Upcoming Summits
Kaska Adoteye
Forensic Neutral, Arbitrator, Mediator, JAMS Partner & CISO, Zeichner Ellmann & Krause LLP Executive Managing Partner, Law & Forensics
Daniel Garrie is a recognized leader in cyber security and is paving the way when it comes to 2017’s most pressing cyber and data breach issues. Daniel is a renowned special master, forensic neutral, mediator, and arbitrator with JAMS (www.jamsadr.com), retained for complex, high-stakes cases around the country focusing on cybersecurity, privacy, and data breach disputes.
As one of the most sought-after cyber security and data breach experts, Daniel is Head of the Worldwide Cyber Security Practice at New York-based law firm, Zeichner Ellman & Krause LLP. In addition to his Law Degree, Daniel holds a Bachelor’s and Master’s in Computer Science and his ability to speak as comfortably with engineers and developers as with lawyers and judges distinguishes him from other practitioners. Daniel combines his technical prowess and law experience when advising federal and state judges around the globe.
Mr. Garrie has testified as an e-discovery, cyber security and computer forensic expert witness and served as a forensic neutral in arbitrations in many State and Federal Courts. Daniel was the youngest sitting special master in the United States and has authored expert reports in disputes involving billions of dollars. Mr. Garrie has authored over 200 legal and technical articles and publications. His scholarship has been recognized by several Supreme Court Justices and cited in over 500 articles, publications, and opinions.
Prior to these roles, Mr. Garrie built and sold several technology startups and served as the Worldwide Director of Electronic Discovery & Information Governance at Charles River Associates. Mr. Garrie is also on the Advisory Board of a number of different companies, including Get.it, KoolSpan, and Bounce Exchange.
Mr. Garrie is also a Professor of Law at Rutgers School of Law in Cyberwarfare and Cyber Security.
Rich HeimannRichard Heimann is Chief Data Scientist at Cybraics Inc. Mr. Heimann joined Cybraics in January 2016 after leaving L-3 National Security Solutions where he was a Technical Fellow and Chief Data Scientist. His specializations include artificial intelligence, machine learning, and spatial statistics. Cybraics is a cyber analytics and managed security services company that is solely focused on building smart machines to allow humans to focus on threats that matter most. Richard was previously an Adjunct Professor at University of Maryland, Baltimore County, where he taught Spatial Analysis and Statistical Reasoning. Additionally, he was an Instructor at George Mason University, teaching Human Terrain Analysis and is also a selection committee member for the AAAS Big Data and Analytics Fellowship Program and currently an Advisor at Data Society. Richard has also published a book titled Social Media Mining with R (ISBN: 978-1-78328-177-0) a forthcoming book on Artificial Intelligence for Leaders. He has previously supported DARPA, NRL, DHS, and the Pentagon with data science support.
Tom BienkowskiTom has been in the network and security field for over 20 yrs. During this time he worked for large enterprises as a Network Engineer and for multiple network management and security vendors where he has had roles in Sales Engineering /Management, Technical Field Marketing and Product Management. Currently at Arbor Networks he is the Director of Product Marketing focusing on the fixed and mobile Service Provider markets.
Sam McLaneSam McLane leads Security Engineering at Arctic Wolf, bringing over 20 years of security experience to the team. Prior to joining Arctic Wolf, Sam led Product Management for and other sales functions for Blue Coat Systems’ Cloud Security Services business. Before Blue Coat, Sam was a sales leader at Lucent Technologies, managing the system engineering team for the eastern US. Prior to Lucent, Sam was a networking consultant at KPMG and network manager at Temple University. Sam holds a master of science in mathematics from Temple University and a bachelor of science in mathematics from Washington and Lee University.
Bill OlsonBill Olson has nearly 20 years of expertise in the information security and technology industry. As a member of the product management team with Tenable, Bill is responsible for understanding customer needs, helping to predict market needs and working closely with the development team.
Prior to joining Tenable, Bill was the vulnerability management subject matter expert for Qualys, where he was responsible for working with hundreds of clients to ensure that their vulnerability management programs were mature and focused on strong goals.
Keith Wojcieszek
Gilad PelegGilad is a seasoned industry leader with years of experience heading up major business functions, including M&A activities, for startups and global companies. Before joining SecBI, he led the business development, marketing and strategic activities that resulted in the sale of Oversi to Allot (NASDAQ: ALLT). Gilad previously led a $20M LGC Wireless business unit toward continuous growth and profitability, resulting in an acquisition by ADC (today NYSE: TEL), where he continued as VP Marketing of the Mobile Network business unit.
Earlier in his career, he served as an officer in an elite technology unit in Israel’s Defense Forces, managing the development and operations of infosecurity and communication systems. Gilad also co-founded a cyber security company focused on the prevention of social engineering hacks. He has a BSc in Electronic Engineering from Technion – The Israeli Institute of Technology, and an MBA from Tel Aviv University.
Sanchi Jayaram
Sam BisbeeAs the Chief Technology Officer at Threat Stack, Sam is responsible for leading the Company’s strategic technology roadmap for its continuous security monitoring service, purpose-built for cloud environments. Sam brings highly-relevant experience in distributed systems in public, private, and hybrid cloud environments, as well as proven success scaling SaaS startups. Sam was most recently the CXO at Cloudant (acquired by IBM in Feb. 2014), a leader in the Database-as-a-Service space, where he played a senior technical and product role.
Philadelphia
April 15, 2026


FinSec
April 22, 2026


Salt Lake City
April 23, 2026


Baltimore
April 28, 2026


South Florida
April 30, 2026


Denver
May 5, 2026


Boston
May 6, 2026


Nashville
May 13, 2026


Toronto
May 19, 2026


AppSec
May 27, 2026


Milwaukee
June 2, 2026


Hartford
June 3, 2026


St. Louis
June 9, 2026


Austin
June 11, 2026


Pittsburgh
June 23, 2026


AI for Next-Gen SOC
June 24, 2026


Minneapolis
June 30, 2026


Raleigh
July 15, 2026


DC Metro
July 23, 2026


State of Vulnerability Management
July 29, 2026


Detroit
August 18, 2026


Portland, OR
August 19, 2026


Threat Intelligence
August 26, 2026


Columbus
September 2, 2026


San Diego
September 10, 2026


Chicago
September 15, 2026


Attack Surface Management
September 16, 2026



Philadelphia
September 17, 2026


Atlanta
September 30, 2026


Identity
September 30, 2026


Scottsdale
October 1, 2026


Seattle/Bellevue
October 1, 2026


Boston
October 8, 2026


Silicon Valley
October 13, 2026


FinSec
October 14, 2026


Charlotte
October 20, 2026


Network Security
October 28, 2026


Dallas
October 29, 2026


Los Angeles
November 2, 2026


CSS Mega-Summit
November 4, 2026


Houston
November 12, 2026


New York
November 17, 2026


Government Security
November 18, 2026


Vancouver
November 19, 2026


Jacksonville
December 1, 2026


Cloud Security
December 2, 2026


GRC
December 16, 2026









































































































































































Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
| Cookie | Duration | Description |
|---|---|---|
| cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
| cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
| cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
| cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
| cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
| viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |









