ISE® Central Schedule of Events 2014

ISE® Central Private Welcome Dinner

June 10, 2014
5:30pm - 8:30pm
Dallas Chop House
1717 Main Street
Dallas, TX 75201
Registration
Brian Wrozek

Brian Wrozek
Chief Security Officer
Alliance Data Systems
ISE® Central Executive Award Winner 2008

Big Security – Are Enterprise Networks Too Complex to Secure Sufficiently
The cyberspace environment is extremely dynamic with new vulnerabilities and threats emerging daily. The growing complexity of enterprise networks in a global economy compounds the challenge for security leaders, who must develop and employ various offensive and defensive strategies to defend the enterprise and minimize risks while maximizing the value of their investments. Join our discussion to learn how your peers are addressing the growing complexity of enterprise-wide network security, and share your own insights on protecting your enterprise in the evolving threat landscape.

June 11, 2014

10:00am - 7:00pm: Registration

Location: Atrium Prefunction, 2nd floor

11:30 AM : ISE Central Nominee Welcome Luncheon *Invitation Only

Location: Press Club, 2nd floor

Sponsored by

net I Q

David Corlette

David Corlette
Product Manager
NetIQ

When Tinfoil Hats Aren't Enough: Effective Defenses Against Advanced Persistent Threats (APTs) > Download Presentation
You probably know about the threat posed by APTs. You also may know that most experts will tell you that there are no cost-effective ways to completely prevent a determined attacker from getting into your systems. So what to do? Since returning to an agrarian society is likely not a viable option, this presentation will cover common APT techniques and ways to detect those techniques in action and rapidly react. We'll talk about how to leverage the Identity-powered enterprise to improve the accuracy and effectiveness of prevention, detection, and response.

1:00 PM : Welcoming Remarks and Introductions

Location: Atrium, 2nd floor
Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

1:10 PM : Keynote Address

Location: Atrium, 2nd floor
Eric Fisch

Eric Fisch
Senior Vice President, Information Security
Texas Capital Bank
ISE® West People's Choice Award Winner and Executive Finalist 2013
ISE® Central Celebrated Executive 2013
ISE® North America People’s Choice Award Winner 2013

CISO: From Technologist to Trusted Advisor  > Download Presentation
Whether accurate or not, the CISO is perceived as just a technical role. We are expected to be experts in hacking, firewalls, SQL injection, networking, and all sorts of vulnerabilities. What about business strategy? What about operations and growth? CISOs talk a lot about being “business enablers”, but what are we doing to be seen as a valuable contributor to the business? How can the CISO truly become a trusted business advisor?

1:40 PM : Interactive Executive Roundtables

Location: Atrium, 2nd floor

The Interactive Executive Roundtables brings together ISE® Nominees, industry leaders, invited guests, and sponsor delegates to meet each other and join in interactive discussions on key industry issues as well as share best practices.  The interactive roundtable discussions are hosted by our ISE® Judges and Nominees.

CISO as a Salesman: Win Support for Your Key Initiatives

Brian Wrozek

Brian Wrozek
Chief Security Officer
Alliance Data Systems
ISE® Central Executive Award Winner 2008

Major information security initiatives can be costly. InfoSec executives too often find that their organization’s leadership may not see the initial financial investment in security as business critical…at least not until data or infrastructure is compromised. What upper management does not know about information security can and will hurt them. They cannot claim to their customers, shareholders or even the government that due diligence has been performed if they ignore best practices or simply delegate the information security function to the IT team and forget about it.

Upper management approves the budgets and signs the checks. Securing information assets is ultimately their responsibility, but the CISO must put information security on their radar and prove its value. A CISO must lead efforts to build consensus for security as a priority in the enterprise by selling the Board and C-suite on the benefits of a proactive approach.

Security vs Risk vs Privacy: Who Leads the Charge?

Rick Holland

Rick Holland
Principal Analyst
Forrester Research

As the field of security has evolved, so has the role of the Chief Information Security Officer, but debates are heated regarding exactly what responsibilities this title-bearer should assume. Although the classic model calls for a CISO with a strong technical background to manage enterprise level security efforts, many global organizations have shifted from a focus on information security programs to a holistic risk management approach, which calls for a more business savvy CISO. Others have found combining their privacy and security teams under single leadership can help to manage risk. Others still see security, risk and privacy as vital roles that merit their own c-suite members. What’s the best model? Join our conversation to debate the merits for the CISO as a risk and privacy officer and share your insight about the evolution of the CISO role.

Is BYOS the real problem in mobility?

James Carpenter

James Carpenter
Chief Security Officer
Parkland Health & Hospital System
Dallas, TX
ISE® Central People's Choice Award Winner 2009

Many organizations are concerned about mobiles apps on BYOD devices triggering security, privacy and intellectual property problems. But perhaps the bigger issue in mobility is Bring-Your-Own-Software (BYOS). BYOS offers an attractive way for employees to streamline work activities, collaborate with colleagues, and be more productive. With free trials, inexpensive subscriptions, and easy-to-cancel policies, the barrier to adoption is low. However, organizations struggle to balance these benefits with the downside as this ad-hoc adoption of cloud services could pose greater risk than an external threat. Could BYOS be the biggest challenge in mobility?

The Growing Complexity of IT Security: How Do We Manage?

name

Mark Chamberlain
Executive Director of Information Security Operations
USAA

Network security has undergone a tremendous change in the past 20 years. Not only have attacks grown more sophisticated, but the network itself has been completely reinvented. No longer is it sufficient to provide protection solely at the major entry and exit points of a network. With the rise of BYOD, identity is the new perimeter and global, borderless security is the new challenge.

Network security has grown into a complex set of rules that define how business is conducted over the network, inside the organization and at touch points with external networks. Where network security policy was once implemented and managed by a small group of firewall experts, today it is a complex operation based on sophisticated processes that involve numerous stakeholders. Businesses are operating complex infrastructures, sometimes with hundreds of firewalls and thousands of network devices that need to be managed simultaneously. This is compounded by complex security rule sets, each of which needs to be evaluated sequentially, with unwieldy rules for each component.

2:40 PM : Break

2:50 PM : Nominee Showcase Presentation #1

Location: Atrium, 2nd floor
James Carpenter

James Carpenter
Chief Security Officer
Parkland Health & Hospital System
Dallas, TX

eDiscovery Automation: Best Practices for Navigating Complex Challenges > Download Presentation
eDiscovery law is a rapidly evolving and highly impactful issue for large enterprises. The complex challenges often encompass multiple departments and numerous technology solutions, necessitating a reliable process that integrates and streamlines workflow for all involved. Learn how Parkland Health & Hospital System created a defensible, repeatable and transparent eDiscovery process that linked multiple systems, automated processes and established a best-of-breed collection and review platform.

3:10 PM : Executive Address

Location: Atrium, 2nd floor
Rick Holland

Rick Holland
Principal Analyst
Forrester Research

Threat Intelligence to the Rescue?  > Download Presentation
Threat intelligence is the latest in a long line of silver bullets destined to protect our environments against an overwhelming threat landscape. In this presentation, Forrester analyst Rick Holland will discuss the current state and limitations of threat intelligence. Rick will wrap up the presentation talking about the future of threat intelligence.

3:25 PM: CISO Deep Dive: Executive Leadership

Location: Atrium, 2nd floor

An industry cross section of ISE Alumni and leading security executives explore today’s hottest security trends and issues and the key challenges they are facing now and in the future.

Moderator

John R. South

John R. South
Chief Security Officer
Heartland Payment Systems
ISE® Central Executive Award Winner 2011
ISE® of the Decade Central Award Winner 2012
ISE® North America Executive Award Finalist 2011

Panelists

Scott Howitt

Scott Howitt
VP, CISO
J.C. Penney
ISE® Central Executive Award Winner 2012

Jim Nelms

Jim Nelms
Chief Information Security Officer
Mayo Clinic

Yabing Wang

Yabing Wang
Chief Security Architect, Enterprise Technology & Architecture Services
Allstate Insurance Company

Jason Witty

Jason Witty
Senior Vice President, Chief Information Security Officer
U.S. Bancorp
Naperville, IL

4:10 PM : Nominee Showcase Presentation #2

Location: Atrium, 2nd floor
name

Mark Chamberlain
Executive Director of Information Security Operations
USAA

Creating a World Class IAM Program
Challenged to enable and secure the governed critical accesses of more than 26,000 USAA employees and contractors, the project team created the NextGen IAM Program, which advanced security, improved audit resilience, delivered an accurate view of the accesses of its employees, and aligned accountability for those accesses to each employee’s direct manager. The chosen technology enables a deeper long-term integration opportunity across 11 different next generation Identity & Access Management dimensions. Learn how USAA developed a World Class IAM Program, which met numerous strategic objectives and ultimately reinforced the organization’s central mission and purpose.

4:30 PM : Nominee Showcase Presentation #3

Location: Atrium, 2nd floor
Brian Engle

Brian Engle
Executive Director
Retail Cyber Intelligence Sharing Center

Public-Private Partnerships: How the State of Texas is Leading the Charge > Download Presentation
As both business and government become increasingly reliant on technology, the need for a strong cyber security framework to protect critical infrastructure escalates, and along with it, the need for collaboration. Learn how Brian Engle has lead the charge in the State of Texas, creating public-private partnerships between the state’s most significant players in an effort to develop a Security Program Essentials framework and cultivate a sizable, high-quality cyber security workforce to ensure economic competitiveness for the State of Texas.

4:50 PM: Late Afternoon Break

5:00 PM : VIP Reception (invitation only)

Location: Press Club, 2nd floor

ISE® Nominees, sponsors and special guests will have the opportunity to network in a private setting with beverages and appetizers.

6:00 PM : Sponsor Pavilion and Dinner Buffet

Location: Chaparral Foyer & Boardroom, 38th Floor

Guests enjoy gourmet dinner while networking and meeting the sponsors.  Honoring and celebrating the award nominees, this exciting occasion will bring together top security executives to recognize the individuals who have made significant and positive impact on their organizations through exemplary performance.

7:30 PM : ISE® Central Awards Gala

Location: Chaparral Ballroom, 38th Floor

Honoring and celebrating the ISE® Central Award Nominees, this exciting occasion will bring together top security executives to recognize the individuals and the project teams who have made significant and positive impact on their organizations through exemplary performance.

9:00 PM : Champagne and Dessert Reception

Location: Chaparral Foyer, 38th Floor

Enjoy champagne and dessert while celebrating the winners, nominees and project teams. Don't miss the Passport for Prizes drawing and a chance to win outstanding gifts from our ISE® Sponsors.