• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Student360
  • About
    • Secure360
    • UMSA
  • Secure360 2022
  • For Sponsors
  • For Speakers
  • Get Involved
  • Blog
  • Nav Social Menu

    • Facebook
    • LinkedIn
    • Twitter
    • Vimeo

Secure360

Speakers

Conference Schedule Navigation:

  • Browse by Speaker

Focus:

BCD (Business Continuity & Disaster Recovery) | Cybersecurity | GRC (Governance, Risk & Compliance) | Physical Security | Professional Development | Soft Skills

Type in a specific name or terms to filter:
  • Aaron Wampach
    • Security Awareness... Much Ado About Nothing (05/17/16 — 1:30 PM)
    • This Fog is really DeNSE (05/17/16 — 3:00 PM)
  • Adam Brand
    • Medical Devices: Pwnage and Honeypots (05/18/16 — 3:00 PM)
  • Adam Harpool
    • Minimizing Fraud Exposure Through ERP SODs (05/18/16 — 1:30 PM)
  • Andrew Plato
    • Insider Threat: Building a Multi-Generational Security Program (05/17/16 — 11:00 AM)
    • Security Vision: Inspiring People to Embrace Security (05/17/16 — 1:30 PM)
  • Barry Caplin
    • The Dreaded Embedded (05/17/16 — 9:45 AM)
  • Blair Semple
    • Encryption Best Practices (05/18/16 — 1:30 PM)
  • Bob Tahmaseb
    • Stay One Step Ahead Without Compromising Security (05/18/16 — 9:45 AM)
  • Bradley Ammerman and Tyler Burban
    • {Sold Out} Hands-on Introduction to Network Pentesting (05/16/16 — 8:00 AM)
    • Introduction to Network Pentesting (Presentation part ONLY) (05/16/16 — 8:00 AM)
  • Brandon Cook
    • Extending Data Protection/Compliance to O365 (05/17/16 — 11:00 AM)
    • Creating a Control Point for the Cloud to Centralize Security in a De-Centralized World (05/18/16 — 3:00 PM)
  • Brett Gravois
    • How Low and Medium Vulnerabilities Can Own Your Site (05/17/16 — 9:45 AM)
  • Brian Krebs
    • Keynote: "Lessons from the Underground" with Brian Krebs (05/17/16 — 8:00 AM)
  • Bryan Strawser
    • Global Risk: Strategies for Uncertain Times (05/18/16 — 3:00 PM)
    • Holy $#@! 60 Minutes is Outside! (05/18/16 — 1:30 PM)
  • Chad Nordstrom
    • Inside an Email Phishing Attack (05/17/16 — 4:15 PM)
  • Chris Hernandez
    • Modern Exploit Mitigation Bypass Techniques (05/17/16 — 1:30 PM)
    • Improving Security with Adversary Simulation (05/17/16 — 3:00 PM)
  • Dan Lyon
    • Cybercrime Targets Medical: Motivations and Attacks (05/18/16 — 11:00 AM)
  • Daniel Yang
    • Click-jacking: Old Dogs, Cheap Tricks and Easy Fixes (05/18/16 — 11:00 AM)
  • Derek Ardolf
    • Why Learn PowerShell? Examples of Awesome (05/18/16 — 4:15 PM)
  • Derek Dahlen
    • How to Steal a Billion Dollars (05/17/16 — 11:00 AM)
  • Deviant Ollam
    • The Search for the Perfect Door (05/17/16 — 9:30 AM)
    • Lock Picking Demo (05/17/16 — 2:40 PM)
  • Douglas Hubbard
    • How to Measure Anything in Cybersecurity Risk (05/17/16 — 9:30 AM)
    • How to Measure Anything in Cybersecurity Risk (05/17/16 — 1:30 PM)
  • Emily Duke
    • Convergence of Law, Risk and IT Governance: Part 1 (05/17/16 — 3:00 PM)
    • Convergence of Law, Risk and IT Governance: Part 2 (05/17/16 — 4:15 PM)
  • Eric Sun
    • Attack Chain Lessons: Bolster Your IR Program (05/18/16 — 11:00 AM)
  • Erin Warhol
    • Building a Vendor Risk Management Program (05/18/16 — 3:00 PM)
  • Frank Catucci
    • Click-jacking: Old Dogs, Cheap Tricks and Easy Fixes (05/18/16 — 11:00 AM)
  • Fred Klapetzky
    • Business Continuity, Patient Safety and Emergency Management for Healthcare (05/17/16 — 4:15 PM)
  • Geno Pandolfi
    • Ensuring Organizational and Enterprise Resiliency With Third Parties (05/17/16 — 1:30 PM)
  • Geoff Glave
    • Hedging Your Bets: A Layered Approach to Security (05/18/16 — 1:30 PM)
  • Greg Gurevich
    • Leveraging User Behavior Analytics for Inside-out Attacks (05/17/16 — 3:00 PM)
  • Harry Regan
    • It Can Always Get Worse (05/17/16 — 9:45 AM)
  • Heidi Piche
    • Attacking the BIA: Using A Proven and Effective Process (05/18/16 — 9:45 AM)
  • James Lukaszewski
    • Crisis Proofing Your Organization (05/18/16 — 4:15 PM)
  • Jay Schulman
    • Building Your Career in Security (05/17/16 — 1:30 PM)
  • Jeff Hall
    • Compliance Does Equal Security (05/18/16 — 3:00 PM)
  • Jeff Purrington
    • Minimizing Fraud Exposure Through ERP SODs (05/18/16 — 1:30 PM)
  • Jeff Wells
    • Changing the Security Paradigm (05/18/16 — 4:15 PM)
  • Jeff Williams
    • What?! My Security Tools Don't Work on APIs? (05/18/16 — 1:30 PM)
    • Continuous Application Security at Scale with IAST and RASP (05/17/16 — 3:00 PM)
  • Jeremy Wittkop
    • The Future of Data Loss Prevention (05/18/16 — 9:45 AM)
  • Jodi Schaubschlager
    • Engaging Employees as Security Partners (05/18/16 — 4:15 PM)
  • Joe Sturonas
    • Encryption Doesn't Always Protect Your Data (05/17/16 — 4:15 PM)
  • John Beeskow
    • CISO Reboot (05/17/16 — 4:15 PM)
  • John Grimm
    • What Yesterday’s PKI Can Teach Us About Tomorrow’s Internet of Things (05/17/16 — 4:15 PM)
  • Jon Heimerl
    • Hacking the Person: Social Engineering/Phishing (05/17/16 — 3:00 PM)
  • Josh Bressers
    • Securing the Open Source Supply Chain (05/17/16 — 11:00 AM)
  • Joshua Mau
    • Leveraging Adaptive Authentication and Biometrics (05/18/16 — 4:15 PM)
  • Keith Burkhardt
    • Convergence of Law, Risk and IT Governance: Part 1 (05/17/16 — 3:00 PM)
    • Convergence of Law, Risk and IT Governance: Part 2 (05/17/16 — 4:15 PM)
  • Ken Shaurette
    • Surviving the Mock Disaster: Building Effective Tabletop Exercises (05/17/16 — 11:00 AM)
    • Regulation Roadmap of Behavior Analysis - Cyber Intelligence with UDAPE® (05/17/16 — 9:45 AM)
  • Kit Welchlin
    • STP: Stress, Time and Procrastination Management (05/18/16 — 9:30 AM)
  • Kris Edinger & Mark Feil
    • Resiliency Challenge - Carrier Hotels (05/18/16 — 11:00 AM)
  • Laura Pigott
    • Engaging Employees as Security Partners (05/18/16 — 4:15 PM)
  • Louise Popyk
    • Six Steps to Securing Privileged Access for Outsourced IT (05/17/16 — 1:30 PM)
  • Marcus J. Ranum
    • Establishing and Building a Security Metrics Program (05/18/16 — 1:30 PM)
  • Marie Strawser and Scott Mulert
    • Sharing a Proven Tabletop Exercise Format and Scenarios (05/17/16 — 3:00 PM)
  • Matt DeMatteo
    • The Battle for Your Endpoints (05/18/16 — 1:30 PM)
  • Matt Hynes
    • Adopting Economic Driven Security (05/17/16 — 9:45 AM)
  • Melissa Harrison
    • Building Your Professional Network Through Social Media (05/18/16 — 3:00 PM)
  • Michael Bacon
    • Leadership in Today's All Risk Environment (05/18/16 — 4:15 PM)
  • Michael Belton
    • Your Technical Defense Strategy is False (05/18/16 — 9:45 AM)
  • Michael Rogers
    • Getting the Job, Building a Career (05/18/16 — 1:30 PM)
  • Michael Sutton
    • Next Generation CISO: Everything a Modern CISO Needs to Know But is Afraid to Ask (05/17/16 — 9:45 AM)
  • Michael Tierney
    • Protecting Your Data When an Employee Leaves the Company (05/18/16 — 9:45 AM)
  • Micheal Moshiri
    • The Rise of Ransomware: Three Critical Steps To Prevent An Outbreak In Your Organization (05/17/16 — 11:00 AM)
  • Mike Vizzi
    • Forensic Residue: The Missing Link in Information Security (05/18/16 — 4:15 PM)
  • Miles Brissette
    • Social Media and Security Operations (05/18/16 — 11:00 AM)
  • Natalie Vanatta
    • Cyber Glossolalia (05/18/16 — 4:15 PM)
    • Recruit and Retain Your Cybersecurity Workforce (05/18/16 — 11:00 AM)
  • Patrick Kerpan
    • Protecting Vital Data With NIST Framework (05/18/16 — 11:00 AM)
    • Let's Rethink Cloud Application Security in 2016 (05/18/16 — 1:30 PM)
  • Perry Hemmingsen
    • Security Awareness... Much Ado About Nothing (05/17/16 — 1:30 PM)
    • This Fog is really DeNSE (05/17/16 — 3:00 PM)
  • Ryan Manship
    • Are you RedTeam Secure? (05/17/16 — 9:45 AM)
  • SA Lizabeth Lehrkamp
    • What You Don’t Know About White Collar Crime (05/17/16 — 4:15 PM)
  • Scott Erven
    • Medical Devices: Pwnage and Honeypots (05/18/16 — 3:00 PM)
  • Scott Sieracki
    • Mitigating Threats via IT-centric Access Control (05/17/16 — 11:00 AM)
  • Sean Harrington
    • Closing the Gap: Information Security and Legal (05/16/16 — 8:00 AM)
  • Seth Corder & Brian Brush
    • Hack to the Basics - Attack and Defend Demo (05/17/16 — 11:00 AM)
    • Hack to the Basics – Attack and Defend Demo (05/17/16 — 1:30 PM)
    • Hack to the Basics – Attack and Defend Demo (05/18/16 — 9:45 AM)
  • Shannon Lietz
    • The End of Security as We Know It… (05/17/16 — 1:30 PM)
  • Shaun Kelly
    • What Time is It? Securing NTP (05/18/16 — 3:00 PM)
  • Steve Currie
    • Adopting Economic Driven Security (05/17/16 — 9:45 AM)
  • Steve Surfaro
    • Social Media and Security Operations (05/18/16 — 11:00 AM)
  • Tennelle Anderson
    • From Scavenger Hunt to Competitive Advantage (05/17/16 — 11:00 AM)
  • The Keynote Panel
    • Partners in Planning: How Government and the Private Sector Work Together to Plan Major Events (05/18/16 — 8:00 AM)
  • Thomas Cocchiarella
    • How to Plan your Career Development (05/18/16 — 9:45 AM)
  • Tim Arvanites
    • Gone Phishing: Cut the Line When Employees Get Hooked (05/17/16 — 3:00 PM)
  • Tim White
    • Take the Guesswork Out of Vulnerability Remediation With Qualys ThreatPROTECT (05/18/16 — 11:00 AM)
  • Todd Bursch
    • Building a Successful Program to Keep Insider Threats at Bay (05/18/16 — 3:00 PM)
  • Travis Kaun
    • crEAP - Harvesting Enterprise Wireless Users (05/17/16 — 3:00 PM)
  • Tyson Macauley
    • Securing the Internet of Things (05/18/16 — 9:45 AM)
  • Valerie Thomas
    • It Can Always Get Worse (05/17/16 — 9:45 AM)
  • Yan Kravchenko
    • The DIY Approach to Risk Assessments (05/17/16 — 4:15 PM)

Primary Sidebar

2016 Schedule

Monday, May 16 Pre-Conference

NOTE: Regular conference registration does not include Monday, May 16. Additional fees required.

7:30 a.m.  Registration
8:00 a.m.  Pre-Conference Full-Day Workshops Begin
12:00 p.m. – 1:00 p.m.  Lunch for Full Day Pre-Conference Sessions ONLY

Tuesday, May 17

7:00 a.m.  Registration and Morning Refreshments
8:00 a.m.  Keynote
9:30 a.m. – 12:00 p.m. Educational Sessions
12:00 p.m.  Lunch
1:30 p.m. – 5:00 p.m. Educational Sessions
5:00 p.m.  Networking Reception

Wednesday, May 18

7:00 a.m.  Registration and Morning Refreshments
8:00 a.m..  Keynote Panel Discussion and Student Awards Ceremony
9:30 a.m. – 12:00 p.m Educational Sessions
12:00 p.m.  Lunch
1:30 p.m. – 5:00 p.m. Educational Sessions
5:00 p.m.  Conference Closes

Footer

Contact

For more information about UMSA events, contact: Marie Strawser

Email List Signup

Join our email list for monthly Secure360 news and updates!




Join our tradeshow email list for updates on sponsorship opportunities and upcoming exhibitor deadlines.

Sponsored by:
© 2022 Secure360. All rights reserved.