A Look at the 2018 ISC West Keynote Speakers

ISC West

Learn From the Industry's Biggest Names

ISC West has announced three high-profile keynote speakers coming to ISC West 2018 as part of SIA Education@ISC. This year's all-star Keynote Series includes three leading members of the security industry, who are all well known for their widely-respected accomplishments.

Keynote sessions at ISC West are free to attend for all ISC West registered attendees.

Register today and gain access to unprecedented insights on information you can use to stay up-to-date on the emerging security risks that we face in today's ever-changing world! 

Doug Maughan

Keynote 1: "Re-inventing Cybersecurity R&D: How DHS is Innovating to Deliver More Secure Systems"

Wednesday, April 11 | 8:30 - 9:30 A.M

Dr. Douglas Maughan, Cyber Security Division Director, Science & Technology Directorate for the Department of Homeland Security

In this digital age, where people and technology are increasingly connected, our security community is experiencing sweeping change. This calls for new thinking in how we invest in secure, private, and trustworthy solutions to secure our nation.

Keynote 2: "1 October"

Wednesday, April 11| 12:15 - 1:00 P.M

Deputy Chief Christopher Jones, Deputy Chief of the Las Vegas Metropolitan Police Department

Deputy Chief of the Las Vegas Metropolitan Police Department will present a brief overview of the incident that occurred during a concert festival in Las Vegas.

Deputy Chief Christopher Jones
Jeff Crume

Keynote 3: "Hacking Everything - The Dark Side of the Internet of Things"

Thursday, April 12 | 8:30 - 9:30 A.M

Jeff Crume, Distinguished Engineer and Master Inventor, IT Security Architect at IBM

With IoT, everything becomes a computer. The connectivity has opened up a world of possibilities for the security industry, with more to come in the not so distant future. But, this connectivity also means everything can be hacked - networks, cars, appliances, computers, tablets, and other devices - without our knowledge. If everyday items and networks are hacked, information about our habits and behaviors could be traceable to those with villainous goals. This session will offer examples of recent IoT hacks, the consequences of these breaches, and practical tips for installing cyber-secure systems as we utilize IoT for the next generation of innovative security products. 

Back to Top