Allie has been a featured speaker at many leading security conferences, including RSA Conference, Black Hat, HOPE, and others. She has been quoted in top business press outlets including NPR, The Washington Post, The Wall Street Journal, CNN Money, CNBC, and Dark Reading.
Prior to joining Forrester, Allie spent a decade in engineering, research, and technical consulting roles at MIT and several venture-backed startups. In addition to running her own engineering and development consultancy, she has also spent time as a security practitioner, doing hardware security research and working with product and infrastructure security teams.
Allie holds a Bachelor of Science in computer engineering from Boston University.
Doug BrushDouglas Brush
is a Global CISO Advisor CISO for Splunk and an information security executive with over 30 years of entrepreneurship and professional technology experience. He is a globally recognized expert in cybersecurity, incident response, digital forensics, and information governance. In addition to serving as a CISO and leading enterprise security assessments, he has conducted hundreds of investigations involving hacking, data breaches, trade secret theft, employee malfeasance, and various other legal and compliance issues. He also serves as a federally court-appointed Special Master and neutral expert in high-profile litigation matters involving privacy, security, and eDiscovery. He is the founder and host of Cyber Security Interviews
, a popular information security podcast. Douglas is also committed to raising awareness about mental health, self-care, neurodiversity, and diversity, equity and inclusion, in the information security industry.
Karen Worstell is well known in technology and cybersecurity circles as a serial CISO for iconic brands, advocate for cyberpros, speaker, and author. She got her start in computer security thanks to a software engineering professor who encrypted the final exam.
In her 30+ years of cybersecurity, her experience spans multiple industry verticals in research and engineering, consulting and advisory, and operational roles leading security, Risk Management, Privacy, and BCDR at Bank of America, AT&T Wireless, Microsoft, and Russell Investments, multiple times as CISO. She has served on the security advisory boards for the US Department of Commerce, Aerospace Industries Association, and National Security Telecommunications Advisory Committee. She is active in ISSA and ISACA and is a Distinguished Fellow of the ISSA. Karen frequently appears on media channels speaking about human and technical aspects of cybersecurity and hosts an online program for VMware called "Ask the Howlers."
Today she serves as senior cybersecurity strategist for VMware in the Network and Advanced Security Group where she regularly advises global customers and state and local governments on cybersecurity strategy.
Karen is the author of Your Amazing Itty Bitty Book for Personal Data Protection, Governance and Controls for Cutting Edge IT, the Role of the CISO in the Cybersecurity Handbook, and co-authored Evaluating the Electronic Discovery Capabilities of Outside Law Firms with Jeffry Ritter, JD.
Ms. Worstell lives in Lone Tree, Colorado with her cyberpro husband, Craig, and their Golden Retriever, Rocky Mountain Cody Bear.
She loves to engage, educate, inspire and motivate audiences and clients and has done so all over the world.