THE ROCKET RIDE OF SUCCESSES, FAILURES AND LIFE AFTER
Jesus Laz Montano - Former CISO at MassMutual, Metlife and Voya Financial
A Career spanning...
State of the Industry
Michael Barba, Managing Director - Technology and Business Transformation Services, BDO
Darin Mastricola, Vice President, IT Compliance and Governance, Sompo International
This discussion focused on the separation of church and state, with security and compliance as different organizations and how that has helped them be successful. They also touched on how connecting compliance with business strategies is key and the “tone” from the top is important to not only employees, but also regulators.
Guiding Information Security into the Future
Lee Parrish, Vice President, Chief Information Security Officer, Blucora, Inc.
Lee Parrish with Blucora focused on key skills needed, what will set CISOs apart, and how he and his peers plan to overcome some of the biggest challenges facing the industry in the future.
Complete Lifecycle Approach to Advanced Threat Protection
Gregory Shadle, Enterprise Director Systems Engineering, Symantec, Platinum Sponsor
There is a shift toward a more modern defense-in-depth strategy—one that provides the intelligence, context, and real-time situational awareness needed to detect today's advanced threats.This session provided insights into how this approach will empower your organization, enabling you to adopt the best new technologies that drive your business.
Top of Mind
Richard Warner, Summit Moderator
Interactive polling session with executive attendees discussing some of their top issues of the day and how their industry peers respond.
Cloud Security: The Art of Securing the Perimeter When There's No Perimeter
Michael Melore, Cyber Security Architect with IBM, Gold Sponsor
How do you maintain compliance when multi cloud providers are part of your ecosystem? Who owns the security responsibility for different services offered?
This session focused on effective security approaches to these variables.
Morey Haber, Chief Technology Officer, BeyondTrust, Gold Sponsor
This session provided a comprehensive view of how privileges, passwords, and vulnerabilities are being leveraged as attack vectors and how you can properly take measurable steps to defend against them.
Richard Warner, Summit Moderator
Interactive polling session with executives discussing where their concerns are as they look at the state of the industry.
Your Bank’s Digital Side Door
Ed Adams, Distinguished Research Fellow at The Ponemon Institute & Co-founder and Chairman of OnBoard Security, Inc.,
President and CEO of Security Innovation, Inc., Gold Sponsor
Terrific exploration of the 20 year old Open Financial Exchange (OFX) protocol and the 3000+ North American banks that support it. 30 different implementations running in the wild amount to an inviting attack surface — a digital side door into millions of consumers’ privacy and personal savings.
Breakout Executive Roundtable Discussions with Debriefs
Facilitated by executives from a diversity of industries across five different topics, the highly rated Executive Roundtables wrapped up the Summit sessions.
Executives facilitating the roundtables included:
Byron Arnao, Senior Director & Evangelist, Capital One,
Lisa Tarsi, Head of Security Team, Scholastic Corporation
Bernadette Gleason, Vice President, Information Security Officer, Citigroup
Todd Gordon, Director, Information Security, EisnerAmper LLP
Christine Whalley, Director, Information Security, Barnard College
After the Summit, guests had the opportunity to relax and enjoy themselves at the afternoon Reception.
Register for the National Security Leaders Symposium at The Breakers Hotel in Palm Beach from October 21 -23, 2018!
Symantec Corporation (NASDAQ: SYMC), the world's leading cyber security company, helps organizations, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec's Norton and LifeLock product suites to protect their digital lives at home and across their devices. Symantec operates one of the world's largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats.
For additional information contact Jillian Ackerly. Jillian_Ackerly@symantec.com
Are you looking for a better way to manage privileged access? BeyondTrust can provide control and visibility over privileged accounts and users by helping you:
This approach has been recognized by top analysts from Gartner and other experts as leaving fewer gaps in privileged account coverage. BeyondTrust is also trusted by more than 4,000 customers worldwide, including over half of the Fortune 100.
Cybercriminals are growing in number and sophistication, rendering traditional solutions powerless against today’s advanced threats. IBM Security, with 7,500 security professionals worldwide, helps more than 12,000 clients address their most critical needs: transforming their security programs; optimizing security operations and response systems; and protecting critical information.
Over the past decade, IBM has invested more than $2 billion in security research and development, resulting in 3,700+ security-related patents, and acquired 19 security companies to grow its portfolio. Today, IBM Security delivers next-generation security technology and services, including cognitive and Watson analytics, automated incident response, cloud-based solutions and state-of-the-art security operations centers. For more information, please visit www.ibm.com/us-en/.
For more information contact Michael Melore, firstname.lastname@example.org
Security Innovation focuses on the most difficult IT Security problem, and the root cause of most data breaches — insecure software applications. For more than a decade, we’ve helped organizations build internal expertise, uncover critical vulnerabilities, and improve the process by which applications are built. The company’s solutions are based on the three pillars of a secure Software Development Lifecycle (SDLC), which feed into one another to create an ecosystem of repeatable, secure software development: Standards, Education, and Assessment. Our flagship products include TeamProfessor, the industry’s largest library of application security eLearning courses, and TeamMentor, “out of the box” secure development standards.
For more information, please visit www.securityinnovation.com or contact Jack Strakosch- email@example.com; or Bennett Deady at firstname.lastname@example.org
Akamai secures and delivers digital experiences for the world’s largest companies. Akamai’s intelligent edge platform surrounds everything, from the enterprise to the cloud, so customers and their businesses can be fast, smart, and secure. Top brands globally rely on Akamai to help them realize competitive advantage through agile solutions that extend the power of their multi-cloud architectures. Akamai keeps decisions, apps and experiences closer to users than anyone — and attacks and threats far away. Akamai’s portfolio of edge security, web and mobile performance, enterprise access and video delivery solutions is supported by unmatched customer service, analytics and 24/7/365 monitoring.
Cloudflare, Inc. is on a mission to help build a better Internet. Today the company runs one of the world’s largest networks that powers more than 10 trillion requests per month, which is nearly 10 percent of all Internet requests for more than 2.8 billion people worldwide. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare have all traffic routed through its intelligent global network, which gets smarter with each new site added. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was recognized by the World Economic Forum as a Technology Pioneer, named the Most Innovative Network & Internet Technology Company for two years running by the Wall Street Journal, and ranked among the world's 50 most innovative companies by Fast Company. Headquartered in San Francisco, CA, Cloudflare has offices in Austin, TX, Champaign, IL, New York, NY, Washington, DC, London, and Singapore.
Darktrace is the world’s leading machine learning company for cyber security, having developed AI algorithms that mimic the human immune system to defend enterprise networks of all types and sizes. Created by mathematicians from the University of Cambridge, Darktrace’s Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal’ for all devices and users, updating its understanding as the environment changes.
By applying its unique, unsupervised machine learning, Darktrace has identified 30,000 previously unknown threats in over 2,4000 networks, including zero-days, insider threats and subtle, stealthy attacks. The company has experienced 600% year-on-year revenue growth. With 500 employees in 24 offices and dual headquarters in San Francisco and Cambridge UK, Darktrace was named ‘Most Innovative Security Company of the Year 2017,’ ‘Bloomberg Innovator,’ and ‘GSN Homeland Security’ award winner. The company’s valuation is $.5 billion and its investors include KKR, Softbank, Summit, Invoke Capital, and Samsung. https://www.darktrace.com/
Garrison has developed patented isolation technology to provide hardware-enforced secure remote browsing for enterprise customers. Garrison’s unique approach ensures a great user experience is maintained even when deployed across the largest of enterprises, whilst delivering unparalleled security. Click on every link, browse the web with confidence.
Remote browsing promises a massive risk reduction in the face of threats such as phishing, drive-by-downloads and watering hole attacks. But real-world experience shows that many implementations of remote browsing fall short either on the underlying security model, or on the user experience delivered. Garrison’s unique Silicon Assured Video Isolation technology (Garrison SAVI®) provides a game-changing platform for secure remote browsing: security so strong that it is trusted for use by governments at the highest security levels, but at a price point and with a level of usability that makes it suitable for deployment at scale across mainstream enterprises.
is leading the convergence of networking and security operations to help organizations reduce complexity and increase efficiency of their security stack. Our GigaSECURE® Security Delivery Platform is a next-generation network packet broker that helps customers make threats more visible across cloud, hybrid and on-premises environments, deploy resources faster and maximize the performance of their security tools. Global 2000 companies and government agencies rely on Gigamon solutions to make them more agile and cut costs.
CyberEdge asked. You answered. See the results in the 2018 CyberThreat Defense Report now at: https://www.gigamon.com/campaigns/cyberthreat-defense.html
For over 20 years, WatchGuard has pioneered cutting-edge cyber security technology and delivered it as easy-to-deploy and easy-to-manage solutions. With industry-leading network security, secure Wi-Fi, multi-factor authentication, and network intelligence products and services, WatchGuard enables more than 80,000 small and midsize enterprises from around the globe to protect their most important assets. In a world where the cyber security landscape is constantly evolving, and new threats emerge each day, WatchGuard makes enterprise-grade cyber security technology accessible for every company. WatchGuard is headquartered in Seattle, Washington, with offices throughout North America, Europe, Asia Pacific, and Latin America.
For more information, visit www.watchguard.com
WatchGuard’s Threat Lab Analyzes the Latest Malware: https://www.watchguard.com/wgrd-resource-center/security-report-q2-2017