ISE® Northeast Private Welcome Dinner
Joe Bernik
SVP Risk
HSBC
Big Security – Are Enterprise Networks Too Complex to Secure Sufficiently
The cyberspace environment is extremely dynamic with new vulnerabilities and threats emerging daily. The growing complexity of enterprise networks in a global economy compounds the challenge for security leaders, who must develop and employ various offensive and defensive strategies to defend the enterprise and minimize risks while maximizing the value of their investments. Join our discussion to learn how your peers are addressing the growing complexity of enterprise-wide network security, and share your own insights on protecting your enterprise in the evolving threat landscape.
October 9, 2014
10:00am: Registration
Location: Pre-function area of Ambassador Ballroom, 2nd floor
11:30 AM : ISE® Northeast Nominee Welcome Luncheon *Invitation Only
Location: Ambassador 2, 2nd floor
Sponsored by
David Corlette
Product Manager
NetIQ
When Tinfoil Hats Aren't Enough: Effective Defenses Against Advanced Persistent Threats (APTs) > Download Presentation
You probably know about the threat posed by APTs. You also may know that most experts will tell you that there are no cost-effective ways to completely prevent a determined attacker from getting into your systems. So what to do? Since returning to an agrarian society is likely not a viable option, this presentation will cover common APT techniques and ways to detect those techniques in action and rapidly react. We'll talk about how to leverage the Identity-powered enterprise to improve the accuracy and effectiveness of prevention, detection, and response.
1:00 PM : Welcoming Remarks and Introductions
Location: Ambassador 3, 2nd Floor
Marci McCarthy
CEO and President
T.E.N.
Biography
1:10 PM : Keynote Address
Location: Ambassador 3, 2nd Floor
Dr. Edward G. Amoroso
CISO, Vice President, AT&T Security Center of Excellence
AT&T
ISE® Luminary Leadership Award Winner 2005
ISE® North America Executive Award Finalist 2005
Discussion of Current Issues in Cyber Security
This talk will include timely and real-time analysis and discussion of current issues in cyber security, security infrastructure protection, and large-scale attacks.
1:40 PM : Adobe Executive Address
Location: Ambassador 3, 2nd Floor
Jim Hong
Director, SPLC (Secure Product Lifecycle) Program Management
Adobe
Maintaining a Security Organization That Can Adapt to Change > Download Presentation
According to Forrester Research, 51% of organizations say it’s a challenge or major challenge to hire and keep security staff with the right skills. This becomes especially challenging in a constantly changing organization managing acquisitions, changing business objectives, and rapid growth. While investing in security technology is important to stay ahead of threats, failure to invest properly in your people can introduce systemic and cultural risk that can be more challenging to manage than technical threats. This presentation will discuss the keys to not only getting the best people, but keeping them. Mr. Lenoe will share Adobe’s experiences in managing this very challenging problem along with what we have learned as we have built up our security organization to adapt to our cloud-focused future.
1:55 PM : Interactive Executive Roundtables
Location: Ambassador 3, 2nd Floor
The Interactive Executive Roundtables brings together ISE® Nominees, industry leaders, invited guests, and sponsor delegates to meet each other and join in interactive discussions on key industry issues as well as share best practices. The interactive roundtable discussions are hosted by our ISE® Judges and Nominees.
Wayne Proctor
Director, Information Security and IT Risk Management
UPS
ISE® Southeast Executive Award Finalist 2005
Using Security Intelligence for a Competitive Advantage > Read Summary
Harnessing the power of analytics is nothing new for today’s enterprise IT organizations. The same practices can be put to work for security — analyzing vast quantities of data to find the types of clues and irregularities that could signal an attack. This approach to security analytics is becoming a central aspect of enterprise security as organizations learn they must extend far beyond the traditional perimeter approach to gain complete visibility across the IT infrastructure in order to detect and disrupt attacks. Join the conversation to learn more about this shifting approach to security and why mining Big Data for clues to enable enterprise security action can give you a competitive advantage.
Matthew McKeever
VP of Security and Compliance
Reed Elsevier
Secrets to Achieving End-to-End Email Security > Read Summary
Securing your infrastructure is essential in protecting your customers, but malicious attacks can affect users without even entering your network. The Anti-Phishing Working Group reported 72,758 phishing attacks targeting more than 700 institutions worldwide during the first half of 2013 alone. As Verizon's Data Breach Report shows, 95% of all data breaches begin with a phishing email — evidence that comprehensive ecosystem visibility, email intelligence, and real-time alerting and reporting are imperative to thwarting these attacks. Join our conversation to take a deep dive into advanced email security methodology and learn best practices to achieving end-to-end email security in order to protect your customers and enable business.
Stacey Halota
Vice President, Information Security and Privacy
Graham Holdings
ISE® Mid-Atlantic Commercial Executive Award Winner 2009
The Growing Complexity of IT Security: How Do We Manage? > Read Summary
IT Security is undoubtedly a cat and mouse game. As technology threats grow in complexity, security leaders work tirelessly to develop new methods for identifying and thwarting attacks. But the fact remains— there is no such thing as absolute security. In the future, IT-dependent societies must be capable of withstanding an attack, or surviving an attack and recovering, without the descent into chaos. Join us to take a deep dive into the concept of developing and maintaining resilience as a central focus for your contemporary security strategy.
Larry Wilson
Chief Information Security Officer
University of Massachusetts
CISO as a Salesman: Win Support for Your Key Initiatives > Read Summary
Major information security initiatives can be costly. InfoSec executives too often find that their organization’s leadership may not see the initial financial investment in security as business critical…at least not until data or infrastructure is compromised. A CISO must lead efforts to build consensus for security as a priority in the enterprise by selling the board and c-suite on the benefits of a proactive approach. Join our conversation to learn how to build your business plan, engage the different stakeholders and influence key decision makers — who may not have a technology or security background — in order to gain support and approval for the investment and implementation of vital security initiatives.
2:55 PM : Break
3:00pm : Registration
Location: Pre-Function area of New York Atrium, 9th floor
3:05 PM : Nominee Showcase Presentation #1
Location: Ambassador 3, 2nd Floor
Mark Tehranipoor
Professor
University of Connecticut
Collaboration – The Future of Security & Innovation
In 2012, Comcast joined forces with the University of Connecticut to form the Comcast Center of Excellence for Computer Security Innovation and the Center for Hardware Assurance, Security, and Engineering. This partnership between industry and academia merges two vital areas of expertise to address the 21st century security challenges. The result: these centers are becoming a national recognized authority in hardware, software and network security, ultimately proving the intrinsic value in collaborative efforts between public and private organizations. This presentation will explore how these teams are producing results to improve and protect the nation’s critical infrastructure while also cultivating the next-generation security professionals who will tackle the ever-expanding security challenges in the coming years and decades.
3:25 PM: CISO Deep Dive: Executive Leadership
Location: Ambassador 3, 2nd Floor
An industry cross section of ISE Alumni and leading security executives explore today’s hottest security trends and issues and the key challenges they are facing now and in the future.
Moderator
Ray Hawkins
Chief Information Security Officer
Genesis HealthCare Corporation
Panelists
Robert Mazzocchi
Vice President and CISO
AIG
Jim Routh
Chief Information Security Officer
Aetna
ISE® Northeast Executive Award Winner 2007
Parthiv Shah
Senior Vice President
Chief Information Security Officer
The Clearing House
John Schramm
Vice President of Global Information Risk Management and CIRO
Manulife/John Hancock
4:10 PM : Nominee Showcase Presentation #2
Location: Ambassador 3, 2nd Floor
John Masserini
Chief Security Officer
MIAX Options
ISE® Northeast Executive Award Winner 2010
ISE® North America Executive Award Finalist 2010
More than a SIEM: Security as a Business Enabler
Forward-thinking security leaders are working diligently to position their teams as business enablers, but few have been as successful as the team at MIAX Options. Their “Enterprise-wide Risk Dashboard and Alerting” project is a showcase as to what can be achieved when all of the vested parties within an organization participate in order to bring value of the entire company. While at its core, the project mainly focused on deploying best-of-breed security information and event management solution, the platform built now enables every business unit within the organization – from regulatory compliance to trade operations to security – to monitor, alert and report on corporate-wide risks. This presentation will describe how the MIAX SIEM has become the messaging backbone of the entire MIAX Exchange, arguably one of the fastest Options Exchanges in the world.
4:30 PM : Nominee Showcase Presentation #3
Location: Ambassador 3, 2nd Floor
Charles Hudson
Executive Director, National Governance, Risk and Compliance
Comcast
Just-in-Time: An Innovative, Proactive Approach to Addressing Insider Threats
One major breach after another points to insider threats (both malicious and misguided) as being a major risk for a large enterprise. Many organizations take a traditional approach to training, which offers limited understanding of security policies by end users, resulting in compliance issues and little accountability. Comcast views the future of security as one that is globally contextually aware. Through an innovative integration of more than 25 security tools, the company has developed a program that empowers it’s more than 90,000 users with the information and context they need to make the right decisions at the right time. This presentation will describe Comcast’s blended approach of a contextually aware security solution and Just-in-Time training, and share how the program is scalable and capable of ensuring both large and small organizations can be nimble and constantly drive change to meet corporate, market and regulatory demands.
4:50 PM: Late Afternoon Break
5:00 PM : VIP Reception (invitation only)
Location: Pearl, 9th Floor
ISE® Nominees, sponsors and special guests will have the opportunity to network in a private setting with beverages and appetizers.
6:00 PM : Sponsor Pavilion and Dinner Buffet
Location: New York Atrium, 9th floor
Guests enjoy gourmet dinner while networking and meeting the sponsors. Honoring and celebrating the award nominees for 2013, this exciting occasion will bring together top security executives to recognize the individuals who have made significant and positive impact on their organizations through exemplary performance.
7:30 PM : ISE® Northeast Awards Gala
Location: Majestic Ballroom, 5th floor
Honoring and celebrating the ISE® Northeast Award Nominees, this exciting occasion will bring together top security executives to recognize the individuals and the project teams who have made significant and positive impact on their organizations through exemplary performance.
9:00 PM : Champagne and Dessert Reception
Location: Majestic Foyer, 5th floor
Enjoy champagne and dessert while celebrating the winners, nominees and project teams. Don't miss the Passport for Prizes drawing and a chance to win outstanding gifts from our ISE® sponsors.