Becky Hepper, Jyoti Wadhwa (US)
Becky Hepper has been part of Seagate’s Product Security Office for the past three years, driving best-in-class product security practices that protect Seagate’s products, safeguard customer data, and foster a trusted product lifecycle. With over 20 years of experience in software engineering and four years in technical leadership, Becky brings a strategic, data-driven approach to building secure, resilient products. Most recently, she led the successful effort to certify Seagate as a member of FIRST, officially joining the global community on August 21, 2025.
Jyoti Wadhwa is a seasoned cybersecurity and transformation leader with 20+ years of global experience driving enterprise and software security at scale in positions such as Global Head of Product and Cloud Security at NetApp, and Cyber and Mission Leader at Booz Allen Hamilton. Jyoti has led cross-continental teams to deliver high-impact security outcomes across cloud infrastructure, application portfolios and AI security initiatives. A certified CISSP, HCISPP and AWS CCP with an MIT Executive Certificate in Transformative Leadership and an MBA in Information Systems, she is deeply committed to advancing innovations with governance, building high-performing teams and shaping the future of security in the AI era.
Key Takeaways:
Comprehensive Overview of the European Cyber Resilience Act
August 29, 2025 09:00-11:00
Khushali Dalal (Juniper, US)
Senior Product Security & Cyber Risk Leader | PSIRT | Vulnerability Management | Incident Response
Khushali Dalal is a cybersecurity professional specializing in Product Security, PSIRT, and vulnerability management. She leads complex security investigations, drives remediation with engineering teams, and improves security processes through automation and risk prioritization. She also contributes to industry standards as part of the CVSS v4.0 working group and serves as Chair of the Women of FIRST SIG.
In this collaborative exercise, participants will walk through a realistic cyber incident scenario. You’ll analyze clues, identify the breach, determine response actions, and practice critical incident communication. No prior cybersecurity experience is required — just curiosity and willingness to participate.
Cyber Incident Simulation: “Can You Piece Together the Attack?”
November 3, 2025 09:00-11:00