CyberSecurity Badge

Your Risk of a Major Cybersecurity Breach in 2015 is Huge

You know the old joke, just because you’re paranoid doesn’t mean they’re NOT out to get you? In today’s security world, it’s not funny.

The reality has shifted – from occasional breaches to daily warfare that reaches deep into the fabric of our lives. The enormity of the threat is incalculable – no matter what size your company or what business sector you occupy.


What You'll Know

  • You can't build a security program to reflect your risk strategy -- if you don't have one
  • The critical nature of understanding espionage techniques for uncovering cyberthreats
  • The challenges of securing medical data due to the diversity of applications and medical devices
  • That quantifying "unknown" security problems is essential to protecting against malicious online activity



What You'll Learn

  • If your budget is keeping up with your security threat
  • What is the real threat in your business sector?
  • Do you need breach insurance?
  • Does your mobile strategy need revamping in the face of threats?
  • Advanced persistent threat tools will become the norm in 2015. How can you prepare?
  • How much information is safe to share?
  • As threats get worse, what happens to anonymity, freedom of speech, and privacy?
  • Is there really such a thing as secure architecture?
  • Why does the industry have so much trouble identifying bad guys?
  • Can the techniques that secure the space shuttle and nuclear weapons help you in your security planning?
  • How to apply cyber trade craft to uncover espionage threats

What You'll Experience

  • A wake-up call!
  • A dynamic day learning solutions that actually work for security threats
  • The newest best thinking from companies like Dow Jones, Home Depot, HP, NERC, Cedars-Sinai Medical Center, Booz Allen Hamilton, and more
  • An opportunity to dig deep in Q&A and collaboration
  • An up-close look at exciting new products in the field
  • An unmatched networking opportunity
  • A chance for interaction over lunch and cocktails



Oct. 27, 2015 - San Jose, California


Justine Bone
Jim Anderson
Chris Calvert
Hank Thomas
Josh Greenbaum
Josh Jabs

Justine Bone

Chief Information Security Officer
Dow Jones, Selector Consultancy

As Chief Information Security Officer and Advisor at Selector Consultancy, Justine Bone acts as a cyber security executive and senior technology expert, with a background in risk management, information secutiry governance, identity management, and software security research. She joined Selector Consultancy from Hoyos Labs and Dow Jones, where she was CISO. There she was accountable for steering the company’s information security strategies. She and her team helped define and deliver News Corp.-wide products and solutions, ensuring quality implementation and regulatory compliance while helping to increase revenue, profitability, and overall business value. She also managed Dow Jones’ Identity department, founded the DevOps group, and helped drive various cloud migration initiatives.

Jim Anderson

BAE Systems America

Jim Anderson, president of the Americas of BAE Systems Applied Intelligence, brings over 25 years of experience of sales and consulting in the high-tech industry. He is an energetic leader who innovates on the edge. Anderson holds a bachelor of science in electrical engineering and computer science from Princeton University and an MBA from the Wharton School.

Chris Calvert, CISSP, CISM

Global Director, Solutions Innovation & Services Engineering
HP Enterprise Security Products

Chris leads the team that supports the HP Enterprise Security Products suite–ArcSight, Tipping Point, Fortify, and Atalla. Chris has over 24 years’ experience in information security. He brings extensive international experience in Europe and Asia. From 2007 to 2013, Chris was the CEO of Laconic Security, an ArcSight SIOC partner, where he personally led the design and build of many global multinational Security Operations Centers including; Walmart, Vodafone (Germany), Shell Oil (The Netherlands), Sony Network Entertainment, and Apple. Chris was previously director of professional services for Cybertrust, and manager of security intelligence and operations at IBM Global Services. Before joining IBM, Chris worked in the National Defense and Intelligence community in the field of Information Operations. He supported such agencies as the DOD Joint Staff, the Land Information Warfare Activity, and the Space Warfare Center. Chris served for 10 years in the US Army in Military Intelligence and Special Forces.

Hank Thomas

Principal/Cyber Intelligence and Security
Booz Allen Hamilton

Hank Thomas is a Principal/Director at Booz Allen Hamilton and a founding member and a Executive Director for its Cyber4Sight threat intelligence service. Since joining the firm in late 2004, Hank has grown his business from a niche four person, government focused, cyber intelligence team to a 100+ person worldwide effort. Prior to joining the firm, Hank served as a military intelligence officer in a variety of tactical, operational, and strategic positions, including at the National Security Agency.

Joshua Greenbaum

Enterprise Application Consulting

Joshua has over 30 years of experience in the industry as a computer programmer, systems analyst, author, consultant, and industry analyst. Josh regularly consults with leading public and private enterprise software, database, infrastructure, implementation, and hardware companies, and advises end users on technology infrastructure and applications selection, development, and implementation issues.

Josh Jabs

Vice President
Entrust Datacard

Josh Jabs was named Vice President upon the completion of the Entrust acquisition by Datacard Group in December of 2013. Josh joined the company in 2009 as VP Government Vertical Marketing, bringing significant experience in the government and security industries. Prior to joining Entrust Datacard, Josh directed investor engagements as an equity analyst in the Security and Financial Technology sectors at Roth Capital Partners and Piper Jaffray and held roles within the U.S. government in areas dealing with new technology investments and security research. He holds an MBA, master’s degree in electrical engineering, and received a bachelor in electrical engineering from the United States Air Force Academy.
Jamil Farshchi
Dr. Spencer Soohoo
Marcus H. Sachs
Charles Foley
Frank Teruel

Jamil Farshchi

Chief Information Security Officer
Home Depot

Named one of the top 10 most influential Chief Information Security Officers by Sys-Con, Jamil has successfully protected some of the world’s most sensitive information assets, including nuclear weapons, financial systems and networks, and complex technologies such as the space shuttle, Hubble Telescope, and Mars Rover. As CISO at Home Depot, Jamil is charged with the unique challenge of securing and enabling some of the most engaging, valuable and widely consumed content. Jamil has a BBA from the University of Oklahoma, a MS from the Wharton School/GSE and a PLD from Harvard Business School.

Dr. Spencer Soohoo

CSO/Director, Scientific Computing
Cedars-Sinai Medical Center

Dr. SooHoo has been with Cedars-Sinai for over 36 years, starting first as a biomedical engineer, then a research scientist in pulmonary medicine before moving into IT to manage a research computing facility at Cedars-Sinai before it was merged with the enterprise IT organization. His roles include managing data networking, security, servers, e-mail, storage, and a data center. Dr. SooHoo earned a BS in Electrical Engineering from the University of Rochester, a MS in Electrical Engineering from George Washington University, and MS and PhD degrees in Biomedical Engineering from the University of Southern California.

Marcus H. Sachs

Senior Vice President, Chief Security Officer
Verizon, North American Electric Reliability Corporation (NERC)

Marcus Sachs is NERC's Senior Vice President, and is active in several public/private partnership groups in Washington, including the Communications Sector Coordinating Council and the President’s National Security Telecommunications Advisory Committee. He holds degrees in civil engineering, computer science, and science and technology commercialization, and is pursuing a PhD in public policy.

Charles Foley

Watchful Software

Mr. Foley has over 20 years of experience leading both private and public company teams in the technology sector. Prior to Watchful Software, he was Chairman and CEO of TimeSight Systems, Inc., a developer of leading-edge storage and video management solutions for the physical security market. He also served as President of Tacit Networks, where he designed the marketing and business development strategies that led to their profitable acquisition by Packeteer. Mr. Foley sits on the Board of Directors as Chairman for Critical Links, Inc., and holding advisory positions with RackWare, Inc. and Phuture Concepts, LLC.

Frank Teruel

Chief Financial Officer

Frank Teruel is an experienced executive with significant domain knowledge in sales, finance, and operations. As chief operating officer at Lightpost Holdings, a global publishing, licensing, and media company, Mr. Teruel held global profit and loss responsibility and directed all group operating activities. Prior to joining Lightpost, Mr. Teruel served as chief financial officer and vice president of worldwide services and support for Vormetric, an enterprise data security and encryption company. Prior to joining Vormetric, he served as vice president of finance at Emagia Corporation, an enterprise software company focused on working capital optimization solutions. Prior to Emagia, he served as vice president of finance and chief financial officer at TelePost, Inc., an international provider of conferencing and collaborative solutions. Mr. Teruel has also served as managing director of Montgomery Financial Management where he was responsible for all aspects of the northern and southern California practices. He also brings experience from SyQuest, Inc (NASDAQ: SYQTQ) where he held senior financial and sales management positions and PricewaterhouseCoopers. Mr. Teruel is an adjunct professor at Santa Clara University’s Leavey School of Business and is a faculty member in the Business and Computer Information Systems department at De Anza College. He previously served as chairman of the Data Security Chapter of the International Association of Outsourcing Professionals, been an industry keynote speaker, contributed articles on data security, and served on a number of company and non-profit boards. He previously served as the president of the Thomas Kinkade Foundation and is the founder of Aqua Munda, an organization dedicated to clean water solutions for the developing world. Mr. Teruel holds a master of business administration from Liberty University, a Bachelor of Arts degree in business administration and is a CPA.




Cybersecurity Badge

Morning Session: 9:00 a.m. – Noon

Jamil Farshchi

Chief Information Security Officer
Home Depot

Securing Content in an Insecure World<

Learn how Jamil successfully protected some of the world’s most sensitive information assets, including nuclear weapons, financial systems and networks, and complex technologies such as the space shuttle, Hubble Telescope, and Mars Rover.

Justine Bone

Chief Information Security and Solutions Officer
Dow Jones, Selector Consultancy

The Future-State CISO

Technology evolves faster than Information Security best practices..New platforms, communication methods, and threats evolve faster than our ability to react. We aim to build dynamic security programs to reflect an organization's risk strategy - however the strategy is often non-existent. Justine will review traditional and emerging information security governance trends and discuss how that has affected the security industry's capabilities. She will shed light on the future of cyber security strategy and policy-making, and highlight what cyber security professionals need to focus on in order to better address the evolving needs of consumers, companies, and government services.

Chris Calvert, CISSP, CISM

Global Director, Solutions Innovation & Services Engineering
HP Enterprise Security Products

A Vision for the Future of Analytical Detection

Chris will delve into the modern day challenge of detecting bad guys and explain some of the reasons we as an industry find that so difficult. He will then present a vision and roadmap to leverage the capabilities of data science to detect advanced threats to the modern enterprise. Big Data is just a problem statement and a new set of plumbing tools but what we can do with that data using a scientific approach is much more interesting.

Lunch: Noon - 1:30 p.m.

Afternoon Session: 1:30 p.m. – 5:30 p.m.

Josh Greenbaum

Enterprise Applications Consulting

The Ever-Evolving Enterprise Threat Landscape (panel)

Panelists: Jim Anderson, President, BAE Systems America; Charles Foley, CEO of Watchful Software; Frank Teruel, ThreatMetrix; Josh Jabs, Entrust Datacard

Keeping track of the ever-evolving threat landscape is the first step in establishing a strategy to combat security threats.

Marcus H. Sachs

Senior Vice President, Chief Security Officer
Verizon, NERC

Managing the Security Unknowns

Donald Rumsfeld once said that there are things we know, and things we don't know; and there are things we don't know that we don't know. In this presentation we'll look at how to quantify "unknown" security problems, why they are important, and how they relate to protecting against online malicious activity. This presentation will describe a model of risk management based on knowns vs unknowns and show how it can apply to different risk management processes.


Dr. Spencer Soohoo

CSO/Director, Scientific Computing
Cedars-Sinai Medical Center

The Evolution of Healthcare Cybersecurity

Healthcare cybersecurity has historically lagged cybersecurity in other business sectors. But high-profile breaches have broadened the focus beyond HIPAA security and privacy compliance, and now, senior healthcare leaders are scrambling to catch up in terms of cybersecurity initiatives and spending. No longer are the CSO’s concerns viewed as theoretical. However, securing healthcare information is challenging because of the diversity of applications and medical devices where security has been an afterthought, a weak security culture, and the need to quickly access or share information for safe, effective patient care. This presentation will illustrate some of the challenges and lessons learned.

Hank Thomas

Principal/Cyber Intelligence and Security
Booz Allen Hamilton

Cyber Tradecraft or Espionage

Join a discussion of the journey of cyber intelligence from a military intelligence perspective and its application to commercial markets. Learn through vivid examples about cyber threats and impacts. Minimize your cyber risks by applying the cyber tradecraft and understand the criticality of espionage techniques for uncovering cyber threats 





Current Sponsors

                           HP                    Entrust Datacard              Watchful Software

                    BAE Systems     AT&T                 




Attendee Industries
Attendee Industries

Reach the Decision-makers in Cybersecurity – Present and Future

Cybersecurity is one of the Fastest-growing Markets in the World! Only IEEE Computer Society Attracts the C-Levels, the Top Techs, and the Hands-on Specifiers Who Are Driving This Rapidly Evolving Issue.

When you sponsor Rock Stars of Cybersecurity, you reach a unique audience – a level of decision-makers who don’t attend other symposia.

With an agenda aimed at real-world, business-critical decisions, and a lineup of experts unequaled at other cybersecurity events, Rock Stars of Cybersecurity is an obvious investment for any organization interested in influencing the future of cybersecurity technology.

  • Meet this influential group of users and potential users face-to-face
  • Enjoy the highly personal nature of the event to network and enhance your brand
  • Generate leads in a group where every attendee is a prospect
  • Share lunch and cocktails with people you want and need to know
  • Stimulate discussions resulting from the engaging, leading-edge presentations
  • Showcase your products and services in a dynamic, engaged environment

Sponsors at Rock Stars of Cybersecurity are integral parts of both the content and success of the event. Take advantage of these unique sponsorship opportunities –

Platinum Sponsor  

Gold Sponsor

Silver Sponsor

Panel Speaker Slot

Registration Sponsor

Luncheon Sponsor

Cocktail Reception Sponsor

Lunch Roundtable Sponsor – Bring a current customer and share your company’s technology story with a captive audience during lunch.

Table Top

Official Program Advertising

Conference Bag Insert

Sponsorship Contact

For more information and to secure your Cybersecurity Rock Stars sponsorship and/or exhibit space, please contact:
Sandy Brown




Hotel and Transportation

Fairmont Hotel

Located near Silicon Valley, the 20-story, two tower Fairmont San Jose caters to discerning and well-traveled business professionals. The hotel is conveniently located a short distance from San Jose International Airport. Half Price 'Green' Parking at Fairmonts in California provides overnight guests who drive hybrid vehicles reduced parking charges. 
Register by October 2, 2015 at 5:00 p.m. PST HERE to receive a discount rate.
170 South Market Street 
San Jose 
California, United States 
TEL + 1 408 998 1900 
FAX + 408 287 1648 


The Rock Stars of Cybersecurity Conference will be held on October 27 at the Fourth Street Summit CenterThe Fourth Street Summit Center, located three blocks from the Fairmont San Jose, features a 6,800-square-foot ballroom with more than 3,000 square feet of adjoining foyer space. Two open-air balconies and floor-to-ceiling windows provide spectacular views of Silicon Valley


88 South 4th Street
San Jose CA 95192

Maps & Directions

TEL + 408 998 1900 
FAX + 408 287 1648

International Numbers





Cybersecurity Badge

Register Now for Rock Stars of Cybersecurity 2015


27 Oct 2015 San Jose, CA

Early-Registration Pricing
IEEE/IEEE Computer Society Member: $229
Teams: $199 each for groups of three or more
Students: $165
Discounts also available for multiple events.



Computing Now