Summit Recap

Welcome and Opening Remarks
CEO of Executive Alliance, Mary Lou Heastings, took the stage to welcome the attendees and comment on the focus of security executives in 2019 and beyond.
Cybersecurity – Today’s News and Tomorrow’s Forecast
Summit moderator and journalist Richard Warner, provided the latest on changes going on in the security environment and what trends are being forecasted for the future.
Innovating on the CISO Role
Doug Graham, Chief Security and Privacy Officer at Lionbridge and Stephen Scharf, Managing Director and CSO at The Depository Trust & Clearing Corporation focused on how CISOs are adapting or not, and their expectations of their role in the future.
Defense in Diversification and the Proactive SOC
Dan Greer, Director of Sales Engineering, Northeast from ExtraHop Networks, Inc. discussed how data-first approaches to security architectures illuminate natural consolidation point, cross-collaboration within the IT organization improves security posture and reduces tool sprawl and how leveraging other parts of the organization improves security posture through smarter processes and practice.
Break and Networking
How Data Analytics Is Revolutionizing Sports – The Takeaways for Security Executives
Steve Conley, Director of IT Strategy for the Boston Red Sox, Jay Wessland VP & CTO of the Boston Celtics and Lorraine Spadaro, VP of Technology and Solutions for the Boston Bruins insights shared  insights on how major league sports is using analytics to continue to look for new opportunities to increase revenues, reduce expenses, and win games. they are taking best practices and lessons learned into the world of information security.
Best practices to assess risk, improve detection and accelerate response using AI, orchestration and automation, threat intelligence and MITRE ATT&CK.
Chris Meenan, Director, Security Intelligence Offering Management & Strategy at IBM outlined how organizations modernize their security frameworks and best practices to assess risk, improve detection and accelerate response using AI, orchestration and automation, threat intelligence and MITRE.
Top Priorities - Polling
An interactive, live polling session with the focus on what the top priorities are for security teams moving forward.
The Impact of AI on Access Automation – The Right Model for Security?
Michael Stuyt, Distinguished Sales Engineer at SailPoint Technologies discussed how artificial intelligence completely changes this model and costs in an effort to better understand the actual impacts AI has on Information Security going forward.
Looking Into the Future - Polling
An interactive, live polling session with the focus on what executives in the room are thinking about as prepare their teams for the future.
Departing Employees = Departing Data
Abhik Mitra, Product Marketing Manager at Code42 discussed market drivers behind the business need for real time detection and response for a growing inside threat: departing employees.
Lunch and Networking
Addressing Remote Vendor Privileged Access in The Digital Age
Tim Parmenter, Solutions Engineer Lead, Northeast at CyberArk Software Inc. explained how Enterprise IT operations and security teams alike must find innovative ways to grant external remote vendors secure access to privileged accounts without disrupting operations.
Opening Up the Talent Funnel
Kal Dhinsa, Vice President, Information Security & SaaS Operations at Virgin Pulse showed how security leadership teams are addressing the problematic shortage of cybersecurity skills at their organization- attracting employees by locating scarce resources, building relationships with them before the "ask"and wooing them away- without draining the budget.
Multi-Factor Authentication Everywhere
Yancy Lent, Sales Engineer at Okta, Inc. showed how Okta's Adaptive Multi-Factor Authentication solution provides security identity and access that is secure, simple  to use and intelligent.
Interactive discussions with guests in attendance on how they view the information security landscape and what they are doing to prepare for the future.
Waiting for the Other Link to Drop: Avoiding a Future Cybersecurity Attack
Rob Forgione, Systems Engineer at Zix Corporation delved into the tools they provide to counteract the growing threat of infiltration due to email vectors and showed where to focus security attention due to financial, healthcare and federal laws dictating data preservation compliance.
Executive Roundtable Discussions
Facilitated by executives from a diversity of industries across seven different topics, the highly rated Executive Roundtables wrapped up the Summit session.
Reception and Networking with Prize Drawings
Executive Alliance, our strategic partners and the Boston attendees closed out the summit with camaraderie and collaboration. 
Thank you to everyone for a terrific Boston 2019 and we look forward to seeing everyone at the National Symposium!

Thank You to our 2019 Boston Summit Sponsors

ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out. Our breakthrough approach analyzes all network interactions and applies advanced machine learning for complete visibility, real-time detection, and guided investigation. With this approach, we help the world’s leading enterprises including Hasbro, Credit Suisse, Caesars Entertainment, and British Airways to rise above the noise of alerts, organizational silos, and runaway technology. Whether you’re investigating threats, ensuring delivery of critical applications, or securing your investment in cloud, ExtraHop helps you protect and accelerate your business.
For more information, please visit or contact Todd Giguere at
Code42 is the leader in next-gen data loss protection. Native to the cloud, the Code42 Next-Gen Data Loss Protection solution rapidly detects insider threats, helps satisfy regulatory compliance requirements and speeds incident response — all without lengthy deployments, complex policy management or blocks on user productivity. Security, IT and compliance professionals can protect endpoint and cloud data from loss, leak, misuse and theft while maintaining an open and collaborative culture for employees.
For more information, visit, read Code42’s blog or request a demo to see Code42 in action!


In an industry focused on building walls, IBM Security is focused on creating an open, connected security ecosystem. We leverage AI, cloud, orchestration and collaboration to help clients prove compliance, stop threats, and grow their business securely.  Monitoring 70B+ security events per day, IBM is the #1 provider of enterprise security solutions and a leader in 12 security market segments. Our strategy challenges us to approach our work, support over clients, and lead the industry with forward-thinking solutions and services, allowing you to be fearless in the face of cyber uncertainty.

For more information, please visit 

SailPoint, the leader in enterprise identity management, brings the Power of Identity to customers around the world. SailPoint’s open identity platform gives organizations the power to enter new markets, scale their workforces, embrace new technologies, innovate faster and compete on a global basis. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments. 

Sailpoint Identity is Security

Read what your peers are saying about:

  • The benefits of self-service access to systems, applications and data
  • Protection against cyberattacks with strong identity management
  • The connection between identity governance and compliance
  • How their c-suite sees the role of identity governance evolving in the future
To learn more about SailPoint, please visit 
CyberArk is the global leader in privileged access security, a critical layer of IT security to protect data, infrastructure and assets across the enterprise, in the cloud and throughout the DevOps pipeline. CyberArk delivers the industry’s most complete solution to reduce risk created by privileged credentials and secrets. The company is trusted by the world’s leading organizations, including more than 50 percent of the Fortune 500, to protect against external attackers and malicious insiders. 
Now more than ever, companies are embracing digital technologies – migrating to the cloud, adopting SaaS and evolving their solutions with robotic process automation and DevOps. However, this digital transformation is increasing the attack surface – and securing privileged access is a critical step organizations should take.
Partner with CyberArk on this journey and provide protection for all privileged credentials no matter what they are – human or machine – or where they are – on premise, in the cloud or in hybrid environments.
Want to learn more about us? Visit our website, learn more about Privileged Access Security, or request a demo of our solution.
Also, don’t just take it from us. Read below for 3rd party analysts who have named CyberArk a leader in our space:
Okta is the leading provider of identity for the enterprise. The Okta Identity Cloud connects and protects employees of many of the world's largest enterprises. It also securely connects enterprises to their partners, suppliers and customers. With deep integrations to over 5,000 apps, the Okta Identity Cloud enables simple and secure access from any device. Thousands of customers, including Experian, 20th Century Fox, LinkedIn, Flex, News Corp, Dish Networks and Adobe trust Okta to work faster, boost revenue and stay secure. Okta helps customers fulfil their missions faster by making it safe and easy to use the technologies they need to do their most significant work.  For more information, visit

Thank you for meeting with Okta, a link to a demo can be found here for more insight into our solutions. You may also, contact us. We look forward to hearing from you.

Zix Corporation (Zix) is a leader in email security. Trusted by the nation’s most influential institutions in healthcare, finance and government, Zix delivers a superior experience and easy-to-use solutions for email encryption and data loss prevention, advanced threat protection, unified information archiving and bring your own device (BYOD) mobile security. Focusing on the protection of business communication, Zix enables its customers to better secure data and meet compliance needs. Zix is publicly traded on the Nasdaq Global Market under the symbol ZIXI. 

For more information, visit

Andrew Verderame, Regional Sales Manager, 781-993-6140,

Case Study:


BeyondTrust helps companies defend against threats related to stolen credentials, misused privileges, and unwanted remote access, while empowering people. 

Our privileged access management platform offers the broadest set of capabilities to:

  • Discover, manage, audit, and monitor privileged accounts of all types
  • Remove excessive end user privileges on Windows, Mac, Unix, Linux and network devices
  • Secure, manage, and audit vendor and internal remote privileged access, and access and support remote systems
  • Identify, prioritize, and remediate vulnerabilities and inform privilege decisions with risk insights
  • Audit, report, and recover changes across Microsoft Windows platforms

This approach has been recognized by top analysts from Gartner and BeyondTrust is trusted by more than 20,000 customers worldwide, including over half of the Fortune 100.

If you have an upcoming project or are currently evaluating PAM solutions, please contact Dan Deganutti, at



Darktrace is the world’s leading cyber AI company and the creator of Autonomous Response technology. Its self-learning AI is modeled on the human immune system and used by over 3,000 organizations to protect against threats to the cloud, email, IoT, networks and industrial systems. 

The company has over 900 employees and headquarters in San Francisco and Cambridge, UK. Every 3 seconds, Darktrace AI fights back against a cyber-threat, preventing it from causing damage.

For more information, visit

Egress Software Technologies
Egress takes a people-centric approach to data security – helping users receive, manage and share sensitive data securely to meet compliance requirements and drive business productivity. Using machine learning, Egress ensures information is protected relative to the risk of a data breach and reduces user friction to ensure smooth adoption.

Trusted by enterprise organizations and governments around the globe, Egress’ award-winning platform provides email encryption, secure file transfer and online collaboration services, as well as risk management, accidental send prevention, and compliance auditing and reporting.

Egress is headquartered in London, with regional offices in the UK, the US, Canada and the Netherlands.

For more information, visit:

Enabling risk-based email security using machine learning:

Insider Data Breach Survey 2019:
Gigamon is leading the convergence of networking and security operations to help organizations reduce complexity and increase efficiency of their security stack. Our GigaSECURE® Security Delivery Platform is a next-generation network packet broker that helps customers make threats more visible across cloud, hybrid and on-premises environments, deploy resources faster and maximize the performance of their security tools.
IXIA- A Keysight Technologies Business
At Ixia, we deliver a powerful combination of innovative solutions and trusted insight to support your network and security products, from concept to operation. Whether you are preparing your product for launch, deploying an application, or managing a product in operation, we offer an extensive array of solutions in testing, visibility, and security—all in one place.
For more information, visit
Or contact us at:  David Esposito -   or Bob Darabant -
Last Pass by LogMeIn 
For more than 47,000 businesses of all sizes, LastPass reduces friction for employees while increasing control and visibility for IT with an access solution that’s easy to manage and effortless to use. From single sign-on and password management to adaptive authentication, LastPass gives superior control to IT and frictionless access to users.
For more information, visit or contact us at:



Boston sponsors 2019