Brian Barrios
Executive Director, Threat Management and Intelligence, Southern Company
Topic: Insider Threat
David Bottom
Chief Information & Data Officer, U.S. Department of Homeland Security, Office of Intelligence & Analysis
Topic: 90% of All Cyberattacks Are Occurring Through Emails. Issues, Challenges, and How Do We Stop Them
Joram Borenstein
GM, Cybersecurity Solutions, Microsoft
Topic: Hiring & Retaining a Diverse Cybersecurity Workforce
Gene Casady
VP Security Delivery & Global Operations, Global Payments Inc.
Topic: Vulnerability Risk Ranking Methodology
Michael D’Ambrosio
Deputy Assistant Director, US Secret Service
Topic: What Are the Impediments to Private Sector Collaboration and How Do You Think Collaboration Can Be Advanced?
Alex Doll
Founder and Managing Member, Ten Eleven Ventures
Topic: Global Entrepreneurship in Cyber
John Felker
Assistant Director, Cybersecurity and Infrastructure Security Agency
US Department of Homeland Security
Workforce, Emphasis on Millennials
Eric Green
Head of Mobile Security, HSBC
Topic: Beyond BYOD – Mobile Device and OS Security vs. Risk
Renee Guttmann
Chief Information Security Officer, Campbell Soup Company
Topic: What Does Security 2025 Look Like? How is it Different From 2020?
Patrick Johnson
Chief of Staff, Silicon Valley Bank
Topic: State of the Markets
Adrienne Lotto
Senior Director for Enterprise Resilience, New York Power Authority
Topic: The Future of Information Sharing between Industry and Government
Jenny Menna
Senior Vice President, Business Security Solutions, US Bank
Topic: Cloud Security
Ben Moreland
Director, Information Security, Sinclair Broadcasting Group
Topic: Measuring and Reporting Information Security Program Metrics. How Do Different Companies Do It?
Chris Nielsen
Executive Manager for Cybersecurity Risk, United States Postal Service
Topic: Ransomware Response: Recover or Pay?
Tom Parker
Chief Information Security Officer, Kayak
Topic: DLP
Peter Tseronis
Founder & Chief Executive Officer
Dots and Bridges LLC
Topic: Securing Your Corporate Network Using a Zero Trust Methodology
Mani Sundaram
CIO and Executive VP, Global Services And Support, Akamai Technologies
Topic: Securing Your Corporate Network Using a Zero Trust Methodology
Michael Welch
Global Chief Information Security Officer, OSI Group, LLC
Topic: Identity Access Management Around Cloud
Mark Weatherford
Global Information Security Strategist, Booking Holdings
Topic: Supply Chain Security