ISE® West Schedule of Events 2015

ISE® West Private Welcome Dinner

August 19, 2015
5:30pm - 8:30pm
Morton's Steakhouse
400 Post Street
San Francisco, CA 94102
Registration
Jeff Trudeau

Jeff Trudeau
Information Security Officer
Sutter Health
Biography

Securing the Endpoint in an Age of Advanced Cyber Attacks
Breaches are occurring at an alarming pace and the #1 point of entry is the endpoint. Legacy detection-based defenses simply aren’t enough to stop dynamic, modern cyber-attacks. And companies continue to embrace business-enabling mobile and cloud technologies that further evaporate the network perimeter and IT control.  Is there a new model that can be used to secure the endpoint?  Can isolation technology help prevent breaches where companies are often left most exposed — the endpoint? This discussion will center around securing the perimeter and how to transform the traditional cycle of false alerts, infection, and remediation.  We will discuss how you can enable your IT team to spend less time on reactive measures so you can focus your energy on what matters most — your success.  Join our conversation to learn how this revolutionary approach will defeat today’s threats while streamlining IT, reducing costs, and empowering your users.

August 20, 2015

11:00am - 3:00pm: Registration

Location: Pre-function of Elizabethan Ballrooms C&D, 2nd floor

11:30 AM : ISE® Signature Luncheon *Invitation Only

Location: Elizabethan B, 2nd floor

Sponsored by

net I Q

Jason Lish

Jason Lish
Executive Vice President and Chief Security Officer
Alight Solutions
ISE® West Executive of the Year Award Winner 2016
ISE® North America Executive Award Finalist 2016 - Financial Category
ISE® Central Executive Award Finalist 2018

Biography

Closing the Security Intelligence Gap – Integrating Identity, Access and Security Management
Your data is valuable and there’s a good chance that someone is actively working to get it. For today’s hackers, successful infiltration to sensitive systems and information is often achieved by gaining the credentials of privileged users with elevated access rights. Traditional security solutions are no longer enough to spot this attack method. Closing the gap requires a new approach---integrating security monitoring with identity and access management. Applying identity-based context and user access behavior into your security monitoring efforts are imperative to discovering the true, actionable security intelligence required for your team to disrupt an attack before it can cause damage and expedite incident response. Join our conversation for a deep dive into identity, access and security management and learn more about the tools and strategies your team needs to recognize potential attacks faster and keep your most sensitive information assets safe.

1:00 PM : Welcoming Remarks and Introductions

Location: Elizabethan C&D, 2nd floor
Marci McCarthy

Marci McCarthy
CEO and President
T.E.N.
Biography

1:10 PM : Keynote Address

Location: Elizabethan C&D, 2nd floor
Marci McCarthy

Marci McCarthy
CEO and President
T.E.N.
Biography

The Balancing Act: Managing Expectations Across the Enterprise
Ongoing breaches and reports of cyber espionage have brought Information Security center stage with executive management, boards of directors and customers alike. The business expects the CISO to manage an agile, high-performing security program, yet consistently fails to adequately underwrite or provide the range of resources necessary to meet growing demands. Now expected to be a transformative leader, CISOs are struggling to balance new perceptions when such a disconnect exists between expectations and reality. Just as managing the complexity of the threat environment mandates a solution-based, multi-layer approach, so does navigating the complex relationships necessary to bridge the gaps between security and the enterprise. During this presentation, learn how to work with various business units and departments to build and empower your leadership team, so that you can better manage the heavy burden of defending your organization against the unrelenting array of cyber threats.

1:45 PM : Interactive Executive Roundtables

Location: Elizabethan C&D, 2nd floor

The Interactive Executive Roundtables brings together ISE® Nominees, industry leaders, invited guests, and sponsor delegates to meet each other and join in interactive discussions on key industry issues as well as share best practices.  The interactive roundtable discussions are hosted by our ISE® Judges and Nominees.

Michael Dierickx

Michael Dierickx
Information Security Officer
Panasonic Avionics
Biography

Securing Your Data across Channels: Strategies for Outpacing Zero Day Threats and Sophisticated Hackers

Mobile, social and cloud technologies enable an organization’s efficiency and productivity, and can often provide competitive and brand differentiation. However, the widespread adoption of these services often results in an environment where free-flowing data quickly outpaces an organization’s ability to proactively defend against imminent and emerging security threats. All companies with valuable IP should assume both zero day threats and sophisticated hackers are targeting them. Mobile, social and cloud technologies drive productivity. But they also open the door to data theft and advanced attacks that can slip right by anti-virus, URL filtering and firewall defenses. A continued focus on siloed controls is insufficient for today’s threats as attacks are highly advanced, well-funded and persistently targeting enterprise environments.

Bill Boni

Bill Boni
Vice President and Corporate Information Security Officer
T-Mobile USA
ISE® North America Commercial Executive Award Finalist 2007
ISE® Central Executive Award Winner 2007

Biography

The Era of Cyber War Games Has Arrived – Are You Prepared to Play?

When the movie War Games hit theaters back in 1983, the concept of computer hacking was little more than science fiction. Fast forwarding more than 30 years later, gripping sci-fi dilemmas featuring cyber-attacks have become real life nightmares for many organizations. The era of the modern cyber war games has arrived with nation states backing large scale cyber terrorist attacks, issuing demands, and bringing huge organizations to their knees for months on end. Private user data, sensitive employee credentials, and even unreleased products are being disclosed and used as ammunition against major corporations like Sony, Target, JP Morgan Chase, and Home Depot on this digital field of battle. These companies face not only financial losses in the millions, but also must cope with equally crippling brand disintegration due to public backlash and customer fallout. Now that fiction is reality, an important question remains – is your team prepared for these cyber war games?

Darren Challey
VP, Enterprise InfoSec
Expedia

Cyber Threat Intelligence: A Gold Mine of Value

An intelligence capability empowers organizations to identify potential threats and vulnerabilities in order to minimize the ‘threat attack window‘ and limit the amount of time an adversary gains access to the network before they are discovered. Organizations that operate with an intelligence-led mindset understand that threat intelligence is the ‘mechanism’ that drives cyber security investment and operational risk management. The number of cyber threat intelligence providers continues to increase and the idea of threat intelligence is gaining widespread acceptance. While increased awareness of the cyber security threat is a positive trend, many organizations still need to put in place the fundamentals of intelligence management to gain real value from threat intelligence. This will be a crucial for instilling confidence in board members – and ensure that the organizations are equipped to leverage the gold mine of value that can be extracted from cyber threat intelligence.

Kim Green

Kim Green
Chief Information Security & Privacy Officer
Zephyr Health
Biography

Security & Compliance: What is the secret to success?

The compliance and technology landscape has changed dramatically in recent years with progressively strict regulations, especially in industries such as energy, oil and gas, health care, retail and financial services. Regulators are increasing scrutiny and fines, while internal policies and controls, particularly in relation to data, have posed debilitating for communication and collaboration needs. Additionally, it has become increasingly common for emerging threats to strike at points between the enterprise and third-party vendors, which further escalates the necessity for secure collaboration. How are your peers facing these challenges? Join this discussion to discover best practices for meeting industry requirements while ensuring secure collaboration in the complex marketplace.

3:00pm - 8:00pm : Registration

Location: Pre-function of Victor’s Palace, top floor

2:45 PM : Break

2:55 PM : Nominee Showcase Presentation #1

Location: Elizabethan C&D, 2nd floor
Todd Garrison

Todd Garrison
Enterprise Security Specialist
Janus Capital Group
Biography

Harnessing the Power of Analytics with Increased Speed
The Janus project team found the SEIM was producing alerts from large quantities of data, but running queries to gather incident data for response and mitigation could not be run quickly. They utilized a series of open source tools to drive an internal security analytics program that provides an interface to rapidly search relevant security log information for trends. Custom integration was also added to pull in additional information beyond logs that could be useful in incident integration. Learn how the Janus team was able to cut down incident response times by 50%, enable the capability to rapidly research information security trends, and reduce the time to research by as much as 90%, all without spending excessive amounts on licensing fees.

3:15 PM: CISO Deep Dive: Executive Leadership

Location: Elizabethan C&D, 2nd floor

An industry cross section of ISE Alumni and leading security executives explore today’s hottest security trends and issues and the key challenges they are facing now and in the future.

Moderator

Pete Lindstrom

Pete Lindstrom
Research Director Security Products
IDC
Biography

Panelists

Selim Aissi
Chief Security Officer
Ellie Mae
Biography

Niall Browne

Niall Browne
Chief Trust Officer & VP Trust
Workday
Biography

Jason Lish

Jason Lish
Vice President of Security Technology & Operations
Charles Schwab & Company
Biography

Melody Pereira

Melody Pereira
AVP, IT Security Officer
AGCS, an Allianz company
ISE® West Executive Award Finalist 2008
Biography

Bill Worthington

William Worthington
VP of IT Security
Caesars Entertainment
Las Vegas, NV
ISE® West Executive Award Finalist 2014
Biography

4:00 PM : Nominee Showcase Presentation #2

Location: Elizabethan C&D, 2nd floor
Rob Fry

Rob Fry
Sr. Information Security Architect
Netflix
Biography

FIDO: Building Defense on the Inside - Download Presentation
Fully Integrated Defense Operation (FIDO) is a custom-built solution leveraging partnerships with vendors and internal innovators to deliver a platform that addresses one of the biggest challenges the Netflix security team has faced. FIDO works to combat a lack of talented security professionals and alert fatigue at the same time by reducing the number of manual actions that analysts have to take. It also enriches and enhances alerts so that every piece of information has been checked with various security stack components and existing threat feeds so that analysts have richer information. The Netflix team has also made FIDO open source so other companies can benefit from it and build upon it. Learn how FIDO has improved operations and productivity of analysts, reduced the number of false positives, and aided in the ability to move swiftly during an incident.

4:20 PM : Nominee Showcase Presentation #3

Location: Elizabethan C&D, 2nd floor
Fares Alraie

Fares Alraie
Senior Director of Product Security & Assurance
Visa
Biography

Protecting Millions with a Secure SDLC
Faced with the challenge of securing more than 2,000 applications used amongst customers, merchants and organization, Visa pioneered the creation of a full-scale secure software development life cycle (SSDLC) process through close collaboration between its security and application development practices and a range of hardware and software technologies. Using a multi-solution, layered security approach, Visa is protecting more than 11 million users and $6 trillion in global payment card transactions annually. Learn how the Visa team was able to reduce the resources needed to continue growing their robust security engine and improve their process management, educate their security team, and monitor and remediate threats in real-time.

4:45 PM: Late Afternoon Break

5:00 PM : VIP Reception (invitation only)

Location: Elizabethan A & B, 2nd floor

ISE® Nominees, sponsors and special guests will have the opportunity to network in a private setting with beverages and appetizers.

6:00 PM : Sponsor Pavilion and Dinner Buffet

Location: Victor's Palace, top floor

Guests enjoy gourmet dinner while networking and meeting the sponsors.  Honoring and celebrating the award nominees, this exciting occasion will bring together top security executives to recognize the individuals who have made significant and positive impact on their organizations through exemplary performance.

7:30 PM : ISE® West Awards Gala

Location: Alexandra Ballroom, top floor

Honoring and celebrating the ISE® West Award Nominees, this exciting occasion will bring together top security executives to recognize the individuals and the project teams who have made significant and positive impact on their organizations through exemplary performance.

9:00 PM : Champagne and Dessert Reception

Location: Alexandra Ballroom, top floor

Enjoy champagne and dessert while celebrating the winners, nominees and project teams. Don't miss the Passport for Prizes drawing and a chance to win outstanding gifts from our ISE® sponsors.