ISE® Northeast Schedule of Events 2016

ISE® NORTHEAST PRIVATE WELCOME DINNER
Why Traditional Security Approaches Fail in Agile Infrastructure: And What to Do About It

October 3, 2016
5:30pm - 8:30pm
Lattanzi
361 W 46th St
New York, NY 10036
Registration
David Ritenour

David Ritenour
Managing Director, CISO
Blackrock Inc.

Enterprises continue to invest heavily in virtualized and cloud-based infrastructures. The era of elastic IT resources is here and it’s automated, on-demand and self-provisioning. This movement has not been so easy for some as more traditional security tools don’t always function as intended in cloud computing models. Security and compliance teams are learning that force fitting old security approaches can result in increased threats, lots of manual effort and delays in responding to the business. What’s needed is a new approach that allows businesses the freedom to take full advantage of agile infrastructure, while at the same time delivering comprehensive protection of critical assets. Join our conversation to learn how to deliver a more agile, efficient and effective security strategy that will enable your enterprise to fully capitalize on the many benefits of dynamic infrastructure.

October 4, 2016

11:00am: Registration

Location: Ambassador Foyer – 2nd Floor

11:30 AM : ISE® Signature Luncheon *Invitation Only

Location: Ambassador 2, 2nd floor

Sponsored by

intralinks

Kyle Waddle

Kyle Waddle
Vice President, Corporate Information Security
Comcast Corporation
Biography

Information Security Iceberg: Fueling a Collaborative Environment to Securely Share Your
Mission-Critical Information

A great deal of your company’s data now lives outside the company perimeter, on unmanaged devices and in storage repositories, which are not protected by traditional firewalls. Network file servers and corporate document management systems can no longer sufficiently serve as the control points for sensitive documents and files. The need to collaborate securely across international boundaries creates additional challenges for your business.

Major breaches proliferating across media have elevated information security as a top-of-mind issue for many business leaders. Are we truly safeguarding against data privacy and data security — or are these breaches the tip of the iceberg?

Join us for a candid discussion with your peers as we calculate the impact of information security from a risk and cost perspective and explore real-world challenges in protecting information. We will address the biggest challenges your organization is facing and learn best practices for balancing business objectives while fueling a secure, collaborative work environment

1:00 PM : Welcoming Remarks and Introductions

Location: Ambassador 3, 2nd Floor
Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

T.E.N.'s CEO & President will welcome guests, provide an overview of the program agenda and event purpose, and introduce the speakers and sponsors of the ISE® Northeast Executive Forum and Awards 2016.

1:10 PM : Keynote Address

Location: Ambassador 3, 2nd Floor

Painting the Bigger InfoSec Picture

name

Dennis Dickstein
Chief Operating Officer
UBS Wealth Management
Author of "No Excuses"
Biography

For many years, Information Security was often given the same amount of reverence and importance as IT. Now, InfoSec is immensely more expansive than it was during its conception. It touches every part of the organization, from the newest intern to the veteran executive and from office cubicles all the way to the boardroom. The impact of Information security has grown exponentially in a short time and continues to develop in incredible ways. As data becomes worth its weight in gold and crosses international channels with resounding speed, we’re starting to see more laws and regulations that specifically target how information and data privacy should be handled. Information Security is seeing the beginnings of a much bigger role in the world at large. What will the InfoSec professional of tomorrow look like? What kind of impact will global data exchange and privacy laws have on the way organizations do business? Join our conversation as we explore the possibilities of Information Security in the years to come.

1:45 PM : Interactive Executive Roundtables

Location: Ambassador 3, 2nd Floor

The Interactive Executive Roundtables brings together ISE® Nominees, industry leaders, invited guests, and sponsor delegates to meet each other and join in interactive discussions on key industry issues as well as share best practices.  The interactive roundtable discussions are hosted by our ISE® Judges and Nominees.

Help or Hindrance? Looking at the Benefits and Flaws of Encryption-Based Security

Jay Wright Jay Wright
Information Security Officer
Citigroup Inc.
Biography
Encryption and cryptography can be very powerful security tools when used correctly, but like all security measures, they’re not a panacea. Teams must determine the strength of encryption, who holds the keys, and at what level in their system they should implement encryption (storage, database, application level, etc). The many options for encryption offer a variety of security advantages, but they each have their own flaws to consider. Issues like malicious insiders abusing encryption keys, malware based bypasses, and overall encryption costs should all be taken into account. Join our conversation and learn what kinds of encryption and cryptography solutions are best for your organization, and how you can combine those solutions with other security procedures.

No Longer Left to Their Own Devices: Hacking Concerns with the Internet of Things

Linda Angles

Linda Cooper Angles
Chief Information Security Officer
FXall, A Thomson Reuters Company
Biography

For many, the term “Internet of Things” has been little more than a buzzword tossed around over the last few years. However, as more devices gain the ability to connect, communicate with, and remotely manage an incalculable number of networked, automated devices via the Internet, the IoT is finally becoming a reality. Whether it’s a number of automated network devices on a factory floor, a remotely managed series of equipment in a hospital, or even just a collection of highly interconnected devices in a residential home, the elements that make up the IoT are becoming more pervasive by the day, and with them come critical security concerns. Join this conversation to discuss major security concerns with the IoT like ubiquitous data collection, consumer data privacy, and new avenues of attack.

Protecting Data: Keeping the Keys to the Kingdom Out of the Hands of Hackers

Frank Aiello

Frank Aiello
Chief Information Security Officer
American Red Cross
ISE® Northeast People's Choice Award Winner 2016
ISE® Northeast Executive Award Finalist 2016

Biography

Breaches invariably involve data loss (for example: Anthem, JPMC, and Target), so finding the best practices to prevent them should be an essential part of your organization. Protection of data can be done at multiple network levels and can involve encryption, masking, or tokenization. The many options for data security offer a variety of security advantages, but they each have their own flaws to take into consideration. These include issues like malicious insiders abusing encryption keys, malware-based bypasses, and overall costs. Join our conversation to learn what kinds of secure data solutions are best for your business requirements; why and when to use each solution; and how you can combine solutions to minimize risk.

Businesses Without Borders: International Information Exchange in a Cloud-Based World

Donna Nemecek

Donna Nemecek
VP, Manager Technology Risk Assurance & Senior Information Risk Officer
BNY Mellon
ISE® Northeast Executive Award Finalist 2013
Biography

Cloud computing has allowed numerous organizations to share and collaborate with their peers with greater speed and flexibility than ever before. However, there are a number security concerns in this new world of businesses without borders. Areas such as data security, privacy, access rights management, and international security rules and regulations all serve as major hurdles that organizations across all verticals have to tackle in their own way. Maintaining trust among cloud-based enterprises and their partners is essential, but what else is needed to continually ensure that a cloud-based, information-sharing structure can succeed while remaining secure? Join our conversation to discuss security’s role in the new global marketplace and share strategies for securing sensitive information in a cloud-based world.

2:45 PM : Break

3:00pm : Registration

Location: New York Atrium, 9th floor

2:55 PM : Nominee Showcase Presentation #1

Location: Ambassador 3, 2nd Floor
Chuck Hudson

Charles Hudson
Executive Director, National Governance, Risk and Compliance
Comcast
ISE® Northeast People's Choice Award Winner 2014
ISE® Northeast Executive Award Finalist 2014
ISE® North America Executive Award Finalist 2014 - Commercial Category

Biography

Ascertaining and Defending Assets at Risk
With more than 100,000 employees and 70,000 vendor accounts having access to Comcast data, endpoints, servers and applications, the biggest challenge is maintaining the confidentiality, integrity and availability of the assets holding the crown jewels. Comcast’s Assets at Risk Program, powered by Bay Dynamics’ Risk Fabric Cyber Risk Analytics platform, is an innovative risk based asset-centric program that protects high-value assets (data, systems, and applications) from threats and vulnerabilities. The program enables Comcast to measure, communicate and reduce cyber risk. It engages Line-of-Business application owners in an innovative way to provide asset value and business context which is used for prioritized investigation and remediation. Join our conversation to learn more about how involving the right users, understanding the assets at risk, and focusing on the metrics that matter, has allowed Comcast to decentralize risk from the security organization and effectively communicates cyber risk to key stakeholders.

3:15 PM: CISO Deep Dive: Executive Leadership

Location: Ambassador 3, 2nd Floor

An industry cross section of ISE Alumni and leading security executives explore today’s hottest security trends and issues and the key challenges they are facing now and in the future.

Moderator

Pete Lindstrom

Pete Lindstrom
VP, Security Strategies
IDC
Biography

Panelists

David Billeter

David Billeter
VP, Global Security, Privacy and Regulatory Compliance
Staples
ISE® North America Commercial Executive Award Winner 2011
Biography

Rick Comeau

Rick Comeau
Advisor, Commercial
Intralinks
Biography

Lou Saviano

Lou Saviano
VP, Global IT Services
Skillsoft
Nashua, NH
Biography

John Schramm

John Schramm
Vice President of Global Information Risk Management and CIRO
Manulife/John Hancock
ISE® North America Executive Award Finalist 2014 - Financial Category
Biography

Robert Zandoli

Dr. Robert Zandoli
Global Chief Information Security Officer
BUNGE, LTD
ISE® Northeast Executive Award Finalist 2010
Biography

4:00 PM : Nominee Showcase Presentation #2

Location: Ambassador 3, 2nd Floor
Natalia Kory

Natalia Kory
CTO
Clarient Global LLC, DTCC company
Biography

Ajoy Kumar

Ajoy Kumar
Director & Business Information Security Officer
DTCC
Biography

Client Data and Onboarding – Simplified.
Clarient Global LLC (Clarient) is a DTCC company founded with BNY Mellon, Barclays, Credit Suisse, Goldman Sachs, JPMorgan Chase and State Street. Clarient provides a centralized entity data and document utility, Clarient Entity Hub, to address global financial market participants’ needs for greater control, transparency, and cost reduction in response to evolving risk management and regulatory requirements. Clarient Entity Hub is a secure entity data and documentation platform that collects, maintains and allows for the sharing of legal entity information with counterparties, through one centralized interface. Join our conversation to learn more about how the Clarient Entity Hub streamlines interactions between market participants and their clients, and allows critical data to become digitized and dynamic.

4:20 PM : Nominee Showcase Presentation #3

Location: Ambassador 3, 2nd Floor
Larry Wilson

Larry Wilson
Chief Information Security Officer
University of Massachusetts
ISE® Northeast Executive Award Finalist 2013
ISE® North America Executive Award Finalist 2013 - Academic/Public Sector Category

Biography

Securing a Future for the Cybersecurity Professionals of Tomorrow
Earlier in 2015, key representatives of the UMass President’s Office met with the management team from a higher education consortium in Boston to discuss how UMass could assist consortium members with the design, implementation and operations of their cybersecurity programs. After a detailed discussion and review of the key UMass capabilities, a pilot program was initiated. The UMass team continues to provide services to other universities and is in discussions with other under-resourced markets including small to mid-size banks and insurance companies, law firms, K-12 schools, cities and towns, etc. The pilot program has since expanded to a fully managed offering under MAST Cybersecurity Services. The program offers real benefits to students, faculty, university administration and most importantly companies who are depending on a skilled cybersecurity workforce. Join our conversation to learn how the UMass team are changing the way we think about higher education and helping advance the cybersecurity skills of our current and future workforce.

4:45 PM: Late Afternoon Break

5:00 PM : VIP Reception (invitation only)

Location: Pearl, 9th Floor

ISE® Nominees, sponsors and special guests will have the opportunity to network in a private setting with beverages and appetizers.

6:00 PM : Sponsor Pavilion and Dinner Buffet

Location: New York Atrium, 9th floor

Guests enjoy gourmet dinner while networking and meeting the sponsors. Honoring and celebrating the award nominees for 2015, this exciting occasion will bring together top security executives to recognize the individuals who have made significant and positive impact on their organizations through exemplary performance.

7:30 PM : Sponsor Tear Down

Location: New York Atrium - 9th floor

7:45 PM : ISE® Northeast Awards Gala

Location: Majestic Ballroom, 5th floor

Honoring and celebrating the ISE® Northeast Award Nominees, this exciting occasion will bring together top security executives to recognize the individuals and the project teams who have made significant and positive impact on their organizations through exemplary performance.

9:00 PM : Champagne and Dessert Reception

Location: Majestic Ballroom, 5th floor

Enjoy champagne and dessert while celebrating the winners, nominees and project teams.