Richmond, VA

June 2nd - 3rd, 2016

Tag Archives: speakers

Keynote Feature: Wendy Nather

@RCISCwendy Retail Cyber Intelligence Sharing Center (R-CISC) Wendy Nather is Research Director at the Retail Cyber Intelligence Sharing Center (R-CISC), where she is responsible for advancing the state of resources and knowledge to help organizations defend their infrastructure from attackers. She was previously Research Director of the Information Security Practice at independent analyst firm 451 Research, covering the security industry […]

Speaker Feature: Andrea Matwyshyn @amatwyshyn Dr. Andrea M. Matwyshyn is a legal academic studying technology innovation and its policy implications, particularly corporate information security regulation and consumer privacy. She is currently a (tenured full) professor of law/professor of computer science (by courtesy) at Northeastern University, a faculty affiliate of the Center for Internet and Society at Stanford […]

Speaker Feature: Joey Peloquin

Joey Peloquin Joey Peloquin @jdpeloquin Joey has more than 20 years of experience in the information technology industry, specializing in information security for over 15 years. Prior to joining the Citrix Security team, he served as the director of professional services for GuidePoint Security, heading up the security assessments, application and mobile, and cloud […]

Speaker Feature: Inga Goddijn and Becky Swanson

Inga Goddijn & Becky Swanson @AnalogGirl11 & Risk Based Security / Markel Becky Swanson Becky Swanson Becky Swanson is the Managing Director of Miscellaneous E&O at Markel; this includes the Misc. Professional Liability, Information Technology Professional and Data Breach Liability coverage. She began her insurance career in 1996 and is an experienced miscellaneous […]

Speaker Feature: Caleb “chill” Crable & Evan “detro” Keiser

Caleb “chill” Crable & Evan “detro” Keiser @dirtywhitehat @detro Cylance Caleb is a Malware Analyst at Cylance, practicing dirtywhitehat, and frequent contributor to the information security community both online and at technology security events. Caleb enjoys long walks on the beach with polymorphic malware in his leisure. Evan also serves as a Malware Analyst at […]

Speaker Feature: Michelle Schafer and Tim Wilson

Michelle Schafer & Tim Wilson @mschafer Merritt Group Michelle Schafer is Senior Vice President and runs the cybersecurity team at Merritt Group, an integrated marketing and public relations firm based in the DC area. Over the past decade, Michelle has represented more than 50 security companies including BlackHat, CrowdStrike, Mandiant, Netwitness, Venafi, MACH37, PhishMe, (ISC)2, […]

Speaker Feature: Steve Christey

Steve Christey Steve Christey @sushidude MITRE Steve Christey Coley is a Principal Information Security Engineer in the Cyber Security Division at The MITRE Corporation, supporting FDA CDRH on medical device cyber security. Steve was co-creator and Editor of the CVE list and chair of the CVE Editorial Board from 1999 to 2015. He is […]

Speaker Feature: Dawn-Marie Hutchinson

Dawn-Marie Hutchinson Dawn-Marie Hutchinson @CISO_Advantage Optiv Dawn-Marie Hutchinson brings 15 years of enterprise information technology experience to her role as a senior consultant in the Office of the CISO at Optiv. She is an innovative business partner with extensive experience serving on Enterprise Risk Management teams. She is an expert in providing data privacy […]

Speaker Feature: David Sirrine

David Sirrine @dsirrine Red Hat, Inc. Dave is a career Open Source security advocate, evangelist, and problem solver. Working closely with the product and platform security teams at Red Hat, developing skills and knowledge of not just ensuring the Linux host is secured, but ensuring this level of security is maintained over time. Open Source […]

Speaker Feature: Rockie Brockway

Rockie Brockway Black Box Network Services Rockie Brockway serves Black Box as Information Security and Business Risk Director and Senior Engineering Director. With over two decades of experience in InfoSec/Risk, he specializes in Information Security Risk Management and the inherent relationship between assets, business system and process, adversary and threats. For the past 6 years […]