futureconevents.com
Open in
urlscan Pro
2606:4700:20::ac43:4901
Public Scan
URL:
https://futureconevents.com/events/salt-lake-city-ut-2023/
Submission: On August 14 via manual from US — Scanned from DE
Submission: On August 14 via manual from US — Scanned from DE
Form analysis
4 forms found in the DOMGET https://futureconevents.com/
<form role="search" method="get" class="search-form" action="https://futureconevents.com/">
<label class="screen-reader-text" for="s">Search for:</label>
<input type="search" class="search-field" placeholder="Search…" value="" name="s" title="Search for:">
<input type="submit" value="">
<input type="hidden" name="post_type[]" value="post"><input type="hidden" name="post_type[]" value="page">
</form>
GET https://futureconevents.com/
<form role="search" method="get" class="search-form" action="https://futureconevents.com/">
<label>
<span class="screen-reader-text">Search for:</span>
<input type="search" class="search-field" placeholder="Search …" value="" name="s">
</label>
<input type="submit" class="search-submit" value="Search">
</form>
GET https://futureconevents.com/
<form role="search" method="get" class="search-form" action="https://futureconevents.com/">
<label class="screen-reader-text" for="s">Search for:</label>
<input type="search" class="search-field" placeholder="Search…" value="" name="s" title="Search for:">
<input type="submit" value="">
<input type="hidden" name="post_type[]" value="post"><input type="hidden" name="post_type[]" value="page">
</form>
POST /events/salt-lake-city-ut-2023/#gf_2
<form method="post" enctype="multipart/form-data" target="gform_ajax_frame_2" id="gform_2" action="/events/salt-lake-city-ut-2023/#gf_2" data-formid="2" novalidate="">
<input type="hidden" class="gforms-pum" value="{"closepopup":false,"closedelay":0,"openpopup":false,"openpopup_id":0}">
<div class="gform-body gform_body">
<ul id="gform_fields_2" class="gform_fields top_label form_sublabel_below description_below">
<li id="field_2_1" class="gfield gfield--type-name gfield_contains_required field_sublabel_below gfield--no-description field_description_below gfield_visibility_visible" data-js-reload="field_2_1"><label
class="gfield_label gform-field-label gfield_label_before_complex">Name<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
<div class="ginput_complex ginput_container ginput_container--name no_prefix has_first_name no_middle_name has_last_name no_suffix gf_name_has_2 ginput_container_name gform-grid-row" id="input_2_1">
<span id="input_2_1_3_container" class="name_first gform-grid-col gform-grid-col--size-auto">
<input type="text" name="input_1.3" id="input_2_1_3" value="" tabindex="21" aria-required="true">
<label for="input_2_1_3" class="gform-field-label gform-field-label--type-sub ">First</label>
</span>
<span id="input_2_1_6_container" class="name_last gform-grid-col gform-grid-col--size-auto">
<input type="text" name="input_1.6" id="input_2_1_6" value="" tabindex="23" aria-required="true">
<label for="input_2_1_6" class="gform-field-label gform-field-label--type-sub ">Last</label>
</span>
</div>
</li>
<li id="field_2_2" class="gfield gfield--type-email gfield_contains_required field_sublabel_below gfield--no-description field_description_below gfield_visibility_visible" data-js-reload="field_2_2"><label class="gfield_label gform-field-label"
for="input_2_2">Email<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
<div class="ginput_container ginput_container_email">
<input name="input_2" id="input_2_2" type="email" value="" class="large" tabindex="25" aria-required="true" aria-invalid="false">
</div>
</li>
<li id="field_2_3" class="gfield gfield--type-text field_sublabel_below gfield--no-description field_description_below gfield_visibility_visible" data-js-reload="field_2_3"><label class="gfield_label gform-field-label"
for="input_2_3">Company</label>
<div class="ginput_container ginput_container_text"><input name="input_3" id="input_2_3" type="text" value="" class="large" tabindex="26" aria-invalid="false"> </div>
</li>
<li id="field_2_4" class="gfield gfield--type-text field_sublabel_below gfield--no-description field_description_below gfield_visibility_visible" data-js-reload="field_2_4"><label class="gfield_label gform-field-label" for="input_2_4">Job
Title</label>
<div class="ginput_container ginput_container_text"><input name="input_4" id="input_2_4" type="text" value="" class="large" tabindex="27" aria-invalid="false"> </div>
</li>
<li id="field_2_5" class="gfield gfield--type-select populate-locations field_sublabel_below gfield--no-description field_description_below gfield_visibility_visible" data-js-reload="field_2_5"><label class="gfield_label gform-field-label"
for="input_2_5">What market are you interested in?</label>
<div class="ginput_container ginput_container_select"><select name="input_5" id="input_2_5" class="medium gfield_select" tabindex="28" aria-invalid="false">
<option value="" selected="selected" class="gf_placeholder">Choose ...</option>
<option value="any">Any</option>
<option value="all">All</option>
<option value="salt-lake-city-ut-2023">Salt Lake City, UT, 2023</option>
<option value="charlotte-nc">Charlotte, NC, 2023</option>
<option value="des-moines-ia-2023">Des Moines, IA, 2023</option>
<option value="columbus-oh-2023">Columbus, OH, 2023</option>
<option value="indianapolis-in-2023">Indianapolis, IN, 2023</option>
<option value="san-diego-ca-2023">San Diego, CA, 2023</option>
<option value="phoenix-az">Phoenix, AZ, 2023</option>
<option value="nashville-tn-2023">Nashville, TN, 2023</option>
<option value="boston-ma-2023">Boston, MA, 2023</option>
<option value="atlanta-ga-2023">Atlanta, GA, 2023</option>
<option value="houston-tx-2023">Houston, TX, 2023</option>
<option value="los-angeles-ca-2024">Los Angeles, CA, 2024</option>
<option value="chicago-il-2024">Chicago, IL, 2024</option>
<option value="dallas-tx-2024">Dallas, TX, 2024</option>
<option value="detroit-mi-2024">Detroit, MI, 2024</option>
<option value="seattle-wa-2024">Seattle, WA, 2024</option>
<option value="baltimore-md-2024">Baltimore, MD, 2024</option>
<option value="st-louis-mo-2024">St. Louis, MO, 2024</option>
<option value="philadelphia-pa-2024">Philadelphia, PA, 2024</option>
<option value="omaha-ne-2024">Omaha, NE, 2024</option>
<option value="minneapolis-mn-2024">Minneapolis, MN, 2024</option>
<option value="tampa-fl-2024">Tampa, FL, 2024</option>
<option value="kansas-city-ks-2024">Kansas City, KS, 2024</option>
<option value="montreal-qc-2024">Montreal, QC, 2024</option>
<option value="orange-county-ca-2024">Orange County, CA, 2024</option>
</select></div>
</li>
<li id="field_2_6" class="gfield gfield--type-captcha field_sublabel_below gfield--no-description field_description_below hidden_label gfield_visibility_visible" data-js-reload="field_2_6"><label class="gfield_label gform-field-label"
for="input_2_6">CAPTCHA</label>
<div id="input_2_6" class="ginput_container ginput_recaptcha gform-initialized" data-sitekey="6LcxsL0ZAAAAAAOpV-FEita_QkS91kukjiTLcCw2" data-theme="light" data-tabindex="-1" data-size="invisible" data-badge="bottomright">
<div class="grecaptcha-badge" data-style="bottomright"
style="width: 256px; height: 60px; display: block; transition: right 0.3s ease 0s; position: fixed; bottom: 14px; right: -186px; box-shadow: gray 0px 0px 5px; border-radius: 2px; overflow: hidden;">
<div class="grecaptcha-logo"><iframe title="reCAPTCHA"
src="https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LcxsL0ZAAAAAAOpV-FEita_QkS91kukjiTLcCw2&co=aHR0cHM6Ly9mdXR1cmVjb25ldmVudHMuY29tOjQ0Mw..&hl=en&v=3kTz7WGoZLQTivI-amNftGZO&theme=light&size=invisible&badge=bottomright&cb=3z5pqakxank3"
width="256" height="60" role="presentation" name="a-lds4442d9n0d" frameborder="0" scrolling="no" sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"
tabindex="-1"></iframe></div>
<div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
</div><iframe style="display: none;"></iframe>
</div>
</li>
<li id="field_2_7" class="gfield gfield--type-honeypot gform_validation_container field_sublabel_below gfield--has-description field_description_below gfield_visibility_visible" data-js-reload="field_2_7"><label
class="gfield_label gform-field-label" for="input_2_7">Name</label>
<div class="ginput_container"><input name="input_7" id="input_2_7" type="text" value="" autocomplete="new-password"></div>
<div class="gfield_description" id="gfield_description_2_7">This field is for validation purposes and should be left unchanged.</div>
</li>
</ul>
</div>
<div class="gform_footer top_label"> <input type="submit" id="gform_submit_button_2" class="gform_button button" value="Sign Me Up!" tabindex="29"
onclick="if (!window.__cfRLUnblockHandlers) return false; if(window["gf_submitting_2"]){return false;} if( !jQuery("#gform_2")[0].checkValidity || jQuery("#gform_2")[0].checkValidity()){window["gf_submitting_2"]=true;} "
onkeypress="if (!window.__cfRLUnblockHandlers) return false; if( event.keyCode == 13 ){ if(window["gf_submitting_2"]){return false;} if( !jQuery("#gform_2")[0].checkValidity || jQuery("#gform_2")[0].checkValidity()){window["gf_submitting_2"]=true;} jQuery("#gform_2").trigger("submit",[true]); }">
<input type="hidden" name="gform_ajax" value="form_id=2&title=&description=1&tabindex=20">
<input type="hidden" class="gform_hidden" name="is_submit_2" value="1">
<input type="hidden" class="gform_hidden" name="gform_submit" value="2">
<input type="hidden" class="gform_hidden" name="gform_unique_id" value="">
<input type="hidden" class="gform_hidden" name="state_2" value="WyJbXSIsImE0MTdlODRiMWQwMTVhYTlhZDUzODcxMzgwNjJlNGIwIl0=">
<input type="hidden" class="gform_hidden" name="gform_target_page_number_2" id="gform_target_page_number_2" value="0">
<input type="hidden" class="gform_hidden" name="gform_source_page_number_2" id="gform_source_page_number_2" value="1">
<input type="hidden" name="gform_field_values" value="">
</div>
<p style="display: none !important;"><label>Δ<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_1" name="ak_js" value="1692036890751">
<script type="text/javascript">
document.getElementById("ak_js_1").setAttribute("value", (new Date()).getTime());
</script>
</p>
</form>
Text Content
314-797-7210 | info@futureconevents.com 314-797-7210info@futureconevents.com Skip to navigation Skip to content Search for: Navigation * About Us * Overview Home * Who We Are * Our Keynote Speakers * Privacy Policy * Events * Upcoming Events * Become a Sponsor * Become a Speaker * Advertise on VoiceAmerica * Radio | Podcast Series * And Security for All Radio Show * CISO Seamless Podcast * Videos * Sponsorship * Become a Sponsor * Who Attends * Call For Speakers * Emerging Technology/Start-up Opportunity * FAQ * Contact * * Search for: * About Us * Overview Home * Who We Are * Our Keynote Speakers * Privacy Policy * Events * Upcoming Events * Become a Sponsor * Become a Speaker * Advertise on VoiceAmerica * Radio | Podcast Series * And Security for All Radio Show * CISO Seamless Podcast * Videos * Sponsorship * Become a Sponsor * Who Attends * Call For Speakers * Emerging Technology/Start-up Opportunity * FAQ * Contact Search for: Home / / Salt Lake City, UT SALT LAKE CITY CYBERSECURITY CONFERENCE Wednesday, August 23, 2023 Live in Person @ Salt Lake Marriott Downtown at City Creek Parking and Directions In Person | Virtual | Hybrid Earn up to 10 CPE credits * Agenda * Event Home * Register * Sponsor Resources ABOUT THE EVENT FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations. “Cybersecurity is no longer just an IT problem” Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community. The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders. For sponsorship opportunities email sales@futureconevents.com * * * KEYNOTE SPEAKERS “HACKING THE HUMAN” SKIP MANN MANAGING DIRECTOR, SECURITY ADVOCACY LENOVO Skip Mann is the driving force behind security advocacy efforts for Lenovo’s global security enterprise. As the leader of this team, he is responsible for promoting and evolving Lenovo’s commitment to security, with a particular focus on data privacy, infrastructure, product and service, supply chain, and physical security. His efforts ensure that Lenovo remains a… Read More JON DURKOS SENIOR MANAGER, SECURITY ADVOCACY, CHIEF SECURITY OFFICE LENOVO Jon Durkos manages security advocacy efforts for Latin and North America within Lenovo’s global security enterprise. He is responsible for promoting and evolving Lenovo’s commitment to security, with a particular focus on data privacy, infrastructure, product and service, supply chain, and physical security. His efforts ensure that Lenovo remains a trusted leader and enabler of… Read More CISO/INDUSTRY LEADER PANEL SKIP MANN MANAGING DIRECTOR, SECURITY ADVOCACY LENOVO Bio STEVE GENTRY CHIEF SECURITY OFFICER CLARI Bio VINCENT ROMNEY DEPUTY CHIEF INFORMATION SECURITY OFFICER NUSKIN & PHARMANEX Bio JEFF KADEN SVP OF SECURITY & CISO CLEARSENSE Bio DAN BOWDEN GLOBAL CISO MARSH Bio JAMI HUGHES SVP, DEPUTY CHIEF INFORMATION SECURITY OFFICER ZIONS BANCORPORATION Bio PREMIER PLATINUM SPONSORS PLATINUM SPONSORS GOLD SPONSORS SILVER SPONSORS PARTNERS AGENDA Times are subject to change 8:00 am OPENING INTRODUCTIONS | CHECK IN | NETWORKING 9:00 am IDENTIFYING THREATS IN YOUR WORKPLACE PRESENTATION 9:30 am TODAY’S THREAT LANDSCAPE REQUIRES A UNIQUE CAPABILITY Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments. SHAWN TAYLOR VICE PRESIDENT, THREAT DEFENSE FORESCOUT TECHNOLOGIES Bio 10:00 am SPONSOR NETWORKING TIME Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies! 10:30 am ZERO TRUST FOR RANSOMWARE PROTECTION Ransomware is easier to prevent than you may think, and Zero Trust can be implemented today, not tomorrow. Learn how Illumio stops Ransomware in its tracks before it spreads, and how Illumio’s Zero Trust solution keeps you safe from both known and unknown threats. CHRISTER SWARTZ INDUSTRY SOLUTIONS DIRECTOR ILLUMIO Bio 11:00 am STOPPING A GOLDEN THREAD ATTACK Through this exploration of the “Golden Thread Attack,” attendees will gain a deeper understanding of the intricate strategies employed by threat actors to exploit interconnected digital environments. By dissecting the attack chain and its consequences, this presentation aims to equip cybersecurity professionals and decision-makers with valuable insights into mitigating and defending against such targeted and persistent threats. JACOB STORY SR SOLUTION ENGINEER UPTYCS Bio 11:30 am SPONSOR NETWORKING TIME Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies! 11:45 am LUNCH KEYNOTE 12:00 pm “HACKING THE HUMAN” SKIP MANN MANAGING DIRECTOR, SECURITY ADVOCACY LENOVO Bio JON DURKOS SENIOR MANAGER, SECURITY ADVOCACY, CHIEF SECURITY OFFICE LENOVO Bio 1:00 pm SPONSOR NETWORKING TIME Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies! 1:30 pm BUILDING A RESPONSE STRATEGY ROBERT KAUFFMAN SENIOR SYSTEMS ENGINEER VERSA NETWORKS Bio PRESENTATION 2:00 pm CHELSEE PURVIS SOLUTIONS ENGINEER, SOLUTIONS ENGINEER CLOUDFLARE Bio 2:30 pm SPONSOR NETWORKING TIME Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies! 2:45 pm COMMUNICATING RISK PRESENTATION 3:15 pm MODERN DATA PROTECTION Protecting your data in a distributed world. From asset inventory to employee education, everything you need to think about when building or fine tuning your data protection program. CHRIS TYRRELL DIRECTOR OF SALES ENGINEERING NEXT DLP Bio 3:40 pm SPONSOR NETWORKING TIME Visit Sponsor Booths – find amazing people, information, and prizes! Get updated on the latest technologies! PANEL DISCUSSION 4:00 pm SKIP MANN MANAGING DIRECTOR, SECURITY ADVOCACY LENOVO Bio STEVE GENTRY CHIEF SECURITY OFFICER CLARI Bio VINCENT ROMNEY DEPUTY CHIEF INFORMATION SECURITY OFFICER NUSKIN & PHARMANEX Bio JEFF KADEN SVP OF SECURITY & CISO CLEARSENSE Bio DAN BOWDEN GLOBAL CISO MARSH Bio JAMI HUGHES SVP, DEPUTY CHIEF INFORMATION SECURITY OFFICER ZIONS BANCORPORATION Bio 5:00 pm CLOSING REMARKS REGISTER FOLLOW US * * * * * FutureCon Events 7777 Bonhomme Ave. 18th Floor St. Louis, MO 63105 314-797-7210 info@futureconevents.com SIGN UP Join our newsletter for upcoming events and Industry news * Name* First Last * Email* * Company * Job Title * What market are you interested in? Choose ...AnyAllSalt Lake City, UT, 2023Charlotte, NC, 2023Des Moines, IA, 2023Columbus, OH, 2023Indianapolis, IN, 2023San Diego, CA, 2023Phoenix, AZ, 2023Nashville, TN, 2023Boston, MA, 2023Atlanta, GA, 2023Houston, TX, 2023Los Angeles, CA, 2024Chicago, IL, 2024Dallas, TX, 2024Detroit, MI, 2024Seattle, WA, 2024Baltimore, MD, 2024St. Louis, MO, 2024Philadelphia, PA, 2024Omaha, NE, 2024Minneapolis, MN, 2024Tampa, FL, 2024Kansas City, KS, 2024Montreal, QC, 2024Orange County, CA, 2024 * CAPTCHA * Name This field is for validation purposes and should be left unchanged. Δ © Copyright FutureCon Events 2023 | Privacy Policy Roger Grimes Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 10 books and over 1,000 magazine articles on computer security. He now serves as the Data-Driven Security Analyst for KnowBe4. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. Grimes holds a bachelor’s degree from Old Dominion University. He was the weekly security columnist for InfoWorld and CSO magazines from 2005-2019. * LinkedIn × * * * Share This * Facebook * Twitter * LinkedIn Notifications Shawn Taylor Spanning a 20-plus year career as an accomplished and well-respected systems engineer and public speaker, Shawn Taylor’s strong mix of technical acumen, architectural expertise, and passion for operational efficiencies has established him as a trusted advisor to ForeScout’s customers since joining in 2016. Shawn leads a team of Cyber Threat Hunters and Analysts who assist organizations in searching for, identifying and analyzing threats and risks present in their environment. Additionally, he and his team are called on to respond to cyber events and incidents, such as breaches or attacks. His experience designing, architecting and evangelizing solutions across a wide spectrum of industries delivers a rare cross-functional understanding of today’s business-technology challenges, including Cybersecurity, Biometrics and Identity Management, IT Operations, Service Management and IT Asset Management. Shawn holds an ITIL® Foundation Certification and a BA in Economics from University of Maryland, College Park, and prior to ForeScout was with BMC, Delphix, and CA, now known as Broadcom. * LinkedIn × Christer Swartz Christer Swartz is Industry Solutions Director for Illumio. He has spent many years in the Networking industry, beginning with a small startup called Cisco. He was previously with Netflix, designing the birth of their Internet video-streaming architecture, and also with Palo Alto Networks, designing deep security in both Data Center & Cloud architectures. Cybersecurity has traditionally focused on prevention, but this needs to shift to a breach-containment approach. You will be breached, and containment is a realistic path to Zero Trust. Christer will help explain how. * LinkedIn × Jacob Story Jacob Story is a seasoned technology professional with a proven track record at Dell, NetApp, NVIDIA, and Uptycs. With a background spanning Systems Administration, Solution Engineering, and Solution Engineering management, Jacob’s expertise shines in High-Performance Computing, System Administration, Backup, Disaster Recovery, Enterprise Storage, and Cybersecurity. He excels in architecting innovative solutions, translating complex concepts into actionable insights, and fostering collaborative teams. Jacob’s visionary leadership and meticulous approach have consistently delivered optimal results, making him a driving force in the ever-evolving technology sector. * LinkedIn × Skip Mann Skip Mann is the driving force behind security advocacy efforts for Lenovo’s global security enterprise. As the leader of this team, he is responsible for promoting and evolving Lenovo’s commitment to security, with a particular focus on data privacy, infrastructure, product and service, supply chain, and physical security. His efforts ensure that Lenovo remains a trusted leader and enabler of intelligent transformation. With more than 32 years of experience in the security profession, Skip has led risk management, cyber and physical security, business continuity, and critical infrastructure protection efforts at regional, national, and global levels. He has served in executive positions for 16 years, showcasing his transformational and collaborative leadership style, which has strengthened public and private organizations. Skip is an organizational resilience thought leader, with a proven track record of building, mentoring, and energizing world-class teams. He is renowned for his ability to drive risk-focused convergence of security and continuity programs, making him a sought-after advisor and speaker on the topic. Prior to joining Lenovo, Skip held executive positions at the US Department of Homeland Security’s Transportation Security Administration, Catalysis Learning Alliance, and several US Department of Defense agencies, including United States European Command, the Central United States Registry, US Army Headquarters, and United States Africa Command. * LinkedIn × Jon Durkos Jon Durkos manages security advocacy efforts for Latin and North America within Lenovo’s global security enterprise. He is responsible for promoting and evolving Lenovo’s commitment to security, with a particular focus on data privacy, infrastructure, product and service, supply chain, and physical security. His efforts ensure that Lenovo remains a trusted leader and enabler of intelligent transformation. Prior to joining Lenovo, Jon spent over 25 years in the Central Intelligence Agency (CIA) as an Operations Officer and manager in CIA’s Directorate of Operations (DO). Jon has extensive experience in Europe, the Middle East, Central and South Asia, and North Africa. Jon has a demonstrated record of success in conducting human intelligence recruitments and operations, managing large cross-functional and cross-team programs and projects, and leading and developing high performing teams. Jon has a passion for building and expanding relationships, and proficiency in navigating U.S. government and private sector stakeholders at C-suite executive levels. Jon also has a proven track record in risk management, threat intelligence, counterintelligence, cybersecurity methodologies, and counterterrorism. * LinkedIn × Robert Kauffman Rob is a Senior Systems Engineer for Versa Networks. He has over 25 years of experience in the field of technology and cybersecurity. Rob has previously served in many roles, including admin, support, consultant, and SE for companies that deliver Virtualization, Cloud, Networking, and Security. A large portion of his time was spent consulting with the US Department of Defense. His passion for security keeps him up to date on where the industry is and where it is going. His varied experience and daily conversations with businesses of all sizes allow him to see security solutions’ practical implications. * LinkedIn × Chelsee Purvis Chelsee Purvis is a passionate information security professional, currently serving as a Zero Trust Specialist Solutions Engineer at Cloudflare. Chelsee takes a consultative approach in working with customers to solve complex security challenges, and achieve their objectives towards a zero trust architecture. Previously, Chelsee served as an Application Delivery and Security Solutions Engineer at Citrix, where she focused on networking and security solutions for commercial and enterprise customers. She received her Master of Science in Information and Communication Sciences from Ball State University in 2017 and Bachelor of Science in Business Administration and Information Systems in 2016. Outside of working with her colleagues and customers, Chelsee owns an organic produce farm with her partner and two children. They share their love of organic heirloom produce varieties, pasture raised eggs, and honey with the local community at the Farmers Market. * LinkedIn × Chris Tyrrell Chris Tyrrell is the Director of Sales Engineering at Next. He has more than 15 years of experience in enterprise security and compliance consulting. He has been with Next for 6 months. Chris’s experience centers mainly around endpoint security, compliance, and insider risk. Chris specializes in solving customer problems and selling with a consultative approach. He has spoken about his experiences at Blackhat and GrrCON as well as numerous vendor specific conferences. * LinkedIn × Steve Gentry Security is not about technology! My passion for data protection started in the 90s without me realizing that was the path I was headed down. I found it fascinating that lengths people would go to skirt around IT controls. I found myself asking questions to understand why they did what they did. This is what formed my belief that my primary role in Security & Privacy is to be an educator and helped me focus on meeting business objectives instead of checking a security box. My passion has led me to take on new challenges including public speaking engagements and starting my own security practice years ago. I wanted the opportunity to learn from others while sharing the lessons I have learned over the years without requiring others to reinvent the wheel. I also believe it is my responsibility to mentor the next generation of security and privacy professionals to meet the needs of the companies they work for, teaching them to be business professionals first, data protection practitioners second. * LinkedIn × Vincent Romney I’m a dynamic, highly technical, hands-on Cybersecurity Executive with a wealth of knowledge and experience strategically planning, designing, and implementing enterprise security programs. I effectively and transparently communicate with key stakeholders throughout the implementation process. I align IT and cybersecurity strategies with the rest of the organization’s goals and objectives. I also build and lead talented teams of professionals through interactive training and mentorship programs. I’m also an enthusiastic supporter of DLT/Blockchain implementations and love evolving technologies! * LinkedIn × Jeff Kaden Jeff is a highly accomplished cybersecurity professional with expertise in IT service management (ITSM), project management, and digital transformation. Beyond cybersecurity, he possesses a comprehensive understanding of industry practices, making him invaluable for organizations navigating the ever-changing landscape of enterprise IT and cloud services. With a background in compliance and control design, Jeff excels at effectively communicating complex cybersecurity and IT concepts to diverse stakeholders, including CEOs, CIOs, boards of directors, executive management, and professional service providers. His executive experience in managed services, data centers, project rescue, security services, data analytics, and IT service management provides him with a unique perspective and a broad range of skills. Jeff’s additional role as a professor of advanced healthcare analytics enhances his expertise in managing emerging technologies, particularly in the healthcare industry. He has a proven track record of successfully recovering failed projects through meticulous implementations, showcasing his exceptional leadership and collaborative skills. Jeff drives improvements in technological business processes and outcomes. His expertise spans infrastructure management, security, emerging technologies, data analytics, security controls and audits, offshore development, data center and cloud architecture, and project management, among other areas. Jeff excels at working closely with stakeholders and leadership to optimize organizational performance and results. His proficiency in developing project scope and other PMO documents, guiding teams through the product development lifecycle, and providing training direction is highly valued. Furthermore, Jeff possesses extensive knowledge of implementation, audit, and certification processes for industry standards such as CMMC, FedRAMP, HITRUST, ISOs, PCI-DSS and SOC2. This wide range of skills and experience positions Jeff as a versatile and valuable professional in the cybersecurity and IT landscape. * LinkedIn × Dan Bowden 2022: Starting 3rd CISO role as Global CISO for Marsh, the world’s leading insurance broker and risk advisor, with offices in more than 130 countries. Accomplished Cybersecurity and Technology Executive Most recently worked as CISO for major $10 billion integrated health system. Previously CISO at major academic medical system and university, security leader at regional banking system. Three decades’ experience in leadership, deploying robust business-enabling cybersecurity solutions. Executive leader positioned to define and execute an organization’s business strategy, aligning with business goals and compliance drivers, while balancing demanding workload with shared resources to meet financial goals. Successful at overcoming cultural and political issues and getting tough things done. Confident communicator offering high-caliber presentation, collaboration and closing skills. Executive and Technical Advisory Board Member. Certified Chief Information Security Officer. * LinkedIn × Jami Hughes A visionary risk leader inspired by strategy, innovation, technology, compliance, accelerating agility, improving customer experience, training and development. She has the ability to think strategically and lead teams to execute with tactical efficiency. She has been acknowledged for her ability to visually showcase the big picture with all the critical metrics that empower teams to drive the right change to achieve their goals. * LinkedIn × 250+ million endpoints. 500,000+ companies worldwide. One security software company. For over 30 years, Trend Micro’s unwavering vision has been to make the world safe for exchanging digital information. Security is our entire focus, and it shows. This single-minded passion has inspired our innovations that keep up with the bad guys despite a changing IT landscape, riskier user behavior, and constantly evolving threats. The depth of our experience remains unmatched. From the endpoint to the network to the cloud, we’ve got you covered with a connected threat defense recognized by analysts, customers, and industry gurus of all kinds. * Website * LinkedIn * Twitter * Facebook × Forescout Technologies is the leader in device visibility and control. Our unified security platform enables enterprises and government agencies to gain complete situational awareness of their extended enterprise environments and orchestrate actions to reduce cyber and operational risk. Forescout products deploy quickly with agentless, real-time discovery and classification of every IP-connected device, as well as continuous posture assessment. * Website * LinkedIn * Twitter * Facebook * LinkedIn × Illumio enables organizations to realize a future without high-profile breaches by preventing the lateral movement of attackers across any organization. Founded on the principle of least privilege in 2013, Illumio provides visibility and segmentation for endpoints, data centers or clouds. The world’s leading organizations, including Morgan Stanley, BNP Paribas, Salesforce, and Oracle NetSuite, trust Illumio to reduce cyber risk. For more information, visit https://www.illumio.com/what-we-do and engage us on LinkedIn and Twitter. * Website * LinkedIn * Twitter * Facebook * YouTube × Your developer’s laptop is just a hop away from cloud infrastructure. Attackers don’t think in silos, so why would you have siloed solutions protecting public cloud, private cloud, containers, laptops, and servers? Uptycs reduces #risk by prioritizing your responses to threats, #vulnerabilities, misconfigurations, sensitive #data exposure, and compliance mandates across your modern attack surface—all from a single platform, UI, and data model. This includes the ability to tie together threat activity as it traverses on-prem and cloud boundaries, thus delivering a more cohesive enterprise-wide security posture. Looking for acronym coverage? We have that, too, including #CNAPP, #CWPP, #CSPM, #KSPM, #CIEM, #CDR, and #XDR. Start with your Detection Cloud, Google-like search, and the attack surface coverage you need today. Be ready for what’s next… and #ShiftUp with Uptycs. * Website * LinkedIn * Twitter * Facebook * YouTube × Versa is the modern secure network. Available via the cloud, on-premises, or as a blended combination of both, Versa SASE connects Enterprise branches, teleworkers, and end users securely and reliably to applications in the cloud or data centers around the world. * Website * LinkedIn * Twitter * Facebook * YouTube × Cloudflare, Inc (www.cloudflare.com / @cloudflare) is on a mission to help build a better Internet. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare have all traffic routed through its intelligent global network, which gets smarter with each new site added. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was recognized by the World Economic Forum as a Technology Pioneer, named the Most Innovative Network & Internet Technology Company for two years running by the Wall Street Journal, and ranked among the world’s 50 most innovative companies by Fast Company. Headquartered in San Francisco, CA, Cloudflare has offices in Austin, TX, Champaign, IL, Boston, MA, Washington, DC, London, and Singapore. * Website * LinkedIn * Facebook * Twitter * YouTube × CrowdStrike was founded in 2011 to fix a fundamental problem: The sophisticated attacks that were forcing the world’s leading businesses into the headlines could not be solved with existing malware-based defenses. Co-founders George Kurtz and Dmitri Alperovitch realized that a brand new approach was needed — one that combines the most advanced endpoint protection with expert intelligence to pinpoint the adversaries perpetrating the attacks, not just the malware. * Website * LinkedIn * Twitter * Facebook * YouTube × For organizations with valuable data or brand, Next Reveal is a user-centric data protection solution that uncovers risk, educates employees and fulfills security, compliance and regulatory needs. Unlike legacy DLP, Next is a flexible, cloud-native, AI/ML powered solution built for today’s threat landscape. * Website * LinkedIn * Twitter × Rubrik, the Zero Trust Data Security Company™, delivers data security and operational resilience for enterprises. Rubrik’s big idea is to provide data security and data protection on a single platform, including: Zero Trust Data Protection, ransomware investigation, incident containment, sensitive data discovery, and orchestrated application recovery. This means data is ready at all times so you can recover the data you need, and avoid paying a ransom. Because when you secure your data, you secure your applications, and you secure your business. * Website * LinkedIn * Twitter * Facebook * YouTube × Synopsys helps development teams build secure, high-quality software, minimizing risks while maximizing speed and productivity. Synopsys, a recognized leader in application security, provides static analysis, software composition analysis, and dynamic analysis solutions that enable teams to quickly find and fix vulnerabilities and defects in proprietary code, open source components, and application behavior. With a combination of industry-leading tools, services, and expertise, only Synopsys helps organizations optimize security and quality in DevSecOps and throughout the software development life cycle. For more information, go to synopsys.com/software * Website * LinkedIn * Facebook * Twitter * YouTube × LogicGate offers modern risk management technology empowering businesses to proactively transform risk enterprise-wide. Because risk is a team sport, we created the Risk Cloud Platform® — the most nimble and collaborative GRC solution out there. Rapidly adapt to changing business conditions. Confidently innovate and build new processes as you go. Collaborate on risk across your entire organization. Risk Cloud® gives you an interconnected view of risk across the organization that you just can’t get from point solutions. After all, great companies are built not by avoiding risks — but by choosing the right ones. * Website * LinkedIn * Twitter * Facebook * YouTube × trackd.com is a modern patch management platform with a unique twist. Our solution records the experience of vulnerability remediation practitioners after they’ve applied a given patch (i.e. did it break something?), anonymizes that data, and then shares it in real-time with all other trackd platform users. The data enables remediation teams to identify the small percentage of patches that are likely to break something, as well as those with little or no history of disruption that can be considered strong candidates for auto-patching. * Website * LinkedIn * Twitter × AuditBoard is the leading cloud-based platform transforming audit, risk, and compliance management. More than 30% of the Fortune 500 leverage AuditBoard to move their businesses forward with greater clarity and agility. AuditBoard is top-rated by customers on G2 and Gartner Peer Insights, and was recently ranked for the third year in a row as one of the fastest-growing technology companies in North America by Deloitte. To learn more, visit: AuditBoard.com. * Website * LinkedIn * Facebook * Twitter × ThreatLocker® improves enterprise-level server and endpoint security by blocking unknown application vulnerabilities through Application Whitelisting, Ringfencing™, Storage Control and Privileged Access Management solutions. www.threatlocker.com * Website * LinkedIn * Facebook * Twitter * YouTube × BARAMUNDI IS YOUR PROVIDER FOR RELIABLE UNIFIED ENDPOINT MANAGEMENT Security requirements are constantly growing as professionally managed IT infrastructures become increasingly complex. The work of IT administrators in a company, and the performance of the IT department as a whole, are therefore becoming a key success factor within their organization, in business and in the marke. We have been the experts in unified endpoint management for the past 20 years. With the baramundi Management Suite, we can provide you with a versatile tool to help you achieve your full IT potential. Maintain control and maximize your productivity by automating routine tasks. The baramundi Management Suite is ideal for your client lifecycle management and helps to reliably manage and protect all of your devices. It is quick to install and implement, intuitive to operate, and has a modular design, thereby offering a high level of usability and transparency. Start now and benefit from the long-term advantages for your IT. * Website * LinkedIn * Twitter * Facebook * YouTube × We specialize in partnering with MSP’s who are looking for a full cybersecurity solution for their customers. NetCyberOps provides SIEM, EDR, MDR, Vulnerability Management, and Email Protection in one solution for partners. Our 24×7 Security Operations Center is lead by experts with offensive and defensive backgrounds from the National Security Agency. Our teams unique background provides an edge in countering advanced threats. Currently protecting over 350,000 endpoints. * Website * LinkedIn × Caveonix Cloud is the industry’s only integrated platform built to keep hybrid multicloud environments secure and compliant from development through runtime * Website * LinkedIn * Twitter * YouTube × Recorded Future delivers the world’s most advanced security intelligence to disrupt adversaries, empower defenders, and protect organizations. With proactive and predictive intelligence, Recorded Future’s platform provides elite, context-rich, actionable intelligence in real time that’s ready for integration across the security ecosystem. * Website * Facebook * Twitter * LinkedIn * YouTube × ZeroFox delivers proactive external cybersecurity to outfox the adversary and disrupt, identify, and dismantle threats outside the traditional corporate perimeter. The ZeroFox Platform combines advanced AI-driven analysis to detect complex threats on the surface, Deep, and Dark Web with fully managed threat intelligence services and threat analysts who become an extension of your team – all while providing automated remediation to effectively disrupt threats. * Website * LinkedIn * Facebook * Twitter * YouTube × Netskope is the leader in cloud security. We help the world’s largest organizations take full advantage of the cloud and web without sacrificing security. Our patented Cloud XD technology eliminates blind spots by going deeper than any other security provider to quickly target and control activities across thousands of cloud services and millions of websites. With full control from one cloud, our customers benefit from 360-degree data protection that guards data everywhere and advanced threat protection that stops elusive attacks. At Netskope, we call this smart cloud security. * Website * Twitter * LinkedIn * Facebook × Fastly is upgrading the internet experience to give people and organizations more control, faster content, and more dynamic applications. By combining the world’s fastest global edge cloud network with powerful software, Fastly helps customers develop, deliver, and secure modern distributed applications and compelling digital experiences. Fastly’s customers include many of the world’s most prominent companies, including Pinterest, The New York Times, and GitHub. For more information on our mission and products, visit https://www.fastly.com. * Website * LinkedIn * Facebook * Twitter × Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com. * Website * LinkedIn * Twitter * Facebook × Right-Size Your Defenses to Reduce Threat Exposure Interpres Security provides an unbiased view of the enterprises’ security posture to help CISOs and security practitioners reduce threat exposure. Interpres Security analyzes the dynamic relationship between defensive and adversarial capabilities, prioritizes actions, and optimizes the security ecosystem for the enterprise, providing a single source of truth when it comes to defense surface management. Discover how Interpres can validate the effectiveness of your current security stack. Learn more about Interpres Security, visit www.InterpresSecurity.com. * Website * LinkedIn * Twitter × ForgeRock®, the leader in digital identity, delivers modern and comprehensive Identity and Access Management solutions for consumers, employees and things to simply and safely access the connected world. Using ForgeRock, more than a thousand global customer organizations orchestrate, manage, and secure the complete lifecycle of identities from dynamic access controls, governance, APIs, and storing authoritative data – consumable in any cloud or hybrid environment. The company is privately held, and headquartered in San Francisco, California, with offices around the world. For more information and free downloads, visit www.forgerock.com or follow ForgeRock on social media. * Website * LinkedIn * Twitter * Facebook * YouTube × (ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)² offers a portfolio of credentials that are part of a holistic, pragmatic approach to security. Our membership, more than 168,000 strong, is made up of certified cyber, information, software and infrastructure security professionals who are making a difference and helping to advance the industry. * Website * LinkedIn * Twitter * Facebook * YouTube × Founded in 2012, the Women’s Society of Cyberjutsu (WSC) is a National 501(c)3 non-profit community, focused on empowering women to succeed in the cybersecurity industry. WSC’s mission is to advance women in cybersecurity careers by providing programs and partnerships that promote hands-on training, networking, education, mentoring, resource-sharing and other professional opportunities. WSC serves thousands of women across the globe by bringing awareness to, and advancing careers in, cybersecurity. The WSC community includes information security professionals, IT professionals, programmers, computer scientists and engineers, as well as women wanting to explore and join the field. Recognizing the importance of encouraging girls to embrace a future in STEM-related professions through its Cyberjutsu Girls Academy, WSC provides a unique hands-on curriculum focused on securing information technology. For more information, visit http://www.womenscyberjutsu.org. * Website * LinkedIn * Facebook * Twitter × We put our heart and soul into this Cybersecurity Conference directory. Way back in 2013 we had another website called “Concise Courses” which used to market and sell InfoSec training courses. We published a blog post listing all the upcoming InfoSec Conferences of that year, and Google loved the resource and put us right to the top of the search engines. That ‘accidental’ occurrence spawned this directory which is maintained by a small team comprising of Henry Dalziel and Charles Villaneuva and a bunch of freelance programmers. What We Do: We list, literally, every single Information Security conference, event and seminar within every niche in Cybersecurity. We have a dedicated team that maintains our in-house tech stack, directory, and data curation. * Website * facebook × The Pan Asian American Business Council (“PAABC”) is a non-profit organization consisting of Asian American businesses that would like to promote and grow their own and other Asian American businesses. To enable Asian American owned businesses to develop and grow. * Website ×