RMISC 2019 Speakers


James Condon
Lacework, Inc.
Director of Research
E4. A Practical Guide for Securing Kubernetes


Sean Davis
Sean As A Service
Founder

Sherrod DeGrippo
Proofpoint
Director of Threat Research and Detection
B2. The Human Target: How Threat Actors Choose Their Mark


Joe Dietz
CenturyLink
Network Security Architect
B4. SSL/TLS Then and Now...


Brad Doctor
VMware
Senior Director, Information Security
F3. How VMware is Going Password-Less


Carlin Dornbusch
American Cyber Security Management
President
CD 2: Community Day: Rocky Mountain Privacy Forum


Kyle Eaton
Target
Lead Information Security Engineer
G2. Murky Waters: Analyzing Phish Kits


Lauren Edmonds
Schellman & Company, LLC
Principal
B6. SOC’ing It to Cybersecurity Threats


Stephen Edmonds
Ping Identity Corporation
Deputy CISO and Privacy Officer
A7. Bootstrapping Privacy


Greg Foss
Carbon Black
Senior Threat Researcher
A5. Suspiciously Inconspicuous


Jim Gerken
Novacoast, Inc.
Director - Security Services (Identity)
B3. Identity and Access in a Fractured Environment


Christie Gross
Sandia National Laboratories
Cybersecurity Solutions Engineer Lead
C6. Math Is Hard: Compliance to Continuous Risk Management


John Hellickson
Kudelski Security
Vice President of US Advisory Services, CISO Advisory
H7. How CISOs Gain Trust in the Boardroom


Janelle Hsia
American Cyber Security Management
Director of Privacy and Compliance
CD 2: Community Day: Rocky Mountain Privacy Forum


Zachary Hunsaker
NCAR Wyoming Supercomputing Center
Security Engineer
E3. Open Source Intelligence: What Does the Internet Know About You?


Jacques Lucas
Terra Verde
Sr. Security Manager – Compliance and Audit
A4. Those Old Rules for Password—Gone


Mohamed Malki
Colorado Governor Office of IT
Enterprise Security Architecture
PC3: Cloud Security Training


Alex Useche
nVisium LLC
Application Security Consultant
D4. Angular for Pentesters


Tim Weil
Alcohol Monitoring Systems
Network Project Manager
H6. IT Security Audits: The Good, Bad, and Ugly