NEW YORK SPRING 2018 Summit Recap


Morning Keynote - The Business Side of Defending Businesses

In the opening keynote, Jay Leek, Managing Director, ClearSky Security, rocked the house with his presentation on “The Business Side of Defending Businesses.”  As an investor in emerging security companies, Jay painted an outstanding picture of industry challenges, the market in transition, its evolution, and key areas of focus for the future.  The keynote presentation has been made available to attendees only.



Guiding Information Security into the Future

In the morning interview session, “Guiding Information Security into the Future,” Keith Donnelly, VP and Global Head of Risk & Compliance at Broadridge, shared insights into future skillsets needed, the evolution of risk metrics and the need for leading versus lagging indicators as key metrics to be established.



Applying Machine Language to Wiredata in the SOC

Jeff Costlow, Director of Security, with ExtraHop Networks, Platinum sponsor, presented on “Applying Machine Language to Wiredata in the SOC.”  Jeff shared facts on the capability to transform a company’s network into a comprehensive source of security and IT visibility, while providing a rich data set - wire data - that keeps machine learning focused and precise.




The Breach Anxiety in Information Security

Jim Wilson, CISO of FAIR Health, shared his insights in the interview session, “The Breach Anxiety in Information Security,” on key areas of focus that still need work on in “shoring up defenses” relative to breaches, expectations from senior management, and “new” best practices being put into place as he looks to the future.



The New Security Frontier: Threat Hunting, Augmented Intelligence, and Automated Response

Michael Melore, Cyber Security Architect with IBM, Gold sponsor, discussed “The New Security Frontier: Threat Hunting, Augmented Intelligence, and Automated Response.”  In his presentation, Michael shared information on advanced analytics – the ability to delve deeper with augmented intelligence and integrating content throughout the framework to provide insight about your environment.



Top of Mind

In the interactive polling session, “Top of Mind,” attendees had the opportunity to weigh-in and discuss their thoughts on GDPR readiness, lack of personnel, and investment in emerging technologies.



Identity is Security

In the presentation, “Identity is Security,” Rick Weinberg, VP of Product Management at SailPoint, Gold sponsor, presented facts on endpoint security being the #1 issue of CIOs, with people being the main attack vector.



Lunch and Networking

There was a full house at lunch as guests and sponsors enjoyed a great meal and the opportunity to meet each other.



The Shift in Information Security 

In the afternoon interview session, Tyrone Paige, General Manager IT in Enterprise Infrastructure Architecture for IT Security at JetBlue Airways, shared his insights into “The Shift in Information Security,” on a number of topics, with the majority on talent development, leveraging big data, visibility on your network and the continue push for employee awareness.



Autonomous Cyber Defense:  AI and the Immune System Approach

Kathryn Moore, Cyber Security Account Manager, at DarkTrace, Silver sponsor, presented on the “Autonomous Cyber Defense: AI and the Immune System Approach,” as a way to scale.  By providing unsupervised machine learning, a system can identify “normal” activity/behavior and learn in real time, to detects and respond.



What’s Next

In the afternoon polling session, “What’s Next,” summit moderator, Richard Warner facilitated discussion on top 10 technologies and the “trust” breach issue as a reaction to Facebook.


11Six Reasons to Put Privilege First

In the presentation, “Six Reasons to Put Privilege First,”  Matt Tarr, Principal Solutions Engineer, at CyberArk, Silver sponsor, probed the issues concerning privileged accounts representing the key opening to an organization’s most valuable assets and highlight best practices and quick wins.


Breakout Executive Roundtable Discussions with Debriefs

Facilitated by executives from a diversity of industries across seven different topics, the highly rated Executive Roundtables wrapped up the Summit sessions. Executives facilitating the roundtables included, Amal Shady, Director, Risk & Compliance at McGraw-Hill Education, Joseph Dell, CTO and CISO at Third Avenue Management, Todd Gordon, Director of Information Security at EisnerAmper LLP, Jim Moran, Chief Information Security Officer with Educational Testing Service, William Bailey, VP of Information Security with Police and Fire Federal Credit Union, and Majgan Samimy, Chief Information Security Officer at Wachtell, Lipton, Rosen & Katz.



Closing Reception

After the Summit, guests had the opportunity to relax and enjoy themselves at the afternoon Reception.

National Security Leaders Symposium at The Breakers Hotel in Palm Beach from October 21 -23, 2018!


Thank You to our 2018 New York Spring Summit Sponsors




ExtraHop makes data-driven IT a reality with real-time analytics and cloud-based machine learning. We analyze every single digital interaction occurring on the network and turn that data into the most accurate and timely source of intelligence for everyone from IT Operations to Security to the CIO.

For more information, please visit www.extrahop.com or contact Kevin Franey, kevinf@extrahop.com

ExtraHop Datasheet 2018




The volume of security incidents and available threat data far exceed the capacity of even the most skilled security professional. Over the past couple years, IBM Watson has been trained on the language of cybersecurity, ingesting over 1 million security documents. IBM Watson can now help security analysts parse thousands of natural language research reports that have never before been accessible to modern security tools.
Watson for Cyber Security is integrated into IBM’s new Cognitive SOC platform, bringing together advanced cognitive technologies with security operations and providing the ability to respond to threats across endpoint, network, users and the cloud. The centerpiece of this platform is IBM QRadar Advisor with Watson, an app available in the IBM Security App Exchange, which is the first tool that taps into IBM Watson’s corpus of cybersecurity insights.
Visit us at: www.ibm.com/security

For more information contact Michael Melore, mmelore@us.ibm.com





SailPoint, the leader in enterprise identity management, brings the Power of Identity to customers around the world. SailPoint’s open identity platform gives organizations the power to enter new markets, scale their workforces, embrace new technologies, innovate faster and compete on a global basis. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments. SailPoint's customers are among the world’s largest companies in a wide range of industries, including: 6 of the top 15 banks, 4 of the top 6 healthcare insurance and managed care providers, 8 of the top 15 property and casualty insurance providers, 5 of the top 15 pharmaceutical companies, and six of the largest 15 federal agencies. 

Sailpoint Identity is Security

To learn more about SailPoint, please visit www.sailpoint.com



CyberArk Software, Inc

CyberArk, the #1 provider of privileged account security, provides a critical layer of IT security to protect data, infrastructure and assets across the enterprise, in the cloud and throughout the DevOps pipeline. CyberArk delivers the most complete solution to reduce risk created by privileged credentials and secrets. The company is trusted by the world’s leading organizations, including more than 50% of the Fortune 100, to protect against external attackers and malicious insiders, and address audit and compliance requirements. CyberArk is the only public company 100% focused on privileged account security, delivering innovative solutions to stay one step ahead of attackers.

For more information, please visit www.cyberark.com or contact Shannon Pescatello shannon.pescatello@cyberark.com




Darktrace is the world’s leading machine learning company for cyber security, having developed AI algorithms that mimic the human immune system to defend enterprise networks of all types and sizes. Created by mathematicians from the University of Cambridge, Darktrace’s Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal’ for all devices and users, updating its understanding as the environment changes.

By applying its unique, unsupervised machine learning, Darktrace has identified 30,000 previously unknown threats in over 2,4000 networks, including zero-days, insider threats and subtle, stealthy attacks. The company has experienced 600% year-on-year revenue growth. With 500 employees in 24 offices and dual headquarters in San Francisco and Cambridge UK, Darktrace was named ‘Most Innovative Security Company of the Year 2017,’ ‘Bloomberg Innovator,’ and ‘GSN Homeland Security’ award winner. The company’s valuation is $.5 billion and its investors include KKR, Softbank, Summit, Invoke Capital, and Samsung.  https://www.darktrace.com/

DarkTrace Global Threat Report 2017  Download the Presentation

Or contact Kathryn Moore - kathryn.h.moore@darktrace.com or Edward Nass - edward.nass@darktrace.com




Are you looking for a better way to manage privileged access?  BeyondTrust can provide control and visibility over privileged accounts and users by helping you:

  • Discover and inventory your privileged accounts (check out this free tool)
  • Eliminate the sharing of privileged accounts by delegating permissions without exposing credentials
  • Monitor and record privileged user, session, and file activities for unauthorized access and/or changes
  • Analyze behaviors to detect suspect or malicious activities by insiders and/or compromised accounts.

This approach has been recognized by top analysts from Gartner and other experts as leaving fewer gaps in privileged account coverage.  BeyondTrust is also trusted by more than 4,000 customers worldwide, including over half of the Fortune 100.

If you have an upcoming project or are currently evaluating PAM solutions, please contact Rich Pace at rpace@beyondtrust.com or visit www.beyondtrust.com

Additional Resources: 




Garrison has developed patented isolation technology to provide hardware-enforced secure remote browsing for enterprise customers. Garrison’s unique approach ensures a great user experience is maintained even when deployed across the largest of enterprises, whilst delivering unparalleled security. Click on every link, browse the web with confidence.

Remote browsing promises a massive risk reduction in the face of threats such as phishing, drive-by-downloads and watering hole attacks. But real-world experience shows that many implementations of remote browsing fall short either on the underlying security model, or on the user experience delivered. Garrison’s unique Silicon Assured Video Isolation technology (Garrison SAVI®) provides a game-changing platform for secure remote browsing: security so strong that it is trusted for use by governments at the highest security levels, but at a price point and with a level of usability that makes it suitable for deployment at scale across mainstream enterprises.

For more information, visit www.garrison.com or contact James Smith - james.smith@garrison.com