Security and Privacy Entrepreneurs

November 8th 2019 – Security and Privacy Entrepreneurs

Venue:  SABA Software 4120 Dublin Blvd. Amenity Hub, Dublin, CA 94568

Theme: Security and Privacy Entrepreneurs

What are we doing? Who are we serving? Are we world collaborators? Are we Ninja Destroyers?

If you would like to join the conference committee, or if you would like to sponsor, speak, or be a liaison, Contact Robin Committee work is cool. Here are some of the people you are likely to meet.
Ali Bouhouch Recent CTO Sephora, Doug Meier MID LLC, Amit Gupta Tigera, Andrew Bennett Lendeavor, Anisha Tekwani Oracle, Fred Kost Oracle, Anoop Bhatia Torii Technologies, Ari Bose Torii Technologies, Bhabani Sah Instaleap, Craig Payne Ayla Networks, Darien Sharif Torii Technologies, Dave Karrow Split Software, Ed Glover Five9, Fred Bret-Mounet, Michelle Dennedy CPO – Podcast, Nalin Narayanam Intarcia Therapeutics, Inc., Nick Yoo, Prochi Sahoo JobVite, Instaleap, Rajan Barma Diya IT Solutions | Oodles Corp, Ray Espinoza Cobalt, Ron Herardian Basil Security, Sean Cordero Netskope, Sherri Douville Medigram, Inc., Srinivas Akella WOOTCLOUD, Steve King UberConnectForce, Inc.,  Sydney Grant HackerOne, Tom Branch Split Software, Yossi Appleboum Sepio Systems … to name a few
Pricing – There is no early bird, there’s just kindness Please register before  November 1st


Members – $55
Non-Members – $75
Member Sponsors (Paying it forward) $100
Students – $35
Enthusiasts and Explorers (a.k.a between roles) $35, or first come first serve free pass
Past Presenters – Your thank you certificate entitles you for one free admission
Platinum, Gold, Silver, Sponsors -communicate your guest list no later than November 1st

Note that luncheon will be a hot KEYFACTOR sponsored plate and our profits for November conference will be used towards Spring Scholarship. If you would like to propose a strong candidate for ISC2 East Bay support, please reach out to Director Education, Jing Zhang or Director Communications Outreach Maura Jones

Breakfast – Welcome – 8:45 – 9:15 AM Bagels Fruit, Coffee, Juice
  • Chapter Mission + Brother and Sister Organizations and the Industry Mission – Guest ISC2 SV, ISSA, CSA, ISACA
  • About your Board and Committee:
  • About Our Breakfast Sponsors:


Session 1: 9:15 AM Meet Ali

Topic – The Price of Luxury – How Highly Personalized Products Went Mainstream and the headaches that followed

Session Description: description coming soon

About your speaker: CTO & VP OF ENTERPRISE ARCHITECTURE AT SEPHORA, Ali Bouhouch is a transformational technology executive with over 20 years of success in leading consulting, software and data engineering teams and delivering cutting-edge solutions in e-Commerce, Client Experience and Advanced Analytics. Ali has deep experience in leveraging emerging technologies like Cloud, Big Data, In-Memory and Cognitive Computing to drive success throughout the customer journey in digital marketing and retail.

Prior to joining Sephora, Ali was at Grid Dynamics where he led a globally distributed team serving the technology needs of leading retailers like Macy’s, Kohl’s and American Eagle Outfitters. Before that Ali held leadership positions at Forrester, TIBCO and WIPRO. Ali has been a valuable member of the senior executive team at small Silicon Valley start ups as well as global enterprises.

Ali holds a BS degree in Electrical Engineering from San Diego State University and an MS degree in Computer Science from Arizona State University.

Session 2: 10:00 AM Leader Doug Meier
Slipping Behind the Curve of Reality

Session Description: Why you shouldn’t be building a security program – because you’re just going to do it the wrong way

Your perception of what it takes to build a security program is probably incorrect

Session 3: 11:00 AM Meet Michelle

Session Description:

About your speaker:

About XYX:


Session 4: Luncheon Sponsor KeyFactor

Private tables and appointments during afternoon sessions – sign ups during open lunch – CPE’s for follow up

Session 5: 1:15 PM

Running effective Identity & Access in a Start-Up World

 Meet Fred Bret-Mounet

Session Description: Managing IAM in a startup world through automation

Appropriate Identity and Access Management in the corporate world is a critical function to ensure one’s security posture. You don’t need to spend millions to get it right! You don’t need to have resources dedicated to managing it!
This talk will focus on how through automation, crowdsourcing and simple processes, one can ensure your employees only have the access they need. For example:
– our quarterly employee access review takes 5 minutes.
– terminated employees loose access within 5 minutes of leaving the premisses.
– provisioning of new employees is mostly automated based on role mappings.You can do all this without breaking the bank and have time to focus on the bigger problems! At the end of the day, humans are humans… they are unreliable! If you have regulatory or compliance requirements around IAM, you have no choice: you need to automate.

About your speaker:

Session 6: 2:00 PM  Meet Ron Herardian

Session Description:

About your speaker: Ron Herardian has a 20-year track record of success in enterprise software as a founder, investor, board member and advisor serving in multiple engineering, consulting and CxO roles. In his last role, Mr. Herardian was responsible for operations including DevOps and InfoSec, including SOC 2 and GDPR compliance. Mr. Herardian, who has worked for IBM Lotus, Cisco and Oracle in the past, is a graduate of Stanford University, a member of the Institute for Electrical and Electronic Engineers (IEEE) and a Senior Member of the Association of Computing Machinery (ACM). He is a speaker at conferences and events, as well as a published author who has coauthored a book and written many whitepapers and articles.

About Basil: Basil is a revolutionary new DevSecOps framework that prevents security and operational mistakes, as well as malicious insider actions; a secure middleware layer that performs code execution or data access on behalf of human or machine users. Users are defined, and security rules are stored on the blockchain. User actions are digitally signed, so that rule changes, approvals, and other actions are recorded on the blockchain. As a result, Basil creates a chain of integrity through the CI/CD pipeline.

Networking and Cake Break 3:00 PM Sponsor
The Future is Now-Meet The Entrepreneurs
Session 7: 4:00 PM  Meet
Women Who Innovate – Do We See A Difference in the Female v. Male Security Entrepreneur? Jackie, Anisha, Sherri, Prochi

Session Description:

About your Panel:

About XYX:

Session 8: 5:00 PM  Meet
Call To Action – How to Shift Left?

Session Description:

About your speaker:

About XYX:

Female portrait blended with abstract colors on the subject of joy of life and imagination
Scholarship Winners
Constantly DoGood
Sponsors Welcome
Committee Thank you
About ISC2
Getting Involved

(ISC)2 East Bay Chapter