ChiBrrCon II – 2022

The Countdown Has Begun – Join us on May 5, 2022

  • 00Days
  • 00Hours
  • 00Minutes
  • 00Seconds

Notice to Remote/Virtual Attendees – Zoom links can be found in the Agenda

AMAZING Event!!!  Thanks to everyone that attended, spoke, hosted a village or otherwise contributed to an amazing day.

Photos for the event can be found here.

First Principles - Getting back to the basics

This year we're getting back to the basics and borrowing shamelessly from Rick Howard's First Principles podcast.

Notably Rick explains: After walking through that analysis, it is clear to me that our foundational first principle block, our cybersecurity cornerstone, must address three elements in order to make it stable for the rest of the first principle building blocks to sit upon.

  1. It must focus on preventing successful cyber adversary campaigns not just preventing breaches.
  2. It must concentrate on reducing the probability that those successful cyber adversary campaigns could happen, not try to stop them altogether.
  3. Finally, it must emphasize attack campaigns that would have a material impact on the company and not the ones that are just embarrassing.

With all of that, here is my proposed first principle building block for all network defenders regardless if they are in academia, government service, or commercial entrepreneurship: Reduce the probability of material impact to my organization due to a cyber event. That’s it. Nothing else matters.

This simple statement is the pillar we can build an entire infosec program on. Which begs the question, what’s next? If reducing the probability of material impact to my organization due to a cyber event is the thing we are trying to do, what are the follow-on first principle building blocks that we will install that will help us do that? Just like Whitehead and Russell, what are the essential concepts that will allow us to prove the equivalent of 1 + 1 = 2 in our network defender world?

Morningstar Conference Center
22 W Washington St.
Chicago, IL 60602

Track: General

Time

Session

Speaker

Room

8:00am - 9:00am

Registration,  Breakfast, and Generally Wake-Up!

N/A

Breakfast Served in Cafeteria

9:00am - 9:15am

Conference Kick-Off and Introduction of Keynote Speaker

ChiBrrCon Board

Auditorium

9:15am - 10:00amKeynote Presentation

Eric Shiffman:

Federal Bureau of Investigation - Deputy Special Agent in Charge

Auditorium
12:00pm - 1:00pmLunch

N/A

Lunch Served in Cafeteria
5:00pm - 5:15pmClosing Remarks

N/A

Auditorium
5:15pm - 6:30pmRaffle* and Happy Hour
(*Must be present to collect)

N/A

Cafeteria

Track: Leadership 

Time

Session

Speaker

Room

10:15am - 11:00am

Cyber Strategy and Execution Panel

Moderator: Troy Mattern

Panelist: Jack Burback
Panelist: Ricardo LaFosse
Panelist: Arlan McMillan

Training Room 1

11:15am - 12:00pm

Cyber Workforce / Women in Cyber Security Panel

Moderator:  Troy Mattern

Panelist: Lynne Dohm
Panelist: Amanda Fennell
Panelist: Walter Lefmann

Auditorium

2:15pm - 3:00pm

Cyber Insurance Panel - Achieving a Favorable Cyber Insurance Policy

Moderator: Kevin Novak

Panelist: Erik Hart
Panelist: Bruce Plummer
Panelist: Kevin Richards

Auditorium 

3:15pm - 4:00pm

The Great Resignation and its Greatest Impacts to the Business

Reet Kaur

Training Room 2

4:15pm - 5:00pm

Next Generation CISO

Moderator: Walter Lefmann

Panelist: Bruce Coffing
Panelist: John Colburn
Panelist: Victor Hsiang
Panelist: Amanda Fennell

Auditorium

Track: Zero Trust 

Time

Session

Speaker

Room

10:15am - 11:00am

Navigating Towards Zero Trust, How to Pick a Platform

Colin Chisholm

Training Room 2

1:15am - 2:00pm

New Sheriff in Town: Creating and Supporting a New Pen-Testing Program

Christopher "Kai" Kennedy

Training Room 2
2:15pm - 3:00pmStop Committing Your Secrets - Git Hooks to the RescueDwayne McDanielTraining Room 2

3:15pm - 4:00pm

Web 3.0

Sarah Grooms & Arijit Das

Auditorium

Track: Kill Chain 

Time

Session

Speaker

Room

10:15am - 11:00am

Adversary Tradecraft & Public Safety: Making Threat Intelligence More effective with MITRE ATT&CK

Travis Randal

Auditorium

11:15 - 12:00pm

Not all Hope is Lost: Planning for an Effective Defense-in-Depth against APTs

Pranshu BajpaiTraining Room 2

1:15pm - 2:00pm

How to save your SOC

Peter Wlodarczyk

Auditorium

2:15pm - 3:00pm

Adversarial Machine Learning - The Growing Need of Security

Shafia Zubair

Training Room 1

Track: Risk Measurement 

Time

Session

Speaker

Room

10:15am - 11:00am

The Power of Cyber Economics for Cyber Risk Decisioning

Kevin Richards

Seminar Room

11:15am - 12:00pm

Art of Mastering the Successful Mergers and Acquisitions Through Cybersecurity Due-Dilligence

Reet Kaur

Training Room 1

2:15pm - 3:00pm

Justifying Investment in Risk Mitigation (or Elimination) Measures to the "Business"

Todd Wagner

Seminar Room

3:15pm - 4:00pm

Risk Presentation Format... It Doesn't Matter

Edward Marchewka

Seminar Room

Track: Resilience/Misc.

Time

Session

Speaker

Room

11:15am - 12:00pm

Keep you enemies close and your secrets closer

Audrey Long

Seminar Room

1:15pm - 2:00pm

Cyber Resilience, Having the right culture in place for success

Jeanine Baisi

Training Room 1

Track:Villages

Village

Description

Room

Capture The Flag (CTF)

Practice your white-hat skills by spending all or part of your day in a live CTF exercise, where you'll be competing against others to gain points. Participants with the highest score will win some sweet swag. 

707V

Break Out

Sign Up for a time slot to simulate breaking into an office, hacking into a website and gaining access to confidential data in the allotted time.  The team with the most points in the end gain first dibs at the giveaway table at the end of the day.

707

Lock Picking & Puzzles

  • Watch a video on lock-picking techniques and practice your skills on a large variety of locks with a large variety of lock picking tools.  You'll want to check out this village if you plan to try the Break Out Village
  • Practice your puzzle skills on games ranging from elementary to expert; including a bunch of practice books to challenge your deciphering skills.  You may want to consider this village if you plan to try the Break Out Village

701

Arduino / Raspberry Pi / Snap Circuits

  • Practice your Arduino skills with everything from Analog Controllers to LCDs to Network Boards to a variety of Sensors
  • Muck around with a Raspberry Pi and some very tasty add-ons
  • It's not just for kids...really!  Play around with Snap Circuits and exercise your inner EE...or just get to know Snap Circuits for sake of family members and others.

702V

Auditorium - Zoom Link

Time Slot

Session

Track

Speakers

9:00am - 9:15amConference Kick-Off and Introduction of Keynote SpeakerGeneralChiBrrCon Board
9:15am - 10:00amKeynote PresentationGeneral

Eric Shiffman:

Federal Bureau of Investigation - Deputy Special Agent in Charge

10:15am - 11:00amAdversary Tradecraft & Public Safety: Making Threat Intelligence More effective with MITRE ATT&CKKill ChainTravis Randal
11:15am - 12:00pmCyber Workforce / Women in Cyber Security PanelLeadership

Moderator:  Troy Mattern

Panelist: Lynne Dohm
Panelist: Amanda Fennell
Panelist: Walter Lefmann

1:15pm - 2:00pmHow to save your SOCKill ChainPeter Wlodarczyk
2:15pm - 3:00pmCyber Insurance Panel - Achieving a Favorable Cyber Insurance PolicyLeadership

Moderator: Kevin Novak

Panelist: Erik Hart
Panelist: Bruce Plummer
Panelist: Kevin Richards

3:15pm - 4:00pmWeb 3.0Zero-TrustSarah Grooms & Arijit Das
4:15pm - 5:00pmNext Generation CISOLeadership

Moderator: Walter Lefmann

Panelist: Bruce Coffing
Panelist: John Colburn
Panelist: Victor Hsiang
Panelist: Amanda Fennell

5:00pm - 5:15pmClosing RemarksGeneralN/A

Cafeteria

8:30am - 9:00amRegistration,  Breakfast, and Generally Wake-Up! (Breakfast in Cafeteria)
12:00pm - 1:00pmLunch
5:15pm - 6:30pmRaffle (Must be present to collect) and Happy Hour

Training Room 1 - Zoom Link

Time Slot

Session

Track

Speakers

10:15am - 11:00amCyber Strategy and Execution PanelLeadership

Moderator: Troy Mattern

Panelist: Jack Burback
Panelist: Ricardo LaFosse
Panelist: Arlan McMillan

11:15am - 12:00pmArt of Mastering the Successful Mergers and Acquisitions Through Cybersecurity Due-DilligenceRisk MeasurementReet Kaur
1:15pm - 2:00pmCyber Resilience, Having the right cultre in place for successResilience / Misc.Jeanine Baisi
2:15pm - 3:00pmAdversarial Machine Learning - The Growing Need of SecurityKill ChainShafia Zubair

Training Room 2 - Zoom Link

Time Slot

Session

Track

Speakers

10:15am - 11:00amNavigating Towards Zero Trust, How to Pick a PlatformZero-TrustColin Chisholm
11:15 - 12:00pmNot all Hope is Lost: Planning for an Effective Defense-in-Depth against APTsKill ChainPranshu Bajpai
1:15am - 2:00pmNew Sheriff in Town: Creating and Supporting a New Pen-Testing ProgramZero-TrustChristopher "Kai" Kennedy
2:15pm - 3:00pmStop Committing Your Secrets - Git Hooks to the RescueZero-TrustDwayne McDaniel
3:15pm - 4:00pmThe Great Resignation and its Greatest Impacts to the BusinessLeadershipReet Kaur

Seminar Room - Zoom Link

Time Slot

Session

Track

Speakers

10:15am - 11:00amThe Power of Cyber Economics for Cyber Risk DecisioningRisk MeasurementKevin Richards
11:15am - 12:00pmKeep you enemies close and your secrets closerResilience / Misc.Audrey Long
2:15pm - 3:00pmJustifying Investment in Risk Mitigation (or Elimination) Measures to the "Business"Risk MeasurementTodd Wagner
3:15pm - 4:00pmRisk Presentation Format... It Doesn't MatterRisk MeasurementEdward Marchewka

Room 701

Lock Picking & Puzzles
  • Watch a video on lock-picking techniques and practice your skills on a large variety of locks with a large variety of lock picking tools.  You'll want to check out this village if you plan to try the Break Out Village
  • Practice your puzzle skills on games ranging from elementary to expert; including a bunch of practice books to challenge your deciphering skills.  You may want to consider this village if you plan to try the Break Out Village

Room 702V

Arduino / Raspberry Pi / Snap Circuits
  • Practice your Arduino skills with everything from Analog Controllers to LCDs to Network Boards to a variety of Sensors
  • Muck around with a Raspberry Pi and some very tasty add-ons
  • It's not just for kids...really!  Play around with Snap Circuits and exercise your inner EE...or just get to know Snap Circuits for sake of family members and others

Room 707

Break Out RoomSign Up for a time slot to simulate breaking into an office, hacking into a website and gaining access to confidential data in the allotted time.  The team with the most points in the end gain first dibs at the giveaway table at the end of the day.

Room 707V

Capture The Flag (CTF)Practice your white-hat skills by spending all or part of your day in a live CTF exercise, where you'll be competing against others to gain points. Participants with the highest scores will win some sweet swag. 

Time: 8:00am - 9:00am

Room

Session

Track

Speakers

CafeteriaRegistration,  Breakfast, and Generally Wake-Up! (Breakfast in Cafeteria)GeneralN/A
AuditoriumConference Kick-Off and Introduction of Keynote SpeakerGeneralChiBrrCon Board
 

Time: 9:15am - 10:00am

Room

Session

Track

Speakers

AuditoriumKeynote PresentationGeneral

Eric Shiffman:

Federal Bureau of Investigation - Deputy Special Agent in Charge

 

Time: 10:15am - 11:00am

Room

Session

Track

Speakers

AuditoriumAdversary Tradecraft & Public Safety: Making Threat Intelligence More effective with MITRE ATT&CKKill ChainTravis Randal
Training Room 1Cyber Strategy and Execution PanelLeadership

Moderator: Troy Mattern

Panelist: Jack Burback
Panelist: Ricardo LaFosse
Panelist: Arlan McMillan

Training Room 2Navigating Towards Zero Trust, How to Pick a PlatformZero-TrustColin Chisholm
Seminar RoomThe Power of Cyber Economics for Cyber Risk DecisioningRisk MeasurementKevin Richards
 

Time: 11:15am - 12:00pm

Room

Session

Track

Speakers

AuditoriumCyber Workforce / Women in Cyber Security PanelLeadership

Moderator:  Troy Mattern

Panelist: Lynne Dohm
Panelist: Amanda Fennell
Panelist: Walter Lefmann

Training Room 1Art of Mastering the Successful Mergers and Acquisitions Through Cybersecurity Due-DilligenceRisk MeasurementReet Kaur
Training Room 2Not all Hope is Lost: Planning for an Effective Defense-in-Depth against APTsKill ChainPranshu Bajpai
Seminar RoomKeep you enemies close and your secrets closerResilience / Misc.Audrey Long
 

Time: 12:00pm - 1:00pm

Room

Session

CafeteriaLunch
 

Time: 1:15pm - 2:00pm

Room

Session

Track

Speakers

AuditoriumHow to save your SOCKill ChainPeter Wlodarczyk
Training Room 1Cyber Resilience, Having the right cultre in place for successResilience / Misc.Jeanine Baisi
Training Room 2New Sheriff in Town: Creating and Supporting a New Pen-Testing ProgramZero-TrustChristopher "Kai" Kennedy
 

Time: 2:15pm - 3:00pm

Room

Session

Track

Speakers

AuditoriumCyber Insurance Panel - Achieving a Favorable Cyber Insurance PolicyLeadership

Moderator: Kevin Novak

Panelist: Erik Hart
Panelist: Bruce Plummer
Panelist: Kevin Richards

Training Room 1Adversarial Machine Learning - The Growing Need of SecurityKill ChainShafia Zubair
Training Room 2Stop Committing Your Secrets - Git Hooks to the RescueZero-TrustDwayne McDaniel
Seminar RoomJustifying Investment in Risk Mitigation (or Elimination) Measures to the "Business"Risk MeasurementTodd Wagner
 

Time: 3:15pm - 4:00pm

Room

Session

Track

Speakers

AuditoriumWeb 3.0Zero-TrustSarah Grooms & Arijit Das
Training Room 2The Great Resignation and its Greatest Impacts to the BusinessTraining Room 2Reet Kaur
Seminar RoomRisk Presentation Format... It Doesn't MatterRisk MeasurementEdward Marchewka
 

Time: 4:15pm - 5:00pm

Room

Session

Track

Speakers

AuditoriumNext Generation CISOLeadership

Moderator: Walter Lefmann

Panelist: Bruce Coffing
Panelist: John Colburn
Panelist: Victor Hsiang
Panelist: Amanda Fennell

 

Time: 5:00pm - 5:15pm

Room

Session

AuditoriumClosing Remarks
 

Time: 5:15pm - 6:30pm

Room

Session

CafeteriaRaffle* and Happy Hour (Must be present to collect)
 

All Day

Room

Session

Session Description

Room 701Lock Picking and Puzzles Village
  • Watch a video on lock-picking techniques and practice your skills on a large variety of locks with a large variety of lock picking tools.  You'll want to check out this village if you plan to try the Break Out Village
  • Practice your puzzle skills on games ranging from elementary to expert; including a bunch of practice books to challenge your deciphering skills.  You may want to consider this village if you plan to try the Break Out Village
Room 702VArduino / Raspberry Pi / Snap Circuits
  • Practice your Arduino skills with everything from Analog Controllers to LCDs to Network Boards to a variety of Sensors
  • Muck around with a Raspberry Pi and some very tasty add-ons
  • It's not just for kids...really!  Play around with Snap Circuits and exercise your inner EE...or just get to know Snap Circuits for sake of family members and others
Room 707Break Out RoomSign Up for a time slot to simulate breaking into an office, hacking into a website and gaining access to confidential data in the allotted time.  The team with the most points in the end gain first dibs at the giveaway table at the end of the day
Room 707VCapture the Flag (CTF)Practice your white-hat skills by spending all or part of your day in a live CTF exercise, where you'll be competing against others to gain points. Participants with the highest score will win some sweet swag
TrackSession NameSession TimeRoomAbstract
KeynoteKeynote: Eric Shiffman - FBI
Deputy Special Agent in Charge
9:00am - 10:00amAuditorium 
Leadership

Cyber Strategy and Execution Panel

  • Jack Burback
  • Arlan McMillan
  • Ricardo LaFosse
  • Moderated by Troy Mattern
10:10am - 11:00amTraining Room 1What the heck is cyber strategy really? How do we keep it relevant to threats and the business needs? Three seasoned Chicago CISO share their insights on what works, why and what not to do.

Cyber Workforce / Women in Cyber Security Panel

  • Walter Lefmann
  • Lynne Dohm
  • Amanda Fennell
  • Katrin Reitsma
  • Moderated by Troy Mattern
11:10am - 12:00pmAuditoriumWith over 3 Million unfilled cybersecurity roles we can't afford to have half the population not even considering our career field. This panel looks at what has worked and failed over the last several years to improve female representation and actual move the needle.

Cyber Insurance Panel - Achieving a Favorable Cyber Insurance Policy

  • Erik Hart
  • Bruce Plummer
  • Kevin Richards
  • Moderated by Kevin Novak
2:10pm - 3:00pmTraining Room 1The cyber insurance market has hardened over the past couple years, making it difficult to obtain a policy, let alone receive favorable terms. Strong cyber leadership and mature cyber program can help. We walk through an optimal mix of risk management and cyber controls to achieve favorable terms.

The Great Resignation and Its Greatest Impacts to the Business

  • Reet Kau
3:10pm - 4:00pmTraining Room 1Massive shift of employees in and out of organizations is causing a nightmare for cybersecurity teams with new data security challenges. Leaders must act fast to avoid or reverse this phenomenon of Great Resignation through five strategies presented in this talk.

The Next Generation CISO

  • Bruce Coffing
  • John Colburn
  • Victor Hsiang
  • Amanda Fennell
4:15pm - 5:00pmAuditoriumThis panel looks at what it took for current CISOs to get where they are and share what they think the future will require for those who seek to be the next generation of CISOs
Zero Trust

Navigating towards Zero Trust, How to Pick a Platform

  • Colin Chisholm
10:15am - 11:00amTraining Room 2A boots-on-the-ground presentation discussing the goals of a Zero Trust program, the creation of use cases, narrowing down to two platforms, performing proof-of-concept activities, and ultimately selecting a final candidate. Lessons learned and recommendations will be presented throughout.

New Sherrif in Town: Creating and Supporting a New Pen-Testing Program

  • Christopher "Kai" Kennedy
1:15pm - 2:00pmTraining Room 2You've got no internal Penetration Testing capability, and you know you need it. You have people with skills, people with ideas, and an organization in need, but how do you put it all together? You’ll need to construct a program that sells itself, and there are some key ways to do it!

Stop committing Your Secrets - Git Hooks to the Rescue

  • Dwayne McDaniel
2:15pm - 3:00pmTraining Room 2Committing secrets is a huge problem. By the time GitHub, or other services, scans for secrets, it is far too late. The best way to not push secrets is to never commit them. Git provides a clean path for this and this talk will walk you through making Git your ally in keeping secrets safe

Web 3.0

  • Arijit Das
  • Sarah Grooms
3:15pm - 4:00pmAuditoriumIn-house Red Teams are uniquely positioned to provide tremendous value for organizations. This talk sets out to discuss what has worked well (sails) and where lessons were learned (anchors) in operating and enhancing in-house Red Team capabilities at a global financial institution.
Kill Chain

Adversary Tradecraft & Public Safety: Making Threat Intelligence More Effective with MITRE ATT&CK

  • Travis Randal
10:15am - 11:00amAuditoriumKnowing adversary tradecraft is great, but what does one actually do with it? From MITRE ATT&CK to the kill-chain, the Threat Intelligence team at Motorola Solutions give real-world examples of how they leverage adversary knowledge for product development, incident response, and network monitoring

Not all Hope is Lost: Planning for an Effective Defense-in-Depth Against APTs

  • Pranshu Bajpai
11:15pm - 12:00pmTraining Room 2Cyber Attackers across varying skill levels deploy a variety of tactics, techniques, and procedures to attain their objectives. In this talk, we dissect the top ransomware APTs to derive MITRE ATT&CK mappings and investigate opportunities to lace security controls against each stage of the attack.

How to Save Your SOC

  • Peter Wlodarczyk
1:15pm - 2:00pmAuditoriumMost of the Security Operation Centers struggle, because of lack of funding, staff, never finished work, shiny new penny or “more important projects”. What if I told you that most of them were not designed or/and implemented correctly? During my talk I will explain it to you how you can fix your SOC

Adversarial Machine Learning - The Growing Need of Security

  • Shafia Zubair
2:15pm - 3:00pmAuditoriumIncreasing adoption of AI driven by ML will result in increased vulnerabilities and attacks. This presentation on Adversarial Machine Learning aims to educate the audience about various ML attacks and give them tools to partner with dev teams to adopt machine learning in adversarial settings.
Risk Measures

The Power of Cyber Economics for Cyber Risk Decisioning

  • Kevin Richards
10:15am - 11:00amSeminar RoomCompanies continue to struggle to understand and ultimately manage cyber risk. Attendees in this session will learn how to unlock the power of cyber economics with the insights, vocabulary, and techniques to engage in financial and business discussions to help solve deep cyber challenges.

Art of Mastering the Successful Mergers and Acquisitions Through Cybersecurity Due-Diligence

  • Reet Kaur
11:15am - 12:00pmTraining Room 1Mergers like Verizon-Yahoo, Marriott-Starwood taught that security gaps and prior breaches if overlooked lead to loss of highly sensitive information causing financial, legal and brand damage for the acquiring company. Due diligence is a must in M&A transactions as Cybersecurity is a business risk

Justifying Investment in Risk Mitigation (or elimination) Measures to the "Business"

  • Todd Wagner
2:15pm - 3:00pmSeminar RoomNeed an elevator pitch from Todd for this section
Resilience & Misc.

Keep Your Enemies Close and Your Secrets Closer

  • Audrey Long
11:15am - 12:00amSeminar RoomHackers can exploit lazy developers; an adversary can use detect secrets tools to find secrets in your codebase unless you do it first. Audrey will showcase how she wrapped the Yelp Detect Secrets tool for use in Azure to take results and immediately export them to your backlog and more.

Cyber Resilience, Having the Right Culture in Place for Success

  • Jeanine Baisi
1:15am - 2:00pmTraining Room 1Cyber resilience is how you keep business moving and recover during a cyber-incident. We will discuss how to approach Cyber Resilience through culture change, awareness and framework. How can we accomplish this and what type of framework and processes can be applied to your organization
Villages

Lock Picking & Puzzles

All Day701
  • Watch a video on lock-picking techniques and practice your skills on a large variety of locks with a large variety of lock picking tools.  You'll want to check out this village if you plan to try the Break Out Village
  • Practice your puzzle skills on games ranging from elementary to expert; including a bunch of practice books to challenge your deciphering skills.  You may want to consider this village if you plan to try the Break Out Village
  • Arduino
  • Raspberry Pi
  • Snap Circuits
All Day702V
  • Practice your Arduino skills with everything from Analog Controllers to LCDs to Network Boards to a variety of Sensors
  • Muck around with a Raspberry Pi and some very tasty add-ons
  • It's not just for kids...really!  Play around with Snap Circuits and exercise your inner EE...or just get to know Snap Circuits for sake of family members and others

Break Out Room (see signup sheet)

All Day707Sign Up for a time slot to simulate breaking into an office, hacking into a website and gaining access to confidential data in the allotted time.  The team with the most points in the end gain first dibs at the giveaway table at the end of the day

Capture the Flag (stop in to join)

NOTE:
Attendees wishing to participate in the CTF will need their own laptop.  Please install Burp Suite Community Edition prior to the event: https://portswigger.net/burp/communitydownload

All Day707VPractice your white-hat skills by spending all or part of your day in a live CTF exercise, where you'll be competing against others to gain points. Participants with the highest score will win some sweet swag
Speaker NameSpeaker BioAssociated Sessions
Jeanine BaisiJeanine Baisi has over 20 years of experience in Cybersecurity related standards and frameworks within multiple technologies and practices. Over the years Jeanine has held several roles within Motorola Solutions from Security Field Services to Security Solutions Professional within the Products and Services Cybersecurity Organization. Jeanine is knowledgeable over a broad set of cybersecurity topics. She’s also an active member of some Security Awareness community forums. Her passion for cybersecurity education has been instrumental in the development of the Motorola Solutions Cybersecurity Champion program. Jeanine continues to educate our customers and internal teams to strengthen their overall awareness and knowledge within the field of Cybersecurity.
  • Track: Resilience and Misc.
  • Cyber Resilience, Having the Right Culture in place for success
  • 1:15pm - 2:00pm
  • Training Room 1
Pranshu BajpaiDr. Pranshu Bajpai has research interests in systems security, malware, digital forensics, and threat intelligence. He has authored several papers for reputed magazines and journals including IEEE, Elsevier, ACM, and ISACA. His work has been featured in various media outlets including Scientific American, The Conversation, Salon, Business Standard, Michigan Radio, GCN, GovTech, and others. He is an active speaker at conferences and has spoken at APWG eCrime, DEFCON, GrrCon, Bsides, ToorCon, and many others. He obtained his Ph.D. in Computer Science from Michigan State University and MS in Information Security from Indian Institute of Information Technology
  • Track: Kill Chain
  • Not all Hope is Lost: Planning for an Effective Defense-in-Depth Against APTs
  • 11:15am - 12:00pm
  • Training Room 2
Jack BurbackJack Burback has 20+ years of experience designing and enhancing enterprise security programs. He joined Wintrust in 2017 and currently serves as the company’s chief security officer. In this role, he is responsible for information security, corporate security, fraud, and business continuity. Prior to joining Wintrust, Jack served as the senior director of professional services at Ionic Security; was responsible for security strategy and solutions at Forsythe Technologies; and was a vice president of information security at HSBC.
  • Track: Leadership
  • Cyber Strategy and Execution Panel
  • 10:15pm - 11:00am
  • Training Room 1
Colin ChisholmColin Chisholm has been working in IT since 1997, and Information Security since 2006. He currently serves as Senior Manager of Security Architecture at Zebra Technologies. Colin is also adept at bad, off-the-cuff metaphors and analogies to describe security and technology
  • Track: Zero Trust
  • Navigating Towards Zero Trust, How to pick a platform
  • 10:15am - 11:00am
  • Training Room 2
Bruce Coffing 
  • Track: Leadership
  • Next Generation CISOs
  • 4:15pm - 5:00pm
  • Auditorium
Arijit Das

Arijit is the Senior Vice President, Head of Digital Asset Innovation Technology, and is responsible for driving digitalization of assets by leveraging innovative emerging technologies with a focus on distributed ledgers, machine learning and artificial intelligence.  Arijit has been with Northern Trust for 12 years and in the industry for more than 30 years. Prior to joining Northern Trust, he worked at US Bank, JPMorgan Chase, and Bank of Montreal, managing both the development and infrastructure teams.

In his current role he led the effort to implement the world’s first blockchain based, private equity solution, and custody for the world’s first DLT (distributed ledger technology) based fractional bond exchange.  He is the co-inventor on 7 blockchain related patents.

Arijit holds a Master’s degree in Physics from the Indian Institute of Technology.

  • Track: Zero Trust
  • Web 3.0
  • 3:15pm - 4:00pm
  • Auditorium
Lynne Dohm

Lynn Dohm brings more than 25 years of organizational and leadership experience to the WiCyS team. She has successfully collaborated with businesses, nonprofits and NSF-funded grants and helped produce outcomes that aligned with their cybersecurity business goals. As a solution-oriented strategist, Lynn focuses on nonprofits, facilitating process improvements, coordinating project management and using resourceful operations to achieve strategic objectives.

Lynn has long been committed to cybersecurity education and for the last 14 years held active roles in grant-funded programs and nonprofits that assist in providing educational solutions for the cybersecurity workforce. She is passionate about the need for diverse mindsets, skill sets and perspectives to solve problems that never previously existed and aims to facilitate learning opportunities and discussions on leading with inclusion, equity and allyship. Lynn lives each day fulfilled as she continues to crusade, along with the strong and committed community of women, allies and advocates within the WiCyS organization, to bridge the cybersecurity workforce gap and improve the recruitment, retention and advancement of women in cybersecurity.

In addition to Lynn being awarded Top 100 Women in Cybersecurity by Cyber Defense Magazine, she accepted the Nonprofit of the Year Award for WiCyS in 2020 and 2021, is on numerous cybersecurity judging panels, advisory boards, and is an inaugural member of (ISC)2’s DEI Task Force. She has been interviewed on TV and radio throughout the nation and is a keynote presenter, panelist and moderator for multiple international conferences, events and organizations.

  • Track: Leadership
  • Women in Cyber Security Panel
  • 11:15am - 12:00pm
  • Auditorium
Amanda FennellAmanda joined the Relativity team in 2018 as CSO and her responsibilities expanded to include the role of CIO in 2021. In her role, Amanda is responsible for championing and directing security strategy in risk management and compliance practices as well as building and supporting Relativity’s information technology. She also hosts Relativity’s Security Sandbox podcast, which looks to explore and explain the unique links between non-security topics and the security realm. Relativity is passionate about its culture of security to ensure its data (and its customers’ and partners’ data) is secure. Prior to joining Relativity, Amanda served as the global head of cyber response and digital forensics at Zurich Insurance Company. She also held several management and consulting positions at Symantec, Dell SecureWorks, Booz Allen Hamilton, and Guidance Software. Amanda received her Master’s in Forensic Science in the field of Digital Forensics: High-Technology Crime Investigation at the George Washington University. Fun Facts Specialized in human osteology in undergraduate archaeology studies Made it through the infamous 50/50 white water rafting in Uganda Collects special editions of books with the current prize being The Mayor of Casterbridge by Thomas Hardy
  • Track: Leadership
  • Women in Cyber Security Panel
  • 11:15am - 12:00pm
  • Auditorium

------

  • Track: Leadership
  • Next Generation CISOs
  • 4:15pm - 5:00pm
  • Auditorium
Sarah GroomsSara Grooms is a Senior Vice President and has been with Wintrust for over 20 years. Sarah currently serves as the Program Director of Digital Transformation, working daily to orchestrate and implement a multi-year, multi-project strategic initiative designed to streamline the company’s digital capabilities and enhance its digital capabilities presence. Sarah has held prior roles in Treasury Management sales and leadership, Commercial Lending and Credit
  • Track: Zero Trust
  • Web 3.0
  • 3:10pm - 4:00pm
  • Auditorium
Erik Hart

Erik Hart oversees global information security for Cushman & Wakefield, one of the world’s largest commercial real estate services firms. A recognized thought leader with more than 20 years of experience in providing information security services to various industries and organizations, he also serves in an advisory role for numerous companies and organizations in the information security field, including Mimecast, CrowdStrike, InfraGard Chicago Members Alliance and Western Illinois University.  

Before joining Cushman & Wakefield in 2018, he served as CISO and Director of IT Risk Management for Zebra Technologies, a provider of mobile, logistics and point-of-sale technology and systems to retail, health care, transportation, manufacturing and other industries. 

Erik earned his Bachelors from Western Illinois University and Masters from Western Governors University.

  • Track: Leadership
  • Achieving a Favorable Cyber Insurance Policy Panel
  • 2:15pm - 3:00pm
  • Auditorium
Victor HsiangInfoSec for almost 5 years: Mostly on the system and network security side of the house. Started with Vulnerability Management, along with firewall auditing and IPS/IDS tuning and implementation. Shortly after that, administrated SIEM and EDR where I some first exposure to real experience to IR. This job required the use of scripting for random one of tasks. Developed a love with PowerShell. Saw firsthand the value someone with this skill vs. not having it. Got more hands dirty with this and then realized I wanted to take this further. Took the job at Wintrust to start learning Application Security, which now is my primary focus.
Outside of work, I’m an avid musician, gamer and fixer.
  • Track: Leadership
  • Next Generation CiSOs
  • 4:15pm - 5:00pm
  • Auditorium
Reet KaurReet Kaur is a Chief Information Security Officer (CISO) at the largest higher-ed institute in Portland, Oregon, where she leads a team responsible for all aspects of College`s Information Security Program to enable the business in providing education to more than 85,000 students at several locations in the Portland Metro Area. Reet is a highly enthusiastic Cybersecurity leader who has supported organizations in the strategic planning and development of security programs to meet requirements for establishing, implementing, monitoring, and maintaining a security posture.
  • Track: Risk Measures
  • Art of Mastering the successful Mergers and Acquisitions Through Cybersecurity Due-Dilligence
  • 11:15am - 12:00pm
  • Training Room 1

------

  • Leadership
  • The Great Resignation and Its Greatest Impacts to the Business
  • 3:15pm - 4:00pm
  • Training Room 2
Christopher "Kai" KennedyI’m a former Air Force network engineer who transitioned to government work and then private sector a little under 5 years ago. Vulnerability Management is my forte, and my team has grown to incorporate Application Security, Penetration Testing, and Threat Intelligence
  • Track: Zero Trust
  • New Sheriff in Town: Creating and Supporting a New Pen-Testing Program
  • 1:15pm - 2:00pm
  • Training Room 2
Ricardo LaFosse

Ricardo Lafosse is the Chief Information Security Officer at Kraft Heinz, responsible for IT risk governance, OT security, incident management, technical disaster recovery and determining enterprise-wide security policies and procedures.

Ricardo’s career encompasses over 16 years of senior-level technical, management and consultative positions in government, healthcare, financial and legal services. He has extensive experience in architecting innovative and successful incident management, risk management, application security programs, data protection policies, and cloud security vendor assessments and frameworks. Prior to Kraft Heinz, Ricardo served as Chief Information Security Officer at Morningstar and the Cook County Government, Manager of Information Security for the Rehabilitation Institute of Chicago, Information Assurance Security Officer for the U.S. Army Corps of Engineers, and held various other senior security positions.

Ricardo holds a Bachelor of Business Administration in Management Information Systems from Florida Atlantic University and a master’s degree in Information Assurance from Iowa State University. He is a certified CISSP and CISM.

  • Track: Leadership
  • Cyber Strategy and Execution Panel
  • 10:15am - 11:00am
  • Training Room 1
Walter Lefmann

Walter Lefmann is currently Director of Security at CTC Trading Group LLC, a capital markets trading firm. That role has included Information Security, Physical Security and Life Safety, Privacy, and BCP/DR.

He has been practicing cybersecurity with varying focus for his entire professional career. The balance has shifted back and forth over time between technology engineering/operations and security over the years, which has led to a well-balanced business-focused approach to security.

The professional journey to CTC came by way Goldman Sachs, Hull Trading Company, and Motorola; from an early career as an experimental physicist at the Fermi National Accelerator Laboratory. Walter holds a PhD, MPhil, and MA in Physics from Columbia University, and a BS in Physics from Stevens Institute of Technology.

While at Columbia University, Walter also served for five years as a volunteer NYC Auxiliary Police Officer and Sergeant. The experience of working closely with the public sector to serve and improve the community was tremendously rewarding, and has shaped a lifelong respect for the dedicated people who face the challenges of that service!

Walter participates in many professional and public/private outreach organizations, including FBI InfraGard (currently serving as a Chicago Chapter board member), US Secret Service Cyber Fraud Task Force, Chicago FIRST, FS-ISAC, the National Technology Security Coalition, and ASIS.  Walter was a nominee for the 2020 Chicago CISO of the Year award program.

Outside of work, Walter is an avid scuba diver (even diving in Lake Michigan … yes, it’s COLD!), sings tenor in the Harper Festival Chorus community group, and dances with his wife whenever he can.

  •  Track: Leadership
  • Women in Cyber Security Panel
  • 11:15am - 12:00pm
  • Auditorium

-----

  • Track: Leadership
  • Next Generation CISOs
  • 4:15pm - 5:00pm
  • Auditorium
Audrey LongAudrey Long is a Senior Security Software Engineer at Microsoft in the Commercial Software Engineering team (CSE), which is a global engineering organization that works directly with the largest companies and not-for-profits in the world to tackle their most significant technical challenges. To Audrey, security is like solving a puzzle, but with real life impact- and she loves to break these puzzles. Because security is such a focal point for many customers, but there are so few people, and especially women in the space, Audrey is passionate about making security accessible both to software engineers and as a career for girls in STEM. She holds DoD secret clearance and a Master of Science degree in Cyber Security at Johns Hopkins.
  • Track: Resilience and Misc.
  • Keep Your Enemies Close and Your Secrets Closer
  • 11:15am - 12:00pm
  • Seminar Room
Edward MarchewkaEdward Marchewka, DBA leads and oversees Gift of Hope Organ & Tissue Donor Network’s Information & Technology Services, Quality Management Services and Education & Training Services departments, in addition to directing organizational strategic planning. He directs the planning and implementation of enterprise IT systems and the development and evaluation of quality improvement and employee safety, ensuring adherence to regulatory/compliance standards. He manages data analytics, data science and data-driven organizational leadership, and designs and develops new and existing business models to ensure alignment of finance, operations, administration and other disciplines. Dr. Marchewka also serves as Gift of Hope’s Quality Officer and HIPAA Security and Privacy Officer.
  • Track: Risk Measures
  • Risk Presentation Format...It doesn't matter
  • 3:15pm - 4:00pm
  • Seminar Room
Troy MatternTroy is a retired Marine Corps Officer with 23 years of active duty service. His military career included roles in intelligence and full spectrum cyber operations serving at the National Security Agency, the Pentagon and USCYBERCOM. In his civilian career Troy has been over 10 years as cybersecurity executive building programs in the private sector with Carnegie Mellon's Software Engineering Institute, Zurich Insurance and most recently Motorola Solutions. Troy volunteers as one of the founding Directors for ChiBrrCon.
  • Track: Leadership
  • Cyber Strategy and Execution Panel
  • 10:15am - 11:00am
  • Training Room 1

-----

  • Track: Leadership
  • Women in Cyber Security Panel
  • 11:15am - 12:00pm
  • Auditorium
Dwayne McDanielDwayne McDaniel has been working as a Developer Relations professional since 2015 and has been involved in the wider tech community since 2005. He loves sharing his knowledge and enthusiasm about Git, Open Source tools, and tech in general and he has done so at over a hundred events all over the world. He has been fortunate enough to speak at institutions like MIT, Stanford, and far-off places like Paris and Iceland. You can see some of his past talks on Drupal.tv and WordPress.tv.
  • Track: Zero Trust
  • Stop Committing Your Secrets - Git Hooks to the Rescue
  • 2:15pm - 3:00pm
  • Training Room 2
Arlan McMillan

Arlan McMillan is the Chief Security Officer (CSO) for Kirkland & Ellis LLP. Kirkland is an international law firm that serves a broad range of clients around the world in private equity, M&A and other corporate transactions, litigation, white collar and government disputes, restructurings and intellectual property matters.

As the CSO, Arlan oversees the strategy and delivery of Cybersecurity, Physical Security and Business Continuity Management capabilities firm wide. With over 25 years’ experience in Information Technology and Security, Arlan has led a number of teams developing and delivering security services for top organizations including United Airlines, the City of Chicago and ABN Amro Bank.

In 2014 he was awarded the honor of Chief Information Security Officer (CISO) of the Year and until joining Kirkland, was a board member of the Aviation Information Sharing and Analysis Center (A-ISAC) and the Transportation Sector Chief for the FBI-InfraGard Chicago region.

Arlan is currently Vice Chair of ChicagoFIRST and a regular contributor on the topics of risk management in Information Security and executive communications.

  • Track: Leadership
  • Cyber Strategy and Execution Panel
  • 10:15am - 11:00am
  • Training Room 1
Kevin Novak

Kevin is a Managing Director at Breakwater Solutions and a highly accomplished senior information security and risk management executive with vast expertise in all aspects of information security and technology risk management, most recently in the financial and healthcare sectors.

He has comprehensive experience in program and risk management, privacy and security assessment and compliance (ISO, SOX, HIPAA, SWIFT, GLBA, GDPR, PIPL), financial reporting and analysis, and strategic planning.  Kevin utilizes transformational leadership and communications skills to conduct presentations and articulate risks and benefits to achieve buy-in across an organization.  He is a forward-thinking risk management professional that can work equally well with engineers, executives, and board members alike.

Kevin has successfully established and managed comprehensive information security and IT risk programs for Fortune 500, financial services firms; most recently at Northern Trust Bank, a $6BN financial services firm with over $16TN in Assets under Custody and $1.6TN in Assets under Management.  As Chief Information Security and Technology Risk Officer of Northern Trust, Kevin frequently worked with Institutional and Wealth clients, demonstrating cyber due-diligence and presenting to over 400 boards, trusts, estates, and family offices each year.

Prior to joining Northern Trust, Kevin managed information security and records management for Discover Financial Services and was a founding partner and Chief Operating Officer of Neohapsis, a boutique cyber security consulting firm to over 350 clients including Fortune 500 clients in travel, financial services, defense, energy, education, pharmaceutical, healthcare, and manufacturing.

  • Track: Leadership
  • Achieving a Favorable Cyber Insurance Policy Panel
  • 2:15pm - 3:00pm
  • Auditorium
Bruce Plummer

Bruce E. Plummer is a Senior Vice President in Northern Trust’s Finance Department. He is responsible for identifying operational and insurable risks for Northern Trust’s banking, custodial and trust operations, managing Northern’s internal insurance agency and negotiating insurance protection for Northern Trust’s operations and subsidiaries globally. As the Head of the Insurance Services, his expertise is centered on  efficiency and productivity analytics, reporting and metrics  with an emphasis on the intersection of Risk, Finance and Compliance.

Prior to joining Northern Trust, Bruce was a vice president and director of insurable risk management for MidFirst Bank in Oklahoma City. He also held the title of Vice President of Corporate Risk Management at Morgan Stanley and JPMorgan Chase, both in New York City.

Bruce earned the Associate in Risk Management (ARM) insurance designation from the Insurance Institute of America.  He is an Illinois licensed Property and Casualty insurance broker and serves on the American Bankers Association Insurance Risk Management Advisory Board.

Bruce holds a B.A. in Business Administration and Insurance from Morehouse College in Atlanta and is an MBA candidate at Northwestern University Kellogg School of Management’s Executive MBA program (class of 2022). He is a triathlete, marathoner, motorcyclist and enjoys listening to live music in the park in the summer.

  • Track: Leadership
  • Achieving a Favorable Cyber Insurance
  • Policy Panel
  • 2:15pm - 3:00pm
  • Auditorium
Travis RandalTravis Randall is a Threat Intelligence Analyst for Motorola Solutions’ products and services threat intelligence team. A former “InfoSec” enthusiast turned current devotee, he monitors and evaluates threats against worldwide mission critical systems. This includes threat actors and their related tactics, techniques, and procedures (TTPs). He previously worked for a threat intelligence vendor as a Cyber Intelligence Analyst, catering to a wide variety of clients, including entities in the Financial and Industrial sectors.
Travis maintains the Cybersecurity Analyst (CYSA+), Security+, Mental Health First Aid (MHFA) certifications, and is a Certified Cyber Intelligence Tradecraft Analyst. He remains an active reader and writer in his downtime and is currently working through a backlog of horror and science fiction literature.
  • Track: Kill Chain
  • Adversary Tradecraft & Public Safety: Making Threat Intelligence More Effective with MITRE ATT&CK
  • 10:25am - 11:00am
  • Auditorium
Katrin Reitsma

Dr. Katrin Reitsma is a cyber security expert and general technology enthusiast with a passion for empowering teams to develop secure products and keeping our customers safe.

Katrin is the Chief of Staff of Motorola Solutions Products Business and the Director of Portfolio and Operations. Katrin has 19 years combined experience in product risk management and cybersecurity research & development. Katrin has published several International papers with more than 500 citations, holds 21 patents, and has contributed to multiple security standards (FCC, IEEE 802, IETF, NIST). She has served the cyber community in various roles, as an author, peer-reviewer, editor, panelist, speaker, workgroup chair, as well as workshop & conference organizer.

Katrin received her PhD in Communications Security from the University of Waterloo, Canada in 2007 and her Masters in IT Security from the Ruhr University in Bochum, Germany in 2002. Prior to joining Motorola, Katrin worked as a security researcher at the National Institute of Standards and Technology (NIST).

  • Track: Leadership
  • Women in Cyber Security Panel
  • 11:15am - 12:00pm
  • Auditorium
Kevin RichardsKevin is a Cybersecurity Strategy & Risk Executive with over 30 years of experience in information security and enterprise risk management. Working with large multi-national corporations, as well as the United States Department of Defense and other U.S. Federal, State and Local agencies, Kevin provides an array of technical and pragmatic perspectives on building and protecting an organization’s critical information assets.
  • Track: Risk Measure
  • The Power of Cyber Economics for Cyber
  • Risk Decisioning
  • 10:15am - 11:00am
  • Training Room 1

-----

  • Track: Leadership
  • Achieving a Favorable Cyber Insurance
  • Policy Panel
  • 2:15pm - 3:00pm
  • Auditorium
Eric ShiffmanDeputy Special Agent-in-Charge Eric Shiffman joined the Federal Bureau of Investigation in 2005, and was assigned to the Chicago Field office. DSAC Shiffman investigated and supervised white collar, counterintelligence, and cyber matters. After a tour at the FBIs Inspection Division, DSAC Shiffman returned to the Chicago Field Office and was promoted to the ASAC for the Counterintelligence and Cyber programs. In February 2022 he was promoted to the Deputy Special Agent-in-Charge. Prior to the FBI he served in the US Army and attended Case Western Reserve Law school.
  • Keynote
  • 9:15am - 10:00am
  • Auditorium
Todd Wagner

Todd Wagner has been protecting the confidentiality, integrity, and availability of data and information for over 20 years in both the public and private sector. He started his career in the Federal Bureau of Investigation as a Special Agent focused on investigating cybercrimes. In this role, Todd specialized in Computer Forensics and performed forensics analysis in many high-profile cases - most notably, cases related to the 9-11 attacks on the United States.

After an exciting career with the FBI, Todd joined Caterpillar Inc., where he has held several leadership roles within Cybersecurity, Data Privacy, Data Governance, and Digital Compliance. Todd was instrumental in helping transform the Cybersecurity culture at Caterpillar by engaging the business in risk identification, valuation, prioritization, and mitigation. Currently, Todd serves as Caterpillar’s Energy & Transportation Segment, Chief Information Security Officer (CISO). Todd’s true understanding that “Security Must Enable the Business” has helped him with establishing key relationships and partnerships within “The Business”. As CISO, Todd partners with the Energy & Transportation business to help them understand and prioritize their security risks.

Todd has been awarded several US patents, on behalf of Caterpillar, for his work in security and received several security and data privacy certifications, specifically the ISC2 Certified Information Systems Security Professional (CISSP); the International Association of Privacy Professionals Certified Information Privacy Manager (CIPM); and the ISACA, Certified Data Privacy Solutions Engineer (CDPSE).

  • Track: Risk Measures
  • Justifying Investment in Risk Mitigation (or elimination) Measures to the "Business"
  • 2:15pm - 3:00pm
  • Seminar Room
Peter WlodarczykPeter Wlodarczyk is an experienced and passionate cybersecurity leader with working experience in large enterprise environments with sensitive information. He has planned and led multiple offensive and defensive cyber operations focusing on protecting critical infrastructure and confidential data. Work on military, federal and commercial cybersecurity projects allow Peter to create comprehensive security solutions in large-scale environments with complex requirements. He currently works as a cybersecurity advisor, architect and coach.
  • Track: Kill Chain
  • How to save your SOC
  • 1:15pm - 2:00pm
  • Auditorium
Shafia ZubairShafia is a Manager of Information Security at Morningstar. Where she is responsible for the Information Security program management and governance. This requires working with security operations, threat intel, application security, compliance and product development teams to ensure secure, resilient, and recoverable applications. Prior to Morningstar, Shafia was a Director of Product Management at UBS. She also works as an adjunct instructor in the Framingham State University Master Of Science In Organizational Leadership program, where she teaches the course ‘Leading Organizations in the Age of Artificial Intelligence’. Shafia is very passionate about Data Security and Consumer Privacy in the hyper connected world. Her delivery is anchored by a strong belief that resilient, secure, and available products are driven by a systems-based approach to security, privacy, organizational strategy and application design. She has presented on topics of Artificial Intelligence, Machine Learning, Cybersecurity and Ethical AI at multiple platforms including ChiBrrCon20. Shafia has a Master’s in Electrical Engineering from Texas A&M University and an MBA in Management and Finance from Tulane University. She is the President of Women In Cybersecurity (WiCyS) Chicago Affiliate and volunteers as a coach/mentor for the FIRST robotics leagues. She also holds industry certifications such as Certified Information Systems Security Professional (CISSP) and Certified Information Security Manager (CISM).
  • Track: Kill Chain
  • Adversarial Machine Learning - The Growing Need of Security
  • 2:15pm - 3:00pm
  • Training Room 1