InfoSec World
The Event
About Us
Media
Register Now!
Agenda
Speakers
Workshops
Venue
Sponsors
Pricing
Health + Safety
FAQ
About
Leadership Board
Media
Press Releases
InfoSec World
register now
Home
The Event
Agenda
Speakers
Workshops
Venue
Sponsors
Pricing
Health + Safety
FAQ
About Us
About
Leadership Board
Media
Media
Press Releases
Back to Top
Mon
Tue
Wed
All
Events
Keynotes
Topics
Formats
All Topics
Application Security/Software Assurance
Cloud Security
Cyber Crime
Cyber Liability/Insurance
DevSecOps
Governanace, Regulation and Compliance
Hackers & Threats
Identity, Authentication and Access Control
Incident Response & Investigation
Information Security Careers
Information Security Management
Leadership & Budgeting
Malware
Management & Leadership
Network Security
Privacy
Quantum Computing
Ransomware
Risk Mitigation
Security Architecture/Engineering
Security Automation
Security Awareness
Supply Chain Security
Threats
Workforce Diversity
Zero Trust
All Formats
Keynote
Panel
Session
ALL
TIMES
6 AM
- 10 AM
10 AM
- 1 PM
1 PM
- 5 PM
5 PM
- End
No events available for this time.
Details >
7 am - 8:15 am
Break
Continental Breakfast
Details >
8:15 am - 9 am
Keynote
Welcome & Opening Remarks/Are You Listening?! How to Get What You Want from Your CISO
Tomás Maldonado
Chief Information Security Officer • National Football League (NFL)
Jill Aitoro
SVP, Content Strategy • CyberRisk Alliance
Details >
9 am - 9:15 am
Session
Tech Spotlight
Identity, Authentication and Access Control
Details >
9 am - 9:15 am
Tech Spotlight
Identity, Authentication and Access Control
Why the US Government is Requiring Phishing-Resistant MFA and You Should Too
David Treece
Senior Director Solutions Architecture & Strategic Integrations • Yubico
Details >
9:15 am - 10:15 am
Break
Morning Break in Expo
Details >
9:15 am - 6:30 pm
Expo
Expo Hall Open
Information Security Management
Details >
10:15 am - 11:05 am
Session
Information Security Management
Betrayed by Their Browsers: How Security Teams Are Failing to Protect Users from 3rd Party Tracking and How to Stop It
Michael Landeck
Director of Security Consulting • NTT Data
Supply Chain Security
Details >
10:15 am - 11:05 am
Session
Supply Chain Security
Every Byte Counts: Practical controls for Software Supply Chain Security
Cassie Crossley
VP, Deputy Product Security Officer • Schneider Electric
Application Security/Software Assurance
Details >
10:15 am - 11:05 am
Session
Application Security/Software Assurance
Is Open Source Software (OSS) Too Open to Vulnerabilities? Cybersecurity Facts and Perceptions Considering Log4J
Andrew Boyle
Director and Distinguished Digital & Cyber Technologist • Booz Allen Hamilton
Privacy
Details >
10:15 am - 11:05 am
Session
Privacy
Poisoning the Well : Ethics of Using Free Services Without Giving them Data
Brandon Dunlap
Senior Consultant • Brightfly
John Carnes
Senior Consultant • CxM Consulting
Security Awareness
Details >
10:15 am - 11:05 am
Session
Security Awareness
Strengthening Phishing Awareness Training Using NIST Phish Scale
Mani Keerthi Nagathu
IT Security Manager • Ballard Power Systems
Risk Mitigation
Details >
10:15 am - 11:05 am
Session
Risk Mitigation
The Metaverse: The Really Emerging Risk Landscape
Ira Winkler
Chief Security Architect • Walmart
Information Security Careers
Details >
10:15 am - 11:05 am
Session
Information Security Careers
Hacking Into A Cyber Career - True Stories
Mr Kris Rides
CEO • Tiro Security
Mrs. Heverin Joy Williams
Cloud Engineer • Sirius, a CDW company
Gunnar Kallstrom
CND Cyber Analyst • PeopleTec
Nick DeMeo
Jr. Security Administrator • Vista Clinical Diagnostics
Amanda Lyking
GRC Analyst/Infosec Project Manager • TBC
Threats
Details >
11:10 am - 12 pm
Session
Threats
The Russian Cyber Threat
Andrew Sekela
Special Agent • FBI Tampa
Governanace, Regulation and Compliance
Details >
11:10 am - 12 pm
Session
Governanace, Regulation and Compliance
A Funny Thing About Data
Andrew Neal
VP Research • Gartner
Workforce Diversity
Details >
11:10 am - 12 pm
Panel
Workforce Diversity
The Many Colors of Cybersecurity
Ed Adams
Board Director; CEO • Cyversity; Security Innovation
Trupti Shiralkar
Senior Security Engineering Manager, Product Security • Datadog
Sherron Burgess
Senior Vice President and CISO • BCD Travel
Kim Jones
Director, Security Operations • Intuit
Security Automation
Details >
11:10 am - 12 pm
Session
Security Automation
Machine Learning: A Friend and Enemy of Cybersecurity
Donnie Wendt
Principal Security Researcher /Adjunct Professor • Mastercard /Utica University
Security Awareness
Details >
11:10 am - 12 pm
Session
Security Awareness
A Whole Lotta BS (Behavioral Science) About Cybersecurity
Lisa Plaggemier
Executive Director • National Cybersecurity Alliance
DevSecOps
Details >
11:10 am - 12 pm
Session
DevSecOps
Ten DevSecOps Culture Failures
Mr. Chris Romeo
Chief Security Officer • Security Journey
Privacy
Details >
11:10 am - 12 pm
Session
Privacy
As Risks to Our Personal Data Continue to Increase and Evolve, is the United States on Track to Finding a Solution?
Tatyana Bolton
Policy Director, Cybersecurity & Emerging Threats • R Street Institute
Brandon Pugh
Senior Feloow & Policy Counsel, Cubersecurity & Emerging Threats • R Street Institute
Details >
12 pm - 1:30 pm
Break
Lunch in Expo
Information Security Management
Details >
1:40 pm - 2:30 pm
Session
Information Security Management
The Orlando Doctrine Ten Years Later - The Right to Cyber Self-Defense
Brandon Dunlap
Senior Consultant • Brightfly
Spencer Wilcox
Senior Director, Cybersecurity & Technology Risk • NextEra Energy, Inc.
Application Security/Software Assurance
Details >
1:40 pm - 2:30 pm
Session
Application Security/Software Assurance
A CISO's Guide to the State of API Security
Richard Tychansky
Security Architect •
Information Security Careers
Details >
1:40 pm - 2:30 pm
Session
Information Security Careers
Aligning Your Talents to Maximize Success in Your Infosec Career
Gaylynn Fassler
Information Security Analyst, Strategic Projects Lead • Duke Health
Shelly Epps
Director, Security Program Management • Duke Health
Zero Trust
Details >
1:40 pm - 2:30 pm
Session
Zero Trust
What Cybersecurity Practitioners Can Learn from Honeybees
Gianna Whitver
Founder • LeaseHoney
Dan Watson
Consultant • Microsoft
Threats
Details >
1:40 pm - 2:30 pm
Session
Threats
Feed the Beast! Threat Hunt Use Cases from the Front Lines
Mr. Max Moerles
Senior Lead Technologist • Booz Allen Hamilton
Brittany Sattler
Threat Hunter • Booz Allen Hamilton
Cyber Crime
Details >
1:40 pm - 2:30 pm
Session
Cyber Crime
Deep Fakes - Evolving Threats to Enterprise Security
Peter Warmka
Founder • Counterintelligence Institute, LLC
Malware
Details >
1:40 pm - 2:30 pm
Session
Malware
Botnets Never Die
Aamir Lakhani
Senior Security Strategist • Dr. Chaos
Governanace, Regulation and Compliance
Details >
1:40 pm - 2:30 pm
Session
Governanace, Regulation and Compliance
What Attorneys Can Do for Your Infosec Team
Mr. Scott Giordano Esq.
V.P., Corporate Privacy, and General Counsel • Spirion LLC
Jody R. Westby
CEO • Global Cyber Risk, LLC
Risk Mitigation
Details >
1:40 pm - 2:30 pm
Panel
Risk Mitigation
Improving Cyber Defender Performance for Enhanced Enterprise Cybersecurity
Jeff Greer
Lecturer, Cybersecurity • University of North Carolina Wilmington
Geoff Stoker
Assistant Professor • University of North Carolina Wilmington
Dr. Ulku Clark
Professor • University of North Carolina Wilmington
Network Security
Details >
1:40 pm - 2:30 pm
Session
Network Security
Using DeTTECT and the MITRE ATT&CK Framework to Assess Your Security Posture
David Branscome
Global Partner Solutions Security Architect • Microsoft
Threats
Details >
1:40 pm - 2:30 pm
Session
Threats
Understanding Vishing from the Attacker's Perspective
Shelby Dacko
Human Risk Analyst • Social-Engineer LLC
Network Security
Details >
1:40 pm - 2:30 pm
Session
Network Security
Inspecting TLS
Frans Schippers
Lecturer Cyber Security, HBO-ICT/Cyber Security • Amsterdam University of Applied Sciences
Workforce Diversity
Details >
1:40 pm - 2:30 pm
Session
Workforce Diversity
Women in IT Security: Stop Plugging Holes and Start Feeding the Talent Pipeline
Lynn Dohm
Executive Director • Women in CyberSecurity (WiCyS)
Mani Keerthi Nagathu
IT Security Manager • Ballard Power Systems
Jill Aitoro
SVP, Content Strategy • CyberRisk Alliance
Details >
2:35 pm - 3:25 pm
Session
ISSA Presented Session
Details >
3:30 pm - 4 pm
Break
Afternoon Break in Expo
Ransomware
Details >
4 pm - 4:25 pm
Session
Ransomware
The Reason Why Ransomware is Really HEATing Up
Neko Papez
Senior Manager, Cybersecurity Strategy • Menlo Security
Supply Chain Security
Details >
4 pm - 4:25 pm
Session
Supply Chain Security
Securing Your Digital Supply Chain in an Insecure Age
John Chisum
Vice President, Solutions Consulting • RiskRecon, a Mastercard Company
Cloud Security
Details >
4 pm - 4:25 pm
Session
Cloud Security
Risk to Cloud Data is Lurking in the Shadows
Andy Smith
CMO • Laminar
Details >
5 pm - 6:30 pm
Networking
Welcome Reception with Sponsors
Details >
6:30 am - 7:15 am
Networking
Morning Fun Run/Walk
Details >
7:30 am - 8:15 am
Break
Continental Breakfast
Details >
8:15 am - 8:30 am
Session
Opening Remarks
Details >
8:30 am - 9 am
Keynote
Fireside Chat with Robert Herjavec
Robert Herjavec
CEO • Cyderes
Details >
9:15 am - 10:15 am
Break
Morning Break in Expo
Zero Trust
Details >
10:15 am - 11:05 am
Session
Zero Trust
Implementing Zero Trust Principles to Reduce Insider Risk
Mr. Randy Trzeciak
Technical Director • CERT Division of the Software Engineering Institute; Carnegie Mellon University
Incident Response & Investigation
Details >
10:15 am - 11:05 am
Session
Incident Response & Investigation
How 2020 Vision Has Blurred Attorney Client Privilege in Incident Response
Brandon Dunlap
Senior Consultant • Brightfly
Andrea Hoy
President, vCISO and CEO, Co-Founder, Chief Disruptor • A Hoy & Associates
Ron Raether
Partner, Attorney at Law • Troutman (Troutman Pepper Sanders Hamilton)
Privacy
Details >
10:15 am - 11:05 am
Session
Privacy
What Every Privacy Professional Should Know About Global Privacy Laws
Adriana Sanford
Senior Fellow- Global Privacy • Claremont Graduate University
Cloud Security
Details >
10:15 am - 11:05 am
Session
Cloud Security
Cloud Security with AI Powered Threat Intelligence
Mr Oluyemi James Odeyinka
Technical Architect & Cybersecurity Leader • Walgreens Co.
Risk Mitigation
Details >
10:15 am - 11:05 am
Session
Risk Mitigation
Dealing with Post-COVID IT Security and Data Privacy Risks
Ralph Villanueva
IT Security and Compliance Analyst • Hilton Grand Vacation
Leadership & Budgeting
Details >
10:15 am - 11:05 am
Session
Leadership & Budgeting
Defining the Culture of your SOC
Jordan Silva
Senior Manager, Service Delivery • Hawaiian Telcom
Hackers & Threats
Details >
10:15 am - 11:05 am
Session
Hackers & Threats
We Hacked Hospitals, What Can your Industry Learn From This?
Ben Schmerler
Senior Solutions Consultant • Independent Security Evaluators
Ransomware
Details >
11:10 am - 12 pm
Session
Ransomware
From Zero to Full Domain Admin: The Real-World Story of a Ransomware Attack
Joseph Carson
Chief Security Scientist & Advisory CISO • Delinea
Application Security/Software Assurance
Details >
11:10 am - 12 pm
Session
Application Security/Software Assurance
The Towering Inferno: Why are APIs Short Circuiting our Security
Kevin Johnson
CEO • Secure Ideas LLC
Governanace, Regulation and Compliance
Details >
11:10 am - 12 pm
Session
Governanace, Regulation and Compliance
It "Keeps on Slipping": Navigating the SEC's New Timeline for Incident Reporting
Jennifer Sosa Esq.
Director, Consulting and Info Gov Services • TransPerfect Legal Solutions
Information Security Careers
Details >
11:10 am - 12 pm
Panel
Information Security Careers
Career Benefits of Cybersecurity Apprenticeships
Brandon Dunlap
Senior Consultant • Brightfly
Rodney McLeod
CEO • McLeod Information Systems
Mike Prebil
Policy Analyst • New America
Kimberly Hauge
Workforce Analyst • Department of Labor
Risk Mitigation
Details >
11:10 am - 12 pm
Session
Risk Mitigation
Vendor Risk Mitigation Strategies
Jaret Preston
Vendor Risk Manager • Caterpillar
Security Awareness
Details >
11:10 am - 12 pm
Session
Security Awareness
The Definition of Insanity: Stop Approaching Security Awareness the Same Way
Mindy Baird
Information Security Risk Specialist II • Western & Southern Financial Group
Details >
12 pm - 1:30 pm
Break
Lunch in Expo
Security Automation
Details >
1:40 pm - 2:30 pm
Session
Security Automation
Security Questions to Ask Your Data Scientists
Dr. Thomas Scanlon
Technical Program Manager - CERT Data Science • Software Engineering Institute - Carnegie Mellon University
Cyber Liability/Insurance
Details >
1:40 pm - 2:30 pm
Session
Cyber Liability/Insurance
Cyber Insurance: Made Simple
Joseph Brunsman
Founder • Brunsman Advisory Group
Quantum Computing
Details >
1:40 pm - 2:30 pm
Session
Quantum Computing
Verifiable Quantum Physics at the Foundation of Zero Trust: Securing Users, Devices, and Networks with Maximum Strength
Duncan Jones
Head of Quantum Cybersecurity • Quantinuum
Application Security/Software Assurance
Details >
1:40 pm - 2:30 pm
Session
Application Security/Software Assurance
SBoMs the Good, the Bad, The Ugly
Michael Angelo
Chief Security Architect • Micro Focus International
Security Architecture/Engineering
Details >
1:40 pm - 2:30 pm
Session
Security Architecture/Engineering
Cleaning up the Mess with the CyberMesh
"Chip" D.B. Wagner
QRadar XDR Leader • IBM
Governanace, Regulation and Compliance
Details >
1:40 pm - 2:30 pm
Session
Governanace, Regulation and Compliance
The Time for Information Security Attorneys Is Now
Mr. Scott Giordano Esq.
V.P., Corporate Privacy, and General Counsel • Spirion LLC
Jody R. Westby
CEO • Global Cyber Risk, LLC
Information Security Careers
Details >
1:40 pm - 2:30 pm
Session
Information Security Careers
The State of 2022 Cybersecurity Jobs
Deidre Diamond
CEO and Founder • CyberSN
Cloud Security
Details >
2:35 pm - 3:25 pm
Session
Cloud Security
A Secure Opensource Approach to Cloud Native Micro Segmentation
Partha Charkraborty
Associate Vice President - Cloud Security and Cyber Innovation • Humana Inc.
Security Awareness
Details >
2:35 pm - 3:25 pm
Session
Security Awareness
5 Ways to Increase Security Culture
James McQuiggan
Security Awareness Advocate • KnowBe4
Incident Response & Investigation
Details >
2:35 pm - 3:25 pm
Session
Incident Response & Investigation
"Those logs JUST aged off the server..."
Matthew Harvey
Director of Incident Response • Crowdstrike
Threats
Details >
2:35 pm - 3:25 pm
Session
Threats
Using The Threat Modeling Manifesto to Build an Enterprise Threat Modeling Program
Mr. Chris Romeo
Chief Security Officer • Security Journey
Governanace, Regulation and Compliance
Details >
2:35 pm - 3:25 pm
Session
Governanace, Regulation and Compliance
CyberTheft of Trade Secrets, and Attorneys’ Considerations during Data Breaches
Herbert Joe
Attorney/Reg. Patent Attorney/Board Certified Forensic Examiner • Law Office of Herbert Joe
Details >
3:20 pm - 4 pm
Break
Afternoon Break in Expo
Cloud Security
Details >
4 pm - 4:25 pm
Session
Cloud Security
Rethinking Vulnerability Management in the Cloud
Ramses Martinez
Director of Defensive Security, Detection, Intel & Response • Amazon
Supply Chain Security
Details >
4 pm - 4:25 pm
Session
Supply Chain Security
Next-Generation Third-Party Risk Management: Aligning Cybersecurity & Third-Party Risk
David Klein
Sr. Director of Product Strategy • ProcessUnity
Zero Trust
Details >
4 pm - 4:25 pm
Session
Zero Trust
Cyber Ready: Overview on Zero Trust, What Come Next and What You Can Do Now
Chad Koslow
CEO • Ridge IT Corporation
Details >
5 pm - 7 pm
Networking
Networking Reception + Passport to Prizes in Expo
Details >
7:30 am - 8:15 am
Break
Continental Breakfast
Details >
8:15 am - 8:30 am
Session
Opening Remarks - Wednesday
Details >
8:30 am - 9 am
Keynote
Yesterday’s Cybersecurity Isn’t Good Enough
Parham Eftekhari
Executive Vice President, CISO Communities • CyberRisk Alliance
Gregory Touhill
Director • CERT Division of the Carnegie Mellon University Software Engineering Institute
Management & Leadership
Details >
9:30 am - 10:20 am
Session
Management & Leadership
Stress Management for Security Professionals
Dr. William Cross
Professor • Florida Institute of Technology
Workforce Diversity
Details >
9:30 am - 10:20 am
Session
Workforce Diversity
Cyber Workforce: REIMAGINED
Lynn Dohm
Executive Director • Women in CyberSecurity (WiCyS)
Details >
10:45 am - 11:15 am
Keynote
A Day Out in Ukraine
Andrew Smeaton
CISO • Datarobot
Details >
11:15 am - 11:30 am
Session
Closing Remarks
Details >
1 pm - 5 pm
Workshop
Data Science for Cybersecurity (HANDS ON)
Dr. Thomas Scanlon
Technical Program Manager - CERT Data Science • Software Engineering Institute - Carnegie Mellon University
Details >
1 pm - 5 pm
Workshop
Advanced Cubicles & Compromises (HANDS ON)
Ean Meyer
Associate Director-Security Assurance • Marriott Vacations Worldwide
Details >
1 pm - 5 pm
Workshop
Cloud Native Application Architecture Threat Hunting
Richard Tychansky
Security Architect •
Details >
1 pm - 5 pm
Workshop
The Benefits of Deploying a Zero Trust Network Access Architecture (HANDS ON)
presented by
CyberRisk Alliance
Stay Informed
Join our mailing list for the latest news on InfoSec World 2022.
Keep Me Updated