ISE® Northeast Schedule of Events 2010

October 7, 2010

11:00am: Registration

1:00 PM : Welcoming Remarks and Introductions

Location: Ambassador 3, 2nd Floor
Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

1:15 PM : Keynote Address

Location: Ambassador 3, 2nd Floor
John Walp

John Walp
Administrative Vice President and CISO
M&T Bank Corporation
ISE® Northeast Executive Award 2009 Winner

Cyber Security - A Wake-Up Call
As cyber criminals have made global headlines in 2010, the threat from this growing menace is causing a fundamental shift in how information security professionals define protection of their company's most valuable digital assets. No longer can a large corporation depend on the aspect of perimeter defense, as we’ve seen some of the greatest risks to business’s most valuable data,  have come from the enemy within. International Organized Crime has leveraged the Internet to routinely raid our nation’s largest corporations and pilfer terabytes of intellectual property. The threat from malware such as Zeus has undermined our confidence in tried and true security controls such as anti-virus. Consumers and business have recorded record losses from Internet crime and there seems to be no end in sight to the speed and complexity of the attacks.

2:15 PM : Interactive Executive Roundtables

Location: Ambassador 3, 2nd Floor

The Interactive Executive Roundtables brings together ISE® Nominees, industry leaders, invited guests, and sponsor delegates to meet each other and join in interactive discussions on key industry issues as well as share best practices.  The interactive roundtable discussions are hosted by our ISE® Judges and Nominees.

View Roundtable Topics and Guest Moderators

3:30 PM : Break

2:55 PM : Nominee Showcase Presentations

Location: Ambassador 3, 2nd Floor

David Smith
CISO
Georgetown University
Biography

The Collaborative Cyber Security Response Project  > Download Presentation
In this presentation, these thwo distinguished institutes will discuss how they signed a Memorandum of Understanding for emergency preparedness and response, cutting across all service sectors. As the lead cyber security specialists they felt it was important to address the opportunities to share resources in the event of a large scale cyber security event.  They will  share their collaborative efforts, implementation and results.


Thomas Dunbar

Thomas Dunbar
SVP, Head of Information Risk Management
XL Catlin
ISE® Northeast Executive Award Finalist 2010
Biography

XL’s IT Sourcing Strategy  > Download Presentation
In this presentation, Tom Dunbar will discuss the key initiatives involved in how XL outsourced the monitoring of security devices including firewalls, intrusion detection, intrusion prevention, and log files to BT Counterpane.  Tom worked with Counterpane leadership through their customer advisory program to help improve the services provided by Counterpane.  Counterpane demonstrated their threat monitoring dashboard and Tom along with his VP, IT Security, suggested that the XL Group provide a similar dashboard for their customers.  Tom and his team worked with Counterpane to create a customer version and have a proof of concept running at XL.  Tom will share with the conception of this dashboard and provide explanations as to what the various metrics and threat levels represent.


Daniel Conroy

Daniel Conroy
Managing Director and Head of the Information Security Group
BNY Mellon Corporation
ISE® Northeast Executive Award Finalist 2010
Biography

Social Media  > Download Presentation
Daniel Conroy will present his role as the champion of a project to control BNY Mellon’s internal social media and collaborative tools. Many corporations have adopted and implemented policies concerning the appropriate use of web-facing social networking sites, such as Facebook, MySpace, and LinkedIn.  However, few, if any, organizations have established policies regarding the implementation and use of social networking sites resident on a corporate intranet.  These forms of social media, available only to internal staff, may contain personal profiles (usually offering basic biographical information, together with a photograph), blogs, chat forums, and other interactive features.  Because these internal sites may be readily accessible, and because they pose the risk of serving as repositories of sensitive information, Daniel will share how he and his team established and implemented a policy pertaining to the creation and use of internal social media.

5:00 PM : VIP Reception (invitation only)

Location: Pearl, 9th Floor

ISE® Nominees, sponsors and special guests will have the opportunity to network in a private setting with beverages and appetizers.

6:00 PM : Sponsor Pavilion and Dinner Buffet

Location: New York Atrium, 9th floor

Guests enjoy gourmet dinner while networking and meeting the sponsors. Honoring and celebrating the award nominees for 2013, this exciting occasion will bring together top security executives to recognize the individuals who have made significant and positive impact on their organizations through exemplary performance.

7:30 PM : ISE® Northeast Awards Gala

Location: Majestic Ballroom, 5th floor

Honoring and celebrating the ISE® Northeast Award Nominees, this exciting occasion will bring together top security executives to recognize the individuals and the project teams who have made significant and positive impact on their organizations through exemplary performance.

9:00 PM : Champagne & Dessert Reception

Location: Majestic Foyer, 5th floor

Enjoy champagne and dessert while celebrating the winners, nominees and project teams. Don't miss the Passport for Prizes drawing and a chance to win outstanding gifts from our ISE® sponsors.