Attack the Attack Surface: Aegon's Global Information Security Strategy Implementation
Executive Sponsor: Steve Jensen, Global CISO
Project Team: More than 150 Security Professionals were involved in delivering our Global Security Strategy. Leaders of the effort were:
Steve Jensen (Global Chief Information Security Officer), Chris Delaney (Senior Director, Infrastructure Security Services), Karen Hunt (Director, Data Security), Joyce Leek (Senior Director, Identity & Access Management), Tom Mooney (Director, Cloud Security), Paul Nickelson (Senior Director, Global Security Operations Center), Eric Svalstad (Global Tech and Corporate Center Information Security Officer), Rob Tourt (Transamerica Information Security Officer), Marijke Witteman (Director, Information Security Analytics), Jesus Gomez (Aegon Spain Information Security Officer), Tony Povoas (Aegon UK Information Security Officer), Herman Stoker (Aegon Asset Management Information Security Officer), Philip Wong (Aegon Asia Information Security Officer)
Completed an ambitious 2-year, risk-based global Security Strategy implementation by focusing on our highest risk categories: External, Internal, Data and Unavailability of Systems and establishing a cross-organizational collaboration model.
Security Data Lake
Executive Sponsor: Steve Jensen, Global CISO
Project Team: Tom Mooney (Direction, Cloud and Application Security), Suzanne Black (Project Manager), Amit Kumar (Product Owner), Suresh Dasari (Scrum Master), Jose Rivera (Architect), Peter Short (Lead Engineer), Joshua Clegg (Senior Engineer), Swati Dogra (Senior Engineer), Ariel Wetherspoon (Intermediate Engineer), Aaron Smith (Architect)
The project was conceived to collect security data for cloud infrastructure across 6 business units spanning the US, Europe and Asia. The aim was to take a data driven approach to security identifying security issues and prioritizing them based on impact and exposure. The aim was to provide pertinent data to business CISOs and engineers to allow them to self manage security issues whilst maintaining central over sight.
Feathers and Firewalls: Aflac's Zero Trust Approach
Executive Sponsor: Tim Callahan, SVP, Global CISO
Project Team: DJ Goldsworthy (VP, Security Ops & Threat Mgmt), Mike Danley (Director, Security Engineering & Ad), Brandon Sellers (Manager, Cloud Security Engineering), Justin Brown (Lead Cloud Security Engineer), Milton Gardner (Global Security Systems Consultant)
The Zero Trust Program is designed to achieve increased security, simplified network architecture, and cost savings. Aflac's program is centered on the principle of consistent controls, with all communication passing through a cloud-based common exchange. Our goal is to provide a seamless user experience whether they are working on-site or remotely. We use strong identity-based access, requiring step-up multifactor authentication for resource access that appears risky, and we also employ device verification through risk-based access and posture checking.
Deployment of Fleet Wide Network Analyzers – Nozomi Networks
Executive Sponsor: Leigh Carr, Vice President, Maritime Cyber Safety
Project Team: Timothy (T.J.) Scharf (Director, Maritime Cyber Safety Program Delivery), Viurniel Sanchez (Director, Maritime Cyber Safety Engineering), James Webb (Sr. Manager, Technical Operations), Leigh Carr (Associate Vice President, Maritime Cyber Safety)
The deployment of Nozomi Networks was initiated by Leigh Carr and Viurniel Sanchez, the first two members of the newly formed Maritime Cyber Safety team within Carnival Corporation. This team was established to focus on operational technology (OT) cyber defense across the global cruise line fleet of 90+ ships. Nozomi Networks was selected because, as with any robust cyber program, understanding the assets you're protecting is essential. The project's primary objectives were to provide visibility into all critical OT assets across the fleet, enable a common dashboard to monitor security vulnerabilities and threats associated with these assets, and enhance incident response capabilities.
Data Governance
Executive Sponsor: Elliott Franklin, CISO
Project Team: Rafal Baran (VP of Information Security Operations), Harlan Harris (IT Security Architect), Brianna Toney (Project Manager), Elliott Franklin (CISO)
As a backbone of cyber security and privacy programs, data governance allows for clear understanding of the key risk areas. The team has developed and implemented a data governance processes connected with the Data Loss Prevention controls across in-house data and information stored by third parties. This includes ownership of data, classification, encryption, and backups with DLP over web, hardware, and email.
I-Shield: Simplified Secure Access
Executive Sponsor: Swatantr Pal, Deputy CISO
Project Team: Asad Lambate (Assistant Vice President)
To adopt a risk-based approach to Identity and Access Management (IAM), ensuring the highest level of assurance for privileged users, simplify the process for non- privileged users and vigilantly monitoring user identity configurations and actions.
Office of CISO: Customer Security Trust to Drive Revenue
Executive Sponsor: Jack Ledeicker, CISO
Project Team: Jack Ledeicker (CISO), Michael Sinitiere (Senior Director), Justin Unton (Principal), Jesse Raymond (Senior Security Strategist), Vanessa Sauter (Security Strategist), Thu Koehler (Security Strategist)
Gong is a Revenue Intelligence SaaS company with over 4,000 customers globally. Gong is rated as a High to Critical risk vendor which elevates the expectations for the security program. Gong’s Office of CISO embarked upon an 18-month+ initiative to build capabilities to transform how Gong prospects and customers evaluate the security, privacy, and AI intelligence of how Gong secures their data. It yielded some amazing results to help drive revenue at Gong.
Secure Fastconnect + SD-WAN
Executive Sponsor: Malvin Eanes, BISO
Project Team: Malvin Eanes (BISO), Kerrell Hurt (Head of Global Deployment and Hotel Infrastructure), Alvin Smith (VP of Global Infrastructure), Travis Welch (Network Engineer), Alvin Neale (Technical Consultant), Samuel Sims (Sr Engineer), Mark Moore (Director), AT&T Partnership (5 team members), Digital Hands Partnership (12 team members), Fortinet Partnership (6 team members)
This project was a security-driven business enabler. We transformed 4200 hotels across North and Latin America with a secure improved guest experience and network reliability through the implementation of new SIEM services, encryption, and SD-WAN.
Proactive Fraud Identification Tool
Executive Sponsor: Max Garcia, Executive Director & CISO
Project Team: Maximo Garcia (Executive Director & CISO), Nikola Spasojevic (Information Security Consultant), Marko Vicentijevic (Information Security Consultant), Clay Morgan (Senior Software Support Manager), Vicent Alonzo (Software Support Engineer), Robert Albrich (Software Support Engineer), Christopher Patrick (Software Support Engineer), Paul Wan (Communications Senior Specialist)
A self-service tool to provide NCR Voyix financial institution customers with information about suspicious user activity identified by our security experts. The suspicious activities displayed in this tool are identified by reviewing unique data patterns associated with previously confirmed fraud using data elements like IP addresses and specific event sequences. With this data, our customers can quickly assess these cases resulting in potential loss prevention.
Text Abuse Project
Executive Sponsor: Susan Koski, CISO and Deborah Guild, Head of Enterprise Technology and Security
Project Team: Debbie Guild (Head of Enterprise Technology & Security), Susan Koski (CISO), Sam Strohm (Security Operations Director), David Butler (Senior Manager, Enterprise Infrastructure), Mary Beach (Portfolio Management Director), Samba Lampich (Digital Product Manager Lead), Tony Marmo (Deputy General Counsel), Jacqueline Kahwash (Security Manager), Micah Semon (Security Staff Manager), Dale Wisehart (Security Specialist), Cindy Hopson (Senior Security Specialist), Michael Rimkus (Security Manager), Sarah Schuilenburg (Senior Manager, Digital Product Management), Jessica Taverna (Technology Communications Lead), D'Elda Faciane-Lewis (Project Manager), RJ Permuka (Senior Security Manager), Evan Kinney (Security Specialist), Christine Pochis (Customer Experience Group Manager)
After observing an uptick in phishing text messages targeting customers, PNC developed a solution and partnered with telecommunications carriers to help reduce this threat. Once successful, the team socialized this model with the financial industry.
Qualified Access Request & Fulfillment for GxP Systems
Executive Sponsor: Mark Leary, Chief Information Security Officer
Project Team: Edwin Wong (Associate Director, Information Security), Liam Cummins (Senior Director, IOPS IT), Roshan Raj (Associate Director, IT Architect)
Regeneron's manufacturing teams rely on highly regulated systems where access requests require extensive documentation and validation. Our Qualified Access Request (QAR) solution automates the process and maintains auditable records for key systems.
Leveraging ASM, CSPM and SSPM for Cloud Security
Executive Sponsor: Raymond Kernea, Director of Information Security
Project Team: Leo Longoria (Information Security Engineer Senior), Chris Weaver (Information Security Analyst I), Austin House (College Co-op Associate)
Strategic effort to improve cloud security using Attack Surface Management (ASM), Cloud Security Posture Management (CSPM), and SaaS Security Posture Management (SSPM) providing comprehensive defenses enhancing our overall security posture in the face of potential cyber threats.
Identity Security Transformation
Executive Sponsor: David Hetzler, Director, Cybersecurity - Identity & Access Management
Project Team: David Hetzler (Cybersecurity - Director Identity and Access Managment), Stefano Micocci (Cybersecurity - Sr. Mgr. Identity Security and Privileged Access Management), Varun Sharma (Cybersecurity - Mgr. Identity Security), Imthiyas Rahimgani (Cybersecurity - Staff Engineer), Craig Pardini (Cybersecurity - Sr. Engineer), Muralikrishna Nalamothu (Cybersecurity - Sr. Engineer), Josue Rodriguez (Cybersecurity - Sr. Engineer), Vishal Jaitly (Cybersecurity - Mgr. Identity Security), Oscar Dodd (Cybersecurity - Sr. Engineer), Jim Lairmore (Cybersecurity - Sr Mgr. Data and Directory Services, Public Key Infrastructure, Authentication and Password Management), Neal Clark (Cybersecurity - Mgr. Authentication and Password Management), Stephen Ewell (Cybersecurity - Staff Engineer), Kavitha Pendela (Cybersecurity - Staff Engineer), Michael Pass (Cybersecurity - Staff Engineer), Praveen Namboodiri (Cybersecurity - Staff Engineer), Kavitha Pendela (Cybersecurity - Staff Engineer), Chetan Veeramachaneni (Cybersecurity - Staff Engineer), Kalen Collins (Cybersecurity - Sr. Engineer), Purnachander Korepelly (Cybersecurity - Sr. Engineer), Sashi Garlapati (Cybersecurity - Sr. Engineer), Agam Patel (Cybersecurity - Sr. Engineer), Megan Fotter (Cybersecurity - Distinguished Engineer), Nagaraju Gorrepati (Cybersecurity - Principle Engineer)
The Home Depot modernized its' technology stack for identities by enhancing lifecycle events, certifications, access requests and password management for 500K workers by consolidating 8 legacy technologies, into 2 central SailPoint platforms.
Insider Threat
Executive Sponsor: Peter Rosario, Chief Information Security Officer
Project Team: Tony Carrocera (Security Engineer), Sean Strait (Information Security Manager), Yasmeanne Gray (Information Security Analyst), Roland Tewom (Information Security Analyst), Tria Correll (Information Security Analyst), Lorenzo Lugo (Information Security Analyst)
Identifying where USI IP or Client data is being exfiltrated in breach of company policy. In order to accomplish this, our SIEMs ingest around 400 million logs a day and generate anamolies for further review by an analyst. The logs are generated by approx. 2000 servers, 250 firewalls, Card Access readers from 190 offices, Printer logs from approx 400 printers, DLP and VPN activity. The SEIMs collect the logs and our User Behavior Analytics tools, identifies High Risk Users, that have displayed abnormal behaviors.