ISE® Central Schedule of Events 2017

ISE® CENTRAL PRIVATE WELCOME DINNER

May 16, 2017
5:30pm - 8:30pm

May 17, 2017

11:00am - 8:00pm: Registration

11:30 AM : ISE® Signature Luncheon *Invitation Only

Location: Fort Worth 1 – 3rd Floor

1:00 PM : Welcoming Remarks and Introductions

Location: Fort Worth 2 – 3rd Floor
Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

1:10 PM : Keynote Address

Location: Fort Worth 2 – 3rd Floor

1:45 PM : Interactive Executive Roundtables

Location: Fort Worth 2 – 3rd Floor

The Interactive Executive Roundtables brings together ISE® Nominees, industry leaders, invited guests, and sponsor delegates to meet each other and join in interactive discussions on key industry issues as well as share best practices.  The interactive roundtable discussions are hosted by our distinguished ISE® Alumni who are leading CISOs and Information Security Executives.

Social [Media] Security: The Impact of Social Media on Information Security

Ajay Gupta

Ajay Gupta
Global Information Security Officer
Pizza Hut Global
Biography

Social media has become such an integral part of our day to day actions that we sometimes neglect to consider the greater impact it has at the business level. Cyber criminals run rampant across every social network today. While we see headlines about social marketing faux pas and account hacks, those are just the tip of the security risk iceberg. Companies’ poor social media security practices can put their brands, customers, executives, at serious risk. According to Cisco, Facebook scams were the most common form of malware distributed in 2015. The FBI said that social media-related events had quadrupled over the past five years and PricewaterhouseCoopers found that more than one in eight enterprises suffered a security breach due to a social media-related cyberattack. While adapting best practices for social media usage for employees is a decent start, there’s much more to be done. Security professionals must start treating social channels like the potential security threat they are and align strategies to effectively fend against the range of cyber techniques currently in use.

Securing What You Share: Improving Your Third Party Security

Yabing Wang

Yabing Wang
Chief Security Architect, Enterprise Technology & Architecture Services
Allstate Insurance Company
Biography

When organizations start working with third-party vendors, they have to consider a variety of security concerns. These vendors often have access to valuable, sensitive corporate data, yet according to a 2016 study by the Ponemon Institute, more than one third of companies don’t believe these vendors would tell them if they had a data breach. Additionally, About 60% of respondents said they felt vulnerable because they were sharing sensitive data with third parties that might have weak security policies. While including data privacy and security procedures in third-party contracts to ensure vendors have appropriate measures in place to protect company data has become commonplace, it is difficult to evaluate how the vendor is protecting data from unauthorized access, use, and disclosure, and to know whether the vendor has appropriate contractual terms in place with downstream, who may also have access to your data. This disconnect creates a high-risk area for all industries as more and more data loss through third-party vendors results in a breakdown of trust and communication. To help prevent potential damages, organizations need to develop plans for working with third parties that involve data mapping vendors, contract specificity, and regular data audits.

Navigating Brexit and EU Data Protection Regulations

Elliott Franklin

Elliott Franklin
Director, IT Security
Essilor of America Inc
Biography

European Union’s General Data Protection Regulation is still set to go into effect in 2018. The UK will also likely be committed to implementing the Cyber Directive – the Network & Information Security (NIS) Directive – along with other EU Member States, most likely by spring 2018. Even if the overlap between the UK's EU membership and the application of the GDPR in the UK were to be short lived, any UK business which trades in the EU will have to comply with the GDPR despite the result from Brexit. At a more international level, the GDPR and the current status of the UK opens up a whole potential complicated web of data protection and information exchange challenges for those wishing to do business with members of the EU or Great Britain. What kinds of changes can we expect to see from the EU and how they handle the exchange of information and what echoing effects will Brexit have on the GDPR and international data exchange in the years to come?

2:45 PM : Break

2:55 PM : Nominee Showcase Presentation #1

Location: Fort Worth 2 – 3rd Floor

3:15 PM: CISO Deep Dive: Digital Trust

Location: Fort Worth 2 – 3rd Floor

An industry cross section of ISE Alumni and leading security executives explore today’s hottest security trends and issues and the key challenges they are facing now and in the future.

Moderator

Pete Lindstrom

Pete Lindstrom
VP, Security Strategies
IDC
Biography

Panelists

Curtis Coleman

Curtis Coleman
Vice President and Chief Information Security Officer
Seagate Technology
ISE® West Executive Award Winner 2012
ISE® North America Commercial Executive Award Finalist 2012

Biography
T.E.N. Success Story

Berry Holte Elliott

Betty Elliott
VP, CISO
Moneygram
Biography

Marcia Peters

Marcia Peters
SVP, Information Security Governance, Risk, and Compliance
US Bank
Biography

Shelbi Rombout

Shelbi Rombout
SVP, Deputy CISO
Mastercard
Biography

4:00 PM : Nominee Showcase Presentation #2

Location: Fort Worth 2 – 3rd Floor

4:20 PM : Nominee Showcase Presentation #3

Location: Fort Worth 2 – 3rd Floor

4:45 PM: Late Afternoon Break

5:00 PM : VIP Reception (invitation only)

Location: Fort Worth 1 – 3rd Floor

ISE® Nominees, sponsors and special guests will have the opportunity to network in a private setting with beverages and appetizers.

6:00 PM : Sponsor Pavilion and Dinner Buffet

Location: San Antonio Prefunction – 4th Floor

Guests enjoy gourmet dinner while networking and meeting the sponsors.  Honoring and celebrating the award nominees, this exciting occasion will bring together top security executives to recognize the individuals who have made significant and positive impact on their organizations through exemplary performance.

7:30 PM : Sponsor Tear Down

Location: San Antonio Prefunction – 4th Floor

7:45 PM : ISE® Central Awards Gala

Location: San Antonio Ballroom – 4th Floor

Honoring and celebrating the ISE® Central Award Nominees, this exciting occasion will bring together top security executives to recognize the individuals and the project teams who have made significant and positive impact on their organizations through exemplary performance. Don't miss the Passport for Prizes drawing and a chance to win outstanding gifts from our ISE® Sponsors.

9:00 PM : Champagne and Dessert Reception

Location: San Antonio Ballroom – 4th Floor

Enjoy champagne and dessert while celebrating the winners, nominees and project teams.