Guest Speakers
![Jonathan Baker](http://assets.swoogo.com/uploads/medium/2380969-63f4fd1f574c1.png)
Jonathan Baker
Director of Research and Development, Center for Threat-Informed Defense
MITRE Engenuity
Innovating with Attack Flow Fireside Chat
Changing the Game on the Adversary
![David Branscome](http://assets.swoogo.com/uploads/medium/1655427-6233a281a2ac6.jpeg)
David Branscome
Cloud Security Architect
Microsoft
"How did I miss that?" - Why SOC Analysts Might Overlook Evidence in a Threat Investigation
![Paul J. Bihuniak](http://assets.swoogo.com/uploads/medium/2320848-63d1208d1494d.jpg)
Paul J. Bihuniak
Chief Operating Officer
SOC Prime
On the Cyber Frontline: Lessons Learned from Russian Aggression and Cyber Defense in Ukraine
![Lindbergh Caldeira](http://assets.swoogo.com/uploads/medium/2317290-63cf1341642b2.png)
Lindbergh Caldeira
Cyber Security Operations Manager
SA Power Networks
Lessons From the Trenches: Building a Threat Led Security Operations Capability (SOC)
![Francesco Chiarini](http://assets.swoogo.com/uploads/medium/2317408-63cf1ff4ce3cf.png)
Francesco Chiarini
SVP, Resilience & Architecture
Standard Chartered Bank
High Value Targets: An Adversarial Viewpoint For Increased Cyber Resilience
![Ian Davila](http://assets.swoogo.com/uploads/medium/2317438-63cf21edbb4c1.png)
Ian Davila
Lead Adversary Emulation Engineer
Tidal Cyber
Mind the Gap: From CTI to Defensive Improvements with Community Resources
![Gerardo Fernandez Navarrete](http://assets.swoogo.com/uploads/medium/2317310-63cf1536a54e0.png)
Gerardo Fernandez Navarrete
Senior Security Engineer
VirusTotal
Deception at Scale: How Malware Abuses Trust
![Kevin Finch](http://assets.swoogo.com/uploads/medium/2505610-642f12a374cfb.png)
Kevin Finch
Senior Business Continuity Architect
Sayers
You're a CISO... But Now You're Running a BC Program?
![Calin Gheorghiu](http://assets.swoogo.com/uploads/medium/2317434-63cf215a4923b.png)
Calin Gheorghiu
Director, Cyber Resilience
Standard Chartered Bank
High Value Targets: An Adversarial Viewpoint For Increased Cyber Resilience
![Ahmet Kilinc](http://assets.swoogo.com/uploads/medium/2317340-63cf17b88bd69.jpeg)
Ahmet Kilinc
Managed Threat Hunting Leader
EY
Intelligence Driven Threat Hunting with Adversary Simulation and Purple Teaming
![Jason Maynard](http://assets.swoogo.com/uploads/medium/2381325-63f513039a36d.png)
Jason Maynard
Field CTO Cybersecurity
Cisco Systems Canada
Cat and Mouse - Defender’s Need Better Mousetraps
![Victor Monga](http://assets.swoogo.com/uploads/medium/2317493-63cf2deb145e4.png)
Victor Monga
CISO at Virtually Testing Foundation & Interim Manager, Technical Marketing, Security
VMware
Uncovering the Unknown: The Importance of Threat Hunting in Defending Today's Organizations
![Rick McElroy](http://assets.swoogo.com/uploads/medium/2380621-63f4e8e5a7ae5.png)
Rick McElroy
Principal Cybersecurity Strategist
VMware
Uncovering the Unknown: The Importance of Threat Hunting in Defending Today's Organizations
![Susan Peediyakkal](http://assets.swoogo.com/uploads/medium/2364692-63eabb597eadb.jpg)
Susan Peediyakkal
InfoSec Operations Manager
NASA
Management Matters, but Leadership Matters More: Leading with EQ
![Scott Small](http://assets.swoogo.com/uploads/medium/2317459-63cf25f89d95f.png)
Scott Small
Director of Cyber Threat Intelligence
Tidal Cyber
Mind the Gap: From CTI to Defensive Improvements with Community Resources
![Tracey Webb](http://assets.swoogo.com/uploads/medium/2364532-63eab32d31986.png)
Tracey Webb
Director of Information and Cyber Security Operations
Global Data Systems
Purple Teaming Mega-Panel
![Jason Keirstead](http://assets.swoogo.com/uploads/medium/2356713-63e5344c8bdc6.png)
Jason Keirstead
CTO of Threat Management & Distinguished Engineer
IBM
Innovating with Attack Flow Fireside Chat
![Dr. Jannell MacAulay](http://assets.swoogo.com/uploads/medium/2380644-63f4ea68dacf1.png)
Dr. Jannell MacAulay
Human Performance Specialist, Executive Leadership Consultant, Combat Veteran and Leader
From Combat in the Field to Cybersecurity Battles: Mindfulness is for Everyone
![Josephine Wolff](http://assets.swoogo.com/uploads/medium/2380716-63f4ede697083.png)
Josephine Wolff
Associate Professor of Cyber Security and Policy
Tufts University
Cyberinsurance in 2023
![Iman Ghanizada](http://assets.swoogo.com/uploads/medium/2392386-63f8f75ac1c54.png)
Iman Ghanizada
Global Head of Autonomic Security Operations
Emerging Threats, ATT&CK, and the CISA Alert Process
![James Stanley](http://assets.swoogo.com/uploads/medium/2392089-63f8ee49777a2.png)
James Stanley
Chief, Product Development
Cybersecurity & Infrastructure Security Agency (CISA)
Emerging Threats, ATT&CK, and the CISA Alert Process
![Travis Smith](http://assets.swoogo.com/uploads/medium/2451860-6414a1a550c29.png)
Travis Smith
Vice President of the Qualys Threat Research Unit
Qualys, Inc.
Vulnerability and Misconfiguration Informed Defense
![Greg Lavender](http://assets.swoogo.com/uploads/medium/2440895-6410a4c5bcd83.png)
Greg Lavender
Senior Vice President, Chief Technology Officer (CTO), General Manager of the Software and Advanced Technology Group (SATG)
Intel
Opening Keynote
Evolution of Cybersecurity
![Madeline Carmichael](http://assets.swoogo.com/uploads/medium/2447205-6413240cdf41d.png)
Madeline Carmichael
Senior Threat Intel Librarian (MSTIC)
Microsoft
Emerging Threats, ATT&CK, and the CISA Alert Process
AttackIQ Speakers
![Carl Wright](http://assets.swoogo.com/uploads/medium/2476291-6421e715a8719.png)
Carl Wright
Chief Commercial Officer
AttackIQ
Opening Keynote
Evolution of Cybersecurity
Innovating with Attack Flow Fireside Chat
Changing the Game on the Adversary
![Jonathan Reiber](http://assets.swoogo.com/uploads/medium/1093102-60906136e2ff5.jpg)
Jonathan Reiber
VP, Cybersecurity Strategy and Policy
AttackIQ
Advanced Cybersecurity Reporting with Jupyter Notebooks
Emerging Threats, ATT&CK, and the CISA Alert Process
Seeing Through the Security Illusion
Cyberinsurance in 2023
From Combat in the Field to Cybersecurity Battles: Mindfulness is for Everyone