2019 Security
October 16

Event Highlights
The Core Security Conference is a half-day seminar that brings business and technology professionals from a cross-section of industries together to learn about today’s most pressing and trending IT security topics. After 19 years, the conference has evolved tremendously including our main conference in King of Prussia, PA , remote locations in multiple Core markets across the U.S. and a live-stream for virtual participation.

Networking with IT security professionals


Technical expert speakers from across multiple industries


Sponsor Showcase with our IT industry leading partners

Keynote Speakers

Michael Coates

Former CISO at Twitter and Former Head of Security at Mozilla

Michael Coates has worked in the information security space for the past 15 years, leading security at global organizations such as Twitter and Mozilla and protecting hundreds of millions of people worldwide. Currently the CEO & co-founder of Altitude Networks, Michael was previously the Chief Information Security Officer at Twitter. There, his team worked to protect nearly 300 million users, securing both Twitter systems and user data. Coates draws on his experience securing some of the world’s most complex networks to bring to light the threats that exist and provide a roadmap for securing the future of technology.


Before serving as CISO at Twitter, Michael was the Director of Product Security at Shape Security. In this role he worked with a specialized team to drastically change the way organizations defend their applications against modern application attacks. Prior to that, Michael was head of security for Mozilla. There, he built and led the security assurance program to protect nearly half a billion Firefox users, Mozilla web applications, and infrastructure.

Chris Hadnagy

Founder and CEO of Social-Engineer, LLC

Chris possesses more than 17 years of experience as a practitioner and researcher in the security field. The author of three (soon-to-be four) best-selling books, he also teaches three distinct international courses. Chris has trained various branches of the government, including the United States Special Operations Command and the Federal Bureau of Investigation. Additionally, Chris has debriefed dozens of general officers and government officials inside the Pentagon on social engineering and its effect on the United States.


Chris specializes in understanding how malicious attackers exploit human communication and trust to obtain access to information and resources through manipulation and deceit. Chris is also a certified Expert Level graduate of Dr. Paul Ekman’s Micro Expressions courses, having made the study of non-verbal behaviors one of his fortes. Chris’s goal is to better secure organizations by educating them on the methods used by attackers, identifying their unique vulnerabilities, and mitigating potential issues through appropriate levels of awareness and security.

Conference Schedule

7:45am – Registration Opens

8:00am – Breakfast & Sponsoring Partner Showcase

8:30am – Conference Welcome by Core BTS

9:00am – Platinum Speaker

9:45am – Keynote: Chris Hadnagy

10:15am – Mid-Morning Break & Sponsor Partner Showcase

10:45am –  Technical Expert Panel

11:30am – Keynote: Michael Coates
Building Trustworthy Companies: Security, safety, and privacy as core values and functions

12:45pm – Conference Concludes


7:45am – Registration Opens

8:00am – Breakfast & Platinum Speaker

8:45am – Keynote: Chris Hadnagy

9:15am – Local Technology Presentation

9:45am – Technical Expert Panel

10:30am – Keynote: Michael Coates
Building Trustworthy Companies: Security, safety, and privacy as core values and functions

11:30pm – Lunch & Break

12:00pm – Local Technology Presentations

1:00pm – Conference Concludes

See what last year's attendees have to say:
Cyber Security Awareness Month

For Cyber Security Awareness Month in October, Core will be offering Cyber Defense Clinics in multiple markets on various dates. In this workshop, you can experience common cyber security attack situations in a virtual lab environment, where you will get to play both the role of attacker and defender.


Dates and Locations Coming Soon

Past Conferences

Visit the 2018 Security Conference site for more information about the conference and to view past recordings.


View 2018 Security Conference Site

  • What type of attire is appropriate for attending the Security Conference?

    Business Casual

  • Where do I park?

    Information will be sent out approximately 2 days prior to the conference on where to park at your chosen location.

  • What do I need to bring?

    Just yourself and some business cards for all the networking opportunities.

  • Is the venue handicap accessible?

    Yes, all the venues are handicap accessible.

  • Will there be food and beverages?

    Yes, breakfast will be served in the morning with refreshments throughout the conference. Some locations will also serve lunch, but more information will be sent via email approximately 2 days prior to the conference.

  • Who can I contact if I have additional questions?

    Contact us at info@corebts.com