New York

CISO Executive Summit

May 16, 2017

New York Marriott Marquis

Agenda

May 16, 2017 / Conference

7:00am - 7:45am

Registration & Breakfast

7:45am - 8:30am Opening Keynote

Relentless Preparation

Keynote 

Brad Maiorino
Former SVP & CISO
Target Corporation
Teresa Zielinski
CISO and IT Program Management
GE Power
Expand Additional Information

Cyber threats are evolving at an unprecedented pace and gone are the days where you can depend on technology alone. Testing your company’s readiness to respond is a critical element of any strong information security program. Hear from Brad Maiorino and Teresa Zielinski as they discuss the latest threats and some unique ways to test the readiness to respond of your organization, technology and workforce.

8:30am - 9:00am

Networking Break

9:00am - 9:50am Breakout Sessions

Building a Bolder, Broader CISO Brand

Featured Session  sponsored by: Dimension Data

Moriah Lazar Hara
Global CISO
The Interpublic Group of Companies, Inc.
Kylie Watson
CISO
Sumitomo Mitsui Banking Corporation
Expand Additional Information

Successful security leaders are advancing the traditional CISO role with bold strategies for growing the business and helping to create long term value and trust with clients. They are taking broader, more proactive roles by transforming their environments through innovative technology and cultural change and even earning board of director seats. Learn from your peers about the leadership strategies that have earned them recognition — and take a look ahead at what the future holds for the CISO role.

Secure the Cloud – Or Use the Cloud to Secure?

Featured Session  sponsored by: VMware

Tom Corn
SVP, Security Products
VMware
Expand Additional Information

For public and private cloud, most concerns and challenges have centered on security. But in 2017, security teams will increasingly look to the cloud to capitalize on security approaches that haven’t been possible in traditional data centers. This session will cover the growing number of technologies and techniques that leverage the cloud to secure applications and data — including controls and policies that follow the workload, the use of dynamics to limit persistence, automation of security-incident response and micro-segmentation. The result is a cloud environment that is not only more digestible for a broader range of services, but ultimately, one that is more secure.

Creating Actionable Intelligence with Machine Learning

Executive Boardroom  sponsored by: Versive

Tariq Habib
CISO
Metropolitan Transportation Authority
Nicolas Vigier
CIO
Gemini
Dustin Rigg Hillard
VP, Engineering
Versive
Moderator
Expand Additional Information

The technology now exists to receive enormous value from big, noisy datasets. Join your peers in this executive boardroom to explore how advanced machine learning, along with the implementation of an enterprise-wide security and business data lake, can unearth valuable insights and detect threats requiring immediate action — before damage is done. Be more secure, more successful, and more future-proof by applying these real-world lessons in machine learning.

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).
To reserve your seat, please contact:
Kerry Manion at 503-808-9820 or kerry.manion@evanta.com

Finding and Training the Next Generation of CISOs

Executive Boardroom  sponsored by: Cybereason

Jeff Brown
CSIRO
BNY Mellon
Marina Spyrou
Senior Vice President‚ Global Security
Nielsen Company US Inc
Sam Curry
Chief Product Officer
Cybereason
Moderator
Expand Additional Information

Somewhere out there, in a market crowded by over-qualified workers deluged by job offers, the next generation of CISOs is maturing. But how can CISOs train tomorrow’s security executives when today’s well-known security talent deficit makes it difficult to fill even the most basic roles? Retaining cyber professionals isn’t just a matter of offering the biggest paycheck — it requires getting creative with cross-training, hands-on experience and developing collaborative solutions with fellow CISOs. Join this discussion to explore strategies for identifying and developing the next generation — including your own replacement.

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).
To reserve your seat, please contact:
Kerry Manion at 503-808-9820 or kerry.manion@evanta.com

The Hidden Risks of Websites

Executive Boardroom  sponsored by: The Media Trust

Orrie Dinstein
Global Chief Privacy Officer
Marsh & McLennan Companies, Inc.
Mark Viola
VP, Global CISO
Henry Schein, Inc.
Chris Olson
CEO and Co-Founder
The Media Trust
Moderator
Expand Additional Information

As digital assets multiply, the corresponding need for better security has faltered, and websites continue to harbor significant risk. A majority of website code is provided by unknown third parties that execute outside the enterprise infrastructure. On top of this, these shadow IT resources are not protected by existing security tools such as app scanning services — and it shows. This discussion, led by The Media Trust’s Chris Olson, will examine the vulnerabilities of enterprise websites and explore how to better incorporate digital-asset security into existing governance frameworks.

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).
To reserve your seat, please contact:
Kerry Manion at 503-808-9820 or kerry.manion@evanta.com

9:50am - 10:20am

Networking Break

10:20am - 11:10am Breakout Sessions

Collaboration in the Future State

Featured Session  sponsored by: IBM

David Fairman
CISO
Royal Bank of Canada
Eric Guerrino
Executive Vice President
FS-ISAC
Jeff Lunglhofer
CISO
BNY Mellon
Rohan Amin
CISO
JPMorgan Chase & Co.
Moderator
Expand Additional Information

Cooperation is key, in business and in cyber — so why don’t the two always seem to be on the same page? Building relationships, both internally and externally, is key to elevating the risk-management conversation. Join BNY Mellon, JPMorgan Chase, the Royal Bank of Canada and FS-ISAC to explore a future state, in which CISOs move beyond the technical aspects of the job and champion business-led conversations and robust peer-sharing. Explore strategies for integrating the business into incident planning and response and cultivating a network of industry relationships through information sharing and a higher level of collaboration.

Think Your Network Is Safe? Check All Your Endpoints

Featured Session  sponsored by: HP Inc. Print Security Solutions

Jason O'Keeffe
Senior Security Advisor
HP Inc. Print Security Solutions
Expand Additional Information

While you invest time, resources and millions of dollars in protecting endpoints and network perimeter, are you addressing one of the largest footprints of your network? You may be allowing hackers and malware to take the easy route to your organization’s network and data. Jason O'Keeffe will share real-world breach examples of how some of the most secure organizations are still lagging in overall security for critical endpoints like printers. O'Keeffe will share best practices on how to secure these valuable endpoints in the most effective way.

Identity Access Management in a Hybrid World

Executive Boardroom  sponsored by: Centrify

Brendan Conway
Global Director of Information Security & Risk Management
Coty Inc.
Pat Stack
IT Director, Enterprise Applications
Eastman Kodak Company
Felderi Santiago
Technical Director
Centrify
Moderator
Expand Additional Information

With one foot in the cloud and one still on-prem, today’s hybrid enterprise is uniquely susceptible to compromised credentials. The cloud can cut costs and mitigate risk, but it also forces CISOs to rethink traditional identity and access management by shifting focus from the perimeter to the users themselves. As more and more users traverse environments, it becomes critical to streamline access controls to keep the enterprise fully locked down. Join your peers to discuss how to seamlessly manage identity and access in this increasingly boundary-less world.

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).
To reserve your seat, please contact:
Kerry Manion at 503-808-9820 or kerry.manion@evanta.com

Decoding the Business Impact of Ransomware

Executive Boardroom  sponsored by: Malwarebytes

Tomas Maldonado
VP & CISO
International Flavors & Fragrances Inc.
Tod Mitchinson
VP & CISO
New York Life Insurance
Marcin Kleczynski
CEO
Malwarebytes
Moderator
Expand Additional Information

No longer can ransomware be considered just another piece of malware — ransomware strains are becoming more sophisticated and have evolved into a real enterprise threat. Cracking the code will require thinking beyond paying the ransom and considering the implications on the entire business. Join this boardroom to explore steps your peers are taking to protect their environments and create a productive dialogue with the rest of the business — now, before that first ransom note arrives.

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).
To reserve your seat, please contact:
Kerry Manion at 503-808-9820 or kerry.manion@evanta.com

Get Secure. Stay Secure.

Executive Boardroom  sponsored by: NSS Labs

Medha Bhalodkar
CISO
Columbia University
Teresa Zielinski
CISO and IT Program Management
GE Power
Garrett Jones
VP, Strategy & Operations
NSS Labs
Moderator
Expand Additional Information

Attackers are constantly challenging your defenses by morphing their tactics and adopting new evasion techniques at a record pace. Enterprises are investing more money in security products and “intelligence” but are still finding themselves behind the eight ball when it comes to cyberthreats. The struggle to get ahead and stay ahead of the ever-evolving cyberthreat landscape is overwhelming. The security defenses protecting you today might not protect you tomorrow, and you need a way to continuously validate your cybersecurity posture. Join this conversation to discuss how your organization can get secure, and stay secure.

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).
To reserve your seat, please contact:
Kerry Manion at 503-808-9820 or kerry.manion@evanta.com

11:10am - 11:40am

Networking Break

11:40am - 1:10pm Luncheon Keynote

Taking the Right Risks

Keynote  sponsored by: Demisto

Adam Fletcher
CISO
Blackstone
Mark Hatfield
Founder & Partner
TenEleven Ventures
Alberto Yépez
Co-Founder & Managing Director
Trident Capital Cybersecurity
Jay Leek
Managing Director
ClearSky Security
Moderator
Expand Additional Information

Security leaders operate in a narrow, precarious space between risk and opportunity. Choices abound — but are more traditional investments really safer? Or do CISOs have a responsibility to take chances on emerging technologies that could someday change the game? In a marketplace crowded by hundreds of early stage companies claiming to be the next big thing, how do you know which risks are the right ones to take? Jay Leek leads a group of investors and CISOs in a discussion on how to sort through the noise and identify early stage companies that add value, offset risk and accelerate innovation.

1:10pm - 1:40pm

Networking Break

1:40pm - 2:30pm Breakout Sessions

The Evolving Landscape of Cybersecurity Regulation

Featured Session  sponsored by: Rapid7

Zachary Goldman
Exec. Dir., Center on Law & Security, Adjunct Professor of Law
New York University School of Law
Expand Additional Information

The cybersecurity regulatory landscape is becoming increasingly complex and increasingly fragmented. Technical leaders within companies must work collaboratively with their legal counterparts to draft contracts, respond to regulators and manage risk in a range of contexts. Join Zachary Goldman, executive director of the Center on Law and Security and adjunct professor at the New York University School of Law, for a snapshot of the divergent cybersecurity regulatory landscape and a discussion about emerging regulatory issues just beyond the horizon.

Keeping Up With the Cyberattackers

Featured Session  sponsored by: FireEye

Nick Bennett
Director, Professional Services
FireEye
Expand Additional Information

Cyberattackers are getting exponentially more organized and collaborative in their tactics, techniques and procedures, forcing security teams to accelerate to keep up. Join Nick Bennett for an intelligence-led look into the trends and emerging global threats that define today’s cyberthreat landscape. He will also share highlights from the M-Trends 2017 Report, based on hundreds of real-world investigations into the past year’s most successful cyberattacks. Learn about the latest, most creative attacker techniques and explore innovative, proactive strategies for protecting your organization.

The Endgame of Endpoints

Executive Boardroom  sponsored by: Cylance

Mark Connelly
CISO
Boston Consulting Group Inc.
Nick Salian
Global CISO
Tower Research Capital
Gabe Deale
VP, Worldwide Sales Engineering
Cylance
Moderator
Expand Additional Information

The proliferation of devices over the last decade has radically increased how many endpoints companies are responsible for. Endless approaches and potential solutions have followed, but questions remain. In this second machine age, how can an organization maintain the fundamentals of endpoint security — and security in general — while embracing new technologies and strategies like machine learning? Join fellow CISOs as they discuss their successes and challenges in keeping users secure at a time when technology is moving faster than our ability to adapt.

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).
To reserve your seat, please contact:
Kerry Manion at 503-808-9820 or kerry.manion@evanta.com

The ROI of Security Spending

Executive Boardroom  sponsored by: Radware Inc

Tony Chryseliou
Information Security Manager
Publishers Clearing House
Ronen Halevy
Director of Information Security
Sony Corporation of America
Ron Winward
Security Evangelist
Radware Inc
Moderator
Expand Additional Information

Return on investment in security spending could be considered the holy grail of IT. Security organizations often allocate budgets based on their own estimates and promises from vendors, only to discover that what they bought didn’t do quite what they thought it would. In a constantly and quickly changing threat landscape, deciding where to spend that critical security budget can be daunting. Join this executive boardroom to help foster a constructive dialogue on threats, successes and challenges CISOs face when investing in security spending.

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).
To reserve your seat, please contact:
Kerry Manion at 503-808-9820 or kerry.manion@evanta.com

The Key Pillars of Cloud Security

Executive Boardroom  sponsored by: Saviynt

Shukri Khader
CISO
Keurig Green Mountain, Inc.
Michael Krebs
Information Security Officer
Sikorsky Aircraft Corporation
Nabeel Nizar
Vice President
Saviynt
Moderator
Expand Additional Information

With hybrid IT becoming the norm, critical enterprise assets like sensitive data and infrastructure now reside beyond the traditional perimeter. As organizations gain control over shadow IT, they’re also under pressure to deliver sanctioned cloud platforms that meet security and compliance mandates. With cloud providers offering varying degrees of control over security, identity becomes the common thread binding the security and trust fabric together. This discussion will delve into real-world security challenges around cloud adoption. Learn about the security controls needed to gain visibility and protect your applications, data and infrastructure with a well thought-out, privileged-access governance strategy.

2:30pm - 2:50pm

Networking Break

2:50pm - 3:40pm Breakout Sessions

Info Sharing 2.0 – Cyber Task Force

Featured Session  sponsored by: Palo Alto Networks

James Brenneman
Assistant to the Special Agent in Charge
U.S. Secret Service
Expand Additional Information

You’ve seen it on TV — a crime happens, and a government task force knocks on the door. The U.S. Secret Service Electronics Crimes Task Force wants to change that perception. In real life, the true measure of success in crisis management comes long before, in prevention and planning. With the cyberthreat landscape in a state of uncertainty, a proactive partnership between the private sector and federal, state and local law enforcement is critical to staying one step ahead. Explore the resources available through collaborating with the U.S. Secret Service task force — before they knock on your door.

Operationalizing Insider-Threat Programs

Featured Session  sponsored by: Forcepoint

Michael Crouse
Sr. Dir., Data & Insider Threat Security
Forcepoint
Expand Additional Information

Insider-threat programs are evolving from cyber-focused security models to more human-centric designs. These necessary changes in policy, people, process and technology involve taking a more discrete approach to policy enforcement and malicious or negligent employee behaviors. Michael Crouse will share practical prevention methods, examples of analyst bias and incomplete analysis, and safeguards that must be put in place to deal with the results — including the termination and even arrest of an employee. Learn how you can reduce insider risk by restructuring your program to focus on the human element.

The Risk-Oriented CISO

Executive Boardroom  sponsored by: Leidos

Zouhair Guelzim
VP & CISO
L'Oréal Americas
Marty Leidner
CISO
The Rockefeller University
David Cronin
Head of Cyber Services
Leidos
Moderator
Expand Additional Information

As security executives become further integrated into the business, risk management has grown into a critical element of the CISO job description. How can risk-oriented CISOs encourage their business partners to incorporate IT risk into the larger tapestry of enterprise risk? Elevating risk beyond IT and communicating its true parameters to stakeholders requires CISOs to translate IT concepts into dollar figures and business risk assessments. Join your peers for a discussion on how to educate CEOs and the board, articulate risk measurements, and ensure the company is protected.

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).
To reserve your seat, please contact:
Kerry Manion at 503-808-9820 or kerry.manion@evanta.com

Enhancing EDR in Real Time

Executive Boardroom  sponsored by: Tanium

Raymond Lipps
Senior Director, Global IT Security
Celgene Corporation
John McCaffrey
CIO
Westchester County
Jim Aldridge
Director
Tanium
Moderator
Expand Additional Information

Walk the sponsor floor at any conference or sample the whitepapers and marketing pitches from any vendor website, and you'll see the same claims repeated ad nauseam: “prevent, detect and respond” at “enterprise scale” in “real time.” It's no wonder so many organizations struggle to down-select and evaluate vendors. Singling out endpoint detection and response tools is particularly challenging because of the many factors that impact their effectiveness: scope of data, performance, scalability and flexibility. Join this discussion with your peers to explore how selecting the right mix of EDR tools can enhance IT and security operations.

Security at the Speed of Development

Executive Boardroom  sponsored by: Veracode

Brian Lozada
CISO
Zocdoc
David Peach
CISO
The Economist Group Limited
Peter Chestna
Director of Developer Engagement
Veracode
Moderator
Expand Additional Information

Application security is more critical than ever, as breaches often exploit the application layer. Developers can move code from the desktop to production many times a day, but incorporating security testing into fast development cycles like Agile and DevOps is complex. Fixing security findings at such high speeds is a daunting challenge that requires a new approach. Join this boardroom to share practical ways to engage with development, increase their accountability and enable deep integration into the development life cycle to achieve secure outcomes.

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).
To reserve your seat, please contact:
Kerry Manion at 503-808-9820 or kerry.manion@evanta.com

3:40pm - 4:00pm

Networking Break

4:00pm - 4:40pm Closing Keynote

Model Driven Security – Investing in Data Science

Keynote  sponsored by: PKWARE, Inc.

Jim Routh
CISO / CSO
Aetna, Inc.
Expand Additional Information

Frontline security is a battlefield — and the enemy is attacking with algorithms. Winning tomorrow’s cyberwar will require a fundamental shift toward model-driven security, as well as a complete overhaul of talent management strategy. Jim Routh argues that the industry must invest in developing data-science skillsets, or risk falling even further behind the criminal curve. He will share his journey in establishing model-driven security at Aetna, from the initial iteration two years ago to the steps he’s taking now to ensure that the cybersecurity professionals of the future are also data scientists.

4:40pm - 5:30pm

Closing Reception & Luxury Prize Drawings