ISE® Southeast Schedule of Events 2012

March 13, 2012

11:00am - 1:30pm: Registration

Location: Buckhead Prefunction (Lobby level)

11:30 AM : ISE Southeast Nominee Welcome Luncheon & Presentation   *Invitation Only

Location: Buckhead Ballroom 1

Sponsored by

  core security

Core Security Overview  > Download Presentation

Dave Shackleford

Dave Shackleford
Founder & Principal Consultant
VooDoo Security
Biography

Effective Cyber Risk Mitigation  > Download Presentation
As enterprises expand globally and the infrastructure supporting this growth expands, how can you keep pace with the security requirements?  A variety of solutions provide “silohed” points of security, but without the ability to synthesize these disparate technologies and the data they produce, it’s hard to understand your overall security status.  A new way of looking at this problem includes proactively identifying critical risks and matching them to unique business objectives, operational best practices, and regulatory mandates. It is now possible through real-time analytics to transform disparate security data into concise, actionable information, so your security organizations can get ahead and stay ahead of enterprise threats - for the first time.

1:00 PM : Welcoming Remarks and Introductions

Location:Woodruff Room
Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

1:15 PM : Keynote Address

Location: Woodruff Room
Chris Ray

Chris Ray
Chief Information Security Officer
Epsilon
ISE® Southeast Executive Award Winner 2011

Prioritizing Risks in a Corporation  > Download Presentation
Companies are introducing more and more technologies into their organization every day.  As the person in charge of protecting the company and ensuring that those technologies do not introduce excessive risk to your company, CISOs are faced with the daunting task of trying to “keep up” with the requests while also being challenged with supporting the business and (in general) making life more convenient.  This discussion provides some fundamental steps that CISOs can take to prioritize risk and be successful within their organization – while also keeping their sanity!

1:45 PM : Interactive Executive Roundtables

Location:Woodruff Room

The Interactive Executive Roundtables brings together ISE® Nominees, industry leaders, invited guests, and sponsor delegates to meet each other and join in interactive discussions on key industry issues as well as share best practices.  The interactive roundtable discussions are hosted by our ISE® Judges and Nominees.

Threat Intelligence: Knowledge is Power

Brad Sanford

Brad Sanford
Chief Information Security Officer
Emory University
ISE® North America Healthcare Executive Award Winner 2011

Read Roundtable Discussion Summary
Today’s cyber threat actors are unwaveringly focused on the theft of intellectual property, mission-critical details, and other sensitive information, continually evolving their methods and routinely defeating traditional approaches to defense. As organizations work to thwart the attackers, they find themselves in an escalating arms race with unseen attackers. To combat the advanced, persistent and constantly morphing threats, organizations need the very best security intelligence delivered immediately. However, conventional security technologies typically lack the innate intelligence to deal with rapidly emerging threats and web innovation. As a result, current approaches to threat management often fail due to limited threat intelligence, a lack of event context and gaps associated with this lack of visibility. Further, conducting threat intelligence is tedious and time-consuming. Most security teams are already overburdened with other initiatives. Without ongoing threat vigilance, most organizations stand to find themselves in a constant, reactive state, trying to limit damage after outbreaks occur.

Building Trust in the Cloud: Managing the Risk

Jerry Archer

Jerry Archer
Senior Vice President, Chief Security Officer
Sallie Mae
ISE® North America Commercial Executive Award Winner 2011

Read Roundtable Discussion Summary
Cloud computing has accelerated the rapid adoption of digital business models and given rise to a breed of sophisticated business user who can choose which services to use and combine them at will. Cloud computing clearly delivers value in terms of flexibility, scalability, cost savings and the ability to focus on the core business. But in exchange for speed and efficiencies, organizations are increasing their dependency on third parties and making business trade-offs that may be risky due to a lack of expertise by the person making the outsourcing decisions. Further, as organizations become locked in to a cloud provider, they face compliance, contracting, legal and integration risks.

Traditional approaches to security do not translate easily to the cloud environment and questions about transparency, acceptable risk, disaster recovery, business continuity and actual costs savings persist. Top-of-mind cloud security issues include data breaches related to mobile device data, the need for better access control and identity management, ongoing compliance concerns, the risk of multiple tenants and the emergence of cloud standards and certifications.

Mobile Device Management: Balancing Business Agility and its Risk

Mark Leary

Mark Leary
Chief Information Security Officer
TASC
ISE® Southeast Executive Award Winner 2010

Read Roundtable Discussion Summary
With the astonishing influx of smartphones, mobile devices and tablets into enterprises, mobile data has become a foundation of the daily operations of businesses around the world. Not only has data itself become more mobile, but the users holding that data have as well. It is the job of the IT organization to make this ‘mobile user experience’ no different than if the user was inside the office and connected to the network, and just as secure. While employees relish the anywhere, anytime power of smartphones and tablets, IT executives shudder at the security risks associated with the advent of free-roaming, employee-owned devices that have direct access to the corporate data. With inadequate mobile security solutions and a lack of understanding or disregard of company security policies by employees, mobile users routinely put sensitive data at risk and are often completely unaware of the inherent risks.

Practical Security Management: Getting Back to Basics

Tim Callahan

Tim Callahan
Senior Vice President, Enterprise Business Continuity and Information Assurance
SunTrust
ISE® Northeast People's Choice Award Winner 2009, ISE® North America Executive Award Finalist 2009, ISE® Northeast Executive Award Finalist 2009, ISE® Northeast Executive Award Finalist 2007, ISE® Southeast People's Choice Award Winner 2006, ISE® Southeast Executive Award Finalist 2006

Read Roundtable Discussion Summary
With the media continuing to report on the latest security incidents and malware du jour, it’s tempting to view the constant stream of high-profile data breaches as proof of the advanced capability of the faceless adversary. Driven by the seemingly endless stream of news-making exploits, organizations increasingly are relying on the latest technology as a silver bullet in defending against attacks.

Many organizations put safeguards in place without actually thinking things through and apply defenses around business processes that lack a stable foundation and employees that lack the most basic knowledge of security. With all the money invested in security solutions, most organizations still fall short in protecting against the same threats that they've faced for the last 10 years. Phishing, SQL injection, malicious attachments, social engineering. Old, every one of them. And yet, very effective at compromising networks in some of the best-known companies.

2:30pm - 7:00pm : Registration

Location: Prefunction C,D,E (4th floor)

2:45 PM : Break

2:55 PM : Nominee Showcase Presentation #1

Location: Woodruff Room
Chris Ray

Chris Ray
Chief Information Security Officer
Epsilon
ISE® Southeast Executive Award Winner 2011

Prioritizing Risks in a Corporation  > Download Presentation
Companies are introducing more and more technologies into their organization every day.  As the person in charge of protecting the company and ensuring that those technologies do not introduce excessive risk to your company, CISOs are faced with the daunting task of trying to “keep up” with the requests while also being challenged with supporting the business and (in general) making life more convenient.  This discussion provides some fundamental steps that CISOs can take to prioritize risk and be successful within their organization – while also keeping their sanity!

3:15 PM: Industry Crossroads Panel Discussion

Location: Woodruff Room

An industry cross section of ISE Alumni and leading security executives explore today’s hottest security trends and issues and the key challenges they are facing now and in the future.

Moderator

Tony Spinelli

Tony Spinelli
Senior Vice President, Chief Security Officer
Equifax

ISE® Southeast Award People’s Choice Winner 2007

Panelists

Phil Agcaoili

Phil Agcaoili
Chief Information Security Officer
Cox Communications
ISE® Central Executive Award Winner 2009

Jerry Archer

Jerry Archer
Senior Vice President, Chief Security Officer
Sallie Mae
ISE® North America Commercial Executive Award Winner 2011

Paul Connelly

Paul Connelly
Vice President and Chief Information Security Officer
Hospital Corporation of America (HCA)
ISE® North America Executive Award Winner 2009

Mark Reardon

Mark Reardon
Chief Information Security Officer
State of Georgia

4:00 PM : Nominee Showcase Presentation #2

Location: Woodruff Room
David Billeter

David Billeter
Vice President Information Security
InterContinental Hotel Group
ISE® North America Commercial Executive Award Winner 2011

The Hotel Security Program
David Billeter will walk us through how IHG implemented a hotel security program for its 700 managed and 3,300+ franchised locations. His presentation will discuss the elements involved in the project, such as, implementing a managed security portfolio of: firewalls, IPS, scanning, log monitoring, POS software agents and other supporting technology across their global infrastructure.

4:20 PM : Nominee Showcase Presentation #3

Location: Woodruff Room
Steve Mead Steve Mead
Technical Director of Information Security and Disaster Recovery
CSX
Biography

CSX Solves IAM Mainframe Challenges, Lays Foundation for Future > Download Presentation
CSX, a mature organization with a heavy reliance on mainframe, wanted to address challenges with the “silo” structure of their enterprise environment and provide a flexible, scalable identity management foundation to support the organization for the future. The existing solution required manual processes to accommodate identity management tasks such as provisioning, servicing system access requests, user password self-service, and synchronization of user data from their source of identity authority.  Steve Mead will share how CSX engaged Logic Trends, a FishNet Security company, to develop the strategic plan and execute the integration of Identity Forge for mainframe integration and Microsoft Forefront Identity Manager (FIM) 2010 to solve for these challenges while ensuring long-term sustainability, enabling growth and improving operational efficiency.

4:45 PM: Late Afternoon Break

5:00 PM : VIP Reception (invitation only)

Location: Buckhead Ballroom I

ISE® Nominees, sponsors and special guests will have the opportunity to network in a private setting with beverages and appetizers.

6:00 PM : Sponsor Pavilion and Dinner Buffet

Location: Prefunction Grand Ballroom, 4th floor

Guests enjoy gourmet dinner while networking and meeting the sponsors.  Honoring and celebrating the Canada Award Nominees for 2013, this exciting occasion will bring together top security executives to recognize the individuals who have made significant and positive impact on their organizations through exemplary performance.

7:00 PM : ISE® Southeast Awards Gala

Location: Grand Ballroom AB, 4th floor

Honoring and celebrating the ISE® Southeast Award Nominees, this exciting occasion will bring together top security executives to recognize the individuals and the project teams who have made significant and positive impact on their organizations through exemplary performance.

9:00 PM : Champagne & Dessert Reception

Location: Prefunction Grand Ballroom, 4th floor

Enjoy champagne and dessert while celebrating the winners, nominees and project teams. Don't miss the Passport for Prizes drawing and a chance to win outstanding gifts from our ISE® sponsors.