Author: Jennifer Hernandez

Featured Speaker: Scott D. Applegate

Scott Applegate is the Global Incident Response Manager for Dentons, the largest law firm in the world, where he manages cybersecurity operations and incident response for 180 offices in more than 80 countries. A retired U.S Army officer with more than 28 years of experience in leadership, management, communications, and security, Mr. Applegate has served in a variety of positions in peacetime and war including two combat tours in Iraq.

Featured Speaker: Kirsten Renner

Kirsten is the Sr Director of Recruiting at Novetta, an advanced analytics and full spectrum cyber security company. She studied HR Management at University of Maryland. After a short while working as a software developer, then help desk manager, she combined her love for technology and HR by becoming a Technical Recruiter and has been doing so for over 20 years. For the last decade, Kirsten has been primarily supporting

Featured Speaker: Laura Samso Pericon

Laura Samsó Pericón is a researcher bridging the gap between Cyber and Drone technology. She is a subject matter expert with 15+ years of civil-defense international experience focused in R&D, innovation, program/project management and business development in the Earth Observation and Cyber areas, in concrete in the fields of Unmanned Aerial Systems (UAS) and Satellites. Her interests also range from geopolitics to intelligence technologies. Her background is Electronics and Aerospace and

Featured Speaker: Jessica Gulick

A recognized cybersecurity practitioner and thought leader, Jessica Gulick began her career as an engineer 25 years ago. She has since led cyber security teams, launched and grown IT and cyber firms through her WOSB Katzcy, and is now focused on cracking the code on how to tackle the cybersecurity talent problem. She founded the U. S. Cyber Games in collaboration with the National Initiative for Cybersecurity Education (NICE) program

Featured Speaker: Chuck Easstom

Dr. Chuck Easttom is the author of 34 books, including several on computer security, forensics, and cryptography. He holds a Doctor of Science in cyber security, a Ph.D. in Nanotechnology, a Ph.D. in computer science, and three master’s degrees (one in applied computer science, one in education, and one in systems engineering). He is an inventor with 23 computer science related patents. He is a senior member of both the

Featured Speaker: Rob Richardson

Rob Richardson is a software craftsman building web properties in ASP.NET and Node, React and Vue. He’s a Microsoft MVP, published author, frequent speaker at conferences, user groups, and community events, and a diligent teacher and student of high quality software development. You can find this and other talks on his blog at (https://robrich.org/presentations) and follow him on twitter at (@rob_rich) Abstract: Service Mess to Service Mesh In our quest

Featured Speaker: Madinah Ali

Madinah S. Ali is the President & Co-Founder of SafePC Cloud- www.safepccloud.com. The company primarily focuses on data backup and recovery for midsize, enterprise, and government IT environments with an emphasis on cybersecurity. Ms. Ali formerly served as The Women in Technology (WIT) Chair/Board member for the International Association of Microsoft Channel Partners (IAMCP) Atlanta Chapter and currently serves as the Atlanta Co-Lead for The WIT Network. In 2020, she

Featured Speaker: Crystal Lee Hess

Howdy, My name is Crystal Lee Hess, I am a single mother of a six year old boy from Los Angeles. From 2016 to 2018, I was the Enterprise Engineer for Elefant Sciences that designed high-performance modular software systems to deploy capital in Over-The-Counter marketplaces. I currently contract as an Network Engineer for the Department of Defense, and co-founded, Tinker Now. Tinker Now is a United States-based company looking to

Featured Speaker: Mathew Heath Van Horn

Mathew J. Heath Van Horn is an Assistant Professor of Information Technology at the State University of New York, Delhi. Dr. Heath Van Horn has two master’s degrees: Computer Science and Information Resource Management. His Ph.D. is in Information Technology because while he still loves the math and dreams in 1’s and 0’s, he found more interest in exploring how cyber is being used. He loves to talk geek and