Janet Van

David Mann

Drew Tatarian

Ethan Mason

Preeti Krishna

Jennifer Burns

Hardik Modi

Hardik Modi is AVP, Threat and Mitigation Products at NETSCOUT. In this role, he oversees the teams responsible for mitigation products as well as the creation of security content for NETSCOUTs products, enabling best-in-class protection for users, as well as the continuous delivery and publication of impactful research across the DDoS and Intrusion landscapes. Prior […]

Phil Venables

Phil is the Chief Information Security Officer and Vice President of Google Cloud where he oversees a team of security industry experts and leaders in the Google Cloud Office of the CISO. As CISO of Google Cloud, Phil is focused on ensuring the company’s security and compliance, and engaging customers, partners and stakeholders on security […]

Theo Forbath

As a Managing Director in Accenture’s Boston Office, Theo helps to lead its Technology Strategy & Advisory Services across North America. Theo’s client work focuses on partnering with C-level executives on their digital transformation strategies including digital technology roadmaps for cloud migrations, re-imagining user experiences for the digital economy, architecting enterprise scale deployments of automation […]

Ann Johnson

Ann Johnson is Corporate Vice President of SCI Business Development at Microsoft. She oversees the investment and strategic partner strategy roadmap for security, compliance, and identity for one of the largest tech companies on our planet to help organizations become operationally resilient on their digital transformation journey and unlock capabilities of Microsoft’s intelligent cloud and […]

Subbu Allamaraju

Subbu Allamaraju is the vice president of technology at Expedia Group, where he leads a large-scale migration of Expedia’s travel platforms from enterprise data centers to a highly available architecture in the cloud. Subbu is a well-rounded engineer and influencer with hands-on experience in software development, architecture, distributed systems, services, internet protocols, operations, and the […]

Rebecca Wooters