Rosenquist joined Intel Corp in 1996 and benefits from nearly 20 years in the field of security. Rosenquist specializes in security strategy, measuring value, and developing cost effective capabilities which deliver the optimal level of security. Currently, a cyber-security strategist for the Intel Security Group, he helped in the formation of this global organization which brings together security across hardware, firmware, software and services. Previously, he managed the security playbook for Intel's PC strategy planning group, encompassing all security features landing in the PC.
When an organization suffers a data breach, a number of challenges, impacts, and business decisions contribute to the total of all the associated costs. The scope extends beyond a fixed dollar-per-stolen-record calculation, as it invariably includes expenditures for new security measures, legal fees, third-party...
It's a boom time for cybercrime and cyber-espionage, aided by at least two factors. First, many organizations' websites and databases sport well-known technical weaknesses, while employees remain all to susceptible to low-cost social-engineering attacks. Second, attackers can pummel these technical and human targets...
A complete defense cannot be deployed overnight. There are multiple people, process and technology components to consider and implement. In this session, we will help identify where and how resources can be focused to have the biggest immediate risk reduction, discuss lessons learned from real-world deployments and...
Rosenquist joined Intel Corp in 1996 and benefits from nearly 20 years in the field of security. Rosenquist specializes in security strategy, measuring value, and developing cost effective capabilities which deliver the optimal level of security. Currently, a cyber-security strategist for the Intel Security Group, he helped in the formation of this global organization which brings together security across hardware, firmware, software and services. Previously, he managed the security playbook for Intel's PC strategy planning group, encompassing all security features landing in the PC.
Harkins is responsible for all aspects of information risk and security at Cylance as well as public policy and customer outreach to help improve understanding of cyber risks. He spent 23 years with Intel, most recently as its first Chief Security and Privacy Officer. In this role, he was responsible for managing the risk, controls, privacy, security and other related compliance activities for all of Intel's information assets, products and services. Before becoming Intel's first CSPO, he was the chief information security officer (CISO), reporting to the chief information officer. Harkins also held roles in finance, procurement and various business operations.
Dr. Chris Pierson is the Founder & CEO of BlackCloak - a concierge cybersecurity protection suite for high-net-worth individuals and top C-Suite executives. BlackCloak protects its customers from financial loss, cybercrime, hacking, reputational damage, privacy exposure, and identity theft. Dr. Pierson serves on the Department of Homeland Security's Data Privacy & Integrity Advisory Committee, DHS Cybersecurity Subcommittee, and is a Distinguished Fellow of the Ponemon Institute.
Chris has been on the front lines of cybersecurity and fighting cybercrime and has over 20 years - with DHS, President of the Federal Bureau of Investigation's Arizona Infragard, and in various other roles as a Chief Information Security Officer for financial companies. Chris was a founding executive of Viewpost, a FinTech payments company, serving as their CISO and General Counsel and was also the first Chief Privacy Officer, SVP for the Royal Bank of Scotland's (RBS) U.S. operations leading its privacy and data protection program. Chris was also a corporate attorney for Lewis and Roca where he established its CyberSecurity Practice representing companies who were hacked and fell victim to data breaches.
Chris is a globally recognized keynote speaker & cybersecurity thought leader, board advisor for startups, and is frequently quoted by the media on cybersecurity & privacy.
Rosenquist joined Intel Corp in 1996 and benefits from nearly 20 years in the field of security. Rosenquist specializes in security strategy, measuring value, and developing cost effective capabilities which deliver the optimal level of security. Currently, a cyber-security strategist for the Intel Security Group, he helped in the formation of this global organization which brings together security across hardware, firmware, software and services. Previously, he managed the security playbook for Intel's PC strategy planning group, encompassing all security features landing in the PC.
Shelton is a litigation partner in Alston & Bird's Los Angeles office. She focuses her practice on complex commercial litigation, with particular attention to privacy litigation, intellectual property, unfair competition and antitrust matters. She also provides strategic digital marketing and privacy compliance counseling on cutting edge issues, such as mobile apps, the Video Privacy Protection Act, Big Data and behavioral advertising. In 2012, she was named Intellectual Property Lawyer of the Year by the Century City Bar Association. In 2014, Shelton was named one of the Most Influential Lawyers: Digital Media and E-Commerce Law by the Los Angeles Business Journal. In 2014, The Recorder named her as a Leader in Technology Law. She has litigated matters involving state and federal laws, such as the Fair Credit Reporting Act, Telephone Consumer Protection Act, Federal Trade Commission Act, Electronic Communications Privacy Act, Computer Fraud & Abuse Act, California False Advertising Law and California Unfair Competition Law. She has negotiated with the California AG and FTC.
Global Data Security Executive, Expedient Solutions, Inc.
Cohen is a seasoned global operations and data security executive with extensive experience and a successful track record in both successful start-ups and public companies. Under her company, Expedient Solutions, she is retained to serve as the CIO/CISO of the leading independent data loss prevention firm, where she applies over 15 years of experience to create data protection services for both the company's internal networks as well as its clients' data loss prevention needs. This position has also permitted Cohen to create a data discovery donation program in memory of her sister, Leslie. The program helps nonprofit cancer organizations avoid heavy fines and damaging publicity while achieving compliance and maintaining patient privacy by receiving donations of market leading discovery and data classification tools.
Director of Information Security, Content Protection, Warner Bros.
Panico, who currently serves as director of information security - content protection, at Warner Bros, has over 15 years of information security experience. A former FBI supervisory special agent, Panico is credited with breaking up an international ring of botnet operators who used denial-of-service attacks to cause millions of dollars of damage. After that success, he was summoned to FBI Headquarters to lead a "fly team" of cyber investigators that responded to the most serious cyber intrusions facing the nation. This included two deployments to the Olympic Games in 2004 and 2006. After leaving the FBI in 2006, Panico joined Microsoft to serve as incident response lead for Microsoft's global data center infrastructure services and online web properties. Eventually, he was given responsibility for the entire CERT function for online services. Panico has served as a consultant to Fortune 500 companies, specializing in data breach investigations and digital forensics.
Rosenquist joined Intel Corp in 1996 and benefits from nearly 20 years in the field of security. Rosenquist specializes in security strategy, measuring value, and developing cost effective capabilities which deliver the optimal level of security. Currently, a cyber-security strategist for the Intel Security Group, he helped in the formation of this global organization which brings together security across hardware, firmware, software and services. Previously, he managed the security playbook for Intel's PC strategy planning group, encompassing all security features landing in the PC.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cybered.io, you agree to our use of cookies.