futureconevents.com Open in urlscan Pro
2606:4700:20::ac43:4901  Public Scan

URL: https://futureconevents.com/events/salt-lake-city-ut-2023/
Submission: On August 14 via manual from US — Scanned from DE

Form analysis 4 forms found in the DOM

GET https://futureconevents.com/

<form role="search" method="get" class="search-form" action="https://futureconevents.com/">
  <label class="screen-reader-text" for="s">Search for:</label>
  <input type="search" class="search-field" placeholder="Search…" value="" name="s" title="Search for:">
  <input type="submit" value="">
  <input type="hidden" name="post_type[]" value="post"><input type="hidden" name="post_type[]" value="page">
</form>

GET https://futureconevents.com/

<form role="search" method="get" class="search-form" action="https://futureconevents.com/">
  <label>
    <span class="screen-reader-text">Search for:</span>
    <input type="search" class="search-field" placeholder="Search …" value="" name="s">
  </label>
  <input type="submit" class="search-submit" value="Search">
</form>

GET https://futureconevents.com/

<form role="search" method="get" class="search-form" action="https://futureconevents.com/">
  <label class="screen-reader-text" for="s">Search for:</label>
  <input type="search" class="search-field" placeholder="Search…" value="" name="s" title="Search for:">
  <input type="submit" value="">
  <input type="hidden" name="post_type[]" value="post"><input type="hidden" name="post_type[]" value="page">
</form>

POST /events/salt-lake-city-ut-2023/#gf_2

<form method="post" enctype="multipart/form-data" target="gform_ajax_frame_2" id="gform_2" action="/events/salt-lake-city-ut-2023/#gf_2" data-formid="2" novalidate="">
  <input type="hidden" class="gforms-pum" value="{&quot;closepopup&quot;:false,&quot;closedelay&quot;:0,&quot;openpopup&quot;:false,&quot;openpopup_id&quot;:0}">
  <div class="gform-body gform_body">
    <ul id="gform_fields_2" class="gform_fields top_label form_sublabel_below description_below">
      <li id="field_2_1" class="gfield gfield--type-name gfield_contains_required field_sublabel_below gfield--no-description field_description_below gfield_visibility_visible" data-js-reload="field_2_1"><label
          class="gfield_label gform-field-label gfield_label_before_complex">Name<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
        <div class="ginput_complex ginput_container ginput_container--name no_prefix has_first_name no_middle_name has_last_name no_suffix gf_name_has_2 ginput_container_name gform-grid-row" id="input_2_1">
          <span id="input_2_1_3_container" class="name_first gform-grid-col gform-grid-col--size-auto">
            <input type="text" name="input_1.3" id="input_2_1_3" value="" tabindex="21" aria-required="true">
            <label for="input_2_1_3" class="gform-field-label gform-field-label--type-sub ">First</label>
          </span>
          <span id="input_2_1_6_container" class="name_last gform-grid-col gform-grid-col--size-auto">
            <input type="text" name="input_1.6" id="input_2_1_6" value="" tabindex="23" aria-required="true">
            <label for="input_2_1_6" class="gform-field-label gform-field-label--type-sub ">Last</label>
          </span>
        </div>
      </li>
      <li id="field_2_2" class="gfield gfield--type-email gfield_contains_required field_sublabel_below gfield--no-description field_description_below gfield_visibility_visible" data-js-reload="field_2_2"><label class="gfield_label gform-field-label"
          for="input_2_2">Email<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
        <div class="ginput_container ginput_container_email">
          <input name="input_2" id="input_2_2" type="email" value="" class="large" tabindex="25" aria-required="true" aria-invalid="false">
        </div>
      </li>
      <li id="field_2_3" class="gfield gfield--type-text field_sublabel_below gfield--no-description field_description_below gfield_visibility_visible" data-js-reload="field_2_3"><label class="gfield_label gform-field-label"
          for="input_2_3">Company</label>
        <div class="ginput_container ginput_container_text"><input name="input_3" id="input_2_3" type="text" value="" class="large" tabindex="26" aria-invalid="false"> </div>
      </li>
      <li id="field_2_4" class="gfield gfield--type-text field_sublabel_below gfield--no-description field_description_below gfield_visibility_visible" data-js-reload="field_2_4"><label class="gfield_label gform-field-label" for="input_2_4">Job
          Title</label>
        <div class="ginput_container ginput_container_text"><input name="input_4" id="input_2_4" type="text" value="" class="large" tabindex="27" aria-invalid="false"> </div>
      </li>
      <li id="field_2_5" class="gfield gfield--type-select populate-locations field_sublabel_below gfield--no-description field_description_below gfield_visibility_visible" data-js-reload="field_2_5"><label class="gfield_label gform-field-label"
          for="input_2_5">What market are you interested in?</label>
        <div class="ginput_container ginput_container_select"><select name="input_5" id="input_2_5" class="medium gfield_select" tabindex="28" aria-invalid="false">
            <option value="" selected="selected" class="gf_placeholder">Choose ...</option>
            <option value="any">Any</option>
            <option value="all">All</option>
            <option value="salt-lake-city-ut-2023">Salt Lake City, UT, 2023</option>
            <option value="charlotte-nc">Charlotte, NC, 2023</option>
            <option value="des-moines-ia-2023">Des Moines, IA, 2023</option>
            <option value="columbus-oh-2023">Columbus, OH, 2023</option>
            <option value="indianapolis-in-2023">Indianapolis, IN, 2023</option>
            <option value="san-diego-ca-2023">San Diego, CA, 2023</option>
            <option value="phoenix-az">Phoenix, AZ, 2023</option>
            <option value="nashville-tn-2023">Nashville, TN, 2023</option>
            <option value="boston-ma-2023">Boston, MA, 2023</option>
            <option value="atlanta-ga-2023">Atlanta, GA, 2023</option>
            <option value="houston-tx-2023">Houston, TX, 2023</option>
            <option value="los-angeles-ca-2024">Los Angeles, CA, 2024</option>
            <option value="chicago-il-2024">Chicago, IL, 2024</option>
            <option value="dallas-tx-2024">Dallas, TX, 2024</option>
            <option value="detroit-mi-2024">Detroit, MI, 2024</option>
            <option value="seattle-wa-2024">Seattle, WA, 2024</option>
            <option value="baltimore-md-2024">Baltimore, MD, 2024</option>
            <option value="st-louis-mo-2024">St. Louis, MO, 2024</option>
            <option value="philadelphia-pa-2024">Philadelphia, PA, 2024</option>
            <option value="omaha-ne-2024">Omaha, NE, 2024</option>
            <option value="minneapolis-mn-2024">Minneapolis, MN, 2024</option>
            <option value="tampa-fl-2024">Tampa, FL, 2024</option>
            <option value="kansas-city-ks-2024">Kansas City, KS, 2024</option>
            <option value="montreal-qc-2024">Montreal, QC, 2024</option>
            <option value="orange-county-ca-2024">Orange County, CA, 2024</option>
          </select></div>
      </li>
      <li id="field_2_6" class="gfield gfield--type-captcha field_sublabel_below gfield--no-description field_description_below hidden_label gfield_visibility_visible" data-js-reload="field_2_6"><label class="gfield_label gform-field-label"
          for="input_2_6">CAPTCHA</label>
        <div id="input_2_6" class="ginput_container ginput_recaptcha gform-initialized" data-sitekey="6LcxsL0ZAAAAAAOpV-FEita_QkS91kukjiTLcCw2" data-theme="light" data-tabindex="-1" data-size="invisible" data-badge="bottomright">
          <div class="grecaptcha-badge" data-style="bottomright"
            style="width: 256px; height: 60px; display: block; transition: right 0.3s ease 0s; position: fixed; bottom: 14px; right: -186px; box-shadow: gray 0px 0px 5px; border-radius: 2px; overflow: hidden;">
            <div class="grecaptcha-logo"><iframe title="reCAPTCHA"
                src="https://www.google.com/recaptcha/api2/anchor?ar=1&amp;k=6LcxsL0ZAAAAAAOpV-FEita_QkS91kukjiTLcCw2&amp;co=aHR0cHM6Ly9mdXR1cmVjb25ldmVudHMuY29tOjQ0Mw..&amp;hl=en&amp;v=3kTz7WGoZLQTivI-amNftGZO&amp;theme=light&amp;size=invisible&amp;badge=bottomright&amp;cb=3z5pqakxank3"
                width="256" height="60" role="presentation" name="a-lds4442d9n0d" frameborder="0" scrolling="no" sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"
                tabindex="-1"></iframe></div>
            <div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
              style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
          </div><iframe style="display: none;"></iframe>
        </div>
      </li>
      <li id="field_2_7" class="gfield gfield--type-honeypot gform_validation_container field_sublabel_below gfield--has-description field_description_below gfield_visibility_visible" data-js-reload="field_2_7"><label
          class="gfield_label gform-field-label" for="input_2_7">Name</label>
        <div class="ginput_container"><input name="input_7" id="input_2_7" type="text" value="" autocomplete="new-password"></div>
        <div class="gfield_description" id="gfield_description_2_7">This field is for validation purposes and should be left unchanged.</div>
      </li>
    </ul>
  </div>
  <div class="gform_footer top_label"> <input type="submit" id="gform_submit_button_2" class="gform_button button" value="Sign Me Up!" tabindex="29"
      onclick="if (!window.__cfRLUnblockHandlers) return false; if(window[&quot;gf_submitting_2&quot;]){return false;}  if( !jQuery(&quot;#gform_2&quot;)[0].checkValidity || jQuery(&quot;#gform_2&quot;)[0].checkValidity()){window[&quot;gf_submitting_2&quot;]=true;}  "
      onkeypress="if (!window.__cfRLUnblockHandlers) return false; if( event.keyCode == 13 ){ if(window[&quot;gf_submitting_2&quot;]){return false;} if( !jQuery(&quot;#gform_2&quot;)[0].checkValidity || jQuery(&quot;#gform_2&quot;)[0].checkValidity()){window[&quot;gf_submitting_2&quot;]=true;}  jQuery(&quot;#gform_2&quot;).trigger(&quot;submit&quot;,[true]); }">
    <input type="hidden" name="gform_ajax" value="form_id=2&amp;title=&amp;description=1&amp;tabindex=20">
    <input type="hidden" class="gform_hidden" name="is_submit_2" value="1">
    <input type="hidden" class="gform_hidden" name="gform_submit" value="2">
    <input type="hidden" class="gform_hidden" name="gform_unique_id" value="">
    <input type="hidden" class="gform_hidden" name="state_2" value="WyJbXSIsImE0MTdlODRiMWQwMTVhYTlhZDUzODcxMzgwNjJlNGIwIl0=">
    <input type="hidden" class="gform_hidden" name="gform_target_page_number_2" id="gform_target_page_number_2" value="0">
    <input type="hidden" class="gform_hidden" name="gform_source_page_number_2" id="gform_source_page_number_2" value="1">
    <input type="hidden" name="gform_field_values" value="">
  </div>
  <p style="display: none !important;"><label>Δ<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_1" name="ak_js" value="1692036890751">
    <script type="text/javascript">
      document.getElementById("ak_js_1").setAttribute("value", (new Date()).getTime());
    </script>
  </p>
</form>

Text Content

314-797-7210 | info@futureconevents.com

314-797-7210info@futureconevents.com
Skip to navigation Skip to content
Search for:
Navigation
 * About Us
   * Overview Home
   * Who We Are
   * Our Keynote Speakers
   * Privacy Policy
 * Events
   * Upcoming Events
   * Become a Sponsor
   * Become a Speaker
   * Advertise on VoiceAmerica
 * Radio | Podcast Series
   * And Security for All Radio Show
   * CISO Seamless Podcast
   * Videos
 * Sponsorship
   * Become a Sponsor
   * Who Attends
   * Call For Speakers
   * Emerging Technology/Start-up Opportunity
 * FAQ
 * Contact
 * * Search for:

 * About Us
   * Overview Home
   * Who We Are
   * Our Keynote Speakers
   * Privacy Policy
 * Events
   * Upcoming Events
   * Become a Sponsor
   * Become a Speaker
   * Advertise on VoiceAmerica
 * Radio | Podcast Series
   * And Security for All Radio Show
   * CISO Seamless Podcast
   * Videos
 * Sponsorship
   * Become a Sponsor
   * Who Attends
   * Call For Speakers
   * Emerging Technology/Start-up Opportunity
 * FAQ
 * Contact

Search for:

Home / / Salt Lake City, UT


SALT LAKE CITY CYBERSECURITY CONFERENCE

Wednesday, August 23, 2023


Live in Person @ Salt Lake Marriott Downtown at City Creek

Parking and Directions

 

In Person | Virtual | Hybrid

Earn up to 10 CPE credits

 * Agenda
 * Event Home
 * Register
 * Sponsor Resources




ABOUT THE EVENT

FutureCon Events brings high-level Cyber Security Training discovering
cutting-edge security approaches, managing risk in the ever-changing threat of
the cybersecurity workforce.

Join us as we talk with a panel of C-level executives who have effectively
mitigated the risk of Cyber Attacks.

Educating C-suite executives and CISOs (chief information security officers) on
the global cybercrime epidemic, and how to build Cyber Resilient organizations.

“Cybersecurity is no longer just an IT problem”

Gain the latest knowledge you need to enable applications while keeping your
computing environment secure from advanced Cyber Threats. Demo the newest
technology, and interact with the world’s security leaders and gain other
pressing topics of interest to the information security community.

The FutureCon community will keep you updated on the future of the Cyberworld
and allow you to interact with your peers and the world’s security leaders.

For sponsorship opportunities email sales@futureconevents.com

 * 
 * 
 * 




KEYNOTE SPEAKERS


“HACKING THE HUMAN”


SKIP MANN

MANAGING DIRECTOR, SECURITY ADVOCACY LENOVO

Skip Mann is the driving force behind security advocacy efforts for Lenovo’s
global security enterprise. As the leader of this team, he is responsible for
promoting and evolving Lenovo’s commitment to security, with a particular focus
on data privacy, infrastructure, product and service, supply chain, and physical
security. His efforts ensure that Lenovo remains a…

Read More


JON DURKOS

SENIOR MANAGER, SECURITY ADVOCACY, CHIEF SECURITY OFFICE LENOVO

Jon Durkos manages security advocacy efforts for Latin and North America within
Lenovo’s global security enterprise. He is responsible for promoting and
evolving Lenovo’s commitment to security, with a particular focus on data
privacy, infrastructure, product and service, supply chain, and physical
security. His efforts ensure that Lenovo remains a trusted leader and enabler
of…

Read More


CISO/INDUSTRY LEADER PANEL





SKIP MANN

MANAGING DIRECTOR, SECURITY ADVOCACY
LENOVO

Bio


STEVE GENTRY

CHIEF SECURITY OFFICER
CLARI

Bio


VINCENT ROMNEY

DEPUTY CHIEF INFORMATION SECURITY OFFICER
NUSKIN & PHARMANEX

Bio


JEFF KADEN

SVP OF SECURITY & CISO
CLEARSENSE

Bio


DAN BOWDEN

GLOBAL CISO
MARSH

Bio


JAMI HUGHES

SVP, DEPUTY CHIEF INFORMATION SECURITY OFFICER
ZIONS BANCORPORATION

Bio


PREMIER PLATINUM SPONSORS




PLATINUM SPONSORS




GOLD SPONSORS




SILVER SPONSORS




PARTNERS




AGENDA

Times are subject to change

8:00 am


OPENING INTRODUCTIONS | CHECK IN | NETWORKING

9:00 am


IDENTIFYING THREATS IN YOUR WORKPLACE


PRESENTATION

9:30 am


TODAY’S THREAT LANDSCAPE REQUIRES A UNIQUE CAPABILITY

Specialized threats targeting OT environments have been around since at least
2010, with the reports of Stuxnet. Recognizing the criticality of these devices,
Threat Actors have continued evolving, continuing to target OT devices, many of
which are inherently insecure-by-design. Research, such as Vedere Labs’
OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years
ago showed how significant the scope of vulnerable devices are that are
pervasive in critical infrastructure systems. Today’s SOC needs to not only see
those devices and the risks they pose while also ensuring accurate detection of
the threats uniquely targeting those OT environments they’re deployed in. This
session will explore this unique threat landscape and the capabilities required
to combat the threats and automatically mitigate the risks specially targeting
Operational Technology environments.

SHAWN TAYLOR

VICE PRESIDENT, THREAT DEFENSE FORESCOUT TECHNOLOGIES

Bio


10:00 am


SPONSOR NETWORKING TIME

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated
on the latest technologies!

10:30 am


ZERO TRUST FOR RANSOMWARE PROTECTION

Ransomware is easier to prevent than you may think, and Zero Trust can be
implemented today, not tomorrow. Learn how Illumio stops Ransomware in its
tracks before it spreads, and how Illumio’s Zero Trust solution keeps you safe
from both known and unknown threats.

CHRISTER SWARTZ

INDUSTRY SOLUTIONS DIRECTOR ILLUMIO

Bio


11:00 am


STOPPING A GOLDEN THREAD ATTACK

Through this exploration of the “Golden Thread Attack,” attendees will gain a
deeper understanding of the intricate strategies employed by threat actors to
exploit interconnected digital environments. By dissecting the attack chain and
its consequences, this presentation aims to equip cybersecurity professionals
and decision-makers with valuable insights into mitigating and defending against
such targeted and persistent threats.

JACOB STORY

SR SOLUTION ENGINEER UPTYCS

Bio


11:30 am


SPONSOR NETWORKING TIME

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated
on the latest technologies!

11:45 am


LUNCH


KEYNOTE

12:00 pm


“HACKING THE HUMAN”

SKIP MANN

MANAGING DIRECTOR, SECURITY ADVOCACY LENOVO

Bio

JON DURKOS

SENIOR MANAGER, SECURITY ADVOCACY, CHIEF SECURITY OFFICE LENOVO

Bio

1:00 pm


SPONSOR NETWORKING TIME

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated
on the latest technologies!

1:30 pm


BUILDING A RESPONSE STRATEGY

ROBERT KAUFFMAN

SENIOR SYSTEMS ENGINEER VERSA NETWORKS

Bio



PRESENTATION

2:00 pm

CHELSEE PURVIS

SOLUTIONS ENGINEER, SOLUTIONS ENGINEER CLOUDFLARE

Bio


2:30 pm


SPONSOR NETWORKING TIME

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated
on the latest technologies!

2:45 pm


COMMUNICATING RISK


PRESENTATION

3:15 pm


MODERN DATA PROTECTION

Protecting your data in a distributed world. From asset inventory to employee
education, everything you need to think about when building or fine tuning your
data protection program.

CHRIS TYRRELL

DIRECTOR OF SALES ENGINEERING NEXT DLP

Bio


3:40 pm


SPONSOR NETWORKING TIME

Visit Sponsor Booths – find amazing people, information, and prizes! Get updated
on the latest technologies!


PANEL DISCUSSION

4:00 pm

SKIP MANN

MANAGING DIRECTOR, SECURITY ADVOCACY LENOVO

Bio

STEVE GENTRY

CHIEF SECURITY OFFICER CLARI

Bio

VINCENT ROMNEY

DEPUTY CHIEF INFORMATION SECURITY OFFICER NUSKIN & PHARMANEX

Bio

JEFF KADEN

SVP OF SECURITY & CISO CLEARSENSE

Bio

DAN BOWDEN

GLOBAL CISO MARSH

Bio

JAMI HUGHES

SVP, DEPUTY CHIEF INFORMATION SECURITY OFFICER ZIONS BANCORPORATION

Bio

5:00 pm


CLOSING REMARKS


REGISTER




FOLLOW US

 * 
 * 
 * 
 * 
 * 

FutureCon Events
7777 Bonhomme Ave.
18th Floor
St. Louis, MO 63105

314-797-7210
info@futureconevents.com


SIGN UP

Join our newsletter for upcoming events and Industry news

 * Name*
   First Last
 * Email*
   
 * Company
   
 * Job Title
   
 * What market are you interested in?
   Choose ...AnyAllSalt Lake City, UT, 2023Charlotte, NC, 2023Des Moines, IA,
   2023Columbus, OH, 2023Indianapolis, IN, 2023San Diego, CA, 2023Phoenix, AZ,
   2023Nashville, TN, 2023Boston, MA, 2023Atlanta, GA, 2023Houston, TX, 2023Los
   Angeles, CA, 2024Chicago, IL, 2024Dallas, TX, 2024Detroit, MI, 2024Seattle,
   WA, 2024Baltimore, MD, 2024St. Louis, MO, 2024Philadelphia, PA, 2024Omaha,
   NE, 2024Minneapolis, MN, 2024Tampa, FL, 2024Kansas City, KS, 2024Montreal,
   QC, 2024Orange County, CA, 2024
 * CAPTCHA
   
 * Name
   
   This field is for validation purposes and should be left unchanged.



Δ

© Copyright FutureCon Events 2023 | Privacy Policy
Roger Grimes

Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, is a 30-year computer
security consultant, instructor, holder of dozens of computer certifications and
an award-winning author of 10 books and over 1,000 magazine articles on computer
security. He now serves as the Data-Driven Security Analyst for KnowBe4. He has
worked at some of the world’s largest computer security companies, including
Foundstone, McAfee and Microsoft. Grimes holds a bachelor’s degree from Old
Dominion University. He was the weekly security columnist for InfoWorld and CSO
magazines from 2005-2019.

 * LinkedIn

×
 * 
 * 
 * 


Share This
 * Facebook
 * Twitter
 * LinkedIn



Notifications



Shawn Taylor

Spanning a 20-plus year career as an accomplished and well-respected systems
engineer and public speaker, Shawn Taylor’s strong mix of technical acumen,
architectural expertise, and passion for operational efficiencies has
established him as a trusted advisor to ForeScout’s customers since joining in
2016. Shawn leads a team of Cyber Threat Hunters and Analysts who assist
organizations in searching for, identifying and analyzing threats and risks
present in their environment. Additionally, he and his team are called on to
respond to cyber events and incidents, such as breaches or attacks. His
experience designing, architecting and evangelizing solutions across a wide
spectrum of industries delivers a rare cross-functional understanding of today’s
business-technology challenges, including Cybersecurity, Biometrics and Identity
Management, IT Operations, Service Management and IT Asset Management. Shawn
holds an ITIL® Foundation Certification and a BA in Economics from University of
Maryland, College Park, and prior to ForeScout was with BMC, Delphix, and CA,
now known as Broadcom.

 

 * LinkedIn

×
Christer Swartz

Christer Swartz is Industry Solutions Director for Illumio. He has spent many
years in the Networking industry, beginning with a small startup called Cisco.
He was previously with Netflix, designing the birth of their Internet
video-streaming architecture, and also with Palo Alto Networks, designing deep
security in both Data Center & Cloud architectures.

Cybersecurity has traditionally focused on prevention, but this needs to shift
to a breach-containment approach. You will be breached, and containment is a
realistic path to Zero Trust. Christer will help explain how.

 

 * LinkedIn

×
Jacob Story

Jacob Story is a seasoned technology professional with a proven track record at
Dell, NetApp, NVIDIA, and Uptycs. With a background spanning Systems
Administration, Solution Engineering, and Solution Engineering management,
Jacob’s expertise shines in High-Performance Computing, System Administration,
Backup, Disaster Recovery, Enterprise Storage, and Cybersecurity. He excels in
architecting innovative solutions, translating complex concepts into actionable
insights, and fostering collaborative teams. Jacob’s visionary leadership and
meticulous approach have consistently delivered optimal results, making him a
driving force in the ever-evolving technology sector.

 * LinkedIn

×
Skip Mann

Skip Mann is the driving force behind security advocacy efforts for Lenovo’s
global security enterprise. As the leader of this team, he is responsible for
promoting and evolving Lenovo’s commitment to security, with a particular focus
on data privacy, infrastructure, product and service, supply chain, and physical
security. His efforts ensure that Lenovo remains a trusted leader and enabler of
intelligent transformation.

With more than 32 years of experience in the security profession, Skip has led
risk management, cyber and physical security, business continuity, and critical
infrastructure protection efforts at regional, national, and global levels. He
has served in executive positions for 16 years, showcasing his transformational
and collaborative leadership style, which has strengthened public and private
organizations.

Skip is an organizational resilience thought leader, with a proven track record
of building, mentoring, and energizing world-class teams. He is renowned for his
ability to drive risk-focused convergence of security and continuity programs,
making him a sought-after advisor and speaker on the topic.

Prior to joining Lenovo, Skip held executive positions at the US Department of
Homeland Security’s Transportation Security Administration, Catalysis Learning
Alliance, and several US Department of Defense agencies, including United States
European Command, the Central United States Registry, US Army Headquarters, and
United States Africa Command.

 * LinkedIn

×
Jon Durkos

Jon Durkos manages security advocacy efforts for Latin and North America within
Lenovo’s global security enterprise. He is responsible for promoting and
evolving Lenovo’s commitment to security, with a particular focus on data
privacy, infrastructure, product and service, supply chain, and physical
security. His efforts ensure that Lenovo remains a trusted leader and enabler of
intelligent transformation.

Prior to joining Lenovo, Jon spent over 25 years in the Central Intelligence
Agency (CIA) as an Operations Officer and manager in CIA’s Directorate of
Operations (DO). Jon has extensive experience in Europe, the Middle East,
Central and South Asia, and North Africa. Jon has a demonstrated record of
success in conducting human intelligence recruitments and operations, managing
large cross-functional and cross-team programs and projects, and leading and
developing high performing teams.

Jon has a passion for building and expanding relationships, and proficiency in
navigating U.S. government and private sector stakeholders at C-suite executive
levels. Jon also has a proven track record in risk management, threat
intelligence, counterintelligence, cybersecurity methodologies, and
counterterrorism.

 * LinkedIn

×
Robert Kauffman

Rob is a Senior Systems Engineer for Versa Networks. He has over 25 years of
experience in the field of technology and cybersecurity. Rob has previously
served in many roles, including admin, support, consultant, and SE for companies
that deliver Virtualization, Cloud, Networking, and Security. A large portion of
his time was spent consulting with the US Department of Defense. His passion for
security keeps him up to date on where the industry is and where it is going.
His varied experience and daily conversations with businesses of all sizes allow
him to see security solutions’ practical implications.

 * LinkedIn

×
Chelsee Purvis
Chelsee Purvis is a passionate information security professional, currently
serving as a Zero Trust Specialist Solutions Engineer at Cloudflare. Chelsee
takes a consultative approach in working with customers to solve complex
security challenges, and achieve their objectives towards a zero trust
architecture. Previously, Chelsee served as an Application Delivery and Security
Solutions Engineer at Citrix, where she focused on networking and security
solutions for commercial and enterprise customers. She received her Master of
Science in Information and Communication Sciences from Ball State University in
2017 and Bachelor of Science in Business Administration and Information Systems
in 2016. Outside of working with her colleagues and customers, Chelsee owns an
organic produce farm with her partner and two children. They share their love of
organic heirloom produce varieties, pasture raised eggs, and honey with the
local community at the Farmers Market.
 * LinkedIn

×
Chris Tyrrell
Chris Tyrrell is the Director of Sales Engineering at Next. He has more than 15
years of experience in enterprise security and compliance consulting. He has
been with Next for 6 months.

Chris’s experience centers mainly around endpoint security, compliance, and
insider risk. Chris specializes in solving customer problems and selling with a
consultative approach.
He has spoken about his experiences at Blackhat and GrrCON as well as numerous
vendor specific conferences.

 * LinkedIn

×
Steve Gentry

Security is not about technology! My passion for data protection started in the
90s without me realizing that was the path I was headed down. I found it
fascinating that lengths people would go to skirt around IT controls. I found
myself asking questions to understand why they did what they did. This is what
formed my belief that my primary role in Security & Privacy is to be an educator
and helped me focus on meeting business objectives instead of checking a
security box.

My passion has led me to take on new challenges including public speaking
engagements and starting my own security practice years ago. I wanted the
opportunity to learn from others while sharing the lessons I have learned over
the years without requiring others to reinvent the wheel. I also believe it is
my responsibility to mentor the next generation of security and privacy
professionals to meet the needs of the companies they work for, teaching them to
be business professionals first, data protection practitioners second.

 * LinkedIn

×
Vincent Romney

I’m a dynamic, highly technical, hands-on Cybersecurity Executive with a wealth
of knowledge and experience strategically planning, designing, and implementing
enterprise security programs. I effectively and transparently communicate with
key stakeholders throughout the implementation process. I align IT and
cybersecurity strategies with the rest of the organization’s goals and
objectives. I also build and lead talented teams of professionals through
interactive training and mentorship programs. I’m also an enthusiastic supporter
of DLT/Blockchain implementations and love evolving technologies!

 * LinkedIn

×
Jeff Kaden

Jeff is a highly accomplished cybersecurity professional with expertise in IT
service management (ITSM), project management, and digital transformation.
Beyond cybersecurity, he possesses a comprehensive understanding of industry
practices, making him invaluable for organizations navigating the ever-changing
landscape of enterprise IT and cloud services.

With a background in compliance and control design, Jeff excels at effectively
communicating complex cybersecurity and IT concepts to diverse stakeholders,
including CEOs, CIOs, boards of directors, executive management, and
professional service providers. His executive experience in managed services,
data centers, project rescue, security services, data analytics, and IT service
management provides him with a unique perspective and a broad range of skills.

Jeff’s additional role as a professor of advanced healthcare analytics enhances
his expertise in managing emerging technologies, particularly in the healthcare
industry. He has a proven track record of successfully recovering failed
projects through meticulous implementations, showcasing his exceptional
leadership and collaborative skills. Jeff drives improvements in technological
business processes and outcomes.
His expertise spans infrastructure management, security, emerging technologies,
data analytics, security controls and audits, offshore development, data center
and cloud architecture, and project management, among other areas. Jeff excels
at working closely with stakeholders and leadership to optimize organizational
performance and results. His proficiency in developing project scope and other
PMO documents, guiding teams through the product development lifecycle, and
providing training direction is highly valued.

Furthermore, Jeff possesses extensive knowledge of implementation, audit, and
certification processes for industry standards such as CMMC, FedRAMP, HITRUST,
ISOs, PCI-DSS and SOC2. This wide range of skills and experience positions Jeff
as a versatile and valuable professional in the cybersecurity and IT landscape.

 * LinkedIn

×
Dan Bowden

2022: Starting 3rd CISO role as Global CISO for Marsh, the world’s leading
insurance broker and risk advisor, with offices in more than 130 countries.

Accomplished Cybersecurity and Technology Executive
Most recently worked as CISO for major $10 billion integrated health system.
Previously CISO at major academic medical system and university, security leader
at regional banking system. Three decades’ experience in leadership, deploying
robust business-enabling cybersecurity solutions. Executive leader positioned to
define and execute an organization’s business strategy, aligning with business
goals and compliance drivers, while balancing demanding workload with shared
resources to meet financial goals. Successful at overcoming cultural and
political issues and getting tough things done. Confident communicator offering
high-caliber presentation, collaboration and closing skills. Executive and
Technical Advisory Board Member. Certified Chief Information Security Officer.

 * LinkedIn

×
Jami Hughes

A visionary risk leader inspired by strategy, innovation, technology,
compliance, accelerating agility, improving customer experience, training and
development. She has the ability to think strategically and lead teams to
execute with tactical efficiency. She has been acknowledged for her ability to
visually showcase the big picture with all the critical metrics that empower
teams to drive the right change to achieve their goals.

 * LinkedIn

×

250+ million endpoints. 500,000+ companies worldwide. One security software
company.

For over 30 years, Trend Micro’s unwavering vision has been to make the world
safe for exchanging digital information. Security is our entire focus, and it
shows. This single-minded passion has inspired our innovations that keep up with
the bad guys despite a changing IT landscape, riskier user behavior, and
constantly evolving threats.

The depth of our experience remains unmatched. From the endpoint to the network
to the cloud, we’ve got you covered with a connected threat defense recognized
by analysts, customers, and industry gurus of all kinds.

 * Website
 * LinkedIn
 * Twitter
 * Facebook

×

Forescout Technologies is the leader in device visibility and control. Our
unified security platform enables enterprises and government agencies to gain
complete situational awareness of their extended enterprise environments and
orchestrate actions to reduce cyber and operational risk. Forescout products
deploy quickly with agentless, real-time discovery and classification of every
IP-connected device, as well as continuous posture assessment.

 * Website
 * LinkedIn
 * Twitter
 * Facebook
 * LinkedIn

×

Illumio enables organizations to realize a future without high-profile breaches
by preventing the lateral movement of attackers across any organization. Founded
on the principle of least privilege in 2013, Illumio provides visibility and
segmentation for endpoints, data centers or clouds. The world’s leading
organizations, including Morgan Stanley, BNP Paribas, Salesforce, and Oracle
NetSuite, trust Illumio to reduce cyber risk. For more information, visit
https://www.illumio.com/what-we-do and engage us on LinkedIn and Twitter.


 * Website
 * LinkedIn
 * Twitter
 * Facebook
 * YouTube

×

Your developer’s laptop is just a hop away from cloud infrastructure. Attackers
don’t think in silos, so why would you have siloed solutions protecting public
cloud, private cloud, containers, laptops, and servers? Uptycs reduces #risk by
prioritizing your responses to threats, #vulnerabilities, misconfigurations,
sensitive #data exposure, and compliance mandates across your modern attack
surface—all from a single platform, UI, and data model. This includes the
ability to tie together threat activity as it traverses on-prem and cloud
boundaries, thus delivering a more cohesive enterprise-wide security posture.
Looking for acronym coverage? We have that, too, including #CNAPP, #CWPP, #CSPM,
#KSPM, #CIEM, #CDR, and #XDR. Start with your Detection Cloud, Google-like
search, and the attack surface coverage you need today. Be ready for what’s
next… and #ShiftUp with Uptycs.

 * Website
 * LinkedIn
 * Twitter
 * Facebook
 * YouTube

×

Versa is the modern secure network. Available via the cloud, on-premises, or as
a blended combination of both, Versa SASE connects Enterprise branches,
teleworkers, and end users securely and reliably to applications in the cloud or
data centers around the world.

 * Website
 * LinkedIn
 * Twitter
 * Facebook
 * YouTube

×

Cloudflare, Inc (www.cloudflare.com / @cloudflare) is on a mission to help build
a better Internet. Cloudflare protects and accelerates any Internet application
online without adding hardware, installing software, or changing a line of code.
Internet properties powered by Cloudflare have all traffic routed through its
intelligent global network, which gets smarter with each new site added. As a
result, they see significant improvement in performance and a decrease in spam
and other attacks. Cloudflare was recognized by the World Economic Forum as a
Technology Pioneer, named the Most Innovative Network & Internet Technology
Company for two years running by the Wall Street Journal, and ranked among the
world’s 50 most innovative companies by Fast Company. Headquartered in San
Francisco, CA, Cloudflare has offices in Austin, TX, Champaign, IL, Boston, MA,
Washington, DC, London, and Singapore.

 * Website
 * LinkedIn
 * Facebook
 * Twitter
 * YouTube

×

CrowdStrike was founded in 2011 to fix a fundamental problem: The sophisticated
attacks that were forcing the world’s leading businesses into the headlines
could not be solved with existing malware-based defenses. Co-founders George
Kurtz and Dmitri Alperovitch realized that a brand new approach was needed — one
that combines the most advanced endpoint protection with expert intelligence to
pinpoint the adversaries perpetrating the attacks, not just the malware.

 * Website
 * LinkedIn
 * Twitter
 * Facebook
 * YouTube

×

For organizations with valuable data or brand, Next Reveal is a user-centric
data protection solution that uncovers risk, educates employees and fulfills
security, compliance and regulatory needs. Unlike legacy DLP, Next is a
flexible, cloud-native, AI/ML powered solution built for today’s threat
landscape.

 * Website
 * LinkedIn
 * Twitter

×

Rubrik, the Zero Trust Data Security Company™, delivers data security and
operational resilience for enterprises. Rubrik’s big idea is to provide data
security and data protection on a single platform, including: Zero Trust Data
Protection, ransomware investigation, incident containment, sensitive data
discovery, and orchestrated application recovery. This means data is ready at
all times so you can recover the data you need, and avoid paying a ransom.
Because when you secure your data, you secure your applications, and you secure
your business.

 * Website
 * LinkedIn
 * Twitter
 * Facebook
 * YouTube

×

Synopsys helps development teams build secure, high-quality software, minimizing
risks while maximizing speed and productivity. Synopsys, a recognized leader in
application security, provides static analysis, software composition analysis,
and dynamic analysis solutions that enable teams to quickly find and fix
vulnerabilities and defects in proprietary code, open source components, and
application behavior. With a combination of industry-leading tools, services,
and expertise, only Synopsys helps organizations optimize security and quality
in DevSecOps and throughout the software development life cycle.

For more information, go to synopsys.com/software

 * Website
 * LinkedIn
 * Facebook
 * Twitter
 * YouTube

×

LogicGate offers modern risk management technology empowering businesses to
proactively transform risk enterprise-wide. Because risk is a team sport, we
created the Risk Cloud Platform® — the most nimble and collaborative GRC
solution out there. Rapidly adapt to changing business conditions. Confidently
innovate and build new processes as you go. Collaborate on risk across your
entire organization. Risk Cloud® gives you an interconnected view of risk across
the organization that you just can’t get from point solutions. After all, great
companies are built not by avoiding risks — but by choosing the right ones.

 * Website
 * LinkedIn
 * Twitter
 * Facebook
 * YouTube

×

trackd.com is a modern patch management platform with a unique twist. Our
solution records the experience of vulnerability remediation practitioners after
they’ve applied a given patch (i.e. did it break something?), anonymizes that
data, and then shares it in real-time with all other trackd platform users. The
data enables remediation teams to identify the small percentage of patches that
are likely to break something, as well as those with little or no history of
disruption that can be considered strong candidates for auto-patching.

 * Website
 * LinkedIn
 * Twitter

×

AuditBoard is the leading cloud-based platform transforming audit, risk, and
compliance management. More than 30% of the Fortune 500 leverage AuditBoard to
move their businesses forward with greater clarity and agility. AuditBoard is
top-rated by customers on G2 and Gartner Peer Insights, and was recently ranked
for the third year in a row as one of the fastest-growing technology companies
in North America by Deloitte. To learn more, visit: AuditBoard.com.

 * Website
 * LinkedIn
 * Facebook
 * Twitter

×
ThreatLocker® improves enterprise-level server and endpoint security by blocking
unknown application vulnerabilities through Application Whitelisting,
Ringfencing™, Storage Control and Privileged Access Management solutions.
www.threatlocker.com
 * Website
 * LinkedIn
 * Facebook
 * Twitter
 * YouTube

×

BARAMUNDI IS YOUR PROVIDER FOR RELIABLE UNIFIED ENDPOINT MANAGEMENT

Security requirements are constantly growing as professionally managed IT
infrastructures become increasingly complex. The work of IT administrators in a
company, and the performance of the IT department as a whole, are therefore
becoming a key success factor within their organization, in business and in the
marke. We have been the experts in unified endpoint management for the past 20
years. With the baramundi Management Suite, we can provide you with a versatile
tool to help you achieve your full IT potential. Maintain control and maximize
your productivity by automating routine tasks. The baramundi Management Suite is
ideal for your client lifecycle management and helps to reliably manage and
protect all of your devices. It is quick to install and implement, intuitive to
operate, and has a modular design, thereby offering a high level of usability
and transparency. Start now and benefit from the long-term advantages for your
IT.

 * Website
 * LinkedIn
 * Twitter
 * Facebook
 * YouTube

×

We specialize in partnering with MSP’s who are looking for a full cybersecurity
solution for their customers. NetCyberOps provides SIEM, EDR, MDR, Vulnerability
Management, and Email Protection in one solution for partners. Our 24×7 Security
Operations Center is lead by experts with offensive and defensive backgrounds
from the National Security Agency. Our teams unique background provides an edge
in countering advanced threats. Currently protecting over 350,000 endpoints.

 * Website
 * LinkedIn

×

Caveonix Cloud is the industry’s only integrated platform built to keep hybrid
multicloud environments secure and compliant from development through runtime

 * Website
 * LinkedIn
 * Twitter
 * YouTube

×

Recorded Future delivers the world’s most advanced security intelligence to
disrupt adversaries, empower defenders, and protect organizations. With
proactive and predictive intelligence, Recorded Future’s platform provides
elite, context-rich, actionable intelligence in real time that’s ready for
integration across the security ecosystem.

 * Website
 * Facebook
 * Twitter
 * LinkedIn
 * YouTube

×

ZeroFox delivers proactive external cybersecurity to outfox the adversary and
disrupt, identify, and dismantle threats outside the traditional corporate
perimeter. The ZeroFox Platform combines advanced AI-driven analysis to detect
complex threats on the surface, Deep, and Dark Web with fully managed threat
intelligence services and threat analysts who become an extension of your team –
all while providing automated remediation to effectively disrupt threats.

 * Website
 * LinkedIn
 * Facebook
 * Twitter
 * YouTube

×

Netskope is the leader in cloud security. We help the world’s largest
organizations take full advantage of the cloud and web without sacrificing
security. Our patented Cloud XD technology eliminates blind spots by going
deeper than any other security provider to quickly target and control activities
across thousands of cloud services and millions of websites. With full control
from one cloud, our customers benefit from 360-degree data protection that
guards data everywhere and advanced threat protection that stops elusive
attacks. At Netskope, we call this smart cloud security.

 * Website
 * Twitter
 * LinkedIn
 * Facebook

×

Fastly is upgrading the internet experience to give people and organizations
more control, faster content, and more dynamic applications. By combining the
world’s fastest global edge cloud network with powerful software, Fastly helps
customers develop, deliver, and secure modern distributed applications and
compelling digital experiences. Fastly’s customers include many of the world’s
most prominent companies, including Pinterest, The New York Times, and GitHub.
For more information on our mission and products, visit https://www.fastly.com.

 * Website
 * LinkedIn
 * Facebook
 * Twitter

×

Okta is the World’s Identity Company. As the leading independent Identity
partner, we free everyone to safely use any technology—anywhere, on any device
or app. The most trusted brands trust Okta to enable secure access,
authentication, and automation. With flexibility and neutrality at the core of
our Okta Workforce Identity and Customer Identity Clouds, business leaders and
developers can focus on innovation and accelerate digital transformation, thanks
to customizable solutions and more than 7,000 pre-built integrations. We’re
building a world where Identity belongs to you. Learn more at okta.com.

 * Website
 * LinkedIn
 * Twitter
 * Facebook

×

Right-Size Your Defenses to Reduce Threat Exposure Interpres Security provides
an unbiased view of the enterprises’ security posture to help CISOs and security
practitioners reduce threat exposure. Interpres Security analyzes the dynamic
relationship between defensive and adversarial capabilities, prioritizes
actions, and optimizes the security ecosystem for the enterprise, providing a
single source of truth when it comes to defense surface management. Discover how
Interpres can validate the effectiveness of your current security stack. Learn
more about Interpres Security, visit www.InterpresSecurity.com.

 * Website
 * LinkedIn
 * Twitter

×

ForgeRock®, the leader in digital identity, delivers modern and comprehensive
Identity and Access Management solutions for consumers, employees and things to
simply and safely access the connected world. Using ForgeRock, more than a
thousand global customer organizations orchestrate, manage, and secure the
complete lifecycle of identities from dynamic access controls, governance, APIs,
and storing authoritative data – consumable in any cloud or hybrid environment.
The company is privately held, and headquartered in San Francisco, California,
with offices around the world. For more information and free downloads, visit
www.forgerock.com or follow ForgeRock on social media.

 * Website
 * LinkedIn
 * Twitter
 * Facebook
 * YouTube

×

(ISC)² is an international nonprofit membership association focused on inspiring
a safe and secure cyber world. Best known for the acclaimed Certified
Information Systems Security Professional (CISSP®) certification, (ISC)² offers
a portfolio of credentials that are part of a holistic, pragmatic approach to
security. Our membership, more than 168,000 strong, is made up of certified
cyber, information, software and infrastructure security professionals who are
making a difference and helping to advance the industry.

 * Website
 * LinkedIn
 * Twitter
 * Facebook
 * YouTube

×

Founded in 2012, the Women’s Society of Cyberjutsu (WSC) is a National 501(c)3
non-profit community, focused on empowering women to succeed in the
cybersecurity industry. WSC’s mission is to advance women in cybersecurity
careers by providing programs and partnerships that promote hands-on training,
networking, education, mentoring, resource-sharing and other professional
opportunities.

WSC serves thousands of women across the globe by bringing awareness to, and
advancing careers in, cybersecurity. The WSC community includes information
security professionals, IT professionals, programmers, computer scientists and
engineers, as well as women wanting to explore and join the field. Recognizing
the importance of encouraging girls to embrace a future in STEM-related
professions through its Cyberjutsu Girls Academy, WSC provides a unique hands-on
curriculum focused on securing information technology. For more information,
visit http://www.womenscyberjutsu.org.

 * Website
 * LinkedIn
 * Facebook
 * Twitter

×

We put our heart and soul into this Cybersecurity Conference directory.

Way back in 2013 we had another website called “Concise Courses” which used to
market and sell InfoSec training courses. We published a blog post listing all
the upcoming InfoSec Conferences of that year, and Google loved the resource and
put us right to the top of the search engines. That ‘accidental’ occurrence
spawned this directory which is maintained by a small team comprising of Henry
Dalziel and Charles Villaneuva and a bunch of freelance programmers.

What We Do:
We list, literally, every single Information Security conference, event and
seminar within every niche in Cybersecurity.
We have a dedicated team that maintains our in-house tech stack, directory, and
data curation.

 * Website
 * facebook

×

The Pan Asian American Business Council (“PAABC”) is a non-profit organization
consisting of Asian American businesses that would like to promote and grow
their own and other Asian American businesses.

To enable Asian American owned businesses to develop and grow.

 * Website

×