Jeffrey Baez

Palo Alto Networks

Jeffrey is a natural leader with over 17 years' experience delivering secure services that solve real-world problems for organizations, thereby realizing value in the costs and efforts associated with Information Technology. Jeffrey has led complex projects in IT operations and compliance audits across multiple industries in the U.S. I help organizations overcome their critical business, compliance, cyber security, privacy, and IT management challenges.    Jeffrey has served as an adjunct professor at the University at Albany where he taught courses in information technology and cyber security for several years across two separate departments.  Jeffrey has led undergraduate students in research initiatives, where Jeffrey led a team of undergraduate students at the first annual New York State SUNY Undergraduate Research Conference (NYS SURC) in presenting a novel way to implement IPSEC tunnels with certificates.  The students won an Excellence in Innovation and Creativity award for this effort. Recipients of this award are selected for developing a project that is both innovative and has real-world implications. Jeffrey has performed research on securing endpoints through the use of machine learning to detect anomalous behavior.     Jeffrey has served in various technical and business-led roles within New York State, most recently as the Chief Information Security Officer for the Dept. of Financial Services.    Currently, Jeffrey works for Palo Alto Networks as the SLED Security Strategist.  A seasoned information security professional, Jeffrey brings a security architecture focus within the Industry Initiatives team at Palo Alto Networks, working closely with internal teams, customers and prospects in SLED to understand how the Palo Alto Networks platform approach can meet and exceed government and education security requirements.

Kirsten Bay

Cyber adAPT

Kirsten Bay, President, CEO and Chairman, Cyber adAPT  Kirsten Bay is redefining what it means to be a fearless leader in the technology industry. She is an accomplished, bilingual executive, transforming the cyber security space. As President and CEO of Cyber adAPT, she leverages more than 25 years of experience, leading her team with risk intelligence, information management, and policy expertise across a variety of sectors.    Throughout her career, Kirsten has been appointed to a congressional committee developing cyber policies, initiatives and recommendations for the intelligence community. She has developed recommendations in partnership with the Center for North American Studies (CNAS) and Center for Strategic and International Studies (CSIS) for The White House energy policy, and collaborated on information studies for MIT-Harvard and several federal agencies. She has gone before a parliamentary subcommittee on recreating trust in the global economy, presented national security and critical infrastructure concepts at conferences such as Black Hat, Secured Americas, Enterprise Architecture Institute, SC World Congress, and the Eurim Information Management Committee. She has also spoken on applied economics and its relationship to both cyber and national security around the world.    Kirsten is a self-proclaimed 'serial student'. Her current membership of the Alliance of Chief Executives feeds her perpetual drive to learn and share insight with peers; an inspirational trait she models for her Cyber adAPT team.  In previous executive roles for ISC8, Attensity Group, and iSIGHT Partners, she has led companies through corporate restructuring, risk and corporate intelligence product launches, and company turnarounds, respectively.  With a BA in English and German from the University of Oregon, let's just say she will correct your grammar in multiple languages.

Todd Brasel


Todd is a Principal Consultant with NYSTEC's Information Security practice, where he manages complex security projects and helps clients to understand their security profile and to plan secure systems. Todd has over 15 years of experience in software development. He is an ISC-2 Systems Security Certified Practitioner and is pursuing an MBA in IT Management and a CGS in Information Security from SUNY Albany.

Peter Chestna

Pete Chestna has more than 25 years of experience developing software and leading development teams, and has been granted three patents. Pete has been developing web applications since 1996, including one of the first applications to be delivered through a web interface. He led his company from Waterfall to Agile, and finally to DevOps in addition to taking the company from a monolithic architecture to one based on microservices. Since 2006, Pete has been a leader in the Application Security (AppSec) space and has consulted with some of the world's largest companies on their AppSec programs. In addition to his role as a contributing editor at and, he now shares his experience by speaking internationally at both security and developer conferences on the topics of AppSec, Agile and DevSecOps. Buy him a whisk(e)y and he'll tell you all about it.

Michael Corby

M Corby & Associates, Inc.

Mr. Corby has directed and managed a successful IT security consulting practice for more than 30 years and has over 40 years of experience in IT strategy, operations, development and security.  He has successfully managed large projects, developed flexible IT infrastructures and sound security organizations for hundreds of the world's most successful organizations.  He is the founder of (ISC)2, Inc. the organization that established the CISSP security professional credential. In 1992, Mike was named the first recipient of the Computer Security Institute's "Lifetime Achievement Award".  A frequent global speaker and author he held executive positions with several global consulting organizations including CGI, Netigy Corporation, QinetiQ, Gartner Group and Marsh & McLennan, prior to his current responsibilities.  He was formerly CIO for Worcester's Riley Stoker division of Ashland Oil and for Bain & Company.  A community supporter through the Chamber of Commerce and many professional groups, Mike has established a reputation for creativity and excellence in technology and its application to business needs.  He holds a BS EE degree from Worcester Polytechnic Institute; holds the PMP distinction from Project Management Institute; Scaled Agile Practitioner, Certified Computer Professional (CCP), Certified Information Systems Security Professional (CISSP) and is a Certified Business Continuity Professional (CBCP).

Arshan Dabirsiaghi

Contrast Security

Arshan Dabirsiaghi is an accomplished security researcher with over 10 years of experience advising large organizations on application security. Prior to Contrast Security, Arshan spent 8 years at Aspect Security in a research role where he used static and dynamic technology to perform security assurance work, including code reviews, architecture reviews and penetration testing. From his experience at Aspect Security, Arshan quickly discovered that securing applications was a massive undertaking - one that required innovative, deeply accurate technology and continuous testing. His response was to co-found Contrast Security. Only the kind of technology that Contrast offers can help organizations escape the rat race that was legacy application security programs. In his role as Chief Scientist at Contrast Security, Arshan draws on experience to guide the product line, drive new products and features, and spreads the gospel about binary instrumentation.

Christina D'Antonio

GreyCastle Security

Christina D'Antonio (ECIH) is a specialist-level technology, information security and risk management professional. Christina is a 2015 graduate of SUNY Albany's Digital Forensics program. She currently holds two years of experience at GreyCastle Security assisting with the development and implementation of cybersecurity solutions for financial, healthcare, higher education, energy, information technology and gaming industries. Knowledge of HIPAA, PCI, ISO and NIST standards and regulations that can be applied in a variety of functions. Experience in Incident Response proactive and reactive functions, including program development and testing, as well as forensics, including collection and analysis of evidence.

Loren Dealy Mahler

Dealy Mahler Strategies, LLC

Loren Dealy Mahler is the President of Dealy Mahler Strategies, LLC, a strategic communications firm that advises clients on cybersecurity and defense-related issues, with a focus on increasing impact and effectively managing risk. She is a seasoned strategic leader with high-level government and private sector experience across national security, strategic communications and crisis management. From the White House to corporate America, Loren has helped   clients leverage effective communications strategies to further business and policy objectives, while mitigating brand impact through effective cyber incident planning and response.  Loren has advised top government officials in her roles as Director of Legislative Affairs at the National Security Council and as Communications Director for Office of Legislative Affairs at the Department of Defense. Prior to that, she ran the communications office for the House Armed Services Committee. After leaving government service, Loren helped Fortune 500 companies and national nonprofits grow and protect their organizations, as Vice President of Corporate Communications for a PR firm in New York.  In early 2016, she launched Dealy Mahler Strategies, LLC, and hasn't looked back.  Loren is a graduate of Princeton University and holds a Masters in Public Policy from the McCourt School at Georgetown University. She is the author of the "Communications War Room" blog at

Andrew Dolan

Multi-State ISAC

Andrew is the Director of Stakeholder Engagement for the Multi-State Information Sharing and Analysis Center, a division of the Center for Internet Security. The MS-ISAC has been designated by the U.S. Department of Homeland Security as the focal point for cyber threat prevention, protection, response and recovery for the nation's state, local, territorial and tribal (SLTT) governments. Under Andrew, the MS-ISAC has greatly expanded its membership since 2012, including representatives from all 50 States, D.C.  and over 1800 local and tribal governments. He is responsible for managing all aspects of member relations, working with government associations, and conducting outreach on behalf of the MS-ISAC.

Heather Engel

Sera-Brynn, LLC

Heather Engel is Chief Strategy Officer at Sera-Brynn, a globally ranked cyber risk management firm headquartered in Suffolk, Virginia where she oversees the Audit and Advisory division. She has over 18 years of experience in risk management, information assurance, business continuity planning, and security program development.  Prior to Sera-Brynn, Ms. Engel assisted government agencies and the Department of Defense in securing advanced information systems, developing cybersecurity programs, and coordinating cyber warfare exercises.     She is a Certified Information Systems Security Professional, a Payment Card Industry Qualified Security Assessor, and a Fully Qualified Navy Validator.  Originally from Binghamton, NY, Ms. Engel holds a Bachelor of Arts from the Pennsylvania State University and an MBA from Florida Institute of Technology. She is a 2015 Inside Business Women in Business Honoree and sits on the board of Virginia Economic Development Partnership. In 2017, she oversaw Sera-Brynn's certification as a Third Party Assessment Organization under the Federal Risk and Authorization Management Program (FedRAMP).    In the past year, she has been a featured or keynote speaker at numerous conferences across the country, served on cybersecurity panels with Former Vice President Joe Biden and Former Virginia Governor Terry McAuliffe, authored several journal articles, and frequently appears in the media providing commentary on cyber security.     Sera-Brynn is a global cyber risk management audit and advisory firm, a Payment Card Industry (PCI) Qualified Security Assessor (QSA), and a Third Party Assessment Organization (3PAO) certified under the Federal Risk and Authorization Management Program (FedRAMP).  Founded in 2011 by former members of the U.S. intelligence community, Sera-Brynn is ranked worldwide on the Cybersecurity 500 list and is known for its cyber risk management services.

Mohsan Farid

JANUS Associates

Mohsan Farid, CISSP, CEH, FITSP-A, CSSLP has over 18 years of experience in IT.  Mohsan has ran the gamut in the security space: from penetration testing for Rapid7 as a consultant, performing vulnerability assessments for numerous federal agencies and Fortune 500 companies, pentesting mobile applications, and contributing exploits to the Metasploit framework.  Mohsan is highly regarding by both his peers and client, and is considered to be a subject matter expert in advanced penetration techniques and mobile application security.     When Mohsan isn't breaking things, he likes to travel the globe in search of incredible surf, scuba diving, rock climbing and hiking experiences.

Jeff Fawcett


Jeff Fawcett serves as the Global Security Customer Solutions Director for the Public Sector.  He brings 30+ years of security experience in the design and operations of integrated security, risk management and compliance solutions. The solutions he architects and implements focus around increasing clients' current security investments while holistically improving the clients' security posture and decreasing the clients' exposure to security risks in a practical way, making him an effective thought leader.

Jayson Ferron

Interactive Security Training

CEO interactive security Training, LLC. Jay is a multi-certified Information Security Subject-Matter-Expert (SME) and with more than 30 years of professional experience, which includes Security & Compliance, Integration and Transformation Initiatives, IS Management Process and Operational Metrics Definition and Documentation. Customers include Community Health Network of Connecticut, Inc. (CHNCT), Cigna Insurance, Microsoft, Rogers Communications, AT&T, USMC, US Air Force, US ARMY and DISA. Other customers include banks, government agencies, health agencies and others.

Leigh-Anne Galloway

Positive Technologies

Leigh-Anne Galloway is the Cyber Security Resilience Lead at Positive Technologies where she advises organizations on how best to secure their applications and infrastructure against modern threats. She is an expert in the Application Security Unit, specializing in ATM and POS Security and is the author of security research in account recovery processes on social media websites. She has spoken at many conferences including DevSecCon, BSides, InfoSec Europe, IPExpo, Hacktivity, 8dot8 and Blackhat EU.

Michael Giordano

DynTek Services

Michael Giordano is the Principal Security Architect for DynTek Services, Inc, where he is responsible for helping clients develop risk management and cyber security strategies and solutions. Michael is a seasoned technology executive with a proven record of success in enabling security across the entire spectrum of information technology including enterprise architecture, advanced infrastructure, and audit compliance. His extensive cross functional background enables him to view challenges and opportunities from a customer's perspective.

His key positions have included IT management for a prominent NYC civil engineering firm as well as global technical leadership and architecture for one of the world's largest advertising firms. In these and other roles, Michael has directed a variety of transformative technology initiatives, led the deployment of integrated global networks, and overseen compliance efforts from both a private and public sector perspective.   

Michael's approach to risk management is based on aligning technology investments to organizational priorities through a customized controls-based methodology and strategic understanding of business objectives. His overriding goal is to develop optimized workflows for the effective production and consumption of actionable threat intelligence. 

He attended the University of Hartford where he studied Computer Science. 

Raj Goel

Brainlink International, Inc.

Author, entrepreneur, IT expert and public speaker, Raj Goel is globally known as the go-to man in cyber security and privacy law. He is committed to educating individuals and organizations about online safety and how to protect their most important assets - people and data. His expert advice helps individuals, companies and conglomerates navigate their way through the world's ever-changing technology and increasingly complex IT compliance laws. He often appears in the media and at conferences world-wide to educate the public on cyber-security and digital privacy, a subject he is passionate about.

Eric Green

Cyber adAPT

Eric Green is the Security Strategist at Cyber adAPT, a monitoring, detection and mobile security solution. He has been in the security industry for over 18 years. In that role Eric has been consulting as a security subject matter expert (SME) most often on the subject of mobile security but also threat detection, security awareness and a number of other topics.

Eric has served as an SME for the NSA's National Information Assurance Partnership (NIAP) in developing the requirements for the mobile device management protection profile used to create a Common Criteria for mobile device management. He was also part of the team tasked with the creation of a mobile security management certification for CompTIA.

Past experience also includes running a technology book division publishing 12 books with a wide variety of industry luminaries, primarily in security. For the last 9 years, Eric has and continues to also serve as program director for SC Media.

F. Paul Greene

Harter Secrest & Emery, LLP.

F. Paul Greene, partner at Harter Secrest & Emery, LLP,  brings years of experience to handling complex litigation matters in highly regulated industries. He provides clients with strategies to prevent, address, and resolve disputes in areas including privacy and data security, health care, and construction claims and design professional defense.

As chair of the Firm's Privacy and Data Security practice group, Paul counsels clients of all sizes in a wide range of industries concerning all aspects of pre-breach preparation and risk management, including security and vulnerability assessments, policy and procedure review, breach response planning and drills, as well as board and management education on cyber risk issues. After the breach, Paul, his team, and the team's professional consultants provide a full array of breach coach and response services, including breach response and remediation, crisis management and communication, internal and governmental investigations, breach notification, and potential litigation or regulatory action.

Paul's clients have included long-term and health care providers, insurers, and groups; Fortune 100 companies; a major credit card and travel-related services company; an international shipping and logistics company; an international printing and packaging company; a health care trade association; a public water authority; design professionals and construction companies; automotive dealers of all sizes; as well as closely held businesses and individuals.

He has litigated in numerous venues, including the Supreme Court of the State of New York (both on the trial and appellate level, as well as before the New York State Court of Appeals), United States District Courts around the country, the American Arbitration Association and the International Centre for Dispute Resolution. He also devotes a significant portion of his time to pro-bono representation and support of cultural organizations.

Fluent in German, Paul has also represented German-language clients in commercial disputes before American judicial and arbitral tribunals.

Thom Hallock

Mountain Lake PBS

Thom Hallock is a journalist and senior producer for Mountain Lake PBS in Plattsburgh and host of the station's news, public affairs, and political programs.  He has worked for 35 years as a television news reporter and anchor at stations in Pennsylvania, Maine, and for the past 20 years in Plattsburgh.  Thom has won numerous awards from the Associated Press, New York State Broadcasters Association, and 2 Edward R. Murrow awards.  His reporting on the environment was also nominated for an Emmy.

Lenny Halseth

Secure Decisions

Lenny Halseth is a Senior Software Engineer with more than a decade of professional experience developing applications that cover a large range of problem spaces and technologies. In his current work as a cyber security researcher and developer with a focus on Application Security, Lenny is involved in the design and development of Code Pulse, a real-time code coverage analysis tool for penetration testing activities. As a member of the DHS-funded ASTAM application security project development team, Lenny also led development of a new application security and compliance framework. Lenny has developed applications for software assurance, code quality and development practice evaluation, and serious gaming. As part of a DHS Phase I and Phase II SBIR, he helped to design and develop a comprehensive application vulnerability management tool that correlates, analyzes and prioritizes software security vulnerabilities which was transitioned and commercialized as Code Dx. He has also played pivotal roles in developing CodeFacts - a Navy Phase II SBIR that aids the assessment of software quality and development practices.  He has also participated in developing the Tactical Target Analysis and Prediction System (TTAPS) family of projects - all completed military Phase II SBIRs and Phase II options with a focus on Command and Control (C2), simulation, training, and gaming technology integration for modern human-computer interaction paradigms. Lenny has also previously led a team to develop a suite of applications that facilitate large scale coordinated movement and schedule management. That suite covered desktop, mobile, and web-based usage and is currently deployed in many real-world operational environments.  Lenny holds a Bachelor of Science in Computer Science from Gonzaga University, Spokane, WA.

Kevin Heckel


Kevin has more than 22 years of experience in risk compliance, application security, business process controls, identity management, cyber risk management, information technology controls design & implementation and assessments of policies and procedures, with specialization in compliance, application security and business process controls.       Kevin has led many projects including security implementations (application, identity and compliance solutions), cyber assessments, compliance reviews and streamlining, GRC implementations and full scale enterprise transformations. 

Mat Keller

CA Technologies

Mat Keller is a Principal Consultant on the CA API Management Public Sector Team. Mat brings over 20 years of Public Sector IT experience as Developer, Architect, secure code reviewer, Web Applications Team Lead and Project Manager for both the Department of Defense and USDA. He is passionate about the benefits of adopting an API Management strategy to accelerate, secure and manage API's and achieve faster time to market for web, mobile and modernization initiatives.

Rose Ketchum

Semel Consulting

Rose Ketchum is a Certified HIPAA Security Professional with over 30 years' experience in IT and compliance. She has worked with many businesses, governments, BOCES, and school districts throughout New York.

Kathleen Kelleher

Arrow Financial Corp.

Kathleen Kelleher is Executive Vice President and Chief Information Officer for Arrow Financial Corporation, which includes Saratoga National Bank and Trust Company.  She has over thirty-five years of experience in the financial technology industry and has worked for both sides, technology companies as well as community and national banks.  Over the last fifteen years, she has experienced the growing expectations from government regulators and the public that confidential personal data is protected and secured.  During that same time period, businesses and customers have demanded that more and more financial transactions be conducted over the Internet, giving rise to the new danger of cybercrime.  Kathleen is passionate about information security and has played a critical role in developing and managing Arrow's Information Security Program. She firmly believes that the only way to maintain a successful program is to make security awareness and best practices part of your company's culture.

David Leinberry


David has over 35 years' sales and sales management experience with in the North East.  The last 20 years have been spent in Information Technology and security software, including: McAfee, Dell, Mandiant and the last 3.5 years with Fortinet.  David was brought on to help evangelize the Fortinet Sandbox.  This has evolved to presenting Fortinet's, end to end, proactive Security Fabric solution, including the integration with Fortinet's:  firewalls (FortiGate's), mail, endpoint, web application firewall and now third generation SIEM.  Fortinet provides automated detection and assisted mitigation for all advanced malware threats including: APT, Targeted attacks, Ransomware and Zero Days.        David covers the East Coast for Fortinet's Enhanced Technology suite of products including: FortiSandbox, FortiMail, FortiSIEM, FortiWeb, FortiCache, DDoS and ADC (load balancing just to name a few of the 26 different security solutions Fortinet offers.    David lives North of Boston with his two daughters.  He enjoys coaching them in soccer, skiing on the weekends during winter, with the occasional trip to the Caribbean to sail and SCUBA dive or camping excursion in the forest throughout New England.

Patrick Matthews


I have 30 years of experience working in almost every role of information technology, such as Programmer, System Administrator, Network Administrator, Security Operation Center, and Penetration Tester.  I have held these position in the roles of employee, business owner and consultant in a range of industries.  Additionally, I hold industry certifications in these areas.    While I would like to say my experience in these diverse industries provides for a deeper understanding of what could happen to a business depending on threat actor risk. However, like others in the industry, it is surviving from being a troubled child to "adulthood" that allows for this understanding and knowledge.  By applying a honest reflection, with understanding of technology, allows for providing understand threat actor's motivation to a business in my penetration testing engagements.   Over the years as a security consultation I have seen certain failures happen again and again on engagements. I currently have been focused on trying to education non security professionals on how to better protect themselves from cyber attacks.

Devi Momot

Twinstate Technologies

Devi Momot holds the CISSP, GSLC and GISP certifications and is the President/CEO of Twinstate Technologies, a NYS Certified WBE with 50 years in business.   Momot has a unique ability to communicate and articulate the complex issues surrounding privacy and security threats of today. Using understandable and relatable information along with real life examples, she maintains the interest of her audience.  For the previous decade, much of the communication and education available in Security and Privacy has been technically focused.  Momot's efforts are to increase the knowledge level for non-technical leaders, whose decisions and future, require a better understanding of threats, security and privacy and to those technical advisors who work with non-technical leaders and require their buy in.  Momot is a credential holding Information Security Professional and advises customers on the importance of privacy and security awareness and practice.   Momot speaks nationally on the topic of Security and Privacy.  She also has attended "Leading Professional Service Firms" at the Harvard Business School.  She has a BS from the State University of New York, a certification in Telecommunications Management from Golden Gate University, and an AAS in Electrical Engineering from Mohawk Valley Community College. She is a present member of a number of advisory boards and Board of Directors, such as the Sophos Partner Advisory Council, Mitel Advisory Counsel, Channel Intelligence Consortium, and many others.    Born and raised in Northern New York, Momot enjoys family activities, ongoing learning, the outdoors and welcomes the opportunity to raise awareness and action when it comes to improving security and privacy.

Christopher Novak


Chris is a co-founder and the Global Director of the Verizon Threat Research Advisory Center. He is an internationally recognized expert in the field of Investigative Response and Computer Forensics. He has been involved with information security for over 15 years. Christopher has assisted corporations, government agencies, and attorneys with all matters involving computer forensics, fraud investigations, and crisis management. He has testified as an expert witness in various matters and before such bodies as the Supreme Court of the State of New York. He has also briefed United States congressional committees such as Senate Banking, House Financial Services, Senate Commerce, House Energy & Commerce, Senate Judiciary, House Homeland Security and Senate Homeland Security & Government Affairs.  Christopher specializes in high-level crisis and emergency response matters and is regularly consulting with Government agencies and executives from Fortune 500 companies with regard to pre-planning for such situations as well as leading active crisis response matters and liaising with external partners.  Christopher is an active public speaker, discussing various topics ranging from high-level best practices to executive-level crisis management. He has been a contributing author of the Verizon Data Breach Investigations Report since its first publication in 2008 and has been featured in such media outlets as The Wall Street Journal, ABC News, American Banker, and many others. Christopher is an active member among multiple industry trade groups and a frequent guest lecturer at universities. He also serves as an advisor for many industry-related associations in an effort to further promote cybersecurity awareness and education as well as working closely with organizations as it relates to various policy initiatives on the topic of cybersecurity.  Christopher holds a Bachelor of Science Degree in Computer Engineering from Rensselaer Polytechnic Institute.

NYS Forum Information Security Workgroup

The NYS Forum Information Security Workgroup works with government agencies to develop education, training opportunities and tools focused on the essential issue of security. This session will be be presented by:

Tristan Amzallag graduated from Skidmore College in 1998 and went on to found a successful .com in 1999 called Klipmart. Over a period of 7 years, Klipmart became the premiere online advertising video platform for clients such as fortune 500 companies, movie studios, automobile companies and many other clients.In 2006 Klipmart was successfully purchased by Doubleclick and shortly after Doubleclick was purchased by Google where Tristan Held the position of VP of ad Innovation.

In 2009 Tristan made a permanent move to Upstate NY where he opened a number of brick & mortar stores still operating  today.

Bitcoin caught Tristan's attention in 2011 and in 2013 he dived into the process of mining Bitcoin as well as a new alt coin that had emerged - Litecoin. In 2013 Tristan built a large enough mining rig to handle 2% of the entire Litecoin transaction network right from his basement.

Tristan has been teaching and lecturing about Bitcoin at local colleges and business groups since that time. He is a teacher for LearnCryptoFast, instructing students on the various coins and tokens that have appeared on the market.

Tristan has also acted as an ICO advisor to companies such as DV labs and SpaceoutVR in their efforts to tokenize and raise capital.

Rick Cobello has over 25 years' experience in enterprise technology and security solutions. His career has spanned from local and state government to Fortune 5 companies. He has global experience in healthcare and worked with the Secretary of Health, in Brazil, implementing supply chain and compliance systems. He is the CISO for Tech Valley Talent and is an adjunct professor in the Albany Law Cyber Security Program teaching on Supply Chains and Cyber Security.

Dr. Joseph J. Salvo is the Founder of the Industrial Internet Consortium now with over 3500 members representing 250 organizations from over 25 countries. The goal is to connect brilliant minds and machines in powerful value creation networks. For the past 20 years he and his laboratory have developed a series of large-scale internet-based sensing platforms to manage and oversee business systems and deliver a portfolio of information-based services. Some of their commercial business releases include complex decision platforms  (e.g. GE Veriwise(tm) GE RailwiseTM, Global Vendor Managed Inventory, Ener.GE(tm), and E-Materials Management) that deliver near real-time customer value through system transparency and knowledge-based computational algorithms. Pervasive networked sensors and cognitive systems combined with near-real-time collaboration can deliver time-critical information and decision analysis across traditional business boundaries. Total supply chain, digital manufacturing, energy management and financial services can be integrated to create a virtual enterprise environment that encourages discovery and process improvement on a global basis. High speed optical and wireless communication fabrics can enable distributed knowledge networks that extend the reach of these systems with anywhere/anytime access to mission-critical information and control points. The accelerating rate of development in crowdsourcing, blockchain, and secure, authenticated cloud computing platforms promises to further democratize the flow of information, computation, and ideas on a truly global basis.

Murray Smith is a Senior Manager with Accenture's Health & Public Service practice. Since joining Accenture in 2007 he has worked with Public Sector and Government clients in both Europe and North America. Murray's specialization has been in welfare reform and pension administration with a focus on business rules management.

For the last 18 months, Murray has been focusing on setting up Accenture's Public Sector Blockchain capability. He has developed Accenture points of view on the blockchain market and led the creation of a Government Data Sharing Blockchain solution on the Hyperledger blockchain platform.

Amihai Zeltzer is Director of Industries, Travel, Transportation, and Hospitality, at Salesforce. He has been recognized as an innovative thinker and transformation leader by Constellation Research, People & Computers, Stanley Black & Decker and Salesforce. Amihai is a board member at BiTA (Blockchain in Transportation Alliance), representing Salesforce Industries. Before joining Salesforce in 2017, Amihai led a business transformation at Stanley Healthcare (a division of Stanley Black & Decker), reporting to the President. He previously worked at AeroScout, a provider of RFID and location-based technologies for healthcare and industrial companies that was acquired by Stanley, and as a developer of ERP and EDI technologies at Kimberly-Clark. Amihai served as a lieutenant in the intelligence unit of the Israel Defense Forces and is an avid sailor.

Adewale Omoniyi


Adewale Omoniyi is a Cyber Security and Blockchain Technologies Solution Architect in the Cybersecurity and Biometrics (C&B) Service Line for IBM Global Business Services, Public Services. He currently serves as the IBM GBS Federal Healthcare Cybersecurity Lead and GBS Cybersecurity Public Services Blockchain Leader. He has strong Solution Architecture, Engineering, client management and delivery credentials; partnering with clients to help secure critical information systems and data and reduce security and privacy risks.

Adewale earned his executive Master of Business Administration (MBA) in Strategy and Global Business at New York University (2014). He has a Business Administration (BBA) in Management and Information Systems from Temple University. He has also earned the following cybersecurity certifications CISSP, CISM, CRISC.

Gopal Padinjaruveetil

Auto Club Group

Gopal Padinjaruveetil has over 20+ years of experience in the IT Industry as CISO, Chief Application Security and Compliance Architect, Enterprise Architect, Solution Architect, Integration Architect ,& Systems Programmer. Beyond a very deep and broad technical background in Governance Risk, Compliance, Security and Privacy, Gopal is CISA,CISM,CGEIT CSRIC, TOGAF9 certified. He was a featured speaker on Cybersecurity at Oracle Open World 2013/2014, HP Discover 2014 Barcelona Spain, and HP Discover 2016.

Emilian Papadopoulos

Good Harbor Security Risk Management

Emilian Papadopoulos is president of Good Harbor Security Risk Management, a premiere cyber security risk management advisory firm. Emilian advises Boards, CEOs, investment professionals, and government leaders on managing cyber risk. He has helped clients across sectors including energy, insurance, law, technology, defense, and manufacturing, among others. Mr. Papadopoulos' experience in strategic planning and international security risk management spans North America, the Middle East, Latin America, and Asia. He has published and presented extensively on topics including cyber risk management and cyber security diligence, including at RSA in Abu Dhabi and San Francisco. Before joining Good Harbor, Emilian worked for Foreign Affairs Canada and for the Canadian Embassy in Washington, D.C., where he helped launch the Embassy's Connect2Canada diaspora outreach program. Emilian is a graduate of the University of Toronto and received a Masters of Public Policy from the Kennedy School of Government at Harvard University, where he serves on the Alumni Board. Emilian is an affiliate faculty member at Georgetown University's Master of Science in Foreign Service Program, teaching on cyber security.

John Parmley

Safe T USA

John Parmley, CEO, Safe-T USA, Inc.    As the CEO of Safe-T USA, John heads the company's North America sales and operations activities. A subject matter expert on acceleration of pipeline development and sales in early stage security start-ups, John boasts an acute understanding about computer and network security solutions for businesses.   Prior to joining Safe-T, John served as Area Vice President US West and Canada at Tufin Technologies, the leader in security policy orchestration solutions. John has also held roles as Director of Worldwide Channel Management and Enterprise Sales at Veriwave Inc. (acquired by Ixia) and Senior Director Enterprise Sales for Airmagnet (acquired by Fluke Networks).  John holds a Bachelor of Science in Geology from the University of Wisconsin Oshkosh.

Mike Perez

Boston Cyber Consulting

Mike is currently an implementation engineer for a startup.  In the past, he has been a security analyst/pentester/COO for a boutique penetration testing firm, and executive producer of the largest infosec podcast in the world. Trained as a Civil Engineer, he has spent time in QA, technical support, and as both a firewall and network security analyst. He holds multiple SANS certifications and a BSCE from Northeastern.

Terry Rice

Epigen Technology Corporation

Terry Rice, President & CEO of Epigen Technology, for the past twelve years, has been the CxOs' consultative architect supporting various government agencies including Department of Homeland Security, U.S. Immigration and Customs Enforcement, and Health and Human Services Inspector General.  Terry's expertise and passion is to help organizations meet next-generation mission objectives within budget, managing the migration of resources and technology to mitigate cyber and fraudulent activities.    He is a fifth generation enlisted Marine. After serving six years and participating in the first gulf war, he worked at the Space Imaging division at Lockheed-Martin managing the application development division; after Lockheed, he became the practice manager for Information Strategies; he went on to start a commercial and government consulting practice where his clients included Network Solutions and Verisign, as well as various government agencies.     Notably, Terry worked within the Department of Homeland Security for Immigration and Customs Enforcement. His primary duties were as Chief Architect and lead design for Enforcement and Removals Operations, Secure Communities, and the Student and Exchange Visitor Program (SEVP).

Renault Ross


Renault Ross is the United States Cybersecurity Business Strategist for Symantec, North America. In this role, Ross leads information security and privacy thought-leadership discussions and strategies, increasing Symantec's presence in public and private sector. He joined Symantec in 2007 and was appointed as the fourth US Distinguished Systems Engineer in 2015.

Ross represents Symantec as a conference keynote speaker, an expert witness providing senate testimonies (state) and CxO briefings around the country on security best practices. His expertise lies in enterprise security management, virtualization, mobility and cloud.

Prior to Symantec, Ross worked as a global security architect at a private company located in Atlanta, GA. His duties included establishing the organization's first global security program with compliance, vulnerability management and incident response.

Ross holds many certifications including, the Certified Information Systems Security Professional (CISSP), Certified HIPAA Security Specialist (CHSS), Microsoft Certified Systems Engineer (MCSE), Symantec Certified Specialist (SCS), Certificate of Cloud Security Knowledge (CCSK), and VMware Certified Professional (VCP5).

Denis Ryan

Proofpoint Inc.

Denis Ryan is Senior Director, Email Fraud for Proofpoint, Inc. Previously, Denis held management positions at several well-known high-tech companies including Nominum (now part of Akamai), Tellabs (now Coriant), Verizon and IBM. As a sales leader of the fastest growing business unit in Proofpoint, Denis oversaw the go to market sales and sales engineering strategy post the Return Path business unit acquisition. The diverse background of IT and security solutions allows Denis to overlay the Proofpoint sales efforts in multiple verticals, most notably Healthcare as Proofpoint has ramped this specialized team to improve email authentication practices. He resides in the Dallas-Fort Worth metroplex, mentors undergraduates for his alma mater (University of Dallas) and volunteers his time for various local charities.

Ashok Sankar


Ashok Sankar is the Director of Solutions Strategy focused on public sector and education markets at Splunk. In this role, he is responsible for evangelism of the company's solutions portfolio, leading thought leadership and strategic initiatives, customer engagements and content marketing strategies for the company's portfolio of data analytics solutions. He brings expertise across analytics, security, mobile, cloud and virtualization technologies and their applications in public sector and commercial industries.   He has presented at seminars and conferences on topics that include security, mobile technologies, cloud computing, content management and industry applications.

John Santoro


John Santoro helps clients understand how to implement application ecosystems and digital business technology platforms.

At IBM, Mr. Santoro coded, tested, and deployed applications in order to compare IBM's Cloud and Middleware solutions to competitors such as Red Hat, Oracle, Mulesoft, and Amazon.

Mike Semel

Semel Consulting

Mike Semel is the President and Chief Security Officer of Semel Consulting, focused on HIPAA, NYS DFS 500, (and other regulatory) compliance and Business Continuity planning. Mike is a Certified Security Compliance Specialist, Certified Business Continuity Professional, Certified HIPAA Security Professional, and Certified Health IT Specialist. He has owned or managed technology companies for over 30 years; served as Chief Information Officer (CIO) for a hospital and a K-12 school district; and managed operations at an online backup company. In 2017, Mike became a best-selling author of 'How to Avoid HIPAA Headaches'.    Mike helped CompTIA develop the Security Trustmark Plus certification for businesses; has chaired CompTIA's IT Security Community; and is an active member of the FBI's Infragard program, Mike has authored HIPAA training courses and has had numerous articles published in magazines and on websites. He is a nationally-recognized speaker, including NASA, the NY State Cyber Security Conference, and for the FBI Infragard.

Michael Singer


In his current role, Michael is responsible for protecting the internal enterprise and security oversight for FirstNet. He has been granted several U.S. patents and has a strong background in data analysis, network security and technology development.

Michael joined AT&T in 1990, supporting application development. He served in a variety of roles in the network services organization including technical support, switch engineering, volume forecasting and technology planning. During his tenure, Michael has managed a variety of work centers responsible for provisioning, web hosting, security operations and technology development. Since 2002, Michael has been focused on delivering security capabilities. He led the development of AT&T's 24x7 security operations, threat management platform and various managed security services.

Michael earned an MBA from the Goizueta Business School at Emory University and a Bachelor's degree in Business Administration with an emphasis in Information Systems from the Bloch School at the University of Missouri - Kansas City.

Michael has given numerous security talks at industry conferences including InfoSec, Mobile World Congress and the Gartner Risk Summit. He has supported not-for-profit, Renew International, as a member of the Board of Trustees since 2012.

Colin Soutar

Deloitte & Touche LLP

Dr. Colin Soutar is a Senior Manager within Deloitte & Touche LLP's Cyber Risk Services practice. After finishing his studies in Dundee Scotland, Colin completed a two-year post-doctoral stint at NASA's Johnson Space Center, developing pattern recognition techniques for autonomous rendezvous and capture operations. He then served as the chief technology officer for over a decade with a Canadian-based biometric company. Colin has worked on cybersecurity, identity, and privacy projects, and helped to develop the NIST Cybersecurity Framework in 2013. He currently collaborates with commercial and federal clients to help develop and execute their cybersecurity risk management strategies, including adoption of the NIST Cybersecurity Framework.

Alexander Stein

Dolus Advisors

Dr. Alexander Stein is a global authority in the psychology of human risk and psychodynamic intelligence analysis. As a trusted advisor to senior corporate leaders and boards, he provides actionable predictive insight in human behavior and its drivers to understand and resolve complex human factor issues in organizational ethics, culture, compliance, and governance, and to proactively detect, mitigate, and respond to insider threats, executive misconduct, and white-collar and cyber malfeasance risks. He also serves as a specialist advisor to investigations, intelligence, litigation, and cybersecurity firms to develop sophisticated 3D profiles and precision forecasts of fraudsters or other malicious actors and their networks of affiliates and collaborators. He is a widely published and cited thought leader and expert commentator, and frequent keynote speaker and panelist. 

Steve Treglia


Steve was a prosecutor in New York between 1980 and 2010, the last 14 years of which he spent as founder and head of the Cybercrime Unit at the Nassau County DA's Office, a Unit which utilized its own in-house forensic and undercover online investigators. Prior to investigating cybercrime, he had been an organized crime prosecutor for 10 years in the Queens and Nassau DA's Offices.

Upon retiring from law enforcement in 2010, he joined Absolute Software Corporation, headquartered in Vancouver, BC. Absolute's SaaS solution is embedded in the firmware by the OEMs of all PC-based laptops. Activated when reported stolen to the police, Absolute's worldwide investigative staff (all former law enforcement) would track the stolen device's current location and determine its current possessor. Steve oversaw the investigative staff, working from his Long Island home, to ensure they conducted their investigations lawfully and in compliance with privacy requirements. During his tenure with Absolute, the investigative staff recovered over 40,000 stolen mobile devices.

Since Absolute's customers included a large number of healthcare entities, Steve assumed the responsibility of securing HIPAA training and become the HIPAA Compliance Officer for the Investigations Division. He obtained his HCISPP certification from (ISC)2 in 2015.

In January of 2018, Steve joined Cordium in New York City, a GRC Consulting Company. He holds the title of Cyber & Information Security Consultant, and is currently specializing in HIPAA and EU's General Data Privacy Regulation compliance.

During the 21 years of New York State's Cybersecurity Conference, Steve has presented at 19 of them.

Dan Turissini


Princess Young

U.S. Dept. of Homeland Security

Princess Young is currently the Lead Management and Program Analyst for National Awareness Programs in the Cybersecurity Education and Awareness (CE&A) branch of the U.S. Department of Homeland Security's office of Cybersecurity Communications (CS&C).  CE&A strives to promote and advance cybersecurity awareness, outreach, education, training, and workforce development throughout public and private sectors.    Ms. Young's responsibilities within CE&A include managing and coordinating the plan and strategic execution of National Cybersecurity Awareness Month (NCSAM) which takes place each October at the federal and national level.  She also directs strategic communications for the STOP. THINK. CONNECT.TM Campaign, a national cybersecurity awareness campaign that aims to teach safer online practices to all Americans. This program works to engage multiple stakeholders - government agencies and offices, non-profit organizations, academic institutions, and individuals - into a collaborative national cybersecurity awareness effort throughout the year.    Ms. Young holds an Honors Bachelor of Business Administration degree in Business Management and a Master of Business Administration degree in Information Assurance from Idaho State University.