ISE® West Schedule of Events 2010

September 16, 2010

11:00am : Registration

Location: Pre-function of Elizabethan Ballrooms C&D, 2nd floor

1:00 PM : Welcoming Remarks and Introductions

Location: Elizabethan C&D, 2nd floor
Marci McCarthy

Marci McCarthy
CEO and President
T.E.N.
Biography

1:15 PM : Keynote Address

Location: Elizabethan C&D, 2nd floor
David Matthews

David Matthews
Deputy Chief Information Security Officer
City of Seattle
ISE® West Executive Award Winner 2008

Finding your Inner Giant – Inspiring Success via the Work We Do
In this opening keynote session, David Matthews will talk about the altruism that motivates leaders in the information security industry.  He will inspire you as Information Security Executives to strive to be "giants in our industry" and better leaders by believing in yourselves and the work you do.  David will share the four “knows” you can use to discover the giant within you.

2:15 PM : Interactive Executive Roundtables

Location: Elizabethan C&D, 2nd floor

The Interactive Executive Roundtables brings together ISE® Nominees, industry leaders, invited guests, and sponsor delegates to meet each other and join in interactive discussions on key industry issues as well as share best practices.  The interactive roundtable discussions are hosted by our ISE® Judges and Nominees.

3:30 PM : Break

3:40 PM : Nominee Showcase Presentations

Location: Elizabethan C&D, 2nd floor
John B. Sapp Jr.

John B. Sapp Jr.
Director, Product Development Standards - Security, Risk & Compliance
McKesson Corporation

Deploying a Cloud Based Application Risk Management Platform  > Download Presentation
In this presentation, John Sapp will explain how he solved McKesson’s application security software and compliance issues with the implementation of a cloud-based application risk management solution. McKesson determined that its software-as-a-service (SaaS) model, coupled with its ease-of-use and scalability fit best with Veracode’s SecurityReview platform.  He will further discuss how the solution is empowering McKesson to have a comprehensive view of its application portfolio and the organization is now able to provide internal and external customers the highest levels of application assurance, while assuring regulatory compliance.

Bill Bonney

Bill Bonney
Sr. Manager Access Management
Intuit
Biography

Automated Identity Governance  > Download Presentation
In this presentation, Bill Bonney will discuss how Intuit is subject to a multitude of regulatory and security requirements relating to the privacy and security of the sensitive financial data it processes, and as a public company, Intuit must also demonstrate compliance with Sarbanes-Oxley. Addressing those compliance and security requirements is exponentially complicated each year when Intuit’s employee ranks grow by almost 50 percent during tax season as it increases call center and other seasonal support staffing. Bob will share with the group that in order for Intuit to meet those challenges they implemented an identity governance program to proactively manage risks associated with user access controls while automating the process of supporting and managing the influx of access changes during the seasonal spike in employees.

Niall Browne

Niall Browne
CISO & VP of Information Security
LiveOps Inc.

Enterprise Security Controls in the Call Center Cloud  > Download Presentation
Niall Browne will present the extensive build of Enterprise Cloud Security controls within the LiveOps Inc. PaaS and SaaS platforms and working to build and roll out data-centric and distributed security controls to more than 20,000 agents operating in distributed environments.

Matthew Archibald

Matthew Archibald
Managing Director and CISO
Applied Materials, Inc.

Global Risk Management & Compliance Program  > Download Presentation
In this presentation, Matt Archibald will share how the Applied Materials team introduced the Program Risk Management methodology developed by the Global Information Services (GIS) , Security & Risk Management group to Applied Materials Corporate Business “Risk Vertical Partners” as well as Business Project Managers in conjunction with a major companywide transformation program.  The tools, process and methodology was used simultaneously in 12 major global programs, consisting of 95 projects and 240 initiatives by managers globally and the Centralized Program Risk office to manage track and mitigate risk across projects and programs. This included formation of the Global Risk Management & Compliance Committee (RMCC).

5:00 PM : VIP Reception (invitation only)

Location: Elizabethan A & B, 2nd floor

ISE® Nominees, sponsors and special guests will have the opportunity to network in a private setting with beverages and appetizers.

6:00 PM : Sponsor Pavilion and Dinner Buffet

Location: Victor's Palace, top floor

Guests enjoy gourmet dinner while networking and meeting the sponsors.  Honoring and celebrating the award nominees for 2013, this exciting occasion will bring together top security executives to recognize the individuals who have made significant and positive impact on their organizations through exemplary performance.

7:30 PM : ISE® West Awards Gala

Location: California Alexandra Ballroom, top floor

Honoring and celebrating the ISE® West Award Nominees, this exciting occasion will bring together top security executives to recognize the individuals and the project teams who have made significant and positive impact on their organizations through exemplary performance.

9:00 PM : Champagne & Dessert Reception

Location: California Alexandra Ballroom, top floor

Enjoy champagne and dessert while celebrating the winners, nominees and project teams. Don't miss the Passport for Prizes drawing and a chance to win outstanding gifts from our ISE® sponsors.