- Wednesday, October 12, 2022
8:00 AM – 9:00 AM US PDT
Keynote: Why Political Risk and Cybersecurity Collide in Times of Crisis
8:00 AM – 9:00 AM US PDT
Keynote: Why Political Risk and Cybersecurity Collide in Times of CrisisSpeaker: – New York Times best-selling author of “The Power of Crisis” and host of GZERO World
Ian Bremmer – New York Times best-selling author of “The Power of Crisis” and host of GZERO World ### 1718669###Speaker###President and Founder###New York Times best-selling author of “The Power of Crisis” and host of GZERO World###Speaker: – New York Times best-selling author of “The Power of Crisis” and host of GZERO World
### 9:05 AM – 10:05 AM US PDT
Keynote Presentation - To be Announced
9:05 AM – 10:05 AM US PDT
Keynote: Lessons in Leadership
Carey Lohrenz ### 1752427###Speaker###First Female F-14 Tomcat Fighter Pilot in the U.S. Navy######Speaker:
10:15 AM – 11:15 AM US PDT
Are You Ready for Scaled Quantum Computing? Anticipating Cryptographic Readiness Challenges for a Quantum Age
10:15 AM – 11:15 AM US PDT
Are You Ready for Scaled Quantum Computing? Anticipating Cryptographic Readiness Challenges for a Quantum AgeQuantum Computing
David Ott – VMware ### 1663836###Speaker###Senior Staff Researcher and Academic Program Director###VMware###Speaker: – VMware
10:15 AM – 11:15 AM US PDT
Cloud Risk and Governance - CCM v4 Hands-on
10:15 AM – 11:15 AM US PDT
Hands-on Cloud Risk and Governance: CCM v4Speaker: – Starbucks
Co-Speaker: – Raytheon Technologies
Cloud Security
Jon-Michael C. Brook, MBA, CISSP, CCSK – Starbucks ### 762384###Speaker###security architect principal###Starbucks###Speaker: – Starbucks
@@@ Randall S. Brooks, CISSP, CSSLP, ISSEP, ISSAP, ISSMP, CCSK – Raytheon Technologies ### 894384###Co-Speaker###Chief Engineer Cyber Operations and Development Center###Raytheon Technologies###Co-Speaker: – Raytheon Technologies
10:15 AM – 11:15 AM US PDT
Creating Lasting Security Change
10:15 AM – 11:15 AM US PDT
Creating Lasting Security ChangeCo-Speaker: – Amazon
Co-Speaker:
Human Factors
Sharon Smith, CISSP – Amazon ### 1062104###Co-Speaker###Sr. Risk Manager###Amazon###Co-Speaker: – Amazon
### @@@ Ngozi Pole ### 1663857###Co-Speaker###Sr. Manager Change Management######Co-Speaker:
### 10:15 AM – 11:15 AM US PDT
Payment Plans: A Checklist of Critical Considerations before Paying Ransomware Demands
10:15 AM – 11:15 AM US PDT
Payment Plans: A Checklist of Critical Considerations Before Paying Ransomware DemandsRansomware
Lance Hayden, PhD – Vericast ### 373737###Speaker###Chief Information Security Strategist###Vericast###Speaker: – Vericast
10:15 AM – 11:15 AM US PDT
Taking a threat-centric approach to building cyber resiliency
10:15 AM – 11:15 AM US PDT
Taking a Threat-centric Approach to Building Cyber ResiliencyThreats (Detection/Hunting/Intelligence/Mitigation/Monitoring)
Andrew Gorecki – IBM ### 1663821###Speaker###Global Remediation Lead###IBM###Speaker: – IBM
10:15 AM – 11:15 AM US PDT
The Day After: Managing Post-Incident Hardening & Resiliency
10:15 AM – 11:15 AM US PDT
The Day After: Managing Post-Incident Hardening and ResiliencyCo-Speaker: – Booz Allen Hamilton
Co-Speaker: – Booz Allen Hamilton
Incident Response/Investigations/Forensics/E-Discovery
Jacob Norwood – Booz Allen Hamilton ### 1663808###Co-Speaker###Director###Booz Allen Hamilton###Co-Speaker: – Booz Allen Hamilton
@@@ Tony Gaidhane – Booz Allen Hamilton ### 1663809###Co-Speaker###Vice President###Booz Allen Hamilton###Co-Speaker: – Booz Allen Hamilton
10:15 AM – 11:15 AM US PDT
The Next Big Attack: What to expect and how to protect
10:15 AM – 11:15 AM US PDT
The Next Big Attack: What to Expect and How to Protect3rd Party Risk
Erin Joe – Mandiant, Inc ### 1663862###Speaker###Senior Vice President, Strategy and Alliances###Mandiant, Inc###Speaker: – Mandiant, Inc
10:15 AM – 11:15 AM US PDT
The Tao of Vulnerability Management
10:15 AM – 11:15 AM US PDT
The Tao of Vulnerability ManagementSpeaker: – GDIT (General Dynamics Information Technology)
Network Security
Brian D. McKeon, MA, MBA, CISSP, PMP, ITIL – GDIT (General Dynamics Information Technology) ### 1398138###Speaker###Cyber Portfolio Manager###GDIT (General Dynamics Information Technology)###Speaker: – GDIT (General Dynamics Information Technology)
10:15 AM – 11:15 AM US PDT
Using the Marine Corps 70% rule to hire Cybersecurity talent quickly and efferently
10:15 AM – 11:15 AM US PDT
Using the Marine Corps 70% Rule to Hire Cybersecurity Talent Quickly and EfficientlyWorkforce Trends (Diversity/Recruiting)
Ron Sharon ### 1663825###Speaker###VP of Information Security######Speaker:
11:25 AM – 12:25 PM US PDT
Build Information Resilience into your Supply Chain and Save a Ton of Money
11:25 AM – 12:25 PM US PDT
Build Information Resilience into Your Supply Chain and Save a Ton of MoneyInformation Security Management
Willy Fabritius – SGS ### 1663861###Speaker###Global Head Strategy & Business Development Information Security Assurance###SGS###Speaker: – SGS
11:25 AM – 12:25 PM US PDT
CyberTheft of Trade Secrets, and Attorneys’ Ethical Considerations during Data Breaches
11:25 AM – 12:25 PM US PDT
Cyber Theft of Trade Secrets and Attorneys’ Ethical Considerations During Data BreachesSpeaker: – Yonovitz & Joe, L.L.P.
Cyber Crime
Herbert Joe – Yonovitz & Joe, L.L.P. ### 373667###Speaker###Managing Partner/Attorney/Cert. Forensic Consultant###Yonovitz & Joe, L.L.P.###Speaker: – Yonovitz & Joe, L.L.P.
11:25 AM – 12:25 PM US PDT
Elite Security Champions Build Strong Security Culture
11:25 AM – 12:25 PM US PDT
Elite Security Champions Build Strong Security CultureSpeaker: – Security Journey
Application Security/ Software Assurance
Christopher Romeo, CISSP, CSSLP – Security Journey ### 373691###Speaker###CEO###Security Journey###Speaker: – Security Journey
11:25 AM – 12:25 PM US PDT
Emerging threats against cloud application identities and what you should do about it
11:25 AM – 12:25 PM US PDT
Emerging Threats Against Cloud Application Identities (And What You Should Do About It)Co-Speaker: – Microsoft
Co-Speaker: – Microsoft
Identity/Authentication/Access Management
Etan Basseri, CISSP – Microsoft ### 1663806###Co-Speaker###Senior Product Manager###Microsoft###Co-Speaker: – Microsoft
### @@@ Bailey Bercik – Microsoft ### 1663807###Co-Speaker###Product Manager II###Microsoft###Co-Speaker: – Microsoft
### 11:25 AM – 12:25 PM US PDT
My Baby Done Bad Crypto, My Sweet Baby Done Me Wrong
11:25 AM – 12:25 PM US PDT
My Baby Done Bad Crypto, My Sweet Baby Done Me WrongData Protection
Dan Houser, CISSP-ISSAP-ISSMP CSSLP CCSP – Avanade ### 1663856###Speaker###Group Manager###Avanade###Speaker: – Avanade
### 11:25 AM – 12:25 PM US PDT
Neurodiversity Recruitment and Retention in Entry and Midcareer Cybersecurity
11:25 AM – 12:25 PM US PDT
Neurodiversity Recruitment and Retention in Entry and Midcareer CybersecuritySpeaker: – CREIGHTON UNIVERSITY
Workforce Trends (Diversity/Recruiting)
John Rosario Curtin – CREIGHTON UNIVERSITY ### 1663822###Speaker###Special Instructor, Cybersecurity###CREIGHTON UNIVERSITY###Speaker: – CREIGHTON UNIVERSITY
11:25 AM – 12:25 PM US PDT
Search Warrants, Subpoenas, and Court Orders: What You Need to Know
11:25 AM – 12:25 PM US PDT
Search Warrants, Subpoenas and Court Orders: What You Need to KnowCo-Speaker: – Spirion, LLC
Co-Speaker: – Bandler Law Firm PLLC
Co-Speaker: – EY
Co-Speaker: – Global Cyber Risk LLC
Governance, Regulation and Compliance
Scott M. Giordano, CISSP, CCSP – Spirion, LLC ### 1062095###Co-Speaker###V.P., Corporate Privacy, and General Counsel###Spirion, LLC###Co-Speaker: – Spirion, LLC
@@@ John Bandler, Esq., CISSP – Bandler Law Firm PLLC ### 383616###Co-Speaker###Founder and Principal###Bandler Law Firm PLLC###Co-Speaker: – Bandler Law Firm PLLC
@@@ John Bates, JD, CIPP/US, CIPP/E – EY ### 1398130###Co-Speaker###Manager, Cybersecurity###EY###Co-Speaker: – EY
@@@ Jody R. Westby, JD – Global Cyber Risk LLC ### 1398170###Co-Speaker###CEO###Global Cyber Risk LLC###Co-Speaker: – Global Cyber Risk LLC
11:25 AM – 12:25 PM US PDT
Securing Industrial Control System Criticality of ICS, Threats , Vulnerabilities, Mitigation of Risk
11:25 AM – 12:25 PM US PDT
Securing Industrial Control Systems: The Criticality of Threats, Vulnerabilities and Risk MitigationsSpeaker: – AKS IT Services
ICS/Critical Infrastructure
Ashish K. Saxena, CISSP, CISA – AKS IT Services ### 1663803###Speaker###Managing Director###AKS IT Services###Speaker: – AKS IT Services
11:25 AM – 12:25 PM US PDT
Security Architecture - The Benefits & Framework
11:25 AM – 12:25 PM US PDT
Security Architecture: The Benefits and FrameworkSecurity Architecture/Engineering
Tom Madsen – NNIT ### 1663826###Speaker###Security Architect###NNIT###Speaker: – NNIT