7:15am – 8:30am

8:30am – 8:50am

Registration Opens with a Breakfast Buffet and Networking in the Sponsor Pavilion 

Welcome and Opening Remarks

heastings.jpg
Mary Lou Heastings
CEO
Executive Alliance Inc.
warner.jpg
Richard Warner
Summit Moderator

8:50am – 9:30am

Morning Keynote – “Global Risks 2017”
fuhrman.jpg

 

 

Thomas Fuhrman

Global Leader, Cybersecurity and Advisory Services

Marsh

 

Since 2006, Marsh & McLennan Companies has collaborated with the World Economic Forum on its landmark Global Risks Report. Tom Fuhrman, Summit Keynote speaker, will present on the findings from the Forum held in Davos, and share insights into key global risks, specific to cybersecurity and disruptive technologies.
Marsh is a wholly owned subsidiary of Marsh & McLennan Companies, a global professional services firm offering clients advice and solutions in the areas of risk, strategy, and people.

9:30am – 10:00am

“Navigating the Threat Landscape- The Knowns and Unknowns”

dorough.jpg
Richard Dorough
Acting Chief Information
Security Officer

Norwegian Cruise Line
varghese.jpg

Anil Varghese

Chief Information

Security Officer

Service King

In this session, Richard Dorough, Acting CISO of Norwegian Cruise Line and Anil Varghese, CISO of Service King, will provide insights into how their companies are facing the “knowns” of cyber security threats and also how they are looking towards the future as they build their strategies for the “unknowns.”

Controlling approximately 8% of the total worldwide share of the cruise market, Norwegian Cruise Line has approximately $5 billion in revenue.
Service King is one of the largest independently owned and operated providers of collision repair services in the United States.

10:00am – 10:30am

“Cloudy with a Chance of… Visibility, Accountability & Security”

Bell.jpg
Ken Bell
Deputy CISO
Forcepoint, Platinum Sponsor

Cloud adoption is driving value into businesses like never before. Trying to manage security and compliance in the use of cloud platforms and applications can be challenging, with visibility being “cloudy” at best. That situation can drive stress and frustration into already overworked security teams. In this session Doug Copley will explain how the latest cloud security platforms can be the foglight to improve visibility and information risk management while enabling organizations to safely adopt those transformative technologies that will advance the mission of the organization.

Supporting more than 20,000 organizations worldwide, Forcepoint’s systems enable companies to empower employees with unobstructed access to confidential data while protecting intellectual property and simplifying compliance.

10:30am – 11:10am

Break and Networking in the Sponsor Pavilion

11:10am – 11:40am

“Resiliency in the Face of Emerging Threats”

In this interactive session, CISOs will discuss how they are building more effective strategies, their ability to monitor global threats and trends and their impact on infrastructure resiliency, and how they are working towards reducing the time to make informed and time-sensitive security decisions.

11:40am – 12:10pm

Collaboration Without Constraints – “Securing content and workflows to create the Limitless Enterprise”

feit.jpg
Andy Feit
Chief Marketing Officer
Accellion, Gold Sponsor

As enterprises move to extend business processes to the outside world, we face constraints in order to achieve the benefits of productivity and agility necessary to compete in today’s global market. In terms of security, governance, and integration with existing systems and workflows, businesses must find ways to deliver a consistent and compelling user experience – whether on site or mobile – all while maintaining compliance and controlling costs. Gain insight into the key role of secure content collaboration as your organization rapidly evolves into a more open and mobile business.

As the foremost provider of private cloud solutions for secure mobile content management, Accellion offers enterprise organizations the scalability, flexibility, control and security to enable a mobile workforce with the tools they need to create, access and share information securely, wherever work takes them.

12:00pm – 12:15pm

“Engaging Employees – A Snapshot of the Future”

warner.jpg
Richard Warner
Summit Moderator
In this session, Summit Moderator, Richard Warner, will share insights into some of the most innovative ways companies are working with their employees on building awareness of cyber security threats.

12:15pm – 12:35pm

“The Security Immune System”

melore.jpg
Michael Melore
Cyber Security Architect
IBM, Gold Sponsor

Inevitably some risk will be become threats, and subsequently realized incidents. Even the best thought out controls may be circumvented or fail. In moving towards the future, organizations are building layered defenses. These defense systems require the ability to dynamically protect, defend, and respond against threats and incidents at various control layers. Michael Melore, Cyber Security Architect at IBM, Gold Sponsor, will share insights into how world class organizations are building their “Security Immune System.”

IBM Security, with 7,500 security professionals worldwide, helps more than 12,000 clients address their most critical needs: transforming their security programs; optimizing security operations and response systems; and protecting critical information.

12:35pm – 1:45pm

Lunch in the Sponsor Pavillion

1:45pm – 2:00pm

“Trends, Drivers & Impacts”

This session will focus on many of the latest trends in the industry, their drivers and subsequent expected impacts.

2:00pm – 3:00pm

Breakout Executive Roundtable Discussions

Breakout sessions with your peers on topics determined by attendees during registration.
Topic 1:
"The $191 Billion Cloud Market – Security and Compliance for the Future"
Topic 2:
“Creating a High-Performing Information Risk Management Program”
Topic 3:
"On the Critical Path to Business Success"
foreman.jpg
Stan Foreman
Director of Enterprise
Information Security
Architecture & Strategy
Marriott International
pineda.jpg
Cecil Pineda
Chief Information Security Officer
Dallas Fort Worth International Airport
desmond.jpg
Jim Desmond
Chief Security Officer
Elevate
Topic 4:
“Maturing the Discussions with the Board on Cyber Risk”
Topic 5:
“Data Protection Strategies – Beyond the Traditional”
Topic 6:
Security Analytics & Threat Intelligence – Leveraging the Knowledge
stanowick.jpg
David Stanowick
Chief Information
Security Officer
Amedisys
mckinney.jpg
Brenton McKinney
Vice President, Security
Medecision, Inc.
ashok.png
Ashok Jayaramulu
Director, Security Monitoring Toolset
AIG
Topic 7:
“Finding the Right Talent”
yancy.jpg
Eric Yancy
Information Security Officer, GetThere
Sabre Corporation

3:00pm – 3:30pm

Break and Networking in the Sponsor Pavilion

3:30pm – 4:30pm

Executive Roundtable Discussions with Debrief

4:30pm – 4:45pm

Closing Remarks

4:45pm – 5:45pm

Reception and Networking with Prize Drawings

2017 SPONSORS

Platinum Sponsor

forcepoint-1.jpg

Gold Sponsors

accellion-1.jpg
ibm-1.jpg

Bronze Sponsors

alert logic-1.jpg
fidelis-1.jpg
security innovation-1.jpg
wombat-1.jpg
zix.jpg

2017 REMAINING SUMMITS

Atlanta-2.jpg
2018 SUMMITS