ATL Banner.png

 Over the past year, technology and the IoT has exploded - and security challenges are only becoming more fluid. For organizations to stay at the apex, collaboration with the best minds in the space and a future-forward mindset is more important than ever. The 2018 Summit Topics are developed with CIOs, CISOs and executives and provide a tremendous amount of value to those who are looking to understand best practices in IT. The peer-to-peer Executive Roundtable Sessions have proven to be an exceptional resource for executives- providing real answers to issues facing their organizations and the industry.

7:15am – 8:40am

8:40am – 9:00am
Registration Opens with a Breakfast Buffet and Networking in the Sponsor Pavilion

Welcome and Opening Remarks

heastings.jpg
Mary Lou Heastings
CEO
Executive Alliance Inc.
Bio
Richard-Warner.png
Richard Warner 
Television and Radio Host
Summit Moderator
Bio

9:00am – 9:40am

Keynote - "State of the Industry"

FBISeal.png

David West
Supervisory Special Agent
FBI

Bio

David West, Supervisory Special Agent with the FBI, will kick off the Summit by providing an inside look into the state of cyber security and the challenges for both the public and private sectors.

9:40am – 10:00am

Guiding Information Security into the Future

Octavia 150.png

Octavia Howell

Corporate Vice President, Data Network and Security Operations

New York Life Insurance Company

Bio

This interview session with Octavia Howell, Corporate VP of Data Networks and Security Operations at New York Life, will provide insights on key skills needed, what will set security executives apart in the future, and the plan to overcome some of the biggest challenges facing the industry in the future.

 

10:00am – 10:30am

TLS 1.3 and What It Means for Data Center Visibility

abella 150.png

Chris Abella

Senior Sales Engineer

ExtraHop Networks, Platinum Sponsor

Bio

 TLS 1.3 has been approved. Now What? The requirement for Perfect Forward Secrecy in TLS 1.3 breaks the passive decryption used by many enterprise network monitoring tools and will challenge the way companies are approaching their decryption strategy. This session will discuss what you need to know about taking the TLS1.3 plunge. We will review the pros and cons of various PFS decryption strategies and offer an alternative to endpoint monitoring and man in the middle decryption that is more secure and cost-effective.

 

10:30am – 11:10am

Break and Networking in the Sponsor Pavilion

11:10am – 11:20am

Top of Mind

Interactive polling session with executives discussing some of their top issues of the day and how their industry peers respond.

11:20am – 11:40am

Leadership During Challenging Times

gelhardt.png

Mark Gelhardt

VP, Global Technology Governance

Elavon

Bio

As VP of Global Technology Governance at Elevon, Colonel Gelhardt is a retired Army Officer and was selected to work at the White House as the CIO/CISO equivalent for the White House from 1995 through 1999.  Colonel Gelhardt was responsible for all classified Information Technology and Communications used by the President, Vice President, White House Staff, and the Secret Service.

In this presentation, Mark will discuss how leadership can be handled during the most stressful situations and sharing his insights into the challenges faced, overcoming obstacles, and key traits that will be needed by leaders of the future in order to be successful.  Published in 2018, Mark’s book, “My Time in the Clinton White House” will be on sale at the Summit with personal signings.

 

11:40am – 12:00pm

No Silver Bullets – Cybersecurity in the AI Era

lhotka 150.png

Doug Lhotka

Executive Security Architect

IBM, Gold Sponsor
Bio

It's no surprise that our organizations are under attack by industrialized threats from highly skilled adversaries. At the same time we're drowning in information, facing a growing skills shortage, and often dealing with security infrastructures from the dark ages. So we're all looking for the latest magic bullet, and Artificial Intelligence, cognitive and machine learning are now the king of the hype curve.

We'll talk about the threats in more detail, the growing migration from compliance to risk-focused security, and how security is fundamentally an information management problem. We'll investigate how AI is being applied in real organizations today, and try to get beyond the marketing and hype to understand this fundamental shift coming our way.

 

12:00pm – 12:20pm 

The X Factor in an “A” Team

underwood 150.png

Megan Underwood

Information Assurance Leader

Delta Air Lines

Bio

Mindset…this team knows it can deliver.  What does it take to find and build a team that is invested, persistent, and knows how to overcome major challenges thrown its way? In an interview setting, Megan Underwood, Information Assurance Leader at Delta Air Lines, will her share insights into the traits that make up “A” team members, why they are great problem solvers, and how to keep these employees motivated and challenged.

 

12:20pm – 12:30pm

Autonomous Cyber Defense: AI and the Immune System Approach

greenway.png

AJ Greenway

Regional Director

Darktrace, Silver Sponsor

Bio

From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and respond to these threats that are already inside the network - before they turn into a full-blown crisis.

Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat. 

Discover why autonomous response and machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.

In this session, learn:

  • How new machine learning and mathematics are automating advanced cyber defense
  • Why full network visibility allows you to detect and autonomously respond to threats
  • How smart prioritization and visualization of threats allows for better resource allocation and lower risk
  • Real-world examples of unknown threats detected by ‘immune system’ technology
12:30pm – 1:35pm 
Lunch and Networking
1:35pm – 2:00pm

Senior Management’s Toughest Questions

Marsilio.png

Michael Marsilio

Information Security and Compliance Officer

Paradies Lagardere

Bio

Interview session with Michael Marsilio, Chief Information Security Officer with Paradies Lagardere, on his accountability to senior management and how they are responding.

 

2:00pm – 2:50pm

Executive Roundtable Discussions – Rotation #1

Breakout sessions with your peers on topics determined by attendees during registration. Attendees will have the opportunity to cover two topics. 

Topic #1:  Information Risk Management Programs for the Future

Facilitated by:

Sabastian High, Executive Security Consultant, Gerson Lehrman Group

high 150

Expand Topic
Bio

Topic #2:  Developing Top Talent

Facilitated by:

Tamika B. Puckett, Director, Office of Enterprise Risk Management

City of Atlanta – Department of Finance

Puckett 150

Expand Topic
Bio

Topic #3: Cloud Security and Compliance – Next Steps

Facilitated by:

Hari Krishna, Head of IT Enterprise Data Services - IT Integration, Enterprise Architecture & Innovation

Boehringer Ingelheim Pharmaceuticals

krishna 150

Expand Topic
Bio

Topic #4: Data Protection Strategies – Beyond the Traditional

Facilitated by:

Abe Manasrah, VP, Data and Analytics Officer, Tanner Health System

Manasrah 150

Expand Topic

Topic #5:  Next Generation Security Analytics & Threat Intelligence

Facilitated by:

Sven Bamford, Information Assurance Leader, Delta Air Lines

sven 150

Expand Topic

Topic #6:  Identity and Access Management Landscape

Expand Topic
2:50pm – 3:15pm

Afternoon Break

3:15pm – 4:30pm

Executive Roundtable Discussions – Rotation #2 with Debriefs

4:30pm – 4:45pm
Closing Remarks
4:45pm – 5:45pm
Reception and Networking with Prize Drawings