ISE® West Private Welcome Dinner
5:30pm - 8:30pm
Morton's Steakhouse
400 Post Street
San Francisco, CA 94102
Registration
Jeff Trudeau
Information Security Officer
Sutter Health
Biography
Securing the Endpoint in an Age of Advanced Cyber Attacks
Breaches are occurring at an alarming pace and the #1 point of entry is the endpoint. Legacy detection-based defenses simply aren’t enough to stop dynamic, modern cyber-attacks. And companies continue to embrace business-enabling mobile and cloud technologies that further evaporate the network perimeter and IT control. Is there a new model that can be used to secure the endpoint? Can isolation technology help prevent breaches where companies are often left most exposed — the endpoint? This discussion will center around securing the perimeter and how to transform the traditional cycle of false alerts, infection, and remediation. We will discuss how you can enable your IT team to spend less time on reactive measures so you can focus your energy on what matters most — your success. Join our conversation to learn how this revolutionary approach will defeat today’s threats while streamlining IT, reducing costs, and empowering your users.
August 20, 2015
11:00am - 3:00pm: Registration
Location: Pre-function of Elizabethan Ballrooms C&D, 2nd floor
11:30 AM : ISE® Signature Luncheon *Invitation Only
Location: Elizabethan B, 2nd floor
Sponsored by
Jason Lish
Executive Vice President and Chief Security Officer
Alight Solutions
ISE® West Executive of the Year Award Winner 2016
ISE® North America Executive Award Finalist 2016 - Financial Category
ISE® Central Executive Award Finalist 2018
Biography
Closing the Security Intelligence Gap – Integrating Identity, Access and Security Management
Your data is valuable and there’s a good chance that someone is actively working to get it. For today’s hackers, successful infiltration to sensitive systems and information is often achieved by gaining the credentials of privileged users with elevated access rights. Traditional security solutions are no longer enough to spot this attack method. Closing the gap requires a new approach---integrating security monitoring with identity and access management. Applying identity-based context and user access behavior into your security monitoring efforts are imperative to discovering the true, actionable security intelligence required for your team to disrupt an attack before it can cause damage and expedite incident response. Join our conversation for a deep dive into identity, access and security management and learn more about the tools and strategies your team needs to recognize potential attacks faster and keep your most sensitive information assets safe.
1:00 PM : Welcoming Remarks and Introductions
Location: Elizabethan C&D, 2nd floor
Marci McCarthy
CEO and President
T.E.N.
Biography
1:10 PM : Keynote Address
Location: Elizabethan C&D, 2nd floor
Marci McCarthy
CEO and President
T.E.N.
Biography
The Balancing Act: Managing Expectations Across the Enterprise
Ongoing breaches and reports of cyber espionage have brought Information Security center stage with executive management, boards of directors and customers alike. The business expects the CISO to manage an agile, high-performing security program, yet consistently fails to adequately underwrite or provide the range of resources necessary to meet growing demands. Now expected to be a transformative leader, CISOs are struggling to balance new perceptions when such a disconnect exists between expectations and reality. Just as managing the complexity of the threat environment mandates a solution-based, multi-layer approach, so does navigating the complex relationships necessary to bridge the gaps between security and the enterprise. During this presentation, learn how to work with various business units and departments to build and empower your leadership team, so that you can better manage the heavy burden of defending your organization against the unrelenting array of cyber threats.
1:45 PM : Interactive Executive Roundtables
Location: Elizabethan C&D, 2nd floor
The Interactive Executive Roundtables brings together ISE® Nominees, industry leaders, invited guests, and sponsor delegates to meet each other and join in interactive discussions on key industry issues as well as share best practices. The interactive roundtable discussions are hosted by our ISE® Judges and Nominees.
Michael Dierickx
Information Security Officer
Panasonic Avionics
Biography
Securing Your Data across Channels: Strategies for Outpacing Zero Day Threats and Sophisticated Hackers
Mobile, social and cloud technologies enable an organization’s efficiency and productivity, and can often provide competitive and brand differentiation. However, the widespread adoption of these services often results in an environment where free-flowing data quickly outpaces an organization’s ability to proactively defend against imminent and emerging security threats. All companies with valuable IP should assume both zero day threats and sophisticated hackers are targeting them. Mobile, social and cloud technologies drive productivity. But they also open the door to data theft and advanced attacks that can slip right by anti-virus, URL filtering and firewall defenses. A continued focus on siloed controls is insufficient for today’s threats as attacks are highly advanced, well-funded and persistently targeting enterprise environments.
Bill Boni
Vice President and Corporate Information Security Officer
T-Mobile USA
ISE® North America Commercial Executive Award Finalist 2007
ISE® Central Executive Award Winner 2007
Biography
The Era of Cyber War Games Has Arrived – Are You Prepared to Play?
When the movie War Games hit theaters back in 1983, the concept of computer hacking was little more than science fiction. Fast forwarding more than 30 years later, gripping sci-fi dilemmas featuring cyber-attacks have become real life nightmares for many organizations. The era of the modern cyber war games has arrived with nation states backing large scale cyber terrorist attacks, issuing demands, and bringing huge organizations to their knees for months on end. Private user data, sensitive employee credentials, and even unreleased products are being disclosed and used as ammunition against major corporations like Sony, Target, JP Morgan Chase, and Home Depot on this digital field of battle. These companies face not only financial losses in the millions, but also must cope with equally crippling brand disintegration due to public backlash and customer fallout. Now that fiction is reality, an important question remains – is your team prepared for these cyber war games?
Darren Challey
VP, Enterprise InfoSec
Expedia
Cyber Threat Intelligence: A Gold Mine of Value
An intelligence capability empowers organizations to identify potential threats and vulnerabilities in order to minimize the ‘threat attack window‘ and limit the amount of time an adversary gains access to the network before they are discovered. Organizations that operate with an intelligence-led mindset understand that threat intelligence is the ‘mechanism’ that drives cyber security investment and operational risk management. The number of cyber threat intelligence providers continues to increase and the idea of threat intelligence is gaining widespread acceptance. While increased awareness of the cyber security threat is a positive trend, many organizations still need to put in place the fundamentals of intelligence management to gain real value from threat intelligence. This will be a crucial for instilling confidence in board members – and ensure that the organizations are equipped to leverage the gold mine of value that can be extracted from cyber threat intelligence.
Kim Green
Chief Information Security & Privacy Officer
Zephyr Health
Biography
Security & Compliance: What is the secret to success?
The compliance and technology landscape has changed dramatically in recent years with progressively strict regulations, especially in industries such as energy, oil and gas, health care, retail and financial services. Regulators are increasing scrutiny and fines, while internal policies and controls, particularly in relation to data, have posed debilitating for communication and collaboration needs. Additionally, it has become increasingly common for emerging threats to strike at points between the enterprise and third-party vendors, which further escalates the necessity for secure collaboration. How are your peers facing these challenges? Join this discussion to discover best practices for meeting industry requirements while ensuring secure collaboration in the complex marketplace.
3:00pm - 8:00pm : Registration
Location: Pre-function of Victor’s Palace, top floor
2:45 PM : Break
2:55 PM : Nominee Showcase Presentation #1
Location: Elizabethan C&D, 2nd floor
Todd Garrison
Enterprise Security Specialist
Janus Capital Group
Biography
Harnessing the Power of Analytics with Increased Speed
The Janus project team found the SEIM was producing alerts from large quantities of data, but running queries to gather incident data for response and mitigation could not be run quickly. They utilized a series of open source tools to drive an internal security analytics program that provides an interface to rapidly search relevant security log information for trends. Custom integration was also added to pull in additional information beyond logs that could be useful in incident integration. Learn how the Janus team was able to cut down incident response times by 50%, enable the capability to rapidly research information security trends, and reduce the time to research by as much as 90%, all without spending excessive amounts on licensing fees.
3:15 PM: CISO Deep Dive: Executive Leadership
Location: Elizabethan C&D, 2nd floor
An industry cross section of ISE Alumni and leading security executives explore today’s hottest security trends and issues and the key challenges they are facing now and in the future.
Moderator
Pete Lindstrom
Research Director Security Products
IDC
Biography
Panelists
Selim Aissi
Chief Security Officer
Ellie Mae
Biography
Niall Browne
Chief Trust Officer & VP Trust
Workday
Biography
Jason Lish
Vice President of Security Technology & Operations
Charles Schwab & Company
Biography
Melody Pereira
AVP, IT Security Officer
AGCS, an Allianz company
ISE® West Executive Award Finalist 2008
Biography
William Worthington
VP of IT Security
Caesars Entertainment
Las Vegas, NV
ISE® West Executive Award Finalist 2014
Biography
4:00 PM : Nominee Showcase Presentation #2
Location: Elizabethan C&D, 2nd floor
Rob Fry
Sr. Information Security Architect
Netflix
Biography
FIDO: Building Defense on the Inside - Download Presentation
Fully Integrated Defense Operation (FIDO) is a custom-built solution leveraging partnerships with vendors and internal innovators to deliver a platform that addresses one of the biggest challenges the Netflix security team has faced. FIDO works to combat a lack of talented security professionals and alert fatigue at the same time by reducing the number of manual actions that analysts have to take. It also enriches and enhances alerts so that every piece of information has been checked with various security stack components and existing threat feeds so that analysts have richer information. The Netflix team has also made FIDO open source so other companies can benefit from it and build upon it. Learn how FIDO has improved operations and productivity of analysts, reduced the number of false positives, and aided in the ability to move swiftly during an incident.
4:20 PM : Nominee Showcase Presentation #3
Location: Elizabethan C&D, 2nd floor
Fares Alraie
Senior Director of Product Security & Assurance
Visa
Biography
Protecting Millions with a Secure SDLC
Faced with the challenge of securing more than 2,000 applications used amongst customers, merchants and organization, Visa pioneered the creation of a full-scale secure software development life cycle (SSDLC) process through close collaboration between its security and application development practices and a range of hardware and software technologies. Using a multi-solution, layered security approach, Visa is protecting more than 11 million users and $6 trillion in global payment card transactions annually. Learn how the Visa team was able to reduce the resources needed to continue growing their robust security engine and improve their process management, educate their security team, and monitor and remediate threats in real-time.
4:45 PM: Late Afternoon Break
5:00 PM : VIP Reception (invitation only)
Location: Elizabethan A & B, 2nd floor
ISE® Nominees, sponsors and special guests will have the opportunity to network in a private setting with beverages and appetizers.
6:00 PM : Sponsor Pavilion and Dinner Buffet
Location: Victor's Palace, top floor
Guests enjoy gourmet dinner while networking and meeting the sponsors. Honoring and celebrating the award nominees, this exciting occasion will bring together top security executives to recognize the individuals who have made significant and positive impact on their organizations through exemplary performance.
7:30 PM : ISE® West Awards Gala
Location: Alexandra Ballroom, top floor
Honoring and celebrating the ISE® West Award Nominees, this exciting occasion will bring together top security executives to recognize the individuals and the project teams who have made significant and positive impact on their organizations through exemplary performance.
9:00 PM : Champagne and Dessert Reception
Location: Alexandra Ballroom, top floor
Enjoy champagne and dessert while celebrating the winners, nominees and project teams. Don't miss the Passport for Prizes drawing and a chance to win outstanding gifts from our ISE® sponsors.