The Security Leaders Summit - Dallas 2019

Where Industry Leaders Shape the Future

The evolution of infosec was on full display at Dallas 2019, with an array of executives providing insight into the future and strategies for challenges faced today. Executive roundtables were lively and spirited debates ensued- and the executive summaries were full of timely answers gleaned from leaders in the industry. Thank you to all of the exemplary speakers and attendees, as well as our strategic partners that brought future focus and made it a great day! Check out the gallery and remember to download the whitepapers and presentations.

Summit Recap

1

Keynote - "The High Stakes of Security" 

Richard Warner, former host of Georgia Business on PBS and executive security strategist revealed the statistics that were conglomerated from industry leading whitepapers and illustrated the takeaways gleaned from the research. You can download the summary here: The High Stakes of Security

 

2

Evolution of the CISO 

This interview session with Mike Tiddy, CISO of BNSF Railway Company, and Cynthia Watson, SVP and CISO of First Financial Bankshares, Inc. provided insights on how the CISO of today can become the CISO of tomorrow, with capabilities to navigate through change and disruptions that impact their business.

 

3

 Network Data: Powering the Modern SOC

Charlie Bollom, Vice President of Sales for ExtraHop, Platinum Sponsor delved into how network traffic analysis can serve as the foundation of more effective security practices, data-driven decisions, and a mature, proactive SOC.

 

4-1

Take a Break!  Coffee and Networking with Your Peers
Summit attendees had the opportunity during the morning break to continue the discussions.

 

5

The Year Ahead

Patrick Benoit, Deputy CISO of Cheetah Digital discussed how building an organization that is able to detect, analyze, take action, recover and communicate is imperative in 2019.

 

6

Navigating through Cloud Security

Todd Vancil, Vice President, Americas Systems Engineering for Symantec, Platinum Sponsor spoke about how advanced security tools and techniques can help you take back control of your cloud apps, cloud data and rogue user.

 

7

What’s Next?

This Interactive polling session with executives in attendance focused on risk mitigation, security posture, breach reaction, a national privacy policy and breach reporting responsibility.

Download results here: What's Next?

 

8

Mitigating the Resurgence of Ransomware Attacks with Identity Governance

Donovan Blaylock, Technology Evangelist for SailPoint, Gold Sponsor focused on how they have seen Identity Governance used as a part of an enterprise’s overall security architecture to help mitigate the risk and breadth of different kinds of ransomware attacks.

 

9

Lunch and Networking

Attendees and sponsors continued to engage in discussions and get to know each other over lunch.

 

10

What is Cryptojacking? How to Prevent your Network from Being Exploited

David Marshall, Resales Solutions Architect for Allot Communications, Gold Sponsor explained the rise of Crypto-jacking, the hijacking of IT resources for the purpose of covert crypto-mining and detailed all phases of a successful crypto-jacking attack; infiltration, infecting end-points with crypto-mining software, mining and exfiltration of the cryptocurrency.

 

11

Senior Management’s Toughest Questions

In an interactive polling session, executives in attendance weighed in on what their senior team is asking and holding them accountable for. Questions included breach data, biggest cybersecurity worry, consequences, operational issues and threat strategy. Download results here: Senior Management’s Toughest Questions

 

10.5

What is “Zero Trust” and How Can I Get There?

Allan Cox, Principal Solutions Engineer of CyberArk, Silver Sponsor explained the premise that we should not trust anything inside or outside our networks and how to verify everything and anything trying to connect to the networks.

 

13

Past the Perimeter: Earned Access Through A Zero-Trust Model

Matthew Cantwell, Enterprise Sales with Duo Security, Silver Sponsor explained why the traditional perimeter-focused security model won’t meet the needs of most modern organizations and how a zero-trust security model can overcome these challenges- and how you can incorporate this approach into your existing architecture without starting from scratch.

 

12

Break and Networking

 

14

Executive Roundtable Discussions

Facilitated by executives from a diversity of industries across seven different topics, the highly rated Executive Roundtables wrapped up the Summit session.

Executives facilitating the roundtables included:

roundtables

Topic #1: Measuring Security as a Business Value - Kevin Dunn, SVP and Chief Information Officer / CISO, U.S. Retirement & Benefits Partners

Topic #2: The Zero Trust Security Model - Dorai Babu, Director of Security, The Travelers Companies

Topic #3: Examining the Threat Landscape - Asif Effendi, Director of Security, Baker Hughes, a GE Company

Topic #4: Developing Talent for the Future - Jaimin Shah, Information Security Officer, Greystar

Topic #5: Security Analytics & Threat Intelligence – Are We There Yet? - Clay Baum, Information Security Officer, Origin Bank

Topic #6: Adaptive Security - Innovating for the Future - Joel Lytle, Director of Information Security, Jackson Walker LLP

Topic #7: Blockchain - Dr. Ram Dantu, Director, Center for Information and Cyber Security, University of North Texas (UNT)

 

15

 Reception and Networking with Prize Drawings

Executive Alliance, our strategic partners and the Dallas attendees closed out the summit with laughs and new friendships. Thanks to everyone for a great Dallas 2019 and stay tuned for details for the upcoming summits and National Symposium.

 

Thank You to our 2019 Dallas Summit Sponsors

 

S1

Platinum Sponsor

ExtraHop

ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out. Our breakthrough approach analyzes all network interactions and applies advanced machine learning for complete visibility, real-time detection, and guided investigation. With this approach, we help the world’s leading enterprises including Hasbro, Credit Suisse, Caesars Entertainment, and British Airways to rise above the noise of alerts, organizational silos, and runaway technology. Whether you’re investigating threats, ensuring delivery of critical applications, or securing your investment in cloud, ExtraHop helps you protect and accelerate your business.

For more information, please visit www.extrahop.com or contact Dan Kempf  dkempf@extrahop.com, Keither Vrba, keithv@extrahop.comat  or Charlie Bollom at charlie@extrahop.com

ExtraHop Revealx Datasheet

 

S2

Platinum Sponsor

Symantec

Symantec Corporation (NASDAQ: SYMC), the world's leading cyber security company, helps organizations, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec's Norton and LifeLock product suites to protect their digital lives at home and across their devices. Symantec operates one of the world's largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visit www.symantec.com or connect with us on FacebookTwitter, and LinkedIn. 

 

S3

Gold Sponsor

Allot

Established in 1996, Allot is a leading global provider of innovative network intelligence and security solutions for service providers and enterprises worldwide, enhancing value to their customers. Our solutions are deployed globally for network and application analytics, traffic control and shaping, and network-based security services. 

With over 20 years’ experience empowering service providers and enterprises to get more out of their networks and to manage them more efficiently, we enable network operators to clearly see and understand their networks from within. Allot provides its customers with the tools to optimize, innovate, and capitalize on every opportunity; to learn about users and network behaviors; to improve quality of service and reduce costs; and to detect security breaches to protect their own networks and their users from attacks. All of this is achieved while increasing value to customers and deploying new services more quickly than ever before.

For more information, visit  https://www.allot.com/enterprise/  or contact Steve Smith at ssmith@allot.com

 

S4

Gold Sponsor

SailPoint

SailPoint, the leader in enterprise identity management, brings the Power of Identity to customers around the world. SailPoint’s open identity platform gives organizations the power to enter new markets, scale their workforces, embrace new technologies, innovate faster and compete on a global basis. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments. 

Sailpoint Identity is Security

Read what your peers are saying about:

  • The benefits of self-service access to systems, applications and data
  • Protection against cyberattacks with strong identity management
  • The connection between identity governance and compliance
  • How their c-suite sees the role of identity governance evolving in the future

To learn more about SailPoint, please visit www.sailpoint.com or contact Bryan Finnegan bryan.finnegan@sailpoint.com

 

S5

Silver Sponsor

CyberArk

  • CyberArk (NASDAQ: CYBR) is the global leader in privileged access security, a critical layer of IT security to protect data, infrastructure and assets across the enterprise, in the cloud and throughout the DevOps pipeline. CyberArk delivers the industry’s most complete solution to reduce risk created by privileged credentials and secrets. The company is trusted by the world’s leading organizations, including 50 percent of the Fortune 500, to protect against external attackers and malicious insiders. A global company, CyberArk is headquartered in Petach Tikva, Israel, with U.S. headquarters located in Newton, Mass. The company also has offices throughout the Americas, EMEA, Asia Pacific and Japan.

    For more information, please visit www.cyberark.com or contact Ruben Garcia, District Manager, Ruben.Garcia@CyberArk.com
  • BeyondTrust Blog: https://www.beyondtrust.com/blog/
  • CyberArk - Privileged Access Security Solution 2019


S6

Silver Sponsor

Duo Security

Duo Security, now part of Cisco, is the leading provider of Trusted Access security and multi-factor authentication. Duo's zero-trust security platform, Duo Beyond, enables organizations to provide trusted access to all of their critical applications - for any user, from anywhere, and with any device. Duo is a trusted partner to more than 14,000 customers globally, including Dresser-Rand, Etsy, Facebook, Paramount Pictures, Random House, Zillow and more. Founded in Ann Arbor, Michigan, Duo has offices in growing hubs in Detroit; Austin, Texas; San Mateo, California; and London.

Sign up for a free trial of Duo here:  Start a free trial today.
To learn more, check out Why two-factor authentication?
Or visit us at: www.duo.com

Beyond the Perimeter - Duo Security 2019

 

S7

Bronze Sponsor

BeyondTrust

BeyondTrust helps companies defend against threats related to stolen credentials, misused privileges, and unwanted remote access, while empowering people. 

Our privileged access management platform offers the broadest set of capabilities to:

  • Discover, manage, audit, and monitor privileged accounts of all types
  • Remove excessive end user privileges on Windows, Mac, Unix, Linux and network devices
  • Secure, manage, and audit vendor and internal remote privileged access, and access and support remote systems
  • Identify, prioritize, and remediate vulnerabilities and inform privilege decisions with risk insights
  • Audit, report, and recover changes across Microsoft Windows platforms

This approach has been recognized by top analysts from Gartner and BeyondTrust is trusted by more than 20,000 customers worldwide, including over half of the Fortune 100.

If you have an upcoming project or are currently evaluating PAM solutions, please contact Adam Kobos at:  akobos@beyondtrust.com.

 

S9

Bronze Sponsor

Gigamon

Gigamon is leading the convergence of networking and security operations to help organizations reduce complexity and increase efficiency of their security stack. Our GigaSECURE® Security Delivery Platform is a next-generation network packet broker that helps customers make threats more visible across cloud, hybrid and on-premises environments, deploy resources faster and maximize the performance of their security tools.

Global 2000 companies and government agencies rely on Gigamon solutions to make them more agile and cut costs. 

For more information, visit www.gigamon.com

 

S8

 Bronze Sponsor

Expel

Expel (@expel_io) provides transparent managed security, on-prem and in the cloud. It’s the antidote for companies trapped in failed relationships with their managed security service provider (MSSP) and those looking to avoid the frustration of working with one in the first place.

To learn more, check us out at https://www.expel.io

 

S10

Bronze Sponsor

Venafi

Venafi is the cyber security market leader in machine identity protection, securing machine-to-machine connections and communications. Venafi protects machine identity types by orchestrating cryptographic keys and digital certificates for SSL/TLS, IoT, mobile and SSH. Venafi provides global visibility of machine identities and the risks associated with them for the extended enterprise – on premises, mobile, virtual, cloud and IoT – at machine speed and scale. Venafi puts this intelligence into action with automated remediation that reduces the security and availability risks connected with weak or compromised machine identities while safeguarding the flow of information to trusted machines and preventing communication with machines that are not trusted.

With 31 patents currently in its portfolio, Venafi delivers innovative solutions for the world's most demanding, security-conscious Global 5000 organizations, including the top five U.S. health insurers; the top five U.S. airlines; four of the top five U.S., U.K., Australian and South African banks; and four of the top five U.S. retailers. Venafi is backed by top-tier investors, including TCV, Foundation Capital, Intel Capital, QuestMark Partners, Mercato Partners and NextEquity.

For more information visit: www.venafi.com and visit our Resource Center at: https://www.venafi.com/resource-center

 

Thanks again to all of our attendees and partners! Next stop, New York City May 9th!

 

2019 SPONSORS

dallas_sponsors