Over the past year, technology and the IoT has exploded - and security challenges are only becoming more fluid. For organizations to stay at the apex, collaboration with the best minds in the space and a future-forward mindset is more important than ever. The 2018 Summit Topics are developed with CIOs, CISOs and executives and provide a tremendous amount of value to those who are looking to understand best practices in IT. The peer-to-peer Executive Roundtable Sessions have proven to be an exceptional resource for executives- providing real answers to issues facing their organizations and the industry.
9:00am – 9:30am
State of the Industry
Managing Director - Technology and Business Transformation Services
9:30am – 9:50am
Guiding Information Security into the Future
With a career that has spanned two decades as CISO at global Fortune 500 corporations, engineering and data management firms, Lee Parrish with Blucora will focus on key skills needed, what will set CISOs apart, and how he and his peers plan to overcome some of the biggest challenges facing the industry in the future.
9:50am – 10:20am
Complete Lifecycle Approach to Advanced Threat Protection
Due to the inevitability of advanced targeted attacks that fly under the radar of traditional, preventative-based security technologies, there is a shift toward a more modern defense-in-depth strategy—one that provides the intelligence, context, and real-time situational awareness needed to detect today's advanced threats. This defense is the first to integrate a business process view that aligns with how your security team operationalizes new intelligence and technologies to fortify your security infrastructure against future attacks. This session will provide insights into how this approach will empower your organization, enabling you to adopt the best new technologies that drive your business.
10:20am – 11:00am
Morning Break - Powered by
11:20am – 11:40am
Cloud Security: The Art of Securing the Perimeter When There's No Perimeter.
Securing the cloud is more challenging than securing an on-premise infrastructure. How do you secure what you don't own? How do you secure external services your business users may be subscribing to without your knowledge and authorization? How do you maintain compliance when multi cloud providers are part of your ecosystem? Who owns the security responsibility for different services offered? This session will focus on effective security approaches to these variables.
11:40am – 12:00pm
From a beginning years ago as techies, to now a savvy group of seasoned business executives, security leaders are now at the forefront of their organizations. This CISO discussion focuses on some of the latest thought leadership on problem solving as the current information security landscape becomes more diverse and complex.
12:00pm – 12:20pm
Cyber-attacks continue to increase in volume and sophistication. As a result, data breaches are no longer surprising or even news worthy. It’s not a matter of if, but a matter of when you will be successfully breached. This session will provide a comprehensive view of how privileges, passwords, and vulnerabilities are being leveraged as attack vectors and how you can properly take measurable steps to defend against them.
12:20pm – 1:30m
Interactive polling session with executives discussing where their concerns are as they look at the state of the industry.
Your Bank’s Digital Side Door
Distinguished Research Fellow at The Ponemon Institute
Co-founder and Chairman of OnBoard Security, Inc.
President and CEO of Security Innovation, Inc.
Why does my bank’s website require multi-factor authentication but my money management software does not? How are they communicating with each other? These questions led to a deeply disturbing exploration of the 20 year old Open Financial Exchange (OFX) protocol and the 3000+ North American banks that support it. 30 different implementations running in the wild amount to an inviting attack surface — a digital side door into millions of consumers’ privacy and personal savings.
Senior Director & Evangelist
Topic #1: Blockchain
The amazing technology that burst Bitcoin (BTC/BTH) and the newly sustaining Ethereum (ETH/ETC) onto the scene! It is used in financial management services, logistics management, medical records, etc.
Can a transaction be securely verified without the identity of the user being captured?
Head of Security Team
Topic #2: Measuring Security as a Business Value
Quantifying and proving the value of security to your CEO and business units still proves to be difficult. How are security organizations being successful in showcasing their strategies and underlying results?
Vice President, Information Security Officer
Topic #3: “Security Awareness Investment…is it Worth it?
Increased spending on security awareness training for employees is expected to still continue at a fast rate. The question often being asked by senior management is “how much value are we getting in return for the amount of spend?”
Director, Information Security
Topic #4: Cyber Risk Discussions at the Board Level
As information on the challenges surrounding information security continues to gain traction with senior business leaders, security organizations need timely and actionable data to help reduce their company’s risk profile. Discussions being held at board levels have moved to a more mature conversation with the focus on risk and its impact to a company’s brand, customer and revenues.
Director, Information Security
Topic #5: Information Risk Management Programs – Getting It Right
Cyber security readiness continues to evolve at a rapid pace as changes in the threat landscape forces organizations to be more vigilant than ever before. In turn, the evaluation and prioritization of risk has taken on more importance to the business in order to make the right decisions.