7:15am – 8:30am

8:30am – 8:50am

Registration Opens with a Breakfast Buffet and Networking in the Sponsor Pavilion 

Welcome and Opening Remarks

heastings.jpg
Mary Lou Heastings
CEO
Executive Alliance Inc.
Bio
warner.jpg
Richard Warner
Summit Moderator
Bio

8:50am – 9:30am

Morning Keynote – “Global Risks 2017”
fuhrman.jpg

Thomas Fuhrman

Global Leader, Cybersecurity and Advisory Services

Marsh

Bio

Since 2006, Marsh & McLennan Companies has collaborated with the World Economic Forum on its landmark Global Risks Report. Tom Fuhrman, Summit Keynote speaker, will present on the findings from the Forum held in Davos, and share insights into key global risks, specific to cybersecurity and disruptive technologies.

Marsh is a wholly owned subsidiary of Marsh & McLennan Companies, a global professional services firm offering clients advice and solutions in the areas of risk, strategy, and people.

9:30am – 10:00am

“Navigating the Threat Landscape- The Knowns and Unknowns”

Layer 24.png
Lou Briscoe

Former Vice President, Head of Information Security

Thomson Reuters

Bio

In this session, Lou Briscoe, Former VP and Head of Information Security at Thomson Reuters, will provide insights into how his company is facing the “knowns” of cyber security threats and also how they are looking towards the future as they build their strategies for the “unknowns.”

10:00am – 10:30am

"A Risk-based Approach to Protecting Information in the Cloud –

Achieving Visibility and Control Across the Apps, Users and Data"

weiss.jpg
Marty M. Weiss
Cloud Security Sales Engineering and Author
Symantec, Platinum Sponsor
Bio

It’s no longer a question of “if clouds are secure?” Rather the question is how are you going to ensure that employees make appropriate use of and interact safely with applications from cloud service providers? Cloud governance, visibility and control are critical issues that need to be addressed. For many organizations cloud strategy still lags cloud use. After touching upon cloud ownership and risk acceptance, Marty Weiss with Platinum Sponsor, Symantec, will look closely at the two things you still have control over, and certainly accountability for — the people and the data.

10:30am – 11:10am

Break and Networking in the Sponsor Pavilion

11:10am – 11:30am

“Resiliency in the Face of Emerging Threats”

donnelly.png
Keith Donnelly

VP, Global Head of Risk and Compliance

Broadridge Financial Solutions

Bio
spryou.jpg

Marina Spryou

SVP, Global Security & Risk Leader

Nielsen

Bio

In this interview session, Keith Donnelly, VP, Global Head of Risk and Compliance for Broadridge Financial Solutions and Marina Spyrou, SVP and Global Security & Risk Leader at Nielsen, will discuss how they are building more effective strategies, their ability to monitor global threats and trends and their impact on infrastructure resiliency, and how they are working towards reducing the time to make informed and time-sensitive security decisions.

Broadridge Financial Solutions, Inc. is a US servicing company for the financial industry with over 10,000 employees and approximately $3 billion in revenue.

Nielsen is a global information, data, and measurement company, operating in over 100 countries and employing approximately 44,000 people worldwide. Total revenues are close to $7 billion.

11:30am – 11:50am

Collaboration Without Constraints – “Securing content and workflows to create the Limitless Enterprise”

feit.jpg
Andy Feit
Chief Marketing Officer
Accellion, Gold Sponsor
Bio

As enterprises move to extend business processes to the outside world, we face constraints in order to achieve the benefits of productivity and agility necessary to compete in today’s global market. In terms of security, governance, and integration with existing systems and workflows, businesses must find ways to deliver a consistent and compelling user experience – whether on site or mobile – all while maintaining compliance and controlling costs. Andy Feit, Chief Marketing Officer with Accellion, Gold Sponsor, will provide insights into the key role of secure content collaboration as your organization rapidly evolves into a more open and mobile business.

11:50am – 12:00pm

“Engaging Employees – A Snapshot of the Future”

warner.jpg
Richard Warner
Summit Moderator
In this session, Summit Moderator, Richard Warner, will share insights into some of the most innovative ways companies are working with their employees on building awareness of cyber security threats.

12:00pm – 12:20pm

“The Security Immune System”

melore.jpg
Michael Melore
Cyber Security Architect
IBM, Gold Sponsor
Bio

Inevitably some risk will be become threats, and subsequently realized incidents. Even the best thought out controls may be circumvented or fail. In moving towards the future, organizations are building layered defenses. These defense systems require the ability to dynamically protect, defend, and respond against threats and incidents at various control layers. Michael Melore, Cyber Security Architect at IBM, Gold Sponsor, will share insights into how world class organizations are building their “Security Immune System.”

IBM Security, with 7,500 security professionals worldwide, helps more than 12,000 clients address their most critical needs: transforming their security programs; optimizing security operations and response systems; and protecting critical information.

12:20pm – 12:40pm

Business Technologies for the Future

In this interview session, senior executives will share what they are doing to ensure their organizations are positioned for success in the future by having the right technologies in place. This discussion, while not focused on vendor specific products, will provide insights into existing technologies that are viewed as being on the critical path to success and new technologies that have promise for the future.

12:40pm – 1:00pm

“The Threat Landscape”

aldridge.png
Jim Aldridge
Director
Tanium, Gold Sponsor
Bio
The media continues to report that the threat landscape is evolving. But this is a common cliché that can smokescreen reality. In fact, significant security events tend to share notable commonalities. Regardless of whether the attack is a widely-distributed banking Trojan extracted from a phishing email or a targeted attack campaign by a sophisticated state-sponsored actor, the attacker’s success hinges on a handful of key activities. This presentation will begin with a threat landscape review, focusing on commonalities across threat classes. Jim Aldridge will draw on his experiences as a penetration tester and incident responder to outline countermeasures for the key attack-lifecycle phases.

1:00pm – 2:10pm

Lunch and Networking in the Sponsor Pavilion

2:10pm – 2:25pm

"Leadership Challenges"

In this interactive session with attendees, discussion will focus on what is top of mind in terms of challenges the industry is facing.

2:25pm – 2:35pm

"Cloud Access Security Brokers in the Wild"

boda.jpg
Scott Boda
Solutions Engineer
Bitglass, Silver Sponsor
What do a Fortune 100 pharmaceutical company, one of the largest hospital systems in the US, and a bank with several trillion in assets have in common? All three have successfully deployed Cloud Access Security Brokers to meet their security and compliance goals when adopting public cloud apps like Office 365, AWS and Salesforce. This rapid-fire, 10 minute session will share their learning in the form of actionable advice that you can bring to your organization immediately.
2:35pm – 3:25pm

Executive Roundtable Discussions Rotation 1

Topic 1: "A Billion IoT Devices…Security’s Daunting Task"
belov.png
Nick Belov
Chief Information Security Officer
Computer Generated Solutions, Inc.
Bio
Expand Topic
Topic 2: “Creating a High-Performing Information Risk Management Program”
chernow.png
Lynne Chernow
Executive Consultant
Fordham University
Bio
Expand Topic
Topic 3: “Maturing the Discussions with the Board on Cyber Risk”
gallagher.png
Ellen Gallagher
VP, Information Systems Audit Group
PVH Corporation
Bio
Expand Topic
Topic 4: “Data Protection Strategies – Beyond the Traditional”
whiting.png

John Whiting
Global Chief Information
Security Officer
DDB Worldwide Communications Group Inc.

Bio
Expand Topic
Topic 5: “Adaptive Security – Innovating for the Future”
timbol.png

Richard Timbol
Chief Information Security Officer
Davis, Polk & Wardwell

Bio
Expand Topic
Topic 6“Employee Knowledge – The Facts of Security
nevias.png
Kevin Nevias
Director, Group Information Office
UBS Financial Services
Bio
Expand Topic
3:35pm – 3:50pm
Break and Networking in the Sponsor Pavilion
3:50pm – 4:40pm

Executive Roundtable Discussions Rotation 2 with Debrief

4:40pm – 4:45pm
Closing Remarks
4:45pm – 5:45pm
Reception and Networking with Prize Drawings