NYS-2019-homempage

The Security Leaders Summit - New York Spring 2019

Where Industry Leaders Shape the Future

The evolution of infosec was on full display at New York Spring 2019, with an array of executives providing insight into the future and strategies for challenges faced today. Executive roundtables were lively and spirited debates ensued- and the executive summaries were full of timely answers gleaned from leaders in the industry. Thank you to all of the exemplary speakers and attendees, as well as our strategic partners that brought future focus and made it a great day! Check out the gallery and remember to download the whitepapers and presentations.

Summit Recap

ITL_2066

Keynote - "The High Stakes of Security" 

Richard Warner revealed the statistics that were conglomerated from industry leading whitepapers and illustrated the takeaways gleaned from the research. If there is anything that unifies CISOs, change is the one constant. The focus is on the rapid evolution of the security industry, the rising tide of visibility on security organizations, and the high stakes at play in terms of cyber threats. You can download the summary here: The High Stakes of Security

 

Layer 24

Innovating for the Future

Josh Walfish, with Deutsche Bank, shared his insights into some of the significant technologies he believes will help the industry in the future, the challenges ahead and where he expects to see some quick wins.

 

Layer 1-10

 Network Data: Powering the Modern SOC

Chris Lehman, Senior Vice President of Worldwide Sales and Channel at ExtraHop, delved into how attackers can hide and misuse logs, agents and standard security tools, then demonstrated effective approaches for countering their actions using network traffic analysis, passive monitoring, and real-time forensic data.

 

Layer 25

Take a Break!  Coffee and Networking with Your Peers
Summit attendees had the opportunity during the morning break to continue the discussions.

 

Layer 5

Cybersecurity Incident Response and Privacy Challenges Beyond the Headlines

 Judith Germano,  Founder, Germano Law LLC and Professor/Distinguished Fellow, NYU Center for Cybersecurity; Adjunct Professor, NYU School of Law spoke on the nuances, challenges and trends pertaining to cybersecurity incident response and privacy challenges and provided a fresh perspective beyond the headlines- as well as best practices, helpful takeaways and potential solutions. 

 

Layer 8

Browsers – The Ultimate Attack Surface 

Lior Dolphin, Director, Innovative Technologies at Symantec, spoke about Web isolation and how browser-based attacks are the primary vector leveraged by attackers to gain access to corporate networks.

 

ITL_2240

The X Factor in an “A” Team
Melissa Murphy, Head of U.S. Regulatory Technology for Scotiabank, shared her insights into the traits that make up “A” team members, why they are great problem solvers, and how to keep these employees motivated and challenged.  

 

Layer 10

Security Around Your Cloud Challenges 

Chip Crane, Cloud and CyberSecurity Executive at IBM, focused on addressing the problem of public cloud security and spoke about ways to help organizations confidently take advantage of the benefits of cloud for their business transformation initiatives.

 

20190509_141113-1

What’s Next?

This Interactive polling session with executives in attendance. focuses on priorities, execution and adding value.

 

Layer 11

 IAM Governance for Cloud Adoption

Charlie Jacco, Principal, Cyber Security Services at KPMG shared insights into how to protect and enable your business with a holistic approach to risk and governance. 

 

Layer 13

Lunch and Networking 

 

Layer 14

Six Major Trends Affecting the Future of Cybersecurity

Winston Lalgee, Strategic Accounts for Check Point Software, focused on some of the key trends they believe will impact the future of cybersecurity.

 

Layer 19

Spotlight: The Future Disruptors

Byron Arnao from CapitalOne, Lynne Chernow form Fordham University, Diana Balan from JP Morgan and Tyrone Paige from Azure provided potential answers to some of today’s toughest challenges for a security organization?

 

Layer 20

Enabling Organizations and Technology 

Mike Liska, Regional Sales Manager at Okta highlighted ways to keep pace with the rate of innovation by enabling you to connect any user to any technology, anywhere.

 

Layer 3

Break and Networking

 

Layer 23

Executive Roundtable Discussions

Facilitated by executives from a diversity of industries across seven different topics, the highly rated Executive Roundtables wrapped up the Summit session.

Executives facilitating the roundtables included:

RT Hosts

Topic #1: “Developing Talent for the Future” Diana Balan, Vice President, Global Privacy, JPMorgan Chase


Topic #2: The Zero Trust Security Model - Jim Moran, Chief Information Security Officer, Educational Testing Services

Topic #3: Security Analytics & Threat Intelligence - Nick Viviano, VP, Infrastructure Risk Management, AllianceBernstein

Topic #4: Measuring Security as a Business Value - Christine Whalley, Director, Information Security, Barnard College

 

ITL_2411

ITL_2421

Reception and Networking with Prize Drawings

Executive Alliance, our strategic partners and the New York Spring attendees closed out the summit with laughs and new friendships. Thanks to everyone for a terrific NYS 2019 and stay tuned for details for the upcoming summits and National Symposium!

 

Thank You to our 2019 New York Spring Summit Sponsors

 

ITL_2154

Platinum Sponsor

ExtraHop

ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out. Our breakthrough approach analyzes all network interactions and applies advanced machine learning for complete visibility, real-time detection, and guided investigation. With this approach, we help the world’s leading enterprises including Hasbro, Credit Suisse, Caesars Entertainment, and British Airways to rise above the noise of alerts, organizational silos, and runaway technology. Whether you’re investigating threats, ensuring delivery of critical applications, or securing your investment in cloud, ExtraHop helps you protect and accelerate your business.

For more information, please visit www.extrahop.com or contact Jeff Haber @ haber@extrahop.com or Kevin Cochran at kevinc@extrahop.com

ExtraHop Revealx Datasheet

 

ITL_2159

Platinum Sponsor

Symantec

Symantec Corporation (NASDAQ: SYMC), the world's leading cyber security company, helps organizations, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec's Norton and LifeLock product suites to protect their digital lives at home and across their devices. Symantec operates one of the world's largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visit www.symantec.com or connect with us on FacebookTwitter, and LinkedIn

 

ITL_2178

Gold Sponsor

CyberArk

CyberArk is the global leader in privileged access security, a critical layer of IT security to protect data, infrastructure and assets across the enterprise, in the cloud and throughout the DevOps pipeline. CyberArk delivers the industry’s most complete solution to reduce risk created by privileged credentials and secrets. The company is trusted by the world’s leading organizations, including more than 50 percent of the Fortune 500, to protect against external attackers and malicious insiders.

 Want to learn more about us? Visit our website, learn more about Privileged Access Security, or request a demo of our solution.

 A PAM solution secures more than just passwords. See below for further reading material:

 WP Summary: Risk Mitigation ROI: Building a Business Case for Cybersecurity Solutions

e-book: The Age of Digital Transformation: 5 Keys to Securing Your Business Critical Applications

Analyst reports, naming CyberArk as the leader:

Gartner 2018 Magic Quadrant for Privileged Access Management

2018 Forrester WaveTM for Privileged Identity Management

KuppingerCole Analysts 2019 Leadership Compass: Privileged Access Management

 

ITL_2185

Gold Sponsor

IBM 

Cybercriminals are growing in number and sophistication, rendering traditional solutions powerless against today’s advanced threat actors. IBM Security, with ~8,00 security professionals worldwide, helps more than 12,000 clients address their most critical needs: implementing a risk-based security strategy; threat management; and enabling digital trust.

Over the past decade, IBM has invested more than $2 billion in security research and development, resulting in 3,700+ security-related patents, and acquired 19 security companies to grow its portfolio. Today, IBM Security delivers next-generation security technology and services, including artificial intelligence, orchestrated incident response, cloud-based solution, and state-of-the-art security operations centers. For more information, please visit ibm.com/security

 

Layer 1

Gold Sponsor

KPMG

  • Businesses turn to KPMG for a better understanding of market dynamics. They know that our advisory professionals work with many of the world's leading organizations to help them improve business performance, leverage IT investments, protect financial assets, manage risk, and boost market confidence. 

    For more information, please visit www.home.kpmg.com

Gold Sponsor

SailPoint

  • SailPoint, the leader in enterprise identity management, brings the Power of Identity to customers around the world. SailPoint’s open identity platform gives organizations the power to enter new markets, scale their workforces, embrace new technologies, innovate faster and compete on a global basis. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments. 

    Sailpoint Identity is Security

    Read what your peers are saying about:

    • The benefits of self-service access to systems, applications and data
    • Protection against cyberattacks with strong identity management
    • The connection between identity governance and compliance
    • How their c-suite sees the role of identity governance evolving in the future

    To learn more about SailPoint, please visit www.sailpoint.com or contact Kristie Carney,
    kristie.carney@sailpoint.com


IMG_3701

Silver Sponsor

Check Point Software Technologies

Check Point Software Technologies Ltd. is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers a multilevel security architecture that defends enterprises’ cloud, network and mobile device held information, plus the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.

or more information, visit www.checkpoint.com

 

IMG_3726

Silver Sponsor

Okta

Okta is the leading provider of identity for the enterprise. The Okta Identity Cloud connects and protects employees of many of the world's largest enterprises. It also securely connects enterprises to their partners, suppliers and customers. With deep integrations to over 5,000 apps, the Okta Identity Cloud enables simple and secure access from any device. Thousands of customers, including Experian, 20th Century Fox, LinkedIn, Flex, News Corp, Dish Networks and Adobe trust Okta to work faster, boost revenue and stay secure. Okta helps customers fulfil their missions faster by making it safe and easy to use the technologies they need to do their most significant work.

For more information, visit www.okta.com

 

ITL_2161

Bronze Sponsor

BeyondTrust

BeyondTrust helps companies defend against threats related to stolen credentials, misused privileges, and unwanted remote access, while empowering people. 

Our privileged access management platform offers the broadest set of capabilities to:

  • Discover, manage, audit, and monitor privileged accounts of all types
  • Remove excessive end user privileges on Windows, Mac, Unix, Linux and network devices
  • Secure, manage, and audit vendor and internal remote privileged access, and access and support remote systems
  • Identify, prioritize, and remediate vulnerabilities and inform privilege decisions with risk insights
  • Audit, report, and recover changes across Microsoft Windows platforms

This approach has been recognized by top analysts from Gartner and BeyondTrust is trusted by more than 20,000 customers worldwide, including over half of the Fortune 100.

If you have an upcoming project or are currently evaluating PAM solutions, please contact Rich Pace at rpace@beyondtrust.com.

 

ITL_2172

 Bronze Sponsor

Duo Security

 

Duo Security, now part of Cisco, is the leading provider of Trusted Access security and multi-factor authentication. Duo's zero-trust security platform, Duo Beyond, enables organizations to provide trusted access to all of their critical applications - for any user, from anywhere, and with any device. Duo is a trusted partner to more than 14,000 customers globally, including Dresser-Rand, Etsy, Facebook, Paramount Pictures, Random House, Zillow and more. Founded in Ann Arbor, Michigan, Duo has offices in growing hubs in Detroit; Austin, Texas; San Mateo, California; and London.

Sign up for a free trial of Duo here:  Start a free trial today.
To learn more, check out Why two-factor authentication?
Or visit us at: www.duo.com

Beyond the Perimeter - Duo Security 2019

 

 

IMG_3742

Bronze Sponsor

Gigamon

Gigamon is leading the convergence of networking and security operations to help organizations reduce complexity and increase efficiency of their security stack. Our GigaSECURE® Security Delivery Platform is a next-generation network packet broker that helps customers make threats more visible across cloud, hybrid and on-premises environments, deploy resources faster and maximize the performance of their security tools.

Global 5000 companies and government agencies rely on Gigamon solutions to make them more agile and cut costs. 

For more information, visit www.gigamon.com

 

ITL_2156

Bronze Sponsor

Venafi

Venafi is the cyber security market leader in machine identity protection, securing machine-to-machine connections and communications. Venafi protects machine identity types by orchestrating cryptographic keys and digital certificates for SSL/TLS, IoT, mobile and SSH. Venafi provides global visibility of machine identities and the risks associated with them for the extended enterprise – on premises, mobile, virtual, cloud and IoT – at machine speed and scale. Venafi puts this intelligence into action with automated remediation that reduces the security and availability risks connected with weak or compromised machine identities while safeguarding the flow of information to trusted machines and preventing communication with machines that are not trusted.

With 31 patents currently in its portfolio, Venafi delivers innovative solutions for the world's most demanding, security-conscious Global 5000 organizations, including the top five U.S. health insurers; the top five U.S. airlines; four of the top five U.S., U.K., Australian and South African banks; and four of the top five U.S. retailers. Venafi is backed by top-tier investors, including TCV, Foundation Capital, Intel Capital, QuestMark Partners, Mercato Partners and NextEquity.

For more information visit: www.venafi.com and visit our Resource Center at: https://www.venafi.com/resource-center

 

Thanks again to all of our attendees and partners! Next stop, New York City September 12th!

 

2019 SPONSORS

NYS_-2019-_sponsors