Speakers 2018

Speakers

Interested in speaking in 2018? Please click below to fill out our speaker form.

Speaker Call

2018 Speakers Announced So Far...

Samy Kamkar
Samy Kamkar

Security Researcher  Independent

View

Samy Kamkar

Samy Kamkar is an independent security researcher, best known for creating The MySpace worm, the fastest spreading virus of all time. His open source software, hardware and research highlights the insecurities and privacy implications in everyday technologies, from the Evercookie which produces virtually immutable respawning cookies, to SkyJack, a drone that wirelessly hijacks and autonomously controls other drones. His work has been cited by the NSA, triggered hearings on Capitol Hill, and has been the basis for security advancements across virtually all major web browsers, smartphones, and other technologies.

Brett Johnson
Brett Johnson

Security Consultant & Public Speaker 

View

Brett Johnson

Former United States Most Wanted, Brett “GOllumfun” Johnson, referred to by the United States Secret Service as “The Original Internet Godfather” has been a central figure in the cybercrime world for almost 20 years. Mr. Johnson built and was leader of ShadowCrew, the precursor to today’s darknet markets. He was instrumental in developing many areas of online fraud while helping design, implement, and refine modern Identity Theft, Account Take Over Fraud, Card Not Present Fraud, IRS Tax Fraud, and countless other social engineering attacks, breaches, and hacking operations.

Upon his capture, the United States Secret Service hired Mr Johnson to work as a consultant and informant. Johnson worked with the Secret Service for several months before going on a cross country crime spree, being placed on the US Most Wanted List, being captured again, sent to prison, escaping prison, being captured yet again, and finally accepting responsibility for his actions.

Today, Brett works as a security consultant and public speaker. He has worked with groups such as the FBI, Microsoft, Eailage, NextCaller,IDology, AARP, BBWest, TIB, The ACFE, The Card Not Present Group, The Identity Theft Resource Council, PRO, Universities, and many others.

Brett has been featured on numerous media outlets, most recently NBC, CNN Money, RT TV, ArsTechnica, The Independent, and more.
Mr. Johnson can be contacted via www.anglerphish.com

Nicole Eagan
Nicole Eagan

CEO Darktrace

View

Nicole Eagan

As Chief Executive Officer of Darktrace, Nicole Eagan has established the company as the global leader of AI cyber defense. Her extensive career spans 25 years working for Oracle and early to late-stage growth companies. Named 'AI Leader of the Year' in 2017, Nicole has introduced disruptive machine learning to enterprises of all sizes. Today, Darktrace has a valuation of $1.25 billion and counts Insight, KKR, Summit Partners, and Samsung among its investors. Darktrace’s innovative approach to cyber security has won over 100 awards and the company has been named to WSJ’s Tech Companies to Watch, Fast Company's Most Innovative Companies, and the CNBC Disruptor 50.

Classified
Classified

Confessions of a Hacker  

View

Classified

Confessions of a Hacker is a rare opportunity to hear from a professional hacker who will share their techniques and examples of how they have defeated the latest cyber security technologies as well as physical security measures. In this revealing session discover the tools and techniques hackers use to defeat the expensive security safeguards used in many corporate environments today. Low tech and high tech methods will be presented in an effort to help attendees understand the true level of risk faced by their organizations and where the gaps may be in their defence perimeter. There is nothing that has stopped our hacker. They are your worst nightmare.

Wendy Nather
Wendy Nather

Director, Advisory CISOs Duo Security

View

Wendy Nather

Wendy Nather is Principal Security Strategist at Duo Security. She was formerly a CISO in the public and private sectors, led the security practice at independent analyst firm 451 Research, and helped to launch the Retail Cyber Intelligence Sharing Center in the U.S. A co-author of the “Cloud Security Rules,” she was listed as one of SC Magazine's Women in IT Security "Power Players" in 2014.

Matthew O’Connor
Matthew O’Connor

Technical Director, Cloud Office of the CTO Google

View

Matthew O’Connor

Matthew O’Connor is a Technical Director in the Cloud Office of the CTO based in Sunnyvale, CA. He specializes in Security, Compliance, Privacy, Policy, and large scale software services.

Prior to joining the Office of the CTO, Matthew was responsible for Security and Compliance products on Google Cloud Platform.  He established the key foundations for Cloud Compliance Program and many of the early Cloud Platform security products. Matthew also built products for Google Enterprise, having joined Google via the acquisition of Postini in 2007.

Before Google, Matthew held product management and engineering roles building scaled services at Postini, Tellme Networks, AOL, Netscape, Inflow, and Hewlett-Packard. His career started as a US Air Force officer on the MILSTAR satellite program. Matthew has an executive MBA from the University of California and earned a bachelor’s degree in Computer Science Engineering from Santa Clara University.

Zeus Kerravala
Zeus Kerravala

Founder and Principal Analyst  ZK Research

View

Zeus Kerravala

Zeus Kerravala is the founder and principal analyst with ZK Research, and provides a mix of tactical advice to help his clients in the current business climate and long-term strategic advice. Kerravala provides research and advice to end-user IT and network managers, vendors of IT hardware, software and services and the financial community looking to invest in the companies that he covers.

Tim Medin
Tim Medin

Founder Red Siege

View

Tim Medin

Tim Medin is the founder of Red Siege, a company focused to adversary emulation and penetration testing. He is also the SANS MSISE Program Director, the coauthor of multiple SANS courses, and a member of the IANS Faculty. Through the course of his career, Tim has performed penetration tests on a wide range of organizations and technologies. He gained information security experience in a variety of industries including previous positions in control systems, higher education, financial services, and manufacturing. Tim is an experienced international speaker, having presented to a organizations around the world. Tim is the creator of the Kerberoasting, a technique to extract Kerberos tickets to offline attack the passwords of enterprise service accounts.

Eric Jeffery
Eric Jeffery

Security Intelligence & Operations Consulting – Managing Consultant IBM

View

Eric Jeffery

Eric has 20+ years' experience with Information Security including stints in the Technology, Retail, Aerospace, Defense, Hardware, Entertainment and Healthcare industries. Mr. Jeffery's focus involves network design, network implementations and network security. Eric has a Bachelor of Arts degree in Economics from the University of Colorado at Boulder. Mr. Jeffery recently joined IBM as a Managing Consultant where he advises and assists customers with designing, deploying and managing Security Operations Centers (SOC).  Eric resides in Southern Colorado with his wife, enjoys playing trivia and video games.

Mark Mincin
Mark Mincin

Senior Vice President, Chief Information Officer McAfee

View

Mark Mincin

Mark Mincin is Senior Vice President and Chief Information Officer at McAfee. He is responsible for McAfee’s corporate systems, IT infrastructure, and for leading the company’s transformation to the Cloud. With more than two decades of experience in corporate IT, he understands the importance and value of aligning technology and services with business strategy, partnering with product and sales teams, leveraging digital technologies to amplify innovation and grow revenue, and creating a positive customer experience.
Mincin was previously Executive Vice President and CIO at Epicor Software. Before joining Epicor, he served as Vice President, CIO at Caradigm, a Microsoft-GE healthcare joint venture. He also held leadership roles at Microsoft, AT&T Wireless, and The Nasdaq Stock Market.
Mincin has a bachelor’s degree in Marketing-Management, with a minor emphasis in Computer Science from Virginia Tech.

Morey J. Haber
Morey J. Haber

Chief Technology Officer BeyondTrust

View

Morey J. Haber

With more than 20 years of IT industry experience, Mr. Haber joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition and currently overseas strategy for both vulnerability and privileged identity management. In 2004, Mr. Haber joined eEye as the Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was a Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and key customer accounts. Mr. Haber began his career as a Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelors of Science in Electrical Engineering from the State University of New York at Stony Brook.

Jim Motes
Jim Motes

Managing Partner Knights View Consulting, LLC

View

Jim Motes

Jim Motes recently founded Knights View Consulting, LLC, a veteran owned, bespoke security advisory practice specializing in cybersecurity solutions and compliance for businesses of all sizes.  Jim has held numerous executive security roles to include; VP Cyber Security -  Kohler Co., VP and Chief Security Officer - Rockwell Automation; VP Information Security - Invensys PLC, Chief Information Security and Privacy Officer - Perot Systems.
 
Jim’s experience in cybersecurity spans 20 years and he is a Certified Information Systems Security Professional (CISSP), Certified Information System Auditor (CISA), Certified Information Security Manager (CISM), Certified in Risk and Information Systems Control (CRISC), Certified in the Governance of Enterprise IT (CGEIT), and National Security Agency InfoSec Assessment Methodology Certified (NSA-IAM).
 
Jim served as a commissioned officer in the United States Army including duty in the Middle East as an M1A1 heavy tank platoon leader.
 
He spends his free time traveling with his wife, is an avid photographer and antique automobile buff.

Mark Langford
Mark Langford

Principal Consultant Aberfoyle Associates

View

Mark Langford

Mark Langford is the Founder and Principal Consultant at Aberfoyle Associates, a Plano, Texas bases cybersecurity consulting firm that helps client companies optimize their cyber defense policies, investments, and strategies to protect vital intellectual property and customer records.
 
Mark is a Board Member of the North Texas ISSA, was recently inducted into Infragard, and is called upon periodically to speak at cybersecurity industry events on ways to minimize the disruption of productivity and loss of market share due to cyber attacks. He has lived and worked in four different countries, holds a Master's Degree in Telecommunications Management from Oklahoma State University, and earned Salesman of the Year honors twice from a Fortune 100 technology company. Mark is married with three mostly-grown children, is training for a distance swimming race, and volunteers his time to Computers for the Blind, a Dallas-based non-profit organization.

Brent Feller
Brent Feller

Senior Solutions Engineer eSentire

View

Brent Feller
Leonard Jacobs
Leonard Jacobs

President/CEO Netsecuris Inc.

View

Leonard Jacobs

Leonard Jacobs is the President/CEO of Netsecuris, a leading Managed Security Services Provider specializing in providing cyber security protections to businesses in several vertical markets. Leonard has over 31 years of hands-on technology management experience including 21 years in cyber security. He has spoken on many cyber security topics at conferences around the world and has written many cyber security whitepapers. He is considered an expert on cyber security incident handling and Industrial Control System cyber security. His first employment was with a major minicomputer manufacturer in the 1980s. Additionally, Leonard was employed as a field support engineer for several biomedical systems manufacturers, an IT Manager in healthcare, as the CISO at a major financial institution, and a Enterprise Cyber Security Architect at a major electric utility. He is currently studying for a MS degree in Cybersecurity Technology from University of Maryland; with graduation schedule for December 2018. Leonard holds MBA degree from University of Phoenix, BA degree from University of Florida, Certified SCADA Security Architect from IACRB, and CISSP certification from ISC2 since 2003. Leonard currently serves as co-chair on a U.S. government-funded cyber security working group tackling major cyber security issues. He is an Instructor with the Minnesota Cyber Range hosted by Metropolitan State University in St. Paul and teaching cyber security courses at this same institution of higher learning.

Michael Knapp
Michael Knapp

Director of Sales Engineering Forcepoint

View

Michael Knapp
Bryan Christ
Bryan Christ

IAM Sales Engineer Hitachi ID

View

Bryan Christ
Heather Gantt-Evans
Heather Gantt-Evans

Senior Manager of Cyber Threat Management Ernst & Young, LLP

View

Heather Gantt-Evans

Heather is a CISSP-certified senior manager with a Masters in Technology Management in the Advisory Risk practice of Ernst & Young, LLP. She is a Subject Matter Expert for EY’s Cyber Threat Management competency with a focus on Cyber Exercises, Cyber Threat Intelligence (CTI) and Next-generation Security Operation Centers (SOCs). She specializes in the custom operationalization of intelligence but has the breadth and depth of experience to consult on a wide range of SOC and cyber security best practices, processes and challenges. She is most passionate about next-gen SOCs and leveraging cyber exercises, CTI, threat hunting, proactive fortification missions, analytics and robotic process automation to maximize security insights, increase productivity, decrease noise and improve defensive actions.

Todd Bursch
Todd Bursch

Manager, Solution Architects Forcepoint

View

Todd Bursch
Top