ISE® Northeast Private Welcome Dinner
Dr. Yonesy F. Nuñez
SVP, Corporate Center IS Risk Management Global Information Security
Citi
Sponsored by Stonesoft, this special dinner will provide a forum for candid dialogue on the industry’s most critical issues. During our dinner conversation, "Beyond Next Generation Security: Applying Cyber Offense and Defense to Protect Business," learn how your peers are addressing advanced threats from internal, external and global sources, and share your own insights on protecting your enterprise in the evolving threat landscape.
October 3, 2013
10:00am: Registration
Location: Pre-function area of Ambassador Ballroom, 2nd floor
11:30 AM : ISE West Nominee Welcome Luncheon & Presentation *Invitation Only
Location: Ambassador 2, 2nd floor
Sponsored by
Michael Colson
Sr. Product Manager, Security Products
NetIQ
Re-Evaluation of Response to Advanced Persistent Threats > Download Presentation
Advanced Persistent Threats (APTs) are a significant challenge for even the most sophisticated security team. NetIQ will examine some of the recent research findings on APTs, and discuss real-world strategies to reduce the risk of these complex and pervasive threats.
1:00 PM : Welcoming Remarks and Introductions
Location: Ambassador 3, 2nd Floor
Marci McCarthy
CEO and President
T.E.N.
Biography
1:15 PM : Keynote Address
Location: Ambassador 3, 2nd Floor
Jim Routh
Chief Information Security Officer
Aetna
ISE® Northeast Executive Award Winner 2007
Is Mobile in your future? Not really… > Download Presentation
As information security risk professionals, you are well acquainted with emerging technology adoption curve that favors functionality over controls (see the rise of the Android in the market). This is particularly true of disruptive technologies that impact consumers and mobile computing is a great example. You probably hear how important it is to develop a mobile strategy by your respective business leaders and your CIOs since mobile computing will continue to grow and influence consumer behavior. This session will present a perspective that mobile computing already arrived and the future is more about the convergence of mobile, social networking and cloud computing technologies and how to apply innovative controls to this convergence as opposed to attempting to manage risk through conventional controls.
1:45 PM : Interactive Executive Roundtables
Location: Ambassador 3, 2nd Floor
The Interactive Executive Roundtables brings together ISE® Nominees, industry leaders, invited guests, and sponsor delegates to meet each other and join in interactive discussions on key industry issues as well as share best practices. The interactive roundtable discussions are hosted by our ISE® Judges and Nominees.
View Roundtable Topics and Guest Moderators
2:45 PM : Break
2:55 PM : Nominee Showcase Presentation #1
Location: Ambassador 3, 2nd Floor
Larry Wilson
Chief Information Security Officer
University of Massachusetts
Embracing a Security-First Approach > Download Presentation
There are no boundaries when it comes to malicious threats — hackers can attack at anytime from anywhere. In order to ensure protection of an organization’s intellectual property, data and assets, a CISO must take a strong security-first approach vs a cumbersome policy-driven, compliance-first approach. For the University of Massachusetts, this involved establishing and automating a controls system to maintain authorized and unauthorized device asset inventory, software assets, security device configurations and continuous vulnerability assessment and remediation. It also involved establishing key alliances with solutions providers in order to deploy the most robust and effective technology solutions available within the allotted budget. Learn how the UMass Security-First Approach significantly improved the security and stability of UMass’ infrastructure, resulting in stable systems with less down time, along with direct ownership.
3:00pm : Registration
Location: Pre-Function area of New York Atrium, 9th floor
3:15 PM: Industry Crossroads Panel Discussion
Location: Ambassador 3, 2nd Floor
An industry cross section of ISE Alumni and leading security executives explore today’s hottest security trends and issues and the key challenges they are facing now and in the future.
Moderator
Dr. Yonesy F. Nuñez
SVP, Corporate Center IS Risk Management Global Information Security
Citi
Panelists
Kevin McGee
Chief Information Risk Officer
CIT Group
Jim Routh
Chief Information Security Officer
Aetna
ISE® Northeast Executive Award Winner 2007
Deborah A. Snyder
Deputy Chief Information Security Officer, Director, Governance Risk Management and Compliance
NYS Office of Information Technology Services, Enterprise Information Security Office
ISE® Northeast People’s Choice Award Winner 2008
4:00 PM : Nominee Showcase Presentation #2
Location: Ambassador 3, 2nd Floor
Andrew Porter
Director of IT Architecture, Bus Sol Strategies MRLIT
Merck
Biography
Redefining B2B Collaboration in the Cloud > Download Presentation
One of the most difficult challenges global corporations face is the need to facilitate collaboration quickly and easily between teams distributed across the globe without creating new risks to security and data control. Merck determined this need was business critical and set forth on the task to develop a system to improve the speed of engagement and provide a single pane of glass for the user to interact with many different systems/databases at Merck. The solution was a secure cloud-based identity hub — the Secure Access Manager (SAM) — which is now serving more than 3,000 employee users and 2,000 partner users from over 220 companies, and meets a highly–available, ‘zero downtime’ service requirement. Learn more about how this service model addressed a business critical need, while also improving the organization’s overall security posture.
4:20 PM : Nominee Showcase Presentation #3
Location: Ambassador 3, 2nd Floor
Yabing Wang
Chief Security Architect, Enterprise Technology & Architecture Services
Allstate Insurance Company
Biography
Embedding Security Early in the SDLC
Because applications are a notorious target for hackers, organizations who do not embed security as a priority early in the software development life cycle expose themselves to huge risks and attacks that often require costly remediation. Through its Application Security Assurance Program, Allstate’s team adopted a holistic approach from people, process, technology and governance perspective and making sure security is embedded into SDLC from the start. As a result, the number of vulnerabilities in the static code scans and penetration tests are trending downward and applications have fewer issues discovered with the static code analysis tool. Learn more about how this project has had a substantial impact across the enterprise.
4:45 PM: Late Afternoon Break
5:00 PM : VIP Reception (invitation only)
Location: Pearl, 9th Floor
ISE® Nominees, sponsors and special guests will have the opportunity to network in a private setting with beverages and appetizers.
6:00 PM : Sponsor Pavilion and Dinner Buffet
Location: New York Atrium, 9th floor
Guests enjoy gourmet dinner while networking and meeting the sponsors. Honoring and celebrating the award nominees for 2013, this exciting occasion will bring together top security executives to recognize the individuals who have made significant and positive impact on their organizations through exemplary performance.
7:30 PM : ISE® Northeast Awards Gala
Location: Majestic Ballroom, 5th floor
Honoring and celebrating the ISE® Northeast Award Nominees, this exciting occasion will bring together top security executives to recognize the individuals and the project teams who have made significant and positive impact on their organizations through exemplary performance.
9:00 PM : Champagne & Dessert Reception
Location: Majestic Foyer, 5th floor
Enjoy champagne and dessert while celebrating the winners, nominees and project teams. Don't miss the Passport for Prizes drawing and a chance to win outstanding gifts from our ISE® sponsors.