Generously Supported By:
As an evangelist for Proofpoint Security Awareness and Training products group, Dale consults with companies across the globe, advising on the implementation of effective security awareness strategies to change end-user behavior and reduce organizational risk. Known for his ability to relate both technically and conceptually in an authoritative yet entertaining style, Dale is a popular speaker and panelist, having made presentations on security awareness in over 50 countries. As a Certified Information Systems Security Professional (CISSP) who is also certified in Cloud Security Knowledge (CCSK), he has acted as a consultant to organizations such as Walmart, Disney, Allstate, FedEx, the States of Michigan and Florida, Adventist Health, Baylor University, BP, the U.S. Navy, and Saudi Aramco. His expertise is supported by over 25 years in cybersecurity, information technology, research and development, and regulatory compliance with companies like IBM, Symantec, SunGard, Fisher Scientific, and Veritas.
Donna Gomez-Security Risk and Compliance Analyst, Johnson County (KS) Government. Donna Gomez , CRISC, has been an Information Security Awareness Professional for since 1999. She is a Certified Risk and Information Systems Control (CRISC) through ISACA, which is designed for IT professionals with hands-on experience with risk identification, assessment, evaluation, response and monitoring.
Benjamin Brooks is 19-year Navy veteran of Information Warfare, Electronic Warfare, and Special Warfare. He is a CISSP exam writing team member, and has written curriculum on Information and Cyber Security for three universities.
Benjamin currently serves as the President of the Board of Cyber Warrior Foundation, VP of Beryllium InfoSec Collaborative, and Training Officer for Navy Information Operations Command Texas, Minneapolis Branch.
His approach to information security is about balance between operations and security in a way that creates awareness throughout the organization. This ultimately leads to harmonious integration of security into the daily work processes with sufficient security for protecting the most vital information assets of the organization.