential technology companies in the world and their partners. Rogers possesses an instinctive ability to develop and execute winning strategies for teams, organizations, and clients.

As Optiv’s vice president of cloud security business development, Rogers is responsible for three key areas: Developing Optiv’s rapidly growing cloud security (GTM) strategy; working with cloud service providers and security partners to create strategies that help clients expedite the adoption of cloud technologies; and building and leading the specialty sales and business development expertise to support sales regions across North America.

A global technology leader, Rogers has led hundreds of conversations with clients about their unique journey to the cloud and brings years of experience leading global transformation strategies focused on security, cloud, virtualization, application development, business continuity and consulting. He is also a partner at Six Thirty Cyber, an early stage business development accelerator for cyber security companies where he mentors the CEOs of those companies with the positioning and development of their go-to-market strategies.

Prior to joining Optiv, Rogers held multiple leadership roles supporting commercial, enterprise and Federal businesses across North America. He spent nearly 15 years at EMC in leadership roles, including the roles of senior account executive, regional sales management and as a senior director leading the

North America partner organization. His most recent position before joining Optiv included leading an executive team responsible for 800 partners and $4 billion in annual revenue leading the EMC North America channel sales transformation while growing the industry across all segments. Priorevious to EMC, Rogers spent a decorated 5 years in technical and sales roles at IBM.

Rogers also currently serves as a partner at Six Thirty Cyber, a business development accelerator that invests in cybersecurity-based technology companies. He has earned an Executive MBA from Washington University in St. Louis and a BA in from Truman State University.  He is a regular speaker at cyber security conferences, recipient of numerous excellence awards, and member of the Security Advisors Alliance.

 





Scott Shumate

CEO and Founder, Valutare, LLC

Dr. R. Scott Shumate is the CEO and founder of Valutare, LLC.  Scott has 33 years of national security experience with both the Central Intelligence Agency as an undercover operations officer and the Department of Defense with the Counterintelligence Field Activity as a Senior Executive level director of Behavioral Science support to the departments investigative and counterintelligence units.  He has developed an insider threat model based on reverse engineering the offensive operational approach to targeting and recruiting foreign assets to provide HUMINT.

Clairvoyance is a big data model, using ICG LUX, that predicts risk and insider detection based on network and readily obtained observables that pushes the detection to the far left to gain an early warning risk score.  The approach is unique and novel and examines motivational shifts.





Megan Stifel

Founder, Silicon Harbor Consultants, LLC

Megan Stifel is an attorney and the founder of Silicon Harbor Consultants, a firm that provides strategic cybersecurity operations and policy counsel. She currently serves as Director for Cybersecurity Policy at Public Knowledge and is also a Nonresident Senior Fellow in the Atlantic Council’s Cyber Statecraft Initiative. She previously served as a Director for International Cyber Policy at the National Security Council (NSC), where she was responsible for expanding the Obama Administration’s cybersecurity policy abroad, and was connected with internet governance, bilateral and multilateral engagement, and capacity building. Prior to the NSC, Ms. Stifel served in the U.S. Department of Justice (DOJ) as Director for Cyber Policy in the National Security Division and as counsel in the Criminal Division’s Computer Crime and Intellectual Property Section. Prior to law school, Ms. Stifel worked for the U.S. House of Representatives Permanent Select Committee on Intelligence. She received a Juris Doctorate from the Maurer School of Law at Indiana University, and her B.A. in International Studies and German, Magna Cum Laude, from the University of Notre Dame. She is a Partner in Social Venture Partners, Charleston.





David Waldrop

ICG Solutions





Yongge Wang

Professor, UNC Charlotte

Dr. Yongge Wang is a professor at UNC Charlotte. Dr. Wang has published extensively on research topics including algorithmic information theory, cryptography, and post-quantum security. Dr. Wang has proved several classical results in modern effective randomness research which are included as the fundamental theorems in most Algorithmic Information Theory graduate textbooks.  Dr. Wang is the holder of three patents and the inventor of two IEEE 1363 standardized techniques. Dr. Wang is one of the designers for fundamental W3C and IETF XML security techniques such as XMLENC and XMLDSig syntax. These standards are the starting point for all XML related security techniques. Dr. Wang played important roles in developing research and education programs at UNC Charlotte. Recently, Dr. Wang has been working on fully homomorphic encryption, garbled computation techniques, and apply these techniques to achieve privacy preserving computation in cloud. Dr. Wang has  designed quantum resistant public key encryption techniques RLCE (http://quantumca.org) and developed the software package readily to be integrated into current Internet infrastructure. Dr. Wang's RLCE technique has been submitted to NIST and is currently under consideration as a candidate for post-quantum cryptographic standards to defend national infrastructure in the quantum era.





Adrian Wood

Wells Fargo





Tin Zaw

Director of Security Solutions, Verizon

Tin Zaw has served as Verizon Digital Media Services’ director of global security solutions since 2015. He and his team provide managed and professional web security services for clients web properties. He launched the services during his first year at Verizon and continues to grow the operations each year.  

Prior to joining Verizon, Zaw led web and product security teams at AT&T and Intuit. He previously designed and implemented security products at Symantec and participated in the early days of the web infrastructure at Inktomi, which later became part of Yahoo!. He started his career by programming network protocols at QUALCOMM and Cerner.

A long-time volunteer with OWASP (Open Web Application Security Project), Zaw is a former president of its Los Angeles chapter and currently co-leads the OWASP project on Automated Threats to Web Applications. He received the OWASP Chapter Leader of the Year award at the AppSec USA conference in 2013.

Zaw graduated with a Bachelor’s degree in Computer Science from Pittsburg State University, Kansas. He obtained a Masters degree in Computer Science from the University of Southern California and an MBA from the USC Marshall School of Business.