NEW YORK SPRING 2018 AGENDA
9:30am – 10:00am
Keynote -“The Business Side of Defending Businesses"
Jay Leek, Managing Director of ClearSky, and previous CISO of Blackstone, will provide insights into the shifts he is seeing in information security, critical factors that will poise companies for success in the future, and what it will take to get there. ClearSky is a venture capital/growth equity firm investing in innovative companies providing technology and services to enterprise customers, with a special focus on the power sector, and companies that offer transformative solutions for cybersecurity, industrial security and critical infrastructure security.
10:00am – 10:25am
Guiding Information Security into the Future
This interview session with focus on key skills needed, what will set security leaders apart, and what the plan is to overcome some of the biggest challenges facing the industry in the future.
10:25am – 10:55am
Applying Machine Language to Wiredata in the SOC
Machine learning is a powerful tool, but using it effectively in the Security Operations Center can be a challenge. Jeff will talk about effective strategies for using ML, including applying these techniques to network traffic and the associated workflows.
10:55am – 11:30am
11:30am – 11:50am
The Breach Anxiety in Information Security
The unknown in information security is any CISO’s worst nightmare. Despite best efforts, security breaches continue to go undetected. This interview session, with Jim Wilson, CISO of FAIR Health, and other security executives, will shed light on best practices as they move forward to address people, processes and technology to shore up defenses.
11:50am – 12:10pm
The new Security Frontier: Threat Hunting, Augmented Intelligence, and Automated Response
New methods are required to address threats increasing in frequency, sophistication, and impact, in an increasing climate of cost constraints, and resource and skills shortage. Traditional security controls and response can’t possibly keep pace.
Private and State sponsored dark web actors are well orchestrated, using innovative AI technologies, leveraging Digital Currencies, their R&D producing wares designed to circumvent traditional security practices have changed the game. You now require innovative security approaches.
The art of effective Threat Hunting, Advanced Analytics, Incident Response, and the value of Cognitive Security are the new frontier.
Learn how to determine threats before your fences are tested, investigate non-obvious related offenses, obtain near-real-time insight and effectively trigger incident response as a single strategy.
12:25pm – 12:45pm
Times are changing: data breaches are more frequent and damaging, and the regulations (like GDPR) that help combat them carry both great requirements and consequences. Without identity governance, your IT security is siloed, reactive and ineffective. With a growing number of users, apps and data, identity becomes the new control plane that empowers your organization’s security.
1:55pm – 2:25pm
From a beginning years ago as techies, to now a savvy group of seasoned business executives, security leaders are now at the forefront of their organizations. This session focuses on some of the latest thought leadership on problem solving as the current information security landscape becomes more diverse and complex.
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and respond to these threats that are already inside the network - before they turn into a full-blown crisis. Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.
Discover why autonomous response and machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.
Interactive polling session with executives discussing where their concerns are as they look at the state of the industry.
Six Reasons to Put Privilege First
Privileged accounts represent the gateway to an organization’s most valuable assets. That’s why cyber attackers covet them and it’s also why nearly all serious security breaches involve privileged accounts that attackers acquire, compromise and exploit. This session will highlight best practices and quick wins.
Breakout Executive Roundtable Discussions –With Debriefs
Breakout sessions with your peers on topics determined by attendees during registration.
Expanded peer discussion topics provided on-site via the Executive Alliance AttendeeHub app with roundtable transcripts and answers provided via code to attendees after the summit.
Topic #1 - Operational Resilience
Director, Risk & Compliance
In order for organizations – private or public – to fully recover from an incident, they must move away from the siloed approach of having separate programs for Crisis Management, Information Security, Business Continuity, etc. to an umbrella program that focuses on the organizations overall risks related to operational continuity.
Topic #2: GDPR
CTO and CISO
Third Avenue Management
The regulation will become enforceable on May 25th, 2018.
Topic #3: Blockchain
The amazing technology that burst Bitcoin (BTC/BTH) and the newly sustaining Ethereum (ETH/ETC) onto the scene…It is used in financial management services, logistics management, medical records, etc. Can a transaction be securely verified without the identity of the user being captured?
Topic #4: Biometric Technologies
Chief Information Security Officer
Educational Testing Service
There are big implications for security and privacy as this technology emerges, with relevance in user verification, marketing, and personalized advertising, as examples.
Topic #5: Developing Top Talent
Chief Information Security Officer
Wachtell, Lipton, Rosen & Katz
There is nothing more reassuring than having a top-notch team that has your back. But, finding, hiring, and retaining top cybersecurity talent is one of the biggest challenges for all security organizations. As today’s security environment will most likely become even more complex in the future, how are you approaching hiring the right talent who can positively impact your organization?
Topic #6: Measuring Security as a Business Value
Director of Information Security
Quantifying and proving the value of security to your CEO and business units is difficult.
Topic #7 - Data Protection Strategies – Beyond the Traditional
William (Bill) Bailey
VP of Information Security
Police and Fire Federal Credit Union
Reception and Networking with Prize Drawings