ISE® West Schedule of Events 2014

ISE® West Private Welcome Dinner

July 29, 2014
5:30pm - 8:30pm
Morton’s The Steakhouse
400 Post St.
San Francisco, CA 94102
Matthew Archibald

Matthew Archibald
Vice President, Information Security
Silver Spring Networks
ISE® West Award Executive Finalist 2010

Big Security – Are Enterprise Networks Too Complex to Secure Sufficiently
The cyberspace environment is extremely dynamic with new vulnerabilities and threats emerging daily. The growing complexity of enterprise networks in a global economy compounds the challenge for security leaders, who must develop and employ various offensive and defensive strategies to defend the enterprise and minimize risks while maximizing the value of their investments. Join our discussion to learn how your peers are addressing the growing complexity of enterprise-wide network security, and share your own insights on protecting your enterprise in the evolving threat landscape.

July 30, 2014

11:00am - 1:30pm: Registration

Location: Pre-function of Elizabethan Ballrooms C&D, 2nd floor

11:30 AM : ISE West Nominee Welcome Luncheon *Invitation Only

Location: Elizabethan B, 2nd floor

Sponsored by

  net I Q

David Corlette

David Corlette
Product Manager
NetIQ

When Tinfoil Hats Aren't Enough: Effective Defenses Against Advanced Persistent Threats (APTs) > Download Presentation
You probably know about the threat posed by APTs. You also may know that most experts will tell you that there are no cost-effective ways to completely prevent a determined attacker from getting into your systems. So what to do? Since returning to an agrarian society is likely not a viable option, this presentation will cover common APT techniques and ways to detect those techniques in action and rapidly react. We'll talk about how to leverage the Identity-powered enterprise to improve the accuracy and effectiveness of prevention, detection, and response.

1:00 PM : Welcoming Remarks and Introductions

Location: Elizabethan C&D, 2nd floor
Marci McCarthy

Marci McCarthy
CEO and President
T.E.N.
Biography

1:10 PM : Keynote Address

Location: Elizabethan C&D, 2nd floor
Joe Sullivan

Joe Sullivan
Chief Security Officer
Facebook

Injecting Social Into Security  > Download Presentation
Threats today are complex and numerous enough that an organization cannot afford to treat security as a black box or a single team that sits on their own and tries to figure everything out. This talk will explore how Facebook uses social interaction to increase the security of our service, as well as creative programs to get people across the company engaged in our security culture.

1:40 PM : Adobe Executive Address

Location: Elizabethan C&D, 2nd floor
David Lenoe

David Lenoe
Director, Secure Software Engineering
Adobe

Investment in People is the Key to a Security Organization Built for Change  > Download Presentation
According to Forrester Research, 51% of organizations say it’s a challenge or major challenge to hire and keep security staff with the right skills. This becomes especially challenging in a constantly changing organization managing acquisitions, changing business objectives, and rapid growth. While investing in security technology is important to stay ahead of threats, failure to invest properly in your people can introduce systemic and cultural risk that can be more challenging to manage than technical threats. This presentation will discuss the keys to not only getting the best people, but keeping them. Mr. Lenoe will share Adobe’s experiences in managing this very challenging problem along with what we have learned as we have built up our security organization to adapt to our cloud-focused future.

1:55 PM : Interactive Executive Roundtables

Location: Elizabethan C&D, 2nd floor

The Interactive Executive Roundtables brings together ISE® Nominees, industry leaders, invited guests, and sponsor delegates to meet each other and join in interactive discussions on key industry issues as well as share best practices.  The interactive roundtable discussions are hosted by our ISE® Judges and Nominees.

Josh Aberant

Josh Aberant
Postmaster
Twitter

agari

Secrets to Achieving End-to-End Email Security  > Read Summary
Securing your infrastructure is essential in protecting your customers, but malicious attacks can affect users without even entering your network. The Anti-Phishing Working Group reported 72,758 phishing attacks targeting more than 700 institutions worldwide during the first half of 2013 alone. As Verizon's Data Breach Report shows, 95% of all data breaches begin with a phishing email — evidence that comprehensive ecosystem visibility, email intelligence, and real-time alerting and reporting are imperative to thwarting these attacks. Join our conversation to take a deep dive into advanced email security methodology and learn best practices to achieving end-to-end email security in order to protect your customers and enable business.

Vincent Campitelli

Vincent Campitelli
VP of IT Risk Management
McKesson Corporation

Using Security Intelligence for a Competitive Advantage  > Read Summary
Harnessing the power of analytics is nothing new for today’s enterprise IT organizations. The same practices can be put to work for security — analyzing vast quantities of data to find the types of clues and irregularities that could signal an attack. This approach to security analytics is becoming a central aspect of enterprise security as organizations learn they must extend far beyond the traditional perimeter approach to gain complete visibility across the IT infrastructure in order to detect and disrupt attacks. Join the conversation to learn more about this shifting approach to security and why mining Big Data for clues to enable enterprise security action can give you a competitive advantage.

Ramses Martinez

Ramses Martinez
Director of Security
Yahoo!

Cyber Security Legislation: What CISOs Should Know  > Read Summary
Never before has information security been such a globally visible and divisive issue. Cyber attacks by foreign nations, significant national security leaks, and our increasing reliance on technology to run both business and government have spawned Washington to create a cyber security framework to protect the nation’s critical infrastructure. But the proposed legislation is complex and cumbersome, but with a divided Congress there is no guarantee if or when a final version will ultimately be passed into law. Will new legislation have substantial impact on existing policies and procedures? How can CISOs prepare in advance? Join the conversation to discover what every CISO should know about cyber security legislation.

Matthew Archibald

Matthew Archibald
Vice President, Information Security
Silver Spring Networks
ISE® West Award Executive Finalist 2010

Defending Against Advanced Threats in an Ever-evolving Threat Landscape  > Read Summary
The cyberspace environment is extremely dynamic and unfortunately, new vulnerabilities and threats emerge on a daily basis. Security leaders must develop and employ various offensive and defensive strategies to defend the enterprise and minimize risks at an acceptable cost. Join our discussion to learn how your peers are addressing advanced threats from internal, external and global sources, and share your own insights on protecting your enterprise in the evolving threat landscape.

2:30pm - 7:00pm : Registration

Location: Pre-function of Victor’s Palace, top floor

2:55 PM : Break

3:05 PM : Nominee Showcase Presentation #1

Location: Elizabethan C&D, 2nd floor
Max Solonski

Max Solonski
Director of Information Security
BlackLine Systems

Building a Security Program with Risk in Mind
As BlackLine System’s first Director of Information Security, Max Solonski was in the position to build his security program from the ground up. His approach focused on the proactive management of risks and threats with his team maintaining an up-to-date view of the security landscape, projecting that view onto the organizations’ business needs and risk tolerance, and providing daily guidance to all levels within the organization on how to adjust. Learn how this risk-based strategy positioned informationsecurity as a vital business component of the organization, while successfully creating a security and available environment that serves millions of web pages each day.

3:25 PM: CISO Deep Dive: Executive Leadership

Location: Elizabethan C&D, 2nd floor

An industry cross section of ISE Alumni and leading security executives explore today’s hottest security trends and issues and the key challenges they are facing now and in the future.

Moderator

Grace Crickette

Grace Crickette
SVP and Chief Risk and Compliance Officer
AAA NCNU
ISE® North America Executive Award Winner 2011 - Education/Non-Profit Category

Panelists

Jonathan Cannon

Jonathan Cannon
Director, Information Security Intelligence & Incident Response
UPS

Kevin DePeugh

Kevin DePeugh
Vice President, Cyber Security
Kaiser Permanente

Jamil Farshchi

Jamil Farshchi
Chief Information Security Officer
Time Warner
ISE® West Executive Award Finalist 2011

Rich Jackson

Rich Jackson
Senior Advisor to the CIO for Cyber Security
Chevron Corporation
ISE® North America Executive Award Finalist 2006

Nick Shevelyov

Nick Shevelyov
Chief Security & Chief Privacy Officer
Silicon Valley Bank

4:10 PM : Nominee Showcase Presentation #2

Location: Elizabethan C&D, 2nd floor
Bill Worthington

William Worthington
Director of Security Operations & Engineering
Caesars Entertainment

Perimeter Transformation – Creating the Gauntlet  > Download Presentation
When existing infrastructure limited network traffic visibility and the ability to block known vulnerabilities, William Worthington, Director of Security Operations and Engineering for Caesars Entertainment — the world’s largest casino gaming, hospitality and entertainment company — set out to completely redesign the organization’s perimeter. He and his team rapidly, successfully and simultaneously deployed a comprehensive set of solutions, including new next generation firewalls, load balancers leveraging SSL decryption, malware detection devices, forensics and logging devices, IDS/IPS’s, and new web proxies, all with high availability and redundancy. Learn how their new strategy and tools created a security gauntlet that has already proven to protect the Caesars brand fromthreats in today’s aggressive cyber landscape.

4:30 PM : Nominee Showcase Presentation #3

Location: Elizabethan C&D, 2nd floor
Robert Rice

Robert Rice
Director, Security Services
St. Joseph Health
Anaheim, CA

Overhaul Your Investment Agenda to Maximize Returns  > Download Presentation
As the complexity of IT security grows exponentially, many security teams are grasping at straws to implement needed controls and solutions to protect their organizations; but it’s difficult to understand if these ventures are providing maximum value without a measureable understanding of effectiveness and appropriateness. To create a holistic picture of the organization’s security posture, Robert Rice and his team at St. Joseph Health crafted a repeatable framework that identified and prioritized key risks, determined remediation strategies in alignment with security initiatives and established empirical Key Risk Indicators and Key Performance Indicators. Learn how the Pillars of Security project has created a clear implementation model that allows visibility into the effectiveness of a security framework, and facilitates better understanding of business drivers within the enterprise.

4:50 PM: Late Afternoon Break

5:00 PM : VIP Reception (invitation only)

Location: Elizabethan A & B, 2nd floor

ISE® Nominees, sponsors and special guests will have the opportunity to network in a private setting with beverages and appetizers.

6:00 PM : Sponsor Pavilion and Dinner Buffet

Location: Victor's Palace, top floor

Guests enjoy gourmet dinner while networking and meeting the sponsors.  Honoring and celebrating the award nominees, this exciting occasion will bring together top security executives to recognize the individuals who have made significant and positive impact on their organizations through exemplary performance.

7:30 PM : ISE® West Awards Gala

Location: Alexandra Ballroom, top floor

Honoring and celebrating the ISE® West Award Nominees, this exciting occasion will bring together top security executives to recognize the individuals and the project teams who have made significant and positive impact on their organizations through exemplary performance.

9:00 PM : Champagne and Dessert Reception

Location: Alexandra Ballroom, top floor

Enjoy champagne and dessert while celebrating the winners, nominees and project teams. Don't miss the Passport for Prizes drawing and a chance to win outstanding gifts from our ISE® sponsors.