ISE® Central Private Welcome Dinner
Ajay Gupta
Chief Information Security Officer
Concentra
Biography
Securing the Endpoint in an Age of Advanced Cyber Attacks
Breaches are occurring at an alarming pace and the #1 point of entry is the endpoint. Legacy detection-based defenses simply aren’t enough to stop dynamic, modern cyber-attacks. And companies continue to embrace business-enabling mobile and cloud technologies that further evaporate the network perimeter and IT control. Is there a new model that can be used to secure the endpoint? Can isolation technology help prevent breaches where companies are often left most exposed — the endpoint? This discussion will center around securing the perimeter and how to transform the traditional cycle of false alerts, infection, and remediation. We will discuss how you can enable your IT team to spend less time on reactive measures so you can focus your energy on what matters most — your success. Join our conversation to learn how this revolutionary approach will defeat today’s threats while streamlining IT, reducing costs, and empowering your users.
May 7, 2015
11:00am - 8:00pm: Registration
Location: Majestic Prefunction, 37th floor
11:30 AM : ISE® Signature Luncheon *Invitation Only
Location: Majestic 4-5, 37th floor
Sponsored by
Scott Howitt
SVP, Chief Information Security Officer
MGM Resorts
ISE® Central Executive Award Winner 2012
Biography
T.E.N. Success Story
Closing the Security Intelligence Gap – Integrating Identity, Access and Security Management
Your data is valuable and there’s a good chance that someone is actively working to get it. For today’s hackers, successful infiltration to sensitive systems and information is often achieved by gaining the credentials of privileged users with elevated access rights. Traditional security solutions are no longer enough to spot this attack method. Closing the gap requires a new approach---integrating security monitoring with identity and access management. Applying identity-based context and user access behavior into your security monitoring efforts are imperative to discovering the true, actionable security intelligence required for your team to disrupt an attack before it can cause damage and expedite incident response. Join our conversation for a deep dive into identity, access and security management and learn more about the tools and strategies your team needs to recognize potential attacks faster and keep your most sensitive information assets safe.
1:00 PM : Welcoming Remarks and Introductions
Location: Majestic 1, 37th floor
Marci McCarthy
CEO and President
T.E.N.
Biography
1:10 PM : Keynote Address
Location: Majestic 1, 37th floor
Brian Engle
Executive Director
Retail Cyber Intelligence Sharing Center
ISE® Central Executive of the Year Award Winner 2014
ISE® North America Executive Award Winner 2014 - Academic/Public Sector Category
Biography
Cyber Intelligence Sharing and the Meshed Armor of Community > Download Presentation
No individual organization is immune from attacks, and long lost are the days where relying on defensive measures alone is sufficient. We are in a world where identification, protection, detection, response and recovery are all required and essential elements of a capable security program, and capabilities exponentially increase through collaboration and community efforts to share intelligence. A gathering of the region’s most significant security leaders coming together is a perfect opportunity to consider how we can create the meshed armor of community through cyber intelligence sharing.
1:45 PM : Interactive Executive Roundtables
Location: Majestic 1, 37th floor
The Interactive Executive Roundtables brings together ISE® Nominees, industry leaders, invited guests, and sponsor delegates to meet each other and join in interactive discussions on key industry issues as well as share best practices. The interactive roundtable discussions are hosted by our ISE® Judges and Nominees.
Scott Pettigrew
VP, Chief Security Officer
HMS
Irving, TX
ISE® Central Executive Award Finalist 2014
ISE® North America Executive Award Finalist 2014 - Health Care Category
Biography
Cyber Threat Intelligence: A Gold Mine of Value > Summary
An intelligence capability empowers organizations to identify potential threats and vulnerabilities in order to minimize the ‘threat attack window‘ and limit the amount of time an adversary gains access to the network before they are discovered. Organizations that operate with an intelligence-led mindset understand that threat intelligence is the ‘mechanism’ that drives cyber security investment and operational risk management. The number of cyber threat intelligence providers continues to increase and the idea of threat intelligence is gaining widespread acceptance. While increased awareness of the cyber security threat is a positive trend, many organizations still need to put in place the fundamentals of intelligence management to gain real value from threat intelligence. This will be a crucial for instilling confidence in board members – and ensure that the organizations are equipped to leverage the gold mine of value that can be extracted from cyber threat intelligence.
Jack Key
Chief Information Security Officer
Brinks
ISE® North America Executive Award Finalist 2010
ISE® Central Executive Award Finalist 2010
Biography
Securing Your Data across Channels: Strategies for Outpacing Zero Day Threats and Sophisticated Hackers > Summary
Mobile, social and cloud technologies enable an organization’s efficiency and productivity, and can often provide competitive and brand differentiation. However, the widespread adoption of these services often results in an environment where free-flowing data quickly outpaces an organization’s ability to proactively defend against imminent and emerging security threats. All companies with valuable IP should assume both zero day threats and sophisticated hackers are targeting them. Mobile, social and cloud technologies drive productivity. But they also open the door to data theft and advanced attacks that can slip right by anti-virus, URL filtering and firewall defenses. A continued focus on siloed controls is insufficient for today’s threats as attacks are highly advanced, well-funded and persistently targeting enterprise environments.
Eric Fisch
Senior Vice President, Information Security
Texas Capital Bank
ISE® West People's Choice Award Winner and Executive Finalist 2013
ISE® Central Celebrated Executive 2013
ISE® North America People’s Choice Award Winner 2013
Biography
The Era of Cyber War Games Has Arrived – Are You Prepared to Play? > Summary
When the movie War Games hit theaters back in 1983, the concept of computer hacking was little more than science fiction. Fast forwarding more than 30 years later, gripping sci-fi dilemmas featuring cyber-attacks have become real life nightmares for many organizations. The era of the modern cyber war games has arrived with nation states backing large scale cyber terrorist attacks, issuing demands, and bringing huge organizations to their knees for months on end. Private user data, sensitive employee credentials, and even unreleased products are being disclosed and used as ammunition against major corporations like Sony, Target, JP Morgan Chase, and Home Depot on this digital field of battle. These companies face not only financial losses in the millions, but also must cope with equally crippling brand disintegration due to public backlash and customer fallout. Now that fiction is reality, an important question remains – is your team prepared for these cyber war games?
Todd Fitzgerald
Global Director of Information Security
Grant Thornton International, Ltd
2005 ISE® Central Finalist
2006 ISE® Central MC & Judge
2008 ISE® West MC
2012 ISE® North America MC
Security Author
Biography
Security & Compliance: What is the secret to success? > Summary
The compliance and technology landscape has changed dramatically in recent years with progressively strict regulations, especially in industries such as energy, oil and gas, health care, retail and financial services. Regulators are increasing scrutiny and fines, while internal policies and controls, particularly in relation to data, have posed debilitating for communication and collaboration needs. Additionally, it has become increasingly common for emerging threats to strike at points between the enterprise and third-party vendors, which further escalates the necessity for secure collaboration. How are your peers facing these challenges? Join this discussion to discover best practices for meeting industry requirements while ensuring secure collaboration in the complex marketplace.
2:45 PM : Break
2:55 PM : Nominee Showcase Presentation #1
Location: Majestic 1, 37th floor
Helen Patton
CISO
The Ohio State University
Biography
Strategies for Winning Enterprise-wide Support for Your Security Initiatives > Download Presentation
When The Ohio State University’s security department launched the first phase of its information security framework project, the biggest challenge faced was engaging the university’s 129 independent business units. Because each had its own distributed IT department, budget and priorities, there was limited visibility into decisions impacting overall university information security. This compelled the project team to implement new process and governance in order to provide a common language for evaluating and prioritizing risk, establish accountability, expedite remediation and foster a risk-aware culture across all departments. The project generated a remarkable level of engagement with 127 departments participating voluntarily and within one year all objectives were achieved, including evidence of cultural change. Learn how the OSU team was able to gain institution-wide participation and support over such a short time period while working with a small budget, even smaller staff and a complex political environment.
3:15 PM: CISO Deep Dive: Executive Leadership
Location: Majestic 1, 37th floor
An industry cross section of ISE Alumni and leading security executives explore today’s hottest security trends and issues and the key challenges they are facing now and in the future.
Moderator
Pete Lindstrom
Research Director Security Products
IDC
Biography
Panelists
Mike Coogan
Director of Information Security
Waste Management
Chris Ray
Chief Information Security Officer
Epsilon
ISE® Southeast Executive Award Winner 2011
Biography
T.E.N. Success Story
Gene Scriven
Chief Information Security Officer and Vice President
Sabre Holdings
ISE® Southeast People’s Choice Award Winner 2008, ISE® Southeast Executive Award Finalist 2008
Biography
T.E.N. Success Story
Patrick Sullivan
Chief Information Security Officer
GE Oil & Gas
Biography
Brian Wrozek
Chief Security Officer
Alliance Data Systems
ISE® Central Executive Award Winner 2008
Biography
T.E.N. Success Story
4:00 PM : Nominee Showcase Presentation #2
Location: Majestic 1, 37th floor
Rick Swenson
Assistant Vice President - Financial Crimes
Operational Excellence & Strategic Initiatives
USAA
Biography
Biometric Logon: Changing the Game for Multi-factor Authentication > Download Presentation
Watch the Video
A well-known innovator in the field of security, USAA has once again defied known limits by implementing biometric technology to support mobile application access for more than 145,000 users. The new technology provides a simple, secure and broad approach to multi-factor authentication that enables users to access their accounts and manage their finances directly from the USAA Mobile App without having to use static username and password. Biometric logon shifts the focus from what you know – usernames and passwords – to who you are and what you have, ultimately safeguarding personal information often harvested from data breaches and social engineering. Learn how USAA became the first financial institution to implement this game-changing experience for its diverse user base and discover why biometric technology is the next step into the future of security.
4:20 PM : Nominee Showcase Presentation #3
Location: Majestic 1, 37th floor
Patrick Sullivan
Chief Information Security Officer
GE Oil & Gas
Biography
Project SAND: An Innovative Approach to Protecting Against Tomorrow’s Threats
Highly publicized breaches targeting the supply chain and application vulnerabilities have motivated companies to reevaluate their security strategies. In an effort to secure the enterprise against these evolving threats, GE Oil & Gas set out to harden and simplify its core IT infrastructure, while also improving its ability to embrace new technology and the new mobile workforce. Project SAND addressed three key objectives: securing third party connections, hardening internet facing applications and simplifying the active directory landscape. Learn how the project team – despite aggressive timelines and complex GE Oil & Gas IT landscape – was able to successfully complete the project ahead of schedule and under budget, ultimately migrating 45,000+ users and providing an improved platform for secure collaboration between employees, suppliers, and customers.
4:45 PM: Late Afternoon Break
5:00 PM : VIP Reception (invitation only)
Location: Majestic 6-7, 37th floor
ISE® Nominees, sponsors and special guests will have the opportunity to network in a private setting with beverages and appetizers.
6:00 PM : Sponsor Pavilion and Dinner Buffet
Location: Chaparral Boardroom, 38th Floor
Guests enjoy gourmet dinner while networking and meeting the sponsors. Honoring and celebrating the award nominees, this exciting occasion will bring together top security executives to recognize the individuals who have made significant and positive impact on their organizations through exemplary performance.
7:30 PM : ISE® Central Awards Gala
Location: Chaparral Ballroom, 38th Floor
Honoring and celebrating the ISE® Central Award Nominees, this exciting occasion will bring together top security executives to recognize the individuals and the project teams who have made significant and positive impact on their organizations through exemplary performance.
9:00 PM : Champagne and Dessert Reception
Location: Chaparral Foyer, 38th Floor
Enjoy champagne and dessert while celebrating the winners, nominees and project teams. Don't miss the Passport for Prizes drawing and a chance to win outstanding gifts from our ISE® Sponsors.