{"id":1424,"date":"2023-04-14T16:54:26","date_gmt":"2023-04-14T20:54:26","guid":{"rendered":"https:\/\/cybersecurity.csulaw.org\/conference\/?post_type=speakers&#038;p=1424"},"modified":"2026-02-24T02:16:16","modified_gmt":"2026-02-24T07:16:16","slug":"cory-scott","status":"publish","type":"speakers","link":"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/cory-scott\/","title":{"rendered":"Cory Scott"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-a5331a9e wp-block-columns-is-layout-flex\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\"><figure style=\"aspect-ratio:1;\" class=\"wp-block-post-featured-image\"><img loading=\"lazy\" decoding=\"async\" width=\"480\" height=\"480\" src=\"https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2025\/03\/Cory-Scott.jpeg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" style=\"width:100%;height:100%;object-fit:cover;\" srcset=\"https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2025\/03\/Cory-Scott.jpeg 480w, https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2025\/03\/Cory-Scott-300x300.jpeg 300w, https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2025\/03\/Cory-Scott-150x150.jpeg 150w\" sizes=\"auto, (max-width: 480px) 100vw, 480px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<h6 class=\"wp-block-heading\">Principal, Security Simulations<\/h6>\n\n\n\n<p>Cory was previously the CISO of Confluent, a cloud data infrastructure company built on Apache Kafka. Prior to that, he was the security and privacy leader at Google Devices and Services, and was the CISO at LinkedIn. He held leadership positions at leading security consulting outfits, including @stake and Matasano. He has presented multiple times at Black Hat Briefings, RSA Conference, and USENIX\/LISA. He is now taking a career break and is enjoying his recent move to Northeast Ohio.<\/p>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"featured_media":1423,"template":"","meta":{"_acf_changed":true,"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}}},"categories":[],"tags":[],"class_list":["post-1424","speakers","type-speakers","status-publish","has-post-thumbnail","hentry"],"acf":{"first_name":"Cory","last_name":"Scott","job_title":"Principal, Security Simulations"},"uagb_featured_image_src":{"full":["https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2025\/03\/Cory-Scott.jpeg",480,480,false],"thumbnail":["https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2025\/03\/Cory-Scott-150x150.jpeg",150,150,true],"medium":["https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2025\/03\/Cory-Scott-300x300.jpeg",300,300,true],"medium_large":["https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2025\/03\/Cory-Scott.jpeg",480,480,false],"large":["https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2025\/03\/Cory-Scott.jpeg",480,480,false],"1536x1536":["https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2025\/03\/Cory-Scott.jpeg",480,480,false],"2048x2048":["https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2025\/03\/Cory-Scott.jpeg",480,480,false]},"uagb_author_info":{"display_name":"admin","author_link":"https:\/\/cybersecurity.csulaw.org\/conference\/author\/"},"uagb_comment_info":0,"uagb_excerpt":"Cory was previously the CISO of Confluent, a cloud data infrastructure company built on Apache Kafka. Prior to that, he was the security and privacy leader at Google Devices and Services, and was the CISO at LinkedIn. He held leadership positions at leading security consulting outfits, including @stake and Matasano. He has presented multiple times&hellip;","_links":{"self":[{"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/speakers\/1424","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/speakers"}],"about":[{"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/types\/speakers"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/media\/1423"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/media?parent=1424"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/categories?post=1424"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/tags?post=1424"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}