The evolution of infosec was on full display at Dallas 2019, with an array of executives providing insight into the future and strategies for challenges faced today. Executive roundtables were lively and spirited debates ensued- and the executive summaries were full of timely answers gleaned from leaders in the industry. Thank you to all of the exemplary speakers and attendees, as well as our strategic partners that brought future focus and made it a great day! Check out the gallery and remember to download the whitepapers and presentations.
Keynote - "The High Stakes of Security"
Richard Warner, former host of Georgia Business on PBS and executive security strategist revealed the statistics that were conglomerated from industry leading whitepapers and illustrated the takeaways gleaned from the research. You can download the summary here: The High Stakes of Security
Network Data: Powering the Modern SOC
Charlie Bollom, Vice President of Sales for ExtraHop, Platinum Sponsor delved into how network traffic analysis can serve as the foundation of more effective security practices, data-driven decisions, and a mature, proactive SOC.
Patrick Benoit, Deputy CISO of Cheetah Digital discussed how building an organization that is able to detect, analyze, take action, recover and communicate is imperative in 2019.
Navigating through Cloud Security
Todd Vancil, Vice President, Americas Systems Engineering for Symantec, Platinum Sponsor spoke about how advanced security tools and techniques can help you take back control of your cloud apps, cloud data and rogue user.
Download results here: What's Next?
Donovan Blaylock, Technology Evangelist for SailPoint, Gold Sponsor focused on how they have seen Identity Governance used as a part of an enterprise’s overall security architecture to help mitigate the risk and breadth of different kinds of ransomware attacks.
Lunch and Networking
Attendees and sponsors continued to engage in discussions and get to know each other over lunch.
David Marshall, Resales Solutions Architect for Allot Communications, Gold Sponsor explained the rise of Crypto-jacking, the hijacking of IT resources for the purpose of covert crypto-mining and detailed all phases of a successful crypto-jacking attack; infiltration, infecting end-points with crypto-mining software, mining and exfiltration of the cryptocurrency.
Senior Management’s Toughest Questions
In an interactive polling session, executives in attendance weighed in on what their senior team is asking and holding them accountable for. Questions included breach data, biggest cybersecurity worry, consequences, operational issues and threat strategy. Download results here: Senior Management’s Toughest Questions
Allan Cox, Principal Solutions Engineer of CyberArk, Silver Sponsor explained the premise that we should not trust anything inside or outside our networks and how to verify everything and anything trying to connect to the networks.
Past the Perimeter: Earned Access Through A Zero-Trust Model
Matthew Cantwell, Enterprise Sales with Duo Security, Silver Sponsor explained why the traditional perimeter-focused security model won’t meet the needs of most modern organizations and how a zero-trust security model can overcome these challenges- and how you can incorporate this approach into your existing architecture without starting from scratch.
Break and Networking
Executive Roundtable Discussions
Facilitated by executives from a diversity of industries across seven different topics, the highly rated Executive Roundtables wrapped up the Summit session.
Executives facilitating the roundtables included:
Topic #1: Measuring Security as a Business Value - Kevin Dunn, SVP and Chief Information Officer / CISO, U.S. Retirement & Benefits Partners
Topic #2: The Zero Trust Security Model - Dorai Babu, Director of Security, The Travelers Companies
Topic #3: Examining the Threat Landscape - Asif Effendi, Director of Security, Baker Hughes, a GE Company
Topic #4: Developing Talent for the Future - Jaimin Shah, Information Security Officer, Greystar
Topic #5: Security Analytics & Threat Intelligence – Are We There Yet? - Clay Baum, Information Security Officer, Origin Bank
Topic #6: Adaptive Security - Innovating for the Future - Joel Lytle, Director of Information Security, Jackson Walker LLP
Topic #7: Blockchain - Dr. Ram Dantu, Director, Center for Information and Cyber Security, University of North Texas (UNT)
Reception and Networking with Prize Drawings
Executive Alliance, our strategic partners and the Dallas attendees closed out the summit with laughs and new friendships. Thanks to everyone for a great Dallas 2019 and stay tuned for details for the upcoming summits and National Symposium.
ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out. Our breakthrough approach analyzes all network interactions and applies advanced machine learning for complete visibility, real-time detection, and guided investigation. With this approach, we help the world’s leading enterprises including Hasbro, Credit Suisse, Caesars Entertainment, and British Airways to rise above the noise of alerts, organizational silos, and runaway technology. Whether you’re investigating threats, ensuring delivery of critical applications, or securing your investment in cloud, ExtraHop helps you protect and accelerate your business.
Symantec Corporation (NASDAQ: SYMC), the world's leading cyber security company, helps organizations, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec's Norton and LifeLock product suites to protect their digital lives at home and across their devices. Symantec operates one of the world's largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visit www.symantec.com or connect with us on Facebook, Twitter, and LinkedIn.
Established in 1996, Allot is a leading global provider of innovative network intelligence and security solutions for service providers and enterprises worldwide, enhancing value to their customers. Our solutions are deployed globally for network and application analytics, traffic control and shaping, and network-based security services.
With over 20 years’ experience empowering service providers and enterprises to get more out of their networks and to manage them more efficiently, we enable network operators to clearly see and understand their networks from within. Allot provides its customers with the tools to optimize, innovate, and capitalize on every opportunity; to learn about users and network behaviors; to improve quality of service and reduce costs; and to detect security breaches to protect their own networks and their users from attacks. All of this is achieved while increasing value to customers and deploying new services more quickly than ever before.
SailPoint, the leader in enterprise identity management, brings the Power of Identity to customers around the world. SailPoint’s open identity platform gives organizations the power to enter new markets, scale their workforces, embrace new technologies, innovate faster and compete on a global basis. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments.
CyberArk (NASDAQ: CYBR) is the global leader in privileged access security, a critical layer of IT security to protect data, infrastructure and assets across the enterprise, in the cloud and throughout the DevOps pipeline. CyberArk delivers the industry’s most complete solution to reduce risk created by privileged credentials and secrets. The company is trusted by the world’s leading organizations, including 50 percent of the Fortune 500, to protect against external attackers and malicious insiders. A global company, CyberArk is headquartered in Petach Tikva, Israel, with U.S. headquarters located in Newton, Mass. The company also has offices throughout the Americas, EMEA, Asia Pacific and Japan.
Duo Security, now part of Cisco, is the leading provider of Trusted Access security and multi-factor authentication. Duo's zero-trust security platform, Duo Beyond, enables organizations to provide trusted access to all of their critical applications - for any user, from anywhere, and with any device. Duo is a trusted partner to more than 14,000 customers globally, including Dresser-Rand, Etsy, Facebook, Paramount Pictures, Random House, Zillow and more. Founded in Ann Arbor, Michigan, Duo has offices in growing hubs in Detroit; Austin, Texas; San Mateo, California; and London.
BeyondTrust helps companies defend against threats related to stolen credentials, misused privileges, and unwanted remote access, while empowering people.
Our privileged access management platform offers the broadest set of capabilities to:
This approach has been recognized by top analysts from Gartner and BeyondTrust is trusted by more than 20,000 customers worldwide, including over half of the Fortune 100.
If you have an upcoming project or are currently evaluating PAM solutions, please contact Adam Kobos at: email@example.com.
Gigamon is leading the convergence of networking and security operations to help organizations reduce complexity and increase efficiency of their security stack. Our GigaSECURE® Security Delivery Platform is a next-generation network packet broker that helps customers make threats more visible across cloud, hybrid and on-premises environments, deploy resources faster and maximize the performance of their security tools.
Global 2000 companies and government agencies rely on Gigamon solutions to make them more agile and cut costs.
For more information, visit www.gigamon.com
Expel (@expel_io) provides transparent managed security, on-prem and in the cloud. It’s the antidote for companies trapped in failed relationships with their managed security service provider (MSSP) and those looking to avoid the frustration of working with one in the first place.
To learn more, check us out at https://www.expel.io
Venafi is the cyber security market leader in machine identity protection, securing machine-to-machine connections and communications. Venafi protects machine identity types by orchestrating cryptographic keys and digital certificates for SSL/TLS, IoT, mobile and SSH. Venafi provides global visibility of machine identities and the risks associated with them for the extended enterprise – on premises, mobile, virtual, cloud and IoT – at machine speed and scale. Venafi puts this intelligence into action with automated remediation that reduces the security and availability risks connected with weak or compromised machine identities while safeguarding the flow of information to trusted machines and preventing communication with machines that are not trusted.
With 31 patents currently in its portfolio, Venafi delivers innovative solutions for the world's most demanding, security-conscious Global 5000 organizations, including the top five U.S. health insurers; the top five U.S. airlines; four of the top five U.S., U.K., Australian and South African banks; and four of the top five U.S. retailers. Venafi is backed by top-tier investors, including TCV, Foundation Capital, Intel Capital, QuestMark Partners, Mercato Partners and NextEquity.
Thanks again to all of our attendees and partners! Next stop, New York City May 9th!