WHY THE STORIES ARE IMPORTANT
Executive Alliance's 2020 CISO in Residence.
As a former CISO of three Fortune 500 Companies...
State of the Industry
After a warm welcome from Executive Alliance CEO Mary Lou Heastings and Richard Warner, Symposium Moderator, opened up the 2017 Atlanta program with some of the latest statistics on the state of CISO thinking in terms of breaches, preparedness, compliance and awareness. Download the Presentation
Navigating the Threat Landscape – The Knowns and Unknowns
In this interview session, Brian Mauter, Executive Director of Information Security at RaceTrac Petroleum, discussed how his organization is spending time getting the basics right to deal with both the known and unknown security threats and also as he looks to the future the challenges he faces.
Practical Insider Threat
David Pogemiller, Vice President of Strategy at Forcepoint, Platinum Sponsor, focused his session on how organizations face increasingly asymmetric and unprecedented risks from the “accidental insider”…those who have valid access to enterprise networks and knowledge. He provided practical insight into building a threat protection program that includes best practices for prioritization, identification and mitigation
Take a Break! Coffee and Networking with Your Peers
Attendees and sponsors had a chance to reconnect and strike up new relationships.
Resiliency in the Face of Emerging Threats
Brad Joyner, Information Assurance Leader at Delta Air Lines, Inc., shared his insights in an interview setting on how he and his peers are building more effective strategies to monitor global threats and trends, the impact on building their infrastructure resiliency, and how the industry as a whole is working towards reducing the time to make informed and time-sensitive security decisions.
Collaboration Without Constraints –Securing Content and Workflows to Create the Limitless Enterprise
Laureen Smith, Vice President of Wordwide Business Development with Accellion, Gold Sponsor, presented on the key role of secure content collaboration as organizations rapidly evolves into a more open and mobile business.
Live Polling Session – “Top of Mind”
In this interactive polling session, attendees discussed the live results on how companies and management are handling breach responsibilities.
Top 5 Challenges & Mistakes in Breach Detection and Response
Ben Smith, Field Chief Technology Officer at RSA, Gold Sponsor brought to light lessons learned on data breaches and how to most effectively combine people, processes, and technologies in the midst of a response.
The Expanding Footprint of Responsibilities
In this interview session, Lynda Fleury, Vice President and CISO at Unum discussed her new roles and responsibilities she is taking on in information security and the impact to her organization. Lynda shared insights into the evolution of her relationship with senior management and the board as information security & risk continually takes on a higher profile at her company.
Building Resiliency Into the Security Infrastructure
Todd Trimble, Technical Sales Manager at IBM US, Gold Sponsor presented on the topic of the management of risk within the information security organization. Todd walked through a fictional security incident inspired by recent attacks and demonstrated how cognitive capabilities can be used to mitigate risk.
Lunch and Networking in the Sponsor Pavilion
Leadership During Challenging Times
In this interview session, Wayne Proctor, Vice President of Information Security for WestRock, shared insights into some of the toughest challenges he is facing today, what he is discussing with his peers, and his thoughts on leading his security organization into the future.
Secure IT Transformation to a Cloud-Enabled Enterprise
Kevin Peterson, Director, Security and Network Transformation at Zscaler, Silver Sponsor, shared key insights into what it means to work in an agile cloud-enabled organization.
Live Polling Session – Top of Mind
In this second polling session, attendees discussed live results on how organizations rated their security posture and their interactions with the board.
The Enterprise Immune System:
Using Machine Learning for Next-Generation Cyber Defense
Joseph Poupard, Regional Director, Darktrace, Silver Sponsor presented on a fundamentally new approach to cyber defense, the “self-learning systems,” to detect and investigate threats that are already inside the network - before they turn into a full-blown crisis.
Executive Roundtable Discussions
In the afternoon roundtables, attendees had the opportunity to join in lively discussions on the topics of their choice.
Dr. Todd Watson, Information Security Officer, Board of Regents of the University System of Georgia
Brian Barrios, Director, Threat Management and Intelligence, Southern Company
Michael Brown, Director of Information Security Operations, Macy's
Michael Marsilio, Information Security and Compliance Officer, Paradies Lagardere
Eli Phetteplace, API Product Leader - Enterprise Data Platform, The Weather Company - an IBM Business
Michelle Stewart, Chief Information Security Officer, RentPath
Attendees and sponsors had a great time enjoying each other’s company, laughing, and planning to meet at next year’s National Security Leaders Symposium at The Breakers Hotel in Palm Beach from October 21 -23, 2018!
Forcepoint is transforming cybersecurity by focusing on what matters most: understanding people’s intent as they interact with critical data wherever it resides. Our uncompromising systems enable companies to empower employees with unobstructed access to confidential data while protecting intellectual property and simplifying compliance. Based in Austin, Texas, Forcepoint supports more than 20,000 organizations worldwide.
For more information, visit www.forcepoint.com or contact David Pogemiller, email@example.com
Accellion, Inc. enables enterprise organizations to collaborate on content with external partners securely via private cloud. Enterprises can leave existing content where it lives today, and extend it outside the firewall without having to migrate content or disrupt their business workflows. Accellion’s solutions are used by more than 15 million users and 2,500 of the world’s leading corporations and government agencies including Procter & Gamble; KPMG; Kaiser Permanente; Latham & Watkins; National Park Service; Pacific Life Insurance; Cargill; and the National Institute for Standards and Technology (NIST). For more information please visit:
The volume of security incidents and available threat data far exceed the capacity of even the most skilled security professional. Over the past year, IBM Watson has been trained on the language of cybersecurity, ingesting over 1 million security documents. Watson can now help security analysts parse thousands of natural language research reports that have never before been accessible to modern security tools.
Watson for Cyber Security is integrated into IBM’s new Cognitive SOC platform, bringing together advanced cognitive technologies with security operations and providing the ability to respond to threats across endpoint, network, users and cloud. The centerpiece of this platform is IBM QRadar Advisor with Watson, a new app available in the IBM Security App Exchange, which is the first tool that taps into Watson’s corpus of cybersecurity insights.
For more information, you can also visit us at: www.ibm.com/security
RSA’s business-driven security solutions help customers comprehensively and rapidly link security incidents with business context to respond effectively and protect what matters most. With award-winning solutions for rapid detection and response, identity and access assurance, consumer fraud protection, and business risk management, RSA customers can thrive in an uncertain, high-risk world. It’s time for Business-Driven Security.
Darktrace is the world’s leading machine learning company for cyber security, having developed AI algorithms that mimic the human immune system to defend enterprise networks of all types and sizes. Created by mathematicians from the University of Cambridge, Darktrace’s Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal’ for all devices and users, updating its understanding as the environment changes.
By applying its unique, unsupervised machine learning, Darktrace has identified 30,000 previously unknown threats in over 2,4000 networks, including zero-days, insider threats and subtle, stealthy attacks. The company has experienced 600% year-on-year revenue growth. With 500 employees in 24 offices and dual headquarters in San Francisco and Cambridge UK, Darktrace was named ‘Most Innovative Security Company of the Year 2017,’ ‘Bloomberg Innovator,’ and ‘GSN Homeland Security’ award winner. The company’s valuation is $.5 billion and its investors include KKR, Softbank, Summit, Invoke Capital, and Samsung.
DarkTrace Global Threat Report 2017 Download the Presentation
Zscaler builds and operates the world's largest 100% cloud-delivered security platform, helping leading organizations transform securely to the cloud.
Not long ago, you couldn’t find many “cloud-first” organizations — those that primarily use cloud applications and infrastructure and rely on the Internet as their default transport network. But today, according to IDG, 70 percent of organizations have at least one application in the cloud — or at least some of their computing infrastructure — and the other 30 percent are moving quickly in that direction. They’re thriving on the improved speed, agility, productivity, and cost containment enabled by the cloud. And since 2008, Zscaler has provided the security architecture, built 100% in the cloud, needed to secure their IT transformation journeys. For more information, please visit www.zscaler.com/.
For more information contact: Mark Drucker firstname.lastname@example.org, Frank Hamilton email@example.com or Martin Cone firstname.lastname@example.org
Alert Logic, the leader in security and compliance solutions for the cloud, provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Fully managed by a team of experts, the Alert Logic Security-as-a-Service solution provides network, system and web application protection immediately, wherever your IT infrastructure resides. Alert Logic partners with the leading cloud platforms and hosting providers to protect over 3,000 organizations worldwide. Built for cloud scale, our patented platform stores petabytes of data, analyzes over 450 million events and identifies over 60,000 security incidents each month, which are managed by our 24×7 Security Operations Center. Alert Logic, founded in 2002, is headquartered in Houston, Texas, with offices in Seattle, Dallas, Cardiff, Belfast and London.
BlackBerry® is a leading software and services company dedicated to securing the Enterprise of Things.
BlackBerry software provides the embedded intelligence to secure the Enterprise of Things so that the Internet of Things (IoT) can thrive. Our software platform, BlackBerry Secure, is a comprehensive mobile-native approach to security that addresses the entire enterprise from end point to end point.
With software and services from BlackBerry, enterprises in a range of industries – from healthcare to financial services -- are empowered to:
BlackBerry holds 80+ security certifications and is listed in the top position in all six categories of Gartner’s high-security mobility management study. The company is ranked among the top 10 percent of all cybersecurity providers. All G7 governments and 15 of G20 are BlackBerry customers. BlackBerry Unified Endpoint Management (UEM) software is the most widely-deployed among Fortune 500 companies.
Based in Waterloo, Ontario, the company was founded in 1984 and operates in North America, Europe, Asia, Middle East, Latin America and Africa. Visit: www.BlackBerry.com or contact Benjamin Mabry, email@example.com
To access more info on Securing the Enterprise of Things: 451 Research:
Security Innovation focuses on the most difficult IT Security problem, and the root cause of most data breaches — insecure software applications. For more than a decade, we’ve helped organizations build internal expertise, uncover critical vulnerabilities, and improve the process by which applications are built. The company’s solutions are based on the three pillars of a secure Software Development Lifecycle (SDLC), which feed into one another to create an ecosystem of repeatable, secure software development: Standards, Education, and Assessment. Our flagship products include TeamProfessor, the industry’s largest library of application security eLearning courses, and TeamMentor, “out of the box” secure development standards.
For more information, please visit www.securityinnovation.com or contact Joe Mundy at firstname.lastname@example.org
Varonis is an innovative data security platform that allows enterprises to manage, analyze and secure their data. Varonis specializes in creating software that manages and protects enterprise data against insider threats, data breaches and cyberattacks by analyzing the behavior of the people and machines that access your data, alerting on misbehavior and enforcing a least privilege model.
Enterprise data under our scope is typically comprised of sensitive information that is stored in spreadsheets, emails, word processing documents, presentations, audio files, video files, text messages and any other data created by employees. This data often contains an enterprise’s financial information, product plans, strategic initiatives, intellectual property and numerous other forms of critical data.
With offices and partners worldwide, Varonis has over 5,350 customers spanning leading firms in financial services, healthcare, public, industrial, insurance, energy and utilities, media and entertainment, consumer and retail, technology and education sectors. For more information, please visit www.varonis.com
Vectra AI provides real-time attack visibility and non-stop automated threat hunting powered by artificial intelligence. The result is blind-spot-free threat detection coverage across the entire network infrastructure and all devices, including IoT and BYOD. Vectra also lets you respond quickly and decisively to attacks by putting the most relevant threat information and context at your fingertips.
And Vectra hasn't forgotten about your existing security infrastructure. By providing additional threat intelligence to firewalls, endpoint security and other enforcement points, you can block unknown and customized attacks. In addition, Vectra provides the best starting point for SIEMs and forensic tools to speed-up threat investigations.
Our core team consists of threat researchers, data scientists, network security engineers, user interface designers and white hats. We're passionate and committed to making a difference in a world where cybersecurity is a top concern and we constantly push the boundaries of what's possible to drive the next-generation of network security. For more information, please visit https://vectra.ai/
Thank you email info: We would like to include a link to our upcoming webinar.
Zix Corporation (Zix) is a leader in email security. Trusted by the nation’s most influential institutions in healthcare, finance and government, Zix delivers a superior experience and easy-to-use solutions for email encryption and data loss prevention, advanced threat protection, archiving and bring your own device (BYOD) mobile security. Focusing on the protection of business communication, Zix enables its customers to better secure data and meet compliance needs. Zix is publicly traded on the Nasdaq Global Market under the symbol ZIXI. For more information, visit zixcorp.com.