Seattle Cybersecurity Conference

  • Conference

Join the Seattle Cybersecurity Conference to connect with your fellow cybersecurity professionals and industry experts for live, in-person sessions. Topic will range from cloud security to protecting your organization from advanced threat actors. You’ll hear from industry experts and luminaries, as well as representatives from some of the world’s top cybersecurity solutions providers. 

Attendees will hear from insightful keynotes on vital security topics and learn the skills needed to stay ahead of cyber threats, all while networking with peers at the Seattle Cybersecurity Conference!

If you are looking to book a room, you can view this list of nearby hotels.

YOU CAN’T AFFORD TO MISS THIS CONFERENCE:

green-single-small-dot
Education

Each full-day conference includes a complete schedule of insightful, education-focused presentations and discussions. Learn from industry leaders and luminaries during highly curated panels and keynote sessions on how to improve your organization’s security posture.

orange-four-dot
Access

Whether you’re looking for leading-edge technology solutions, insights from government security agencies, or thought leadership from industry experts, you’ll be met with extensive networking opportunities and opportunities to engage. 

yellow-double-small-dot
Experience

Spend the day in comfort, as we provide an executive venue experience. Enjoy abundant breakfasts and lunches, ample drinks and snacks throughout the day, plus a classy networking reception to end the night – all of which is included with your attendance.

blue-five-dot
CPE Credits

By attending the extensive educational sessions, you’ll be eligible for CPE credits, which you can claim to further your professional development.

blue-three-dot
Impact

It’s impossible to put a value on how much your organization could gain through your attendance. Knowledge is power, and your attendance will provide you with the skills and insight that could help your business mitigate inevitable cyber threats.

EVENT SCHEDULE

Each session will focus on various ways to manage your organization’s position in the complex cybersecurity landscape. You’ll learn how to bolster your defenses, protect your data and learn what the best solutions are for your goals.
09:00 AM to 10:00 AM
Networking Breakfast & Exhibit Hall Opens
Solutions Showcase
event-simple-logo
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
10:00 AM to 10:20 AM
How to Win Your Penetration Test: Tips, tricks, and theories for getting the most value out of an offensive security test
General Sessions
Rick Hein
Sr. Delivery Manager at Secureworks
Add to Calendar 09/28/2023 10:00 AM 09/28/2023 10:20 AM How to Win Your Penetration Test: Tips, tricks, and theories for getting the most value out of an offensive security test

Penetration Tests are the Swiss Army knife of information security. There is no more effective way to find your gaps, gauge your ability to detect and respond, or protect your crown-jewels than by running a live-fire exercise. However, don’t just buy the penetration test and wait for the results;there are numerous things you can do to ensure you wring out every last drop of value. 

Please join us for a candid conversation with some of the best offensive security minds on the planet. What you’ll learn: 

  • Major test types, and what questions they might help you answer 
  • How to get more than just findings 
  • Why you want to make your pen testers life hard

Penetration Tests are the Swiss Army knife of information security. There is no more effective way to find your gaps, gauge your ability to detect and respond, or protect your crown-jewels than by running a live-fire exercise. However, don’t just buy the penetration test and wait for the results;there are numerous things you can do to ensure you wring out every last drop of value. 

Please join us for a candid conversation with some of the best offensive security minds on the planet. What you’ll learn: 

  • Major test types, and what questions they might help you answer 
  • How to get more than just findings 
  • Why you want to make your pen testers life hard
10:20 AM to 10:50 AM
Protecting Against Cyber Attacks
General Sessions
event-simple-logo
Mikkel Hansen
Field Engineer at Sevco Security
Andy Stone
CTO - Americas at Pure Storage
Steven Alexander
VP of Sales - West at Solcyber
Shankar Subramaniam
Principal Solutions Architect at Elastic
11:20 AM to 11:40 AM
Guest Keynote Presentation: Fear, Uncertainty, and Doubt about the Metaverse
General Sessions
event-simple-logo
Zhanna Malekos Smith
Cyber Policy and Strategy Fellow, U.S. Army Cyber Institute, West Point
Add to Calendar 09/28/2023 11:20 AM 09/28/2023 11:40 AM Guest Keynote Presentation: Fear, Uncertainty, and Doubt about the Metaverse

Assuming art is what the German philosopher Arthur Schopenhauer defined as a “a scene within a scene like in Hamlet,” then perhaps that’s what the metaverse is — a 3D spectacle within a spectacle of virtual reality worlds. Gaming industry leaders envision the metaverse as an online social network that relies on haptic feedback and computer components, such as a VR headset, to synchronize users’ real-time physical movements with a digital avatar. As part of Web 3.0, this technology is already presenting unique threats and opportunities to users. The U.S. Congress is just beginning to discuss its economic potential, security guardrails, and human rights implications. Together, let’s explore the risk ecosystem surrounding this 3D spectacle within a spectacle of virtual worlds!

Assuming art is what the German philosopher Arthur Schopenhauer defined as a “a scene within a scene like in Hamlet,” then perhaps that’s what the metaverse is — a 3D spectacle within a spectacle of virtual reality worlds. Gaming industry leaders envision the metaverse as an online social network that relies on haptic feedback and computer components, such as a VR headset, to synchronize users’ real-time physical movements with a digital avatar. As part of Web 3.0, this technology is already presenting unique threats and opportunities to users. The U.S. Congress is just beginning to discuss its economic potential, security guardrails, and human rights implications. Together, let’s explore the risk ecosystem surrounding this 3D spectacle within a spectacle of virtual worlds!

11:40 AM to 12:00 PM
Elasticsearch in the Security Ecosystem
General Sessions
Shankar Subramaniam
Principal Solutions Architect at Elastic
Add to Calendar 09/28/2023 11:40 AM 09/28/2023 12:00 PM Elasticsearch in the Security Ecosystem

In an era where security challenges are escalating, this talk addresses the pivotal role that search and analytics engines play in resolving key pain points. We'll explore how these engines break down data silos, offer real-time alerting, and ensure data integrity for enhanced security measures. Attendees will gain insights into leveraging these tools for better risk assessment, compliance adherence, and incident response, all without the complexity typically associated with managing vast and diverse data sets.

In an era where security challenges are escalating, this talk addresses the pivotal role that search and analytics engines play in resolving key pain points. We'll explore how these engines break down data silos, offer real-time alerting, and ensure data integrity for enhanced security measures. Attendees will gain insights into leveraging these tools for better risk assessment, compliance adherence, and incident response, all without the complexity typically associated with managing vast and diverse data sets.

12:00 PM to 12:40 PM
Guest Keynote Presentation: “Track 2” Case Study: The Roman Seleznev Organized Cybercrime Investigation
General Sessions
event-simple-logo
Robert Kierstead
Director of Corporate Investigations, Sallie Mae
Add to Calendar 09/28/2023 12:00 PM 09/28/2023 12:40 PM Guest Keynote Presentation: “Track 2” Case Study: The Roman Seleznev Organized Cybercrime Investigation

Roman Seleznev was an extremely sophisticated and elusive cybercriminal who led a large scale criminal enterprise in which he hacked financial data from businesses in more than 20 states, and then sold this information on the dark web. In the process, Seleznev defrauded his victims of over $170 million. The U.S. Secret Service and its partners conducted one of the largest investigations in U.S. history to locate, apprehend, extradite, and ultimately convict Seleznev for his crimes. This presentation will discuss the casework that led to Seleznev's apprehension in Maldives and trial in the U.S. federal district of Western Washington (Seattle).

Roman Seleznev was an extremely sophisticated and elusive cybercriminal who led a large scale criminal enterprise in which he hacked financial data from businesses in more than 20 states, and then sold this information on the dark web. In the process, Seleznev defrauded his victims of over $170 million. The U.S. Secret Service and its partners conducted one of the largest investigations in U.S. history to locate, apprehend, extradite, and ultimately convict Seleznev for his crimes. This presentation will discuss the casework that led to Seleznev's apprehension in Maldives and trial in the U.S. federal district of Western Washington (Seattle).

12:45 PM to 01:15 PM
Lunch Break
Solutions Showcase
event-simple-logo
Meet, Engage & Enjoy Lunch with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
01:15 PM to 01:55 PM
Keynote Presentation: Making sense of Geopolitical Risks in 2023 – Impact on Cybersecurity & Compliance
General Sessions
event-simple-logo
Mathieu Gorge
CEO, Vigitrust
Add to Calendar 09/28/2023 01:15 PM 09/28/2023 01:55 PM Keynote Presentation: Making sense of Geopolitical Risks in 2023 – Impact on Cybersecurity & Compliance

There are four main bubbles of risks: IT, Financial, Reputation/Brand, Geopolitical. We will discuss the impact of current geopolitical changes that have made 2022 a year filled with warfare, cybersecurity, compliance and data protection issues. Looking forward in 2023 what can we expect and how do we make sure we are prepared to deal with these evolving geopolitical changes?

There are four main bubbles of risks: IT, Financial, Reputation/Brand, Geopolitical. We will discuss the impact of current geopolitical changes that have made 2022 a year filled with warfare, cybersecurity, compliance and data protection issues. Looking forward in 2023 what can we expect and how do we make sure we are prepared to deal with these evolving geopolitical changes?

02:30 PM to 02:50 PM
Tackling Third Party Identity and Access Head-On: Real-World Challenges and Realistic Solutions
General Sessions
Jennifer Kraxner
Identity & Risk Advisor, Therapist, and Problem-Solver at Saviynt
Add to Calendar 09/28/2023 02:30 PM 09/28/2023 02:50 PM Tackling Third Party Identity and Access Head-On: Real-World Challenges and Realistic Solutions

Organizations increasingly rely on external third parties and partners to do business and, as such, are grappling with the complex challenge of managing the identity and access for these external parties. We'll delve into the challenges that identity practitioners face daily when it comes to third parties, partners, vendors, and suppliers. We will dissect the common pain points that organizations encounter, from onboarding and lifecycle complexities to compliance and security risks. With a focus on transparency and honesty, we'll examine the lessons learned from past missteps and share best practices and innovative approaches to help you address third party identity challenges head-on. 

Join us for an interactive and informative session that will equip you with the knowledge and insights needed to confront the complexities of third-party identity and access management, all while fostering stronger relationships with your external partners. Don't miss this opportunity to gain practical wisdom and realistic solutions for a more secure and efficient extended enterprise.

Organizations increasingly rely on external third parties and partners to do business and, as such, are grappling with the complex challenge of managing the identity and access for these external parties. We'll delve into the challenges that identity practitioners face daily when it comes to third parties, partners, vendors, and suppliers. We will dissect the common pain points that organizations encounter, from onboarding and lifecycle complexities to compliance and security risks. With a focus on transparency and honesty, we'll examine the lessons learned from past missteps and share best practices and innovative approaches to help you address third party identity challenges head-on. 

Join us for an interactive and informative session that will equip you with the knowledge and insights needed to confront the complexities of third-party identity and access management, all while fostering stronger relationships with your external partners. Don't miss this opportunity to gain practical wisdom and realistic solutions for a more secure and efficient extended enterprise.

02:50 PM to 03:20 PM
2023 Trends and Directions In Cybersecurity
General Sessions
event-simple-logo
Isa Farnik
Senior Software Engineer
Anna Livingston
Solutions Architect at SecurityScorecard
Rick Hein
Sr. Delivery Manager at Secureworks
Jennifer Kraxner
Risk Advisor, Therapist, and Problem-Solver at Saviynt
03:40 PM to 04:00 PM
Guest Keynote Presentation: Becoming a CISO: The First 30 Days
General Sessions
event-simple-logo
Bryce Matsuoka
CEO/Founder at Above Cloud
Add to Calendar 09/28/2023 03:40 PM 09/28/2023 04:00 PM Guest Keynote Presentation: Becoming a CISO: The First 30 Days

Unlock the path to CISO success by mastering the critical phases of preparation, thriving in your first 30 days, and excelling in the role. Our presentation is your guide to navigating the intricate world of Chief Information Security Officers (CISOs). 

Prepare yourself comprehensively to assume the CISO mantle by refining leadership capabilities, understanding business / cybersecurity dynamics, and strategizing for board-level interactions. We'll emphasize the importance of preparing to meet with the Board of Directors, guiding you through the art of delivering impactful cybersecurity presentations and reports that resonate with the board's expectations. 

Even before your first day on the job, you'll gain insights into pre-employment preparation essentials. Learn how to shape your 30 day plan, align it with organizational objectives, and establish the foundation for your first 90 days and allow you to hit the ground running as a CISO. 

Once you're officially onboarded, we'll explore the pivotal first 30 days. Discover effective strategies to evaluate your organization's security posture, build critical relationships with key stakeholders, and gain quick wins. Real-world experiences shared by seasoned CISOs will provide valuable insights into avoiding common pitfalls and navigating the initial challenges. 

By the conclusion of this presentation, you'll possess the knowledge and confidence necessary to excel as a CISO. You'll not only safeguard your organization against evolving cybersecurity threats but also become a trusted advisor to the board, ensuring that security aligns seamlessly with strategic business objectives. Join us on this transformative journey toward CISO excellence and leadership.

Unlock the path to CISO success by mastering the critical phases of preparation, thriving in your first 30 days, and excelling in the role. Our presentation is your guide to navigating the intricate world of Chief Information Security Officers (CISOs). 

Prepare yourself comprehensively to assume the CISO mantle by refining leadership capabilities, understanding business / cybersecurity dynamics, and strategizing for board-level interactions. We'll emphasize the importance of preparing to meet with the Board of Directors, guiding you through the art of delivering impactful cybersecurity presentations and reports that resonate with the board's expectations. 

Even before your first day on the job, you'll gain insights into pre-employment preparation essentials. Learn how to shape your 30 day plan, align it with organizational objectives, and establish the foundation for your first 90 days and allow you to hit the ground running as a CISO. 

Once you're officially onboarded, we'll explore the pivotal first 30 days. Discover effective strategies to evaluate your organization's security posture, build critical relationships with key stakeholders, and gain quick wins. Real-world experiences shared by seasoned CISOs will provide valuable insights into avoiding common pitfalls and navigating the initial challenges. 

By the conclusion of this presentation, you'll possess the knowledge and confidence necessary to excel as a CISO. You'll not only safeguard your organization against evolving cybersecurity threats but also become a trusted advisor to the board, ensuring that security aligns seamlessly with strategic business objectives. Join us on this transformative journey toward CISO excellence and leadership.

04:00 PM to 04:30 PM
Cyber Inter-Agency Collaboration Panel
General Sessions
event-simple-logo
Ronald Watters
Cybersecurity Advisor Region 10
Zac Delecki
Private Sector Coordinator at Federal Bureau of Investigation (FBI)
Robert Kierstead
Special Agent in Charge (Ret), USSS
04:40 PM to 05:10 PM
Cyber Executive Roundtable
General Sessions
event-simple-logo
Zubair Alexander
Senior Information Security GRC Analyst at POWER Engineers, Incorporated
Bryce Matsuoka
CEO/Founder at Above Cloud
Robert Stretz
Chief Information Officer at StratusG LLC
Jason Platter
IT Manager at City of Lacey, WA
05:10 PM to 06:15 PM
Networking Reception & Signed Books
Solutions Showcase
event-simple-logo
Join us at the cybersecurity networking reception, where you'll have the opportunity to mingle with top industry thought-leaders and luminaires, exchanging insights and forging valuable connections in the ever-evolving world of cybersecurity.
Also receive a free signed copy of Mathieu Gorge's book "The Cyber Elephant in the Boardroom"
05:10 PM to 06:15 PM
Signed Books by Keynote Speaker Mathieu Gorge
Book Signing: The Cyber Elephant in the Board Room
event-simple-logo
Cyber-Accountability with the Five Pillars of Security Framework by Mathieu Gorge
Add to Calendar 09/28/2023 05:10 PM 09/28/2023 06:15 PM America/Los_Angeles Signed Books by Keynote Speaker Mathieu Gorge

Enterprise security and compliance are critical for the long-term viability of any business. In a world that’s increasingly reliant on sensitive data, the stakes are high, and the consequences of a breach catastrophic. Paradoxically, cybersecurity remains an often-thankless job. If done well, it goes unnoticed, but one failure could derail a career.

With security vulnerabilities posing a daily existential threat to businesses, The Cyber Elephant in the Boardroom questions why cybersecurity is relegated to the responsibility of an individual or small siloed team, when the reality is that a truly holistic security approach must be a team effort. To author Mathieu Gorge, change must start at the top.

Before any breach can be reliably prevented across any organization, cyber-accountability must breach the C-suite. In his 20+ years advising company executives around the world, Mathieu Gorge noticed a troubling trend. Despite CxOs overseeing so many critical business functions, few if any felt a responsibility to safeguard the one thing that could fatally compromise every function of the business: cybersecurity. Importantly, it was not because they weren’t willing to act; they simply didn’t know what they didn’t know. There was an inkling that more could be done, but determining the nature of that “more” and how to achieve it was always too daunting. Not anymore.

Informed by Mathieu Gorge’s encounters with CxOs spanning numerous industries, The Cyber Elephant in the Boardroom is a simple-to-understand methodology that leaders can deploy to establish cyber-accountability, starting with company leaders. Related in plain language comprehensible to leaders of any background, the core of Mathieu’s book is his 5 Pillars of Security Framework™.

“It’s a jargon-free, easy-to-implement, industry-agnostic methodology to help C-level executives and board members understand bubbles of risk, build enterprise cybersecurity strategies, and achieve cyber-accountability,” says Gorge.

With Mathieu’s expert advice, any C-level executive or board member can understand their responsibility towards cyber risk, visualize their organization’s current cybersecurity and compliance position, and learn tactics for implementing long-lasting, adaptable cybersecurity strategies.

Location of the event

Enterprise security and compliance are critical for the long-term viability of any business. In a world that’s increasingly reliant on sensitive data, the stakes are high, and the consequences of a breach catastrophic. Paradoxically, cybersecurity remains an often-thankless job. If done well, it goes unnoticed, but one failure could derail a career.

With security vulnerabilities posing a daily existential threat to businesses, The Cyber Elephant in the Boardroom questions why cybersecurity is relegated to the responsibility of an individual or small siloed team, when the reality is that a truly holistic security approach must be a team effort. To author Mathieu Gorge, change must start at the top.

Before any breach can be reliably prevented across any organization, cyber-accountability must breach the C-suite. In his 20+ years advising company executives around the world, Mathieu Gorge noticed a troubling trend. Despite CxOs overseeing so many critical business functions, few if any felt a responsibility to safeguard the one thing that could fatally compromise every function of the business: cybersecurity. Importantly, it was not because they weren’t willing to act; they simply didn’t know what they didn’t know. There was an inkling that more could be done, but determining the nature of that “more” and how to achieve it was always too daunting. Not anymore.

Informed by Mathieu Gorge’s encounters with CxOs spanning numerous industries, The Cyber Elephant in the Boardroom is a simple-to-understand methodology that leaders can deploy to establish cyber-accountability, starting with company leaders. Related in plain language comprehensible to leaders of any background, the core of Mathieu’s book is his 5 Pillars of Security Framework™.

“It’s a jargon-free, easy-to-implement, industry-agnostic methodology to help C-level executives and board members understand bubbles of risk, build enterprise cybersecurity strategies, and achieve cyber-accountability,” says Gorge.

With Mathieu’s expert advice, any C-level executive or board member can understand their responsibility towards cyber risk, visualize their organization’s current cybersecurity and compliance position, and learn tactics for implementing long-lasting, adaptable cybersecurity strategies.

Gold Partner

Silver Partners

Bronze Partners

Exhibiting Partners

Affiliate Partners

Sponsor

Our cybersecurity conferences empower you to make a personal connection with potential customers. Get your brand in front of key decision-makers who come to our conference looking for solutions to their security challenges.

Contact Us

We’re here to answer your questions, listen to your feedback and hear your comments. Please click on the button below to send us a message – feel free to share potential speakers, ask about sponsorships, or get attendance details.