7:15am – 8:30am

8:30am – 8:50am
Registration Opens with a Breakfast Buffet and Networking in the Sponsor Pavilion

Welcome and Opening Remarks

heastings.jpg
Mary Lou Heastings
CEO
Executive Alliance Inc.
Bio

8:50am –9:20am

State of the Industry
Richard-Warner.png
Richard Warner 
Television and Radio Host
Summit Moderator
Bio

In this opening session, Richard Warner will provide insight into some of the latest hard hitting news in the security industry, and the latest statistics on CISOs’ perspectives and major challenges the industry is facing.

9:20am - 9:45am

Navigating the Threat Landscape – The Knowns and Unknowns

mauter.png

Brian Mauter

Executive Director, Information Security

RaceTrac Petroleum

Bio

 

Brian Mauter, Executive Director of Information Security at RaceTrac Petroleum, will discuss how his organization is facing the “knowns” of cyber security threats and how he is looking towards the future as he builds his strategies for the “unknowns.”

9:45am - 10:15am

Practical Insider Threat

pogemiller.png

David Pogemiller

VP of Strategy

Forcepoint, Platinum Sponsor

Bio

Organizations face increasingly asymmetric and unprecedented risks from insiders — employees and others who have valid access to enterprise networks and knowledge. In response they are working to put in place pragmatic and impactful programs that protect the organization, its people and its customers. In this session we’ll review who insiders are, discuss a framework for understanding how a “good” insider could turn “bad”, and walk through how to implement a practical insider threat program including best practices for prioritization (hint: it’s not all about malicious actors), identification and mitigation. 

Learning Outcomes

  • Learn who insiders are, common personas, and the risks to your organization, its employees, and customers.
  • Learn how to identify internal threats with continuous monitoring
  • Learn a behavioral framework for thinking through how “good” employees may turn “bad”
  • Learn how technology, including the dark web, directly impacts an insider’s mindset, behaviors, and capabilities thereby creating unprecedented risk.
  • Take away several ideas and best practices for putting in place an effective insider threat program to help mitigate the insider risk.

10:15am - 10:55am

Break and Networking in the Sponsor Pavilion

10:55am - 11:20am

Resiliency in the Face of Emerging Threats

joyner.png

Brad Joyner

Information Assurance Leader

Delta Air Lines, Inc.

Bio

Brad Joyner, Cyber Security Office at Delta Air Lines, Inc., will share his insights into how he and his peers are building more effective strategies, discussion on their ability to monitor global threats and trends and their impact on infrastructure resiliency, and how the industry as a whole is working towards reducing the time to make informed and time-sensitive security decisions.

11:20am – 11:40am

Collaboration Without Constraints –

Securing Content and Workflows to Create the Limitless Enterprise

Smith@0,5x.png

Laureen Smith

Vice President, Wordwide Business Development

Accellion, Gold Sponsor

Bio

As enterprises move to extend business processes to the outside world, we face constraints in order to achieve the benefits of productivity and agility necessary to compete in today’s global market. In terms of security, governance, and integration with existing systems and workflows, businesses must find ways to deliver a consistent and compelling user experience – whether on site or mobile – all while maintaining compliance and controlling costs. Laureen Smith, Vice President, Wordwide Business Development with Accellion, Gold Sponsor, will provide insights into the key role of secure content collaboration as your organization rapidly evolves into a more open and mobile business.

11:40am – 11:50am

Live Polling Session – Top of Mind

Interactive discussions on results on top of mind live polling questions.

11:50am – 12:10pm

Top 5 Challenges & Mistakes in Breach Detection and Response

ben@0,5x.png

Ben Smith

Field Chief Technology Officer

RSA, Gold Sponsor

Organizations of all sizes are under attack today, and one common challenge is how ill–prepared we all tend to be while responding. Join Ben Smith, Field CTO, as the group talks about lessons learned and how to most effectively combine people, processes, and technologies in the midst of a breach response.

12:10pm –12:30pm

The Expanding Footprint of Responsibilities

fleury@0,5x.png

Lynda Fleury

Vice President and CISO

Unum

In this interview session, Lynda Fleury, Vice President and CISO at Unum will discuss the new roles and responsibilities she is taking on in information security and their impact to her company. Also, with looking towards the future, what expectations she is setting for the leadership role she holds. 

12:30pm – 12:50pm

Building Resiliency Into the Security Infrastructure

trimble@0,5x.png

Todd Trimble

Technical Sales Manager

IBM US, Gold Sponsor 

Todd Trimble with IBM will present on the topic of the management of risk within your organization. The security landscape today is more complex and dynamic than ever before; and the concept of risk management within your organization can offer clients a robust way to think about your security needs. In this frame of reference, Todd will walk through a fictional security incident inspired by recent attacks and demonstrate how cognitive capabilities can be used to mitigate risk.

12:50pm – 1:55pm

Lunch and Networking in the Sponsor Pavilion

1:55pm – 2:20pm

Leadership During Challenging Times

Wayne Proctor Pic@0,5x.png

Wayne Proctor

Vice President, Information Security

WestRock

Bio

In this interview session, Wayne Proctor, Vice President of Information Security for WestRock, will share insights into how he is facing some of the toughest challenges today, what he is discussing with his peers, and his thoughts on leading his security organization into the future.  WestRock is an American corrugated packaging company, formed from the merger of MeadWestvaco and RockTenn, and is one of the world's largest paper and packaging companies with $15 billion in annual revenue and 42,000 employees in 30 countries.

2:20pm – 2:35pm

Secure IT Transformation to a Cloud-Enabled Enterprise

peterson@0,5x.png

Kevin Peterson

Director, Security and Network Transformation

Zscaler, Silver Sponsor

Bio

When the Internet is now your primary network, security models and architecture change. Thankfully, it’s for the better. In this session you will hear from a leading Fortune 10 security practitioner about what it means to work in an agile cloud-enabled organization.

 

2:35pm – 2:45pm

Live Polling Session – Top of Mind

Interactive discussions on results on top of mind live polling questions.

2:45pm – 2:55pm

The Enterprise Immune System: Using Machine Learning for Next-Generation Cyber Defense

poupard.png

Joseph Poupard

Regional Director

Darktrace, Silver Sponsor  

From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network - before they turn into a full-blown crisis. 

Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on unsupervised machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat. 

Discover why unsupervised machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources. 

In this session, learn:

  • How new machine learning and mathematics are automating advanced cyber defense
  • Why full network visibility allows you to detect threats as or before they emerge
  • How smart prioritization and visualization of threats allows for better resource allocation and lower risk
  • Real-world examples of unknown threats detected by ‘immune system’ technology

2:55pm – 3:20pm

Afternoon Break

3:20pm – 4:30pm

Executive Roundtable Discussions

Swatzie

Topic #1: Adaptive Security – Innovating for the Future

Deena Swatzie

Vice President, IT Security & Compliance

SunTrust Bank

Bio
Expand Topic
watson@0,5x.png

Topic #2: Creating a High-Performing Information Risk Management Program

Dr. Todd Watson

Information Security Officer

Board of Regents of the University System of Georgia

Bio
Expand Topic
Layer 40@0,5x.png

Topic #3: A Billion IoT Devices…Security’s Daunting Task

Brian Barrios

Director, Threat Management and Intelligence  

Southern Company

Bio
Expand Topic
Layer 41@0,5x.png

Topic #4:  Security Analytics & Threat Intelligence - Leveraging the Knowledge

Michael Brown      

Director of Information Security Operations

Macy's

Expand topic
Marsilio@0,5x.png

Topic #5: Employee Knowledge - The Facts of Security

Michael Marsilio

Information Security and Compliance Officer

Paradies Lagardere

Bio
Expand Topic
Layer 43@0,5x.png

Topic #6: Maturing the Discussions with the Board on Cyber Risk

Eli Phetteplace

API Product Leader - Enterprise Data Platform     

The Weather Company - an IBM Business

Bio
Expand Topic
stewart@0,5x.png

Topic #7 – The $191 Billion Cloud Market – Security and Compliance for the Future 

Michelle Stewart

Chief Information Security Officer

RentPath

Bio
Expand Topic
4:30pm – 4:45pm
Closing Remarks
4:45pm – 5:45pm
Reception and Networking with Prize Drawings