RMISC 2019 Speakers

Todd Bell
Todd Bell
GlobalDataLock.com
CIO & CISO Executive Advisor
F5. Why CISO's Are Not Working Out At Corporations

Jake Bernardes
Jake Bernardes
NCC Group
Principal Consultant
Steve Black
Steve Black
Texas Tech University School of Law
Professor of Law
G6. Cyberlaw Year in Review

Jason Cronk
Jason Cronk
Enterprivacy Consulting Group
Writer/Privacy Consultant
CD2: Community Day: Rocky Mountain Privacy Forum

Sean Davis
Sean Davis
Sean As A Service
Founder
Sherrod DeGrippo
Sherrod DeGrippo
Proofpoint
Director of Threat Research and Detection
B2. The Human Target: How Threat Actors Choose Their Mark

Joseph Dietz
Joseph Dietz
CenturyLink
Network Security Architect
B4. SSL/TLS Then and Now...

Brad Doctor
Brad Doctor
VMware
Senior Director, Information Security
F3. How VMware is Going Password-Less

Carlin Dornbusch
Carlin Dornbusch
American Cyber Security Management
President
CD2: Community Day: Rocky Mountain Privacy Forum

Kyle Eaton
Kyle Eaton
Proofpoint
Senior Security Research Engineer
G2. Murky Waters: Analyzing Phish Kits

Stephen Edmonds
Stephen Edmonds
Ping Identity Corporation
Director of Governance, Risk, and Compliance
A7. Bootstrapping Privacy

Tyler Farrar
Tyler Farrar
Maxar
Director, Enterprise Cyber Security
PC4: Cyber Audit Training

David Foote
David Foote
Foote Partners, LLC
Chief Analyst & Chief Research Officer
D5. Analyst View: Info/Cybersecurity Jobs, Skills, Pay Review and Forecast

Greg Foss
Greg Foss
Carbon Black
Senior Threat Researcher
A5. Suspiciously Inconspicuous

Randall Frietzsche
Randall Frietzsche
Denver Health
Chief Information Security (CISO) and Privacy Officer
E1. Relationships are Critical

Jim Gerken
Jim Gerken
Novacoast, Inc.
Director of Identity Services
B3. Identity and Access in a Fractured Environment

R. Trent Greenwood
R. Trent Greenwood
Carbon Black
Senior Manager Sales Engineering/Security Strategist
E8. Times Have Changed…Why Haven’t We

Christie Gross
Christie Gross
Sandia National Labs
Cyber Assurance Architect
C6. Math Is Hard: Compliance to Continuous Risk Management

John Hellickson
John Hellickson
Kudelski Security
Managing Director, Strategy & Governance
H7. How CISOs Gain Trust in the Boardroom

Jacques Lucas
Jacques Lucas
Avertium
Sr. Security Manager – Compliance and Audit
A4. Those Old Rules for Password—Gone

Mohamed Malki
Mohamed Malki
Colorado Governor Office of IT
Enterprise Security Architecture
PC3: Cloud Security Training

Danny Manimbo
Danny Manimbo
Schellman
Principal / ISO Practice Director
B6. SOC’ing It to Cybersecurity Threats