Xe1phix is a certified Linux Systems Administrator (LPIC-1, Linux+) with over 7 years experience in Unix centric systems. He is currently studying for his LPIC-2. He excels especially in system/kernel hardening, malware analysis, and memory forensics. He works for a Fortune 1000 company providing hardware/software support. Xd1phix also provides community support for the Parrot Linux project.

Michael Kiefer

Mr. Michael Kiefer is a globally recognized network and security expert and risk visionary. Michael brings more than 30 years of thought leadership and experience with executive roles at ADP, Cisco, AVAYA, Beyond Security, Trustwave, Rapid Engines and for the past decade BrandProtect. He is a Board Advisor for the FS-ISAC and the IT-ISAC in America, ISACA (Social Media Risk) and IEEE (Project Management) authored and has been on the Board of a financial institution, chairing the risk committee. He is also a member of National Association of Corporate Directors and an engineering graduate from M.S.O.E.. His topical social media risk training has been presented in America, Canada, Croatia, Austria, England, France, Germany, Italy, Czechia, Romania, Slovakia and South America to thousands of financial institutions, globally.

Daniel Stein, Acting Branch Chief for Cybersecurity Education and Awareness DHS

Dan Stein is Acting Branch Chief for the Cybersecurity Education and Awareness branch within the Department of Homeland Security (DHS). Dan is the former program lead of the National Cybersecurity Education and Training Program (NCTEP), which includes the nationally-focused Federal Virtual Training Environment and Cybersecurity Training Events Program. Dan has supported DHS’s interests in cybersecurity education and training for eight years, both as a federal employee and as a contractor. He has also been active in federal government information security efforts for the past eleven years. Dan recently graduated from the U.S. National War College with a Master of Science in national security strategy. He also holds two master’s degrees from the University of Texas at Austin and a bachelor’s degree from the University of Rochester.

Killian Ditch

Killian has been involved in the tech industry for about 10 years now, and while he has dabbled in security throughout, the past five years have been a deep dive into offensive techniques. He has worked as a penetration tester for Coalfire in Denver, CO for the past two years, where he attempts to relate the technical aspects presented by vulnerabilities in networks, applications, and people to actionable business risks that companies can address.

Charles Parker

Charles Parker, II has been working in the info sec field for over a decade, performing pen tests, vulnerability assessments, consulting with small- to medium-sized businesses to mitigate and remediate their issues, and preparing IT and info sec policies and procedures. Mr. Parker’s background includes work in the banking, medical, automotive, and staffing industries.

John Bambenek, Manager of Threat Systems, Fidelis Cybersecurity

John Bambenek is Manager of Threat Systems at Fidelis Cybersecurity and an incident handler with the Internet Storm Center. He has been engaged in security for 15 years researching security threats. He helped investigate the DNC breach and various other election-related cybersecurity cases. He is a published author of several articles, book chapters and one book. He has contributed to IT security courses and certification exams covering such subjects as penetration testing, reverse engineering malware, forensics, and network security. He has participated in many incident investigations spanning the globe. He speaks at conferences around the world and runs several private intelligence groups focusing on takedowns and disruption of criminal entities.

Aelon Porat, Information Security Manager, Cision

Aelon Porat is an information security manager at Cision. He has extensive experience attacking and defending corporate environments. He likes to jump inside networks and out of planes.

Victor Gevers (0xDUDE), Senior Security Specialist Dutch Government

Victor Gevers (also known as 0xDUDE) is a senior security specialist working as innovation manager for the Dutch Government, specialized in network, mobile, and web application security. He performs research on state-of-the-art attack and defense mechanisms, hacking techniques and OSINT. In his free time he is a vulnerability researcher and hunts down weak security implementations. In several occasions he has being pointed out to be a true responsible disclosure evangelist, practicing the art over 19 years and has made over five thousand responsible disclosures world-wide.

Ira Winkler, President Secure Mentem

Ira Winkler, CISSP is President of Secure Mentem and author of Advanced Persistent Security. He is considered one of the world’s most influential security professionals, and has been named a “Modern Day James Bond” by the media. He did this by performing espionage simulations, where he physically and technically “broke into” some of the largest companies in the World and investigating crimes against them, and telling them how to cost effectively protect their information and computer infrastructure. He continues to perform these espionage simulations, as well as assisting organizations in developing cost effective security programs. Ira also won the Hall of Fame award from the Information Systems Security Association, as well as several other prestigious industry awards. Most recently, CSO Magazine named Ira a CSO Compass Award winner as The Awareness Crusader.

Danielle Kingsbury, President and Founder CyberSecPsych

Danielle Kingsbury is president and founder of CyberSecPsych, where she focuses on the cognitive and behavioral psychological mechanisms that create strong security cultures within organizations. Her goals are to improve security awareness in the workplace and among children through applying principles learned from her past experience as a practicing therapist. She is also working to make the cybersecurity industry more attractive to Women and Millennials and closing the employment gap. She holds an M.A. in Clinical Psychology and has worked in a variety of settings, including schools and non-profits. She can be contacted through her website at http://www.cybersecpsych.com.

Sarah Isaacs, Co-Founder Conventus

Sarah is co-founder of Conventus, a cyber security software company focusing on providing the visibility needed to track and reduce risk. Outside of work, she is passionate about promoting women in technology and speaks and writes often on the subject.

Bob West, CEO Echelon One

Bob is CEO of Echelon One. He was recently managing Director at CareWorks Tech and has over 30 years of experience in corporate and startup environments. Bob is a frequent speaker on the subject of information security and risk, intellectual property theft, cloud computing, mobility, and on global policy issues such as payment fraud and critical infrastructure. Bob is on the board of directors at the Global Identity Foundation and the USA Track and Field Foundation. He has been on the advisory boards for Agilance, Air Patrol, CipherCloud, the Trusteer. He has also been on the board of management for the Jericho Forum, the University of Detroit Mercy\u2019s College of Liberal Arts and Education advisory board, Securent\u2019s advisory board, TriCipher\u2019s advisory board, a member of RSA Security\u2019s Customer Advisory Council, and the ISS Customer Advisory Council.

Lauren Kinsey, Cybersecurity Awareness and Inclusion Advocate

Lauren Kinsey has been active in diversity and inclusion in technology since she gave a TEDx Talk on the topic in 2015. She is currently the Chair of Diversity and Inclusion for the Ohio LinuxFest. She’s been a speaker on inclusion in tech at the Ohio State University and the Massachusetts Institute of Technology. She has a passion for cybersecurity and is currently in talks with an organization to collaborate to create a security career training program for nontraditional students.
Lauren recently produced a documentary on Women in Tech, https://youtu.be/DKVawmqpBCc.

Katie Hanahan, Regional Director Agari

Katie Hanahan is the Regional Director for the Central United States and Central Canada at Agari, a Silicon Valley cybersecurity firm which guards against attacks initiated through fraudulent e-mails. Katie has nearly 15 years experience delivering cybersecurity solutions to Department of Defense and Global Commercial Clients. Prior to entering the cybersecurity space Katie spent time working as an aid worker in Pakistan and continues to volunteer with organizations supporting at risk women and children around the world.

John Bumgarner, Chief Technology Officer (CTO) at U.S. Cyber Consequences Unit

John Bumgarner is a former U.S Marine and U.S. Army Special Operations soldier. During his military career, he conducted a wide range of military and intelligence missions throughout the world. He has received formal training in diverse areas, including computer forensic techniques, intelligence analysis and long-range reconnaissance operations.In his civilian career, he holds several private sector certifications include CISSP, GIAC (Gold), and duel Masters degrees in Information Systems Management and Security Management.

Bumgarner has regularly served as an expert source and commentator for numerous national and international news organizations, including The Wall Street Journal, Bloomberg, Business Week, the Los Angeles Times, Reuters, The Economist, the Indian Times, and The Guardian, as well as numerous specialty and trade publications. He has appeared on NBC, CNN and the BBC, and has been heard on CBC/Radio-Canada, BBC Radio Northern Ireland and Federal News Radio in the United States. He is featured in the International Spy Museum’s “Weapons of Mass Disruption” cyber warfare exhibit in Washington, D.C.

His articles have appeared in the journal of the Information System Security Association, the Homeland Security Journal, the Information Operations Journal, the Counter Terrorist magazine, the Asia-Pacific Defense Forum, the National Defense Digest of Taiwan, and other leading security publications.

John has spoken at many conferences, including the Network Centric Warfare conference in Brussels, the Cyber Defense conference in Denmark, the Cyber Conflict Policy and Legal conference in Estonia, the World Cyber Security Technology Research Summit in Ireland, the Cyber Warfare conference in London and the In-Q-Tel CEO Summit in the United States.

He has been a guest lecturer at the Fletcher School, Oak Ridge National Laboratory, the Naval Postgraduate School and the Royal United Service Institute (RUSI).

Specialties: Certified Information Systems Security Professional (CISSP),
GIAC Certified Advance Incident Handling Analyst (GCIH),
NSA InfoSec Assessment Methodology (IAM) Certified,
NSA InfoSec Evaluation Methodology (IEM) Certified,
System Security Certified Practitioner (SSCP)

Todd Fitzgerald, SVP, Chief Administrative Officer Information Security and Technology Risk, Northern Trust

Todd is SVP and Chief Administrative Officer Information Security and Technology Risk, Northern Trust. He led multiple Fortune 500/large company information security programs for 19 years, was named 2016 Chicago CISO of the Year by AITP, ISSA, ISACA, Infragard and SIM, ranked Top 50 Information Security Executive and authored 3 books-Information Security Governance Simplified: From the Boardroom to the Keyboard, CISO Leadership: Essential Principles for Success (ISC2) and E-C Council Certified Chief Information Security Officer Body of Knowledge. Prior senior leadership includes Grant Thornton International, Ltd, ManpowerGroup, WellPoint (now Anthem) Blue Cross Blue Shield-National Government Services, Zeneca/Syngenta, IMS Health, and American Airlines. Todd earned a B.S. in Business Administration from the University of Wisconsin-La Crosse and Master Business Administration with highest honors from Oklahoma State University.

Aaron R. Warner, CEO & Lead Security Strategist, ProCircular, Inc.

Aaron Warner served as the Chief Information Officer with Integrated DNA Technologies as a part of more than twenty years. With a great team of very bright people, IDT was able to grow from thirteen employees to over nine hundred, from hundreds of thousands to hundreds of millions of dollars, and operated facilities in all worldwide geographies and serving over 95,000 customers in life sciences.

IDT sold to 95,000+ customers worldwide, ranging from the largest pharma companies to academic labs to cutting edge biotech. Each provided IDT with their most valuable and sensitive intellectual property to place an order, and all expected confidentiality and integrity. Protecting that information alongside IDT’s own corporate IP was one of Mr. Warner’s main areas of focus.

Aaron recently left IDT to launch ProCircular, Inc., a full-service information security and privacy firm dedicated to helping organizations improve the health of their security programs and ready them to better adapt to an ever-changing threat landscape. These customers can take advantage of years of strategic and technical experience and apply it to their own organizations, large and small.

He’s a Certified Information Systems Security Professional (CISSP) and certified Securiity+ engineer, a full member of the FBI’s Infragard partnership and earned an MBA from the Tippie School at the University of Iowa. He’s the proud father of two young children, Emily and Isaac, and shares the best parts of life with his wife and best friend Heather Warner. In his free time Aaron enjoys cave diving, back-country hiking, a nice bottle of wine a good Vonnegut or Kerouac novel.

Stephanie Siteman, Information Security Program & Operations Manager, Facebook

Accomplished leader within Information Security, Risk and Vendor Management. Knowledge of regulatory issues that come from SOX, PCI, HIPPA, and has led initiatives that has overcome these challenges. Collaborative and energetic nature allows to excel in team-leadership; able to perform and make wise, actionable decisions in ambiguous environments. Constantly seeks to optimize workflows and structures to drive value with a robust bias for action and desire to question the status-quo. Proven ability to manage multiple priorities, influence senior leadership/stakeholders, and cross function partners across an organization.

Phil Polstra, Associate Professor Bloomsburg University

Dr. Phillip Polstra is the author of Windows Forensics, Linux Forensics, Hacking and Penetration Testing with Low Power Devices, and hundreds of instructional videos. Hardware hacker and security professional. He is an international speaker and college professor.

Jen Fox, Sr. Security Consultant, VioPoint

Jen Fox, CIPT, is a Sr. Security Consultant and governance Practice Lead at VioPoint. Her 20+ years in IT and information security includes training, usability design, business process analysis, risk management, vendor risk management, and security awareness. Specialties include information elicitation and business/technology translation. Jen is a locksport enthusiast and Myers-Briggs nerd. She holds a DEF CON black badge for winning the Social Engineering Capture The Flag (SECTF) competition.

Richard Marshall, CEO, Cinturion (former Associate General Counsel, NSA / former Director of Global Cyber Security Management, DHS)

[Cancelled due to weather] Mr. Marshall is Chairman of the Board of Cinturion Corp. and CEO of X-SES Consultants, LLC. He also serves as General Counsel, Data On ACID; Executive Director, The Center for Understanding Change; and Strategic Adviser to: AquaComms Ltd. (Dublin, Ireland); ConsulSys (Bangalore, India); and Hatha Systems (Washington, DC, USA) among others.

A nationally and internationally recognized thought leader on cyber related policy, legal and technical issues, he has been a keynote speaker on cyber executive leadership issues at conferences in Germany,England, the United States,India,Moldova, China, and Switzerland and a Cyber Security commentator on CNN, BBC, Politico. FedScoop. the New York Times and Scientific American.

He has an impressive professional network and is highly respected for facilitating program and contract development. He has extensive leadership experience and success in designing growth strategies, integrating policy, culture and training with technology issues, building relationships and delivering lasting results. He is a strategic thinker who knows how to lead and most importantly, where to lead.

Mr. Marshall graduated from The Citadel with a B.A. in Political Science; Creighton University School of Law with a J.D; Georgetown University School of Law with an LL.M. in International and Comparative Law; was a Fellow at the National Security Law Institute, University of Virginia School of Law; attended the Harvard School of Law Summer Program for Lawyers; the Georgetown University Government Affairs Institute on Advanced Legislative Strategies; participated in the Information Society Project at Yale Law School and the Privacy,Security and Technology in the 21st Century program, Georgetown University School of Law and the US-Russia Cyber Security Workshop, Tufts University.

He has represented the United States before Her Majesty’s High Court of Justice in London and is licensed to practice before the Supreme Court of the United States

Spijk Selby

Spijk Spijk (it’s pronounced, “”Spike””) began blacksmithing at age 9, when he saw a local smith making nails and asked whether he could do it, too. At the recommendation of Jack Daniel, at age 12 Spijk studied smithing at Prospect Hill Forge in Waltham, MA. At age 13, he became the youngest apprentice ever at Hancock Shaker Village, an outdoor-history museum comprising 20 authentic historic buildings, a working farm, and extensive gardens. The buildings are staffed with interpreters who demonstrate Shaker trade crafts, among which blacksmithing is an important part. By age 17, he had established Rocky Hill Forge, a traditional blacksmithing and silversmithing company in New York’s Hudson Valley and Colorado’s Roaring Fork Valley.

RHF makes handcrafted forged iron work, including decorative pieces, knives and blades, and cane-toppers, using traditional techniques. These include heating the iron in a hand-cranked coal- and wood-fueled forge, using hand-operated hammers to shape, and using hand and minimal use of power tools to finish, his fine, gluten-free ironwork.

Spijk also makes hand-crafted silver products with the same respect to traditional, time-tested techniques.

Rocky Hill Forge (https://rockyhillforge.com)

Daniel Lim, Cyber Operations Officer (17A), 780th MI BDE, US Army

Dan is a developer for the US Army’s 780th Military Intelligence Brigade. Prior to joining the Army, he worked on his MS in statistics and PhD in political science at UCLA, with an emphasis on methodology and immigration studies. He also holds a BS in mechanical engineering from Yale University. His work experience includes the Center for Strategic and International Studies, the Naval War College, and the Jet Propulsion Laboratory. Dan’s favorite languages are R and Python, and he believes it self-evident that tabs are superior to spaces.

John Johnson, CEO/Founder, Aligned Security

Dr. John D. Johnson is CEO and Founder Aligned Security. He is also a founding board member of the Security Advisor Alliance (501c.3), a member of SC Media Editorial Board, and serves on advisory boards for innovative security startups.

John spent 17 years as security architect for a Fortune 100 global manufacturing company, where he managed infrastructure and developed strategy and secure architecture solutions for protecting a global corporate network, endpoints, industrial systems and the supply chain. His experience spans the public and private sectors, as well as industry verticals: technology, manufacturing, finance, energy, healthcare, education. John was previously network security manager for the Theoretical Division at Los Alamos National Laboratory, and an experimental nuclear physicist developing radiation systems for nuclear remediation and non-proliferation.

John has developed and taught numerous graduate cybersecurity courses and helped develop the CISO executive certificate program with University of Chicago, Booth School of Management. He is a frequent speaker at industry conferences and serves as program committee member for RSA Conference and Black Hat. John is founder and organizer of CornCon, an annual Midwestern cybersecurity conference and kids hacker camp. Over his career, he has served in leadership roles in technical and professional societies, including IEEE, InfraGard and (ISC)2. John has received various awards in recognition of his contribution to the profession, and was runner up for 2014 Chicago CISO of the Year. He is an IEEE Senior Member, Charter Member of FAIR Institute and Fellow of Ponemon Institute.

Shadrack Roberts, CISO Global Risk and Compliance, Cybersecurity & Privacy Official, HQ Army Sustainment Command

Global Information Assurance Strategy and Execution, Privacy (PII, PHI) Program Management, Risk Management and Compliance. Security Architecture. Certification & Accreditation, NIST, RMF for DOD IT.

Enabling secure global command and control communications and data for logistical decision makers. Putting out fires.

Army Sustainment Command (ASC) is a global organization responsible for sustaining Army and Joint Forces in support of Combatant Commands.The ASC organizes, trains, and sustains a quality deployable force, while integrating materiel and services for warfighters. ASC provides the US Army with materiel readiness,strategic depth, flexibility, and power projection to meet its world-wide contingency missions. ASC is made up of seven Army Field Support Brigades in support of Combatant Commands, the Army’s Distribution Management Command, the Army Sustainment Command: Army Reserve Element, and 20 Army Field Support Battalions consisting of more than 85,000 military, civilian and government contractors. ASC provides oversight for logistics operations at CONUS and OCONUS Army installations thru 73 Logistics Readiness Centers.

Michael Daugherty, Author, Founder, President & CEO of LabMD

Michael J Daugherty is Founder, President & CEO of LabMD, a cancer detection laboratory based in Atlanta, Georgia, and is the author of the book “The Devil Inside the Beltway, The Shocking Expose of the US Government’s Surveillance and Overreach into Cybersecurity, Medicine and Small Business”.

He holds a BA in Economics from University of Michigan-Ann Arbor. Before founding LabMD Mike spent 18 years at US Surgical and Mentor. He regularly blogs at MichaelJDaugherty.com and sits on the boards of Snoopwall, a cyber privacy company in Nashua, New Hampshire, The Private Bank of Buckhead in Atlanta, Georgia, and writes for CyberDefense Magazine. He is a private pilot and resides in Atlanta, Georgia.

Carlos F. Lerma, Senior Information Security Architect at Beam Suntory Inc

Carlos F. Lerma is a Senior Information Security Architect at Beam Suntory Inc, based in Deerfield, IL. He holds a bachelor’s degree in accounting from Universidad Autónoma de Tamaulipas (Ciudad Victoria, Mexico) and a Master of Science in Telecommunications and Network Management from Syracuse University. His research interests are cyber intelligence systems, threat management, SIEM systems and the use of strategic intelligence in information security management. The rest of his spare time is spent playing baseball and beer-league softball, serving as lead singer for the now-defunct metal cover band “The Fat Vampires”, imbuing in as many craft beers as possible and hating the New York Yankees as well as the New England Patriots.

Eric Andresen, IT Security Manager at SSAB Americas

During Eric Andresen’s 27 year career in the IT Industry he has deployed communication networks in six countries, worked in a variety of management roles within project management, critical infrastructure, and operations. The last 21 years have been spent in the industrial environment where his positions have included enterprise server management, data networks and voice communication networks. Currently, Eric is the IT Information Security manager for a global Steel Manufacture. Eric is part of a global team that shapes his companies international policies and programs.

Eric is a graduate of the University of Massachusetts where he was inducted into Alpha Sigma Lambda and earned a certification in Security Management and Homeland Security. Eric’s also holds many IT certifications from HP, CompTIA, and Microsoft and is currently completing a degree program in Information Technology and Criminal Justice. Eric is a member of the Chicago InfraGard Chapter and founding member of the Quad Cities Cybersecurity Alliance where he volunteers.

Richard Rushing, CISO Motorola Mobility LLC

Mr. Richard Rushing is the Chief Information Security Officer for Motorola Mobility LLC.; Richard participates in several corporate, community, private, and government Security Council’s and working groups setting standards, policies, and solutions to current and emerging security issues. As Chief Information Security Officer for Motorola Mobility, he has led the security effort by developing an international team to tackle the emerging threats of mobile devices, targeted attacks, and cyber-crime. He organized developed and deployed practices, tools and techniques to protect the intellectual property across the worldwide enterprise. A much-in-demand international speaker on information security Richard has presented at many leading security conferences and seminars around the world.

Edward Marchewka, Director of IT, Gift of Hope Organ & Tissue Donor Network

I am an executive with over 16 years of experience delivering information via technology in security and infrastructure from being a business owner to Fortune 250 experience. I hold degrees in Engineering, Mathematics, and Business and a Certificates in Non-Profit Management and Leadership. My most recent experience, as the Director of Information Technology for Gift of Hope, one of 58 OPOs that make up the nation’s donation system, we work with 180 hospitals and serve 12 million people in our donation service area.

I have a deep understanding of the importance of creating a culture that embraces information technology and using it to enable the business. Working with different teams to create policies that lowers the risk to the business without becoming a road block to productivity is critical for this type of role and I can facilitate that. Communication around IT projects is key from awareness training to reporting out metrics to senior leadership all helps to keep all stakeholders abreast.

Aaron Bedra, Founder, Modeled Thinking

Aaron Bedra is the founder of Modeled Thinking, where he works at the intersection of software, security, and business. He has served as a Chief Security Officer, Chief Technology Officer, and Principal Engineer/Architect. He has worked professionally on programming languages, most notably Clojure and ClojureScript. He is the co-author of Programming Clojure, 2nd Edition.

Michael Scheidell, CSO, Security Privateers

A recognized expert in the information security and privacy community, a certified security professional with a strong history of innovation and entrepreneurship and a frequent conference speaker and subject matter expert in Information Security and Privacy.

Developed a suite of IT security products with impressive results—including a patented intrusion detection system, an award-winning email security solution and a revolutionary IT Risk and Assessment framework currently used by large multinational companies, healthcare organizations and financial institutions to ensure their privacy and security.

Joshua McAllister, Team Lead, National Cybersecurity Assessment and Technical Services (NCATS) DHS

Josh is a team lead and penetration tester for DHS’s National Cybersecurity Assessment and Technical Services (NCATS) branch. He has been with DHS since 2012, and currently provides penetration testing services for a variety of stakeholders including the Federal government and other organizations across the public and private sector.

David Link, Manager of Risk and Vulnerability Assessment NCATS DHS

David Link came to the Department of Homeland Security (DHS) in 2011 to join the newly created Red Team for the Federal Government. Mr. Link has over 20 years in the information security field and significant experience in doing penetration testing and working with security teams. At DHS he manages the Risk and Vulnerability Assessment under the National Cybersecurity Assessments and Technical Services (NCATS) program.

Fred Kwong, CISO, Delta Dental Plan Association

Fred Kwong joined DDPA at the end of May 2016, and has over 15 years of security leadership and management experience.

Fred is responsible for establishing and maintaining a corporate-wide information security management program to ensure information assets are adequately protected. He is responsible for identifying, evaluating and reporting on information security risks in a manner that meets compliance and regulatory requirements. As the chief information security officer, Fred will proactively work with business units to implement practices that meet defined policies and standards for information security.

Prior to DDPA, Fred served as director of security strategy and architecture for Farmers Insurance, a subsidiary of Zurich Insurance. He was accountable for Zurich’s global privilege access program, developed their three-year cyber strategy and roadmap, and led the effort to launch Zurich’s first risk management program. Prior to his time at Farmers/Zurich, Fred worked for US Cellular and was accountable for their security practice, where he also led efforts to bring US Cellular into PCI 3.0 compliance for the first time.

Fred is a highly recognized thought leader in security and is often asked to speak and chair at national/international security conferences, including Evanta (now Gartner), Interop, Blackhat, Argyle, CBI, Security Shark Tank, and CampIT Conferences. He often participates in panels to discuss the latest security threats and issues with other thought leaders from United, GE, Transunion, Grant Thornton, Walmart and Motorola Mobility, to name a few. Fred has earned the CISSP, CISA, CISM, PMP and ITILv3f certifications and is Yellow-Belt certified in Six Sigma.

Fred also serves as an adjunct faculty member at Roosevelt and Benedictine Universities. He received his Bachelor of Arts in psychology and professional communications, Master of Business Administration in management information systems from Roosevelt University, and holds his doctorate in organization development from Benedictine University.

Jim Libersky, President, Barrier1

I have over 25 yrs in networking and bringing new technologies to market. Presently Pres. and one of the principals in Barrier1.  Barrier1 was one of the first to develop and launch an Intelligent- Analytics based- Automated cyber security platform. In the past 10 yrs he has had several position most recently Pres. He has nurtured through several patents, many State and National Awards such as SC Magazine Innovator of the Year for 3 straight years in a row, SC Mag. Hall of Fame winner, Selected to the Cyber Security Team for Super Bowl 50, and CIO Mag. BYOD leadership bringing Intelligence to BYOD.

Barry Suskind, Senior Director, Infrastructure Security, FINRA

I’ve been a security practitioner for over 25 years. My experiences in Infosec grew out of my work as a CAD/CAM/CAE systems administrator, running a variety of systems and applications before moving full time into Infosec as everyone was drawn to connecting to the Internet. I’ve built firewalls, made custom modifications to handle special requirements, managed antivirus, antispam and content filtering systems while understanding the nuances of balancing security and business needs.

This has culminated with my managing a team of Infosec professionals who maintain antivirus, antispam, content filtering, intrusion detection, data loss prevention systems and perform vulnerability assessments, approve changes to firewall rules and keep watch over systems, networks and activities looking for cyber-related malfeasance. This allows me to pursue new technologies, plan the security architectures for cloud deployments and BYOD in the enterprise.

I’ve managed to keep up with the ever changing technologies in the IT world. Always researching, always learning and always analyzing the activities on our network, systems and applications. I’ve been a CISSP since 1999 and understand the need to be nimble, keep up on the changing landscape and know the difference between marketing FUD and real security benefit. I always a quick study of complex environments with the ability to analyze where security weakness may lie or where suspicious activities may be occurring.

Nick Selby, Detective, DFW Police Department

Nick Selby is a Texas police detective who investigates computer fraud, and child exploitation. He is also a cyber-security incident responder. A frequent contributor to newspapers including the Washington Post and New York Times, Selby is co-host of the Quality Policing Podcast. He is co-author of Cyber Survival Manual: From Identity Theft to The Digital Apocalypse and Everything in Between; In Context: Understanding Police Killings of Unarmed Civilians; Blackhatonomics: Understanding the Economics of Cybercrime; and technical editor of Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace.