Presenting "The Upshot" from Executive Alliance
We're very excited to share what we've been working on-
The team at Executive Alliance has been...
Keynote - "The High Stakes of Security"
Richard Warner revealed the statistics that were conglomerated from industry leading whitepapers and illustrated the takeaways gleaned from the research. If there is anything that unifies CISOs, change is the one constant. The focus is on the rapid evolution of the security industry, the rising tide of visibility on security organizations, and the high stakes at play in terms of cyber threats. You can download the summary here: The High Stakes of Security
Innovating for the Future
Network Data: Powering the Modern SOC
Chris Lehman, Senior Vice President of Worldwide Sales and Channel at ExtraHop, delved into how attackers can hide and misuse logs, agents and standard security tools, then demonstrated effective approaches for countering their actions using network traffic analysis, passive monitoring, and real-time forensic data.
Cybersecurity Incident Response and Privacy Challenges Beyond the Headlines
Judith Germano, Founder, Germano Law LLC and Professor/Distinguished Fellow, NYU Center for Cybersecurity; Adjunct Professor, NYU School of Law spoke on the nuances, challenges and trends pertaining to cybersecurity incident response and privacy challenges and provided a fresh perspective beyond the headlines- as well as best practices, helpful takeaways and potential solutions.
Browsers – The Ultimate Attack Surface
Lior Dolphin, Director, Innovative Technologies at Symantec, spoke about Web isolation and how browser-based attacks are the primary vector leveraged by attackers to gain access to corporate networks.
This Interactive polling session with executives in attendance. focuses on priorities, execution and adding value.
Charlie Jacco, Principal, Cyber Security Services at KPMG shared insights into how to protect and enable your business with a holistic approach to risk and governance.
Lunch and Networking
Six Major Trends Affecting the Future of Cybersecurity
Winston Lalgee, Strategic Accounts for Check Point Software, focused on some of the key trends they believe will impact the future of cybersecurity.
Spotlight: The Future Disruptors
Byron Arnao from CapitalOne, Lynne Chernow form Fordham University, Diana Balan from JP Morgan and Tyrone Paige from Azure provided potential answers to some of today’s toughest challenges for a security organization?
Mike Liska, Regional Sales Manager at Okta highlighted ways to keep pace with the rate of innovation by enabling you to connect any user to any technology, anywhere.
Break and Networking
Executive Roundtable Discussions
Facilitated by executives from a diversity of industries across seven different topics, the highly rated Executive Roundtables wrapped up the Summit session.
Executives facilitating the roundtables included:
Topic #1: “Developing Talent for the Future” Diana Balan, Vice President, Global Privacy, JPMorgan Chase
Topic #2: The Zero Trust Security Model - Jim Moran, Chief Information Security Officer, Educational Testing Services
Topic #3: Security Analytics & Threat Intelligence - Nick Viviano, VP, Infrastructure Risk Management, AllianceBernstein
Topic #4: Measuring Security as a Business Value - Christine Whalley, Director, Information Security, Barnard College
Reception and Networking with Prize Drawings
Executive Alliance, our strategic partners and the New York Spring attendees closed out the summit with laughs and new friendships. Thanks to everyone for a terrific NYS 2019 and stay tuned for details for the upcoming summits and National Symposium!
ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out. Our breakthrough approach analyzes all network interactions and applies advanced machine learning for complete visibility, real-time detection, and guided investigation. With this approach, we help the world’s leading enterprises including Hasbro, Credit Suisse, Caesars Entertainment, and British Airways to rise above the noise of alerts, organizational silos, and runaway technology. Whether you’re investigating threats, ensuring delivery of critical applications, or securing your investment in cloud, ExtraHop helps you protect and accelerate your business.
Symantec Corporation (NASDAQ: SYMC), the world's leading cyber security company, helps organizations, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec's Norton and LifeLock product suites to protect their digital lives at home and across their devices. Symantec operates one of the world's largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visit www.symantec.com or connect with us on Facebook, Twitter, and LinkedIn
CyberArk is the global leader in privileged access security, a critical layer of IT security to protect data, infrastructure and assets across the enterprise, in the cloud and throughout the DevOps pipeline. CyberArk delivers the industry’s most complete solution to reduce risk created by privileged credentials and secrets. The company is trusted by the world’s leading organizations, including more than 50 percent of the Fortune 500, to protect against external attackers and malicious insiders.
A PAM solution secures more than just passwords. See below for further reading material:
Analyst reports, naming CyberArk as the leader:
Cybercriminals are growing in number and sophistication, rendering traditional solutions powerless against today’s advanced threat actors. IBM Security, with ~8,00 security professionals worldwide, helps more than 12,000 clients address their most critical needs: implementing a risk-based security strategy; threat management; and enabling digital trust.
Over the past decade, IBM has invested more than $2 billion in security research and development, resulting in 3,700+ security-related patents, and acquired 19 security companies to grow its portfolio. Today, IBM Security delivers next-generation security technology and services, including artificial intelligence, orchestrated incident response, cloud-based solution, and state-of-the-art security operations centers. For more information, please visit ibm.com/security
Businesses turn to KPMG for a better understanding of market dynamics. They know that our advisory professionals work with many of the world's leading organizations to help them improve business performance, leverage IT investments, protect financial assets, manage risk, and boost market confidence.
For more information, please visit www.home.kpmg.com
SailPoint, the leader in enterprise identity management, brings the Power of Identity to customers around the world. SailPoint’s open identity platform gives organizations the power to enter new markets, scale their workforces, embrace new technologies, innovate faster and compete on a global basis. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments.
Check Point Software Technologies Ltd. is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers a multilevel security architecture that defends enterprises’ cloud, network and mobile device held information, plus the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.
or more information, visit www.checkpoint.com
Okta is the leading provider of identity for the enterprise. The Okta Identity Cloud connects and protects employees of many of the world's largest enterprises. It also securely connects enterprises to their partners, suppliers and customers. With deep integrations to over 5,000 apps, the Okta Identity Cloud enables simple and secure access from any device. Thousands of customers, including Experian, 20th Century Fox, LinkedIn, Flex, News Corp, Dish Networks and Adobe trust Okta to work faster, boost revenue and stay secure. Okta helps customers fulfil their missions faster by making it safe and easy to use the technologies they need to do their most significant work.
For more information, visit www.okta.com
BeyondTrust helps companies defend against threats related to stolen credentials, misused privileges, and unwanted remote access, while empowering people.
Our privileged access management platform offers the broadest set of capabilities to:
This approach has been recognized by top analysts from Gartner and BeyondTrust is trusted by more than 20,000 customers worldwide, including over half of the Fortune 100.
If you have an upcoming project or are currently evaluating PAM solutions, please contact Rich Pace at email@example.com.
Duo Security, now part of Cisco, is the leading provider of Trusted Access security and multi-factor authentication. Duo's zero-trust security platform, Duo Beyond, enables organizations to provide trusted access to all of their critical applications - for any user, from anywhere, and with any device. Duo is a trusted partner to more than 14,000 customers globally, including Dresser-Rand, Etsy, Facebook, Paramount Pictures, Random House, Zillow and more. Founded in Ann Arbor, Michigan, Duo has offices in growing hubs in Detroit; Austin, Texas; San Mateo, California; and London.
Gigamon is leading the convergence of networking and security operations to help organizations reduce complexity and increase efficiency of their security stack. Our GigaSECURE® Security Delivery Platform is a next-generation network packet broker that helps customers make threats more visible across cloud, hybrid and on-premises environments, deploy resources faster and maximize the performance of their security tools.
Global 5000 companies and government agencies rely on Gigamon solutions to make them more agile and cut costs.
For more information, visit www.gigamon.com
Venafi is the cyber security market leader in machine identity protection, securing machine-to-machine connections and communications. Venafi protects machine identity types by orchestrating cryptographic keys and digital certificates for SSL/TLS, IoT, mobile and SSH. Venafi provides global visibility of machine identities and the risks associated with them for the extended enterprise – on premises, mobile, virtual, cloud and IoT – at machine speed and scale. Venafi puts this intelligence into action with automated remediation that reduces the security and availability risks connected with weak or compromised machine identities while safeguarding the flow of information to trusted machines and preventing communication with machines that are not trusted.
With 31 patents currently in its portfolio, Venafi delivers innovative solutions for the world's most demanding, security-conscious Global 5000 organizations, including the top five U.S. health insurers; the top five U.S. airlines; four of the top five U.S., U.K., Australian and South African banks; and four of the top five U.S. retailers. Venafi is backed by top-tier investors, including TCV, Foundation Capital, Intel Capital, QuestMark Partners, Mercato Partners and NextEquity.
Thanks again to all of our attendees and partners! Next stop, New York City September 12th!