Mark Loveless (@simplenomad)
There is a lot of talk and hype regarding Zero Trust Networking (ZTN) and most of it is unrealistic. Why? Because no two organizations are the same and have the same needs. Most vendors sell solutions based upon what their existing product line can do, not what you specifically want or need. My employer is cloud-based, no VPN, all remote employees in dozens of countries, and a history of BYOD. In grappling with ZTN concepts we learned a lot, and in solving our own problems we think we might have some solutions that can help. And no, my employer does NOT sell ZTN solutions, so expect an open and honest assessment.
James Traxel – Checkpoint Software
James Traxel is the Head of Advanced Threat Prevention, North America for Check Point Software. His responsibilities include expertise in security technologies and the threat landscape for mobile users. He has worked for Check Point Software Technologies for over 13 years and has focused on Mobility for the last 3 years. He has over 23 years of experience in the security industry.
Allyn, a Senior Security Engineer at Nexum, Inc., has over 20 years’ experience spanning network engineering, content acceleration and delivery, digital signage systems, and professional services delivery, leading multiple high-profile, large-scale projects for Fortune 500 clients. He holds a Bachelor of Science degree with Honors in Computer Science and Psychology from Eastern Michigan University.
Dave Mattingly (@dave_mattingly)
As a teenager, Dave Mattingly wrote space shuttle software for NASA. Every day since has been even cooler and weirder. Now he also writes, preaches, and performs improv. He doesn’t know what he wants to do when he grows up.
Corey Shell (@coreylshell)
Corey has 11 years of combined information technology and cybersecurity experience. He has a passion for cybersecurity and helping his clients to identify their risks and determine their cybersecurity preparedness. Corey specializes in ethical hacking, vulnerability management, and information security program development, implementation, and assessment. Corey has extensive experience in healthcare, financial services, education, public sector, and biotech industries.
Micah K Brown (@MicahKBrown)
Micah K Brown is a member of the IT Security Engineering Team at the Munich RE Group. Over the past four years he has served as the lead Engineer on the DLP implementation for Data Loss Prevention for the Munich RE organizations around the glove. In this role Micah has learned a new appreciation towards data first focused security. In his free time, Micah serves on the Greater Cincinnati ISSA Chapter as Vice President. Micah graduated from the University of Cincinnati and holds an active CISSP.
Carl Alexander (@DrHaxs)
Carl Alexander has 30+ years of information systems experience at the enterprise level, the last 17 years in InfoSec management roles. Carl believes sharing knowledge is key, so he helped start the Kentuckian ISSA Chapter in 2002, and served on its board for 10 years, growing the security focus in our region. These effort spawned DerbyCon, and International ISSA Convention recognition of our ISSA chapter. Carl holds a degree in Computer Engineering, and maintains seven InfoSec certifications from SANS GIAC, ISC2, and ISACA.
Jerod Brennen (@slandail)
By day, I’m a storyteller, teacher, speaker, advisor, & security architect. By night, I’m a husband, father, writer, filmmaker, martial artist, musician, & gamer. At this point in my career, I think I’ve earned every gray hair in my beard. I love to share what I’ve learned every chance I get: at professional meetings, at conferences, and online. I’ve published multiple courses with Pluralsight and LinkedIn Learning, and I teach courses in person, both domestically and internationally. At the end of the day, I just want to help folks get one step closer to doing what they want to do securely.
Edward McCabe (@edwardmccabe)
Edward McCabe is an active information security professional. An active practitioner, mentor, and instructor with almost 30 years’ experience that span startups to Fortune 100 companies, various domestic state, federal and foreign government agencies. A veteran of the United States Navy, Edward is an instructor for ISACA’s CISM, CRISC, CGEIT and COBIT certification paths, in addition to being a ISO/IEC 27001: Lead IMplementer and a recovering Qualified Security Assessor for the Payment Card Industry.
Connie Matthews Reynolds (@cahnee)
Connie has been in the InfoSec industry for 16+ years. Connie’s passion drove her to start her own company, ReynCon Educational Services & Training, offering Cyber Security training to help educate companies/individuals seeking to build more awareness with soft to technical training. A believer in the importance of giving back. Connie serves as an adviser to Tiffin University, Board Member of: Central OH ISSA – organizer for the Central Ohio InfoSec Summit, Central OH OWASP, Volunteer of the Yr. for ISSA International. Named: 181 Top Women in Cyber to follow on Twitter, Cybercrime Magazine
John Survant (@jsurvant)
Mr. Survant has over 18 years of experience as a manager of information technology and is a graduate of the Executive MBA program jointly hosted by the University of Kentucky and the University of Louisville.
Dan Helton (@ch1kpee)
Dan Helton (@ch1kpee) is a Senior Security Consultant with NCC Group and lives in on the Indiana side of the river from Louisville, KY (though he used to live in Raleigh). Dan’s day job involves web app/mobile app/network penetration testing and red teaming. On the side, Dan enjoys competing in CTFs with the @EverSecCTF crew, making his own CTF challenges, and delving into obscure operating systems and computer history.
Jeremy Druin (@webpwnized)
Principal Security Architect GISF, GSEC, GCIH-GOLD, GWAPT-GOLD, GPEN, GMOB, GXPN-GOLD, Sec+ Jeremy works at UPS where he created the App Sec & Pen Test programs, owns Ellipsis InfoSec and operates the “webpwnized” YouTube channel. He has a Bachelors in CompSci from IU, a Graduate Certificate in InfoSec and Masters in CompSci from U of L.
Erich Jackson (@ericthered)
GWAPT, GPEN, GCIH, Sec+ Information Security Analyst Erich is an application developer and has presented for KY ISSA & CodePaLOUsa. Erich holds a patent in automatic language translation. He has a BA in Psychology from U of L.
Harlen Compton (@HarlenCompton)
Harlen is a licensed Kentucky Attorney at Law and an (ISC)^2 Certified Information Systems Security Professional. Prior to becoming an attorney, he was a software developer with a focus in software security. Today he works in Security & Compliance at Homecare Homebase, the nation-leading Home Health and Hospice EMR solution. He also frequently works with criminal defendants and their attorneys on matters involving digital evidence.