ISE® West Private Welcome Dinner
Matthew Archibald
Vice President, Information Security
Silver Spring Networks
ISE® West Award Executive Finalist 2010
Big Security – Are Enterprise Networks Too Complex to Secure Sufficiently
The cyberspace environment is extremely dynamic with new vulnerabilities and threats emerging daily. The growing complexity of enterprise networks in a global economy compounds the challenge for security leaders, who must develop and employ various offensive and defensive strategies to defend the enterprise and minimize risks while maximizing the value of their investments. Join our discussion to learn how your peers are addressing the growing complexity of enterprise-wide network security, and share your own insights on protecting your enterprise in the evolving threat landscape.
July 30, 2014
11:00am - 1:30pm: Registration
Location: Pre-function of Elizabethan Ballrooms C&D, 2nd floor
11:30 AM : ISE West Nominee Welcome Luncheon *Invitation Only
Location: Elizabethan B, 2nd floor
Sponsored by
David Corlette
Product Manager
NetIQ
When Tinfoil Hats Aren't Enough: Effective Defenses Against Advanced Persistent Threats (APTs) > Download Presentation
You probably know about the threat posed by APTs. You also may know that most experts will tell you that there are no cost-effective ways to completely prevent a determined attacker from getting into your systems. So what to do? Since returning to an agrarian society is likely not a viable option, this presentation will cover common APT techniques and ways to detect those techniques in action and rapidly react. We'll talk about how to leverage the Identity-powered enterprise to improve the accuracy and effectiveness of prevention, detection, and response.
1:00 PM : Welcoming Remarks and Introductions
Location: Elizabethan C&D, 2nd floor
Marci McCarthy
CEO and President
T.E.N.
Biography
1:10 PM : Keynote Address
Location: Elizabethan C&D, 2nd floor
Joe Sullivan
Chief Security Officer
Facebook
Injecting Social Into Security > Download Presentation
Threats today are complex and numerous enough that an organization cannot afford to treat security as a black box or a single team that sits on their own and tries to figure everything out. This talk will explore how Facebook uses social interaction to increase the security of our service, as well as creative programs to get people across the company engaged in our security culture.
1:40 PM : Adobe Executive Address
Location: Elizabethan C&D, 2nd floor
David Lenoe
Director, Secure Software Engineering
Adobe
Investment in People is the Key to a Security Organization Built for Change > Download Presentation
According to Forrester Research, 51% of organizations say it’s a challenge or major challenge to hire and keep security staff with the right skills. This becomes especially challenging in a constantly changing organization managing acquisitions, changing business objectives, and rapid growth. While investing in security technology is important to stay ahead of threats, failure to invest properly in your people can introduce systemic and cultural risk that can be more challenging to manage than technical threats. This presentation will discuss the keys to not only getting the best people, but keeping them. Mr. Lenoe will share Adobe’s experiences in managing this very challenging problem along with what we have learned as we have built up our security organization to adapt to our cloud-focused future.
1:55 PM : Interactive Executive Roundtables
Location: Elizabethan C&D, 2nd floor
The Interactive Executive Roundtables brings together ISE® Nominees, industry leaders, invited guests, and sponsor delegates to meet each other and join in interactive discussions on key industry issues as well as share best practices. The interactive roundtable discussions are hosted by our ISE® Judges and Nominees.
Josh Aberant
Postmaster
Twitter
Secrets to Achieving End-to-End Email Security > Read Summary
Securing your infrastructure is essential in protecting your customers, but malicious attacks can affect users without even entering your network. The Anti-Phishing Working Group reported 72,758 phishing attacks targeting more than 700 institutions worldwide during the first half of 2013 alone. As Verizon's Data Breach Report shows, 95% of all data breaches begin with a phishing email — evidence that comprehensive ecosystem visibility, email intelligence, and real-time alerting and reporting are imperative to thwarting these attacks. Join our conversation to take a deep dive into advanced email security methodology and learn best practices to achieving end-to-end email security in order to protect your customers and enable business.
Vincent Campitelli
VP of IT Risk Management
McKesson Corporation
Using Security Intelligence for a Competitive Advantage > Read Summary
Harnessing the power of analytics is nothing new for today’s enterprise IT organizations. The same practices can be put to work for security — analyzing vast quantities of data to find the types of clues and irregularities that could signal an attack. This approach to security analytics is becoming a central aspect of enterprise security as organizations learn they must extend far beyond the traditional perimeter approach to gain complete visibility across the IT infrastructure in order to detect and disrupt attacks. Join the conversation to learn more about this shifting approach to security and why mining Big Data for clues to enable enterprise security action can give you a competitive advantage.
Ramses Martinez
Director of Security
Yahoo!
Cyber Security Legislation: What CISOs Should Know > Read Summary
Never before has information security been such a globally visible and divisive issue. Cyber attacks by foreign nations, significant national security leaks, and our increasing reliance on technology to run both business and government have spawned Washington to create a cyber security framework to protect the nation’s critical infrastructure. But the proposed legislation is complex and cumbersome, but with a divided Congress there is no guarantee if or when a final version will ultimately be passed into law. Will new legislation have substantial impact on existing policies and procedures? How can CISOs prepare in advance? Join the conversation to discover what every CISO should know about cyber security legislation.
Matthew Archibald
Vice President, Information Security
Silver Spring Networks
ISE® West Award Executive Finalist 2010
Defending Against Advanced Threats in an Ever-evolving Threat Landscape > Read Summary
The cyberspace environment is extremely dynamic and unfortunately, new vulnerabilities and threats emerge on a daily basis. Security leaders must develop and employ various offensive and defensive strategies to defend the enterprise and minimize risks at an acceptable cost. Join our discussion to learn how your peers are addressing advanced threats from internal, external and global sources, and share your own insights on protecting your enterprise in the evolving threat landscape.
2:30pm - 7:00pm : Registration
Location: Pre-function of Victor’s Palace, top floor
2:55 PM : Break
3:05 PM : Nominee Showcase Presentation #1
Location: Elizabethan C&D, 2nd floor
Max Solonski
Director of Information Security
BlackLine Systems
Building a Security Program with Risk in Mind
As BlackLine System’s first Director of Information Security, Max Solonski was in the position to build his security program from the ground up. His approach focused on the proactive management of risks and threats with his team maintaining an up-to-date view of the security landscape, projecting that view onto the organizations’ business needs and risk tolerance, and providing daily guidance to all levels within the organization on how to adjust. Learn how this risk-based strategy positioned informationsecurity as a vital business component of the organization, while successfully creating a security and available environment that serves millions of web pages each day.
3:25 PM: CISO Deep Dive: Executive Leadership
Location: Elizabethan C&D, 2nd floor
An industry cross section of ISE Alumni and leading security executives explore today’s hottest security trends and issues and the key challenges they are facing now and in the future.
Moderator
Grace Crickette
SVP and Chief Risk and Compliance Officer
AAA NCNU
ISE® North America Executive Award Winner 2011 - Education/Non-Profit Category
Panelists
Jonathan Cannon
Director, Information Security Intelligence & Incident Response
UPS
Kevin DePeugh
Vice President, Cyber Security
Kaiser Permanente
Jamil Farshchi
Chief Information Security Officer
Time Warner
ISE® West Executive Award Finalist 2011
Rich Jackson
Senior Advisor to the CIO for Cyber Security
Chevron Corporation
ISE® North America Executive Award Finalist 2006
Nick Shevelyov
Chief Security & Chief Privacy Officer
Silicon Valley Bank
4:10 PM : Nominee Showcase Presentation #2
Location: Elizabethan C&D, 2nd floor
William Worthington
Director of Security Operations & Engineering
Caesars Entertainment
Perimeter Transformation – Creating the Gauntlet > Download Presentation
When existing infrastructure limited network traffic visibility and the ability to block known vulnerabilities, William Worthington, Director of Security Operations and Engineering for Caesars Entertainment — the world’s largest casino gaming, hospitality and entertainment company — set out to completely redesign the organization’s perimeter. He and his team rapidly, successfully and simultaneously deployed a comprehensive set of solutions, including new next generation firewalls, load balancers leveraging SSL decryption, malware detection devices, forensics and logging devices, IDS/IPS’s, and new web proxies, all with high availability and redundancy. Learn how their new strategy and tools created a security gauntlet that has already proven to protect the Caesars brand fromthreats in today’s aggressive cyber landscape.
4:30 PM : Nominee Showcase Presentation #3
Location: Elizabethan C&D, 2nd floor
Robert Rice
Director, Security Services
St. Joseph Health
Anaheim, CA
Overhaul Your Investment Agenda to Maximize Returns > Download Presentation
As the complexity of IT security grows exponentially, many security teams are grasping at straws to implement needed controls and solutions to protect their organizations; but it’s difficult to understand if these ventures are providing maximum value without a measureable understanding of effectiveness and appropriateness. To create a holistic picture of the organization’s security posture, Robert Rice and his team at St. Joseph Health crafted a repeatable framework that identified and prioritized key risks, determined remediation strategies in alignment with security initiatives and established empirical Key Risk Indicators and Key Performance Indicators. Learn how the Pillars of Security project has created a clear implementation model that allows visibility into the effectiveness of a security framework, and facilitates better understanding of business drivers within the enterprise.
4:50 PM: Late Afternoon Break
5:00 PM : VIP Reception (invitation only)
Location: Elizabethan A & B, 2nd floor
ISE® Nominees, sponsors and special guests will have the opportunity to network in a private setting with beverages and appetizers.
6:00 PM : Sponsor Pavilion and Dinner Buffet
Location: Victor's Palace, top floor
Guests enjoy gourmet dinner while networking and meeting the sponsors. Honoring and celebrating the award nominees, this exciting occasion will bring together top security executives to recognize the individuals who have made significant and positive impact on their organizations through exemplary performance.
7:30 PM : ISE® West Awards Gala
Location: Alexandra Ballroom, top floor
Honoring and celebrating the ISE® West Award Nominees, this exciting occasion will bring together top security executives to recognize the individuals and the project teams who have made significant and positive impact on their organizations through exemplary performance.
9:00 PM : Champagne and Dessert Reception
Location: Alexandra Ballroom, top floor
Enjoy champagne and dessert while celebrating the winners, nominees and project teams. Don't miss the Passport for Prizes drawing and a chance to win outstanding gifts from our ISE® sponsors.