2014 Speakers

eric speaker - 2014 Speakers

Eric Svetcov

Eric is currently the CSO at MedeAnalytics, a leading Cloud Computing company delivering services for the healthcare system (including hospitals, physician practices, and payers). He has extensive experience working in operations and information security for Cloud Computing companies, including taking Salesforce.com through ISO 27001 certification during his 2 year stint as Information Security Director and running operations for two other Cloud Computing companies, Netfile and Grassroots Enterprise.

juan speaker 2 - 2014 Speakers

Juan Gomez-Sanchez

Mr. Gomez-Sanchez has over 16 years of Information Security experience. He has focused his entire professional life to pursue excellence in the field of Information Security. Juan Gomez-Sanchez, has been tasked throughout his career with building and managing world-class, enterprise security organizations. His keen perspective of security as a business enabler has allowed Juan to deliver high performance solutions and organization to address large and complex security challenges. He has led such initiatives in organizations like Delta AirLines, CheckFree Corporation (now and division of Fiserv) and Cybertrust (now Verizon Business).

jason s speaker 2 - 2014 Speakers

Jason Smolanoff

Jason N. Smolanoff is a Vice President in Stroz Friedberg’s Los Angeles office. Mr. Smolanoff is responsible for managing numerous digital forensic, Internet investigate & electric discovery assignments for Fortune 500 companies, major law firms, cleared defense contractors, government agencies, corporate management & information systems departments in criminal, civil, regulatory & internal corporate matters, including matters involving data breach, leaks of confidential information, theft of trade secrets, & copyright & trademark infringement.

j scrimsher speaker - 2014 Speakers

John Scrimsher

John Scrimsher brings 20 years of experience developing and managing security solutions for large and small corporations to Damballa. Most recently, Scrimsher was the Director of Technical Security for Oracle Corp. where he led the development of secure corporate IT solutions for malware protection, compliance, mobility and more. Working in coordination with Privacy and Legal officials, as well as peer business organizations, Scrimsher has driven the improvement of security at all layers within the organization. Previously, Scrimsher has also led Global IT Security Engineering teams for Hewlett-Packard and has been named on multiple patented vulnerability management solutions.

j treinan speaker - 2014 Speakers

James J. Treinen

A security industry veteran of 15 years, James leads the ProtectWise research team and is responsible for the management and leveraging of threat intelligence. He is an expert on data analysis as it pertains to enterprise security and holds multiple patents and has authored numerous publications related to data analytics for large security-related data sets. James led the data analysis efforts for IBM Security Intelligence and the development of numerous security related software products. Jim holds a Ph.D. and M.S. in Computer Science from the University of Denver and received a B.S. in Computer Science and Mathematics from Regis University

Ed Adams cciso 150x150 - 2014 Speakers

Ed Adams

Mr. Adams is a software executive with over 20 years of leadership experience in various-sized organizations that serve the IT security and software quality assurance industries. He is a Ponemon Institute Fellow and sits on the board of the National Association of Information Security Groups (NAISG), and the International Secure Software Engineering Council (ISSECO). In February of 2014, Mr. Adams was named a Privacy by Design Ambassador, which is a group of privacy thought-leaders committed to ensuring the ongoing protection of personal information.

Chuck Deaton - 2014 Speakers

Chuck Deaton

Chuck Deaton is the Director of Enterprise Information Security (EIS) for Humana Inc. and has been with the company for over 13 years. The EIS program is focused on information protection policies, standards, training and awareness; governance and compliance; assurance; technical security infrastructure architecture; security solutions and technology ownership; risk management; threat and vulnerability management; application and SDLC security; vendor security due diligence; and customer contract security due diligence.

tonyu web - 2014 Speakers

Tony UcedaVelez

With nearly 20 years of IT/ IS experience across three different continents, Tony has accumulated both hands on operational and management experience at a global level. Founder of VerSprite – a risk focused security consulting firm in Atlanta – Tony works with the global Fortune 500 organizations that are seeking something beyond compliance driven approaches to security challenges. Tony is an author of the only risk centric threat modeling methodology named PASTA (Process for Attack Simulation & Threat Analysis) and is an author with Wiley Life Sciences. Tony also runs the OWASP Atlanta chapter and is an organizer to the BSides Atlanta conferences held yearly. Tony’s prior public speaking events include the likes of the AppSec USA, BSides ATL, Great Wide Open Developer Conference, Cloud Connect, ISACA Information Security Risk Management, OWASP LanTAM, regional ISSA and ISACA events and multiple OWASP global training and speaking events in Asia, Latin America, Europe, and North America.

KenPfeil square - 2014 Speakers

Ken Pfeil

Ken Pfeil is the CISO at Pioneer Investments responsible for global security operations and compliance. He is a seasoned CSO and IT veteran with experience spanning over two decades with companies such as Microsoft, Dell, Avaya, Identix, and Merrill Lynch. In 1998, he founded “The NT Toolbox” and oversaw all operations until its acquisition by GFI Software in 2002.

Lisa square - 2014 Speakers

Lisa Dobson

Lisa Dobson is Davidson Technologies’ Vice-President, Ballistic Missile Defense Operations and Information Assurance. She leads her team in the disciplines of Cyber Security Engineering, Information Assurance, Information Technology, Modeling & Simulation; System Analysis; Systems Engineering & Integration; Test & Evaluation; Obsolescence; Survivability, Reliability, Availability, Maintainability (RAM); Operations and Sustainment. In addition, her team performs network security architecture and physical security assessments, 24×7 Network Operations, Intrusion Monitoring, Incident response, and penetration tests for enterprise and government entities.

popinski - 2014 Speakers

Joe Popinski Ph. D.

Dr. Joe Popinski is an Information Technology & Network Security consultant specializing in enterprise level IT, networking, cyber, and corporate security. He currently serves as the AVP-IT & CISO for the University of Alabama at Birmingham’s Office of the Vice President for Information Technology. In this role, he is responsible for Information Security at UAB including security architecture, strategic planning, DR, compliance, cyber security investigations, risk management, security technical monitoring, and other security related functions.

Scott Gordon square - 2014 Speakers

Scott Gordon

Scott Gordon is an information security professional, speaker, author and consultant; having contributed to innovative startups and large vendors spanning a career of over 22 years. As the chief marketing officer at ForeScout, Scott is an accomplished and industry-recognized leader who has helped evolve security information management, network and endpoint security, and risk management technologies at such companies as AccelOps, Protego (acq Cisco), Axent Technologies, NeoScale (acq Ncipher), McAfee, Cheyenne, and CA. He is the author of “Operationalizing Information Security” and contributing author of the “Definitive Guide to Next-Gen NAC.”

kevinmcpeak - 2014 Speakers

Kevin McPeak

Kevin McPeak is a Symantec Security & Mobility Architect who is focused on supporting US Government customers. In this capacity, he serves as a technical SME for reputation based malware filtering, endpoint management, endpoint security, data loss prevention, encryption, mobile device management, mobile app management, secure mobile content delivery, and new defensive technologies.

mikedavis - 2014 Speakers

Michael Davis

As CounterTack’s CTO, Michael Davis is responsible for driving the advancement of CounterTack’s revolutionary endpoint security platform, as well as leveraging his visionary approach to push defenders ahead of attackers. Davis has earned a reputation as one of the nation’s leading authorities on information technology. The list of organizations that rely on his council includes AT&T, Sears, Exelon, and the US Department of Defense.

trudykremer - 2014 Speakers

Trudy Kremer

Trudy B. Kremer is the founding director of our coaching services, providing tailored communications coaching for senior executives. Her vision for this practice grew out of her seven years as a producer with the National Broadcasting Corp. (NBC), where she produced stories for the national news.

ilyas - 2014 Speakers

Illyas Kooliyankal

Mr. Kooliyankal is an exuberant Information Security professional with 20 years of experience in the Information Technology and Cyber Security arena. In the role as Global Head of Information Security/Chief Information Security Officer (CISO), he drives the Information security and business continuity programs at ADS Holding/ADS Securities, one of the most prestigious organizations in the region.

robertjshaker 1 - 2014 Speakers

Robert J. Shaker II[

Bob Shaker is CTO for Cyber Security Group’s Global Incident Response Services at Symantec. Bob spends his days working with our teams on ways to protect our customers and prepare for the future. Growing dynamic teams of people and helping to eliminate obstacles in the way of success are his primary goals. Great people, without obstacles, open the door to true innovation. Doing this Bob is able to help Symantec customers identify, contain, and eradicate increasingly sophisticated attackers as part of Symantec’s Incident Response Service.

PaulCalatayud  - 2014 Speakers

Paul Calatayud

Paul Calatayud serves as the head of Information Security, Audit, and Enterprise Risk Management departments as the Chief Information Security Officer (CISO) for Surescripts. Prior to his role with Surescripts, Paul was Director of Information Security for United Health Group, a fortune 15 company, where he managed a department of 50 security professionals supporting over 150 k employees. Paul has 15 years of experience within information security which started by serving in the Army as an information security cryptographer.

GCF Placeholder - 2014 Speakers

Nitin Kanade

Nitin is a subject matter expert in cyber security, brings 25 years of Industry experience in Internet, network engineering and operational experience from leading corporations including AGC Networks, Godrej and Philips. As a founder of Highband and vice president of Information Security and GRC, Nitin has been pioneer in developing innovative technologies to meet challenges related to Information Security and compliance requirements of commercial enterprises. He has implemented Information security and compliance solutions for Fortune 100 clients globally. Prior to Highband, Nitin has worked at various positions in Philips, Godrej, Aegis/AGC Networks. He has worked at various positions and matured as technology and security professional.

josephkrull - 2014 Speakers

Joseph Krull

Joseph is a Director at Denim Group in San Antonio, Texas. He is an IT Risk and Security professional with almost 40 years of experience. Joseph has been a Chief Security Officer for Fortune 100 and Global 1000 companies, a practice lead for a global technology company and an IT Risk and Security Director for PriceWaterhouseCoopers. He has helped companies on four continents identify and manage IT risks and has been a frequent public speaker and author covering risk and security subjects. During the first half of his career, Joseph was a senior intelligence and security officer for the Defense Intelligence Agency. He has worked in more than 100 countries and speaks several languages.

Sharon Cook - 2014 Speakers

Sharon Cook

Sharon Cook oversees the Federal Home Loan Bank of Atlanta’s Corporate Communications and Marketing functions. In her role, Cook manages External Communications, Media Relations, Investor Relations, Reputational Risk, and Marketing and Brand Cultivation, for the regional banker’s bank.

Maria Brous - 2014 Speakers

Maria Brous

Maria Brous began her career with Publix in 1990 at the age of fourteen as a front service clerk. She spent nine years in retail operations before transferring to the Education & Training Development Department. There, she taught leadership development courses, such as: Communications, Diversity, First Aid, and Food Safety. After three years, Maria was promoted to media and community relations manager for the Miami Division. Her responsibilities included donations management, community involvement and media relations. In Dec. 2004, Maria was promoted to her current role of director of media and community relations for Publix Super Markets, Inc.

Blair Meeks - 2014 Speakers

Blair Meeks

A 20-year veteran of television news, Blair joined Jackson Spalding in 2008, adding his award-winning experience to our JS Cultivation team. He is a staple in our client training sessions and contributes mightily to issues management situations.

mh - 2014 Speakers

Mitzi Hill

Mitzi Hill is a member of the Corporate and Business practice group. She is an experienced media, intellectual property, and technology lawyer. Her practice focuses on data security and privacy, entertainment and media issues, and technology licensing and development. She has counseled clients regarding data breach remediation and prevention, privacy issues involving consumer credit and other data, and data technology security matters generally.