The Host Dinner was held the evening before the Summit, on 3/15 for the Summit Hosts, Platinum and Gold Sponsors, and invited guests to enjoy getting to know each other in advance of the Summit.
The Security Leaders Summit opened up with networking and breakfast in the Sponsor Pavilion and Welcome Remarks by Mary Lou Heastings, CEO of Executive Alliance and Richard Warner, Summit Moderator.
The Summit kicked off with Keynote speaker Tom Fuhrman, head of the Cybersecurity Consulting and Advisory Services Practice at Marsh, presenting on the findings from the World Economic Forum held in Davos, and sharing insights into key global risks, specific to cybersecurity and disruptive technologies. One of the areas Tom brought to light is how societal institutions are gearing up (Bend Influencers), how they have been growing steadily and are now starting to have recognizable impact.
Lou Briscoe, Former VP and Head of Information Security at Thomson Reuters, spoke during the interview session on some of the innovative strategies he has deployed, what he believes are the industry’s most vulnerable areas in terms of the “known” threat landscape and the challenges he still sees facing the industry in terms of defending against the “unknowns.”
In this presentation Marty Weiss with Symantec, Platinum Sponsor, discussed the critical question on how organizations are going to ensure that employees make appropriate use of and interact safely with applications from cloud service providers. Marty shared insights into cloud governance, visibility and control while leveraging the cloud.
During the morning break, there was high energy as attendees had the chance to talk with their peers and meet with sponsors to discuss their products and services.
In this interview session Keith Donnelly, VP, Global Head of Risk and Compliance for Broadridge Financial Solutions and Marina Spyrou, SVP and Global Security & Risk Leader at Nielsen, shared insights into how they are building more effective strategies, increasing their ability to monitor global threats and trends, and their impact on infrastructure resiliency.
Andy Feit, Chief Marketing Officer at Accellion, Gold Sponsor, spoke on how enterprises can leave existing content where it lives today and extend it outside the firewall without having to migrate content or disrupt their business workflows.
Richard Warner, Summit Moderator, provided insights into some of the most innovative ways companies are working with their employees on building awareness of cyber security threats.
Michael Melore, Cyber Security Architect for IBM, Gold Sponsor, discussed how organizations are building layered defenses that have the ability to dynamically protect, defend, and respond against threats and incidents at various control layers.
Lynne Chernow, Executive Consultant with Fordham University, Julie Porro, Director of Information Security Risk at Deutsche Bank, Richard Timbol, CISO at Davis, Polk & Wardwell, and Marty Weiss, Executive at Symantec, shared what organizations are doing to be positioned for success in the future by having the right technologies in place. This discussion, while not focused on vendor specific products, provided insights into existing technologies that are viewed as being on the critical path to success and new technologies that have promise for the future.
The lunch break provided great opportunities for the conversations to continue from the morning sessions.
Always a highlight of the Summit, attendees had the opportunity in the afternoon to participate in roundtable discussions on a variety of different topics.
The Summit closed with an afternoon reception where attendees and sponsors had the chance to relax and have some fun.
Jim Aldridge, Director, with Tanium, Gold Sponsor, provided insights into the threat landscape, focusing on commonalities across threat classes. Based on his experiences as a penetration tester and incident responder, Jim outlined countermeasures for the key attack-lifecycle phases.
After lunch, Scott Boda, Solutions Engineer, with Bitglass, Silver Sponsor, spoke on “Cloud Access Security Brokers in the Wild.” Scott brought to light the different types of organization that have successfully deployed cloud access security brokers to meet security and compliance goals when adopting public cloud apps like Office 365, AWS and Salesforce.
Executives facilitating the discussions included: Nick Belov, CISO at Computer Generated Solutions, Inc., Lynne Chernow, Executive Consultant at Fordham University, Ellen Gallagher, VP, Information Systems Audit Group at PVH Corporation, Kevin Nevias, Director, Group Information Office at UBS Financial Services, Richard Timbol, CISO at Davis, Polk & Wardwell, and John Whiting, Global CISO at DDB Worldwide Communications Group Inc.
Be sure to visit the Gallery Tab with photos of the Summit.
Accellion, Inc. enables enterprise organizations to collaborate on content with external partners securely via private cloud. Enterprises can leave existing content where it lives today, and extend it outside the firewall without having to migrate content or disrupt their business workflows. Accellion’s solutions are used by more than 15 million users and 2,500 of the world’s leading corporations and government agencies including Procter & Gamble; KPMG; Kaiser Permanente; Latham & Watkins; National Park Service; Pacific Life Insurance; Cargill; and the National Institute for Standards and Technology (NIST). For more information please visit:
The volume of security incidents and available threat data far exceed the capacity of even the most skilled security professional. Over the past year, IBM Watson has been trained on the language of cybersecurity, ingesting over 1 million security documents. Watson can now help security analysts parse thousands of natural language research reports that have never before been accessible to modern security tools.
Watson for Cyber Security is integrated into IBM’s new Cognitive SOC platform, bringing together advanced cognitive technologies with security operations and providing the ability to respond to threats across endpoint, network, users and cloud. The centerpiece of this platform is IBM QRadar Advisor with Watson, a new app available in the IBM Security App Exchange, which is the first tool that taps into Watson’s corpus of cybersecurity insights
For More information, you can also visit us at: www.ibm.com/security
Tanium gives the world’s largest enterprises and government organizations the unique power to secure, control, and manage millions of endpoints across the enterprise within seconds. Serving as the “central nervous system” for enterprises, Tanium empowers security and IT operations teams to ask questions about the state of every endpoint across the enterprise in plain English, retrieve data on their current and historical state, and execute change as necessary, all within seconds. With the unprecedented speed, scale and simplicity of Tanium, organizations now have complete and accurate information on the state of endpoints at all times to more effectively protect against modern day threats and realize new levels of efficiency in IT operations. For more information, please visit www.tanium.com.
Bitglass, the total data protection company, is a global Cloud Access Security Broker and agentless mobile security company based in Silicon Valley. The company’s solutions enable real-time end-to-end data protection, from the cloud to the device. Bitglass is backed by Tier 1 investors and was founded in 2013 by a team of industry veterans with a proven track record of innovation and execution.
For additional information, visit www.bitglass.com or reach out to
Eric Rosenfeld at email@example.com
CloudPassage Halo® is the world’s leading agile security platform that empowers our customers to take full advantage of cloud infrastructure with the confidence that their critical business assets are protected. Halo delivers a comprehensive set of continuous security and compliance functions right where it counts — at the workload. Our platform orchestrates security on-demand, at any scale and works in any cloud or virtual infrastructure (private, public, hybrid or virtual data center).
Visit CloudPassage and learn more about our solution for Workload Protection: https://www.cloudpassage.com/solutions/workload-protection/
Visit www.cloudpassage.com or call (650) 485-4300.
Contact our team: Greg Stein, VP Sales, East Region (firstname.lastname@example.org) 908-693-5228,
Paul Kancylarz, Enterprise Sales Director, (email@example.com) 908-310-1570
or Steve Milanesi, Senior Enterprise Sales Director, (firstname.lastname@example.org) 415-806-5903
Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. Their SaaS cyber-security education solution includes an integrated platform containing broad assessments, a library of simulated attacks and brief interactive training modules, to reduce employee susceptibility to attack, even phishing attacks, up to 90%.
Security Awareness and Training with proven results. Read our Case Studies and Proofs of Concept. https://www.wombatsecurity.com/research-and-results/case-studies-proofs-of-concept
ZixCorp is a leader in email data protection. ZixCorp offers industry-leading email encryption, a unique email DLP solution and an innovative email BYOD solution to meet your company’s data protection and compliance needs. ZixCorp is trusted by the nation’s most influential institutions in healthcare, finance and government for easy to use secure email solutions. ZixCorp is publicly traded on the Nasdaq Global Market under the symbol ZIXI, and its headquarters are in Dallas, Texas.