RMISC 2019 Speakers

James Condon
Lacework, Inc.
Director of Research
E4. A Practical Guide for Securing Kubernetes

Sean Davis
Sean As A Service

Sherrod DeGrippo
Director of Threat Research and Detection
B2. The Human Target: How Threat Actors Choose Their Mark

Joe Dietz
Network Security Architect
B4. SSL/TLS Then and Now...

Brad Doctor
Senior Director, Information Security
F3. How VMware is Going Password-Less

Carlin Dornbusch
American Cyber Security Management
CD 2: Community Day: Rocky Mountain Privacy Forum

Kyle Eaton
Lead Information Security Engineer
G2. Murky Waters: Analyzing Phish Kits

Lauren Edmonds
Schellman & Company, LLC
B6. SOC’ing It to Cybersecurity Threats

Stephen Edmonds
Ping Identity Corporation
Deputy CISO and Privacy Officer
A7. Bootstrapping Privacy

Greg Foss
Carbon Black
Senior Threat Researcher
A5. Suspiciously Inconspicuous

Jim Gerken
Novacoast, Inc.
Director - Security Services (Identity)
B3. Identity and Access in a Fractured Environment

Christie Gross
Sandia National Laboratories
Cybersecurity Solutions Engineer Lead
C6. Math Is Hard: Compliance to Continuous Risk Management

John Hellickson
Kudelski Security
Vice President of US Advisory Services, CISO Advisory
H7. How CISOs Gain Trust in the Boardroom

Janelle Hsia
American Cyber Security Management
Director of Privacy and Compliance
CD 2: Community Day: Rocky Mountain Privacy Forum

Zachary Hunsaker
NCAR Wyoming Supercomputing Center
Security Engineer
E3. Open Source Intelligence: What Does the Internet Know About You?

Jacques Lucas
Terra Verde
Sr. Security Manager – Compliance and Audit
A4. Those Old Rules for Password—Gone

Mohamed Malki
Colorado Governor Office of IT
Enterprise Security Architecture
PC3: Cloud Security Training

Alex Useche
nVisium LLC
Application Security Consultant
D4. Angular for Pentesters

Tim Weil
Alcohol Monitoring Systems
Network Project Manager
H6. IT Security Audits: The Good, Bad, and Ugly