NewYorkSpring_2018_banner.png

 

NEW YORK SPRING 2018 AGENDA

8:00am – 9:15am

9:15am – 9:30am
Registration Opens with a Breakfast Buffet and Networking in the Sponsor Pavilion

Welcome and Opening Remarks

heastings.jpg
Mary Lou Heastings
CEO
Executive Alliance Inc.
Bio
Richard-Warner.png
Richard Warner 
Television and Radio Host
Summit Moderator
Bio

9:30am – 10:00am 

Keynote -“The Business Side of Defending Businesses"

leek.png

Jay Leek

Managing Director

ClearSky

Bio

Jay Leek, Managing Director of ClearSky, and previous CISO of Blackstone, will provide insights into the shifts he is seeing in information security, critical factors that will poise companies for success in the future, and what it will take to get there.  ClearSky is a venture capital/growth equity firm investing in innovative companies providing technology and services to enterprise customers, with a special focus on the power sector, and companies that offer transformative solutions for cybersecurity, industrial security and critical infrastructure security.

10:00am – 10:25am 

Guiding Information Security into the Future

donnelly@0,5x.png

Keith Donnelly

VP, Global Head of Risk & Compliance

Broadridge

Bio

This interview session with focus on key skills needed, what will set security leaders apart, and what the plan is to overcome some of the biggest challenges facing the industry in the future.

 

10:25am – 10:55am

Applying Machine Language to Wiredata in the SOC

costlow.png

Jeff Costlow

Director of Security

ExtraHop Networks, Platinum Sponsor

Bio

Machine learning is a powerful tool, but using it effectively in the Security Operations Center can be a challenge. Jeff will talk about effective strategies for using ML, including applying these techniques to network traffic and the associated workflows.

10:55am – 11:30am

Break and Networking in the Sponsor Pavilion

11:30am – 11:50am 

The Breach Anxiety in Information Security

wilson.png

Jim Wilson

Chief Information Security Officer

FAIR Health

Bio

The unknown in information security is any CISO’s worst nightmare. Despite best efforts, security breaches continue to go undetected.  This interview session, with Jim Wilson, CISO of FAIR Health, and other security executives, will shed light on best practices as they move forward to address people, processes and technology to shore up defenses.

11:50am – 12:10pm 

The new Security Frontier: Threat Hunting, Augmented Intelligence, and Automated Response

melore.png
Michael Melore
Cyber Security Architect
IBM, Gold Sponsor

New methods are required to address threats increasing in frequency, sophistication, and impact, in an increasing climate of cost constraints, and resource and skills shortage.  Traditional security controls and response can’t possibly keep pace.  
Private and State sponsored dark web actors are well orchestrated, using innovative AI technologies, leveraging Digital Currencies, their R&D producing wares designed to circumvent traditional security practices have changed the game.  You now require innovative security approaches.

The art of effective Threat Hunting, Advanced Analytics, Incident Response, and the value of Cognitive Security are the new frontier.
Learn how to determine threats before your fences are tested, investigate non-obvious related offenses, obtain near-real-time insight and effectively trigger incident response as a single strategy.

12:10pm – 12:25pm

Top of Mind

Interactive polling session with executives discussing some of their top issues of the day and how their industry peers respond.

12:25pm – 12:45pm 

Identity is Security

Weinberg.png

Rick Weinberg

Vice President of Product Management

SailPoint, Gold Sponsor
Bio

Times are changing: data breaches are more frequent and damaging, and the regulations (like GDPR) that help combat them carry both great requirements and consequences. Without identity governance, your IT security is siloed, reactive and ineffective. With a growing number of users, apps and data, identity becomes the new control plane that empowers your organization’s security.

12:45pm – 1:55pm

Lunch and Networking

1:55pm – 2:25pm

The Shift in Information Security

paige.png

Tyrone Paige

General Manager IT

Enterprise Infrastructure Architecture, IT Security

JetBlue Airways

From a beginning years ago as techies, to now a savvy group of seasoned business executives, security leaders are now at the forefront of their organizations.  This session focuses on some of the latest thought leadership on problem solving as the current information security landscape becomes more diverse and complex.

 

2:25pm– 2:35pm

Autonomous Cyber Defense: AI and the Immune System Approach

moore.png

Kathryn Moore

Cyber Security Account Manager

DarkTrace, Silver Sponsor

Bio

From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and respond to these threats that are already inside the network - before they turn into a full-blown crisis. Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat. 

Discover why autonomous response and machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.

  • How new machine learning and mathematics are automating advanced cyber defense
  • Why full network visibility allows you to detect and autonomously respond to threats
  • How smart prioritization and visualization of threats allows for better resource allocation and lower risk
  • Real-world examples of unknown threats detected by ‘immune system’ technology
2:35pm – 2:45pm

What’s Next?

Interactive polling session with executives discussing where their concerns are as they look at the state of the industry.

2:45pm – 2:55pm 

Six Reasons to Put Privilege First

tarr.png

Matt Tarr

Principal Solutions Engineer

CyberArk, Silver Sponsor

Bio

Privileged accounts represent the gateway to an organization’s most valuable assets. That’s why cyber attackers covet them and it’s also why nearly all serious security breaches involve privileged accounts that attackers acquire, compromise and exploit. This session will highlight best practices and quick wins.

2:55pm – 3:25pm 
Afternoon Break
3:25pm – 4:35pm 

Breakout Executive Roundtable Discussions –With Debriefs

Breakout sessions with your peers on topics determined by attendees during registration.

Expanded peer discussion topics provided on-site via the Executive Alliance AttendeeHub app with roundtable transcripts and answers provided via code to attendees after the summit.

shady

Topic #1 - Operational Resilience

Moderated by:

Amal Shady

Director, Risk & Compliance 

McGraw-Hill Education 

Bio

In order for organizations – private or public – to fully recover from an incident, they must move away from the siloed approach of having separate programs for Crisis Management, Information Security, Business Continuity, etc. to an umbrella program that focuses on the organizations overall risks related to operational continuity. 

 

dell

Topic #2: GDPR

Moderated by:

Joseph Dell

CTO and CISO

Third Avenue Management

The regulation will become enforceable on May 25th, 2018. 

 

blank

Topic #3: Blockchain

The amazing technology that burst Bitcoin (BTC/BTH) and the newly sustaining Ethereum (ETH/ETC) onto the scene…It is used in financial management services, logistics management, medical records, etc. Can a transaction be securely verified without the identity of the user being captured?

 

Moran

Topic #4: Biometric Technologies

Moderated by:

Jim Moran

Chief Information Security Officer

Educational Testing Service

Bio

There are big implications for security and privacy as this technology emerges, with relevance in user verification, marketing, and personalized advertising, as examples. 

 

samimy

Topic #5:  Developing Top Talent

Moderated by:

Majgan Samimy

Chief Information Security Officer

Wachtell, Lipton, Rosen & Katz

Bio

There is nothing more reassuring than having a top-notch team that has your back.  But, finding, hiring, and retaining top cybersecurity talent is one of the biggest challenges for all security organizations.  As today’s security environment will most likely become even more complex in the future, how are you approaching hiring the right talent who can positively impact your organization?

gordon

Topic #6: Measuring Security as a Business Value

Moderated by:

Todd Gordon

Director of Information Security

EisnerAmper LLP

Bio

Quantifying and proving the value of security to your CEO and business units is difficult.

bailey

Topic #7 - Data Protection Strategies – Beyond the Traditional

Moderated by:

William (Bill) Bailey

VP of Information Security

Police and Fire Federal Credit Union

Bio
While organizations have long needed to safeguard intellectual property and confidential information, changes in information technology and business models have introduced new actors, new threats, and new regulations. Organizations now think beyond traditional protection methodologies and work towards formulating data protection strategies that focus on preparation for the future
4:35pm – 4:45pm 

Closing Remarks

4:45pm –5:45pm 

Reception and Networking with Prize Drawings