March 14, 2025 – ISC2 East Bay Winter Conference – Incident Response to Resilience @ Las Positas College

Held on the Livermore campus of Las Positas College, our speaker events combine large scale presentations, interactive labs and vendor tables, and opportunities for self development. Topics include: Incident Response & Resilience In Operations—Pragmatic Solutions | The SaaS Sprawl Nightmare: Control It Before It Controls You | Re-thinking Cybersecurity | The Non-Human Problem | Zero Trust in Action – Identity | Incident Response – Why we Need a Legal Playbook | From Crisis to Continuity: Building Resilient AI Governance | NG-SIEM, NDR, and Open XDR—Why We Built it This Way and Lessons Learned Along the Way | “Unfortunately you lost your data.” Who will be knocking on your door and why.

What to expect? More than a dozen industry experts known for their achievement across all domains of private, government, enterprise, and research sectors for Incident Response and Resilience gather to share their research, products and best advice from their individual fields. Leaning heavily into the implementation of Zero Trust and using AI, some of the topics you will hear include:

  • Incident Lifecycle Management: Understanding the stages of an incident, from detection to resolution and post-incident analysis, is crucial for building resilience. This includes identifying process gaps and leveraging automation to reduce cognitive load during incidents.
  • Culture of Resilience: Investing in a culture that promotes resilience can help organizations recover quickly from incidents and turn them into opportunities for improvement. This involves enhancing coordination, collaboration, and communication within teams.
  • Threat Analysis and Response Planning: Conducting thorough threat analyses and developing comprehensive response plans can prepare organizations for various scenarios, including cyberattacks, natural disasters, and other disruptions.
  • Tabletop Exercises (TTX): Simulating real-world incidents through tabletop exercises can help teams practice their response plans and identify areas for improvement.
  • Post-Incident Activities: Conducting blameless, narrative-based incident analyses and gathering multiple perspectives can provide valuable insights for future incident prevention and response.
  • Cross-Incident Analysis: Analyzing data from past incidents to identify patterns and trends can help organizations make data-driven decisions and improve their overall resilience.
  • External Communication: Establishing guidelines for communicating with external parties, such as law enforcement, partners, and the media, during and after an incident is essential for maintaining trust and transparency.
  • Resilience in Public Safety: Examining how public safety agencies respond to critical incidents, such as the Orlando Pulse nightclub attack, can provide valuable lessons for improving incident response and resilience.

Attendees receive up to 8 CPEs for attending and returning their mandatory feedback form. Volunteers and speakers can earn up to 13 CPE depending upon their level of preparation and event planning.

Pricing:

  • General Admission (including ISC2 guest members) – $145
  • Active ISC2 East Bay Member (Paid annual fee of $45) – $100
    • To qualify for discounted member rates, you must be an active ISC2 East Bay Member. Update your membership or become a member here: Manage Membership
  • Las Positas Students – Free. Please reach out to Bethany McCormick or Jeff Wick to get your link.

Conference Sessions & Schedule

8:00 to 8:45 AM – Registration, Breakfast, Networking with Vendors, Speakers, and Members


8:50 AM Greetings from ISC2 East Bay Chapter President & Conference Committee

Welcome Students. Welcome Entrepreneurs. Welcome Cyber Professionals and Job Seekers. Acknowledging our sponsors, the donation and use of Las Positas facility, and rules for the day. Feedback form, physical security, and payment to participate as an ISC2 East Bay member.

Session One – 9:15 to 9:55 AM | Alexandra Weaver, Sr Solution Architect at Semperis | Incident Response & Resilience In Operations—Pragmatic Solutions
 

Connect with Alexandra Weaver on LinkedIn

Topic: Incident Response & Resilience In Operations—Pragmatic Solutions

Alexandra has twenty years experience supporting Active Directory in a wide variety of organizations, from government to some of the world’s best-known companies. After 8 years supporting the DOI/Bureau of Land Management’s Active Directory, she moved to Intel to support their worldwide corporate and manufacturing forests. After some time in financial services IT, she moved to Nike where she also supported their worldwide production forest.

Her experience has included merger & acquisition projects where she migrated newly acquired companies into an existing Active Directory infrastructure, an Identity and Access Management implementation & migration project, upgrading domain controllers and associated downstream dependent applications and providing Active Directory support. Active Directory is Alexandra’s first tech passion, and she enjoys deep diving into it as associated technologies continue to evolve.

Semperis: Identity-driven cyber resilience and threat mitigation platform for cross-cloud and AD hybrid environments. Semperis provides security solutions for Active Directory (AD) environments. Their services include threat detection, response, and recovery.


Session Two – 10:00 to 10:45 AM | Christer Swartz, Director of Industry Solutions at Illumio |  Re-thinking Cybersecurity
 

Connect with Christer on LinkedIn

Topic: Re-thinking Cybersecurity
About Christer Swartz: Director of Industry Solutions at Illumio. Christer’s security career journey began at a small startup called Cisco and continued at Netflix and Palo Alto Networks. He has focused on industry-specific security challenges affecting platform integrations, from Cloud-managed Kubernetes to Data Center mainframes.

Illumio is a company that provides a platform for zero trust segmentation (ZTS) to help protect data centers and cloud environments from cyber threats. The platform is designed to contain breaches, stop ransomware, and highlight risk. Features: Microsegmentation |  Breach containment | Policy setting | Risk visualization
 


Very Quick Break and Announcements from Careers, Programs, and Education


Session Three – 10:50 to 11:30 AM | Jonathan Sander, CTO, Astrix – The Non-Human Problem
 

Jonathan Sander, Field CTO, Astrix

Topic: The Non-Human Problem

About: Jonathan Sander (aka Sander) has been working in IT since 1996 and focusing on Identity and Security since 2004. Whether it’s clarifying compliance and regulations for engineers or technical architectures for executives, his focus has been simplifying the translating complex ideas with analogies. Sander joined Astrix as their first Field CTO in 2025. He also currently serves as an Executive Board Member at ALTRand an Executive Advisor at Myota. Recently, Sander served as the Lead Sales Engineer at Talon (now part of Palo Alto) and was the founding member of the Security Field CTO team at Snowflake. If you don’t encounter him doing his duty spreading cyber-clarity far and wide, he can be found hanging around with his family or flipping through back issues at any comic shop he happens to see in his journeys.

As the pioneers of NHI security, we’ve helped leading enterprises extend IAM and threat detection and response to NHIs since 2021. Our customers can safely leverage GenAI, third-party apps, no-code platforms, and internal integrations without compromising security.

Non-Human Identities (NHIs) are the building blocks of automation and integration. They’re also organizations’ weakest security link – ungoverned, over-permissive, and with non-expiring access to critical systems.

Session Four – 11:30 AM to 12:15 PM | John Martinez Technical Evangelist, StrongDM | Zero Trust in Action – Identity
 

John Martinez Technical Evangelist, StrongDM

John Martinez is the Technical Evangelist at StrongDM and a long-time security practitioner who has worn many hats over the years. Before StrongDM, he worked in the Cloud Security space in Engineering and Customer-facing roles at Palo Alto Networks and Evident.io, where CSPM was created. Before that, he was a cloud security and operations practitioner at Adobe and Netflix.

Topic: Zero Trust in Action – Identity | Dive deep into the heart of Zero Trust security as we look at fine-grained access policies essential to the Zero Trust mandate of “never trust, always verify.”

StrongDM is a Zero Trust Privileged Access Management platform that centralizes and simplifies access manage-
ment across your entire infrastructure, on-premises or in the cloud. With Zero Standing Privileges and Just-in-Time (JIT) access, it enforces fine-grained, context-based policies in real time. Security teams gain deep visibility and action control to identify unused access, over-privileged roles, and compliance gaps. End users benefit from fast, intuitive access to resources, boosting productivity and efficiency.


Session Five Lunch n. Learn

Catered lunch includes options from https://freshnatural.com If you have specific dietary needs, such as Gluten Free, Vegan, or Kosher, please notify conferencecommittee@isc2-eastbay-chapter.org

Cybersecurity and Infrastructure Security Agency – Speak with CISA Cybersecurity Advisor Donald Hester

Donald E. Hester, CISSP, CISA, CGRC, CRISC, CISA Cybersecurity Advisor – San Francisco Bay Area Cybersecurity and Infrastructure Security Agency Region 9 (AZ, CA, HI, NV, AS, CNMI and GU) Cell: +1 (202) 315-8091 | Teams +1 (202) 984-3677 Email: donald.hester@cisa.dhs.gov

Report Cyber Issue | Critical Infrastructure Sectors | Traffic Light Protocol (TLP) | Free Cybersecurity Resources | Protect 2024 | Stop Ransomware | Secure Our World

CISA leads the national effort to defend critical infrastructure against the threats of today, while working with partners across all levels of government and in the private sector to secure against the evolving risks of tomorrow.


Session Six – 1:00 to 1:45 PM | Anderson Lunsford, CEO, Co-Founder at BreachRX | Incident Response – Why We Need a Legal Playbook
 
 

Anderson Lunsford, CEO, Co-Founder at BreachRX

Topic: Incident Response – Why We Need a Legal Playbook

Andy Lunsford is CEO and co-Founder of BreachRx, provider of the first intelligent incident response platform designed for the entire enterprise. Prior to founding BreachRx, Andy spent 15 years in privacy law and large-scale commercial litigation.

BreachRx is a company focused on providing incident management software within the cybersecurity industry. Its main offerings include automated incident response planning, regulatory compliance automation, and integrated data breach response for various organizational teams. The company primarily sells to sectors that require robust incident management and compliance solutions, such as legal, privacy, and security sectors. It was founded in 2017 and is based in San Francisco, California.


Session Seven – 1:45 to 2:30 PM – Aimei Wei, Chief Technical Officer
(CTO) & Founder | NG-SIEM, NDR, and Open XDR—Why We Built it This Way and Lessons Learned Along the Way

Topic: NG-SIEM, NDR, and Open XDR—Why We Built it This Way and Lessons Learned Along the Way
About Aime Wei: Aimei has more than 20 years of experience building successful products and leading teams in data networking and telecommunications. She has extensive working experience for both early-stage startups including Nuera, SS8 Networks, and Kineto Wireless as well as well-established companies like Nortel, Ciena, and Cisco. Prior to founding Stellar Cyber, she was actively developing Software-Defined Network solutions at Cisco. Aimei enjoys building a product from its initial design to its final launch. Aimei has an M.S. in Computer Science from the Queen’s University in Kingston, Canada and an Undergraduate degree in Computer Science from the Tsinghua University of China.

About: Stellar Cyber’s Automation-driven Security Operations Platform, including NG-SIEM and NDR and powered by Open XDR, delivers comprehensive, unified cybersecurity without complexity. It empowers lean security teams of any skill level to secure their environments successfully. As part of this unified platform, Stellar Cyber’s Multi-Layer AI™ enables enterprises, MSSPs, and MSPs to reduce risk with early and precise threat identification and remediation while slashing costs, retaining investments in existing tools, and improving analyst productivity. This results in a 20X improvement in MTTD and an 8X improvement in MTTR. The company is based in Silicon Valley. For more information, visit https://stellarcyber.ai.


Session Eight – 2:30 to 3:00 PM (with QA to follow) – Tolgay Kizilelma, Ph.D., Dominican University of California,  Director of the MS in Cybersecurity Program | From Crisis to Continuity: Building Resilient AI Governance
 

Tolgay Kizilelma, Ph.D., Dominican University of California

Topic: From Crisis to Continuity: Building Resilient AI Governance

Tolgay Kizilelma, Ph.D. Tolgay is a business-driven IT/Cybersecurity GRC leader and trusted business partner with three decades of experience in education, healthcare, distribution, and government sectors. He is the founding Director of the MS in Cybersecurity program and teaches online Cybersecurity GRC courses as an Associate Professor of Cybersecurity in the Barowsky School of Business at Dominican University of California. Tolgay has also served as the CISO for multiple University of California campuses. Early in his career, he managed the U.S. IT operations for a leading national fuel systems integrator and distributor. He has more than 50 industry certifications, a B.S. degree in computer engineering, an MBA, and a Ph.D. focusing on information security. He also volunteers for various non-profit organizations as a board member, and frequently participates at cybersecurity conferences as a presenter.
His contribution to the cybersecurity community was recognized with the 2022 C100 Award – Top 100 CISOs by CISOs Connect.

Founded in 1890, one of the oldest universities in California, Dominican University of California is an independent institution offering more than 60 majors, minors and concentrations. Over our 130 years of preparing students for fulfilling professional and personal lives, we’ve earned a reputation for excellence in academics, research, outreach and community involvement. We are located in the San Francisco Bay Area, in beautiful Marin County. It is accredited by the Western Association of Schools and Colleges (WASC). The Business school is also accredited by the Association to Advance Collegiate Schools of Business (AACSB), Dominican University of California helps Business students develop a global orientation, an entrepreneurial attitude, a commitment to sustainability, and a strong sense of ethics and social responsibility.


3:00 – 4:00 PM Vendor Labs (see the list of vendors below) – You can also use this time to extend your QA with available speakers

Cake Break & Networking – Meet a mentor, an author, a vendor, an employer

Attendees earn credit by meeting with our vendors and documenting their interactive commitments using our online feedback form. An array of healthy snacks and coffee will provide us with an afternoon boost.

This Open forum uses tables and break-out rooms with our frequent sponsors and trusted Vendors.

Session Nine – 4:00 to 4:45 PM | Gopi Ramamoorthy, Head of CyberSecurity, AI Security, Privacy & Compliance Eng | CISO |  Symmetry Systems | “Unfortunately, you lost your data” – Who will be knocking your door and why
 

Gopi Ramamoorthy, Head of CyberSecurity, AI Security, Privacy & Compliance Eng | CISO | 

Topic: “Unfortunately, you lost your data.” Who will be knocking on your door and why

  • Every month, every week, every day– There is one thing in common in cybersecurity news – that is yet another data breach(es)!
  • Data exposure or data breach happens due to multiple reasons.Whatever the root cause is, the security leader of the organization must be prepared to handle the incident, follow the process and complete the mandatory industry and regulatory requirements on time.
  • This session is focused on how best to be prepared.
  • The presentation will have 4 parts. First part will provide a quick overview of recent major data breaches. The incidents are selected as use cases. The second part will be on the regulatory laws that are applicable.
  • Third part will be on lawsuits filed and the parties involved and the outcomes.
    The fourth part will include standard processes and the templates of notifications that can be built and kept ready.

Gopi Ramamoorthy, with over 15 years in information security and compliance, has risen from engineering roles to leadership positions in sectors like Finance and Healthcare. At Fiserv, he managed security compliance for multiple units worth $350 billion in annual transactions, consistently maintaining an impeccable record of zero findings. Gopi’s contributions extend beyond his core work; he’s an active leader in infosec forums, served as ISC2 Silicon Valley President in 2013, and was on the ISACA Silicon Valley Board from 2014-2021. Certified with CISSP, CISA, CIPP/US, and CISM, Gopi is currently the Head of Security and GRC Engineering at Symmetry Systems. A dedicated professional and leader, Gopi’s expertise is widely recognized and respected in the industry. In 2023 alone, Gopi has spoken at multiple conferences on Cybersecurity and Privacy and continues to share his knowledge and experience through multiple forums!

Symmetry Systems is a leading Data Security Posture Management (DSPM) platform provider.


Meet Your Vendors

Platinum Sponsor: Stellar Cyber | Greetings from Virtual Platform Leader and ISC2 East Bay Platinum Sponsor: Stellar Cyber Making Security Operations Simpler – The only Open XDR platform built for lean security teams that anyone can use. Your live Engineer is Daniel Cheng, our Education Director.

About: Stellar Cyber’s Automation-driven Security Operations Platform, including NG-SIEM and NDR and powered by Open XDR, delivers comprehensive, unified cybersecurity without complexity. It empowers lean security teams of any skill level to secure their environments successfully. As part of this unified platform, Stellar Cyber’s Multi-Layer AI™ enables enterprises, MSSPs, and MSPs to reduce risk with early and precise threat identification and remediation while slashing costs, retaining investments in existing tools, and improving analyst productivity. This results in a 20X improvement in MTTD and an 8X improvement in MTTR. The company is based in Silicon Valley. For more information, visit https://stellarcyber.ai.


Platinum Sponsor: Astrix Security | Meet Ryan Rockenbaugh and Brian Kennedy

Ryan Rockenbaugh,
Senior Field Marketing & Lead Gen Manager
Brian Kennedy Helping Organizations Align Security Projects, Build Programs and Reduce Risk, Regional Sales Director

Astrix Security empowers control over the non-human/app-to-app access layer for the first time ensuring core systems are securely connected to third-party cloud services by extending access management and threat prevention to API keys, OAuth tokens, service accounts, and more.

Our agentless, easy-to-deploy solution provides holistic visibility into all app-to-app connections instantly detecting and mitigating integration threats with automated remediation workflows – all while continuously minimizing third-party exposure with zero-trust policies and automated enforcement guardrails.


Silver Sponsor: Illumio | Meet Christer Swartz and Dan Farmer

Dan Farmer Regional Sales Director – Northern California

Security segmentation is hard and current approaches don’t work well. Illumio provides a new architectural approach that solves the underlying challenges. The core problem is that security segmentation has always been coupled to network architecture. That makes security segmentation hard to do without breaking things. Illumio allows organizations to decouple security segmentation from network architecture. This turns out to be faster, safer, easier, and less expensive than any other option


Silver Sponsor: Semperis | Meet Chris Marcias and Alexandra Weaver (who spoke at the morning session.)

Chris Macias Leader in Securing AD & Entra ID – West Public Sector Sales Director at Semperis

For security teams charged with defending hybrid and multi-cloud environments, Semperis ensures the integrity and availability of critical enterprise directory services at every step in the cyber kill chain and cuts recovery time by 90%. Purpose-built for securing hybrid Active Directory environments, Semperis’ patented technology protects over 50 million identities from cyberattacks, data breaches, and operational errors. The world’s leading organizations trust Semperis to spot directory vulnerabilities, intercept cyberattacks in progress, and quickly recover from ransomware and other data integrity emergencies. Semperis is headquartered in Hoboken, New Jersey, and operates internationally, with its research and development team distributed throughout the United States, Canada, and Israel.

Semperis hosts the award-winning Hybrid Identity Protection conference and podcast series (hipconf.com) and built the free Active Directory security assessment tool, Purple Knight (semperis.com/purple-knight). The company has received the highest level of industry accolades, recently named to Deloitte’s Technology Fast 500™ list for the third consecutive year (2020-2022), and ranked among the top three fastest-growing cybersecurity companies in the 2021 Inc. 5000 list. Semperis is a Microsoft Enterprise Cloud Alliance and Co-Sell partner.


Silver Sponsor: BigID | Meet Jeff Bracken and Dimitri Sirota

Connect with Dimitri on LinkedIn

Dimitri Sirota is the CEO and co-founder of BigID: the leader in data security, compliance, privacy, and AI data management. He’s a leading industry expert in AI, security, and identity, and is an established (serial) entrepreneur, investor, mentor, and strategist. Dimitri previously founded two enterprise software companies focused on security (eTunnels) and API management (Layer 7 Technologies) which was sold to CA Technologies in 2013.

Jeff Bracken Regional Sales Manager at BigID – Know Your Data. Control Your Data.

“I’m an Enterprise Sales and Customer Success Professional with demonstrated achievement in Account Management and Business Development. After having worked abroad in Taiwan for 2 years, I’m proficient in conversational-level Mandarin Chinese and have a deep understanding of the business culture and style in China and Taiwan. I have international experience in 32 countries throughout Asia and Europe.”

BigID is a leader in data security, privacy, compliance, and governance, enabling organizations to proactively discover, manage, protect, and get more value from their data in a single platform for data visibility and control. Customers use BigID to reduce their data risk, automate security and privacy controls, achieve compliance, and understand their data across their entire data. oy landscape, including multicloud, hybrid cloud, IaaS, PaaS, SaaS, and on-prem data sources. CNBC has recognized BigID as one of the top 25 startups for the enterprise, has been named to the Inc 5000 and Deloitte 500.


Silver Sponsor: Symmetry Systems – Meet Claude Mandy, Jake Attia and continue your conversation with Gopi Ramamoorthy

Claude Mandy on LinkedIn

Meet your expert: Connect with Claude Mandy on LinkedIn – As an Aussie from the Namib desert who’s made the San Francisco Bay Area my home, I bring a confusing accent, a unique global perspective, and a down-under pragmatism to the cyber industry. This international viewpoint enriches my approach to developing and implementing forward-thinking security strategies. My career—a rich tapestry woven with roles from CISO to Gartner Analyst to startup executive—has been dedicated to simplifying security and bridging the gap between complex security challenges and actionable solutions.
My background as a seasoned practitioner is marked by a proven track record of navigating and anticipating the security landscape’s shifts. Known for deriving actionable insights from complex data without AI, I’m passionate about applying my extensive knowledge to enhance organizational security postures globally. https://www.linkedin.com/company/symmetry-systems-inc/

Jake Attia is a passionate technology professional with over 10 years of experience in the IT/Cybersecurity world. He began his career by establishing the IT infrastructure for an early leader in virtual reality (VR) hardware and software. He played a pivotal role in transitioning the organization from on-premise to a hybrid Azure infrastructure, making a positive impact on the global organization. | Following this, he joined an identity-as-a-service platform company, assisting customers in configuring, troubleshooting, and utilizing identity provider (IDP) services for web applications and cloud infrastructure. His expertise in cloud solutions and identity services led him to Google, where he worked on the Cloud Security and Infrastructure team. There, he solved complex challenges for some of Google’s largest cloud customers, helping them build robust security solutions in cloud and hybrid network environments.

Symmetry is the Data + AI Security Company. We safeguard data at scale, detect threats, ensure compliance & reduce AI risks so you can Innovate with Confidence. Symmetry at a glance:
Our platform is engineered specifically to address modern data security and privacy challenges at scale from the data out, allowing organizations to innovate confidently. With total visibility into what data you have, where it lives, who can access it, and how it’s being used, Symmetry safeguards your organization’s data from misuse, insider threats, and cybercriminals, as well as unintended exposure of sensitive IP and personal information through the use of generative AI technologies.

Symmetry Systems recently presented a fascinating topic to the ISC2 East Bay Community. To learn more, go to ISC2 East Bay Chapter – Claude Mandy State of Data Security.


Silver Sponsor: StrongDM | Meet Tim Prendergast, John Martinez (see speaker details from the morning session.)

We are on the precipice of a radical journey as network security evolves into identity security—traditional network firewalls, once the stalwarts of network protection, are now on the brink of obsolescence. The branch firewall, once pivotal for safeguarding remote offices and branches, has been succeeded by Secure Access Service Edge. While SASE concerns end-user security, it leaves the most critical workflows between admins and infrastructure unprotected. PAM and IGA have failed to scale in the modern world. CIEM only covers clouds. What organizations really need are holistic protections for all infrastructure, anywhere. Justin McCarthy will join Tim Prendergast to share a peek into the future: identity security. You can learn how to deliver fine-grained access controls, streamlined privilege management, and comprehensive auditing of administrative activity throughout your complex, hybridized infrastructure: no headaches, no complications, just easy-to-deploy, easy-to-use people-first security.

Tim Prendergast is the CEO at strongDM, a Sequoia-backed startup disrupting PAM/IGA and ushering in the future of Identity Security. Before joining StrongDM, Tim was the founder of Evident.io and inventor of CSPM, exiting to Palo Alto Networks as the category leader. I served as the first Chief Cloud Officer in a Fortune 1000 company at PANW. Before Evident.io, Tim was the principal architect for Adobe’s Cloud Team — designing and securing the elastic AWS infrastructure that created the success story that has become the poster child for digital transformation. Tim is the Founder of StrongDM and a long-time innovator. He has one mission — enable seamless, secure access for admins and engineers across the globe.

We’ve had the pleasure of Tim’s genius on many occasions. Enjoy a few playbacks: October 12, 2023 – Member meeting: Zero Trust Identity Access Management Roundtable – Using the CISA ZTA Maturity Model

StrongDM is a Dynamic Access Management (DAM) platform that manages and audits access to databases, servers, clusters, and web apps. It’s a proxy that combines authentication, authorization, networking, and observability into a single product. StrongDM is designed to simplify infrastructure access workflows by providing low-friction connectivity to almost every piece of infrastructure in your stack.


Silver Sponsor: BreachRX | Meet Anderson Lunsford, Cory Brown, and Eric Heath

BreachRx is a company focused on providing incident management software within the cybersecurity industry. Its main offerings include automated incident response planning, regulatory compliance automation, and integrated data breach response for various organizational teams. The company primarily sells to sectors that require robust incident management and compliance solutions, such as legal, privacy, and security sectors. It was founded in 2017 and is based in San Francisco, California.


Hiring Managers Table

Please be sure to sign up for our March 20th Mock Interviews event, providing preparation for Las Positas students as they approach their next round of opportunities to earn real world job experience.

Spend time with Jeremy Hein, Director of Career Development, to help further your career or fill an employment opportunity.

Meet our hiring Coach

Meet Hillary J. Hernandez, Robert Half

Hillary J. Hernandez
Senior Vice President/Branch Director- Technology

4:30 to 5:00 PM Wrap Up, Scholarships, Raffles & Response

To receive all 8 CPEs, attendees must complete the Conference Feedback Form. ISC2 East Bay Chapter is a nonprofit organization that offers our community a safe networking experience where they can advance their interests and careers in cybersecurity.


Please become an ISC2 East Bay Sponsor by donating to our Sponsorship Page.

About ISC2
ISC2 is the world’s leading member organization for cybersecurity professionals, driven by our vision of a safe and secure cyber world. Our nearly 675,000 members, candidates, and associates around the globe are a force for good, safeguarding the way we live. Our award-winning certifications – including cybersecurity’s premier certification, the CISSP® – enable professionals to demonstrate their knowledge, skills, and abilities at every stage of their careers. ISC2 strengthens the cybersecurity profession’s influence, diversity, and vitality through advocacy, expertise, and workforce empowerment, accelerating cyber safety and security in an interconnected world. Our charitable foundation, The Center for Cyber Safety and Education, helps create more access to cyber careers and educates those most vulnerable. Learn more and get involved at ISC2.org. Connect with us on LinkedIn.

Related Posts