Speakers at the Enterprise Risk / Security Management Strategies Conference

Chris Cronin
Chris Cronin is a Principal Consultant at Halock Security Labs in Schaumburg, IL in the Governance and Strategy Practice. Chris joined Halock after 15 years in IT leadership roles in operations, forensics and audit for private and public companies.

Chris’ involvement in regulatory compliance has a unique path, starting from forensic investigation at Enron, to bringing the first U.S. public company into compliance with Sarbanes Oxley, to now guiding companies toward compliance with Massachusetts CMR 17.00, HIPAA, ISO 27001, EU Safe Harbor, Sarbanes Oxley, PCI DSS and many other laws and regulations.

Chris is a certified GCIH and ISO 27001 Auditor, and holds a Master’s degree from Case Western Reserve University. He has served the SANS Institute on advisory boards and by developing course material for Audit and DLP.
Stephen Gates
Steve is a key security evangelist for Corero Network Security, having delivered hundreds of presentations and attack/defense demonstrations across the Globe. Steve has more than 25 years of computer networking and security experience with an extensive background in the deployment and implementation of next-generation security technologies.

Steve is a recognized Subject Matter Expert on DDoS attack tools and methodologies including defense technologies and approaches. You can usually find Steve speaking to network and security professionals within highly regarded organizations such as; InfraGard, ISSA, ISACA, Tech-Security Conferences, Interop, SecureWorld, RSA, SANs, IANS, GTRA and numerous other venues.
Steven Hunt
Steve Hunt, CPP CISSP, is a thought-leader and strategist whose career spans physical security and information protection, including safe cities, critical infrastructure protection, cybersecurity, and governance. He was inducted into the ISSA Hall of Fame for his achievements in converged physical/logical security. The physical security industry named him one of the 25 most influential people in the industry and CSO [Chief Security Officer] Magazine presented him with the “Industry Visionary” Compass Award.
For over 20 years Steve has been helping organizations to create value from physical and IT security investments. Currently his projects center in diverse industries: banking, oil & gas, software, and waste management. With each client, Steve helps to create a strategic vision, then maps out its execution including business justification, technical architecture, governance, risk management, compliance, technology selection, and training. His favorite projects are those business critical initiatives that touch both physical security and the IT infrastructure.
Michael Joel
Michael Joel is a Security Sales Consultant at Dimension Data, and is responsible for DD’s security practice in the Central region. He regularly collaborates with clients to design and implement security strategies to meet the changing security landscape. Areas of focus include security consulting and assessments, managed services, and global technology procurement. In past positions, Michael specialized in securing databases and large virtualized environments. At McAfee, he learned about the power of leveraging a holistic security platform. Before joining the security industry, Michael worked in the embedded computer development tools area, helping organizations program early cell phones and GPS systems.
Michael graduated from the University of Pennsylvania with a BS in electrical engineering. An ordained rabbi, Michael enjoys volunteering as an adult Jewish education teacher. He can be reached at Michael.joel@us.didata.com  
Edward Marchewka
Edward Marchewka is the Director of Information Technology for Gift of Hope Organ & Tissue Donor Network. In his role, Edward is responsible for maintaining and securing the infrastructure for 24/7/365 operations, supporting the IT customer environment, and delivering and supporting the enterprise applications that run Gift of Hope. His teams work with Gift of Hope’s internal and external customers to deliver high quality information and technology services. Edward is also the Founder and Creator of CHICAGO Metrics™, a platform to a program to help manage your company's key IT and Information Security risks enabling you to have a better conversation with business leadership in terms that they understand.

Before joining Gift of Hope Edward was the Enterprise Information Security and Server Operations Manager (CISO) for Chicago Public Schools, the third largest school district in the country. Additionally, his IT background includes experiences from running his own business to field service to Fortune 250 experience with Thermo Fisher Scientific. Edward holds active certifications from: (ISC)2, ITIL, PCI, Microsoft, CompTIA, and a designation from the NSA, along with legacy certifications from: Cisco and HP. He is a member of (ISC)2, AITP, and a Board Member with the Chicago InfraGard. Edward is involved with: ChicagoFIRST, Chicago Electronic Crimes Task Force, and is on the governing body for Evanta’s CISO Executive Summit.

Edward has completed, from Northern Illinois University, an MBA and an MS in Mathematics and, from Thomas Edison State College, a BS in Nuclear Engineering Technologies and a BA in Liberal Studies. He also holds a Certificate in Nonprofit Management from the Kellogg School of Management at Northwestern University.
Kevin Mock
Kevin J. Mock, CISSP has over thirty years of professional experience in Information Technology and Information Security. He has held various global leadership roles within Information Security related to the management of technology/information risk for large financial services companies over the last 17 years of his career. Areas of focus include information security practices, security compliance assessments, vulnerability management, defense in depth security, intellectual property protection, and IT infrastructure management. Kevin received his bachelor degree in computer science from Northern Illinois University.  
Robert Osborne
Robert has worked for some of the largest Fortune 100 Companies in the world. He has over 20 years of experience in Enterprise Architecture, planning, implementation, training and sales. Working for companies such as United Airlines, IBM, Microsoft and currently for Dell Inc.
Stemming from a background in Statistics and Artificial Intelligence programming, each new venture has provided me the opportunity to do things that were not done before in each of the companies I have worked for or with.
Adding IP and PC connectivity in the field and office in the US Army before it was done in the commercial sector. Adding A.I. and PCs in operating rooms in Hospitals before it was done as common place. To world wide implementations of Networks, client server, mainframe integrations, security, disaster recovery, and scalable designs across the world.

Joshua Shi
Josh is currently working as Head of Information Security at Ceannate Corp. implementing a new information security program from the ground up. He is a “been there done that” kind the guy that implemented many successful security programs across difference industries. In most recent years, he successfully brought the company current in compliance such as PCI, SSAE and FISMA certifications; He has a proven track record in implementing successful security programs to various companies across different industries; He enjoys sharing his experience and connects the same with others.

Barry Shteiman
Barry Shteiman is Imperva’s Director of Security Strategy where he works directly with the CTO Office and Imperva’s dedicated security research organization, the Application Defense Center. Barry brings more than a decade of experience in the field of information security. He has authored several application security tools and contributed code to a number of open source security projects. Barry is a dedicated contributor to Imperva’s security efforts as well as an active public speaker and security evangelist. Barry is the author of Imperva’s data center security Blog.
Kevin Thompson
Kevin Thompson is a threat analyst for FireEye, Inc. educating FireEye customers and partners on the latest cyber threats to their infrastructure. Before joining FireEye, Kevin worked as a cyber analyst for the Central Intelligence Agency in Washington DC. As an analyst, Kevin used digital exploitation and all source analysis to educate multiple agencies of the US Government on current and future cyber threats. Kevin's analytic work has been included in Presidential Daily Briefings and became a case study used in multiple training classes.
Kevin has also presented at numerous technical workshops and cyber threat conferences around the Washington DC area.

Neil Witek

Neil Witek is the VP of Information Security Governance and HIPAA Security Officer at AIM Specialty Heath. In his role, Neil is responsible for the implementation and governance of AIM’s security program, including Business Continuity and Vendor Risk Management. In 2011, AIM’s security program, safeguarding the provision of service to the health care industry, achieved formal certification against the ISO 27001 Standard. He has 20 years of IT/security experience working with organizations demanding a greater degree of sophistication regarding information security, control and governance. Neil is a CISSP, CISA, CIPP, PMP, GLEG and is a certified ISO 27001 ISMS Auditor.