ISE® Central Schedule of Events 2017

ISE® CENTRAL PRIVATE WELCOME DINNER
Best Practices for Detecting Insider Threats

May 16, 2017
5:30pm - 8:30pm
Chamberlain’s Steakhouse
5330 Belt Line Road
Dallas, TX 75254
Registration
harvey ewing

Harvey Ewing
CISO
G6 Hospitality LLC
Biography

People. They are an organization’s greatest asset - and greatest risk. Employees, contractors, remote workers and partners: they are inside your network, familiar with your systems and processes, and access to sensitive information is part of their daily job. Insider risks may be small actions that appear normal on the surface and occur over months and years, making them difficult or impossible to detect. And insider risk isn’t just about theft either. It includes abusing a position and access to sensitive information for unfair advantage or personal gain. Regardless of whether it’s theft, fraud or misuse of information, it’s risk. What can CISOs do about it? Existing tools are noisy and provide a siloed view: Organizations have multiple point tools in place that were purpose-built to solve a specific problem around data retention or anomaly detection, but were not purpose-built to assess insider risk in a holistic way. Join our conversation as we take a look at best practices on insider risk.

May 17, 2017

11:00 AM - 3:00 PM: Registration

Fort Worth Prefunction, 3rd floor

11:30 AM : ISE® Signature Luncheon *Invitation Only

Location: Fort Worth 1 – 3rd Floor

Sponsored by:

Building a World-Class Security Operations Center
As the volume and complexity of threats continues to rise, companies are challenged with managing security incidents more effectively. There are also a wealth of security products to learn and in many cases, security teams have too many alerts to investigate with limited staff. So what can executives do to enable a world-class SOC team? For starters, the team and their toolset need to be able to provide a comprehensive Incident Case Management system with SLA management, analyst assignments and metrics tracking. To help reduce the strain on SOC team members, full incident automation should also be enabled where appropriate and provide a clearly defined workflow via a playbook which analysts use to document the investigation. Finally, a SOC team should be able to empower an effective collaboration between analysts for Tier 2 and Tier 3 incident resolution. Join our conversation to learn more about the best practices, processes and methods you can implement to build a world-class SOC team of your own.

1:00 PM : Welcoming Remarks and Introductions

Location: Fort Worth 2 – 3rd Floor
Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

1:10 PM : Keynote Address

Location: Fort Worth 2 – 3rd Floor
Matt Fearin

Matt Fearin
SVP & CISO
Epsilon Data Management, LLC
Biography

CISO: The Realistic Futurist
As new threats abound and attackers continue to find new ways to disrupt security and business, CISOs must continue to grow as proactive innovators and team leaders. The modern CISO must find accord between balancing security strategy, tactical response, and innovation. Much like the threats they’re up against on a daily basis, CISOs must continue to grow and flourish in their roles as security leaders. Moreover, the skills and knowledge a successful CISO will need a year down the road might not necessarily align perfectly with what they know now. A CISO’s ability to effectively manage risk and establish trust is influenced heavily by their ability to balance the continuous reinvention of security programs, adapt to changes, and still remain focused on the here and now. Join Matt Fearin as he discusses what futurist-minded CISOs need to consider to succeed in the here and now as well as in the InfoSec world of tomorrow.

1:45 PM : Interactive Executive Roundtables

Location: Fort Worth 2 – 3rd Floor

The Interactive Executive Roundtables brings together ISE® Nominees, industry leaders, invited guests, and sponsor delegates to meet each other and join in interactive discussions on key industry issues as well as share best practices.  The interactive roundtable discussions are hosted by our distinguished ISE® Alumni who are leading CISOs and Information Security Executives.

Social [Media] Security: The Impact of Social Media on Information Security

Ajay Gupta

Ajay Gupta
Global Information Security Officer
Pizza Hut Global
Biography

Social media has become such an integral part of our day to day actions that we sometimes neglect to consider the greater impact it has at the business level. Cyber criminals run rampant across every social network today. While we see headlines about social marketing faux pas and account hacks, those are just the tip of the security risk iceberg. Companies’ poor social media security practices can put their brands, customers, executives, at serious risk. According to Cisco, Facebook scams were the most common form of malware distributed in 2015. The FBI said that social media-related events had quadrupled over the past five years and PricewaterhouseCoopers found that more than one in eight enterprises suffered a security breach due to a social media-related cyberattack. While adapting best practices for social media usage for employees is a decent start, there’s much more to be done. Security professionals must start treating social channels like the potential security threat they are and align strategies to effectively fend against the range of cyber techniques currently in use.

Securing What You Share: Improving Your Third Party Security

Yabing Wang

Yabing Wang
Chief Security Architect, Enterprise Technology & Architecture Services
Allstate Insurance Company
Biography

When organizations start working with third-party vendors, they have to consider a variety of security concerns. These vendors often have access to valuable, sensitive corporate data, yet according to a 2016 study by the Ponemon Institute, more than one third of companies don’t believe these vendors would tell them if they had a data breach. Additionally, About 60% of respondents said they felt vulnerable because they were sharing sensitive data with third parties that might have weak security policies. While including data privacy and security procedures in third-party contracts to ensure vendors have appropriate measures in place to protect company data has become commonplace, it is difficult to evaluate how the vendor is protecting data from unauthorized access, use, and disclosure, and to know whether the vendor has appropriate contractual terms in place with downstream, who may also have access to your data. This disconnect creates a high-risk area for all industries as more and more data loss through third-party vendors results in a breakdown of trust and communication. To help prevent potential damages, organizations need to develop plans for working with third parties that involve data mapping vendors, contract specificity, and regular data audits.

Navigating Brexit and EU Data Protection Regulations

Elliot Franklin Elliott Franklin
VP of Infrastructure & Security
Omni Hotels
Biography

European Union’s General Data Protection Regulation is still set to go into effect in 2018. The UK will also likely be committed to implementing the Cyber Directive – the Network & Information Security (NIS) Directive – along with other EU Member States, most likely by spring 2018. Even if the overlap between the UK's EU membership and the application of the GDPR in the UK were to be short lived, any UK business which trades in the EU will have to comply with the GDPR despite the result from Brexit. At a more international level, the GDPR and the current status of the UK opens up a whole potential complicated web of data protection and information exchange challenges for those wishing to do business with members of the EU or Great Britain. What kinds of changes can we expect to see from the EU and how they handle the exchange of information and what echoing effects will Brexit have on the GDPR and international data exchange in the years to come?

Security from the Inside: Combating Insider Threats

Mike Stewart
Executive Director in Information Security
USAA
Biography

While the popular view of most security threats tends to be of outsiders, the last few years have also seen an increasing emphasis on threats to the enterprise from the inside. Insider threats can range from something as simple as a negligent employee who clicks on a bad email link to a disgruntled employee with privileged access to sensitive data and portions of the enterprise. A 2016 survey on insider threats by Bitglass revealed that one in three organizations interviewed had experienced insider attacks , with 56% saying they have gone up in the past year. Organizations are starting to see improvements in detecting insider threats however. In the same survey, 64% of the respondents said they can now detect breaches within a week, compared to the previous year where only 42% were able to do so. While there have been some improvements in dealing insider threats, there still remains a strong need for a more vigilant and proactive approach to identifying, isolating, and mitigating damage from these kinds of attacks.

2:45 PM : Break

2:55 PM : Nominee Showcase Presentation #1

Location: Fort Worth 2 – 3rd Floor

Balancing the Security Scales: Managing Subsidiaries with Distinctively Different DNA

Mignona Cote

Mignona Cote
CISO PayFlex; CISO Phoenix Data Services; SR Director Information Security
Aetna
Biography

Jeannette Rosario

Jeannette Rosario
Director, Global Security
Aetna
Biography

As daunting as securing a Fortune 50 company, adding 14 independently subsidiaries to the mix, stretches leadership and innovation. Resiliency to market demands, continuous change in threats and 14 completely different companies ranging from financial services, international markets and consumer healthcare forces the Global Security Officer to manage each security program uniquely while leveraging core Aetna techniques and solutions. At Aetna, a model was developed to identify risks, measure maturity and implement solutions maintaining the unique DNA of each company while assuring the security as they operate within the boutique styles required for competitive advantage and speed to market. Join our conversation to learn how the Aetna team developed a revolutionary way of measuring controls against one baseline that turns into 15 unique sets of operational security programs with integration into 14 security technologies.

3:00 PM - 8:00 PM : Registration

San Antonio Prefunction, 4th floor

3:15 PM: CISO Deep Dive: Digital Trust

Location: Fort Worth 2 – 3rd Floor

An industry cross section of ISE Alumni and leading security executives explore today’s hottest security trends and issues and the key challenges they are facing now and in the future.

Moderator

Pete Lindstrom

Pete Lindstrom
VP, Security Strategies
IDC
Biography

Panelists

Mignona Cote

Mignona Cote
CISO PayFlex; CISO Phoenix Data Services; SR Director Information Security
Aetna
Biography

Berry Holte Elliott

Betty Elliott
VP, CISO
Moneygram
Biography

Marcia Peters

Marcia Peters
SVP, Information Security Governance, Risk, and Compliance
US Bank
Biography

Shelbi Rombout

Shelbi Rombout
SVP, Deputy CISO
Mastercard
Biography

4:00 PM : Nominee Showcase Presentation #2

Location: Fort Worth 2 – 3rd Floor

Risk vs. Reward: Strengthening and Maturing Information Security Processes
and Controls

Marcia Peters

Marcia Peters
SVP, Information Security Governance, Risk, and Compliance
US Bank
Biography

U.S. Bank’s Process Alignment and Risk Management Enhancements (PARE) project sought to mature their information security program and create a more robust control set. The project started with a pilot of high risk information security processes in which the U.S. Bank team identified the need to be more granular at the process level and the need to work hand in hand with the oversight teams. The objective of the PARE project was to document information security processes, risks, and controls and align to the National Institute of Standards and Technology’s Cybersecurity Framework (NIST CSF). Join our conversation to learn how the U.S. Bank Team was able to develop a method for tying controls to inherent risk, thereby achieving an acceptable level of residual risk which allows their peer organizations to generate cost savings, increase resource productivity and enhance information security processes and procedures.

4:20 PM : Nominee Showcase Presentation #3

Location: Fort Worth 2 – 3rd Floor

Strengthening the Cybersecurity Landscape

Katie Kolon

Katie Kolon
Executive Assistant to the CISO
Cook County Department of Homeland Security and Emergency Management
Biography

Ricardo Lafosse

Ricardo Lafosse
CISO
Cook County Department of Homeland Security and Emergency Management
Biography

The Cook County Department of Homeland Security and Emergency Management, Information Security Office set out to provide a mechanism for a stronger, collaborative front against malware, distributed denials of service, Ransomware and other cybercrime especially for municipalities and communities with limited resources. Additionally, the team needed to create an effective threat notification service that formats alerts that are actionable for security specialists yet are easily understandable for city and county analysts. The Cook County Cyber Threat Intelligence Grid (CCCTIG) integrates with existing infrastructure but allows for sharing with external entities in a secure manner and provides a security solution for smaller communities that cannot always afford the cost of other cybersecurity solutions. Join our conversation to learn how the CCCTIG was able to provide participating municipalities with access to a secure platform which shares a wealth of cyber-threat intelligence which includes bad actors, malicious campaigns and security incidents.

4:45 PM: Late Afternoon Break

5:00 PM : VIP Reception (invitation only)

Location: Fort Worth 1 – 3rd Floor

ISE® Nominees, sponsors and special guests will have the opportunity to network in a private setting with beverages and appetizers.

6:00 PM : Sponsor Pavilion and Dinner Buffet

Location: San Antonio Prefunction – 4th Floor

Guests enjoy gourmet dinner while networking and meeting the sponsors.  Honoring and celebrating the award nominees, this exciting occasion will bring together top security executives to recognize the individuals who have made significant and positive impact on their organizations through exemplary performance.

7:30 PM : Sponsor Tear Down

Location: San Antonio Prefunction – 4th Floor

7:45 PM : ISE® Central Awards Gala

Location: San Antonio Ballroom – 4th Floor

Honoring and celebrating the ISE® Central Award Nominees, this exciting occasion will bring together top security executives to recognize the individuals and the project teams who have made significant and positive impact on their organizations through exemplary performance. Don't miss the Passport for Prizes drawing and a chance to win outstanding gifts from our ISE® Sponsors.

9:00 PM : Champagne and Dessert Reception

Location: San Antonio Ballroom – 4th Floor

Enjoy champagne and dessert while celebrating the winners, nominees and project teams.