7:15am – 8:30am
8:50am – 9:25am
The cyber security industry is facing an unprecedented amount of risks and threats today and as it looks to the future. Leadership teams understand that the digital transformation organizations are going through require more than ever the strengthening of business resilience, as evidenced lately in the news.
In this opening session, Richard Warner will delve into the latest news and the impact being felt by businesses around the world. Richard is in his 29th year as host and managing editor of Georgia's Business, a weekly series that airs on nine PBS stations throughout Georgia, has been a syndicated business and marketing commentator on more than 250 radio stations across the U.S. and has interviewed more than 500 CEOs one-on-one including the heads of UPS, Delta, Citi, Turner Broadcasting, AFLAC and Equifax on what are their most pressing issues.
9:25am – 10:00am
In this interview session, Keith Donnelly will discuss:
• The new roles and responsibilities they are taking on and their impact to their organizations
• How they are managing legacy responsibilities as the processes mature
• Looking into the future, what new roles/responsibilities do they think they will be taking on or want to take on.
With over 10,000 employees, Broadridge Financial Solutions, Inc. is a US servicing company for the financial industry founded in 2007 as a spin-off from Automatic Data Processing (ADP). The main fields of work are in securities processing, clearing and investor communication.
10:00am – 10:30am
Cloud adoption is not a question anymore -- it’s happening and it’s driving value into business like never before. Enterprises want to enable frictionless IT and provide the best user experience for their employees, but need to do it in tandem with securing their data, users and assets –and without additional IT burden. As organizations gain greater visibility into cloud usage and shadow IT, how are policies best enforced? In this session, we will explore how hybrid and cloud-first organizations can have the best of both worlds, and the role of CISOs and CIOs working together to make this a reality.
10:30am – 11:10am
11:10am – 11:30am
As security continues to evolve at a torrid pace, organizations are seeking answers to help remove complexity and to provide the ability to better understand the threat landscape. This session will focus on insights into what executives are thinking in terms of bringing innovation into their organizations.
11:30am – 11:50am
Transformation’s Impact on CIOs and CISOs
Transformation is forcing an evolution of the IT C-suite. The demands of digital business and IT transformation are forcing IT leaders to evolve in order to stay relevant. Mindset and focus need to shift to enablement, growth and risk.
11:50am – 12:20pm
Director of Network and Computer Security
In this interview session, Joel Rosenblatt, Director of Network and Computer Security at Columbia University will discuss how his organization is facing the “knowns” of cyber security threats and also how he is looking towards the future as he builds his strategies for the “unknowns.”
With close to 30,000 students and 4.000 staff members, Columbia University, established in 1754, is a private Ivy League research university in Upper Manhattan, New York City, often cited as one of the world's most prestigious universities.
12:20pm - 12:30pm
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network - before they turn into a full-blown crisis.
Based on unsupervised machine learning and probabilistic mathematics developed by specialists from the University of Cambridge, new ‘immune system’ technologies are capable of learning the ‘self’ of an organization. By analyzing every network, device, and user, and modeling them as they go about their day-to-day activity, the Enterprise Immune System can establish a highly accurate understanding of normal behavior. It can therefore spot abnormal activity as it emerges, and even take precise, measured actions to automatically curb the threat.
Rules and signatures are not keeping pace with today’s rapidly evolving cyber attacks. The Enterprise Immune System represents a fundamental step-change in automated cyber defense, is relied upon by organizations around the world, and can cover up to millions of devices.
The insights in this presentation will focus on:
12:30pm – 1:40pm
Why Audit Teams are Turning Towards Collaborative Solutions Combining Data Segregation and a Forensic Chain of Custody
This session will bring to light many of the latest trends, the drivers behind these trends and expected impact to organizations.
Executive Roundtable Discussions – Rotation #1
Two Rotations with Break and Discussion Debriefs at End of 2nd Rotation.
Breakout sessions with your peers on topics determined by attendees during registration. Topics are facilitated by CISOs from across area.
Break and Networking in the Sponsor Pavilion
3:35pm – 4:30pm
Executive Roundtable Discussions – Rotation #2
Discussion Debriefs at End of 2nd Rotation.