The New York Fall Security Leaders Summit
“Where Industry Leaders Shape the Future”

The Executive Alliance “Security Leaders Summit New York” was held on Wednesday, September 28, 2016 at the Hilton Midtown, Avenue of the Americas. The New York energy spilled over into the conference as the Summit was packed with great session content and highly engaging interaction from attendees throughout the day. The Summit Hosts, represented companies across a diversity of industries and sizes, and shared their insights and knowledge with the distinguished group of attendees through their presentations, interviews and breakout roundtable discussions.

“One of the most intelligent conferences I have been to this year.”
Joel Rosenblatt, Director, Computer & Network Security, Columbia University Business School

Summit Recap

Pre-Summit Host Dinner

ny_dinner.jpg

The Host Dinner was held the evening before the Summit, on 9/27 for the Summit Hosts, Platinum and Gold Sponsors, and invited guests to enjoy getting to know each other in advance of the Summit.

ny_summit.jpg

The Security Leaders Summit New York Fall opened up with networking and breakfast in the Sponsor Pavilion and Welcome Remarks by Mary Lou Heastings, CEO of Executive Alliance and Richard Warner, Summit Moderator.

1.jpg

The Morning Keynote, Aileen Alexander, Senior Client Partner, Co-Leader Global Cybersecurity Practice at Korn Ferry kicked off the day with a view of the landscape driving the demand for talent, key trends, the three types of Information Security / Technology Risk executives emerging that are in demand, and key success factors broken out into “what you do” and “who you are.”

Security Roles – Downloads from Korn Ferry Institute
https://www.kornferry.com/expertise/roles-and-specialities/cybersecurity.

2.jpg

Scott Foote, Cybersecurity Expert and Industry speaker took the stage and presented on “Developing Cyber Situation Awareness with Comprehensive Security Intelligence.” Scott spoke on how our information now survives in a contested infrastructure, awareness is contextual understanding built on intelligence, and shared his insights into the seven vectors of cybersecurity intelligence.

Download Presentation
http://itsecurityleaders.com/wp-content/uploads/2016/10/Comprehensive-Security-Intelligence-Scott-Foote.pdf.

3.jpg

From a recent case, Wesley Rhodes, Chief Technology Officer, Security Architecture Specialist, & Industry Advisor with IBM, Gold Sponsor, discussed the sophistication of an attack purposed to thwart normal countermeasures that lived inside an enterprise undetected for years. In his presentation, “How I Met your Data – A Case from the X-FILES,” Wesley shared what security organizations are up against and the new era of cognitive solutions that generate not just answers, but hypotheses, evidence-based reasoning and recommendations for better decision making in real time.

4.jpg

During the morning break, there was high energy as attendees had the chance to talk with their peers and meet with sponsors to discuss their products and services.

5.jpg

In the interview session, “Conversations with Execs in the Corner Office,” Tom Gancarski, Americas Infrastructure Compliance Officer with a $37 billion major international bank, and Christopher Hall, Deputy CISO & Managing Director for Global Cybersecurity Strategy and Innovation at Bank of New York Mellon, shared their perspectives on a variety of issues including how their responsibilities are changing at their companies, the critical challenges they are facing today as leaders, how they are measuring success, and new responsibilities for Board members emphasizing the role of governance in cybersecurity.

6.jpg

Paul MacArthur, Senior Director of Sales of Americas for SecureWorks, Gold Sponsor, received excellent survey feedback from attendees on his presentation, “2016 Underground Hacker Marketplace – It’s a Good Time to Be a Bad Guy!” Paul provided information on the growing sophistication of the underground marketplace, insight into the new value of data from the hacker’s point of view, and shared recommendations on how organizations can be better protected.

7.jpg

The lunch break provided great opportunities for the conversations to continue from the morning sessions.

8.jpg

In the session “Game Changers – A Focus on Innovation,” Dan Braccia, Managing Director & CSO with Metropolitan Security Group, L&L Holding Company, wove a story of 425 Park Avenue, a 21st century office building, to be completed in 2018, which will be one of the most advanced structures in the world in terms of technology infrastructure. Dan described the amount of data that will be flowing through the networks, the systems in place to monitor and adapt to changing conditions, and the challenges it brings from an information security perspective.

9.jpg

Jim Aldridge, Director at Tanium, Silver Sponsor, presented “Clean Up Your Act! Why You Shouldn’t Ignore Security Hygiene,” brought home the facts that fundamental security hygiene practices create a more defensible environment and mitigates significant amounts of risk. Jim shared his top recommendations in this area, distilled from the lessons learned over hundreds of penetration tests and incident response engagements.

SPONS.jpg

The Summit formally closed with great discussions during the breakout sessions for the Executive Roundtables. A variety of topics were chosen by attendees during their registration and were facilitated during the afternoon by Joel Rosenblatt, Director, Computer and Network Security at Columbia University Business School, Howard Miller, Deputy Chief Information Officer atColumbia University Business School, Christopher Walsh, Corporate Information Security Officer at Bank Leumi USA, Julie Porro, Director, Information Security Risk at Deutsche Bank, and Keith Donnelly, VP, Global Head of Risk & Compliance at Broadridge Financial Solutions.

reception.jpg

Attendees and sponsors had the chance to relax during the afternoon reception and have fun with some great prize giveaways including a drone!

 

Thank You to our New York Fall Sponsors

Gold Sponsor  IBM

ibm.jpg

IBM is a globally integrated technology and consulting company headquartered in Armonk, New York. With operations in more than 170 countries, IBM attracts and retains some of the world’s most talented people to help solve problems and provide an edge for businesses, governments and non-profits. Innovation is at the core of IBM’s strategy. The company develops and sells software and systems hardware and a broad range of infrastructure, cloud and consulting services. Today, IBM is focused on four growth initiatives – business analytics, cloud computing, growth markets and Smarter Planet. IBMers are working with customers around the world to apply the company’s business consulting, technology and R&D expertise to build systems that enable dynamic and efficient organizations, better transportation, safer food, cleaner water and healthier populations. For more information on IBM GTS Mobility Services, please visit www.ibm.com/mobilefirst/us/en/.

 

Silver Sponsor Tanium

tanium.jpg

Tanium gives the world’s largest enterprises and government organizations the unique power to secure, control and manage hundreds of thousands of endpoints across the enterprise with 15-second speed. With the unprecedented speed, scale and simplicity of Tanium, security and IT operations teams now have complete and accurate information on the state of endpoints at all times to more effectively protect against modern day threats and realize new levels of cost efficiency in IT operations.
Having realized tremendous success and growth, Tanium is now deployed by over half of the Fortune 100 and 8 out of the top 10 US banks. Tanium was named by Fortune magazine as one of the top 25 most important private companies among many other notable press mentions. For more information, please visit /www.tanium.com/

 

Bronze Sponsor BeyondTrust

BT.jpg

BeyondTrust is a global cyber security company that believes preventing data breaches requires the right visibility to enable control over internal and external risks. We give you the visibility to confidently reduce risks and the control to take proactive, informed action against data breach threats. And because threats can come from anywhere, we built a platform that unifies the most effective technologies for addressing both internal and external risk: Privileged Account Management and Vulnerability Management. Our solutions grow with your needs, making sure you maintain control no matter where your company goes. BeyondTrust’s security solutions are trusted by over 4,000 customers worldwide, including half of the Fortune 100. To learn more about BeyondTrust, please visit www.beyondtrust.com or contact Rich Pace or Kevin McNally

 

Bronze Sponsor Alert Logic

Alert Logic, the leader in security and compliance solutions for the cloud, provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Fully managed by a team of experts, the Alert Logic Security-as-a-Service solution provides network, system and web application protection immediately, wherever your IT infrastructure resides. Alert Logic partners with the leading cloud platforms and hosting providers to protect over 3,000 organizations worldwide. Built for cloud scale, our patented platform stores petabytes of data, analyzes over 450 million events and identifies over 60,000 security incidents each month, which are managed by our 24×7 Security Operations Center. Alert Logic, founded in 2002, is headquartered in Houston, Texas, with offices in Seattle, Dallas, Cardiff, Belfast and London. For more information, please visit www.alertlogic.com.

 

Bronze Sponsor Forcepoint

FP.jpg

Forcepoint safeguards users, data and networks against the most determined adversaries, from accidental or malicious insider threats to outside attackers, across the entire threat lifecycle. Forcepoint protects data everywhere – in the cloud, on the road, in the office – simplifying compliance and enabling better decision-making and more efficient remediation. Forcepoint empowers organizations to concentrate on what’s most important to them while automating routine security tasks. More than 22,000 organizations around the world rely on Forcepoint. Based in Austin, Texas, with worldwide sales, service, security laboratories and product development, Forcepoint is a joint venture of the Raytheon Company and Vista Equity Partners. For more information, please visit www.forcepoint.com or contact Shaun Stalker or Dan Watson .

Whitepaper available: Forcepoint Sureview Insider Threat DataSheet

 

Bronze Sponsor Forcepoint

secinn.jpg

Security Innovation focuses on the most difficult IT Security problem, and the root cause of most data breaches — insecure software applications. For more than a decade, we’ve helped organizations build internal expertise, uncover critical vulnerabilities, and improve the process by which applications are built. The company’s solutions are based on the three pillars of a secure Software Development Lifecycle (SDLC), which feed into one another to create an ecosystem of repeatable, secure software development: Standards, Education, and Assessment. Our flagship products include TeamProfessor, the industry’s largest library of application security eLearning courses, and TeamMentor, “out of the box” secure development standards. For more information, please contact Ed Adams or visit www.securityinnovation.com.

Gold Sponsor Secureworks

secwork.jpg

SecureWorks is a global provider of intelligence-driven information security solutions exclusively focused on protecting its clients from cyberattacks. SecureWorks’ solutions enable organizations to fortify their cyber defenses to prevent security breaches, detect malicious activity in real time, prioritize and respond rapidly to security breaches and predict emerging threats. For more information, please visit /www.secureworks.com/ Or contact :Paul MacArthur

Additionally, if you would like to learn more about The Underground Hacker Marketplace, please click here
https:/www.secureworks.com/resources/wc-underground-hacker-marketplace-2016

 

Bronze Sponsor Alertlogic

alert.jpg

Alert Logic, the leader in security and compliance solutions for the cloud, provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Fully managed by a team of experts, the Alert Logic Security-as-a-Service solution provides network, system and web application protection immediately, wherever your IT infrastructure resides. Alert Logic partners with the leading cloud platforms and hosting providers to protect over 3,000 organizations worldwide. Built for cloud scale, our patented platform stores petabytes of data, analyzes over 450 million events and identifies over 60,000 security incidents each month, which are managed by our 24×7 Security Operations Center. Alert Logic, founded in 2002, is headquartered in Houston, Texas, with offices in Seattle, Dallas, Cardiff, Belfast and London. For more information, please visit www.alertlogic.com or contact :Ben Masino

 

Bronze Sponsor Cloud Passage

CP.jpg

CloudPassage Halo® is the world’s leading agile security platform that empowers our customers to take full advantage of cloud infrastructure with the confidence that their critical business assets are protected. Halo delivers a comprehensive set of continuous security and compliance functions right where it counts — at the workload. Our platform orchestrates security on-demand, at any scale and works in any cloud or virtual infrastructure (private, public, hybrid or virtual data center). For more information, please visit www.cloudpassage.com or contact Steve Milanesi or Greg Stein

 

Bronze Sponsor BeyondTrust

Sponsor-BeyondTrust-2-from-big-camera-e1459196392405.jpg

BeyondTrust is a global cyber security company that believes preventing data breaches requires the right visibility to enable control over internal and external risks. We give you the visibility to confidently reduce risks and the control to take proactive, informed action against data breach threats. And because threats can come from anywhere, we built a platform that unifies the most effective technologies for addressing both internal and external risk: Privileged Account Management and Vulnerability Management. Our solutions grow with your needs, making sure you maintain control no matter where your company goes. BeyondTrust’s security solutions are trusted by over 4,000 customers worldwide, including half of the Fortune 100. To learn more about BeyondTrust, please visit www.beyondtrust.com or contact Kevin McNally.

 

Bronze Sponsor NetSpi

net.jpg

Using our consulting team’s deep security knowledge and our proprietary CorrelatedVM vulnerability management & reporting solution, NetSPI acts as a trusted advisor to large enterprises by providing deep-dive, manual penetration testing – from mobile applications to entire networks and infrastructures. NetSPI also provides assessment and vulnerability management advisory services designed to analyze and mitigate risks and ensure compliance with relevant regulations and industry standards. Utilizing its proven and comprehensive methodology in conjunction with its adaptive and responsive client service – NetSPI is more than a vendor, its partner you can trust with your most critical assets. More information is available at David Gordon or visit www.netspi.com.

 

Wifi Sponsor Saint

saint.jpg

SAINT Corporation, a global leader in network security, offers the SAINT security suite including integrated vulnerability assessment, penetration testing, compliance reporting, and configuration assessment. Examine your network with the SAINT vulnerability scanner, and expose where an attacker could breach your network. Go to a higher level of visibility with penetration testing tools and exploit the vulnerability to prove its existence without a doubt. SAINT can help to –
• Manage and reduce security risks to your enterprise
• Document compliance with government and industry regulations like PCI, NERC, HIPAA, SOX, FISMA, and with internal policies.
• Emulate potential attackers with the suite of exploit tools.
• Perform configuration audits with policies defined by FDCC & USGCB.
SAINT software is available to download, as a cloud service (SAINTCloud), or preloaded on an appliance (SAINTbox). The software includes enterprise functionality; customizable dashboards and data analysis; and a friendly interface. For more information, visit
www.saintcorporation.com or contact Alberto Aguilar-Sartori

2016 SPONSORS

nyf_2016_recap_sponsors.jpg

2017 REMAINING SUMMITS

NATIONAL.jpg
Atlanta-2.jpg

2017 PAST SUMMITS

newyork_FALL.jpg
boston.jpg
chicago.jpg
newyork_spring.jpg
DALLAS_2017.jpg