Plan your EDGE2016 Experience With the Complete Agenda


Theresa Payton

Kevin Poulsen

Kevin Poulsen

A former hacker-turned-cybercrime-expert and the first female White House Chief Information Officer will keynote EDGE2016.

Former White House CIO Theresa Payton, now the founder and CEO of Fortalice Solutions, will discuss why investments in cybersecurity have not eliminated attacks and breaches and how organizations can better secure their assets.

She will also take the audience behind the headlines and discuss what’s not being said about cybersecurity and behind the curtains about her time spent at the White House.

Author and Editor Kevin Poulsen will take the audience through the ins and outs of cybercrime by giving examples of his first-hand experiences. Poulsen literally broke into the cybersecurity game by breaking into a radio station’s telephone lines, ensuring he’d be the correct caller to win a Porsche before moving on to hacking into the FBI’s network.

He will outline the various security vulnerabilities that could exist in any organization and what you need to do to improve your security.

EDGE2016, a new world-class information security conference, will be held at the Crowne Plaza in downtown Knoxville Oct. 18-19 and will feature track sessions with speakers from a variety of industries including healthcare, retail, manufacturing, banking and finance, legal and government. The conference hopes to pair business leaders with IT security professionals to solve real-world data security problems.

Other speakers and their topics include:

  • Betsy Woudenberg: Founder/CEO, IntelligenceArts, Power Plays: Russia, Ukraine, Crimea and SCADA
  • Graham Holmes: Director of Advanced Security Initiatives Group, Cisco, Advanced Security
  • Justin Boernhoeft, IT Business Manager, Cellular Sales, PCI Point-to-Point Encryption (P2PE) in a Large Retail Environment
  • Karen Clark: CIO, OrthoTennessee, Five Things Senior Management Needs to Know about Protecting Healthcare Data
  • Chris McCarty: Intellectual Property (IP) Attorney, Lewis Thomason, After the Breach: Providing Notice and Minimizing Liability
  • Fred Cobb: Vice President of Services, Sword & Shield Enterprise Security, Inc., Making the Case for Adopting OpenSAMM
  • Adrian Sanabria: Senior Security Analyst, 451 Research, The Future of Endpoint Security (Roundtable)
  • Tim Flowers: Computer Crime and IP Trial Attorney, U.S. Department of Justice, The Department of Justice’s Cybersecurity Initiatives – Investigating and Prosecuting Network Intruders in Today’s Cyber Landscape
  • Mike Saurbaugh: Director of Technical Alliances, PhishMe, May I Have Your Retention? Managing Today’s Information Security Professionals
  • Joshua Eldridge: Director of Data Science, Scripps Networks, Securing the Cloud: A Business Perspective
  • Shaun Gleason: Division Director, Oak Ridge National Laboratory’s Computational Sciences and Engineering Division, The Global Cyber & Information Security Threat and the Role of U.S. National Laboratories
  • Chris Poulin: Member of X-Force Research & Development Team, IBM, The Internet of Things: Fighting Predators
  • David Parker: Supervisor of Security Architecture, Eastman Chemical, Vulnerability Management (Roundtable)
  • Bill Dean: Senior Manager of Information Services, LBMC, Incident Response Tabletop Session
  • Bob Wilson: Information Security Officer, Covenant Health, Third Party Vendor Risk Management
  • Mike McKee, CEO, ObserveIT, Insider Threats

Comments are closed.