Speakers

Ehab Al-Shaer

Ehab Al-Shaer

Professor and Dir - CYBER DEFENSE AND NETWORK ASSURABILITY CENTER, CCI

Automation of Cyber Threat Intelligence Analytics and Hunting

Ehab Al-Shaer

Abstract: Cyber threat intelligence (CYI) information provides great capabilities for enterprises to develop advanced threat notification and initiate proactive defense. However, the amount of...

Read More about Ehab Al-Shaer

Joel Amick

Joel Amick

Dir Cyber Analytics and Data Science, TIAA

Threat Hunting with Data Mining and Analytics

Joel Amick

Abstract: Threat Hunting has become widely popular in the Cyber Security Industry, and for good reason. Becoming more proactive and finding problems before they escalate can result in huge savings...

Read More about Joel Amick

Alysa Austin

Alysa Austin

PANELIST

Privacy and Cybersecurity Team, Womble Bond Dickinson

Alysa Austin

Alysa Austin recently joined Womble Bond Dickinson (US) LLP as a litigation associate and a key member of the Privacy and Cybersecurity Team.  She has authored several articles and spoken on...

Read More about Alysa Austin

Ken Bailey

Ken Bailey

PANELIST

Chief Information Security Officer, Fortalice

Ken Bailey

Ken Bailey is a strategic and tactical operational leader, who earned a BA in History at Beloit College, as well as a Certificate of Intelligence Studies in Counterintelligence. He has been featured...

Read More about Ken Bailey

Ken Beer

Ken Beer

GM - AWS Management service, Amazon

Ken Beer

Ken Beer is the General Manager of the AWS Key Management Service, a root of trust for all AWS customers to protect their most sensitive digital assets. Ken has worked in identity and access...

Read More about Ken Beer

Jeff Crume

Jeff Crume

Distinguished Engineer and IT Security Architect, IBM

Leveraging AI for Cyber Security

Jeff Crume

Abstract: Leveraging AI for Cyber Security. In February 2011 an historic event took place. IBM’s Watson computer competed against the two biggest winners of the TV quiz show Jeopardy! — and the...

Read More about Jeff Crume

Brian Cyprian

Brian Cyprian

PANELIST

Special Agent, FBI

Brian Cyprian

Brian N. Cyprian has been a Special Agent since 2005 and supervisor for the Charlotte Cyber Task Force since March 2016.  Cyprian develops strategy to defeat cyber adversaries and to protect U.S...

Read More about Brian Cyprian

Eric Docktor

Eric Docktor

AWS Cryptography, Amazon

Eric Docktor

Eric Docktor has worked at Amazon.com for the last 19 years. He leads the AWS Cryptography organization, a team that builds services that allow AWS customers to secure their data and applications in...

Read More about Eric Docktor

Matt Donato

Matt Donato

PANELIST

Co-Founder-Managing Partner, HuntSource

Matt Donato

Matt Donato is the expert cybersecurity and data solutions firms trust when they need to make their most strategic investments - their employees. After recognizing the deep need for filling the...

Read More about Matt Donato

Kim Fleming

Kim Fleming

PANELIST

Dir of Global Privacy and Enterprise Risk, Secureworks

Kim Fleming

Kim Fleming is the Director of Global Privacy and Enterprise Risk for Secureworks and is based in the Atlanta headquarters. After joining Secureworks in January  2017, she successfully designed...

Read More about Kim Fleming

Christine Frye

Christine Frye

PANELIST

SVP-CPO, Bank of America

Christine Frye

Christine Frye is Senior Vice President and Chief Privacy Officer for Bank of America. She is responsible for leading the Enterprise Privacy Program at Bank of America with global responsibility for...

Read More about Christine Frye

Jeremiah Grant

Jeremiah Grant

PANELIST

CISO, Novant Health

Jeremiah Grant

Jeremiah Grant serves as the Chief Information Security Officer for Novant Health where he has established and grown the organization’s comprehensive business aligned, cybersecurity program. ...

Read More about Jeremiah Grant

Jeff Greene

Jeff Greene

VP, Global Government Affairs & Policy, Symantec

The Five Stages of (IoT) Grief

Jeff Greene

Abstract: The Five Stages of (IoT) Grief. From denial to acceptance, Jeff will walk through the five stages of (IoT) grief, and talk about how we can all come to grips with the explosion of...

Read More about Jeff Greene

JonHightower

Jon Hightower

Presenter - Small Business Seminar

Strengthening Your Cyber Defense

Jon Hightower

Jon D. Hightower is the Director of IT Risk and Assurance Services at GreerWalker LLP and serves as the Firm’s knowledge leader on Cybersecurity, Compliance and Privacy, IT Audits, Technology...

Read More about Jon Hightower

Scott Hubert

Scott Hubert

Dir Product Management, TITUS

The Rise of Machine Learning and Behavioral Analytics in Data Protection

Scott Hubert

Abstract: Machine learning is having a profound impact on cybersecurity. But how can it be practically applied to data protection? It all comes down to knowing what data organizations have and...

Read More about Scott Hubert

Gaudy Jandron

Gaudy Jandron

Presenter - Small Business Seminar

Bridging the Cybersecurity Gap

Gaudy Jandron

  Gaudy Jandron is an IT and Cybersecurity professional with more than 19 years of experience in Healthcare, Financial and Retail verticals.   Ms. Jandron’s experience includes...

Read More about Gaudy Jandron

Brandi Keough

Brandi Keough

Information Security Analyst, Novant Health

Applying the Scientific Method to Cybersecurity Event Analysis

Brandi Keough

Abstract: What is one of the biggest frustrations when analyzing a cybersecurity event? To me, it is a simple frustration of not knowing where to go next with my investigation. I find that it is...

Read More about Brandi Keough

Mischel Kwon

Mischel Kwon

Founder-CEO, MKACyber

Getting the Board’s Buy-In Through SOC Metrics

Mischel Kwon

Abstract: Have Board meetings felt career ending? Bring Board members into the fight. By using real stats and metrics with a solid understanding of the business you can clearly articulate risk,...

Read More about Mischel Kwon

Briana MacIntyre

Briana MacIntyre

CEO, The Logos Group & CRISO - Kingsmen Software

The New Definition of CyberSecurity; How Organizations Survive the Talent Deficit.

Briana MacIntyre

Abstract: The New Definition of CyberSecurity; How Organizations Survive the Talent Deficit. With increased regulatory, legal and client pressures to secure critical information and infrastructure...

Read More about Briana MacIntyre

Sammy Migues

Sammy Migues

Principal Scientist, Synopsis

Risk: They Can't Manage What They Don't Know About

Sammy Migues

Abstract: They Can't Manage What They Don't Know About. Many application security owners haven’t had “the risk talk” with groups in their organization.  "What do evolving agile, continuous...

Read More about Sammy Migues

Andre Mintz

PANELIST

SVP-CISO, Red Ventures

Andre Mintz

Andre Mintz joined Red Ventures in 2017 to shape all aspects of our information security strategy and to mitigate data security-related risks. He plays a key role in protecting our partners and...

Read More about Andre Mintz

Nick Mistry

Nick Mistry

SVP - Enterprise Information Security, Wells Fargo

Addressing the Cloud Security Challenge

Nick Mistry

Abstract:  How to build a Cloud Security strategy focused on delivering safety and soundness to the business through controlled environments, policies, procedures and automated controls that...

Read More about Nick Mistry

Wendy Nather

Wendy Nather

Dir of Advisory CISOs, Duo Security

Denial of Trust: The New Attacks

Wendy Nather

Abstract: As our software goes, so goes our society. From the biases we inject into algorithms, to flawed security trust models in our architecture, to “dark patterns” in design, to social platforms...

Read More about Wendy Nather

Chris Nickerson

Chris Nickerson

CEO, Lares

Getting Value from Testing, Not Just a Report

Chris Nickerson

Abstract: Getting Value from testing, not just a report. For ages, the industry has tried time and time again to improve its ability to defend by battening down the hatches. We have relied on...

Read More about Chris Nickerson

Allen O'Rourke

Allen O'Rourke

PANELIST

Co-Chair, Privacy and Cybersecurity, Womble Bond Dickinson

Allen O'Rourke

Allen O’Rourke co-chairs the Privacy and Cybersecurity Team at Womble Bond Dickinson (US) LLP, and is a Certified Information Privacy Professional (CIPP/US).  He conducts cyber investigations...

Read More about Allen O'Rourke

Chris Roberts

Chris Roberts

The Abyss is Waving Back

Chris Roberts

Abstract: The Abyss is Waving Back… The four paths that human evolution is charging down, and how we choose which one’s right… As humans, we have four evolutionary paths… We embrace...

Read More about Chris Roberts

Scott Rodgers

Scott Rodgers

Sr. Information Security Analyst, TIAA

Threat Hunting with Data Mining and Analytics

Scott Rodgers

Absract: Threat Hunting has become widely popular in the Cyber Security Industry, and for good reason. Becoming more proactive and finding problems before they escalate can result in huge...

Read More about Scott Rodgers

Bojan Simic

Bojan Simic

Cto and Cofounder, HYPR Corp.

What Works and What Doesn't in Upgrading and Implementing Cyber Security Technologies

Bojan Simic

Abstract: Considering what does and doesn’t work in cybersecurity is becoming simpler in the context of the many mass data breaches tied to credentials. An astounding 81 percent of data breaches...

Read More about Bojan Simic

Matthew Snyder

Matthew Snyder

Chief Technologist, Booz Allen Hamilton

Industrial Security – Old Challenges / New Opportunities

Matthew Snyder

Abstract: Companies are frequently electing to connect their industrial environments into the corporate network. This connectivity gives unprecedented insight to industrial processes, metrics...

Read More about Matthew Snyder

Sean Wagner

Sean Wagner

Presenter - Small Business Seminar

Data Privacy and the Law

Sean Wagner

Sean C. Wagner is a business attorney with deep experience in a wide variety of business transactions, commercial litigation, government investigations, and regulatory compliance matters. Sean’s...

Read More about Sean Wagner

Yongge Wang

Yongge Wang

Professor, UNC Charlotte

Cryptographic Currency, Blockchains, Smart Contract, and Distributed Trust

Yongge Wang

Abstract: Cryptographic Currency, Blockchains, Bmart Contract, and Distributed Trust Blockchains have become a buzzword and many blockchain proponents believe that smart contract is a panacea to...

Read More about Yongge Wang

Margaret White

Margaret White

PANELIST

SVP, Bank of America

Margaret White

Women in Cyber Panel: "Unexpected and Unconventional - Yet Here we Are" Margaret White is a Senior Vice President at Bank of America, where she serves as an Information Security Engineer. In this...

Read More about Margaret White

Sounil Yu

Sounil Yu

Chief Security Scientist, Bank of America

The Cyber Defense Matrix

Sounil Yu

Abstract: The Cyber Defense Matrix enables organizations to define clear categories for the range of products and services that are available in the marketplace to solve various information...

Read More about Sounil Yu