MASTER OF CEREMONIES & KEYNOTE SPEAKERS 

* Click Photos for Bios
* THE AGENDA IS POSTED AT THE BOTTOM OF THIS PAGE!

 

Gretchen Bliss.jpg

Master of Ceremonies (MC) 

Gretchen Bliss

Cybersecurity Programs Director

UCCS

 

joey-arora1.jpeg

Keynote

Joey Arora

Chief Scaling Officer

DoD Platform One |

Co-Founder

AFWERX + AFVentures 

Dr. Borders.jpeg

Keynote 

Dr. Jim Borders

Lead Operational Space Intelligence Engineer

MITRE 

Picture1.png

"2021 Threat Landscape"

Ed Koehler 

Distinguished Engineer – Office of the CTO

Extreme Networks 

D. Massey Photo.jpg

"Securely Operating Through 5G Networks"

Dr. Dan Massey

Project Leader – Operate Through

DoD 5G to NextG Initiative

official_photo-240x300.png

Keynote

Dr. Dale W. Meyerrose, 

Major General, U.S. Air Force retired | 

President, MeyerRose Group

Ron Ross-Photo.jpg

“Next Generation Cyber Protection Strategies:

Operating While Under Attack”

Dr. Ron Ross

Fellow

National Institute of Standards and Technology (NIST) 

SPEAKERS

PPCC Image.jpg

"Cyber and Space, the Final Frontier:

A Beginner's Guide to the SpaDoCs Framework"

Terri Johnson Akse

Department Chair 

Computer Networking & Cybersecurity Department 

Pikes Peak Community College 

DSC04269-Ready.jpg

Panelist  

"Secure Compliance vs. Compliant Security?"

Evan Anderson

Director of Offense, Randori

 

Trent_Bunnell.jpg

"Understanding Risk Bias and Risk Tolerance

when Building Risk Assessments"

Trent Bunnell

SAIC / FORGE ISSO

United States Space Force (USSF)

 

Untitled design.png

"Cloud Compliance" 

Sean Barkey 

Federal Account Executive 

Project Hosts

 

BurnsLynn_02_IMG_2611.jpg

 "Introduction to Controlled Unclassified Information (CUI)

and Cyber Maturity Model Certification (CMMC)"

Lynn Burns 

Information System Security Manager (ISSM) &

Facility Security Officer (FSO)

HDR Engineering |

NCMS President

The Society of Industrial Security Professionals

 

debicaldwell4.jpg

  "If your Managed Security is only a Service,

maybe you have the wrong Provider"

Debi Caldwell

Cyber Risk &

Implementation Consultant

Deloitte & Touche LLP

 

20191017_SeanCallahan_003-1600.jpg

"The Candidate and the Hiring Manager"

Sean Callahan

IRES Chief Information Security Officer (CISO) 

Jacobs

 

Carsonheadshot.jpg

Panel Moderator  

"Secure Compliance vs. Compliant Security?"

Rob Carson

Founder & Chief Executive Officer (CEO)

Semper Sec 

Cooper .jpg

"How PCI Compliance Saved the

Payments Industry"

Art Cooper 

Principal Security Consultant

TrustedSec

1532535208337.jpeg

"Cybersecurity, What Can SMB  

Do with Little to No Budget?"

Leo Cuellar

Director of Cyber Security Practice

CRI Advantage 

James Dean.jpg

"AFRL Case Study - When Every Day is a Zero Day,

Leveraging ML and All-Flash to Prevent Persistent Threats"

James Dean

President, Director of Advanced Programs

VAST Federal & 

Dr. Wesley Emeneker

Data Scientist 

Maui High Performance Computing Center (MHPCC)

FrankG.jpeg

"Current and Future Use of

Artificial Intelligence (AI) in Cyberspace" 

Frank Gearhart 

Lead Cybersecurity Engineer

Jacobs

Missile Defense Agency (MDA), Schriever AFB 

headshot.png
Rodney-Gullatte-Jr-Headshot-e15686642923

 "Cyber Defense

from a Certified Ethical Hacker"

Rodney Gullatte Jr.

Chief Executive Officer (CEO)

Firma IT Solutions & Services

Kevin Hansen.jpg

"AI Use Cases to Advance Your Zero Trust Maturity"

Kevin Hansen

Chief Technology Officer (CTO) 

Micro Focus Government Solutions

Francis.JPG

"Cyber Espinoage" 

Laura (Francis) Harder​

Director Of Cyber Operations

Xela |

Enterprise Services Flight Commander

53d Network Operations Squadron

US Air Force Reserve

Robert Hoffman.PNG

"The Candidate and the Hiring Manager"

Robert Hoffman

NISSC II Chief Information Security Officer (CISO)

Jacobs 

 

28661002_10160049194270111_7683931031546599500_n.jpg

"Cyberpsychology"

Dr. Erik J. Huffman

Chief Executive Officer (CEO)/Founder

Handshake Leadership

Rock0177-4x6.jpg

"Becoming a Cyber Phoenix:

Rising from the Ashes to Build Cyber Resiliency

in Critical Infrastructure"

Rock Lambros

Chief Executive Officer (CEO) & Founder 

  RockCyber 

Sean-Martinez (2).jpg

 

"Emerging Threats

and Defending Different Facets of IT"

Sean Martinez

Sr Technical Account Manager

SolarWinds

McKairnes.png

 

"Software Development and

Supply Chain Integrity"

Joe McKairnes

Federal Sr. Solutions Architect, DoD

GitLab

Lisa_McKee.jpg

 

"Cloud Security:

Getting Over Your Fear of Heights"

Lisa McKee

Sr. Manager of Security

& Privacy Solutions

 Protiviti

Meyers.jpg

 

"Social Engineering: Jumping the Air Gap"

Chase Meyers

Cyber Risk Manager

Deloitte Consulting LLP

Shawn-Murray-Headshot.bmp

"China Threat Update"

Dr. Shawn P. Murray

President & Chief Academic Officer

Murray Security Services | 

Chief Operations Officer (COO)

on the International Board of Directors 

ISSA

john-piccininni-1000.png

"Protecting Sensitive Areas

from Wireless Threats"

John Piccininni

Vice President of Business Development

Inpixon 

Jason Radgowski Headshot.jpg

"Fueling a Holistic Approach to IT Risk Management"

Jason Radgowski

Director, Advisory & Consulting Services

Galvanize

Head Shot Fix.png

"SolarWinds (Supply Chain),

Microsoft Exchange (Zero Days),

and Colonial Pipeline (Ransomware) -

Oh My: Why Should You Care About These Events..."

Brad Rhodes

Head of Cybersecurity

zvelo | 

LTC, Cyber Warfare

Colorado Army National Guard

Jordan Scott_0313.jpg

"Cyber Metrics That Matter"

Jordan “Cancer” Scott

Cyber Solutions Architect

Parsons | 

Owner

Code Talkers Engineering

 

 

SHC-5347 (Patrice Official Pic 2) Headsh

"Hoping to Become a CMMC C3PAO?

What About That ISO 17020 Thing?"

Patrice Siravo

Director of Cybersecurity

Adriano Cyber Consulting

Mug Shot.jpg
Al Mug Shot PXL_20210711_201439869.jpg

"Why Electromagnetic Pulse (EMP) Protection

is Critical to Our Survival"

John Spence, Director, and 
Alfred (Al) Florence, Deputy Director, 

Colorado Electromagnetic Pulse (EMP) Task Force 

on National and Homeland Security

 

 

 

 

Stacey.jpg

"Accelerating decision making with

Common Data Fabric architectures"

 Nathan Stacey

Principal Solutions Architect

Elastic

 

 

 

 

1516308633846.jpg

"Threat Intelligence - a Light in the Darknets"

 Matt Toth 

National Defense Consulting

Solutions Engineering Manager

Splunk 

Steve Winterfeld picture.JPG

"How to Kill Ransomware Attacks"

Steve Winterfeld

Advisory Chief Information Security Officer (CISO)

Akamai Technologies

(Panelist "Secure Compliance vs. Compliant Security?")

PEAK CYBER IS SPONSORED BY...

Extreme-Networks-CMYK.png
MFGS Inc Blue Vertical.jpg
SW_government_md - Copy (3) (1) (1) (1).png
Epoch_4c.jpg
Splunk Logo.jpg
Corning_CMYKBlue_BoxLockup_WhiteLogo_Solid[1].jpg
Elastic.png
ieee mb tag blue pne.png
Ivanti_Logo_RGB_red.png
PH_CSP_Logo(Final).png
WESCOAnixter.jpg
logo.png
Magnet Logo.PNG
Jacobs_logo_rgb_black (4).png
vlogo.jpg
CDWG-Logo-Without-Tagline-Red-CMYK.jpg
Inpixon.png
vast-federal-logo-white.jpg
Digital - White, black letters.jpg
gal-dil-hybrid-Logo_FullColor-1200x600.png
Iron_Bow_GitLab.jpg
Privoro.png
WGU.png
Transparent.png
AX-logo-400.png
Web - Globe Logo with White Outline IWU.png

* Click the Button Abovefor Agenda