June 8-9, 2017

Tag Archives: speakers

Speaker Feature: Rick Lull and Shannon Yeaker

Rick Lull rlull@verizon.net Network bubba, health care IT survivor, now trying to play Horatio on the bridge via infosec for customers of my new company.     Shannon Yeaker Shannon Yeaker, PMP, CISA, CAHIMS is a Lead Consultant with Impact Makers in the Governance, Risk and Compliance (GRC) Practice. She is a dynamic IT professional […]

Speaker Feature: Alon Arvatz

www.intsights.com Alon Arvatz runs products at IntSights.  Prior to co-founding IntSights, Alon had was a cyber security professional in the military and private sector.  Alon started his career serving in an elite intelligence unit in the Israel Defense Forces.  Then, Alon joined Guy Nizan to establish Cyber School, a center providing teenagers with courses, seminars and […]

Speaker Feature: Robert Mitchell

rrmitch@sandia.gov Robert Mitchell is currently a member of technical staff at Sandia National Laboratories. He received his Ph.D, M.S. and B.S. from Virginia Tech. Robert served as a military officer for six years and has over 10 years of industry experience, having worked previously at Boeing, BAE Systems, Raytheon and Nokia. His research interests include […]

Speaker Feature: Robert Wood

bwood@nuna.com robertwood50 Robert Wood runs the security team at Nuna Health, whose core directive is to protect one of the nation’s largest collective healthcare data sets. Previously, Robert was a Principal Consultant at Cigital where he founded and led the red team assessment practice and worked with strategic clients across the United States in an […]

Speaker Feature: Dan Holden

dan.holden@r-cisc.org @desmondholden Dan Holden is the CTO and Intelligence Director at R-CISC, the retail ISAC, where he focuses on new technology and service development as well as threat intelligence production and exchange. Previously he was the Chief Technology Strategist and Director of ASERT, Arbor’s Security Engineering and Response Team at Arbor Networks. There he was […]

Speaker Feature: Troy Marshall

troy.marshall@ellucian.com @rtroymarshall How do you answer when someone asks what you do for a living? Troy Marshall’s answer—“I don’t make software, I make software better”—explains his career helping organizations build and scale programs to improve the quality, security, and performance of their software and systems. Troy is currently the Director, Application Security and Reliability in […]

Speaker Feature: Daniel Bohannon

daniel.bohannon@mandiant.com @danielhbohannon Daniel Bohannon is a Senior Incident Response Consultant at MANDIANT with over six years of operations and information security experience. His particular areas of expertise include enterprise-wide incident response investigations, host-based security monitoring, data aggregation and anomaly detection, and PowerShell-based attack research and detection techniques. As an incident response consultant, Mr. Bohannon provides […]

Speaker Feature: Ken Johnson

ken@nvisium.com @cktricky Ken Johnson, CTO of nVisium, has been hacking web applications professionally for 8 years. Ken is both a breaker and builder and currently leads the nVisium product team. Previously, Ken has spoken at DerbyCon, AppSec USA, RSA, AppSec DC, AppSec California, DevOpsDays DC, LASCON, RubyNation, and numerous Ruby, OWASP, and AWS events. Ken […]

Speaker Feature: Jason Wonn

jasonwonn@gmail.com @wonnmeister Jason Wonn is a tactical and results-focused information security leader with 25+ years of combined national intelligence, information assurance, and cyber threat intelligence expertise throughout the civilian and military sectors. Jason was a “Richmonder” prior to his cross-country move to Los Angeles where he is now a “cast-member” at The Walt Disney Company. […]

Speaker Feature: Derek Banks & Troy Wojewoda

Derek Banks @0xderuke Derek Banks is a Security Analyst for Black Hills Information Security and has over 20 years of experience in the IT industry starting as a systems administrator for multiple operating system platforms, moving on to monitoring and defending enterprise systems from potential intruders and performing vulnerability analysis and now as a penetration […]