Global CISO Forum
GCF Agenda
CISO Awards
Global CISO Forum Sponsorship
Certification Training
2014 Speakers

Eric Svetcov

Eric is currently the CSO at MedeAnalytics, a leading Cloud Computing company delivering services for the healthcare system (including hospitals, physician practices, and payers). He has extensive experience working in operations and information security for Cloud Computing companies, including taking through ISO 27001 certification during his 2 year stint as Information Security Director and running operations for two other Cloud Computing companies, Netfile and Grassroots Enterprise.
Eric Svetcov CSO, MedeAnalytics

Juan Gomez-Sanchez

Mr. Gomez-Sanchez has over 16 years of Information Security experience. He has focused his entire professional life to pursue excellence in the field of Information Security. Juan Gomez-Sanchez, has been tasked throughout his career with building and managing world-class, enterprise security organizations. His keen perspective of security as a business enabler has allowed Juan to deliver high performance solutions and organization to address large and complex security challenges. He has led such initiatives in organizations like Delta AirLines, CheckFree Corporation (now and division of Fiserv) and Cybertrust (now Verizon Business).
Juan Gomez-Sanchez National Practice Manager Risk and Compliance, World Wide Technologies

Jason Smolanoff

Jason N. Smolanoff is a Vice President in Stroz Friedberg’s Los Angeles office. Mr. Smolanoff is responsible for managing numerous digital forensic, Internet investigate & electric discovery assignments for Fortune 500 companies, major law firms, cleared defense contractors, government agencies, corporate management & information systems departments in criminal, civil, regulatory & internal corporate matters, including matters involving data breach, leaks of confidential information, theft of trade secrets, & copyright & trademark infringement.
Jason Smolanoff Vice President, Stroz Friedberg

John Scrimsher

John Scrimsher brings 20 years of experience developing and managing security solutions for large and small corporations to Damballa. Most recently, Scrimsher was the Director of Technical Security for Oracle Corp. where he led the development of secure corporate IT solutions for malware protection, compliance, mobility and more. Working in coordination with Privacy and Legal officials, as well as peer business organizations, Scrimsher has driven the improvement of security at all layers within the organization. Previously, Scrimsher has also led Global IT Security Engineering teams for Hewlett-Packard and has been named on multiple patented vulnerability management solutions.
John Scrimsher Director of Information Technology, Damballa Inc.

James J. Treinen

A security industry veteran of 15 years, James leads the ProtectWise research team and is responsible for the management and leveraging of threat intelligence. He is an expert on data analysis as it pertains to enterprise security and holds multiple patents and has authored numerous publications related to data analytics for large security-related data sets. James led the data analysis efforts for IBM Security Intelligence and the development of numerous security related software products. Jim holds a Ph.D. and M.S. in Computer Science from the University of Denver and received a B.S. in Computer Science and Mathematics from Regis University.
James J. Treinen Ph.D., Director, Threat Management

Ed Adams

Mr. Adams is a software executive with over 20 years of leadership experience in various-sized organizations that serve the IT security and software quality assurance industries. He is a Ponemon Institute Fellow and sits on the board of the National Association of Information Security Groups (NAISG), and the International Secure Software Engineering Council (ISSECO). In February of 2014, Mr. Adams was named a Privacy by Design Ambassador, which is a group of privacy thought-leaders committed to ensuring the ongoing protection of personal information.
Ed Adams CEO, Security Innovations
Chuck Deaton

Chuck Deaton

Chuck Deaton is the Director of Enterprise Information Security (EIS) for Humana Inc. and has been with the company for over 13 years. The EIS program is focused on information protection policies, standards, training and awareness; governance and compliance; assurance; technical security infrastructure architecture; security solutions and technology ownership; risk management; threat and vulnerability management; application and SDLC security; vendor security due diligence; and customer contract security due diligence.
Chuck Deaton Director, Deputy CISO, Enterprise Information Protection at Humana
Tom Brennan

Tom Brennan

Tom Brennan is the founder of proactiveRISK and veteran of the United States Marines Corps. Tom is a long time volunteer to the Open Web Application Security Project (OWASP) serving as the Global Vice Chairman and contributes to many other not-for-profit technical committees including the (ISC)2 Application Security Advisory Council (ASAC), the International Legal and Technology Association (ILTA) LegalSEC and Council of Cyber Security, Roles & Controls Panel that all have a global scope committed to the security of the open Internet.
Tom Brenan Founder of proactiveRISK
Ken Pfeil

Ken Pfeil

Ken Pfeil is the CISO at Pioneer Investments responsible for global security operations and compliance. He is a seasoned CSO and IT veteran with experience spanning over two decades with companies such as Microsoft, Dell, Avaya, Identix, and Merrill Lynch. In 1998, he founded “The NT Toolbox” and oversaw all operations until its acquisition by GFI Software in 2002.
Ken Pfeil CISO, Pioneer Investments
Lisa Dobson

Lisa Dobson

Lisa Dobson is Davidson Technologies’ Vice-President, Ballistic Missile Defense Operations and Information Assurance. She leads her team in the disciplines of Cyber Security Engineering, Information Assurance, Information Technology, Modeling & Simulation; System Analysis; Systems Engineering & Integration; Test & Evaluation; Obsolescence; Survivability, Reliability, Availability, Maintainability (RAM); Operations and Sustainment. In addition, her team performs network security architecture and physical security assessments, 24×7 Network Operations, Intrusion Monitoring, Incident response, and penetration tests for enterprise and government entities.
Lisa Dobson Vice-President, Ballistic Missile Defense Operations and Information Assurance at Davidson Technologies
Joe Popinski Ph. D.

Joe Popinski Ph. D.

Dr. Joe Popinski is an Information Technology & Network Security consultant specializing in enterprise level IT, networking, cyber, and corporate security. He currently serves as the AVP-IT & CISO for the University of Alabama at Birmingham’s Office of the Vice President for Information Technology. In this role, he is responsible for Information Security at UAB including security architecture, strategic planning, DR, compliance, cyber security investigations, risk management, security technical monitoring, and other security related functions.
Joe Popinski Ph. D. AVP-IT & CISO, the University of Alabama at Birmingham’s Office of the Vice President for Information Technology
Scott Gordon

Scott Gordon

Scott Gordon is an information security professional, speaker, author and consultant; having contributed to innovative startups and large vendors spanning a career of over 22 years. As the chief marketing officer at ForeScout, Scott is an accomplished and industry-recognized leader who has helped evolve security information management, network and endpoint security, and risk management technologies at such companies as AccelOps, Protego (acq Cisco), Axent Technologies, NeoScale (acq Ncipher), McAfee, Cheyenne, and CA. He is the author of “Operationalizing Information Security” and contributing author of the “Definitive Guide to Next-Gen NAC.”
Scott Gordon Chief Marketing Officer, ForeScout
Kevin McPeak

Kevin McPeak

Kevin McPeak is a Symantec Security & Mobility Architect who is focused on supporting US Government customers. In this capacity, he serves as a technical SME for reputation based malware filtering, endpoint management, endpoint security, data loss prevention, encryption, mobile device management, mobile app management, secure mobile content delivery, and new defensive technologies.
Kevin McPeak Security & Mobility Architect, Symantec
Michael Davis

Michael Davis

As CounterTack’s CTO, Michael Davis is responsible for driving the advancement of CounterTack’s revolutionary endpoint security platform, as well as leveraging his visionary approach to push defenders ahead of attackers. Davis has earned a reputation as one of the nation’s leading authorities on information technology. The list of organizations that rely on his council includes AT&T, Sears, Exelon, and the US Department of Defense.
Michael Davis CTO CounterTack
Trudy Kremer

Trudy Kremer

Trudy B. Kremer is the founding director of our coaching services, providing tailored communications coaching for senior executives. Her vision for this practice grew out of her seven years as a producer with the National Broadcasting Corp. (NBC), where she produced stories for the national news.
Trudy Kremer Jackson Spalding
Illyas Kooliyanka

Illyas Kooliyankal

Mr. Kooliyankal is an exuberant Information Security professional with 20 years of experience in the Information Technology and Cyber Security arena. In the role as Global Head of Information Security/Chief Information Security Officer (CISO), he drives the Information security and business continuity programs at ADS Holding/ADS Securities, one of the most prestigious organizations in the region.
Robert J. Shaker II

Robert J. Shaker II

Bob Shaker is CTO for Cyber Security Group’s Global Incident Response Services at Symantec. Bob spends his days working with our teams on ways to protect our customers and prepare for the future. Growing dynamic teams of people and helping to eliminate obstacles in the way of success are his primary goals. Great people, without obstacles, open the door to true innovation. Doing this Bob is able to help Symantec customers identify, contain, and eradicate increasingly sophisticated attackers as part of Symantec’s Incident Response Service.
CTO, Incident Response Services, Cyber Security Group