Please register for each session that you plan to attend.
The registration link is included in the description of the session.
Details to access each of the sessions that you register for will be sent to the email address provided during registration.

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Breakout [clear filter]
Thursday, July 23

9:30am EDT

ARMIS - Agentless Device Security
Register for this session HERE​​​

The exponential increase in the number of unmanaged and IoT devices connected to enterprise networks provide an ever-expanding attack surface for malicious actors to exploit in order to disrupt production, impact patient care, or inflict financial loss.  What is the best way to keep your enterprise safe from these attacks?

Join this discussion to learn:
  • Examples of unmanaged and IoT devices that can’t be protected by traditional systems
  • Challenges associated with traditional security systems and methods
  • How Armis can help protect your unmanaged and IoT devices from cyber attack

avatar for Ryan Aleman

Ryan Aleman

Solution Architect, Armis
Ryan Aleman is a Director of Solutions Architecture at Armis. As a Director of Solutions Architecture at Armis, Ryan is at the forefront of the developing landscape of unagentable devices. With an extensive background in security and technical environment management, Ryan has worked... Read More →


Thursday July 23, 2020 9:30am - 10:20am EDT
GoToWebinar Room D

9:30am EDT

Bitglass - Secure Access Services Edge (SASE) - A Comprehensive Security Solution for Digital Transformation
Register for this session HERE

Secure Access Services Edge (SASE) - A Comprehensive Security Solution for Digital Transformation

With the rise of the remote workforce we continue to see data move off premise and beyond conventional tools like firewalls, and enterprises need to think differently to identify how to best secure it. Secure Access Service Edge (SASE) is an emerging concept that consolidates many security solutions into a single safe cloud environment that is fully integrated into the network, designed to protect data wherever it goes

avatar for Ben McGucken

Ben McGucken

AVP, South US & LATAM, Bitglass
As AVP of Sales at Bitglass, Ben McGucken leads Bitglass' US Southeastern, LATAM and US Federal sales teams.  Ben has more than  twenty years of experience leading sales and system engineering teams in IT security and network communications.  Prior to Bitglass, Ben held sales and... Read More →

Thursday July 23, 2020 9:30am - 10:20am EDT
GoToWebinar Room B

9:30am EDT

Netwrix - Calculating ROI for Security: Why This Is So Difficult? Do You Need IT?
Register for this session HERE​​​

The ongoing stream of data leaks and other breaches of consumer trust is a top concern for executives at organizations around the world. To make sound decisions about cybersecurity strategy, especially during challenging times like these, when budgets are tight, they need accurate assessments of the effectiveness of proposed security investments. However, providing those estimates of ROI can be extremely difficult for CISOs, who often struggle to quantify the expected impact of security measures.
Join us for this educational session to learn the 4 key benefits of a security investment — and how to effectively communicate the associated value to senior decision makers. Armed with this information, you will be well positioned to convince them to make cybersecurity investments right now.

avatar for Ilia Sotnikov

Ilia Sotnikov

Vice President of Product Management, Netwrix Corporation
Ilia Sotnikov is responsible for Netwrix product vision and strategy. He has over 15 years of experience in IT management software market. Prior to joining Netwrix in 2013, he was managing SharePoint solutions at Quest Software (later acquired by Dell).

Thursday July 23, 2020 9:30am - 10:20am EDT
GoToWebinar Room C

9:30am EDT

TCDI – Not All Pen Tests are Created Equal: Choosing the Right Vulnerability Management Program for Your Organization
Register for this session HERE​​​

A robust vulnerability management program should be an essential part of every organization’s cybersecurity strategy. Having one in place allows IT departments to identify and remediate vulnerabilities before they can be discovered and exploited by cybercriminals. As with many things, getting an apples to oranges comparison between third-party vendors and their service offerings can be difficult, and not every pen test is created equal. 
Join us for this critical discussion where cybersecurity and penetration testing experts from TCDI discuss how to choose the right pen test for your organization, the pitfalls of only conducting automated vulnerability scans, and how to separate the apples from the oranges during vendor selection. 
• Choosing the Right Type of Pen Test 
• Why Vulnerability Scans Alone Don’t Make the Cut 
• Building Out a Holistic Vulnerability Management Program 
• Identifying Red Flags When Selecting Your Third-Party Vendor 

avatar for Eric Vanderburg

Eric Vanderburg

Vice President, Cybersecurity, TCDI
Eric Vanderburg is considered a thought leader in the industry and is a continual learner who has earned over 40 technology and security certifications. He is the author of several books and he frequently writes articles for magazines, journals, and other publications.Eric regularly... Read More →
avatar for Bogdan Salamakha

Bogdan Salamakha

Senior Cybersecurity Engineer, TCDI
Bogdan Salamakha is an experienced cybersecurity professional who helps protect companies from cyber threats, comply with regulations, test security controls, and gain assurance in their information security. He serves as a cybersecurity subject matter expert in penetration testing... Read More →
avatar for Christopher Kolezynski

Christopher Kolezynski

Cybersecurity Engineer, TCDI
Chris Kolezynski is a Certified Ethical Hacker and licensed attorney in the state of Ohio. This combination of technical and legal expertise makes him uniquely qualified to assist organizations in protecting the confidentiality and integrity of their critical systems. Chris serves... Read More →


Thursday July 23, 2020 9:30am - 10:20am EDT
GoToWebinar Room A

10:30am EDT

Mary Siero, President, Innovative IT, ”CIS Controls Framework and Resources Overview"
Register for this session HERE​​​

Session Title: CIS Controls Framework and Resources Overview

In 2015 the Center for Internet Security (CIS) assumed management and maintenance for the SANS Top 20 Critical Security Controls and renamed them the Critical Security Controls for Effective Cyber Defense. The CIS controls were developed and enhanced over the years by industry experts and the US military and other government entities. They represent a risk-based and prioritized approach to cyber security. The controls lay out the consensus from respected industry experts as to the best way to block known attacks and the recommended approaches to find and mitigate damages resulting from successful attacks.

In 2018 CIS supplemented these controls by providing the CIS Risk Assessment Methodology (RAM) based on implementation of these controls. Additional focus areas provided by CIS include the applicability of these controls to Internet of Things (IoT), Mobile technologies, the Cloud and Privacy.

Please join us at this session to learn about the CIS Controls Framework and how you can use it along with the other resources available through CIS to improve the Cybersecurity posture at your organization.

avatar for Mary Siero, CISSP, CCSP, CISM, CRISC, ITILV3


President, Innovative IT
Mary G. Siero, CISSP, CCSP, CISM, CRISC, ITILV3Mary Siero is an executive level Information Technology Consultant and the President of Innovative IT, a leading North Carolina based information technology consulting firm that specializes in IT operational, compliance and security consulting... Read More →

Thursday July 23, 2020 10:30am - 11:20am EDT
GoToWebinar Room D

10:30am EDT

Mike Muscatell, Senior Manager Security, Krispy Kreme “’ToR of the WiLD SiD3 of the Internet-Dark Web, Deep Web and Dark Net"
Register for this session HERE​​​

We always hear about the “Dark Web” and how various services advertise the use of such a resource but what does that mean? Better yet, what does it look like. This will be a full LIVE presentation demonstrating where “various” type of activity i.e. personal identifiable information, transaction information and other related content reside.

avatar for Mike Muscatell

Mike Muscatell

Senior Security Manager, Krispy Kreme
Mike Muscatell is a seasoned IT veteran with more than 25 years in the Information Security field. He is an Offensive Security Professional and a Certified Ethical Hacker. Was honored as top 100 professionals in the Information Security Field by Strathmore's Whos Who. Member of a... Read More →

Thursday July 23, 2020 10:30am - 11:20am EDT
GoToWebinar Room B

10:30am EDT

Phillip Kerr – Manager of Information Security, Market America “Open Source Security”

avatar for Phillip Kerr

Phillip Kerr

Information Security Manager, Market America
Phillip Kerr - Information Security Manager, Market America Experienced Information Security Analyst, Manager, Assessor and Senior Network Engineer with a demonstrated history of working in the Retail Government (DoD) and Information Technology and Services Industry. Skilled in Security... Read More →

Thursday July 23, 2020 10:30am - 11:20am EDT
GoToWebinar Room A

10:30am EDT

Rich Castor, Sr Enterprise PCI Specialist, National General Insurance “PCI Basics: Scoping & Network Segmentation”
Register for this session HERE​​​

Organizations often struggle to understand where the controls outlined in the PCI DSS are required. Proper scoping is the first step in determining which systems must be protected. Most organizations then try to reduce the scope wherever possible in an effort to reduce cost, complexity and risk. This Speaking Session will touch on two main topics; how to properly identify in-scope system components, and ways organizations can potentially reduce the scope of their PCI environments.

avatar for Rich Castor

Rich Castor

Senior Enterprise PCI Specialist, National General Insurance
Richard Castor, Senior Enterprise PCI Specialist. Level 1 MerchantPCI isn't an acronym for Popcorn, Cake, Ice cream. That is, until your company becomes compliant and maintains compliance. Richard is a Senior Enterprise PCI Specialist for a Level 1 Merchant headquartered in NYC, National... Read More →

Thursday July 23, 2020 10:30am - 11:20am EDT
GoToWebinar Room C

1:00pm EDT

Dr. Scott Toth, Information Security Officer, Security, Privacy & Compliance Manager, Global Digital Solutions & IT, Volvo Financial Services “Privacy & Security for the Modern Era”
Register for this session HERE

So often we think of security as a technical problem that is meant to be solved by new hardware appliances or innovative software packages; however, enabling good security is a broad endeavor that involves everyone in an organization in many different ways. Given the spate of new laws in different states and countries around the world, and considering the various privacy regulations that can have an impact on the development of a security program, we will explore those and other factors that can influence a company’s ability to change and adapt to the current business climate and maintain a strong security posture.

Scott Toth, the Global Enterprise and Cyber Security Manager at Volvo Financial Services, will explain many of the drivers that shape a security and privacy program, discuss key relationships throughout the business that can have a positive impact on a program’s effectiveness, and relate IT-specific security and privacy challenges that will evolve as companies continue to transition to cloud-based services in a global business environment.

avatar for Dr. Scott Toth, CISSP, CCSP

Dr. Scott Toth, CISSP, CCSP

Information Security Officer, Volvo Financial Services
Dr. Scott Toth, CISSP, CCSP is a resident of Greensboro, North Carolina and has over 13 years of information security experience in infrastructure, operations, architecture, governance and management. Scott is the Information Security Officer and head of security and privacy for Volvo... Read More →

Thursday July 23, 2020 1:00pm - 1:50pm EDT
GoToWebinar Room A

1:00pm EDT

Gary Sheehan, Director of Information Security, Elon University “Security Metrics, Not the Same Old Blah, Blah, Blah…"
Register for this session HERE

"Security Metrics: Not the Same Old Blah, Blah, Blah...."

avatar for Gary Sheehan, CISSP, CERP, CIS LI, CTPRP


Director of Information Security, Elon University
Gary Sheehan, CISSP, CERP, CIS LI, CTPRP, and Information Security Director at Elon UniversityInformation Security Expert / GRC Expert - Vendor / Supplier / Third-Party Risk Management Expert.CISSP, CERP, CTPRP and ISO 27001 Lead Implementer certified security professional focused... Read More →

Thursday July 23, 2020 1:00pm - 1:50pm EDT
GoToWebinar Room D

1:00pm EDT

Jeff Hoge, Information Security Engineer, Panel Discussion: “Career Advancement in Cybersecurity”
In this session, we will have a roundtable discussion with several information security leaders & veterans to speak about career advancement in cybersecurity.

The following questions will be addressed, and more:
  • How would someone move into cybersecurity as an entry-level IT role?
  • How would someone with experience in a particular IT discipline make the career change into cybersecurity? 
  • If possible, speak a bit about your own career path. How did you build your career to get where you are now? 
  • What traits, behaviors, and skillsets would you look for in a candidate?
  • What steps should one take to position themselves to have an edge in this field?
  • What are you reading/listening to/studying on that helps you stay sharp in your career?
  • The annoying question we must always ask: What keeps you up at night?

Panel guests:
  • Jason Cox // CISO at Elevate Textiles
  • Lori Cole // Security Operations Manager at Hanesbrands
  • Andrew Ramos // Director of IT and HIPAA Security Official at MedCost (tentative)
  • Courtney Leavitt // Senior Information Security Analyst at USAA
  • Andrew Travis // Information Security Officer at Radford University
  • Jonathan Cole // Senior Security Engineer at Inmar

Jeff Hoge serves as the Information Security Engineer at MedCost, a benefit solutions company based in Winston-Salem, NC. He has been in IT for the last 17 years, and though he has worked in a specific cybersecurity role for the last 4 years, security has been a major focus for his entire career. Jeff's "fictional heroes" are Curious George and Bruce Wayne -- for their curiosity and detective skills.

Register for this session HERE

avatar for Lori Cole

Lori Cole

Security Operations Manager, Hanesbrands
avatar for Jonathan Cole

Jonathan Cole

Senior Security Engineer, Inmar
avatar for Jason Cox

Jason Cox

CISO, Elevate Textiles
avatar for Courtney Leavitt

Courtney Leavitt

Senior Information Security Analyst, USAA
avatar for Andrew Ramos

Andrew Ramos

Director of IT and HIPAA Security Official, MedCost
avatar for Andrew Travis

Andrew Travis

Information Security Officer, Radford University

avatar for Jeff Hoge

Jeff Hoge

Information Security Engineer, MedCost
Jeff has been working in the IT field for 17 years, with his primary background being in security, networking and systems administration. He has several industry certifications such as CISSP and is serving as the Vice-President of the Triad of NC ISSA chapter. Located in the Winston-Salem... Read More →

Thursday July 23, 2020 1:00pm - 1:50pm EDT
GoToWebinar Room C

1:00pm EDT

Panel Discussion - Closing The Inclusion & Diversity Gap In Info Sec
Register for this session HERE

Inclusion & Diversity Panel Discussion
  1. How have you advocated for change and some of the successes and challenges you’ve faced?
  2. What is the one thing you do to make your company more inclusive and diverse?
  3. Does your company have an I/D strategy?
  4. What are the benefits?
  5. What are the barriers to employees with a diverse background?
  6. Who has employee resource groups in their org?
  7. What can the audience walk away with today that is tangible and you can start doing in your organization tomorrow to make change?

avatar for Nia Luckey

Nia Luckey

Security Operations Manager, Cisco
Nia Luckey is a true innovator. She doesn't see obstacles but rather opportunities for growth, improvement, and alignment. As an industry leader, she has established two 501c3 affiliate chapters in her local area of North Carolina. The Information Systems Security Association of Fayetteville... Read More →
avatar for Noureen Njoroge

Noureen Njoroge

Security Threat Intel Engineer at Cisco Systems, Cisco
Noureen Njoroge is a passionate Cybersecurity specialist, a global keynote speaker, award winner of Cisco 2019 Cybersecurity Champion and is listed among the Top 30 Most Admired Minority Professionals in Cybersecurity by SeQure World Magazine, UK. She currently works at Cisco Systems... Read More →
avatar for William Ogle

William Ogle

Manager of Cyber Security, EY
Dynamic professional engaged with enterprise transformation and increasing consumer privacy & security. Build strategies to forward organizational productivity through defined governance, risk and compliance goals. Unique skill sets to help aid the enterprise needs to understand the... Read More →
avatar for Mansi Thakar

Mansi Thakar

Chief Operating Officer of Cyberjutsu, Women's Society of Cyberjutsu
Mansi Thakar is the Chief Operating Officer and has over 5 years of experience leading national nonprofits. She has a flair for sustainable innovative ideas and a history of implementing them successfully. With an undergraduate degree in chemistry, Thakar decided to get a cyber security... Read More →
avatar for Terry West

Terry West

Regional Inclusion & Diversity Manager - Midwest, TEKsystems
Terry is a proven business leader with more than 20 years of experience in the world of inclusion and diversity, management, talent acquisition and business development. He has been with TEKsystems for twenty-two years and is currently the Regional Inclusion & Diversity Manager... Read More →


Thursday July 23, 2020 1:00pm - 1:50pm EDT
GoToWebinar Room E

1:00pm EDT

Tara Hunter, Sr Cloud Security Engineer, IT Security, Brighthouse Financial “Automation & Cloud – Demo of a Cloud Security Set up”

avatar for Tara Hunter, CISSP, CCSP

Tara Hunter, CISSP, CCSP

Senior Cloud Security Engineer, IT Security, Brighthouse Financial
Tara Hunter received her degree in Computer Science from the University of North Carolina at Charlotte and since then she has developed more than a decade long career in the Information and Cyber Security space. During this time, she has had the opportunity to work for a variety of... Read More →

Thursday July 23, 2020 1:00pm - 1:50pm EDT
GoToWebinar Room B
Filter sessions
Apply filters to sessions.