ISE® NORTHEAST PRIVATE WELCOME DINNER
Why Traditional Security Approaches Fail in Agile Infrastructure: And What to Do About It
David Ritenour
Managing Director, CISO
Blackrock Inc.
Enterprises continue to invest heavily in virtualized and cloud-based infrastructures. The era of elastic IT resources is here and it’s automated, on-demand and self-provisioning. This movement has not been so easy for some as more traditional security tools don’t always function as intended in cloud computing models. Security and compliance teams are learning that force fitting old security approaches can result in increased threats, lots of manual effort and delays in responding to the business. What’s needed is a new approach that allows businesses the freedom to take full advantage of agile infrastructure, while at the same time delivering comprehensive protection of critical assets. Join our conversation to learn how to deliver a more agile, efficient and effective security strategy that will enable your enterprise to fully capitalize on the many benefits of dynamic infrastructure.
October 4, 2016
11:00am: Registration
Location: Ambassador Foyer – 2nd Floor
11:30 AM : ISE® Signature Luncheon *Invitation Only
Location: Ambassador 2, 2nd floor
Sponsored by
Kyle Waddle
Vice President, Corporate Information Security
Comcast Corporation
Biography
Information Security Iceberg: Fueling a Collaborative Environment to Securely Share Your
Mission-Critical Information
A great deal of your company’s data now lives outside the company perimeter, on unmanaged devices and in storage repositories, which are not protected by traditional firewalls. Network file servers and corporate document management systems can no longer sufficiently serve as the control points for sensitive documents and files. The need to collaborate securely across international boundaries creates additional challenges for your business.
Major breaches proliferating across media have elevated information security as a top-of-mind issue for many business leaders. Are we truly safeguarding against data privacy and data security — or are these breaches the tip of the iceberg?
Join us for a candid discussion with your peers as we calculate the impact of information security from a risk and cost perspective and explore real-world challenges in protecting information. We will address the biggest challenges your organization is facing and learn best practices for balancing business objectives while fueling a secure, collaborative work environment
1:00 PM : Welcoming Remarks and Introductions
Location: Ambassador 3, 2nd Floor
Marci McCarthy
CEO and President
T.E.N.
Biography
T.E.N.'s CEO & President will welcome guests, provide an overview of the program agenda and event purpose, and introduce the speakers and sponsors of the ISE® Northeast Executive Forum and Awards 2016.
1:10 PM : Keynote Address
Location: Ambassador 3, 2nd Floor
Painting the Bigger InfoSec Picture
Dennis Dickstein
Chief Operating Officer
UBS Wealth Management
Author of "No Excuses"
Biography
1:45 PM : Interactive Executive Roundtables
Location: Ambassador 3, 2nd Floor
The Interactive Executive Roundtables brings together ISE® Nominees, industry leaders, invited guests, and sponsor delegates to meet each other and join in interactive discussions on key industry issues as well as share best practices. The interactive roundtable discussions are hosted by our ISE® Judges and Nominees.
Help or Hindrance? Looking at the Benefits and Flaws of Encryption-Based Security
No Longer Left to Their Own Devices: Hacking Concerns with the Internet of Things
Linda Cooper Angles
Chief Information Security Officer
Conduent
Protecting Data: Keeping the Keys to the Kingdom Out of the Hands of Hackers
Frank Aiello
SVP, Chief Information Security Officer
MAXIMUS
ISE® Northeast People's Choice Award Winner 2016
ISE® Northeast Executive Award Finalist 2016
Biography
Businesses Without Borders: International Information Exchange in a Cloud-Based World
Donna Nemecek
Senior Vice President
BNY Mellon
ISE® Northeast Executive Award Finalist 2013
Biography
2:45 PM : Break
3:00pm : Registration
Location: New York Atrium, 9th floor
2:55 PM : Nominee Showcase Presentation #1
Location: Ambassador 3, 2nd Floor
Charles Hudson
Executive Director, Security Strategy and Architecture
Comcast Corporation
ISE® Northeast People's Choice Award Winner 2014
ISE® Northeast Executive Award Finalist 2014
ISE® North America Executive Award Finalist 2014 - Commercial Category
Biography
Ascertaining and Defending Assets at Risk
With more than 100,000 employees and 70,000 vendor accounts having access to Comcast data, endpoints, servers and applications, the biggest challenge is maintaining the confidentiality, integrity and availability of the assets holding the crown jewels. Comcast’s Assets at Risk Program, powered by Bay Dynamics’ Risk Fabric Cyber Risk Analytics platform, is an innovative risk based asset-centric program that protects high-value assets (data, systems, and applications) from threats and vulnerabilities. The program enables Comcast to measure, communicate and reduce cyber risk. It engages Line-of-Business application owners in an innovative way to provide asset value and business context which is used for prioritized investigation and remediation. Join our conversation to learn more about how involving the right users, understanding the assets at risk, and focusing on the metrics that matter, has allowed Comcast to decentralize risk from the security organization and effectively communicates cyber risk to key stakeholders.
3:15 PM: CISO Deep Dive: Executive Leadership
Location: Ambassador 3, 2nd Floor
An industry cross section of ISE Alumni and leading security executives explore today’s hottest security trends and issues and the key challenges they are facing now and in the future.
Moderator
Pete Lindstrom
VP, Security Strategies
IDC
Biography
Panelists
David Billeter
Chief Information Security Officer
Travelport
ISE® North America Commercial Executive Award Winner 2011
Biography
Rick Comeau
Advisor, Commercial
Intralinks
Biography
Lou Saviano
Vice President, Global Information Technology Services
Skillsoft Corporation
ISE® Northeast People's Choice Award Winner 2015
Biography
John Schramm
Global Head of IT Risk and Security
MunichRE
ISE® North America Executive Award Finalist 2014 - Financial Category
Biography
Dr. Robert Zandoli
Global Chief Information Security Officer
BUNGE, LTD
ISE® Northeast Executive Award Finalist 2010
Biography
4:00 PM : Nominee Showcase Presentation #2
Location: Ambassador 3, 2nd Floor
Natalia Kory
CTO
Clarient Global LLC, DTCC company
Biography
Ajoy Kumar
Director & Business Information Security Officer
DTCC
Biography
Client Data and Onboarding – Simplified.
Clarient Global LLC (Clarient) is a DTCC company founded with BNY Mellon, Barclays, Credit Suisse, Goldman Sachs, JPMorgan Chase and State Street. Clarient provides a centralized entity data and document utility, Clarient Entity Hub, to address global financial market participants’ needs for greater control, transparency, and cost reduction in response to evolving risk management and regulatory requirements. Clarient Entity Hub is a secure entity data and documentation platform that collects, maintains and allows for the sharing of legal entity information with counterparties, through one centralized interface. Join our conversation to learn more about how the Clarient Entity Hub streamlines interactions between market participants and their clients, and allows critical data to become digitized and dynamic.
4:20 PM : Nominee Showcase Presentation #3
Location: Ambassador 3, 2nd Floor
Larry Wilson
Chief Information Security Officer
University of Massachusetts
ISE® Northeast Executive Award Finalist 2013
ISE® North America Executive Award Finalist 2013 - Academic/Public Sector Category
Biography
Securing a Future for the Cybersecurity Professionals of Tomorrow
Earlier in 2015, key representatives of the UMass President’s Office met with the management team from a higher education consortium in Boston to discuss how UMass could assist consortium members with the design, implementation and operations of their cybersecurity programs. After a detailed discussion and review of the key UMass capabilities, a pilot program was initiated. The UMass team continues to provide services to other universities and is in discussions with other under-resourced markets including small to mid-size banks and insurance companies, law firms, K-12 schools, cities and towns, etc. The pilot program has since expanded to a fully managed offering under MAST Cybersecurity Services. The program offers real benefits to students, faculty, university administration and most importantly companies who are depending on a skilled cybersecurity workforce. Join our conversation to learn how the UMass team are changing the way we think about higher education and helping advance the cybersecurity skills of our current and future workforce.
4:45 PM: Late Afternoon Break
5:00 PM : VIP Reception (invitation only)
Location: Pearl, 9th Floor
ISE® Nominees, sponsors and special guests will have the opportunity to network in a private setting with beverages and appetizers.
6:00 PM : Sponsor Pavilion and Dinner Buffet
Location: New York Atrium, 9th floor
Guests enjoy gourmet dinner while networking and meeting the sponsors. Honoring and celebrating the award nominees for 2015, this exciting occasion will bring together top security executives to recognize the individuals who have made significant and positive impact on their organizations through exemplary performance.
7:30 PM : Sponsor Tear Down
Location: New York Atrium - 9th floor
7:45 PM : ISE® Northeast Awards Gala
Location: Majestic Ballroom, 5th floor
Honoring and celebrating the ISE® Northeast Award Nominees, this exciting occasion will bring together top security executives to recognize the individuals and the project teams who have made significant and positive impact on their organizations through exemplary performance.
9:00 PM : Champagne and Dessert Reception
Location: Majestic Ballroom, 5th floor
Enjoy champagne and dessert while celebrating the winners, nominees and project teams.