Pacific Northwest US Summit
Hybrid Summit March 22 - 23, 2022
This hybrid summit's agenda will cover Zero Trust, IAM, Ransomware, Privacy, Fraud, Payments, IoT, Cryptocurrency, End Point Protection, Cloud Security and more.
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.
Meydenbauer Center
Name :
Meydenbauer Center
Address :
11100 Northeast 6th Street, Bellevue, WA, USA
Dennis Tomlin
CISO
Multnomah County
Tomlin is the Chief Information Security Officer of Multnomah County in Oregon, where he is responsible for leading the county’s cybersecurity efforts. He manages a team of six security professionals that ensures endpoint and perimeter protection, incident response, forensics, identity...
Sean Murphy
CISO and SVP
BECU
Murphy is an accomplished cybersecurity executive with more than 20 years of experience in IT and a decade of experience leading information security and risk management in highly regulated industries and fast-paced organizations. As a senior vice president and chief...
Wade Ellery
VP of Solution Architects and Senior Technical Evangelist
Radiant Logic
Ellery is vice president of solutions architects and senior technical evangelist with Radiant Logic. He has extensive experience in enterprise IT direct and channel software and services, sales and management and in-depth knowledge and experience in enterprise IAM, IGA, risk...
Varsha Agarwal
Head of Information Security
Prosper Marketplace
Agarwal currently serves as the head of information security at Prosper Marketplace. She oversees all aspects of information security and privacy to support and enable business goals and objectives, manage risks with proactive security strategies and deliver on regulatory, legal...
Vahidin "Vaha" Memić
Solutions Architect
Trellix
Memić is a Solutions Architect with Trellix - an organization dedicated to protecting enterprises and governments against the next generation of cyberattacks by using intelligence-led security and technology. His proficiency with security architecture and aligning technical solutions with security governance...
Kevin Brennan
Special Agent
FBI Seattle
FBI Special Agent Kevin Brennan is currently assigned to the Seattle Field Office to investigate computer intrusions. He is also an FBI cyber instructor, teaching local, state, federal and international law enforcement agencies about cybercrime investigations. Prior to joining the...
Chris Burch
CISO
RoundGlass
Burch has practiced technology leadership over a career spanning nearly 30 years, transitioning to a deliberate focus on cybersecurity in the last decade. He is now serving in his second CISO role, taking on the challenge of building effective security...
Thomas Gentsch
Systems Engineer
Ermetic
Gentsch began his journey in tech working as a field engineer for MSPs in New England and later specialized in networking and cloud security as a systems engineer at Juniper Networks and at Tufin. In his current role at Ermetic,...
Eric Sanchez
CISO & Head of Global Security Governance
Kyowa Kirin North America
Sanchez spent 12 years at the Central Intelligence Agency developing and executing global cyber operations. He was regularly called upon by the director of operations to architect, lead and execute unconventional cyber operations against adversary executive leadership and other national...
William Lidster
CISO
AAA Washington
Lidster leads AAA Washington’s information security and compliance efforts. He is responsible for establishing a responsive, dynamic and flexible program to meet continually changing information security, regulatory and compliance needs in the organization. Lidster serves on the advisory board that...
Matt Tesauro
Distinguished Engineer
Noname Security
Tesauro is a distinguished engineer at Noname Security. When not writing automation code in Go, he is pushing for DevSecOps everywhere by contributing to open-source projects, presenting, training and continuing to co-opt new technologies. Prior to joining Noname, Tesauro rolled...
Vinod Brahmapuram
State CISO
State of Washington
Brahmapuram was appointed state CISO in October 2019. He oversees WaTech’s state Office of Cybersecurity and is responsible for establishing and leading the strategic direction of cybersecurity for state government, as well as advising the governor and legislators on key...
Kevin Patrick
Technical Solutions Architect
Cisco
Patrick works with some of Cisco’s largest customers to identify security solutions customized to their needs. He comes from a background in solution engineering and leading a support organization and has spent the last three years at Duo helping customers...
Lana DeMaria
Director, Data Privacy
Alaska Airlines
DeMaria is a motivated and results-oriented leader with international experience deploying impactful programs, landing global projects and establishing connections in the U.S., Russia, India, Canada, Ireland, South Africa, Singapore, Argentina, Egypt and the Czech Republic. She is experienced in supervising...
Alexander Vitruk
Senior Litigation Associate
Baker & Hostetler LLP
At BakerHostetler in Seattle, Vitruk defends and advises companies in complex litigation, with an increased focus on data privacy and cybersecurity matters. He has managed cases through all phases of litigation and arbitration and has secured positive outcomes for clients...
Tony Steffe
Senior Systems Engineer
Illumio
Steffe is a CISSP and regional systems engineer for Illumio, based in the Seattle, Washington area. For more than a decade, he has been engaged in network and internet security with an emphasis on increasing business interconnectedness. Prior to becoming...
Tom Field
SVP of Editorial
ISMG
Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world,...
Gary Gooden
CTO & Security Officer
Seattle Children's
Gooden is the CTSO at Seattle Children’s. He has over 20 years of experience in technology infrastructure and application development, with multidiscipline expertise across media and entertainment and consumer goods. He has extensive vendor management experience and has overseen more...
Collin Barry
Director, Cyber Threat Intelligence
Expedia Group
Barry leads Expedia Security and Threat Research Group, with responsibilities encompassing cyber threat intelligence, red teaming and adversary simulation, advanced threat hunting, and threat detection engineering. Prior to Expedia, he was a senior leader in Booz Allen Hamilton’s International Account...
Samant Nagpal
General Manager and Global Head of Risk
Square
Nagpal has two decades of experience in risk and payments. As the head of risk at Square, he is responsible for managing credit, fraud and chargeback risk and for building seller/merchant-facing risk products that help sellers manage their own risk-reward...
Adrian Mayers
CISO & VP
Premera Blue Cross
Dr. Adrian M. Mayers joined Premera Blue Cross in November 2019 as Vice President, IT and Chief Information Security Officer (CISO) for Premera Blue Cross. Dr. Mayers is responsible for providing and optimizing an enterprise-wide security program and architecture that...
Brian Shea
Business Information Security Officer (BISO)
Salesforce
Shea is an IT executive with 29 years of experience in IT operations and support, security, compliance, risk management and technology innovation. Currently, he is a business information security officer, or BISO, supporting multiple business units at Salesforce, delivering security...
Fabian Powell
Privacy Analyst
Alaska Airlines
Powell began his career as a legal counsel, focusing on the soft areas of intellectual property, copyright and trademark matters, and advising clients in privacy compliance. In the last several years, he has worked in private consulting, advising clients within...
Josh Johnston
Sr. Sales Engineer
Exabeam
Josh has been working in the cybersecurity community for the last 10 years. He was worked as SOC analyst, engineer, and information security program manager before coming onboard with Exabeam. Prior to his security work, he worked in the U.S....
Jerry Cochran
Deputy CIO
Pacific Northwest National Laboratory
Cochran serves as Pacific Northwest National Laboratory’s deputy chief information officer and division director of the Cybersecurity and DigitalOps Division, Computing and IT Directorate. He oversees cybersecurity, the office of the CISO, enterprise IT engineering and operations. Cochran also leads...
View Agenda
Security Organizations in the Digital Age
Sean Murphy, CISO and SVP, BECU
Gary Gooden, CTO & Security Officer, Seattle Children's
Adrian Mayers, CISO & VP, Premera Blue Cross

Two years into accelerated digital transformation, the way you work has changed. But has your security organization evolved at the same pace? Join this exclusive panel for leadership insights on: 

  • The new organizational alignment; 
  • Shifting from product to project teams; 
  • The cultural changes of forcing the team to "shift left."
Sean Murphy
Gary Gooden
Adrian Mayers
  • 09:10 AM
  • 09:39 AM
Cyber Implications of the Eastern European Crisis
Dennis Tomlin, CISO, Multnomah County
Eric Sanchez, CISO & Head of Global Security Governance, Kyowa Kirin North America
Kevin Brennan, Special Agent, FBI Seattle

For years, CISOs have argued the differences between cybersecurity during peacetime and during wartime. Now, with active hostilities in Ukraine, they see the stark differences - and potential repercussions.

This panel of security leaders tackles the questions many organizations are asking, including:

  • What's the risk to critical infrastructure outside of Eastern Europe? 
  • What might an attack look like? 
  • What messages should be conveyed to senior leaders and boards about supply chain risk?
Dennis Tomlin
Eric Sanchez
Kevin  Brennan
  • 09:45 AM
  • 10:14 AM
API Security: How Are You Securing the #1 Attack Vector?
Matt Tesauro, Distinguished Engineer, Noname Security

No surprise in the era of digital transformation: Gartner predicts that in 2022, application programming interface attacks will become the most-frequent attack vector. And yet many security professionals do not even know how many APIs they have in their environments - never mind their level of security.

So, what are you doing proactively to protect your environment from API vulnerabilities, design flaws, and misconfigurations? Learn why existing controls are not enough and what you can do to better your security posture.

Matt Tesauro
  • 10:20 AM
  • 10:49 AM
Exhibits & Networking Break

Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!


Stop by the Expo Hall.

  • 10:50 AM
  • 11:04 AM
Third-Party Risk: Hold Your Key Suppliers Accountable
Gary Gooden, CTO & Security Officer, Seattle Children's
Dennis Tomlin, CISO, Multnomah County
Varsha Agarwal , Head of Information Security, Prosper Marketplace
Chris Burch, CISO, RoundGlass

Vendor management is an old topic with new risks. In the post-SolarWinds, Kaseya and Log4j era, cybersecurity leaders are more sensitive than ever to the third-party relationships they have with appliance, service and software vendors. It isn't enough to put your critical suppliers through rigorous testing at onboarding. It's time for continuous monitoring - and accountability. Topics to discuss:

  • How to vet those critical suppliers and build in the right contract language for performance levels, breach notification and response; 
  • How to monitor your vendors' security posture - and your vendors' vendors; 
  • How to determine the protocol when there is an incident and engage your suppliers in incident response and testing.
Gary Gooden
Dennis Tomlin
Varsha  Agarwal
Chris Burch
  • 11:05 AM
  • 11:34 AM
How Identity Data Lays the Foundation for Innovation
Wade Ellery, VP of Solution Architects and Senior Technical Evangelist , Radiant Logic
Sean Murphy, CISO and SVP, BECU
Jerry Cochran, Deputy CIO, Pacific Northwest National Laboratory

What role does identity play in your organization? Is it seen as an enabler or a consistent roadblock? An escalating expense and headache or a key asset? Is your innovation “stuck” without a clear path forward? This panel will discuss the emerging fabric trends and why putting identity at the center is the strategic launchpad for successful innovation in a variety of initiatives such as regulatory compliance, Zero Trust Architecture, productivity, customer experience and more.

Wade Ellery
Sean Murphy
Jerry Cochran
  • 11:40 AM
  • 12:09 PM
Secure Cloud Infrastructure - Identity First
Thomas Gentsch, Systems Engineer, Ermetic

Cloud infrastructure is extremely complex, with thousands of workloads and data resources, service and human identities, and policies and configurations. With so many moving parts, it’s nearly impossible to clearly see or understand what is going on in your AWS, Azure and GCP environments - let alone control it. Efforts are exacerbated by the rapid pace of development, shortages in cloud expertise, and the number of stakeholders.

Ultimately the most important questions are: Is my data exposed? Who can access it? Only with clear, contextual, actionable risk insight into all identities, configurations and resources can you begin to grasp effective access and the risk to your data. Find out how an identity-first approach to cloud security can help you reduce your cloud attack surface and blast radius - and stay compliant.

Thomas Gentsch
  • 12:15 PM
  • 12:29 PM
CyberEdBoard, A CISO Community

View our CyberEdBoard Profiles in Leadership Interviews with Marene Allison, CISO at Johnson & Johnson, Diego Souza, Global CISO at Cummins, Nicole Ford, VP & CISO at Carrier and more.

  • 12:30 PM
  • 01:17 PM
CISO 1-on-1: Vinod Brahmapuram, State CISO, Office of CyberSecurity (OCS), State of Washington
Vinod Brahmapuram, State CISO, State of Washington

As the Washington state chief information security officer within the Office of Cybersecurity, Vinod Brahmapuram is at the heart of the state government's digital transformation and efforts to modernize SecOps. In this exclusive conversation, he discusses:

  • Improving digital services without compromising security; 
  • Adopting the zero trust framework in alignment with the federal government; 
  • Addressing the growing talent shortage.
Vinod Brahmapuram
  • 01:15 PM
  • 01:45 PM
To CERT or Not to CERT: Establishing Trust Without Certificates
Kevin Patrick, Technical Solutions Architect , Cisco

Critical resources need defense in depth beyond validating identity. Certificates provided a method to establish this trust. It is time to remove the calendar reminder for our certificate renewal. Duo’s Device Health Application can verify enrollment into corporate management systems without deploying certificates. Learn how this is done with some common asset management solutions.

Kevin Patrick
  • 01:50 PM
  • 02:04 PM
Breach Investigations: The Distinct Roles of Artificial and Human Intelligence
William Lidster, CISO, AAA Washington
Collin Barry, Director, Cyber Threat Intelligence, Expedia Group

There are too many alerts for humans to track and too much analysis needed to even determine in a reasonable time which alerts are meaningful. These are areas where machine learning can play a role in automating incident response functions. But what about when it's time to actually investigate an incident? At that point, what role do automated tools play, and what role needs to remain distinctly human?

In this panel, two cybersecurity leader share their experiences and insights on:

  • The role of ML/AI to define the threat landscape;
  • Efficiencies gained from automation;
  • Where human judgment is needed most.
William  Lidster
Collin Barry
  • 02:10 PM
  • 02:39 PM
Seize the Breach with Automation and ML-driven Analytics
Josh Johnston, Sr. Sales Engineer, Exabeam

Breaches happen, and 2021 was a record-breaking year for them. According to Identity Theft Resource Center research, there were 1,291 breaches publicly reported in 2021 as of September 2021 compared to 1,108 breaches in 2020; that’s a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t stopping the breaches from happening. Join us for a discussion of: 

  • Why SOC and security teams are way too limited by legacy SIEM; 
  • How machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation and response capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage; 
  • A simple maturity model based on outcomes and use cases that can vastly improve security operations.
Josh Johnston
  • 02:45 PM
  • 02:59 PM
Exhibits & Networking Break

Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!


Stop by the Expo Hall.

  • 03:00 PM
  • 03:14 PM
The Next Evolution in XDR – Are You a Confident Organization with Resilient, Dynamic and Living Security?
Vahidin "Vaha" Memić, Solutions Architect, Trellix
Brian Shea, Business Information Security Officer (BISO), Salesforce
Chris Burch, CISO, RoundGlass

How do you turn today’s threats into tomorrow’s advantage? Does your organization have proper tools that will learn and adapt to incoming and disruptive active threats? This is the promise of eXtended Detection and Response, or XDR. XDR enables detection, response and adaptive prevention, simultaneously. Ecosystems today need to be built to disrupt active threats and to be woven into your day-to-day operations. Join us in our discussion focused on security outcomes within your organizations.

Vahidin "Vaha" Memić
Brian Shea
Chris Burch
  • 03:15 PM
  • 03:44 PM
Zero Trust and Microsegmentation – Easier Than You Think
Tony Steffe, Senior Systems Engineer, Illumio

Zero Trust is one of the most talked-about themes in cybersecurity. While the term means different things to different people, we can all agree on two things: It’s a journey worth taking, and microsegmentation is a key pillar of that journey. The next question always is: How do you get started?

Regardless of the sophistication of ransomware, the end goal is always the same: Get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you with simple steps to protect yourself from these threats, including how to:

  • Gain visibility to where you are the most vulnerable; 
  • Close risky ports; 
  • Leverage tools you already have in place without adding layers of complexity. 

While the journey can seem intimidating, we’ll help you realize that it doesn’t take a team of 100 or a doctoral degree to deploy zero trust microsegmentation that will protect your organization and keep ransomware at bay.

Tony Steffe
  • 03:50 PM
  • 04:04 PM
Future of Payments & Fraud: A Conversation with Samant Nagpal, GM and Global Head of Risk, Square
Samant Nagpal, General Manager and Global Head of Risk , Square

Digital payments and digital transformation have much in common. Both have undergone revolutionary changes in condensed periods, and both have indelibly changed their respective landscapes.

In this session, Samant Nagpal of digital payments provider Square discusses the evolution of fraud schemes in his space, as well as the impact of emerging authentication technologies and the challenges of Square's global expansion.

Samant Nagpal
  • 04:10 PM
  • 04:39 PM
Biometrics and Privacy
Lana DeMaria, Director, Data Privacy, Alaska Airlines
Fabian Powell, Privacy Analyst, Alaska Airlines
Alexander Vitruk, Senior Litigation Associate, Baker & Hostetler LLP

Governments and industries in the private sector are ever interested in using biometrics for automatically identify or authenticate people. Biometrics definitely appear like the “golden key” of security – it’s much harder to spoof an iris scan or fingerprint than a password! However, collection of biometric data also comes with its share of unique risks.
Come to this session to learn how Alaska Airlines has embraced the use of biometrics to streamline and improve the guest experience without compromising guest privacy and security of their data.
 

Lana DeMaria
Fabian Powell
Alexander Vitruk
  • 04:45 PM
  • 05:14 PM
Cocktail Reception
  • 05:30 PM
  • 06:29 PM
Day 2 Agenda

All content from Day 1 will be available on demand from 9 AM - 5 PM PST on Day 2, Wednesday, February 23rd. Don’t miss the chance to log-in and consume any content you may not have had the chance to see at your own convenience.

  • 09:00 AM
  • 04:59 PM

This hybrid summit's agenda will cover Zero Trust, IAM, Ransomware, Privacy, Fraud, Payments, IoT, Cryptocurrency, End Point Protection, Cloud Security and more.
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.

Meydenbauer Center
Name :
Meydenbauer Center
Address :
11100 Northeast 6th Street, Bellevue, WA, USA

Dennis Tomlin
CISO
Multnomah County
Tomlin is the Chief Information Security Officer of Multnomah County in Oregon, where he is responsible for leading the county’s cybersecurity efforts. He manages a team of six security professionals that ensures endpoint and perimeter protection, incident response, forensics, identity...
Sean Murphy
CISO and SVP
BECU
Murphy is an accomplished cybersecurity executive with more than 20 years of experience in IT and a decade of experience leading information security and risk management in highly regulated industries and fast-paced organizations. As a senior vice president and chief...
Wade Ellery
VP of Solution Architects and Senior Technical Evangelist
Radiant Logic
Ellery is vice president of solutions architects and senior technical evangelist with Radiant Logic. He has extensive experience in enterprise IT direct and channel software and services, sales and management and in-depth knowledge and experience in enterprise IAM, IGA, risk...
Varsha Agarwal
Head of Information Security
Prosper Marketplace
Agarwal currently serves as the head of information security at Prosper Marketplace. She oversees all aspects of information security and privacy to support and enable business goals and objectives, manage risks with proactive security strategies and deliver on regulatory, legal...
Vahidin "Vaha" Memić
Solutions Architect
Trellix
Memić is a Solutions Architect with Trellix - an organization dedicated to protecting enterprises and governments against the next generation of cyberattacks by using intelligence-led security and technology. His proficiency with security architecture and aligning technical solutions with security governance...
Kevin Brennan
Special Agent
FBI Seattle
FBI Special Agent Kevin Brennan is currently assigned to the Seattle Field Office to investigate computer intrusions. He is also an FBI cyber instructor, teaching local, state, federal and international law enforcement agencies about cybercrime investigations. Prior to joining the...
Chris Burch
CISO
RoundGlass
Burch has practiced technology leadership over a career spanning nearly 30 years, transitioning to a deliberate focus on cybersecurity in the last decade. He is now serving in his second CISO role, taking on the challenge of building effective security...
Thomas Gentsch
Systems Engineer
Ermetic
Gentsch began his journey in tech working as a field engineer for MSPs in New England and later specialized in networking and cloud security as a systems engineer at Juniper Networks and at Tufin. In his current role at Ermetic,...
Eric Sanchez
CISO & Head of Global Security Governance
Kyowa Kirin North America
Sanchez spent 12 years at the Central Intelligence Agency developing and executing global cyber operations. He was regularly called upon by the director of operations to architect, lead and execute unconventional cyber operations against adversary executive leadership and other national...
William Lidster
CISO
AAA Washington
Lidster leads AAA Washington’s information security and compliance efforts. He is responsible for establishing a responsive, dynamic and flexible program to meet continually changing information security, regulatory and compliance needs in the organization. Lidster serves on the advisory board that...
Matt Tesauro
Distinguished Engineer
Noname Security
Tesauro is a distinguished engineer at Noname Security. When not writing automation code in Go, he is pushing for DevSecOps everywhere by contributing to open-source projects, presenting, training and continuing to co-opt new technologies. Prior to joining Noname, Tesauro rolled...
Vinod Brahmapuram
State CISO
State of Washington
Brahmapuram was appointed state CISO in October 2019. He oversees WaTech’s state Office of Cybersecurity and is responsible for establishing and leading the strategic direction of cybersecurity for state government, as well as advising the governor and legislators on key...
Kevin Patrick
Technical Solutions Architect
Cisco
Patrick works with some of Cisco’s largest customers to identify security solutions customized to their needs. He comes from a background in solution engineering and leading a support organization and has spent the last three years at Duo helping customers...
Lana DeMaria
Director, Data Privacy
Alaska Airlines
DeMaria is a motivated and results-oriented leader with international experience deploying impactful programs, landing global projects and establishing connections in the U.S., Russia, India, Canada, Ireland, South Africa, Singapore, Argentina, Egypt and the Czech Republic. She is experienced in supervising...
Alexander Vitruk
Senior Litigation Associate
Baker & Hostetler LLP
At BakerHostetler in Seattle, Vitruk defends and advises companies in complex litigation, with an increased focus on data privacy and cybersecurity matters. He has managed cases through all phases of litigation and arbitration and has secured positive outcomes for clients...
Tony Steffe
Senior Systems Engineer
Illumio
Steffe is a CISSP and regional systems engineer for Illumio, based in the Seattle, Washington area. For more than a decade, he has been engaged in network and internet security with an emphasis on increasing business interconnectedness. Prior to becoming...
Tom Field
SVP of Editorial
ISMG
Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world,...
Gary Gooden
CTO & Security Officer
Seattle Children's
Gooden is the CTSO at Seattle Children’s. He has over 20 years of experience in technology infrastructure and application development, with multidiscipline expertise across media and entertainment and consumer goods. He has extensive vendor management experience and has overseen more...
Collin Barry
Director, Cyber Threat Intelligence
Expedia Group
Barry leads Expedia Security and Threat Research Group, with responsibilities encompassing cyber threat intelligence, red teaming and adversary simulation, advanced threat hunting, and threat detection engineering. Prior to Expedia, he was a senior leader in Booz Allen Hamilton’s International Account...
Samant Nagpal
General Manager and Global Head of Risk
Square
Nagpal has two decades of experience in risk and payments. As the head of risk at Square, he is responsible for managing credit, fraud and chargeback risk and for building seller/merchant-facing risk products that help sellers manage their own risk-reward...
Adrian Mayers
CISO & VP
Premera Blue Cross
Dr. Adrian M. Mayers joined Premera Blue Cross in November 2019 as Vice President, IT and Chief Information Security Officer (CISO) for Premera Blue Cross. Dr. Mayers is responsible for providing and optimizing an enterprise-wide security program and architecture that...
Brian Shea
Business Information Security Officer (BISO)
Salesforce
Shea is an IT executive with 29 years of experience in IT operations and support, security, compliance, risk management and technology innovation. Currently, he is a business information security officer, or BISO, supporting multiple business units at Salesforce, delivering security...
Fabian Powell
Privacy Analyst
Alaska Airlines
Powell began his career as a legal counsel, focusing on the soft areas of intellectual property, copyright and trademark matters, and advising clients in privacy compliance. In the last several years, he has worked in private consulting, advising clients within...
Josh Johnston
Sr. Sales Engineer
Exabeam
Josh has been working in the cybersecurity community for the last 10 years. He was worked as SOC analyst, engineer, and information security program manager before coming onboard with Exabeam. Prior to his security work, he worked in the U.S....
Jerry Cochran
Deputy CIO
Pacific Northwest National Laboratory
Cochran serves as Pacific Northwest National Laboratory’s deputy chief information officer and division director of the Cybersecurity and DigitalOps Division, Computing and IT Directorate. He oversees cybersecurity, the office of the CISO, enterprise IT engineering and operations. Cochran also leads...

View Agenda
Security Organizations in the Digital Age
Sean Murphy, CISO and SVP, BECU
Gary Gooden, CTO & Security Officer, Seattle Children's
Adrian Mayers, CISO & VP, Premera Blue Cross

Two years into accelerated digital transformation, the way you work has changed. But has your security organization evolved at the same pace? Join this exclusive panel for leadership insights on: 

  • The new organizational alignment; 
  • Shifting from product to project teams; 
  • The cultural changes of forcing the team to "shift left."
Sean Murphy
Gary Gooden
Adrian Mayers
  • 09:10 AM
  • 09:39 AM
Cyber Implications of the Eastern European Crisis
Dennis Tomlin, CISO, Multnomah County
Eric Sanchez, CISO & Head of Global Security Governance, Kyowa Kirin North America
Kevin Brennan, Special Agent, FBI Seattle

For years, CISOs have argued the differences between cybersecurity during peacetime and during wartime. Now, with active hostilities in Ukraine, they see the stark differences - and potential repercussions.

This panel of security leaders tackles the questions many organizations are asking, including:

  • What's the risk to critical infrastructure outside of Eastern Europe? 
  • What might an attack look like? 
  • What messages should be conveyed to senior leaders and boards about supply chain risk?
Dennis Tomlin
Eric Sanchez
Kevin  Brennan
  • 09:45 AM
  • 10:14 AM
API Security: How Are You Securing the #1 Attack Vector?
Matt Tesauro, Distinguished Engineer, Noname Security

No surprise in the era of digital transformation: Gartner predicts that in 2022, application programming interface attacks will become the most-frequent attack vector. And yet many security professionals do not even know how many APIs they have in their environments - never mind their level of security.

So, what are you doing proactively to protect your environment from API vulnerabilities, design flaws, and misconfigurations? Learn why existing controls are not enough and what you can do to better your security posture.

Matt Tesauro
  • 10:20 AM
  • 10:49 AM
Exhibits & Networking Break

Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!


Stop by the Expo Hall.

  • 10:50 AM
  • 11:04 AM
Third-Party Risk: Hold Your Key Suppliers Accountable
Gary Gooden, CTO & Security Officer, Seattle Children's
Dennis Tomlin, CISO, Multnomah County
Varsha Agarwal , Head of Information Security, Prosper Marketplace
Chris Burch, CISO, RoundGlass

Vendor management is an old topic with new risks. In the post-SolarWinds, Kaseya and Log4j era, cybersecurity leaders are more sensitive than ever to the third-party relationships they have with appliance, service and software vendors. It isn't enough to put your critical suppliers through rigorous testing at onboarding. It's time for continuous monitoring - and accountability. Topics to discuss:

  • How to vet those critical suppliers and build in the right contract language for performance levels, breach notification and response; 
  • How to monitor your vendors' security posture - and your vendors' vendors; 
  • How to determine the protocol when there is an incident and engage your suppliers in incident response and testing.
Gary Gooden
Dennis Tomlin
Varsha  Agarwal
Chris Burch
  • 11:05 AM
  • 11:34 AM
How Identity Data Lays the Foundation for Innovation
Wade Ellery, VP of Solution Architects and Senior Technical Evangelist , Radiant Logic
Sean Murphy, CISO and SVP, BECU
Jerry Cochran, Deputy CIO, Pacific Northwest National Laboratory

What role does identity play in your organization? Is it seen as an enabler or a consistent roadblock? An escalating expense and headache or a key asset? Is your innovation “stuck” without a clear path forward? This panel will discuss the emerging fabric trends and why putting identity at the center is the strategic launchpad for successful innovation in a variety of initiatives such as regulatory compliance, Zero Trust Architecture, productivity, customer experience and more.

Wade Ellery
Sean Murphy
Jerry Cochran
  • 11:40 AM
  • 12:09 PM
Secure Cloud Infrastructure - Identity First
Thomas Gentsch, Systems Engineer, Ermetic

Cloud infrastructure is extremely complex, with thousands of workloads and data resources, service and human identities, and policies and configurations. With so many moving parts, it’s nearly impossible to clearly see or understand what is going on in your AWS, Azure and GCP environments - let alone control it. Efforts are exacerbated by the rapid pace of development, shortages in cloud expertise, and the number of stakeholders.

Ultimately the most important questions are: Is my data exposed? Who can access it? Only with clear, contextual, actionable risk insight into all identities, configurations and resources can you begin to grasp effective access and the risk to your data. Find out how an identity-first approach to cloud security can help you reduce your cloud attack surface and blast radius - and stay compliant.

Thomas Gentsch
  • 12:15 PM
  • 12:29 PM
CyberEdBoard, A CISO Community

View our CyberEdBoard Profiles in Leadership Interviews with Marene Allison, CISO at Johnson & Johnson, Diego Souza, Global CISO at Cummins, Nicole Ford, VP & CISO at Carrier and more.

  • 12:30 PM
  • 01:17 PM
CISO 1-on-1: Vinod Brahmapuram, State CISO, Office of CyberSecurity (OCS), State of Washington
Vinod Brahmapuram, State CISO, State of Washington

As the Washington state chief information security officer within the Office of Cybersecurity, Vinod Brahmapuram is at the heart of the state government's digital transformation and efforts to modernize SecOps. In this exclusive conversation, he discusses:

  • Improving digital services without compromising security; 
  • Adopting the zero trust framework in alignment with the federal government; 
  • Addressing the growing talent shortage.
Vinod Brahmapuram
  • 01:15 PM
  • 01:45 PM
To CERT or Not to CERT: Establishing Trust Without Certificates
Kevin Patrick, Technical Solutions Architect , Cisco

Critical resources need defense in depth beyond validating identity. Certificates provided a method to establish this trust. It is time to remove the calendar reminder for our certificate renewal. Duo’s Device Health Application can verify enrollment into corporate management systems without deploying certificates. Learn how this is done with some common asset management solutions.

Kevin Patrick
  • 01:50 PM
  • 02:04 PM
Breach Investigations: The Distinct Roles of Artificial and Human Intelligence
William Lidster, CISO, AAA Washington
Collin Barry, Director, Cyber Threat Intelligence, Expedia Group

There are too many alerts for humans to track and too much analysis needed to even determine in a reasonable time which alerts are meaningful. These are areas where machine learning can play a role in automating incident response functions. But what about when it's time to actually investigate an incident? At that point, what role do automated tools play, and what role needs to remain distinctly human?

In this panel, two cybersecurity leader share their experiences and insights on:

  • The role of ML/AI to define the threat landscape;
  • Efficiencies gained from automation;
  • Where human judgment is needed most.
William  Lidster
Collin Barry
  • 02:10 PM
  • 02:39 PM
Seize the Breach with Automation and ML-driven Analytics
Josh Johnston, Sr. Sales Engineer, Exabeam

Breaches happen, and 2021 was a record-breaking year for them. According to Identity Theft Resource Center research, there were 1,291 breaches publicly reported in 2021 as of September 2021 compared to 1,108 breaches in 2020; that’s a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t stopping the breaches from happening. Join us for a discussion of: 

  • Why SOC and security teams are way too limited by legacy SIEM; 
  • How machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation and response capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage; 
  • A simple maturity model based on outcomes and use cases that can vastly improve security operations.
Josh Johnston
  • 02:45 PM
  • 02:59 PM
Exhibits & Networking Break

Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!


Stop by the Expo Hall.

  • 03:00 PM
  • 03:14 PM
The Next Evolution in XDR – Are You a Confident Organization with Resilient, Dynamic and Living Security?
Vahidin "Vaha" Memić, Solutions Architect, Trellix
Brian Shea, Business Information Security Officer (BISO), Salesforce
Chris Burch, CISO, RoundGlass

How do you turn today’s threats into tomorrow’s advantage? Does your organization have proper tools that will learn and adapt to incoming and disruptive active threats? This is the promise of eXtended Detection and Response, or XDR. XDR enables detection, response and adaptive prevention, simultaneously. Ecosystems today need to be built to disrupt active threats and to be woven into your day-to-day operations. Join us in our discussion focused on security outcomes within your organizations.

Vahidin "Vaha" Memić
Brian Shea
Chris Burch
  • 03:15 PM
  • 03:44 PM
Zero Trust and Microsegmentation – Easier Than You Think
Tony Steffe, Senior Systems Engineer, Illumio

Zero Trust is one of the most talked-about themes in cybersecurity. While the term means different things to different people, we can all agree on two things: It’s a journey worth taking, and microsegmentation is a key pillar of that journey. The next question always is: How do you get started?

Regardless of the sophistication of ransomware, the end goal is always the same: Get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you with simple steps to protect yourself from these threats, including how to:

  • Gain visibility to where you are the most vulnerable; 
  • Close risky ports; 
  • Leverage tools you already have in place without adding layers of complexity. 

While the journey can seem intimidating, we’ll help you realize that it doesn’t take a team of 100 or a doctoral degree to deploy zero trust microsegmentation that will protect your organization and keep ransomware at bay.

Tony Steffe
  • 03:50 PM
  • 04:04 PM
Future of Payments & Fraud: A Conversation with Samant Nagpal, GM and Global Head of Risk, Square
Samant Nagpal, General Manager and Global Head of Risk , Square

Digital payments and digital transformation have much in common. Both have undergone revolutionary changes in condensed periods, and both have indelibly changed their respective landscapes.

In this session, Samant Nagpal of digital payments provider Square discusses the evolution of fraud schemes in his space, as well as the impact of emerging authentication technologies and the challenges of Square's global expansion.

Samant Nagpal
  • 04:10 PM
  • 04:39 PM
Biometrics and Privacy
Lana DeMaria, Director, Data Privacy, Alaska Airlines
Fabian Powell, Privacy Analyst, Alaska Airlines
Alexander Vitruk, Senior Litigation Associate, Baker & Hostetler LLP

Governments and industries in the private sector are ever interested in using biometrics for automatically identify or authenticate people. Biometrics definitely appear like the “golden key” of security – it’s much harder to spoof an iris scan or fingerprint than a password! However, collection of biometric data also comes with its share of unique risks.
Come to this session to learn how Alaska Airlines has embraced the use of biometrics to streamline and improve the guest experience without compromising guest privacy and security of their data.
 

Lana DeMaria
Fabian Powell
Alexander Vitruk
  • 04:45 PM
  • 05:14 PM
Cocktail Reception
  • 05:30 PM
  • 06:29 PM
Day 2 Agenda

All content from Day 1 will be available on demand from 9 AM - 5 PM PST on Day 2, Wednesday, February 23rd. Don’t miss the chance to log-in and consume any content you may not have had the chance to see at your own convenience.

  • 09:00 AM
  • 04:59 PM

Speaker Interviews

March 22 - 23, 2022

Pacific Northwest US Summit