Speakers

Joseph Adams

Joseph Adams

Panelist

The evolution of the Security Operations Center – Where Have we Been and Where are we Going

Joseph Adams

Abstract: Coming Soon. Joseph Adams is the Director of Cyber Defense Operations for Duke Energy. He is responsible for the Cybersecurity Operations Center, Cyber Systems Engineering / Support team...

Read More about Joseph Adams

Aguayo

Joe Aguayo

Panelist

Cybersecurity Analytics: Separating Wheat From Chaff

Joe Aguayo

Joseph Aguayo is Principal Data Scientist for Corporate Information Security at BB&T / Truist.  He is responsible for protecting critical infrastructure with full-stack security analytics,...

Read More about Joe Aguayo

Joel Amick

Joel Amick

Panelist

Cybersecurity Analytics: Separating Wheat from Chaff

Joel Amick

Joel recently joined UNC Charlotte's College of Computing and Informatoics as part of the adjunct faculty in the Fall of 2019. Joel is a lecturer and Director level IT professional with...

Read More about Joel Amick

Rich Baich

Rich Baich

SVP/CISO - AIG

20 Years of Information Security Progress: Learn from the Past While Predicting the Future

Rich Baich

Rich Baich is AIG’s Chief Information Security Officer. In this role, he is responsible for developing, implementing, and operating an information security strategy to address AIG’s cyber risks. He...

Read More about Rich Baich

Tom Bartolomeo

Tom Bartolomeo

Panelist

The Evolution of the Security Operations Center – Where Have we Been and Where are we Going

Tom Bartolomeo

Tom Bartolomeo is the head of Wells Fargo’s Cyber Security Defense and Monitoring (CSD&M) organization. He brings 23 years of information security experience and 35 years of financial...

Read More about Tom Bartolomeo

Amy Boawn

Amy Boawn

Senior Associate - Booz Allen Hamilton

The New Fusion: Cyber Intelligence and Fraud Operations

Amy Boawn

Abstract: As organizations contemplate, develop, and mature their Cyber Fusion Centers, market leaders are leveraging the synergies with Fraud Operations.  Fusing Fraud Operations and Cyber...

Read More about Amy Boawn

Roger Callahan

Roger Callahan

Panel Moderator

Cybersecurity Risk Management, Frameworks and More

Roger Callahan

Abstract: Organizations’ approach to cybersecurity have matured and have recognized the necessity to perform enterprise risk management efforts. The NIST Cybersecurity Framework has significantly...

Read More about Roger Callahan

Ashley Devoto

Principal - Booz Allen Hamiltion

The New Fusion: Cyber Intelligence and Fraud Operations

Ashley Devoto

Abstract: As organizations contemplate, develop, and mature their Cyber Fusion Centers, market leaders are leveraging the synergies with Fraud Operations.  Fusing Fraud Operations and Cyber...

Read More about Ashley Devoto

Donato

Matt Donato

Panel Moderator

Cyber Awareness

Matt Donato

Matt Donato’s passion for placing the right talent with the right company combined with his in-depth knowledge of the cybersecurity industry makes him an indispensable partner in the tech community....

Read More about Matt Donato

Jack Freund

Jack Freund

Director, Risk Science - RiskLens

The Evolution of Our Profession

Jack Freund

Dr. Jack Freund is a leading voice in cyber risk measurement and management. He is an expert at using risk quantification to implement, mature, and sell information risk and security programs. Jack...

Read More about Jack Freund

Keith Gordon

Keith Gordon

Panel Moderator

The evolution of the Security Operations Center – Where Have we Been and Where are we Going

Keith Gordon

Abstract: In this panel discussion, SOC leaders offer war stories and recommendations on how to implement the latest tools and practices in SOC operations. You’ll learn how to prepare your...

Read More about Keith Gordon

Jeremiah Grant

Jeremiah Grant

Panelist

CISO Panel

Jeremiah Grant

Abstract: Coming Soon Jeremiah Grant serves as the Chief Information Security Officer for Novant Health, leading a team that provides timely, actionable, and business-aligned cybersecurity...

Read More about Jeremiah Grant

Christopher Hadnagy

Christopher Hadnagy

Author, Founder and CEO - social-engineer.com

The Science Behind Human Hacking

Christopher Hadnagy

Abstract: In this eye-opening presentation, Chris will talk about social engineering through a scientific lens. He will provide an interesting and often overlooked glimpse into the “why” behind the “...

Read More about Christopher Hadnagy

Terry Halvorsen

Terry Halvorsen

CIO / EVP, IT & Mobile Communication B2G Business - Samsung Electronics

Terry Halvorsen

Abstract: Coming Soon. Terry Halvorsen started with Samsung electronics on April first of this 2017 as an Executive Vice President in the Business to Government group.  He has since been...

Read More about Terry Halvorsen

Jon Hightower

Host

Small Business Seminar

Jon Hightower

Abstract: Small Businesses face similar cybersecurity risk as large corporations and yet they have much less resources to devote to preventing data breaches. UNC Charlotte’s Annual Cybersecurity...

Read More about Jon Hightower

Alex Hutton

Alex Hutton

Panelist

The Evolution of the Security Operations Center – Where Have we Been and Where are we Going

Alex Hutton

Alex Hutton is the technology executive over the Application Defense and Cybersecurity Analytics teams in Bank of America’s Cybersecurity Defense function.  Prior to this position, his...

Read More about Alex Hutton

Todd Inskeep

Principal, Commercial Consulting - Booz Allen Hamilton

Future Security/Securing the Future

Todd Inskeep

Abstract: What will security look like in the next 20 years?  What technologies will need security, and what will security work look like?  In this session, Todd Inskeep will provide a...

Read More about Todd Inskeep

Kenneth Jackson

Kenneth Jackson

Principal Solutions Architect, Global Financial Services - AWS

Client-Side Encryption and the Cloud: Patterns and Practices

Kenneth Jackson

Abstract: While AWS and other Cloud Service Providers offer managed solutions for server-side encryption of data at rest, there are scenarios where particularly sensitive data needs to be...

Read More about Kenneth Jackson

Bill Joll

Bill Joll

Chief Strategy and Technology Officer - Blackridge Technology

Considerations for End-to-End Trust for Smart Cities

Bill Joll

Abstract: Review some of the cybersecurity priorities required for Smart Cities Innovations, including: • Establishing assured identity to improve our posture in zero trust environments •...

Read More about Bill Joll

Allison Miller

Allison Miller

SVP, Engineering and Cybersecurity Technology (GIS) - Bank of America

Abstract: Playing Defense as a Long Game: Engineering the Future of Cybersecurity

Allison Miller

Abstract: If you've ever worked in cybersecurity, you know that defense is a team sport. The difference between every win and loss is directly related to the strength, speed, and agility of our teams...

Read More about Allison Miller

Mark Miller

Mark Miller

VP -Sonatype; Co-Founder - All Day DevOps

Making the Case for DevSecOps

Mark Miller

Abstract: The move to incorporate security into the DevOps pipeline has gotten world wide attention. DevSecOps has become an essential consideration for DevOps transformation initiatives. In this...

Read More about Mark Miller

Andre Mintz

Panelist

CISO Panel

Andre Mintz

Andre Mintz joined Red Ventures in 2017 to shape all aspects of our information security strategy and to mitigate data security-related risks. He plays a key role in protecting our partners and...

Read More about Andre Mintz

Stacy Moore

Stacy Moore

Program Manager - NCFTA

It's Always Sunny on the Dark Web

Stacy Moore

Abstract: NCFTA’s Malware and Cyber Threats (MCT) Program Manager Stacy Moore and Intelligence Analyst Owen Nearhoof will provide an overview of the current dark web landscape and the...

Read More about Stacy Moore

Max Morris

Max Morris

PANELIST

The evolution of the Security Operations Center – where have we been and where are we going

Max Morris

Max M. Morris is the Senior Director of Cyber Defense and Response for Ally Bank. In his role, Max leads a group of cyber security professionals who run the company’s Security Operations Center,...

Read More about Max Morris

Owen Nearhoof

Owen Nearhoof

Intelligence Analyst - NCFTA

It's Always Sunny on the Dark Web

Owen Nearhoof

Abstract: NCFTA’s Malware and Cyber Threats (MCT) Program Manager Stacy Moore and Intelligence Analyst Owen Nearhoof will provide an overview of the current dark web landscape and the...

Read More about Owen Nearhoof

Allen O'Rourke

Allen O'Rourke

Speaker

The Evolution of Cybersecurity Law: How Our Laws Are Racing to Catch Up to the Last 20 Years of Cybersecurity and What to Expect Going Forward

Allen O'Rourke

This presentationl will discuss the patchwork of cybersecurity laws affecting US companies, including Europe’s recent General Data Protection Regulation (GDPR) and the upcoming California Consumer...

Read More about Allen O'Rourke

Sam Phillips

Sam Phillips

Panelist

Cybersecurity Risk Management, Frameworks and More

Sam Phillips

Abstract:  Organizations’ approach to cybersecurity have matured and have recognized the necessity to perform enterprise risk management efforts. The NIST Cybersecurity Framework has...

Read More about Sam Phillips

Andrew Shortt

Andrew Shortt

Global Solutions Architect - AWS

Client-Side Encryption and the Cloud: Patterns and Practices

Andrew Shortt

Abstract: While AWS and other Cloud Service Providers offer managed solutions for server-side encryption of data at rest, there are scenarios where particularly sensitive data needs to be encrypted...

Read More about Andrew Shortt

Darren Shou

Darren Shou

VP, Research - Symantec

Shaking up Cyber Innovation

Darren Shou

Abstract: We need to be talking about cyber safety rather than just security since the future of our industry will depend on our ability to engage users and arm them to make decisions against ever...

Read More about Darren Shou

Yonatan

Yonatan Striem-Amit

CTO and Cofounder - Cybereason

Profile of a Modern APT

Yonatan Striem-Amit

Abstract: Yonatan Striem-Amit, will discuss the future of advanced, nation state threats as they continue to develop and move into the private sector. We will examine the recently discovered APT...

Read More about Yonatan Striem-Amit

John Walsh

John Walsh

Chief Strategy and Technology Officer - BlackRidge Technology

Securing the Industrial IoT Connected Ecosystem

John Walsh

Abstract: New digital services and connected industrial controls systems continue to be at high risk from security breaches with subsequent impacts to consumer privacy and now personal safety. The...

Read More about John Walsh

Yongge Wang

Yongge Wang

Professor - UNC Charlotte

Blockchain Security and Byzantine Fault Tolerance

Yongge Wang

Abstract:  In this talk, we will talk about the security issues for blockchains and Byzantine Fault Tolerance problems. Specifically, we will analyze and discuss the insecure aspects of the well...

Read More about Yongge Wang

Justin Warner

Justin Warner

Director, Applied Threat Research - Gigamon

Eyes on the Prize – Threat Centric Security Operations

Justin Warner

Abstract: As security programs evolve to combat clever and persistent adversaries, they look for solutions to tip the scales of attacker and defender economics to provide the defender the advantage....

Read More about Justin Warner

Watson

Tom Watson

Panelist

Cyber Awareness

Tom Watson

Tom Watson has over 20 years of experience in Information Risk Management and Security. His focus is on enabling businesses to be more productive while not losing focus on security and integrity of...

Read More about Tom Watson

Derek Weeks

Derek Weeks

VP and DevOps Advocate - Sonatype

Exemplars, Laggards, and The Cautious: a Data-Driven Look at High-Velocity Software Development Practices

Derek Weeks

Abstract: In 2009, we were awakened to Allspaw and Hammond’s “10 deploys a day”. In 2010, Jez Humble and Dave Farley advised us to “build quality in”. But in 2019, breaches hit 24% of software...

Read More about Derek Weeks

Ziemniak

Terry Ziemniak

Panelist

Cyber Awareness

Terry Ziemniak

Terry Ziemniak has over 25 years' experience in the information security field with work ranging from security architecture, pen testing, operations, auditing, risk management, disaster preparedness...

Read More about Terry Ziemniak