Menu

Advisory Board

The RSA Conference Advisory Board is designed to assist in driving an impartial, yet informed dialogue on the rapidly evolving information security industry.

The Advisory Board extends the influence of the Conference by providing insight into trends and breaking news in the information security industry on behalf of the Conference, as well as offering guidance into overall program development.

Bio Image

Dmitri Alperovitch Co-Founder and CTO of CrowdStrike Inc.

Dmitri Alperovitch is the Co-Founder and CTO of CrowdStrike Inc., leading its Intelligence, Research and Engineering teams. A renowned computer security researcher, he is a thought-leader on cybersecurity policies and state tradecraft. Prior to founding CrowdStrike, Dmitri was a Vice President of Threat Research at McAfee, where he led company's global Internet threat intelligence analysis.

With more than a decade of experience in the field of information security, Alperovitch is an inventor of ten patented and sixteen patent-pending technologies and has conducted extensive research on reputation systems, spam detection, web security, public-key and identity-based cryptography, malware and intrusion detection and prevention.

As a recognized authority on online organized criminal activity, cyberespionage, cyberwarfare, and cybersecurity, Alperovitch has significant experience working as a subject matter expert with all levels of U.S. and international policy makers, intelligence and law enforcement agencies on analysis, investigations, and profiling of transnational organized criminal activities and cyberthreats from terrorist and nation-state adversaries. He is a well-respected technical and policy thinker on the most difficult global cybersecurity issues, and is a frequent speaker at military, intelligence, law-enforcement, academic and security industry conferences. Alperovitch has published and given numerous talks on the contemporary issues in cybersecurity policy such as cyberdeterrence doctrine, Chinese-sponsored cyberespionage and the use of cyberweapons on the future battlefield. Alperovitch is frequently quoted as a cyberpolicy and cybersecurity expert source in national publications, including The New York Times, USA Today, and The Washington Post, The Associated Press and Reuters.

In 2010 and 2011, Alperovitch led the global team that investigated and brought to light Operation Aurora, Night Dragon and Shady RAT groundbreaking cyberespionage intrusions, and gave those incidents their names. Prior to joining McAfee, Alperovitch led the research team and the Software-as-a- Service business at Secure Computing.

Alperovitch has served on the board of Georgia Tech Information Security Center (GTISC) Industry Advisory Board. In 2011, he was the recipient of the prestigious Federal 100 Award for his contributions to the federal information security.

Alperovitch holds a master's degree in Information Security and a bachelor's degree in Computer Science, both from Georgia Institute of Technology.

Bio Image

Wade Baker Co-Founder of the Cyentia Institute

Wade Baker is an independent consultant and co-founder of the Cyentia Institute, which is dedicated to improving cybersecurity decisions, practice, and products through data-driven research. Wade was formerly Vice President of Strategy and Analytics at ThreatConnect and, before that, Director of Cybersecurity Strategy and Research at Verizon. He had the great privilege of leading Verizon’s annual Data Breach Investigations Report (DBIR) for 8 years and also created the Vocabulary for Event Recording and Incident Sharing (VERIS) and the VERIS Community Database. Despite his industry-focused career, he’s never quite been able to kick the academic habit. His PhD work at Virginia Tech investigates techniques for measuring and modeling cybersecurity risk in supply chains. In his off time, he does his best to be a good dad to five awesome kids and a good husband to one incredible wife.

Bio Image

Joyce Brocaglia CEO, Alta Associates & Founder, The Executive Women’s Forum

Joyce Brocaglia is the founder and CEO of Alta Associates the leading executive search firm specializing in Cybersecurity and IT Risk Management. Ranked one of the top 50 executive search firms in the United States; Alta has an unprecedented track record of placing CISO’s and building world class diverse teams in cybersecurity, risk and technology. Joyce is a strategic advisor to her clients who has gained the trust and respect of the industry’s most influential executives by accomplishing their strategic and diverse hiring goals. She is a career advisor to industry thought leaders and a trusted member of the Information Security, Risk Management and Privacy industry. Joyce is sought after for her deep knowledge of the industry, market conditions, business intelligence and ability to create industry alliances. In 2002, Joyce founded the Executive Women’s Forum on Information Security, Risk Management and Privacy (EWF). Today the EWF is the largest member organization serving emerging leaders as well as the most prominent and influential female executives in their field. Joyce is known for her commitment to enabling women to achieve their professional goals and personal dreams through education, leadership development and the creation of trusted relationships. . Joyce’s numerous awards include: 2018 Top 50 Entrepreneur of NJ, 2017 IFSEC Global Cybersecurity Influencer, 2016 SmartCEO, 2015 CSO Compass, 2014 SANS Difference Maker Award and 2013 Woman of Vision. Joyce holds a Bachelor of Science degree in accounting from Montclair State University and is Certified Public Accountant.

Bio Image

Dawn Cappelli VP Global Security & CISO, Rockwell Automation

Dawn Cappelli is Rockwell Automation’s VP Global Security and CISO. She joined Rockwell in 2013 as Insider Risk Director and became CISO in 2016. Previously she was Founder and Director of Carnegie Mellon’s CERT Insider Threat Center. She is a leader in insider threat mitigation and has worked with government and industry leaders on national strategy issues. She has worked in cybersecurity since 2001 in partnership with the DOD, DHS, US Secret Service, other federal agencies, the intelligence community, private industry and academia. Previously she developed software for nuclear power plants for Westinghouse, and for Carnegie Mellon. She co-authored the book The CERT Guide to Insider Threats: How to Prevent, Detect and Respond to Information Technology Crimes (Theft, Sabotage, Fraud).

Bio Image

Narelle Devine CISO, Australian Government Department of Human Services

After 23 years serving with the Royal Australian Navy, Narelle Devine was appointed Chief Information Security Officer for the Australian Government Department of Human Services in 2016. The department delivers essential welfare and health services payments and her team protects the $190 billion in payments the department makes each year and the personal and financial records of 26 million Australians.

Bio Image

J. Trevor Hughes President & CEO, International Association of Privacy Professionals (IAPP)

As President and CEO of the International Association of Privacy Professionals (IAPP), J. Trevor Hughes leads the world’s largest association of privacy professionals. Hughes is widely recognized as a leading privacy expert, active contributor to the media, and has provided testimony on issues of privacy before the FTC, British Parliament and more.

Bio Image

Todd Inskeep Principal, Commercial Consulting, Booz Allen Hamilton

Todd Inskeep has spent more than 25 years bringing innovative, strategic thinking to Information Security problems across a range of industries and organizations. He currently leads Booz Allen Hamilton’s commercial product and manufacturing practice. Starting from secure radio systems he has worked in virtually every aspect of cybersecurity, including such diverse areas as early PKI and VPN systems, desktop systems, mobile, policy, security architecture and eCommerce - including fraud management. Most recently he's worked on cyber security assessments including overall security programs and specific assessments of supply chain security and product security.  He has filed multiple patent applications, and spent time as an Executive–in–Residence at the MIT Media Lab's Center for Future Banking. Todd started in the Information Security group of the National Security Agency (NSA), later joining Bank of America before spending time with Samsung Business Services.

Active in the Information Security community, Todd taught security and risk management classes at the University of North Carolina at Charlotte's NSA-Designated Center of Excellence in Information Assurance from 2003 to 2009. He is a Certified Information Systems Security Professional from the International Information Systems Security Certification Consortium, Inc. (ISC) and is a member of the Institute of Electronic and Electrical Engineers (IEEE). He has also served on the annual RSA Information Security Conference Program Committee since 2002.

Todd earned a Bachelor of Science degree in Electrical Engineering from West Virginia University in Morgantown, WV, and a Master's of Science degree in Strategic Intelligence/Signals Intelligence from the National Intelligence University in Washington, D.C.

Bio Image

Kim L. Jones CISM, CISSP Professor of Practice, Arizona State University

Kim L. Jones is a 31-year intelligence, security and risk-management professional with expertise in information security strategy, governance and compliance, security operations, and risk management. Jones was the principal architect of the cybersecurity concentration at Arizona State University and is currently a Professor of Practice at ASU. He is a former Chief Security Officer who has built, operated and/or managed information security programs within the financial services, defense, healthcare, manufacturing and business outsourcing industries. He was also the principal architect of the cybersecurity concentration at Arizona State University.  Jones holds a bachelor’s degree in computer science from the United States Military Academy at West Point, and a master's degree in information assurance from Norwich University. He also holds the CISM and CISSP certifications.

Bio Image

Laura Koetzle VP, Group Director, Forrester Research

Laura Koetzle leads Forrester’s global research organization that serves security and risk professionals. Her team’s research focuses on securing the systems, technologies and processes that firms need to win, serve and retain customers. Previously, as a Security and Risk Analyst at Forrester, Koetzle researched operating system security, network security and incident response. She also chairs Forrester's Privacy & Security Forum event. Prior to Forrester, Koetzle was a Software Development Lead at Razorfish and at PC World Online. Her work has enjoyed wide exposure in the media, including BusinessWeek, the Economist, the New York Times and the Wall Street Journal. Koetzle has also appeared on CBC, CNN, CNBC and Reuters Television.

Bio Image

Wendy Nather Head, Advisory CISOs at Duo Security (now Cisco)

Wendy Nather is head of the Advisory CISO team at Duo Security (now Cisco). She was previously the Research Director at the Retail ISAC, as well as Research Director of the Information Security Practice at independent analyst firm 451 Research. Wendy led IT security for the EMEA region of the investment banking division of Swiss Bank Corporation (now UBS), and served as CISO of the Texas Education Agency. She speaks regularly on topics ranging from threat intelligence to identity and access management, risk analysis, incident response, data security, and societal and privacy issues. Wendy is co-author of The Cloud Security Rules, and was listed as one of SC Magazine's Women in IT Security "Power Players" in 2014, as well as an “Influencer” in the Reboot Leadership Awards in 2018.

Bio Image

John Scimone Sr. VP & CSO, Dell

John Scimone serves as Sr. Vice President, Chief Security Officer for Dell, where he leads the company’s global corporate security program.  John’s responsibilities span the full spectrum of strategy, planning, and operations, aiding Dell’s businesses in the management of security risk across the physical and cyber domains.  He is also charged with the advocacy of business resilience, including crisis management, business continuity and disaster recovery.

Before joining Dell, John served as the Global Chief Information Security Officer for the Sony Group family of companies, where he was responsible for building Sony’s first global information security and privacy organization and leading strategy, policy, and operations.  Prior to joining Sony, he also held a number of leadership positions at the U.S. Department of Defense, including as Director of Security Operations for the Secretary of Defense's communications office, where he led the facility, personnel, and cyber security programs.  John formerly served as a member of a predecessor organization of U.S. Cyber Command, where he led the development of enterprise information security programs that protected information belonging to the DoD’s more than two million employees.

John holds a Bachelor of Science degree in Computer Science, with a specialization in Information Assurance, from the Georgia Institute of Technology.  He also earned a Master of Arts degree in Strategic Intelligence, with a specialization in Counterintelligence, from the Institute of World Politics in Washington D.C.

Bio Image

Ed Skoudis Founder, Counter Hack

Ed Skoudis is the founder of Counter Hack, an innovative organization that designs, builds, and operates popular infosec challenges and simulations including CyberCity, NetWars, Cyber Quests, and Cyber Foundations. As director of the CyberCity project, Ed oversees the development of missions which help train cyberwarriors in how to defend the kinetic assets of a physical, miniaturized city. Ed's expertise includes hacker attacks and defenses, incident response, and malware analysis, with over fifteen years of experience in information security. Ed authored and regularly teaches the SANS courses on network penetration testing (Security 560) and incident response (Security 504), helping over three thousand information security professionals each year improve their skills and abilities to defend their networks. He has performed numerous security assessments; conducted exhaustive anti-virus, anti-spyware, Virtual Machine, and IPS research; and responded to computer attacks for clients in government, military, financial, high technology, healthcare, and other industries. Previously, Ed served as a security consultant with InGuardians, International Network Services (INS), Global Integrity, Predictive Systems, SAIC, and Bell Communications Research (Bellcore). Ed also blogs about command line tips and penetration testing.

Bio Image

Hugh Thompson Program Committee Chair, RSA Conference

As Program Committee Chair, Dr. Hugh Thompson is responsible for identifying domestic and global trends to help set the agenda for RSA Conference. He also plays a direct role in selecting session topics and speakers. A world-renowned security expert and former adjunct professor at Columbia University, Thompson holds a B.S., M.S. and Ph.D. in applied mathematics. He has co-authored four books and more than 100 publications on security and has testified before Congress on cyber security.  In 2006 he was named a "Top 5 Most Influential Thinkers in IT Security" by SC Magazine. Thompson is also the Chief Technology Officer at Symantec Inc. 

Bio Image

Sandra Toms Vice President and Curator, RSA Conference

Sandra Toms is vice president at RSA and curator of RSA Conference. In 1998, her vision was to establish RSA Conference as a global cyber security forum where technology vendors and businesses unite with the public sector against the common threat of cybercrime. Under her leadership, RSA Conference has grown from a single gathering of 3,000 attendees to become the world’s premier cyber security event, attracting more than 35,000 attendees each year. Toms’s commitment to continuous innovation and expertise in communications and strategy, have made speaking at RSA Conference a badge of honor amongst cyber security’s finest minds. She holds a B.A. in Psychology from UCLA and a J.D. from Santa Clara University, where she graduated cum laude and was the managing editor of the High Tech Law Journal.

Bio Image

Dr. Dena Haritos Tsmitis Director, College of Engineering Information Networking Institute (INI) & Founding Director for CyLab, Carnegie Mellon

Dena Haritos Tsamitis has led Carnegie Mellon University's (CMU) Information Networking Institute (INI) as director since 2004. Her efforts have prepared the next generation of information networking, security and mobility professionals equipped to be the movers and shakers of the tech industry. A student advocate and mentor of women in technology, Dena is passionate about increasing diversity in STEM fields. 

Under her leadership, Carnegie Mellon earned three distinct cybersecurity designations from federal agencies as a National Center of Academic Excellence for its merits in information assurance and cyber defense, research and cyber operations. Through these efforts, Dena is the principal investigator on the National Science Foundation (NSF) CyberCorps® Scholarship for Service (SFS) and the Department of Defense Information Assurance Scholarship Program (IASP) and has been awarded approximately $28M in federal scholarships under these programs for students who serve our nation.

Dena is a founding director of Carnegie Mellon CyLab, for which she spearheaded efforts in cybersecurity education, training and outreach. Among other education initiatives, she led the NSF-funded Information Assurance Capacity Building Program (IACBP), an intensive summer program to help build information assurance education and research capacity at minority-serving colleges and universities. Ninety-one faculty from 48 institutions over nine years benefitted from this program. 

Currently, she is a trustee of the American College of Greece and serves on the board of advisors for the Executive Women's Forum, RedMarlin, Inc., Prime Tech Partners and the Norfolk State University Information Assurance Research, Education and Development Institute. 

Carnegie Mellon honored Dena with the 2012 Barbara Lazarus Award for Graduate Student and Junior Faculty Mentoring and in 2017, she was named as the first recipient of the endowed Barbara Lazarus Professorship in Information Networking. For her leadership and impact, Dena was named 2018 Woman in IT Security Power Player by SC Magazine and received the 2008 Women of Influence Award, presented by Alta Associates and CSO Magazine. 

Prior to joining Carnegie Mellon in 2000, Dena had a variety of technology roles in industry. She holds a bachelor’s degree in information science from the University of Pittsburgh, a master’s degree in instructional technology from Duquesne University and a doctorate in higher education management from the University of Pennsylvania.

Bio Image

Caroline Wong Chief Security Strategist, Cobalt

Caroline Wong is the Chief Security Strategist at Cobalt.io

Caroline’s close and practical information security knowledge stems from broad experience as a Cigital consultant, a Symantec product manager, and day-to-day leadership roles at eBay and Zynga. She is a well known thought leader on the topic of security metrics and has been featured at industry conferences including RSA (USA and Europe), OWASP AppSec, BSides, All Day DevOps, and Shift AppSec.

Caroline has been featured in multiple Women in IT Security issues of SC Magazine and was named one of the Top Women in Cloud by CloudNOW. She received a Women of Influence Award in the One to Watch category and authored the popular textbook Security Metrics: A Beginner’s Guide, published by McGraw-Hill. Caroline graduated from U.C. Berkeley with a B.S. in Electrical Engineering and Computer Sciences and holds a certificate in Finance and Accounting from Stanford University Graduate School of Business.

This document was retrieved from http://www.rsaconference.com/about/advisory-board on Wed, 12 Dec 2018 23:36:48 -0500.