RMISC 2019 Speakers
Eric Alexander
The Trade Desk
Senior Lead DevSecOps Engineer
G4. A DevSecOps approach to SOX Compliance
Steve Ballard
Thycotic Software
Systems Engineer
G8. Vulnerability Management 2.0 & Attaining Top-Level Security Without the Complexity.
Todd Bell
GlobalDataLock.com
CIO & CISO Executive Advisor
F5. Why CISO's Are Not Working Out At Corporations
Brady Bloxham
Silent Break Security
Managing Partner
D2. Serving in Silence: The Latest in Attacker Techniques and Defensive Mitigations
Max Blumenthal
Sandia Labs
Senior Cyber Assurance Architect
C6. Math Is Hard: Compliance to Continuous Risk Management
Lucien Brilliant
Security Innovation
Principle Security Engineer
PC2: CMD-Ctrl Application Security CTF
Preston Bukaty
Consolidated Commercial Services & Support, LLP
Board member
CD2: Community Day: Rocky Mountain Privacy Forum
Debi Caldwell
Deloitte & Touche
Service Delivery Manager
G7. What I learned about Leading, Following, and Getting Out of My Own Way by Studying Improv
Damien Chung
Netskope
Business Information Security Officer
F8. The Growing Need for Privacy in a Cloud First Era
Doug Clifford
Tenable Network Security
Sr. Channel Security Engineer
G8. Vulnerability Management 2.0 & Attaining Top-Level Security Without the Complexity.
Thomas Codevilla
SK&S Law Group
Partner, SK&S Law Group LLP
CD2: Community Day: Rocky Mountain Privacy Forum
Todd Cronin
PLEX Solutions
Lead, Commercial Cybersecurity
F2. Hunting Mobile Rogue Access Points with Wireless Mesh Implants
Jason Cronk
Enterprivacy Consulting Group
Writer/Privacy Consultant
CD2: Community Day: Rocky Mountain Privacy Forum
Sherrod DeGrippo
Proofpoint
Director of Threat Research and Detection
B2. The Human Target: How Threat Actors Choose Their Mark
Michelle Dennedy
iDennedy Project, Flying Pigs Productions LLC.
Founder
CD2: Community Day: Rocky Mountain Privacy Forum
Keynote Session with Michelle Dennedy
Carlin Dornbusch
American Cyber Security Management
President
CD2: Community Day: Rocky Mountain Privacy Forum
Stephen Edmonds
Ping Identity Corporation
Director of Governance, Risk, and Compliance
A7. Bootstrapping Privacy
Amanda "Jo" Erven
Audit. Consulting. Education. LLC
President/Founder
B7. Photoshop Can't Fix Poor Ethics: The Impact of Technology on Ethical Behavior
Marty Esquibel
Colorado Department of Human Services
HIPAA Privacy & Security Officer
A6. INgineering the MargINs: Technology, Privacy, & Security and Minors, Minorities & Marginalized Communities
David Foote
Foote Partners, LLC
Chief Analyst & Chief Research Officer
D5. Analyst View: Info/Cybersecurity Jobs, Skills, Pay Review and Forecast
Stephen Frethem
Varonis Systems Inc.
Technical Evangelist
D9. Attackers Prey on Uncertainty: How to Fail at Threat Detection
Nicholas Friedman
Templar Shield
National Managing Partner
G9. Manage Third-Party Risk with Visibility, Insight and Action!
Randall Frietzsche
Denver Health
Chief Information Security (CISO) and Privacy Officer
E1. Relationships are Critical
Dan Garlick
Hitachi Vantara
Director Cyber Security Operations
F9. Cyber Incident Response from the Trenches: The IR checklist that got you here won’t get you out of here!
Jim Gerken
Novacoast, Inc.
Director of Identity Services
B3. Identity and Access in a Fractured Environment
R. Trent Greenwood
Carbon Black
Senior Manager Sales Engineering/Security Strategist
E8. Times Have Changed…Why Haven’t We
Christie Gross
Sandia National Labs
Cyber Assurance Architect
C6. Math Is Hard: Compliance to Continuous Risk Management
John Hellickson
Kudelski Security
Managing Director, Strategy & Governance
H7. How CISOs Gain Trust in the Boardroom
Janelle Hsia
American Cyber Security Management
Director of Privacy and Compliance
CD2: Community Day: Rocky Mountain Privacy Forum
Zachary Hunsaker
NCAR Wyoming Supercomputing Center
Security Engineer
E3. Open Source Intelligence: What Does the Internet Know About You?
Ben Johnson
Datashield
Chief Security Officer
A9. Approaches to Digital Risk Management: Securing your Critical Assets from Growing Threats
Phillip Kealy
Mandiant, now part of Google Cloud
Senior Manager
C2. PCI Alone Won't Save You: Lessons Learned from Credit Card Data Breaches
Allan Konar
Unbound Tech
Solutions Architect
G3. Crypto Hygiene 101: How I Learned to Stop Hoping for Security and Love Cryptography
Chris Krueger
Coalfire
Principal, Cyber Engineering
H1. Secure Cloud Automation: A New Approach to FedRAMP Certification
Tracy Lechner
Law Offices of Tracy L. Lechner LLC
Founding Attorney
CD2: Community Day: Rocky Mountain Privacy Forum
Fredrick Lee
Gusto
Chief Security Officer
B5. Bootstrap Security: Cheap and Easy Wins for Early-Stage Companies
Hank Leininger
KoreLogic Security
Co-Founder
A2. Red/Blue Teaming In Front Of A Live, Studio Audience
Terrence Lillard
NTT Security
Senior Incident Response Analyst
F9. Cyber Incident Response from the Trenches: The IR checklist that got you here won’t get you out of here!
Lisa Love
L2 Cyber Solutions
Founder-President
C8. Security as a Business Asset: How to redefine security in a business context
H6. IT Security Audits: The Good, Bad, and Ugly
Jacques Lucas
Avertium
Sr. Security Manager – Compliance and Audit
A4. Those Old Rules for Password—Gone
Mohamed Malki
Colorado Governor Office of IT
Enterprise Security Architecture
PC3: Cloud Security Training
Michael Marriott
Digital Shadows
Senior Strategy and Research Analyst
A9. Approaches to Digital Risk Management: Securing your Critical Assets from Growing Threats
Marci McCarthy
T.E.N.
CEO and President
F7. Empower Cyber Security Leadership Through Emotional Intelligence
Joe Minicucci
Ping Identity
Application Security Engineer
F2. Hunting Mobile Rogue Access Points with Wireless Mesh Implants
Merlin Namuth CISSP, GCFA, GCIH, PMP
Red Robin
Director of Security
C5. On Security Strategy: He Said. She Said.
Dustin Nowak
FireEye
Principal Consultant
H9. M-Trends 2019: Trends Behind Today’s Most Impactful Cyber Breaches and Cyber Attacks