Get ready for an adrenaline-fueled day as you take the wheel of exclusive race cars and go head-to-head with us on the track! Experience the thrill of high-speed laps in Las Vegas, then shift gears and relax as we wind down with fantastic food, drinks, and great company. It's the perfect mix of excitement and connection – and an event you won’t want to miss!
Come Speed Race with Us in Las Vegas
Black Hat
August 5, 2025 - Las Vegas, NV
Visionaries


Richard Rushing
CISO
Motorola Mobility a Lenovo Company
About Me
Mr. Richard Rushing is the Chief Information Security Officer for Motorola Mobility LLC.; Richard participates in several corporate, community, private, and government Security Council’s and working groups setting standards, policies, and solutions to current and emerging security issues. As Chief Information Security Officer for Motorola Mobility, he has led the security effort by developing an international team to tackle the emerging threats of mobile devices, targeted attacks, and cyber-crime. He organized developed and deployed practices, tools and techniques to protect the intellectual property across the worldwide enterprise. A much-in-demand international speaker on information security Richard has presented at many leading security conferences and seminars around the world.


Bemi Anjous
Global Head of Global InfoSec / CISO
Noble Corporation


Erik Naugle
VP, Data Security & Use
Intuit


Andy Hoffman
CISO
Stonybrook


Chirag Shah
Global Information Security Officer & DPO
Model N


Anand Thangaraju
CISO
ePlus


Maria Cardow
Global CISO (Aon Cyber)
Aon


Chirag Shah
Global Information Security Officer & DPO
Model N
About Me
With a career dedicated to strategic leadership and fortifying organizations against the ever-evolving landscape of cyber risks, Chirag is a trusted steward of security, driving innovation and excellence in the realm of information security. Chirag brings a wealth of experience and expertise to the forefront of cybersecurity. With a career spanning over 24 years, he has earned a reputation as a strategic leader, adept at navigating the complexities of modern technology and safeguarding organizations against emerging threats. Key Milestones: Throughout his career, Chirag has left an indelible mark on the cybersecurity landscape, spearheading initiatives that redefine the boundaries of possibility in safeguarding digital assets. From designing and implementing comprehensive cybersecurity strategies to orchestrating robust security operations efforts, Chirag has consistently demonstrated a commitment to protecting organizational assets and fostering a culture of security. Leadership Philosophy: At the core of Chirag's leadership philosophy lies a deep-seated belief in the power of collaboration, innovation, and continuous learning. He understands that effective cybersecurity is not merely a technological challenge but a cultural imperative that requires the collective effort of stakeholders across the organization. Vision for the Future: Looking ahead, Chirag envisions a future where organizations embrace cybersecurity as a strategic priority, embedding security into the fabric of their operations and culture. By leveraging emerging technologies such as artificial intelligence and machine learning, Chirag seeks to revolutionize the way organizations detect, mitigate, and respond to cyber threats. Chirag envisions a future where organizations embrace cybersecurity not as a barrier, but as an enabler of growth and innovation. Current Role and Responsibilities: As the Global Information Security Officer & DPO at Model N, Chirag’s primary objective is to spearhead the development and implementation of comprehensive security strategies that harmonize with business goals and objectives. Chirag’s responsibilities encompass a broad spectrum of security programs, including security compliance management, risk management, incident response, security awareness training and data privacy management. Deeply involved in the security community, Chirag actively contributes to various associations and organizations, including active participation in a data protection organization and a security compliance organization. In these roles, he plays a key part in shaping strategic guidelines for data security, compliance, and privacy. His educational foundation encompasses a Bachelor’s degree in Computer Engineering, a Master of Business Administration, a Master’s in Cyber Security Leadership and Security Operations, along with pertinent security credentials.
August 5, 2025
Attend this event
Agenda
All times Pacific Time