Upcoming Summits
Daniel Garrie
Forensic Neutral, Arbitrator, Mediator, JAMS Partner & CISO, Zeichner Ellmann & Krause LLP Executive Managing Partner, Law & Forensics
Daniel Garrie is a recognized leader in cyber security and is paving the way when it comes to 2017’s most pressing cyber and data breach issues. Daniel is a renowned special master, forensic neutral, mediator, and arbitrator with JAMS (www.jamsadr.com), retained for complex, high-stakes cases around the country focusing on cybersecurity, privacy, and data breach disputes.
As one of the most sought-after cyber security and data breach experts, Daniel is Head of the Worldwide Cyber Security Practice at New York-based law firm, Zeichner Ellman & Krause LLP. In addition to his Law Degree, Daniel holds a Bachelor’s and Master’s in Computer Science and his ability to speak as comfortably with engineers and developers as with lawyers and judges distinguishes him from other practitioners. Daniel combines his technical prowess and law experience when advising federal and state judges around the globe.
Mr. Garrie has testified as an e-discovery, cyber security and computer forensic expert witness and served as a forensic neutral in arbitrations in many State and Federal Courts. Daniel was the youngest sitting special master in the United States and has authored expert reports in disputes involving billions of dollars. Mr. Garrie has authored over 200 legal and technical articles and publications. His scholarship has been recognized by several Supreme Court Justices and cited in over 500 articles, publications, and opinions.
Prior to these roles, Mr. Garrie built and sold several technology startups and served as the Worldwide Director of Electronic Discovery & Information Governance at Charles River Associates. Mr. Garrie is also on the Advisory Board of a number of different companies, including Get.it, KoolSpan, and Bounce Exchange.
Mr. Garrie is also a Professor of Law at Rutgers School of Law in Cyberwarfare and Cyber Security.
Richard Heimann is Chief Data Scientist at Cybraics Inc. Mr. Heimann joined Cybraics in January 2016 after leaving L-3 National Security Solutions where he was a Technical Fellow and Chief Data Scientist. His specializations include artificial intelligence, machine learning, and spatial statistics. Cybraics is a cyber analytics and managed security services company that is solely focused on building smart machines to allow humans to focus on threats that matter most. Richard was previously an Adjunct Professor at University of Maryland, Baltimore County, where he taught Spatial Analysis and Statistical Reasoning. Additionally, he was an Instructor at George Mason University, teaching Human Terrain Analysis and is also a selection committee member for the AAAS Big Data and Analytics Fellowship Program and currently an Advisor at Data Society. Richard has also published a book titled Social Media Mining with R (ISBN: 978-1-78328-177-0) a forthcoming book on Artificial Intelligence for Leaders. He has previously supported DARPA, NRL, DHS, and the Pentagon with data science support.
Tom has been in the network and security field for over 20 yrs. During this time he worked for large enterprises as a Network Engineer and for multiple network management and security vendors where he has had roles in Sales Engineering /Management, Technical Field Marketing and Product Management. Currently at Arbor Networks he is the Director of Product Marketing focusing on the fixed and mobile Service Provider markets.
Sam McLane leads Security Engineering at Arctic Wolf, bringing over 20 years of security experience to the team. Prior to joining Arctic Wolf, Sam led Product Management for and other sales functions for Blue Coat Systems’ Cloud Security Services business. Before Blue Coat, Sam was a sales leader at Lucent Technologies, managing the system engineering team for the eastern US. Prior to Lucent, Sam was a networking consultant at KPMG and network manager at Temple University. Sam holds a master of science in mathematics from Temple University and a bachelor of science in mathematics from Washington and Lee University.
Bill Olson has nearly 20 years of expertise in the information security and technology industry. As a member of the product management team with Tenable, Bill is responsible for understanding customer needs, helping to predict market needs and working closely with the development team.
Prior to joining Tenable, Bill was the vulnerability management subject matter expert for Qualys, where he was responsible for working with hundreds of clients to ensure that their vulnerability management programs were mature and focused on strong goals.
Gilad is a seasoned industry leader with years of experience heading up major business functions, including M&A activities, for startups and global companies. Before joining SecBI, he led the business development, marketing and strategic activities that resulted in the sale of Oversi to Allot (NASDAQ: ALLT). Gilad previously led a $20M LGC Wireless business unit toward continuous growth and profitability, resulting in an acquisition by ADC (today NYSE: TEL), where he continued as VP Marketing of the Mobile Network business unit.
Earlier in his career, he served as an officer in an elite technology unit in Israel’s Defense Forces, managing the development and operations of infosecurity and communication systems. Gilad also co-founded a cyber security company focused on the prevention of social engineering hacks. He has a BSc in Electronic Engineering from Technion – The Israeli Institute of Technology, and an MBA from Tel Aviv University.
As the Chief Technology Officer at Threat Stack, Sam is responsible for leading the Company’s strategic technology roadmap for its continuous security monitoring service, purpose-built for cloud environments. Sam brings highly-relevant experience in distributed systems in public, private, and hybrid cloud environments, as well as proven success scaling SaaS startups. Sam was most recently the CXO at Cloudant (acquired by IBM in Feb. 2014), a leader in the Database-as-a-Service space, where he played a senior technical and product role.
Tampa
January 24, 2025
Atlanta
January 31, 2025
Silicon Valley
February 12, 2025
Philadelphia
February 19, 2025
San Diego
February 20, 2025
Healthcare & Pharma
February 25, 2025
Denver
March 5, 2025
New York
March 6, 2025
Seattle/Bellevue
March 13, 2025
Attack Surface Management
March 25, 2025
South Florida
March 27, 2025
Dallas
April 1, 2025
Boston
April 2, 2025
Chicago
April 4, 2025
Baltimore
April 10, 2025
Identity, Access and Management
April 29, 2025
Nashville
May 15, 2025
Toronto
May 15, 2025
Austin
May 22, 2025
Salt Lake City
June 5, 2025
Milwaukee
June 12, 2025
Hartford
June 17, 2025
Financial Services
June 24, 2025
St. Louis
June 25, 2025
Raleigh
July 15, 2025
DC Metro
July 17, 2025
Vancouver
August 12, 2025
Detroit
August 19, 2025
Portland
August 26, 2025
Critical Infrastructure
August 26, 2025
Minneapolis
September 9, 2025
Chicago
September 10, 2025
Wall Street
September 16, 2025
Atlanta
September 19, 2025
Philadelphia
September 25, 2025
Columbus
September 30, 2025
Network Security
September 30, 2025
Silicon Valley
October 8, 2025
Charlotte
October 9, 2025
Boston
October 16, 2025
Ransomware
October 29, 2025
Seattle/Bellevue
October 30, 2025
Houston
November 6, 2025
New York
November 18, 2025
Nationwide
November 18, 2025
Jacksonville
December 4, 2025
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |