Elena Kvochko | Technology and Cyber Security Executive, SAP
Elena Kvochko serves as Chief Trust Officer at SAP. The Chief Trust Office team spans four continents enabling secure digital transformation of clients across global cloud products. Prior to this position, she served as Senior Vice-President and Technology Executive at Bank of America. Previously, she worked as a divisional Chief Information Officer at Barclays Bank. Her focus was on delivering the highest degree of privacy and security of customers and employees globally.
Elena served as an affiliate fellow at Harvard Law School and worked at the World Bank headquarters in Washington DC. Her published work appeared in Forbes, Harvard Business Review, featured in the Wall Street Journal, the White House cybersecurity report, The New York Times, and multiple industry media. She has invented patent-pending technologies in cybersecurity, privacy, and secure financial technologies. Throughout her career, she has been a strong advocate in national cybersecurity and technology diversity programs, and a lecturer and speaker at national and international Universities.
Eric Brown | Sr. Manager – Enterprise Identity & Access Management, SAIC
Eric Brown is the Sr. Manager of Enterprise Identity & Access Management at SAIC. With over twenty-five years of related experience in enterprise information systems and cybersecurity, Eric is responsible for the enterprises implementation, planning, and disaster recovery strategies related to the IAM systems at SAIC. Eric has led SAIC’s deployment of fully automated Identity Lifecycle Management, cutting edge MFA technologies, and successful integrations with hundreds of applications across the enterprise.
Prior to joining SAIC, Eric has had a dynamic career spanning multiple industries from automotive conglomerates and related financial system operations to agricultural import-export information and product management systems. Eric has earned many industry recognized certifications throughout his career, including (ISC)2’s Certified Information System Security Professional (CISSP®) and Certified Cloud Security Professional (CCSP®), which exemplify his commitment to excellence and mastery of his craft.
Meg Diaz | Director, Cisco Cloud Security Product Marketing, Cisco Systems
Meg Diaz is the leader of the Cisco Cloud Security product marketing organization at Cisco, where she is responsible for the go-to-market strategy and execution across multiple products. Meg has been in the security industry for more than 12 years, with experience in network, endpoint, cloud, and data security. She joined Cisco as part of the OpenDNS acquisition in 2015. Prior to OpenDNS, she worked at RSA, the Security Division of EMC in various roles. Diaz graduated with honors from Cornell University.
Bassam Al-Khalidi | Co-CEO, Axiad
Bassam Al-Khalidi has over 15 years of experience in designing and deploying identity and access management solutions across large government, enterprise, and healthcare organizations. He is a leading expert in CAC/PIV smart card and PKI deployment, and has been involved in multiple enterprise-class ID badge deployments over the last several years. He has held a variety of management and senior technical roles for established industry leaders, including ActivIdentity.
Diana Kelley | Principal, SecurityCurve
Diana Kelley’s security career spans over 30 years. She is Co-Founder and CTO of SecurityCurve and donates much of her time to volunteer work in the cybersecurity community, including serving on the ACM Ethics & Plagiarism Committee, as CTO and Board member at Sightline Security, Board member and Inclusion Working Group champion at WiCyS, Cybersecurity Committee Advisor at CompTIA, Advisory Council, Bartlett College of Science and Mathematics, Bridgewater State University, and RSAC US Program Committee. Diana produces the #MyCyberWhy series and is the host of BrightTALK’s The (Security) Balancing Act and co-host of the Your Everyday Cyber podcast. Diana is also a Principal Consulting Analyst at TechVision Research and a member of The Analyst Syndicate. She was the Cybersecurity Field CTO for Microsoft, Global Executive Security Advisor at IBM Security, GM at Symantec, VP at Burton Group (now Gartner), and a Manager at KPMG. She is a sought after keynote speaker, the co-author of the books Practical Cybersecurity Architecture and Cryptographic Libraries for Developers, has been a lecturer at Boston College's Masters program in cybersecurity, the EWF 2020 Executive of the Year, and one of Cybersecurity Ventures 100 Fascinating Females Fighting Cybercrime.
Kevin O'Brien | Co-Founder and CEO, GreatHorn
Kevin O’Brien is GreatHorn’s CEO and Co-Founder. Under Kevin’s leadership, GreatHorn has become the world’s leading next-generation email security company, analyzing billions of messages and stopping phishing attacks that targeta global customer base of organizations, both public and private.
Kevin brings deep industry experience, having been an early member of multiple successfully exited security companies, including CloudLock (Cisco), Conjur (CyberArk), and @stake (Symantec). In addition to his role at GreatHorn, Kevin serves as co-chair for the Mass Technology Leadership Council’s cybersecurity group and is a frequent speaker at key cloud cybersecurity and industry events. He has presented at the RSA Security Conference, Xconomy’s What’s Hot in Cybersecurity Conference, Microsoft’s Innovation Outreach Program, the MassTLC Cybersecurity Conference, and has been featured in TechCrunch, NPR Marketplace, Mashable, Forbes, CSO Magazine, and more.
Kristen Bell | Senior Manager of Application Security Engineering, GuidePoint Security
Kristen Bell is the Senior Manager of Application Security Engineering for GuidePoint Security. She has been in the Application Security industry for over 16 years, with prior experience as a developer. Before joining GuidePoint, she consulted for numerous companies performing application security services. Kristen’s background includes work in the government sector, building application security programs, and providing guidance in secure application design.
Kristen’s experience also includes conducting application security assessments and database security reviews, secure SDLC consulting, as well as working with clients to improve their enterprise vulnerability management. Her ability to bridge the gap between technical and non-technical people, coupled with her strong interpersonal skills, has made Kristen a strong champion for application security frameworks and controls for her customers.
Stephen Gates | Security Evangelist and Senior Solutions Specialist, Checkmarx
Stephen Gates brings more than 15 years of information security experience to his role at Checkmarx. He is a security SME with an extensive hands-on background in the deployment and implementation of on-premises, cloud-based, and AppSec security solutions, and is a well-known writer, blogger, presenter, and published author who is dedicated to conveying facts, figures, and information that brings awareness to the cybersecurity issues all organizations face.
John Trest | Chief Learning Officer, Inspired eLearning
John Trest is responsible for leading the development of Inspired eLearning’s award-winning library of content, from the solid instructional design to the high-quality multimedia production. He has been a member of Inspired’s team since 2009 and has over 19 years of experience in creating and delivering eLearning courses for a broad variety of industries and subjects. He’s passionate about creating quality eLearning content that is both engaging and impactful. In his off time, John loves spending time with his family, hiking, creating art, and writing.
Timothy Mullen | CIO, George Sink P.A.
Timothy Mullen is the CIO of George Sink, P.A., one of the largest law firms in the southeastern United States. Mullen is an award-winning speaker, security researcher, and author who has been featured at multiple global hacking events such as DefCon, BlackHat, HashDays, B-Sides, and many others. Named "Distinguished Speaker" by the NSA and United States Cyber Command for his research in covert side-channel data exfiltration, Mr. Mullen is also the best-selling author of Thor’s Microsoft Security Bible and the creator/author of the Stealing the Network cybercrime series. Additionally, and somewhat ironically, Mullen is also the author of Thor's OS Xodus: Why And How I Left Windows For OS X.
Timothy’s views and opinions on cybersecurity were shared to a multinational audience of Security Focus/The Register readers in his weekly MicrosoftSecurity articles, and has had his publicly developed security tools such as TGP Cloud Encryption and TSGrinder (the world’s first and only terminal-services brute force attack tool) featured in publications such as New Scientist Magazine and on TechTV.
Alex Au Yeung | Head of Product, Head of Product, Symantec Network Information Security Division, Symantec, a division of Broadcom
Alex Au Yeung leads product management and product marketing in the Symantec NIS division overseeing the DLP, CASB, CSPM & Compliance products, and driving them to a data-centric SASE future.
Fred Kwong | CISO, Delta Dental
Fred Kwong is currently the CISO for Delta Dental Plans Association. He is a highly recognized thought leader in security and is often asked to speak and chair at national/international security conferences. Fred serves on several advisory boards and is often asked to consult on matters of security and leadership. He currently holds the CISSP, CISA, CISM, PMP and CDPSE certifications.
He earned his Bachelor of Arts in psychology and professional communications, Master of Business Administration in management information systems from Roosevelt University, and holds his Doctorate in organization development from Benedictine University.
David Levine | VP Corporate and Information Security, CSO, CISM, Ricoh USA
David Levine is VP of Corporate and Information Security and CSO for digital services and information management provider, Ricoh USA, Inc. In this role, he oversees cyber and physical security, trade compliance, access management, eDiscovery and litigation support, select compliance functions and is routinely engaged in customer discussions on risk and security. In addition, Levine chairs Ricoh’s security advisory council and leads the company’s global security team. He has held a diverse variety of positions during his 26-year tenure with Ricoh, including IT engineering, project management, vendor management, Six Sigma, technology infrastructure and end-user services leadership, giving him a great perspective on technology, the business and security. Levine is part of Forrester Research’s security and risk leadership board and the FBI’s InfraGard program and is an Atlanta governing body co-chair with EVANTA. He holds a bachelor’s degree in information systems with minors in computer science and business from Eckerd College.
Brad Causey | CEO, Zero Day Consulting
Brad Causey is an active member of the security and forensics community worldwide. Brad tends to focus his time on Web Application security as it applies to global and enterprise arenas. He is a member of the OWASP Global Projects Committee and the President of the International Information Systems Forensics Association chapter in Alabama. Brad is an avid author and writer with hundreds of publications and several books. Brad also holds dozens of industry recognized certificates such as CISSP, MCSE, C|EH, CIFI, and CGSP.
Jeff Wilson | Analyst, Omdia
With more than 18 years of experience in the data networking and telecom industry and possessing one of the most accurate forecast track records in the business, Jeff Wilson has established and proven credentials in network security.
Jeff covers the complex interactions among products, traditional managed services, and SaaS; and is an expert in a wide variety of network security markets for appliances, software, and services, including IPSec and SSL VPNs, next-gen firewalls, IDS/IPS, NAC, UTM, DDoS mitigation, mobile infrastructure and device security, SCADA/ICS security, and content security.
A thought leader as well as a columnist for various publications in the network security space, Jeff is also frequently quoted in the trade and business press, including Bloomberg Businessweek, Forbes, InformationWeek, Investor's Business Daily, Internet Week, Light Reading, Network World, and The Wall Street Journal. He speaks at industry events, serves as moderator in webinars, and is a highly sought consultant to startups, service providers, manufacturers, and the investment community. He is also active in the financial community, educating venture capitalists and investment bankers about new markets and technologies while performing due diligence for funding.
As one of the earliest employees at Infonetics Research dating back to the company’s early garage days, Jeff helped build the company’s meticulous research methodologies and was a key driving force in the development of the firm’s many services, placing special emphasis on the exploration of new and emerging markets. Jeff graduated from the University of California in Berkeley in 1995, and has a Bachelor of Arts degree in English.
Ted Wagner | VP & CISO, SAP National Security Services
Ted Wagner is the Vice President and Chief Information Security Officer for SAP National Security Services (SAP NS2). SAP is the world’s leading provider of business software solutions, and NS2 provides industry-focused services for the U.S. national security and critical infrastructure markets.
Ted joined SAP National Security Services in March 2015. He is responsible for the security and compliance of the corporate network, sharing best practices with customers and oversight of NS2’s FedRAMP and Commercial Cloud offerings. He was previously the CISO for TASC. He supported the Army’s CERT for nine years as a project manager for Northrop Grumman. He was responsible for the Incident Response, Forensic and Malware Analysis support to Army Cyber Command and 1st IO Command.
Ted has led cyber teams employing tactical to strategic capabilities. His experience includes completing the certification and accreditation process for agency level programs, including developing curriculum for the Computer Network Operations planner course and establishing a team validation process for deploying cyber teams.
Ted served 30 years in the U.S. Army as a Field Artillery officer. He retired from the Army Reserves as a Colonel, his last position was the Deputy Chief of Staff, G6, 80th Training Command (TASS). He is an adjunct professor at University of Maryland University College, teaching Cyber Policy, and a guest lecturer at MIT. Ted serves as an Advisory Board Member to the Geospatial Data Center and is published in the book, Cyber Infrastructure Protection, Strategic Studies Institute. He graduated from the Virginia Military Institute with a BA in economics and holds a MA in economics from Virginia Polytechnic Institute and State University. His certifications include CISSP, ISSMP, CISM and CRISC.
John Pironti | President, IP Architects
John P. Pironti is the President of IP Architects, LLC. He has designed and implemented enterprise wide electronic business solutions, information security and risk management strategy and programs, enterprise resiliency capabilities, and threat and vulnerability management solutions for key customers in a range of industries, including financial services, insurance, energy, government, hospitality, aerospace, healthcare, pharmaceuticals, media and entertainment, and information technology on a global scale for over 25 years.