7:15am – 8:30am
In this opening session, Richard Warner will provide insight into some of the latest hard hitting news in the security industry, and the latest statistics on CISOs’ perspectives and major challenges the industry is facing.
9:20am - 9:45am
Navigating the Threat Landscape – The Knowns and Unknowns
Brian Mauter, Executive Director of Information Security at RaceTrac Petroleum, will discuss how his organization is facing the “knowns” of cyber security threats and how he is looking towards the future as he builds his strategies for the “unknowns.”
9:45am - 10:15am
Practical Insider Threat
Organizations face increasingly asymmetric and unprecedented risks from insiders — employees and others who have valid access to enterprise networks and knowledge. In response they are working to put in place pragmatic and impactful programs that protect the organization, its people and its customers. In this session we’ll review who insiders are, discuss a framework for understanding how a “good” insider could turn “bad”, and walk through how to implement a practical insider threat program including best practices for prioritization (hint: it’s not all about malicious actors), identification and mitigation.
10:15am - 10:55am
10:55am - 11:20am
Resiliency in the Face of Emerging Threats
Brad Joyner, Cyber Security Office at Delta Air Lines, Inc., will share his insights into how he and his peers are building more effective strategies, discussion on their ability to monitor global threats and trends and their impact on infrastructure resiliency, and how the industry as a whole is working towards reducing the time to make informed and time-sensitive security decisions.
11:20am – 11:40am
Collaboration Without Constraints –
Securing Content and Workflows to Create the Limitless Enterprise
As enterprises move to extend business processes to the outside world, we face constraints in order to achieve the benefits of productivity and agility necessary to compete in today’s global market. In terms of security, governance, and integration with existing systems and workflows, businesses must find ways to deliver a consistent and compelling user experience – whether on site or mobile – all while maintaining compliance and controlling costs. Laureen Smith, Vice President, Wordwide Business Development with Accellion, Gold Sponsor, will provide insights into the key role of secure content collaboration as your organization rapidly evolves into a more open and mobile business.
11:50am – 12:10pm
Organizations of all sizes are under attack today, and one common challenge is how ill–prepared we all tend to be while responding. Join Ben Smith, Field CTO, as the group talks about lessons learned and how to most effectively combine people, processes, and technologies in the midst of a breach response.
In this interview session, Lynda Fleury, Vice President and CISO at Unum will discuss the new roles and responsibilities she is taking on in information security and their impact to her company. Also, with looking towards the future, what expectations she is setting for the leadership role she holds.
Todd Trimble with IBM will present on the topic of the management of risk within your organization. The security landscape today is more complex and dynamic than ever before; and the concept of risk management within your organization can offer clients a robust way to think about your security needs. In this frame of reference, Todd will walk through a fictional security incident inspired by recent attacks and demonstrate how cognitive capabilities can be used to mitigate risk.
Lunch and Networking in the Sponsor Pavilion
In this interview session, Wayne Proctor, Vice President of Information Security for WestRock, will share insights into how he is facing some of the toughest challenges today, what he is discussing with his peers, and his thoughts on leading his security organization into the future. WestRock is an American corrugated packaging company, formed from the merger of MeadWestvaco and RockTenn, and is one of the world's largest paper and packaging companies with $15 billion in annual revenue and 42,000 employees in 30 countries.
Secure IT Transformation to a Cloud-Enabled Enterprise
When the Internet is now your primary network, security models and architecture change. Thankfully, it’s for the better. In this session you will hear from a leading Fortune 10 security practitioner about what it means to work in an agile cloud-enabled organization.
Interactive discussions on results on top of mind live polling questions.
The Enterprise Immune System: Using Machine Learning for Next-Generation Cyber Defense
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network - before they turn into a full-blown crisis.
Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on unsupervised machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.
Discover why unsupervised machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.
In this session, learn:
Executive Roundtable Discussions