Agile Security – Adapting to Change
Samy Kamkar is an independent security researcher, best known for creating The MySpace worm, the fastest spreading virus of all time. His open source software, hardware, and research highlights the insecurities and privacy implications in everyday technologies, from the Evercookie which produces virtually immutable respawning cookies, to SkyJack, a drone that wirelessly hijacks and autonomously controls other drones. [more]
Mark Weatherford is SVP and Chief Cybersecurity Strategist at vArmour. He has more than 20 years of security operations leadership and executive-level policy experience in some of the largest and most critical public and private sector organizations in the world. Prior to vArmour, he was a Principal at The Chertoff Group and in 2011 was appointed by President Obama as the DHS’s first Deputy Under Secretary for Cybersecurity. [more]
Rich Smith is the Director of Duo Labs, supporting the advanced security research agenda for Duo Security. Prior to joining Duo, Rich was Director of Security at Etsy, co-founder of Icelandic red team startup, Syndis, and has held various roles on security teams at Immunity, Kyrus, Morgan Stanley, and HP Labs. Rich has worked professionally in the security space since the late 90’s in a number of roles including building security organizations, security consulting, penetration testing, red teaming, exploit development and attack tooling. [more]
Deborah A. Snyder serves as Chief Information Security Officer (CISO) for New York State, in the Office of Information
Technology Services (ITS). In her role, she oversees the Enterprise Information Security Office, and directs a
comprehensive program of governance, risk management and compliance functions, vulnerability management, threat
intelligence, cyber incident response, and training and exercise services. [more]
Building Cyber Deterrence
David started TrustedSec and Binary Defense Systems (BDS) with the vision of helping companies with information security. TrustedSec provides information security consulting services for organizations all around the world. BDS is a global Managed Security Service Provider (MSSP) and software security company which detects attackers in the early stages and prevents large-scale attacks.[more]
Kelly Shortridge is currently the Product Manager for security ratings platform, SecurityScorecard. In her spare time, she conducts research into the applications of behavioral economics and behavioral game theory to information security, on which she has spoken at international conferences including Black Hat, Troopers, and Hacktivity. [more]
Russ McRee is Group Program Manager of the Blue Team for Microsoft’s Windows & Devices Group (WDG). He writes toolsmith, a monthly column for information security practitioners, and has written for other publications including Information Security, (IN)SECURE, SysAdmin, and Linux Magazine. [more]
Technology, Privacy and Security: Evolving to Meet Modern Challenges
Jeremiah Grossman’s career spans nearly 20 years and he has lived a literal lifetime in computer security to become one of the industry’s biggest names. And since Jeremiah earned a Brazilian Jiu-Jitsu black belt, the media has described him as “the embodiment of converged IT and physical security.” Preventing attacks from the scariest cyber-criminals is all in a day’s work for Jeremiah, but staying a keystroke ahead of the bad guys isn’t easy. In 2001, Jeremiah founded WhiteHat Security, which today has one of the largest professional hacking armies on the planet. [more]
Diana Kelley is Executive Security Advisor to IBM Security and manages the IBM Security Newsroom. As ESA she leverages her 25+ years of cyber risk and security experience to provide advice and guidance to CISOs and security professionals. She is a regular contributor to SecurityIntelligence, X-Force Research and a co-author of IBM’s “Securing the C-Suite” study. She is a faculty member with IANS Research and serves on the Advisory Board for InfoSec World, Structure Security and the Content Committee for the Executive Women's Forum. She was an IEEE “Rock Star of Risk” in 2016 and speaks frequently at major conferences including: TED, RSA, CyberTech, CompuTex, and InfoSec World [more]
A Look at Cybersecurity from a Professional Fusion: Panel Discussion w/ Q&A
Not your average Cybersecurity Panel: This panel steers away from the standard CISO panel, and gives us the experiences & perspectives of various walks of professional lives. From technical engineer, security advisor, CISO, and more, this panel will share their individual points of view on today’s cybersecurity challenges, and how their role affects their organization’s response to these challenges. There will also be a Q&A session to allow attendees to chime in with their pertinent questions.
Also featuring Keynote speaker Diana Kelley
The Right to Privacy: Balancing Privacy and Security
CTO SANS Internet Storm CenterAs Dean of Research for the SANS Technology Institute, Johannes is currently responsible for the SANS Internet Storm Center (ISC) and the GIAC Gold program. He founded DShield.org in 2000, which is now the data collection engine behind the ISC. [more]
VP & Chief Information Security Officer - XeroxMark Leary is an Information Technology security professional in the government and commercial sectors, and has held successive positions of corporate security oversight in Defense, Aerospace, Manufacturing and Services industry segments. [more]
Vice President - Portfolio Marketing - IBM SecurityCaleb Barlow is an enterprising hi-tech executive with global experience in product management, marketing, software development and services. He has led multiple software product portfolios at IBM Security including Application, Data, Mobile, and Critical Infrastructure Security. [more]
Director - Field Marketing - Kaspersky LabMark Villinski brings more than 20 years of technology sales, marketing experience and channel leadership to Kaspersky Lab. As Director, Field Marketing, Mark is responsible for field marketing efforts in the United States and for increasing awareness of Kaspersky Lab as a thought leader in the online security industry. [more]
No Borders: Expanding Chains of Trust
Veteran industry expert and SANS Senior Instructor
Paul Henry is a Senior Instructor with the SANS Institute and one of the world's foremost global information security and computer forensic experts with more than 30 years of experience covering all 10 domains of network security. (more)
ISSA President and security luminary
Ira Winkler, CISSP is President of Secure Mentem. He is considered one of the world’s most influential security professionals, and has been named a “Modern Day James Bond” by the media.
Ms. Jaime L. Daley is an Assistant Director with the New York State Division of Homeland Security and Emergency Services, Office of Counter Terrorism (OCT), where she manages a group of analysts focused on homeland security and cyber threats. (more)
Michael Pinch is an experienced healthcare technology executive, currently the Chief Information Security Officer for the University of Rochester Medical Center. (more)
Bruce Jones is the Chief Information Security Officer (CISO) for Excellus BlueCross BlueShield and is a Director for the Gates Volunteer Ambulance Service (GVAS). (more)
Dwayne Foley is the Security Manager for Global Information Services at CooperVision. (more)
Eric is presently the IT Director/Leader for Byrne Dairy, a Central New York food process manufacturer. (more)
Renowned Security Technologist and CSTO of BT.
Training Director, SANS Securing The Human Program.
Director for Software and Supply Chain Assurance, Cyber Security and Communications, U.S. Department of Homeland Security.
- Business Security
- Technical Security
- Mobile / Cloud Security
- InfraGard / Cybercrime
- Threat Landscape
- Solutions & Demonstrations
Our 2012 Key Note speakers were Dr. Gary McGraw, CTO of Cigital, Inc. and Jeff Williams, CEO & Co-Founder, Aspect Security.
Each year, during National Cyber Security Awareness Month, the Rochester Security Summit features education opportunities for executives, CFO, CIO/CSO, business managers, security professionals, IT managers, technical specialists, help desk staff, and developers.
In 2012, the Summit gathered more than 200 attendees for 28 outstanding technical presentations -- along with three Ethical Hacking training sessions