December 15 2021


Winn SchwartauWinn Schwartau

Winn has lived Cyber Security since 1983, and now says, “I think, maybe, I’m just starting to understand it.” His predictions about the internet & security have been scarily spot on. He coined the term “Electronic Pearl Harbor” while testifying before Congress in 1991 and showed the world how and why massive identify theft, cyber-espionage, nation-state hacking and cyber-terrorism would be an integral part of our future. He was named the “Civilian Architect of Information Warfare,” by Admiral Tyrrell of the British MoD.

His new book, “Analogue Network Security” is a mathematical, time-based and probabilistic approach to justifiable security. His goal is to provide a first set of tools and methods to “fix security and the internet”, including fake news, spam, phishing, DDoS and more. It will twist your mind.

Fellow, Royal Society of the Arts;     Distinguished Fellow: Ponemon Institute;     International Security Hall of Fame: ISSA;     Top-20 industry pioneers: SC Magazine;     Top 25 Most Influential: Security Magazine;     Top 5 Security Thinkers: SC Magazine;     Power Thinker and one of the 50 most powerful people: Network World;     Top Rated (4.85/5) RSA Speaker;     Top Rated Webinar: 4.56 (ISC2);     .001% Top Influencer RSAC-2019;     Author: Pearl Harbor Dot Com (Die Hard IV), 3 volumes of “Information Warfare,” “CyberShock”, “Internet and Computer Ethics for Kids”, “Time Based Security” (More on his web site.)

Founder: www.TheSecurityAwarenessCompany.Com

Founder: www.InfowarCon.Com

Executive Producer: “Hackers Are People Too”

Paul Rosenzweig

Paul Rosenzweig

worked on legal and policy issues related to cybersecurity, homeland security, national security and tech policy, including the intersection of privacy and security. He was recently appointed to the American Bar Association’s Cybersecurity Legal Task Force.

In addition to his work at R Street, Paul continues to manage a small cybersecurity consulting company called Red Branch Consulting. He also teaches at the George Washington University School of Law. Previously, he was deputy assistant secretary for policy at the U.S. Department of Homeland Security. In an earlier life, he was a Senior Counsel on the Whitewater investigation of President Clinton.

Paul is the author of Cyber Warfare: How Conflicts in Cyberspace are Challenging America and Changing the World and of three video lecture series from The Great Courses: Thinking About Cybersecurity: From Cyber Crime to Cyber Warfare, The Surveillance State: Big Data, Freedom, and You, and Investigating American Presidents.

With James Jay Carafano, he is co-author of Winning the Long War: Lessons from the Cold War for Defeating Terrorism and Preserving Freedom and co-editor, with Timothy McNulty and Ellen Shearer, of two books: Whistleblowers, Leaks and the Media: The First Amendment and National Security, and National Security Law in the News: A Guide for Journalists, Scholars, and Policymakers.

He received his bachelor’s in chemistry from Haverford College, his master’s in chemical oceanography from the University of California at San Diego’s Scripps Institution of Oceanography and his JD from the University of Chicago.

John D. JohnsonJohn D. Johnson, Ph.D., CISSP, CRISC

John Johnson has more than 25 years of information security leadership experience across federal and various industry segments. John is currently Cybersecurity Leader for a large consumer manufacturing company. He was previously Senior Manager at Deloitte, focused on IoT and industrial cybersecurity.

Prior to that was CTO at a technology startup, Security Architect at John Deere for 18 years, and developed and taught graduate cybersecurity for 16 years. John has been active with the Chicago CISO community for many years, he organizes industry conferences and is a founding board member and advisor for several non-profits and technology companies.

Diana KellyDiana Kelly, Co-Founder and CTO of SecurityCurve

Diana Kelley’s security career spans over 30 years. She is Co-Founder and CTO of SecurityCurve, Chief vCISO at SaltCybersecurity and donates much of her time to volunteer work in the cybersecurity community, including serving on the ACM Ethics & Plagiarism Committee, on the Executive Board at Sightline Security and Cyber Future Foundation, as Executive Board and Inclusion Working Group champion at WiCyS, Cybersecurity Committee Advisor at CompTIA, Advisory Board Chair at WOPLLI Technologies, Advisory Council member Bartlett College of Science and Mathematics, Bridgewater State University, and RSAC US Program Committee.

Diana produces the #MyCyberWhy series and is the host of BrightTALK’s The (Security) Balancing Act and co-host of the Your Everyday Cyber podcast. She was the Cybersecurity Field CTO for Microsoft, Global Executive Security Advisor at IBM Security, GM at Symantec, VP at Burton Group (now Gartner), and a Manager at KPMG. She is a sought after keynote speaker, the co-author of the books Practical Cybersecurity Architecture and Cryptographic Libraries for Developers, has been a lecturer at Boston College’s Masters program in cybersecurity, the EWF 2020 Executive of the Year, and one of Cybersecurity Ventures 100 Fascinating Females Fighting Cybercrime.

Bob GourleyBob Gourley, Co-Founder and CTO, OODA LLC

Bob Gourley is an experienced CTO, author and entrepreneur with extensive past performance in enterprise IT, corporate cybersecurity and data analytics. CTO of OODA LLC, a unique team of international experts which provide advanced intelligence and analysis, strategy, due diligence and risk/threat management services. OODA publishes both and

Helen PattonHelen Patton, Advisory CISO, Cisco Systems, Inc.

is an Advisory CISO at Cisco, where she shares security strategies with the security community. Previously she spent eight years as the CISO at The Ohio State University where she was awarded the 2018 ISE North American Academic/Public Sector Executive of the Year. Before joining Ohio State she spent ten years in risk and resiliency at JPMorganChase.

Helen actively encourages collaboration across and within industries, to enable better information security and privacy practices. She believes in improving diversity and inclusion in the workforce, and mentors people interested in pursuing careers in security, privacy and risk management. She advocates for more naps and is anti-bagpipes.

Helen has a master’s degree in Public Policy and has earned various industry certifications. She serves on the State of Ohio CyberOhio Advisory Board, the Manufacturing and Digital USA Cybersecurity Advisory Board, and the Ohio State University College of Electrical and Computer Engineering Industrial Advisory Board. She is a faculty member for the Digital Director’s Network, the Educause Leadership Institute, and teaches information risk management at The Ohio State University.

Matt DevostMatt Devost, CEO of OODA LLC.

Matt began his professional career in 1995 hacking into systems for the US Department of Defense and Intelligence Community and over the past twenty-five years has emerged as an established leader in the cybersecurity, global risk, and technology domains. Matt is currently
the CEO & Co-Founder of OODA LLC, a global strategic advisory firm with deep DNA in global security, technology, and intelligence issues. Matt helps clients identify, manage, and respond to global risks and uncertainties while exploring emerging opportunities and developing robust and adaptive strategies for the future. He also holds several director and advisory board positions.
A successful entrepreneur, he has founded several companies including FusionX & the Terrorism Research Center and played a key leadership role in global companies including Accenture, iSIGHT Partners, iDefense, and Tulco Holdings. He has served as a senior advisor to DoD, a professor at Georgetown and Columbia Universities, and is a member of the Black Hat review board. Matt’s unique approach to technology, business, and security issues is driven by a technique he calls “HACKthink” – applying a hacker mindset to analyze and dissect complex problems and develop innovative solutions.
Matt has appeared on CNBC, CNN, MSNBC, Fox News, NPR, CBC, CBS News, BBC television, Australian television and dozens other domestic and international radio and television programs as an expert on terrorism and cybersecurity and has lectured or published for the National Defense University, the United States Intelligence and Law Enforcement Communities, the Swedish, Australian, Japanese, and New Zealand governments, American University, George Washington University, and a number of popular press books – magazines, academic journals and over 400 international conferences.
For more details visit

Wendy NatherWendy Nather, Head of Advisory CISOs, Cisco Systems, Inc.

Wendy Nather leads the Advisory CISO team at Cisco. She was previously the Research Director at the Retail ISAC, and Research Director of the Information Security Practice at 451 Research. Wendy led IT security for the EMEA region of the investment banking division of Swiss Bank Corporation (now UBS), and served as CISO of the Texas Education Agency. She was inducted into the Infosecurity Europe Hall of Fame in 2021. Wendy serves on the advisory board for Sightline Security, and is a Senior Cybersecurity Fellow at the Robert Strauss Center for International Security and Law at the University of Texas at Austin.

Alyssa MillerAlyssa Miller, BISO for S&P Global

Alyssa Miller, Business Information Security Officer (BISO) for S&P Global, directs the security strategy for the Ratings division, connecting corporate security objectives to business initiatives. She blends a unique mix of technical expertise and executive presence to bridge the gap that can often form between security practitioners and business leaders. Her goal is to change how we look at the security of our interconnected way of life and focus attention on defending privacy and cultivating trust.

A life-long hacker, Alyssa has a passion for technology and security. She bought her first computer herself at age 12 and quickly learned techniques for hacking modem communications and software. Her serendipitous career journey began as a software developer which enabled her to pivot into security roles. Beginning as a penetration tester, her last 15 years have seen her grow as a security leader with experience across a variety of organizations. She regularly advocates for improved security practices and shares her research with business leaders and industry audiences through her international public speaking engagements, online content, and other media appearances.

Robert WoodRobert Wood, CISO at Centers for Medicare & Medical Services

Robert Wood is the Chief Information Security Officer (CISO) for the Centers for Medicare and Medicaid Services (CMS). He leads enterprise cyber security, compliance, privacy, and counter intelligence functions at CMS and ensures the Agency complies with secure IT requirements while encouraging innovation.
Mr. Wood has over 10 years of experience in information technology, information security and management consulting.
As information technology has grown more complex with the advent of innovative technologies that enable rapid collection, storage and distribution of vast amounts of information and data, so too has the importance of safeguarding the privacy of health and other sensitive information collected by CMS. Our Agency is entrusted with the health information of over 100 million Americans, and it is our fundamental responsibility as stewards of this information to ensure its confidentiality is protected.  Robert leads CMS’s efforts to ensure we meet the standards of excellence demanded by that stewardship responsibility, and protect it from bad actors both foreign and domestic.
Prior to CMS, Mr. Wood has built and managed several security programs in the technology sector. He was also formerly a Principal Consultant for Cigital where he advised enterprises about their software security programs. He also founded and led the red team assessment practice with Cigital, focused on holistic adversarial analysis, helping organizations identify and manage risks from alternative perspectives.
Mr. Wood has a B.S. in Information Management & Technology from Syracuse University.

Micky BorlandMicki Boland, Cybersecurity Evangelist Office of the CTO, Check Point Software Technologies Ltd

Micki Boland is a global cyber security warrior and evangelist with Check Point Technologies Office of the CTO. Micki has over 20 years in ICT, system engineering and cybersecurity. Micki’s focus is helping customers, system integrators, and service providers reduce risk through the adoption of emerging cybersecurity technologies. Micki is an ISC2 CISSP and holds a Master of Science in Technology Commercialization from the University of Texas at Austin, and an MBA with global security concentration from East Carolina University.

Joe DePlatoJoe DePlato, Vice President, CACI International, Inc.

Joseph is a product focused technologist with more than 15 years of experience developing, implementing, supporting, and leading complex infrastructure and technical solutions in the cyber security, Dark Web, and OSINT industries. He has expertise with development methodologies, developer supervision/management, and client relations. He is an influential and motivational software manager, providing steady leadership in fast-paced, deadline driven environments.
Joseph has a superior track record of surpassing goals and expectations for quality, schedule, and functionality while implementing bleeding-edge IT solutions. He is an outside-the-box thinker who excels in collaborative environments, working across business and technical teams to increase profits and reduce costs through continuous improvements and strategic IT planning.

Caroline WongCaroline Wong, Chief Strategy Officer at Cobalt

As CSO, Caroline leads the Security, IT, and People teams at Cobalt. She brings a proven background in communications, cybersecurity, and experience delivering global programs to the role. Caroline’s close and practical information security knowledge stems from her broad experience as a Cigital consultant, a Symantec product manager, and day-to-day leadership roles at eBay and Zynga. Caroline also hosts the Humans of InfoSec podcast, teaches cybersecurity courses on LinkedIn Learning and has authored the popular textbook Security Metrics, A Beginner’s Guide. Caroline holds a bachelor’s degree in electrical engineering and computer sciences from UC Berkeley and a certificate in finance and accounting from Stanford University Graduate School of Business.

Bryan HurdBryan Hurd, VP, Stroz Friedberg

Bryan Hurd is a cybercrime, computer security, terrorism and homeland security executive with over 25 years of creating programs that have national and international impact. A U.S. Naval Academy graduate and veteran, Bryan founded the U.S. Navy’s first cyber counterintelligence program at NCIS, and built the global computer forensics program for EDS (now HP). He led innovation for the entire US watch listing system at the National Counterterrorism Center (NCTC).

Richard RushingRichard Rushing, CISO, Motorola Mobility

Richard Rushing is the Chief Information Security Officer for Motorola Mobility LLC. Richard participates in corporate, community, private, and government security councils and working groups, setting standards, policies, and solutions for current and emerging security issues. As Chief Information Security Officer for Motorola Mobility, he has led the organization’s security effort by developing an international team to tackle targeted attacks, cyber-crime, and emerging threats to mobile devices. He has organized, developed, and deployed practices, tools, and techniques to protect the enterprise’s intellectual property worldwide. A much-in-demand international speaker on information security, Richard has spoken at many of the leading security conferences and seminars around the world.