2020 Presentations

KEYNOTES

Eduardo Joia | (Chief Technology Officer (CTO) at Truist Financial)

Deploying Agile to Transform a Company’s Culture, Enabling speed, Employee Empowerment, Innovation and Inclusion

Ryan Linn | (Security Strategist at Its A Secret)

Finding opportunity in disaster : a hacker’s approach to surviving 2020

Ira Winkler | (President at Secure Mentem)

Human Security Engineering

 

SPONSOR PRESENTATIONS

Access IT Group | Completing Security Visibility with NDR

Bobby Mazzotti – Senior Sales Engineer, Gigamon
Greg Ricketts – Director Technical Services, AccessIT Group

 

Armis – Agentless Device Security: Making the Invisible Visible

Curtis Simpson (CISO at ARMIS)

Avertium – Supercharge your Defense Strategies

Nick Sweet | (VP of Solutions Architecture at Avertium)

Axonius – Time Travel, Cybersecurity & Asset Management: What the Past & Future Can Teach Us Today

Andrew Senko | (Sr. Sales Engineer at Axonius)

Check Point – Humans are the Weakest Link

Brian Linder | (Cyber Team Sale Manager at Check Point)

Cisco DUO – Making Remote, Work

Mark Royall | (Senior Technical Solutions Architect at Cisco – DUO Security)

Cisco Umbrella – How to think like a cybercriminal (so you can outsmart them)

Daniel Bates | (Technical Solutions Architect at Cisco Systems)

 

Cyber Ark – Come and Knock on My Door: The New Attack Pathway Starts at Home

Chris Maroun (Global Director, Solutions Engineering at CyberArk)

Digital Shadows – Cybercrime finds a way, a look at this year’s cybercrime trends

Rick Holland (CISO and VP, Strategy at Digital Shawdows)

ePlus – What Requirements Should Every CIO Consider for an IDM/IAM Solution

Doug King (CIO at EPLUS)

F5 Networks – What you can’t see WILL hurt you! Strategies for defending against encrypted malware

Kevin Stewart (Senior Security Solutions Architect at F5 Networks)

Guide Point Security – Addressing Third Party Risk in your GRC Program

Gary Brickhouse (VP, GRC Services at Guide Point Security)

NetSkope – Minimizing Your Risk Through Zero Trust Maturity

Nathan Smolenski (Head of Enterprise Security Strategy at Netskope)

Optiv – Measuring Risk in 2020 Which device will be YOUR weakest link?

Shawn Taylor (Sr. Systems Engineer & Customer Evangelist at Forescout)

Forescout & Optiv – A fireside chat with successful stories of Visibility, Compliance and Control

Shawn Taylor (Sr. Systems Engineer & Customer Evangelist at Forescout)

ProofPoint Part 1 – The Human Target : How Threat Actors Choose Their Mark

Wesley Drove (Threat Intelligence leader at ProofPoint)

Proofpoint Part 2 – People‑Risk Explorer – Identify, Assess and Mitigate People-Based Cybersecurity Risks

Adam Steigrod (Sr. Sales Engineering Manager at ProofPoint)

Rapid7 – A Hitchhiker’s Guide to the 2020 National • Industry • Cloud Exposure Report

Bob Rudis (Chief Data Scientist at Rapid7)

Recorded Future – Elections and Ransomware

Alan Liska (Security Security Architect at Recorded Future)

rmsource – MDR Strategy – How to Cover All the Bases

Mike Sullivan (Director of Network & Security Services at rmsource, Inc.)

SailPoint – Rethinking your Identity Program

Piyush Kant (Sr. Sales Engineer at SailPoint Technologies)

StrongKey – Adopting Passwordless Authentication for Optimum User Experience

Norman Field (Solutions Architect at Strong Key)

 

The Teneo Group – See. Segment. Secure. Getting Visibility Into Your IoT Environment

Craig Johnson (VP Business Development at The Teneo Group)

Eric Berkman (Sr. Director World Wide Channels at The Teneo Group)

Trend Micro – Sweeping the Leg with IPS

Matthew Chapman (Technical Advisor at Trend Micro)

Varonis – Microsoft Teams Explosion: How to Prevent Data Leaks

Brian Vecci (Field CTO at Varonis)

DAY 1 PRESENTATIONS

How to Drive Change and Manage an Effective Awareness & Training Program through a Global Pandemic

Gaylynn Fassler | (Information Security Analyst at Duke Health)
Shelly Epps | (IT Security Manager at Duke Health)

Better Together:  How Purple Teaming Sharpens Your Security Defenses

Derek Rush (Senior Security Consultant at LBMC Information Security)

Analyzing the Crime Scene:  A Way for Analysts to View Security Investigations

Corey Hill  | (Security Operations Manager at Citrix Systems)

Decentralized Identity:  The Future?

Adrian Amos | (Sr Security Solutions Engineer at Synergy-Technical)

Web Shell Hunting – Hands On

Joe Schottman | (Principal Security Analyst at Undisclosed)

How to Achieve Cloud Security Monitoring at Scale

Vinay Bansal (Cloud Security Architect at Cisco Systems)

Siddhartha Rao (Information Security Analyst at Cisco Systems)

What cybersecurity professionals need to know about communicating to stakeholders, the media, and the public

Dianne Chase (President Chase Media Former International Chair of the International Association of Business Communicators at Chase Media)
Sidd Chopra (President at LookWiser.com)

LEADERSHIP TRACK –  PRESENTATIONS

Balancing The Tug of War: How CIOs and CISOs Can Partner for Better IT

Scott Howitt (Senior Vice President and CIO at McAfee)

Seat at the Table: Security Leadership Through Tabletop Exercises

Gina Yacone (Cybersecurity Consultant at Agio)

Common Cloud Attack Scenarios and Solutions

Jon Clay (Director, Global Threat Communications at Trend Micro)

Zero to SOC2 in One Year (Or Less)

Chuck Kesler (Chief Information Security Officer at Pendo)

Leading and managing Cyber risk for the business before, during, and after COVID-19

David Stone (Chief Information Security Officer – Commercial, Corporate, Wealth and Enterprise Payment Technology at Truist Financial)

DAY 2 PRESENTATIONS

Third Party Threat Hunting

Greg Rasner (Director, Cyber Third Party Risk at Truist)

Lessons Learned and Incident Response from Afar

Eva Lorenz (Sr. Consultant at Agio)

Beyond BYOD: Bringing Your Own Office, Lessons Learned Working Remote in 2020

Charlie Mewshaw (Security Operations and Incident Handling Team Lead at UNC – Chapel Hill)
Michael Williams (Network Security Team Lead at University of North Carolina – Chapel Hill)

Current Landscape of Mid-Market Threat Intelligence

Steve Cobb (Chief Information Security Officer (CISO) at One Source)

Oh, the Humanity! Social Engineering in the 21st Century

Teddy Ansink (Senior Enterprise Consultant at Avertium)

Protecting Hybrid Legacy ICS Networks

Stephen Bavington (Sales Engineer at Trend Micro)

Not Another Framework:  Cutting Through The Noise

Nia Luckey (Security Operations Manager at Cisco)

Data Breaches & The North Carolina Identity Theft Act

A. Mercedes Restucha-Klem (Asst. Attorney General at NC Dept. of Justice)

Preventing & Detecting Cloud Security Incidents

Jeff Foresman (VP of Security Operations & CISO at Digital Hands)

Disruptionware on the Rise

Debra Baker (Technical Program Manager at Redseal)

Blockchain the Savior

Karishma Mehta (Information security officer at Undisclosed)

Applying Data Analytics for Cybersecurity

Nathan Kim (Chief Network Security Analytics Architect at IBM)

ToR of the WiLD SiD3 of the Internet-Dark Web, Deep Web and Dark Net

Mike Muscatell (Sr. Manager Information Security at Krispy Kreme Doughnut Corp)

“Anti-Forensics”: Reversing a Leading Phone Forensics Tool

Matt Bergin (Senior Researcher at KoreLogic)

Ten Things I Wish Every Developer Knew About Security

Chris Romeo (CEO at Security Journey)

Tales from the [en] Crypt

Jon Fox (Senior Security Consultant at Microsoft)

CCPA & the New United States Privacy Laws

Joe Meyer (Director at NCC Group)

Psychology of the Phish: Leveraging the Seven Principles of Influence

Sourya Biswas (Principal Security Consultant at NCC Group)

A-Hunting We Will Go! Adventures in Endpoint Threat Detection

David Branscome (Cloud Security Architect at Microsoft)

Secure SDLC Lessons Learned

Steve Hart (Head of Product Security at SAS Institute)

Cyberbiosecurity: Protecting Biomedical and Patient Data in the Cloud

Muskan Bansal (Biomedical Researcher at Center for Study of Biological Complexity, Virginia Commonwealth University)
Vinay Bansal (Principle Engineer at Cisco Systems)

In the Beginning There Was Chaos – Telework Explosion 2020

Kim Green (Durham Tech)
Valdez Ladd (Founder at Privacy Test Driver)