THE ROCKET RIDE OF SUCCESSES, FAILURES AND LIFE AFTER
Jesus Laz Montano - Former CISO at MassMutual, Metlife and Voya Financial
A Career spanning...
Saturday Welcome Reception and Dinner Cruise
After boarding the Naples Princess, attendees, their guests and sponsors got a chance to get to know each other and enjoyed an exquisite dinner reception along with music, memories and epic sunset views.
2nd Annual Executive Alliance Bocce Ball Tournament
The competition was fierce and the weather was hot, but that didn't deter the teams from battling it out on the sand for all the glory!
Congratulations to team Foul Play who took home the WIN in 2019!
Sunday Symposium Opening Dinner
Hosted by the Ritz Carlton, the Welcome Dinner was a chance to re-connect and meet with new peers and to kick off the official start of the Symposium.
Monday Symposium Sessions
Welcome from Executive Alliance
Mary Lou Heastings, CEO of Executive Alliance, welcomed attendees and set the stage for the speakers and hosts, giving an overview of the current state of leadership in the security space.
Monday Keynote: Strategies for the Future
Don Clewley, Head of Information Governance, Risk and Data Protection at The Clorox Company, addressed the confluence of privacy regulations and cybersecurity threats, shared his insights into the latest trends he is seeing at the highest levels and explained how he is dealing with challenges as well as championing the successes of his organization.
Defense in Diversification and the Proactive SOC
IoT and the Future
Dr. Grant Jacoby, SVP, Director - Information Security Strategy & Development at Fifth Third Bank and Bob Marcotte, CISO at Amundi Pioneer, spoke on how as more data is shared across an ever-growing number of platforms, the risks become much greater- leading to intense pressure on security organizations to get it right the first time.
Visualization and Performance for CISOs
Mary Dickerson, Asst. Vice-Chancellor, IT Security/CISO at the University of Houston, Kostas Georgakopoulos, CISO at Procter & Gamble and Charles Newberry, Global CISO at DuPont gave unique perspectives from their varied environments on how CISOs are innovating in their roles, and discussed expectations of their role in the future.
Zero to 60 in 180 days: How We Managed the Impossible
John Masserini, Global CISO at Millicom (Tigo) described how a global telecom and cable provider managed the impossible - deploying a fully integrated, global Identity Management solution in 180 days. He revealed the approach taken, the challenges faced and the reasons behind the deadlines.
Tuesday Symposium Sessions
Deena Swatzie, Group VP, Cybersecurity at SunTrust Banks focused on how organizations are building capabilities to scale quickly and continue to focus on the protections of their assets.
What Makes a Next-Gen SOC?
Lior Kolnik, Head of Security Research at Demisto, A Palo Alto Networks Company focused on current pitfalls- including log-based detection, siloed tools, and manual processes that leave security teams playing catch up. He ended by visualizing the ideal next-gen SOC, driven by analytics-based detection, integrated data, and automated response with human oversight.
ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out. Our breakthrough approach analyzes all network interactions and applies advanced machine learning for complete visibility, real-time detection, and guided investigation. With this approach, we help the world’s leading enterprises including Hasbro, Credit Suisse, Caesars Entertainment, and British Airways to rise above the noise of alerts, organizational silos, and runaway technology. Whether you’re investigating threats, ensuring delivery of critical applications, or securing your investment in cloud, ExtraHop helps you protect and accelerate your business.
For more information, please visit www.extrahop.com or contact Charlie Bollom at email@example.com
Demisto- A Palo Alto Networks Company
Demisto is a leading Security Orchestration, Automation, and Response (SOAR) platform that helps security teams accelerate incident response, standardize and scale processes, and learn from each incident while working together.
Demisto combines security orchestration and automation, incident management, and interactive investigation to help security teams meet these challenges and best leverage existing and new security investments.
For more information, please visit www.demisto.com/
Akamai secures and delivers digital experiences for the world’s largest companies. Akamai’s intelligent edge platform surrounds everything, from the enterprise to the cloud, so customers and their businesses can be fast, smart, and secure. Top brands globally rely on Akamai to help them realize competitive advantage through agile solutions that extend the power of their multi-cloud architectures. Akamai keeps decisions, apps and experiences closer to users than anyone — and attacks and threats far away. Akamai’s portfolio of edge security, web and mobile performance, enterprise access and video delivery solutions is supported by unmatched customer service, analytics and 24/7/365 monitoring.
For more information, please visit www.akamai.com/
In an industry focused on building walls, IBM Security is focused on creating an open, connected security ecosystem. We leverage AI, cloud, orchestration and collaboration to help clients prove compliance, stop threats, and grow their business securely. Monitoring 70B+ security events per day, IBM is the #1 provider of enterprise security solutions and a leader in 12 security market segments. Our strategy challenges us to approach our work, support over clients, and lead the industry with forward-thinking solutions and services, allowing you to be fearless in the face of cyber uncertainty.
SailPoint, the leader in enterprise identity management, brings the Power of Identity to customers around the world. SailPoint’s open identity platform gives organizations the power to enter new markets, scale their workforces, embrace new technologies, innovate faster and compete on a global basis. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments.
V3 CyberSecurity, Inc
V3 Cybersecurity, Inc. is a unique company focused on contextualization of security programs from a business perspective. Our decades of experience in working with Fortune ranked clients has taught us that the business of security remains a fairly immature discipline. Despite all of the advances in technical controls and number of new security companies, organizations have a significant gap in understanding and managing the business of security.
As we continue to see performance pressures of the economy hit many security service providers, we see these economic conditions driving behavior and business practices that do not align with our VIRTUE based approach to business. We understand that the very best talent in the security space will require a new type of corporate culture. We believe in transparent and flexible working environment with a focus on VALUE based performance for our clients. Remaining true to our principles over time will ensure that we create an environment to deliver on the VISION of our clients.To learn more, please visit us at: www.v3cybersecurity.com or call us at: 833-932-7383.
helps companies defend against threats related to stolen credentials, misused privileges, and unwanted remote access, while empowering people.
Our privileged access management platform offers the broadest set of capabilities to:
This approach has been recognized by top analysts from Gartner and BeyondTrust is trusted by more than 20,000 customers worldwide, including over half of the Fortune 100.
If you have an upcoming project or are currently evaluating PAM solutions, contact Natalie Salser at firstname.lastname@example.org
Gigamon is leading the convergence of networking and security operations to help organizations reduce complexity and increase efficiency of their security stack. Our GigaSECURE® Security Delivery Platform is a next-generation network packet broker that helps customers make threats more visible across cloud, hybrid and on-premises environments, deploy resources faster and maximize the performance of their security tools.
Global 5000 companies and government agencies rely on Gigamon solutions to make them more agile and cut costs.For more information, visit www.gigamon.com
Founded in 2004, Prevalent helps enterprises manage risk in third-party business relationships. Prevalent delivers the industry’s only purpose-built, unified platform that integrates a powerful combination of automated assessments, continuous monitoring, and evidence sharing for collaboration between enterprises and vendors. No other product on the market combines all three components, providing the best solution for a highly-functioning, effective third-party risk program.