Jerry Dixon - KeynoteChief Information Security Officer, CrowdStrike
Jerry Dixon is the chief information security officer at CrowdStrike, with more than two decades of cybersecurity experience on the front lines of incident response, cyber crisis management, national cybersecurity policy and critical infrastructure protection.
Previously, he served as vice president, cyber threat intelligence and incident response at American Express, where he spearheaded the creation of forward-looking strategies to operationalize threat intelligence and prevent breaches.
Dixon has held multiple leadership positions at top-tier security companies and government agencies, including director-level positions at the Department of Homeland Security National Cyber Security Division and United States Computer Emergency Readiness Team. He is considered one of the foremost industry experts on risk mitigation, incident response and proactive security.
Jeff Williams - KeynoteCo-Founder and Chief Technology Officer, Contrast Security
Jeff brings more than 20 years of security leadership experience as co-founder and Chief Technology Officer of Contrast. In 2002, Jeff co-founded and became CEO of Aspect Security, a successful and innovative consulting company focused on application security. Jeff is also a founder and major contributor to OWASP, where he served as the Chair of the OWASP Board for 8 years and created the OWASP Top 10, OWASP Enterprise Security API, OWASP Application Security Verification Standard, XSS Prevention Cheat Sheet, and many other widely adopted free and open projects. Jeff has a BA from Virginia, an MA from George Mason, and a JD from Georgetown.
Richard Thieme - KeynoteAuthor, Thieme Works
Richard Thieme (www.thiemeworks.com) is an author and professional speaker focused on the deeper implications of technology, religion and science for twenty-first century life. He speaks professionally about the challenges posed by new technologies and the future, how to redesign ourselves to meet these challenges, and creativity in response to radical change. His speaking generally addresses “the human in the machine,” technology-related security and intelligence issues as they come home to our humanity.
Thieme has published hundreds of articles, dozens of short stories, five books with more coming, and has delivered hundreds of speeches. His pre-blog column, "Islands in the Clickstream," was distributed to thousands of subscribers in sixty countries before collection as a book in 2004. When a friend at the NSA told him, "The only way you can tell the truth [that we discuss] is through fiction," he returned to writing short stories. One result of which is "Mind Games," a collection of nineteen stories about anomalies, infosec, professional intelligence and edgy realities. Another result is the novel "FOAM," published in 2015. More edgy realities are illuminated in the recently published and critically extolled “UFOs and Government: A Historical Inquiry” to which he contributed, a 5-year research project using material from inside the military and intelligence communities to document government responses to the phenomena from WW2 to the present. It is in the collections of 65 university libraries.
Thieme keynoted the first two Black Hats and spoke in 2017 at Def Con for the 22nd year. He has keynoted conferences around the world and clients range from GE, Microsoft and Medtronic to the NSA, the Pentagon, FBI, US Dept of the Treasury and the US Secret Service. His work has been taught at universities in Europe, Australia, Canada, and the United States, and he has guest lectured at numerous universities. He recently addressed the reinvention of “Europe” as a “cognitive artifact” for curators and artists at Museum Sztuki in Lodz, Poland; keynoted “The Real Truth: A World’s Fair” at Raven Row Gallery, London; and keynoted Code Blue in Tokyo.
Ehab Al-ShaerProfessor, UNC Charlotte
Ehab Al-Shaer is a Professor in Computer Science, the director of the Cyber Defense and Network Assurability (CyberDNA) Center, and the director of NSF IUCRC Center on Security Configuration Analytics and Automation in UNC Charlotte. His area of research expertise includes security analytics and automation, auto-resiliency, configuration verification and hardening for enterprise and cloud computing, cyber agility & moving target defense, security & resiliency of smart grid and IoT systems, security & resiliency metrics, and next-generation intrusion detection. Dr. Al-Shaer has edited/co-edited more than 9 books, and published about 190 refereed journals and conferences papers in his area. He was designated as a Subject Matter Expert (SME) in the area of security analytics and automation in DoD Information Assurance Newsletter published in 2011. He received the IBM Faculty Award in 2012. I was the General Chair of ACM Computer and Communication in 2009 and 2010 and NSF Workshop in Assurable and Usable Security Configuration in 2008. Dr. Al-Shaer was also the PC chair for many other conferences and workshops including ACM/IEEE SafeConfig 2009 and 2013, IEEE Integrated Management 2007, IEEE POLICY 2008, and others. Since he joined UNC Charlotte in 2009, Dr. Al-Shaer has received a total research funding of more than $8M from various government and industry sources including NSF, NSA, AFRL, ARO, Duke Energy, IBM, Bank of America, Wells Fargo, BB&T, RTI, DTCC and others.
Leonard BaileyDepartment of Justice
Mr. Bailey is Special Counsel for National Security in the Computer Crime and Intellectual Property Section. He has prosecuted computer crime cases and routinely advises on cybersecurity, searching and seizing electronic evidence, and conducting electronic surveillance. He has managed DOJ cyber policy as Senior Counselor to the Assistant Attorney General for the National Security Division and then as an Associate Deputy Attorney General. He has also served as Special Counsel and Special Investigative Counsel for DOJ’s Inspector General.
Mr. Bailey is a graduate of Yale University and Yale Law School. He has taught law courses at Georgetown Law School and Columbus School of Law in Washington, D.C.
Timothy BhattChief Information Security Officer , Ally Financial
Tim Bhatt is currently the Chief Information Security Officer for Ally Financial where he is responsible for the strategy, execution, and operations for Information Security, IT Risk Management, Disaster Recovery, Business Continuity, and Enterprise Architecture.
Prior to this role, Bhatt served as the Chief Enterprise Architect for Ally Financial and Technology Executive for eCommerce and Deposits for Ally Bank. Under Bhatt’s leadership, the teams evaluated leading edge technologies, implemented innovative opportunities to enable strategic business objectives, and established Technology Governance and Information Security Standards across Ally’s business lines and functions.
Bhatt has a diverse technology background in network, system, and security administration, and application development, having held positions at Bank of America – eCommerce Technology, JP Morgan Chase - Consumer Internet Group, and Lockheed Martin - Management and Data Systems.
Bhatt holds a Bachelor’s degree in Computer Engineering from Lehigh University, and a Master’s degree in Software Engineering from Pennsylvania State University.
Dan BlumSecurity Architects Partners
An internationally-recognized expert in security, privacy, cloud computing and identity management Dan Blum leads and delivers consulting projects spanning multiple industries for Security Architects Partners. Formerly a Golden Quill award-winning VP and Distinguished Analyst at Gartner, he has led or contributed to projects such as: cloud security and privacy assessments, security organization and risk management framework development, and identity architectures. He’s also consulted on technical security engagements in all areas of data protection domains including enterprise authorization, DLP, privileged access management, and encryption/key management.
Mr. Blum holds a CISSP certification. He is a frequent speaker at industry events and has participated in industry groups such as ISACA, the CSA, Kantara Initiative, OASIS, and others.
Carl CahillDirector, Cybersecurity Architecture and Assessment, Duke Energy
Carl is an information security leader with seventeen years’ experience in the Cybersecurity field. He is a bits and bytes guy who wrote his first program in seventh grade. Since then, Carl learned firewalls, monitoring, certificate management and Active Directory through hands-on experience. He has spent the last thirteen years at Duke Energy architecting solutions for mergers, divestitures, identity management, smart grid, cloud and virtualization. Carl is a member of the Indiana Energy Association and Electric Power Research Institute’s Cybersecurity Committees. He has a B.A from Belmont Abbey College and holds a variety of industry certifications including CISSP and MCSE.
Roger CallahanManaging Director, Information Assurance Advisory, LLC
Roger Callahan has over 50 years of prior experience spanning executive management and engineering responsibilities within both the National Security community and the Financial Services industry. He served as the Director for Information Assurance in the Office of the Assistant Secretary of Defense for Command, Control, Communications and Intelligence (1995-1998). At Bank of America (1998-2008) he was a Senior Vice President within the Corporate Information Security Organization and was responsible for developing the Bank of America information security policy and program foundations. Since 2008, he has provided cybersecurity-related advice and support to a variety of clients through his consulting organization.
Michelle CovielloVice President of Client Development, HireNetworks
Michelle is currently the VP of Client Development for HireNetworks, an IT executive recruiting and staffing firm based in Raleigh. She is a Certified Personnel Consultant with almost 20 years of experience in the executive technology search business. Prior employers include DCRI, a national personnel and employment services company, and the Sapient Corporation, a Cambridge, MA based software consulting firm. She has been a Board Member and President of the North Carolina Association of Staffing Professionals (NCASP). She was named the NCTA - North Carolina Technology Association’s Ambassador of the Year for 2014. She was a co-founder and President of the CRTEC (Charlotte Regional Technology Executives Council) organization in Charlotte. She is also an active member of SIM Charlotte, Apparo, and Ballantyne IT. She received a BA degree in Economics from Boston College and lives in Charlotte, NC with her husband and two children.
Vince CrislerCEO and Co-Founder, DarkCubed
Vince Crisler has more than 20 years of IT and cyber security leadership within the Department of Defense, federal civilian government, and private sector. He is the CEO and Co-Founder of Dark Cubed, a cyber security product startup company in the Washington D.C. Area.
Prior to founding Dark Cubed, Crisler supported the Department of Homeland Security (DHS) and Sandia National Laboratories in the development of cyber security protection programs to defend the networks of Federal Departments and Agencies, as well as those belonging to critical infrastructure and key resources (CI/KR) owners and operators. In this role, he was the primary author for the five-year technical vision for the National Cybersecurity Protection System, a $3B cyber security program within DHS. He was also a co-author of the DHS Enhanced Cyber Services (ECS) Policy Paper for the National Security Staff, establishing a critical cyber security information-sharing program in preparation for Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity, and Presidential Policy Directive (PPD)-21 Critical Infrastructure Security and Resilience.
Crisler also served as the Director of Information Assurance for the White House's Executive Office of the President and was responsible for the creation of the first ever cyber security operations center to protect White House networks.
Prior to the White House, Crisler served in the United States Air Force in organizations to include the White House Communications Agency, the National Military Command Center in the Pentagon, and Ramstein Air Base in Germany. Crisler earned a Bachelor of Science in Computer and Information Science from the Ohio State University and currently lives in the Washington D.C. area.
Brian CyprianSpecial Agent & Supervisor, Charlotte Cyber Task Force, Federal Bureau of Investigation
Brian N. Cyprian has been a Special Agent since 2005 and supervisor for the Charlotte Cyber Task Force since March 2016. Prior to reporting to Charlotte, Cyprian was assigned to FBI Headquarters, Cyber Division, where he managed national security cyber intrusion investigations. He has worked in the Chicago and Kansas City Field Offices, and was in charge of the online distance education program at a regional university before joining the FBI. Cyprian has a B.S. in Computer Information Systems and a MBA from Texas A&M University–Commerce.
Pam DinglePrincipal Technical Architect, Ping Identity
Pamela Dingle is a well-known contributor in the identity management world, with over 15 years of experience focusing on implementation and system architecture, providing strategic direction in web access management solutions, provisioning and federation services. A Principal Technical Architect at Ping Identity in the office of the CTO, Pamela serves on the board of directors for the OpenID foundation, and focuses on architecture and implementation of new and existing identity standards.
Keith GordonInformation Security And Risk Management Executive, Ally Financial
Keith Gordon is the Information Security and Risk Management Executive for Ally Financial where he is responsible for Strategy, Innovation and Security Architecture; Data Security and 3rd party/Supplier Security, Cyber Analytics, User Behavior Analytics for Information Security as well as Enterprise Disaster Recovery & Business Continuity.
Prior, Gordon worked at Bank of America in Global Information Security where he held roles as the Business Information Security Officer as well as leading the Cyber Threat Intelligence and Customer Protection team. Gordon began his career with Bank of America in 2003 supporting Consumer Banking Technologies where his focus was technology risk, security and fraud. In 2010, Gordon was appointed the Security, Fraud and Identify executive where he developed and managed authentication, security strategies and product development for Consumer Banking. His teams led the effort to define and build the enterprise standards for application security, vulnerability management and compliance, resulting in the bank's Enterprise Cyber Security strategy.
Gordon left Bank of America in 2012 to take on a role as Enterprise Information Security and IT Risk Management executive at Capital One. He returned to Bank of America in August 2014 as the Business Information Security Officer.
Keith graduated from Anderson University with a Bachelor of Arts degree in Marketing and Mathematics. He lives in Charlotte, North Carolina.
Tiffany HarbourVice President, Global Cybersecurity Public Policy, Bank of America
Dr. Tiffany K. Harbour is an Information Security Engineer working on global cyber security public policy efforts for Bank of America.
Prior to joining the Cyber Public Policy team, Tiffany was the lead coordinator for Latin America, Global Wholesale Banking, and Global Markets and Technology for the Cyber Threat Exercise cyber resiliency efforts.
Prior to joining Bank of America, Tiffany served as the Cyber Mission Manager for a national intelligence center and has held several supervisory and senior intelligence roles focused on information operations, telecommunications, open source exploitation, and strategic outreach in support of offensive and defensive computer network operations. She served as the United States Intelligence Community lead for the Enterprise Protection Risk Management program. Tiffany is also a veteran of the US Army.
Tiffany holds a Doctorate in Public Policy and Administration from Walden University, a Masters in Latin American Studies from the University of Arizona, and a Masters in Humanities with a focus on Modern Languages from Wright State University. She is a graduate of Air War College and Air Command and Staff College. She was awarded the Tinker Fellowship for field research in Latin America. Tiffany also speaks English, Portuguese and Spanish.
Chris HowserVP Technology Manager, Wells Fargo
Chris Howser is an information security manager responsible for managing four teams conducting application penetration testing at a large financial institution. Previously he was an information security architect specializing in the design of application security controls for Internet exposed applications. He also has development experience with a variety of client/server, web, mobile, and mainframe applications. Chris holds two patents for authentication of networked computer applications. He received his B.S. with a major in Computer Science from East Tennessee State University.
Louis LyonsFounder & Chief Operating Officer, and Counsel, Illumina Consulting Group, Inc.
Louis M. Lyons, II is a founder, Chief Operating Officer, and Counsel for Illumina Consulting Group, Inc., a Maryland-based real-time Big Data streaming-analytics company. ICG’s LUX technology is patented software that correlates and analyzes large volumes of fast-moving, ever-changing data from hundreds of sources – right now. It powers Clairvoyance™, an innovative early-warning solution based on motivational analytics and organizational data that detects and stops insider threats before they occur.
Before joining ICG, Louis spent nearly 20 years at Ernst & Young, LLP, in a variety of operational roles for its U.S. and global tax line of service. He was director of EY’s technology services delivery organization for the Americas Tax practice, where his teams helped pioneer tax data analytics and visualization, cloud computing, robotics automation, and experimental cognitive computing applications for the business. He is a licensed attorney in Maryland where he lives with his wife, Christy, and two children.
Jim MaloneyChief Information Security Officer, AvidXchange
Jim Maloney joined AvidXchange in April 2016 as Chief Information Security Officer. He has more than 30 years of IT experience, with the past 15 years being focused on information security, privacy and risk management. Recent positions Maloney has held include CISO for Mercury Payment Systems, Head of Security Solutions for retail banking at Barclays Bank, and Global Head of Information Security for Amazon.com. Maloney has current certifications including CISSP, CIPP/US, CIPP/E, CISM and CGEIT. He holds a master of science in management from Stanford University, an MBA from City University, a master of science in engineering from Northwestern University and a bachelor of science in system design from Marquette University. He is also a member of the FBI InfraGard program.
Abhishek MehtaCEO & Co-Founder, Tresata
Abhishek Mehta is the CEO of Tresata, a predictive analytics company redefining business with a deep understanding of customer behavior. Launched in 2011, he has shaped Tresata into one of the most innovative, and fastest growing software companies in the world with a vision to ‘enrich life’.
Abhishek is recognized as one of the most influential thinkers, visionaries, and practitioners in the world of Big Data. He is known both as a radical technology expert and practical, in-the-trenches business leader. His expertise was honed as a known disruptor in classic business and technology roles at Bank of America, Cognizant Technology Solutions and Arthur Andersen and varied academic jaunts at MIT, SRCC & ICAI.
A passionate supporter of entrepreneurship in the SouthEast, Abhishek has been included in numerous lists of the top innovators, leaders and disruptors of our generation. He is a much sought after speaker on the topics of big data analytics, emerging business models and all customary intersections of the two.
About Tresata: Tresata is the leading predictive analytics platform for understanding and monetizing customer behaviors with a singular goal – to enrich lifeTM. This is achieved with great purity, precision, and personalization by Tresata’s analytics engines that have automated the discovery of knowledgeTM from raw data to actionable insight. For more information, visit tresata.com or contact firstname.lastname@example.org
Maneesha MithalAssociate Director, Division of Privacy & Identity Protection, Federal Trade Commission
Maneesha Mithal is the Associate Director of the Federal Trade Commission’s Division of Privacy and Identity Protection, which focuses on consumer privacy, data security, and credit reporting issues. In this capacity, she has managed significant initiatives, including reports on Big Data, the data broker industry, the Internet of Things, consumer privacy, facial recognition, and mobile privacy disclosures. She has testified before Congress on data security, connected
cars, facial recognition, and identity theft. She has also supervised Commission investigations that resulted in consent orders against companies such as Wyndham, Google, Facebook, Twitter, Lifelock, Equifax, HTC, and Snapchat. She has held numerous positions at the Commission, including Chief of Staff of the Bureau of Consumer Protection, and Assistant Director of the International Division of Consumer Protection. Prior to joining the Commission 1999, Ms. Mithal was an attorney at the Washington law firm of Covington Burling. Ms. Mithal earned her law degree from the Georgetown University Law Center and her undergraduate degree from Georgetown University.
Srinivas MukkamalaCEO and Co-Founder, RiskSense
Srinivas Mukkamala is one of the Co-founders and CEO of RiskSense, a cyber security Spinoff of New Mexico Tech. Srinivas has been researching and developing security technologies for over 15 years, working on malware analytics (focuses on medical control systems and nontraditional computing devices), breach exposure management, Web application security and enterprise risk reduction.
Srinivas was one of the lead researchers for CACTUS (Computational Analysis of Cyber Terrorism against the US). Dr. Mukkamala has over 120 peer-reviewed publications in the areas of information assurance, malware analytics, digital forensics, data mining and bioinformatics. He has a patent on Intelligent Agents for Distributed Intrusion Detection System and Method of Practicing.
Dr. Mukkamala received his Bachelor of Engineering (B.E.) in Computer Science and Engineering from University of Madras before obtaining his M.S. and Ph.D. in Computer Science from New Mexico Tech.
Don MurdochSecurity Operations , SLAIT Consulting
Don Murdoch, GSE, is a seasoned IT leader with 25 years of IT and InfoSec experience, with the most recent decade as IT/InfoSec security Director, Enterprise and Security architect in the healthcare industry. Don also has significant experience as an instructor and course developer for SANS and other leading security organizations. Don is currently managing the security operations center for SLAIT Consulting.
Pete MurphyChief Information Officer, Cardinal Innovations
Pete Murphy joined Cardinal Innovations Healthcare as Chief Information Officer in 2011. He oversees technology delivery, data science and advanced analytics, enterprise project management and technology risk management services for the enterprise. Under his leadership, Cardinal Innovations is unsurpassed in providing state-of-the-art technology and business solutions in support of state government programs, behavioral health providers and plan members across North Carolina.
Murphy has more than 30 years of experience in technology management, information security and risk management roles that include IT service management, selected business application portfolios, customer service desk, end-user support, messaging systems, mobile technology, voice and data telecommunications, data centers and technology supplier management. Before joining Cardinal Innovations, he held several significant roles as a member of the Executive Management Team at TIAA-CREF, including Chief Information Security Officer, Chief Technology Officer and as a Director for the TIAA-CREF Life Insurance Company. Prior to TIAA-CREF, he held positions of increasing responsibility with Bank of America and AmSouth Bank (now Regions Financial).
Murphy is a sought-out technology expert and was selected to write the foreword for Foundstone's Hacking Exposed, one of the best-selling international computer security publications. He also is a patent holder in the area of risk and control assessment.
Murphy currently serves on the Health Informatics Advisory Board at the University of North Carolina at Charlotte, the Appalachian State University Computer Information Science Advisory Board, Learning Help Centers of Charlotte Board, and Chairs the Board for One7 Academy, Inc. He holds Certified Information Systems Auditor and Certified Information Security Manager certifications from the Information Systems Audit and Control Association.
Allen O'RourkeAttorney, Litigation and Cybersecurity, Womble Carlyle Sandridge & Rice LLP
Allen O’Rourke is an attorney at Womble Carlyle Sandridge & Rice, LLP, who helps clients affected by data breaches and cyberattacks. Working with clients’ legal and information security teams, Allen investigates cybersecurity incidents, coordinates the remediation of breaches, interfaces with law enforcement as needed, and ensures compliance with applicable data breach laws and regulations. He also handles government investigations, regulatory enforcement actions, consumer class actions, and other cybersecurity litigation. He also provides counsel on active network defense, electronic evidence gathering, and related legal issues. Prior to joining Womble Carlyle, Allen was a Computer Hacking and Intellectual Property (CHIP) prosecutor at the U.S. Attorney’s Office for the District of Columbia, where he conducted numerous investigations into corporate data breaches, business email compromise schemes, “dark web” criminal forums, money laundering using Bitcoin, terrorist use of the Internet, and other cybercrime. He received two Special Achievement awards for his work to combat cybercrime. Before becoming a prosecutor, Allen clerked for Judge Anita Brody on the U.S. District Court for the Eastern District of Pennsylvania and for Judge Allyson Duncan on the U.S. Court of Appeals for the Fourth Circuit. He graduated from Harvard Law School in 2008.
Jim PetermanDirector, Product Security, Oracle Communications
Jim Peterman is Director of Product Security at Oracle’s Communications Global Business Unit. In this role, Jim is responsible for helping product teams meet the industry’s stringent security requirements through the application of innovative security design, analysis, test and support methods. He leads a team that helps assess the security impact of emerging technologies and formulates security strategies for on-premise, virtual and cloud-based environments. Jim has worked in a variety of Government and Industry positions as design engineer, engineering manager and product manager, dealing with numerous telecommunications, networking, digital electronics, software engineering, and signal processing topics. In addition to research and development, Jim has also been involved with engineering process improvement and quality initiatives serving as an ISO-9001 Internal Auditor and Team Leader. He currently supports Oracle’s TL-9000 and ISO-27001 certification activities. Jim is active in the Institute of Electrical and Electronics Engineers (IEEE) having served as Region 3 Student Professional Awareness Conference coordinator and enjoys speaking to student branches about career and professional issues and continuing education. Jim is a member of the Tennessee Tech Electrical and Computer Engineering Industrial Advisory Board. He holds BSEE and MSEE degrees from Tennessee Tech and an MBA from Regis University in Denver.
Brian ProctorBusiness Development Manager, SecurityMatters
Brian’s entire career has been focused on securing electric utility systems, networks, and assets. He spent the majority of his career (13+ years) as a ICS/SCADA cybersecurity engineer and cybersecurity team lead working for two progressive California Investor Owned Utilities (IOUs). In February of 2017 he joined SecurityMatters as their Business Development Manager to help promote passive ICS/SCADA network security monitoring, asset inventory, and situational awareness within the industrial control system security community.
Brian holds a variety of technical certifications including the Global Industrial Control System Professional (GISCP), Certified Information Systems Security Professional (CISSP), Certified in Risk and Information Systems Control (CRISC), and is certified in project management from University of California at Irvine. In 2013, Brian was presented with the Critical Infrastructure Private Sector award from Securing our eCity a San Diego based Cybersecurity non-profit organization. In 2016, Brian was a co-inventor of a R&D magazine top 100 award winner for one of the top inventions of the year relating to a GPS anti-spoofing mitigation technology.
David RogersVice President, Cloud Security Business Development, Optiv
David Rogers is a global executive with over 20 years of diverse experience in technology. A career that began as a systems engineer has grown to sales, sales leadership, sales transformation and executive leadership for some of the most influential technology companies in the world and their partners. Rogers possesses an instinctive ability to develop and execute winning strategies for teams, organizations, and clients.
As Optiv’s vice president of cloud security business development, Rogers is responsible for three key areas: Developing Optiv’s rapidly growing cloud security (GTM) strategy; working with cloud service providers and security partners to create strategies that help clients expedite the adoption of cloud technologies; and building and leading the specialty sales and business development expertise to support sales regions across North America.
A global technology leader, Rogers has led hundreds of conversations with clients about their unique journey to the cloud and brings years of experience leading global transformation strategies focused on security, cloud, virtualization, application development, business continuity and consulting. He is also a partner at Six Thirty Cyber, an early stage business development accelerator for cyber security companies where he mentors the CEOs of those companies with the positioning and development of their go-to-market strategies.
Prior to joining Optiv, Rogers held multiple leadership roles supporting commercial, enterprise and Federal businesses across North America. He spent nearly 15 years at EMC in leadership roles, including the roles of senior account executive, regional sales management and as a senior director leading the
North America partner organization. His most recent position before joining Optiv included leading an executive team responsible for 800 partners and $4 billion in annual revenue leading the EMC North America channel sales transformation while growing the industry across all segments. Priorevious to EMC, Rogers spent a decorated 5 years in technical and sales roles at IBM.
Rogers also currently serves as a partner at Six Thirty Cyber, a business development accelerator that invests in cybersecurity-based technology companies. He has earned an Executive MBA from Washington University in St. Louis and a BA in from Truman State University. He is a regular speaker at cyber security conferences, recipient of numerous excellence awards, and member of the Security Advisors Alliance.
Scott ShumateCEO and Founder, Valutare, LLC
Dr. R. Scott Shumate is the CEO and founder of Valutare, LLC. Scott has 33 years of national security experience with both the Central Intelligence Agency as an undercover operations officer and the Department of Defense with the Counterintelligence Field Activity as a Senior Executive level director of Behavioral Science support to the departments investigative and counterintelligence units. He has developed an insider threat model based on reverse engineering the offensive operational approach to targeting and recruiting foreign assets to provide HUMINT.
Clairvoyance is a big data model, using ICG LUX, that predicts risk and insider detection based on network and readily obtained observables that pushes the detection to the far left to gain an early warning risk score. The approach is unique and novel and examines motivational shifts.
Megan StifelFounder, Silicon Harbor Consultants, LLC
Megan Stifel is an attorney and the founder of Silicon Harbor Consultants, a firm that provides strategic cybersecurity operations and policy counsel. She currently serves as Director for Cybersecurity Policy at Public Knowledge and is also a Nonresident Senior Fellow in the Atlantic Council’s Cyber Statecraft Initiative. She previously served as a Director for International Cyber Policy at the National Security Council (NSC), where she was responsible for expanding the Obama Administration’s cybersecurity policy abroad, and was connected with internet governance, bilateral and multilateral engagement, and capacity building. Prior to the NSC, Ms. Stifel served in the U.S. Department of Justice (DOJ) as Director for Cyber Policy in the National Security Division and as counsel in the Criminal Division’s Computer Crime and Intellectual Property Section. Prior to law school, Ms. Stifel worked for the U.S. House of Representatives Permanent Select Committee on Intelligence. She received a Juris Doctorate from the Maurer School of Law at Indiana University, and her B.A. in International Studies and German, Magna Cum Laude, from the University of Notre Dame. She is a Partner in Social Venture Partners, Charleston.
Yongge WangProfessor, UNC Charlotte
Dr. Yongge Wang is a professor at UNC Charlotte. Dr. Wang has published extensively on research topics including algorithmic information theory, cryptography, and post-quantum security. Dr. Wang has proved several classical results in modern effective randomness research which are included as the fundamental theorems in most Algorithmic Information Theory graduate textbooks. Dr. Wang is the holder of three patents and the inventor of two IEEE 1363 standardized techniques. Dr. Wang is one of the designers for fundamental W3C and IETF XML security techniques such as XMLENC and XMLDSig syntax. These standards are the starting point for all XML related security techniques. Dr. Wang played important roles in developing research and education programs at UNC Charlotte. Recently, Dr. Wang has been working on fully homomorphic encryption, garbled computation techniques, and apply these techniques to achieve privacy preserving computation in cloud. Dr. Wang has designed quantum resistant public key encryption techniques RLCE (http://quantumca.org) and developed the software package readily to be integrated into current Internet infrastructure. Dr. Wang's RLCE technique has been submitted to NIST and is currently under consideration as a candidate for post-quantum cryptographic standards to defend national infrastructure in the quantum era.
Adrian WoodWells Fargo
Adrian Wood is a penetration tester with experience in network, application and physical security across multiple industries and platforms, currently employed at a large financial institution conducting application penetration testing. Previously he was the founder at WHITEHACK, an Australian information security consultancy specializing in penetration testing, before its sale to a large advisory group. Adrian was also an adjunct network security analyst for the school of Science and technology at the University of New England, Australia. His interests lie with web and mobile application security and cryptography of which he utilities for bug bounty hunting.
Tin ZawDirector of Security Solutions, Verizon
Tin Zaw has served as Verizon Digital Media Services’ director of global security solutions since 2015. He and his team provide managed and professional web security services for clients web properties. He launched the services during his first year at Verizon and continues to grow the operations each year.
Prior to joining Verizon, Zaw led web and product security teams at AT&T and Intuit. He previously designed and implemented security products at Symantec and participated in the early days of the web infrastructure at Inktomi, which later became part of Yahoo!. He started his career by programming network protocols at QUALCOMM and Cerner.
A long-time volunteer with OWASP (Open Web Application Security Project), Zaw is a former president of its Los Angeles chapter and currently co-leads the OWASP project on Automated Threats to Web Applications. He received the OWASP Chapter Leader of the Year award at the AppSec USA conference in 2013.
Zaw graduated with a Bachelor’s degree in Computer Science from Pittsburg State University, Kansas. He obtained a Masters degree in Computer Science from the University of Southern California and an MBA from the USC Marshall School of Business.