InfoSec World
The Event
About Us
Register for 2023
Agenda
Speakers
Venue
Pricing
Workshops
Sponsors
FAQ
About
Leadership Board
Media
InfoSec World
register
for 2023
Home
The Event
Agenda
Speakers
Venue
Pricing
Workshops
Sponsors
FAQ
About Us
About
Leadership Board
Media
Back to Top
Mon
Tue
Wed
All
Events
Keynotes
Formats
All Formats
Keynote
Panel
Session
ALL
TIMES
6 AM
- 10 AM
10 AM
- 1 PM
1 PM
- 5 PM
5 PM
- End
No events available for this time.
Details >
10:15 am - 11:05 am
Session
Recipe for Securing Your APIs
Jennifer L. Shannon
Senior Security Consultant • Secure Ideas
Details >
10:15 am - 11:05 am
Session
Top 10 Azure security tips from 10 years of securing Azure applications
Karl Ots
Head of Cloud Security • EPAM Systems
Details >
10:15 am - 11:05 am
Session
Scouting the Adversaries: Utilizing ATT&CK to Assess Your Defense.
Jeffrey T. Lemmermann
Sr. Information Assurance Consultant • SynerComm, Inc.
Details >
10:15 am - 11:05 am
Session
The Uber CISO Prosecution and What It Means for Your InfoSec Program
John Bandler
Founder and Principal • Bandler Law Firm PLLC
Adam Cohen
Counsel • BakerHostetler
Scott Giordano
V.P., Corporate Privacy, and General Counsel • Spirion
David N. Patariu
Privacy Attorney • Venable LLP
Details >
10:15 am - 11:05 am
Session
Why the Dark Web Markets Matter to Your Organization
David Branscome
Global Partner Solutions Security Architect • Microsoft
Details >
10:15 am - 11:05 am
Session
When and Why to Move Cybersecurity Out of IT
Joshua G. Kuntz
Chief Information Security Officer • Texas Dept of Licensing & Regulation
Details >
10:15 am - 11:05 am
Session
Lessons Learned from a Policy Stack Transformation
Stevens F. Fox
Deputy CISO, Policy & Program Management • Washington Technology Services
Samantha Zee
Enterprise IT Policy Manager • Washington Technology Solutions
Details >
10:15 am - 11:05 am
Session
5G Privacy: Addressing Risk and Threats
Parul Khanna
SENIOR CONSULTANT, INFORMATION RISK MANAGEMENT • MANULIFE
Details >
11:15 am - 12:05 pm
Session
An Executive Guide to Red Teaming
Andrew AH Hay
COO • Lares
Details >
11:15 am - 12:05 pm
Session
Handling Risks from AI Coding Assistants
Nathan Hamiel
Senior Director of Research • Kudelski Security
Details >
11:15 am - 12:05 pm
Session
Confessions of a QSA: Navigating PCI DSS 4.0
Kyle Morris
Senior Manager - IT Advisory Services • Weaver
Details >
11:15 am - 12:05 pm
Session
Ready and Willing: How to Find the 'Diamonds in the Rough'
Brandon Dunlap
Senior Consultant • Brightfly
John Carnes
Global Head of Privileged Access Management • Corebridge Financial
Shawn Harris
Senior Director, Cybersecurity and Compliance • Chipotle Mexican Grill
Tim Robnett
vCISO / Fractional CISO & Cyber Resiliency Consultant • Wavefront Consulting, Inc
Details >
11:15 am - 12:05 pm
Session
Realities of SBOM: What is Under the Hood of SBOM?
Hasan Yasar
Technical Director, Adjunct Faculty Member • Software Engineering Institute | Carnegie Mellon University
Details >
11:15 am - 12:05 pm
Session
How Does Social Engineering Work, From Planning to Execution
Dardan Prebreza
Senior Security Consultant • Bishop Fox
Details >
1:40 pm - 2:30 pm
Session
Data Privacy Panacea Web3 vs Web3.0 Case Study
James Odeyinka
Senior Solution Architect • Walgreens Co
Details >
1:40 pm - 2:30 pm
Session
Why Spoof, When you Can Own?
Domenic Lutz
Information Security Engineer • URBN
Details >
1:40 pm - 2:30 pm
Session
Why CISO’s Make Bad Decisions: How Bias and Influence Skew Information Security Risk Determination
Michael Landeck
Director of Security Consulting • NTT Data
Details >
1:40 pm - 2:30 pm
Session
Does Cyber Insurance Actually Cover Anything?
Monique Ferraro
Cyber Counsel • HSB
Peter Hedberg
VP, Cyber Underwriting • Corvus Insurance
Chris Seusing
Partner, Chair, Cyber and Privacy Practice • Wood Smith Henning & Berman
Violet Sullivan
VP, Client Engagement • Redpoint Cyber
Details >
1:40 pm - 2:30 pm
Session
Creating a Next Generation GRC Program
Rolando Espinoza
Head of GRC & Vulnerability Management • Mondelez International
Details >
1:40 pm - 2:30 pm
Session
Does your DevSecOps Pipeline only Function as Intended?
Timothy A. Chick
Applied Systems Group Technical Manager • Carnegie Mellon University - Software Engineering Institute
Details >
1:40 pm - 2:30 pm
Session
CMMC, GLBA, NSPM-33 - Whatever the Federated Standard Is, Are You Ready?
Wendy M. Epley
Principal Analyst, Information Security-Governance, Risk & Compliance • The University of Arizona
Details >
1:40 pm - 2:30 pm
Session
Latin America's Data Privacy Laws: Navigating Risks and Comparing with GDPR
Adriana Sanford
Founder & CEO • Data Privacy Help, LLC. / International TV Commentator
Details >
2:40 pm - 3:30 pm
Session
New Finance means New Heists: State of Hacking in the DeFi World
Matt MacDonald
Senior Manager IT Assurance • Wolf & Company, P.C.
Details >
2:40 pm - 3:30 pm
Session
Measuring Insider Risk Program Effectiveness
Randall F. Trzeciak
Principal Researcher • Software Engineering Institute
Details >
2:40 pm - 3:30 pm
Session
Misinformation in the Age of Generative AL
Donnie Wendt
Principal Security Researcher • Mastercard
Details >
2:40 pm - 3:30 pm
Session
I Feel the Need – The Need for Speed[y] Recovery: Controlling Business Interruption
Lisa Morris
Partner • MDD Forensic Accountants
Emily Short
National Director of Product, Cyber Practice • Baldwin Risk Partners
Violet Sullivan
VP, Client Engagement • Redpoint Cyber
Jane Warring
Partner • Zelle LLP
Details >
2:40 pm - 3:30 pm
Session
The Threat of Quantum Computing and the Strategic Drive Towards Cryptographic Modernization
Richard Tychansky
Security Architect • Independent Security Researcher
Details >
2:40 pm - 3:30 pm
Session
Cyber Resilience: It’s Not Just About Technology
Lauren M. Van Wazer
Vice President, Global Public Policy and Regulatory Affairs • Akamai Technologies
Details >
2:40 pm - 3:30 pm
Session
Career Benefits and Pathways of Cybersecurity Apprenticeships
Rodney McLeod
CEO • McLeod Information Systems
Katie Adams
Senior Director • SAFAL Partners
Debbie McLeod
President/Director of Apprenticeships • McLeod Information Systems
Details >
2:40 pm - 3:30 pm
Session
The Many Ways to Hack MFA
Roger A. Grimes
Data-Driven Defense Evangelist • KnowBe4
Details >
10:30 am - 11:20 am
Session
How to Harness the IT Security Powers of the new PCI-DSS v4.0
Ralph Villanueva
IT Security and Compliance Analyst • Hilton Grand Vacation
Details >
10:30 am - 11:20 am
Session
Some Legal Perspectives on ChatGPT and What It Means for Your InfoSec Program
Adam Cohen
Counsel • BakerHostetler
Scott Giordano
V.P., Corporate Privacy, and General Counsel • Spirion
David N. Patariu
Privacy Attorney • Venable LLP
Roy Zur
CEO • ThriveDX
Details >
10:30 am - 11:20 am
Session
Penetration Testing For NOT Dummies
Alex Holden
CISO • Hold Security LLC
Details >
10:30 am - 11:20 am
Session
Incentivizing the CIO to Prioritize Security
Joshua G. Kuntz
Chief Information Security Officer • Texas Dept of Licensing & Regulation
Details >
10:30 am - 11:20 am
Session
Ten Legal Issues for CISOs
Steve Black
Professor • Texas Tech University School of Law
Details >
10:30 am - 11:20 am
Session
Powering Up the Cybersecurity Workforce by Keeping an Eye on the "I"
Lynn Dohm
Executive Director • Women in CyberSecurity (WiCyS)
Details >
10:30 am - 11:20 am
Session
Best Practices for Managing & Preventing Insider Threats
Michael J. Dennehy
Director, Cloud Security Architecture • Cisco Systems
Details >
10:30 am - 11:20 am
Session
Chaos to Control: The Importance of Recovery Tiering
Kimberly Alkire
System Director, Cyber Wellness • Health First
Details >
1:30 pm - 2:20 pm
Session
Europrivacy: The First EU Accepted Certification Scheme Addressing Art 42 of GDPR
Willy Fabritius
Global Head Strategy & Business Development Information Security Assurance • SGS
Details >
1:30 pm - 2:20 pm
Session
Quantum Cyber Readiness: Skating to the Puck, Without Getting Hit!
Nadia Carlsten
Vice President of Product • SandboxAQ
Ken Durazzo
VP of Research Office • Dell
Matt Scholl
Chief of Computer Security Division • National Institute of Standards and Technology
Colin Soutar
Managing Director • Deloitte & Touche LLP
Details >
1:30 pm - 2:20 pm
Session
Hacking Into A Cyber Career - One Year On
Kris Rides
CEO • Tiro Security
Gunnar Kallstrom
CND Cyber Analyst • PeopleTec
Nick DeMeo
Jr. Security Administrator • Vista Clinical Diagnostics
Heverin Joy Williams
Cloud Engineer • Sirius, a CDW company
Details >
1:30 pm - 2:20 pm
Session
Should I Trust ChatGPT to Review My Program?
Mark Sherman
Technical Director • Carnegie Mellon University/Software Engineering Institute
Details >
1:30 pm - 2:20 pm
Session
Battling Bots: How Current Defenders Deal with Automation
Branden R. Williams
VP, IAM Strategy • Ping Identity
Details >
1:30 pm - 2:20 pm
Session
Breaking Barriers: Climbing the Career Ladder for Women in Cybersecurity
Lauren M. Van Wazer
Vice President, Global Public Policy and Regulatory Affairs • Akamai Technologies
Details >
1:30 pm - 2:20 pm
Session
Time After Time': Preparing for the SEC's New Timeline for Incident Reporting
Brandon Dunlap
Senior Consultant • Brightfly
Jennifer Sosa Esq.
Director, Consulting and Info Gov Services • TransPerfect Legal Solutions
Details >
2:30 pm - 3:20 pm
Session
Unmasking the Godfather - Reverse Engineering the Latest Android Banking Trojan
Laurie A. Kirk
Reverse Engineer • Microsoft
Details >
2:30 pm - 3:20 pm
Session
Vulnerability Management in Elastic Infrastructure, Getting Over Old Ideas of Pre-Production
Brandon Dunlap
Senior Consultant • Brightfly
John Carnes
Global Head of Privileged Access Management • Corebridge Financial
Shawn Harris
Senior Director, Cybersecurity and Compliance • Chipotle Mexican Grill
Tim Robnett
vCISO / Fractional CISO & Cyber Resiliency Consultant • Wavefront Consulting, Inc
Details >
2:30 pm - 3:20 pm
Session
Adopting Zero Trust Architecture (ZTA): Barriers in Organizational Change
Lethia Jackson
Full Professor/Chair of the Department of Technology & Security • Bowie State University/Department of Technology & Security
Velma Latson
Assistant Professor • Bowie State University/Department of Technology & Security
Details >
2:30 pm - 3:20 pm
Session
Chief Incident Scapegoat Officer (CISO)?
Johnathan J. Rudy
Senior Corporate Counsel Data Protection & Cybersecurity • TransUnion
Details >
2:30 pm - 3:20 pm
Session
Managing and Operating a Converged Security Program: Physical and Cyber Worlds Combined
Tim Ryan
Vice President, Global Security Organization, Converged Security and Digital Crimes • ADP
Details >
2:30 pm - 3:20 pm
Session
Selling Security to Executives
Gideon T. Rasmussen
vCISO, Cybersecurity Management Consultant • Virtual CSO, LLC
Details >
2:30 pm - 3:20 pm
Session
Beyond Burnout: Where we are today and what we need to do now
Chloé Messdaghi
Security Solutionist & Philanthropist • Secure by Chloé
Details >
4 pm - 4:50 pm
Session
NIST Cybersecurity Framework 2.0 - What's Coming & What do I do About it?
Kelly Hood
EVP & Cybersecurity Engineer • Optic Cyber Solutions
Thomas Conkle
Cybersecurity Engineer • Optic Cyber Solutions
Details >
4 pm - 4:50 pm
Session
Stress Management for Security
William C. Cross
Professor • Florida Institute of Technology
Details >
4 pm - 4:50 pm
Session
How to Develop an Effective and Resilient Cyber Security Program
Tiffany Kleemann
Cyber and Strategic Risk / Managing Director • Deloitte
Details >
4 pm - 4:50 pm
Session
Benefits of Incorporating User Experience (UX) into Enterprise DevSecOps Processes
Andrew Boyle
Director and Distinguished Digital & Cyber Technologist • Booz Allen Hamilton
Details >
4 pm - 4:50 pm
Session
Attacker's Perspective: An Exploration of How an Attacker Views your Applications
Kevin Johnson
CEO • Secure Ideas LLC
Details >
4 pm - 4:50 pm
Session
Vulnerability scanning for the Home-network
Frans Schippers
Lecturer Cyber Security • Amsterdam University of Applied Sciences
Details >
4 pm - 4:50 pm
Session
Zero Trust and Third-Party Risk: Reduce the Blast Radius
Greg Rasner
Author, "Cybersecurity & Third-Party Risk" • and "Zero Trust and Third-Party Risk"
Details >
9:30 am - 10:20 am
Session
Benefits of Legal and CISOs Uniting in a Post-Uber and Twitter World
Andrea Hoy
President, vCISO and CEO, Co-Founder, Chief Disruptor • A Hoy & Associates / SecurIT & Us and Innovation Shipyard Alliance
Ron Raether
Partner, Attorney at Law • Troutman (Troutman Pepper Sanders Hamilton)
Edgar Vargas
Associate • Troutman Pepper Hamilton Sanders, LLP
Details >
9:30 am - 10:20 am
Session
The Application Security State of the Union
Chris Romeo
CEO • Kerr Ventures
Details >
9:30 am - 10:20 am
Session
Legal Qualifications of a Digital Security/Privacy Expert Witness
Herbert Joe
Reg. Patent Attorney/Board Certified Forensic Examiner • Law Office of Herbert Joe
Details >
9:30 am - 10:20 am
Session
Deserving the Budget You Need
Ira Winkler
CISO • CYE Security
Details >
9:30 am - 10:20 am
Session
The Wandering CISO: Lessons Learned From Life On The Road
Dave Lewis
Global Advisory CISO • Cisco
Details >
9:30 am - 10:20 am
Session
Healthcare Security is Homeland Security
C. Forrest Faison
CEO and President • NextGenMed Consulting
Danielle Tarino
COO • Code-X
Details >
10:30 am - 11:20 am
Session
The NIST AI Risk Management Framework: Some Legal Perspectives
Adam Cohen
Counsel • BakerHostetler
Scott Giordano
V.P., Corporate Privacy, and General Counsel • Spirion
David N. Patariu
Privacy Attorney • Venable LLP
Details >
10:30 am - 11:20 am
Session
Security Strategic Alignment to the Organization for Managers & Leadership using the STS Model
Cicero Chimbanda
SVP of Risk and IT • Loop Capital
Details >
10:30 am - 11:20 am
Session
Machine Readable Representations of Cyber Adversary Behavior with STIX
Charles K. Frick
Principal Professional Staff • Johns Hopkins Applied Physics Laboratory
Details >
10:30 am - 11:20 am
Session
We Need a Compliance Control for Retraining Cybersecurity Professionals
Deidre Diamond
CEO and Founder • CyberSN
Details >
10:30 am - 11:20 am
Session
Do You Want to Play A Game? Artificial Intelligence and Decision Making
Dustin S. Sachs
Senior Manager, Information Security Risk Management • World Fuel Services
Details >
10:30 am - 11:20 am
Session
The United States' Quest to Address Data Privacy and Security
Brandon J. Pugh
Director & Senior Fellow • R Street Institute - Cyber Team
Cory Simpson
Senior Advisor • CSC 2.0
Details >
10:30 am - 11:20 am
Session
Shining a Light on SBOMs to Guide Us Along the Way
James McQuiggan
Security Awareness Advocate • KnowBe4
Michael F. Angelo
Chief Security Architect • Open Text, CyberSecurity
Tony Turner
Founder / CEO • Opswright
Details >
1 pm - 5 pm
Workshop
Cloud Native Application Architecture Threat Hunting Workshop
Richard Tychansky
Security Architect • Independent Security Researcher
Details >
1 pm - 5 pm
Workshop
Data Science for Cybersecurity Workshop (HANDS ON)
Thomas P. Scanlon
Technical Program Manager - CERT Data Science • Software Engineering Institute - Carnegie Mellon University
Details >
1 pm - 5 pm
Workshop
SOC Fundamentals Workshop (HANDS ON)
Ryan Buckner
Chief Knowledge Officer • Schellman Compliance
Details >
1 pm - 5 pm
Workshop/Summit
The Benefits of Deploying a Zero Trust Network Access Architecture
For any and all inquiries please click the button below
Contact Us Today
Tim Garon
Director, Event Content and Strategy
Get in touch with Tim
Join our mailing list for the latest news on InfoSec World 2023.
Keep me updated