SlideShare ist ein Scribd-Unternehmen logo
1 von 34
Downloaden Sie, um offline zu lesen
NEW YORK
Our promise:
We only invite CISOs who
are top leaders regionally,
nationally and globally who
make strong contributions
to their peers by openly
sharing ideas, experiences,
successes and failures.
“by CISOs, for CISOs”
Zouhair Guelzim
VP & CISO
L’Oréal Americas
BREAKAWAY LEADER
Please join us at the New York CISO Executive Summit, a gathering
dedicated to CISOs. This is our opportunity to leverage the expertise of
our peers, share innovative ideas and inspire our community.
Your 2016 Governing Body Chairs
Raymond Lipps
Senior Director,
Global IT Security
Celgene Corporation
Mark Viola
VP, Global CISO
Henry Schein, Inc.
Michael Higgins
VP & CISO
NBCUniversal, Inc.
John J. Masserini
CSO
Miami International
Holdings
BREAKAWAY LEADER
Kylie Watson
CISO
Sumitomo Mitsui
Banking Corporation
Linda Betz
CISO
The Travelers
Companies, Inc.
Deborah Snyder
CISO
New York State
Mark Connelly
CISO
Thomson Reuters
BREAKAWAY LEADER
Jay Leek
CISO
Blackstone
Governing Body
As Governing Body members, we represent the largest organizations in our region
and are responsible for the strategic direction of the CISO Executive Summit.
Zulfi Ahmed
SVP & Global CISO
MetLife
George Antoniou
Director Information Security
Delaware North Companies
Chris Armstrong
CISO
CVR Energy, Inc.
Vikrant Arora
CISO & Corporate Risk Officer
New York City Health and
Hospitals Corporation
Anthony Basile
CISO
AllianceBernstein L.P.
Medha Bhalodkar
CISO
Columbia University
Dennis Brixius
VP & CSO
McGraw Hill Financial
Ken Brothers
VP & Director, Information
Security Services
Federal Home Loan
Bank Of New York
Ralph Carey
Manager, Global Information
Security & Privacy
Terex Corporation
David Cass
Chief Information Security
Officer Cloud & SaaS
Operational Services
IBM
Roland Cloutier
Global CSO
ADP
BREAKAWAY LEADER
Andrew Conte
IS Officer
The Guardian Life Insurance
Company of America
Brendan Conway
Global Director of Information
Security & Risk Management
Coty Inc.
Dennis Dickstein
Chief Privacy & Information
Security Officer
UBS Financial Services Inc.
Thomas Dunbar
SVP & Chief
Information Risk Officer
XL Catlin
Stephen Gilmer
CISO
Sikorsky Aircraft Corporation
Tariq Habib
CISO
Metropolitan Transportation
Authority
Ronen Halevy
Director of
Information Security
Sony Corporation of America
Christopher Hall
Deputy CISO
BNY Mellon
Jaswinder Hayre
CISO
Dow Jones & Company, Inc.
Shukri Khader
CISO
Keurig Green Mountain, Inc.
Neal Kirschner
CISO
The Madison Square
Garden Company
Jonathan Klein
CISO
Broadridge Financial
Solutions, Inc.
Mark Leary
VP & CISO
Xerox Corporation
Marty Leidner
CISO
The Rockefeller University
Brian Lozada
CISO
Duff & Phelps
RESERVE YOUR SEAT TODAYGoverning Body
Tomas Maldonado
Global CISO
International Flavors &
Fragrances Inc.
Latha Maripuri
Global CISO
News Corporation
John McCaffrey
CIO
Westchester County
Kevin McGee
Chief Risk Officer
HCL Technologies Limited
Sanju Misra
CISO
Praxair, Inc.
Michael Palmer
Chief Information
Security Officer
National Football League
Dan Reynolds
VP, Chief of Sec. & Info. Arch.
Omnicom Group Inc.
Timothy Rogers
Sr. Mgr., Chief Sec. Architect
United Technologies
Corporation
Ramin Safai
CISO
Jefferies & Company, Inc.
Diane Schwartz
Global Director, Information
Security & Compliance
Fast Retailing
Pat Stack
IT Director, Enterprise
Applications
Eastman Kodak Company
Roy Thetford
VP, ISO
Federal Reserve
Bank of New York
Derek Vadala
Managing Director, CISO
Moody’s Corporation
ViJay Viswanathan
VP & CISO
HD Supply Holdings, Inc.
Stephen Ward
CSO & CISO
TIAA Financial Services
Glenn Watt
VP & CISO
Medidata Solutions
Laraine Weglarz
CISO
Kering
John Whiting
CISO
DDB Worldwide
Robert Zandoli
Global CISO
Bunge Limited
BRE AK AWAY
LE ADERSHIP
2016
CIS
The Breakaway Leadership
Award honors CISOs who
are revolutionizing their
organization’s competitive
position in the evolving
economy through visionary
leadership and business
transformation.
Built on peer recognition, this
is the most influential CISO
leadership awards program
of the year.
BREAKAWAY LEADERSHIP AWARD
Speakers
Allan Carey
VP, Business
Development
PhishMe
David Cass
Chief Information Security
Officer Cloud & SaaS
Operational Services
IBM
Mark Connelly
CISO
Thomson Reuters
BREAKAWAY LEADER
Brian Lozada
CISO
Duff & Phelps
Tomas Maldonado
Global CISO
International Flavors &
Fragrances Inc.
Brian Contos
Chief Security Strategist
Securonix
Brendan Conway
Global Director of
Information Security
& Risk Management
Coty Inc.
Stephen Gilmer
CISO
Sikorsky
Aircraft Corporation
Greig Arnold
VP, Executive Advisory
(Financial Services)
Optiv
Vikrant Arora
CISO & Corporate
Risk Officer
New York City Health and
Hospitals Corporation
Mike Buratowski
SVP, Cybersecurity
Services
Fidelis Cybersecurity
Sam King
Chief Strategy Officer
Veracode
George Kurtz
President/CEO
& Co-Founder
CrowdStrike
Marty Leidner
CISO
The Rockefeller University
Mark Goldstein
Deputy CISO
Forcepoint
Gabriel Gumbs
VP & Chief Product
Strategist
Identity Finder
Chris Inglis
Former Deputy Director
National Security Agency
John J. Masserini
CSO
Miami International
Holdings
BREAKAWAY LEADER
RESERVE YOUR SEAT TODAYSpeakers
Michael Palmer
Chief Information
Security Officer
National Football League
Mariano Nunez
CEO & Co-Founder
Onapsis, Inc.
Ramin Safai
CISO
Jefferies &
Company, Inc.
Pat Stack
IT Director,
Enterprise Applications
Eastman
Kodak Company
Adam Vincent
CEO
Threat Connect
Mark Viola
VP, Global CISO
Henry Schein, Inc.
Kylie Watson
CISO
Sumitomo Mitsui
Banking Corporation
Glenn Watt
VP & CISO
Medidata Solutions
Jeff Williams
Chief Technology
Officer/Co-Founder
Contrast Security
Joe Quigg
Cyber Security &
Risk Leader
Bay Dynamic
Kurt Stammberger
Chief Marketing Officer
Fortscale
Stephen Ward
CSO & CISO
TIAA Financial Services
John Whiting
CISO
DDB Worldwide
May 23, 2016 | 7:00am – 5:00pm
Conrad New York
Registration & Breakfast
Opening Keynote
Breakout Sessions & Networking
Luncheon Keynote
Breakout Sessions & Networking
Closing Keynote
Closing Reception & Prize Drawings
7:00am
7:45am
8:30am
11:40am
12:50pm
3:40pm
4:20pm
Charitable
Partner
Our invitation-only conference is private and limited to
qualified senior leaders who meet strict delegate criteria.
For more information, please contact:
Mike Magura | 503-808-9819 | mike.magura@evanta.com
RESERVE YOUR SEAT TODAY
Agenda Overview
RESERVE YOUR SEAT TODAYKeynote
Lessons Learned in the New Era of Security
Chris Inglis
Former Deputy Director
National Security Agency
Former deputy director of the NSA, Chris Inglis acted as the agency’s COO. Prior to his
retirement in 2014, Inglis spent most of his time defending the NSA from revelations by former
contractor Edward Snowden. A 1976 graduate of the U.S. Air Force Academy, Inglis holds
advanced degrees in engineering and computer science from Columbia University, Johns
Hopkins University and The George Washington University. He is also a graduate of the
Kellogg Business School executive development program, the U.S. Air Force Air War College,
Air Command and Staff College, and Squadron Officers’ School.
As deputy director of the U.S. National Security Agency at the time of the country’s
most notorious insider attack – the Edward Snowden breach – Chris Inglis experienced
the dawning of a new age of security first-hand. Inglis shares his insights on the critical
actions that security leaders must take to evaluate their readiness for a major breach,
and the critical capabilities required to deal with modern cyberthreats. In this engaging
keynote, Inglis imparts the lessons learned from the Snowden case and other hard-
earned wisdom from the latest barrage of high-profile breaches.
Keynote
Stephen Ward is CISO at TIAA, providing direction and ingenuity over cybersecurity and
technology risk. In this role, he manages the identification and remediation of IT risks
and the security technologies that safeguard the company’s information assets from
attacks. In addition to cybersecurity and risk, Ward provides a comprehensive governance
structure pertaining to security standards, processes and threats across the firm’s various
security disciplines. He has more than 16 years of experience in physical security, fraud,
cybersecurity, risk and information security.
Stephen Ward
CSO & CISO
TIAA Financial Services
Presenting to Your Board – It’s All About the “What”
Effective board presentations aren’t necessarily about fancy slide decks or weeks
of rehearsal. As a CISO, successful board presentations rely on the ability to
clearly communicate three critical messages: the threats your industry faces, the
organization’s technology risk and control posture, and security’s road map and
progress. Steve Ward rolls these factors into one business measurement service
that simplistically shows the board how each has morphed over time. In this keynote,
Ward will not talk about “how” to present to your boards. Instead, he’ll provide real
examples of “what” to present to boards in order to earn a coveted voice at the table.
Session Sponsor:
IBM
Valuable Experience and Knowledge
“Time is valuable, and I guard it carefully, which is why I
make an effort to attend the CISO Executive Summit. The
interactions with my peers, and their shared experiences,
allow me to come away from the summit with new ideas that
allow for a superior outcome for our business.”
Stephen Gilmer
CISO
Sikorsky Aircraft Corporation
Featured Session
Session Sponsor:
NTT Com Solutions
Mark Connelly is the CISO for Thomson Reuters, overseeing security operations,
governance, risk and compliance, application security, policies and controls, infrastructure
security, and security awareness and training. Connelly was named CISO of the Year for
the Northeast region in 2011 and an a Top 10 Breakaway Leader in 2013. He holds an M.S.
from the Sever Institute at Washington University, a B.A. from Washington University, an
M.A. from University of Missouri, and is a CISM, CGEIT, and CRISC.
Business Value and Security – No Longer an Either/Or
In today’s business world, information security and risk management are at the
nexus of business opportunity and customer expectations. As a critical business
value attribute, CISOs and the functions they directly or indirectly influence play an
increasingly business-critical function. Boards know it, customers know it and CISOs
know it. Continuing to deliver value that the business truly understands and actively
supports is key to the overall success of CISOs and the business. Mark Connelly
shares his insights on how to best deliver that business value with information security
and risk management as a key attribute of the company’s value.
BREAKAWAY LEADER
Mark Connelly
CISO
Thomson Reuters
Featured Session RESERVE YOUR SEAT TODAY
As CSO, John Masserini is responsible for information security, physical security, business
continuity and privacy for the MIAX Options Exchange. Prior to joining MIAX, Masserini
was the CISO for Dow Jones, overseeing security and risk management for all of the
Dow Jones and Wall Street Journal brands. He has held key leadership positions at
several information security market leaders. Masserini was named ISE Northeast Security
Executive of the Year in 2010 and one of the Evanta Top 10 Breakaway Leaders of 2013.
John J. Masserini
CSO
Miami International Holdings
Beyond IAM – Moving the Needle on User Provisioning
and Identity Management
It’s one of the oldest problems in the security industry, and yet, it has few solutions,
fewer best practices and almost no attention. Addressing general user access
controls, along with privileged access, is one of the most complex and intimidating
efforts a CISO can face. With maturing biometric and geolocational solutions, as well
as the use of new tools like user-behavior analytics, CISOs can drastically improve
their identity monitoring, provisioning and management. John Masserini shares his
insights into this opportunity for CISOs to elevate their security posture and business-
leader profile at the same time.
Session Sponsor:
Dell Software
Featured Session
As CISO for Sumitomo Mitsui Banking Corporation, Kylie Watson is charged with
establishing security strategy and direction, and is the corporate advocate for information
security best practices. She is responsible for defining the company’s security vision in
support of the business and promoting a culture of security. Watson’s role also includes
system risk management and security operations. Watson has more than 20 years of
experience in IT. Prior to joining SMBC, Watson worked for IBM in Australia and Monbusho,
Japan. She holds CISSP, CISM and CRISC certifications.
Kylie Watson
CISO
Sumitomo Mitsui
Banking Corporation
Cyber Risk is Business Risk – Changing the
Security Narrative
As the world of cybersecurity grows scarier by the moment, the CISO is becoming
an integral business partner. While this elevated notoriety has brought increased
budgets, influence and engagement from leadership, it also has many business
leaders assuming that the CISO will simply manage all aspects of corporate cyber
risk. Changing the business’ mindset to view cyber risk as a business issue – not an
IT one – can be a challenging hurdle to clear. Learn how Kylie Watson successfully
shifted her organization’s thinking about cyber risk and gained sponsorship from her
CEO through the development of a cyber risk committee.
Session Sponsor:
Palo Alto Networks
Featured Session RESERVE YOUR SEAT TODAY
Session Sponsor:
CrowdStrike
Serial entrepreneur George Kurtz is president and co-founder of CrowdStrike, a big data
and security technology company focused on helping enterprises and governments protect
their most sensitive intellectual property and national security information. Kurtz is an
internationally recognized security expert, author, entrepreneur and speaker. He has more
than 20 years of experience in the security space, including extensive experience driving
revenue growth and scaling small and large organizations.
George Kurtz
President/CEO  Co-Founder
CrowdStrike
Stop the Breach – Using Cloud as a Powerful Game
Changer in the Fight
Today’s hacktivist, criminal and nation-state adversaries have a tremendous
asymmetric advantage over defenders that manifests itself in the constant stream of
breaches. George Kurtz shares a new approach for meaningfully changing the game
and shifting the advantage to defense. Through fascinating war stories and real-world
examples, Kurtz will discuss how the use of cloud-based security technologies is
thwarting and deterring some of the most persistent and advanced adversaries.
Featured Session
Session Sponsor:
Forcepoint
As a senior security strategist for Forcepoint, Mark Goldstein is a cybersecurity and privacy
professional with more than 20 years’ experience in IT, security, sales, marketing, customer
support, legal and privacy in commercial enterprises. Previously, he worked at America
Online. Goldstein founded the “malvertising working group,” is a senior advisor for the
Online Trust Alliance, mentor at MACH37 (cybersecurity incubator), and a member of the
Northern Virginia Tech Council’s Cybersecurity and Privacy Committee as well as Infragard.
He holds CIPP and CISSP certifications and an MBA from American University.
Mark Goldstein
Deputy CISO
Forcepoint
Building a Successful Audit Program to Keep Insider
Threats at Bay
Insider threats encompass more than just the obvious data thief. According to the
CERT Insider Threat Center, in 2014, 53 percent of organizations experienced some
type of insider incident. While your IT system can be a witness, victim or enabler,
insider threat is more than a technology problem — policy, process, controls, risk
management, auditing and monitoring all play critical roles in managing this invisible
yet very real vulnerability. Mark Goldstein shares the key steps to managing and
mitigating insider threats within your organization.
Relevant, Applicable Content
“The CISO Executive Summit is the only information
security conference that speaks directly to the CISO,
addressing the issues and challenges facing us today.”
Ray Lipps
Senior Director, Global IT Security
Celgene Corporation
Featured Session
This session consists of three concise and compelling 15-minute presentations.
Each brief, high-value presentation will extract a leading best practice or a
breakthrough industry solution.
Application
Self-Protection
– Revolutionizing
Application Security
Today’s enterprise runs on
applications. Yet insecure
applications have been the
leading cause of breaches
over the last eight years. Deep
security instrumentation can
provide application vulnerability
detection and attack protection
in a single platform, increasing
power, accuracy and scalability.
Emerging Provider:
Fortscale
Emerging Provider:
Threat Connect
Emerging Provider:
Contrast Security
Jeff Williams
Chief Technology
Officer/Co-Founder
Contrast Security
Behaving Badly
– Analyzing
Insider Threats
Learn how to end insider
threats with a new generation
of autonomous, rule-free user
behavior analytics based on
machine learning.
Kurt Stammberger
Chief Marketing Officer
Fortscale
Adam Vincent
CEO
Threat Connect
In Hot Pursuit
– Faster and
Smarter Security
With adversaries moving at the
speed of digital, every moment
counts. CISOs must create
organizational capabilities to
swiftly detect and expel threats.
Embrace the challenge of
speedy security, examining
methods to close the gap
between you and your enemies.
RESERVE YOUR SEAT TODAYExecutive Boardroom
Executive boardrooms
are private, closed-door
sessions focused on
candid dialogue between
attendees. Seating is
limited and reserved for
CISOs (or equivalent).
Sam King
Chief Strategy Officer
Veracode
Moderator
John Whiting
CISO
DDB Worldwide
Discussion Leader
Securing Your Software Supply Chain
Enterprises are increasingly reliant on third-parties to speed
innovation. But as recent breaches have shown, third-party software
introduces significant risk and necessitates a security evaluation
from these supply chain partners. Purchasing software from a
vendor, outsourcing development, using open-source components
or moving to the cloud all introduce risk that is out of a CISO’s direct
control. Glenn Watt, John Whiting and Sam King lead this discussion
on third-party security threats and how to protect your enterprise.
Come prepared to share best practices for partnering with vendors
and implementing approaches to assess the third party software
protecting your enterprise.
Session Sponsor:
Veracode
Glenn Watt
VP  CISO
Medidata Solutions
Discussion Leader
To reserve your seat,
please contact:
Mike Magura
503-808-9819
mike.magura@evanta.com
Executive Boardroom
Brian Contos
Chief Security
Strategist
Securonix
Moderator
Pat Stack
IT Director,
Enterprise Applications
Eastman Kodak Company
Discussion Leader
Addressing Cybersecurity Challenges With Applied
Security Analytics
Data-driven artificial intelligence and unsupervised machine learning can now answer the
question that has plagued information security practitioners since day one: How do you
know when something is happening in your environment that shouldn’t? Led by Michael
Palmer, Pat Stack and Securonix’s Brian Contos, this interactive discussion looks at
advances in behavioral analytics that address critical security problems, featuring insights
from security leaders who use advanced analytics to detect threats invisible to traditional
security measures.
Session Sponsor:
Securonix
Executive Boardroom
Greig Arnold
VP, Executive Advisory
(Financial Services)
Optiv
Moderator
Tomas Maldonado
Global CISO
International Flavors 
Fragrances Inc.
Discussion Leader
Session Sponsor:
Optiv
From CISO to CIRO – Evolving Skills for the Future
The past year has seen a tidal shift from infrastructure-based to risk-based security
programs. Board meetings, executive briefings and risk management concepts are now
the norm. Successful CISOs are transforming their skills to meet the current and future
needs of their organization. A chief information risk officer understands information
risk management, third-party risk and regulatory requirements, and knows how to
prepare board presentations and balance each of those priorities with the needs of the
business. This boardroom discussion will focus on the changing role of the CISO and the
necessary skills to earn – and keep – a seat at the table.
RESERVE YOUR SEAT TODAY
Michael Palmer
Chief Information
Security Officer
National Football League
Discussion Leader
Executive Boardroom
Mike Buratowski
SVP, Cybersecurity Services
Fidelis Cybersecurity
Moderator
Stephen Gilmer
CISO
Sikorsky Aircraft Corporation
Discussion Leader
Session Sponsor:
Fidelis Cybersecurity
The First 72 Hours
The initial signs of a security incident are rarely black and white. The first questions CISOs must ask
are “Is this a real incident?” and “How should I respond?” Stephen Gilmer and Mike Buratowski lead
this discussion on the first and most critical hours of a potential incident response. While removing
the attacker is obviously the end goal, security teams must first understand the nature and scope of
the incident to identify the course of action that will be most effective while balancing the risk to the
organization and the disruption that the response can cause.
Executive Boardroom
Marty Leidner
CISO
The Rockefeller University
Discussion Leader
David Cass
Chief Information Security Officer
Cloud  SaaS Operational Services
IBM
Discussion Leader
Session Sponsor:
Bay Dynamics
Managing Cyber Risk – Effective Communication with
the Board
CISOs are confident in what cybersecurity threat information to present to the board and
what type of information the board wants to hear. However, much of this information is
either misunderstood or too technical. How can CISOs streamline the process and provide
more actionable information? For the board to make decisions regarding an organization’s
cybersecurity risk posture, they need quantitative information framed in the context of relevant
business concerns. This interactive dialogue provides insights on the tools and processes
modern CISOs can use to translate cybersecurity risk into a language that non-security
practitioners can understand and use to drive decisions.
RESERVE YOUR SEAT TODAY
Joe Quigg
Cyber Security  Risk Leader
Bay Dynamics
Moderator
Executive Boardroom
Pat Stack
IT Director,
Enterprise Applications
Eastman Kodak Company
Discussion Leader
Mariano Nunez
CEO  Co-Founder
Onapsis, Inc.
Moderator
Brendan Conway
Global Director of Information
Security  Risk Management
Coty Inc.
Discussion Leader
Session Sponsor:
Onapsis, Inc.
Defending Against the Rising Trend of SAP Cyberattacks
Business-critical applications running on SAP are a goldmine for cyberattackers. They
are also the highest-cost blind spot for many CISOs. As SAP applications continue to be
the target of stealthy breaches, organizations must implement the right security products
and ensure they have an SAP cybersecurity strategy. Brendan Conway, Pat Stack and
Mariano Nunez lead this discussion on SAP cyber readiness, including recommendations
for remediation plans, industry best practices for SAP cybersecurity, the latest vulnerability
research, business-critical application security, and aligning internal and SAP security
teams to operationalize SAP cybersecurity processes within an organization.
Executive Boardroom RESERVE YOUR SEAT TODAY
Gabriel Gumbs
VP  Chief Product
Strategist
Identity Finder, LLC
Moderator
Ramin Safai
CISO
Jefferies  Company, Inc.
Discussion Leader
Session Sponsor:
Identity Finder
Security Process Improvement – How to Stop Worrying and
Love Maturity Models
There is no shortage of information security maturity models – COBIT, C2M2,
Cybersecurity Capability Maturity Model, ISO/IEC 21827:2008, Sensitive Data Maturity
Model, and many more. Each of them complete with a set of activities that mostly exist
at a high level and are intended to protect data, specifically, sensitive data. Join Gabriel
Gumbs and discussion leader Ramin Safai for this executive boardroom discussion on
selecting and adopting processes improvement strategies, the pros and cons of existing
maturity models and best practices for prioritizing the protection of sensitive data.
Executive Boardroom
Brian Lozada
CISO
Duff  Phelps
Discussion Leader
Vikrant Arora
CISO  Corporate Risk Officer
New York City Health and
Hospitals Corporation
Discussion Leader
Session Sponsor:
PhishMe
2016, Year of Ransomware – Can Technology Alone
Prevent Phishing Attacks?
2016 is shaping up to be the year of the ransomware attack. As ransomware and
phishing attacks continue to grow in number and sophistication, organizations need
to reconsider their current security strategy. Companies continue to invest billions in
technology to shore up their defenses against these threats – but is that enough? Is
complete reliance on technology the answer? Or should we focus on the human and
human behavior? Vikrant Arora, Brian Lozada and Allan Carey lead this discussion on
the new threats faced by organizations, why relying on technology is dangerous and
how to leverage all resources – including humans – for a stronger security posture.
Allan Carey
VP, Business Development
PhishMe
Moderator
SM
SM
DON’T FACE CYBERSECURITY CHALLENGES ALONE
For every challenge, imagine having a fellow CISO available with a proven solution.
Join Your Peers Today at join.cisocoalition.com
For more information, please contact Stuart Cohen, General Manager of CISO Coalition
at 971-717-6665 or stuart.cohen@evanta.com.
NATIONAL LEADERSHIP BOARD
“Connecting with the best and brightest in the
industry makes each one of us better equipped to
combat the risk facing our organizations.”
Steven Young
VP, Security  Risk Management, CISO
Kellogg’s
Thank you to our sponsors for their support.
Local Sponsors
National Thought Leaders
National Sponsors
Presenting Sponsors
Quality Networking.
Immeasurable Value.
“There are few events I ensure I make time for every year,
and the New York CISO Executive Summit is one of them.
Year after year, this conference provides immeasurable
value – from the breadth and depth of speakers, to the
quality of the networking and peer sessions, the New York
CISO Executive Summit is one to not be missed. It is truly a
day I look forward to each year.”
John J. Masserini
CSO
Miami International Holdings
Schedule of Programs
CIO Executive
Summit
Atlanta
Boston
Chicago
Cincinnati
Dallas
Detroit
Houston
Minneapolis
New Jersey
New York
Philadelphia
San Francisco
Southern California
Toronto
Vancouver, BC
Washington, DC
Global CIO
Executive Summit
Pennsylvania
CXO Executive
Summit
(CIO/CISO/CDO)
Calgary
Charlotte
Connecticut
Denver
Indianapolis
Miami
Milwaukee
Montreal
Orlando
Phoenix
Pittsburgh
Seattle
St. Louis
CISO Executive
Summit
Atlanta
Boston
Chicago
Cincinnati
Dallas
Detroit
Houston
Minneapolis
New Jersey
New York
Philadelphia
San Francisco
Southern California
Toronto
Vancouver, BC
Washington, DC
Global CISO
Executive Summit
Pennsylvania
CHRO Leadership
Summit
Atlanta
Boston
Chicago
Cincinnati
Dallas
Detroit
Houston
Minneapolis
New York
Philadelphia/New Jersey
San Francisco
Southern California
Toronto
Vancouver, BC
Washington, DC
CFO Executive
Summit
Atlanta
Chicago
Dallas
Houston
Los Angeles
New York
San Francisco
CISO Solutions Tour
Atlanta
Boston
Chicago
Cincinnati
Dallas
Detroit
Houston
Minneapolis
New Jersey
New York
Philadelphia
San Francisco
Southern California
Toronto
Vancouver, BC
Washington, DC
CIO Institute
Chicago
Columbia
Texas
UC Berkeley
CISO Institute
Chicago
Texas
UC Berkeley
RESERVE YOUR SEAT TODAYSchedule of Programs
CIO Inner Circle
Dinner Series
Atlanta
Boston
Chicago
Cincinnati
Dallas
Detroit
Houston
Minneapolis
New Jersey
New York
Philadelphia
San Francisco
Southern California
Toronto
Vancouver, BC
Washington, DC
CISO Inner Circle
Dinner Series
Atlanta
Boston
Chicago
Cincinnati
Dallas
Detroit
Houston
Minneapolis
New Jersey
New York
Philadelphia
San Francisco
Southern California
Toronto
Vancouver, BC
Washington, DC
CDO Inner Circle
Dinner Series
Atlanta
Boston
Chicago
Cincinnati
Dallas
Detroit
Houston
Minneapolis
New York
San Francisco
Southern California
Toronto
Washington, DC
CFO Invitational
Atlanta
Chicago
Detroit
Kansas City
Milwaukee
Minneapolis
Orange County
Pittsburgh
Portland
San Francisco
Seattle
Women’s Leadership
Invitational
San Francisco
Global Sports Summit
Aspen
Global Sports
Management Summit
New York
Collegiate Sports
Summit
Santa Monica
The most trusted brand in the industry.
Click here for
detailed schedule.
We make leaders better.
ContactAndrewSaderat503-445-6568orandrew.sader@evanta.com
Visit evantaacademy.com for more information.
“Severalofourmostpromisingfrontlinemanagerswereamongthefirstto
enroll.Wehaveseenimmediatevaluefromtheirparticipation.”
– Wes Hargrove, SVP Development, 7-Eleven
Guidance and thought leadership
provided by General Colin Powell,
Fortune 1000 CXOs and top professors
from the most prestigious universities.
UPCOMING CLASSES
Frontline IT
Leadership
June 6
Enterprise
Cybersecurity
July 25
High Performance
Leadership
July 25
Women in
Leadership
July 25
ENROLL NOW
Place PDA video here
Our purpose:
Evanta brings together the world’s
most accomplished leaders to improve
awareness and performance, because we
believe effective collaboration is the key to
individual and organizational prosperity.
Presented by
©2016. All rights reserved.

Weitere ähnliche Inhalte

Was ist angesagt?

Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise The Economist Media Businesses
 
The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The Economist Media Businesses
 
10 Questions for the C-Suite in Assessing Cyber Risk
10 Questions for the C-Suite in Assessing Cyber Risk10 Questions for the C-Suite in Assessing Cyber Risk
10 Questions for the C-Suite in Assessing Cyber RiskMark Gibson
 
Executive Summary on the Cyber Risk Webinar
Executive Summary on the Cyber Risk WebinarExecutive Summary on the Cyber Risk Webinar
Executive Summary on the Cyber Risk WebinarFERMA
 
HR summit 2013 - Role of HR in Crisis Management & Organizational Sustainability
HR summit 2013 - Role of HR in Crisis Management & Organizational SustainabilityHR summit 2013 - Role of HR in Crisis Management & Organizational Sustainability
HR summit 2013 - Role of HR in Crisis Management & Organizational SustainabilityMarc Ronez
 
Dr Temares - Understanding True Leadership
Dr Temares - Understanding True LeadershipDr Temares - Understanding True Leadership
Dr Temares - Understanding True LeadershipSolusoft
 
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibmciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibmPriyanka Aash
 
How To Integrate Business Risk & IT Risk
How To Integrate Business Risk & IT Risk How To Integrate Business Risk & IT Risk
How To Integrate Business Risk & IT Risk SureCloud
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementDaren Dunkel
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...balejandre
 
Internal Fraud conference 2013 - Effective Whistleblowing Policy to fight Fraud
Internal Fraud conference 2013 - Effective Whistleblowing Policy to fight FraudInternal Fraud conference 2013 - Effective Whistleblowing Policy to fight Fraud
Internal Fraud conference 2013 - Effective Whistleblowing Policy to fight FraudMarc Ronez
 

Was ist angesagt? (20)

Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise
 
The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...
 
7350_RiskWatch-Summer2015-Maligec
7350_RiskWatch-Summer2015-Maligec7350_RiskWatch-Summer2015-Maligec
7350_RiskWatch-Summer2015-Maligec
 
10 Questions for the C-Suite in Assessing Cyber Risk
10 Questions for the C-Suite in Assessing Cyber Risk10 Questions for the C-Suite in Assessing Cyber Risk
10 Questions for the C-Suite in Assessing Cyber Risk
 
Risk Forum For Attendees
Risk Forum For AttendeesRisk Forum For Attendees
Risk Forum For Attendees
 
Executive Summary on the Cyber Risk Webinar
Executive Summary on the Cyber Risk WebinarExecutive Summary on the Cyber Risk Webinar
Executive Summary on the Cyber Risk Webinar
 
HR summit 2013 - Role of HR in Crisis Management & Organizational Sustainability
HR summit 2013 - Role of HR in Crisis Management & Organizational SustainabilityHR summit 2013 - Role of HR in Crisis Management & Organizational Sustainability
HR summit 2013 - Role of HR in Crisis Management & Organizational Sustainability
 
Dr Temares - Understanding True Leadership
Dr Temares - Understanding True LeadershipDr Temares - Understanding True Leadership
Dr Temares - Understanding True Leadership
 
In the news
In the newsIn the news
In the news
 
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibmciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
 
How To Integrate Business Risk & IT Risk
How To Integrate Business Risk & IT Risk How To Integrate Business Risk & IT Risk
How To Integrate Business Risk & IT Risk
 
The perils of a general counsel
The perils of a general counsel The perils of a general counsel
The perils of a general counsel
 
csxnewsletter
csxnewslettercsxnewsletter
csxnewsletter
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Security Feature Cover Story
Security Feature Cover StorySecurity Feature Cover Story
Security Feature Cover Story
 
The meaning of security in the 21st century
The meaning of security in the 21st centuryThe meaning of security in the 21st century
The meaning of security in the 21st century
 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...
 
Sept-Oct16_InfoSecProArticle_BrettOsborne
Sept-Oct16_InfoSecProArticle_BrettOsborneSept-Oct16_InfoSecProArticle_BrettOsborne
Sept-Oct16_InfoSecProArticle_BrettOsborne
 
Internal Fraud conference 2013 - Effective Whistleblowing Policy to fight Fraud
Internal Fraud conference 2013 - Effective Whistleblowing Policy to fight FraudInternal Fraud conference 2013 - Effective Whistleblowing Policy to fight Fraud
Internal Fraud conference 2013 - Effective Whistleblowing Policy to fight Fraud
 

Ähnlich wie Ciso NYC

Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyMighty Guides, Inc.
 
12 Top Talks from the 2017 R-CISC Summit
12 Top Talks from the 2017 R-CISC Summit12 Top Talks from the 2017 R-CISC Summit
12 Top Talks from the 2017 R-CISC SummitTripwire
 
The 10 Best Cyber Leaders Igniting the Future of Security with Innovation.pdf
The 10 Best Cyber Leaders Igniting the Future of Security with Innovation.pdfThe 10 Best Cyber Leaders Igniting the Future of Security with Innovation.pdf
The 10 Best Cyber Leaders Igniting the Future of Security with Innovation.pdfCIO Look Magazine
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Matthew Rosenquist
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyAgus Wicaksono
 
10 Most Influential Business Leaders in Cyber Security April 2022.pdf
10 Most Influential Business Leaders in Cyber Security  April 2022.pdf10 Most Influential Business Leaders in Cyber Security  April 2022.pdf
10 Most Influential Business Leaders in Cyber Security April 2022.pdfinsightssuccess2
 
Internet and Social Media Monitoring and Investigations with Bios
Internet and Social Media Monitoring and Investigations with BiosInternet and Social Media Monitoring and Investigations with Bios
Internet and Social Media Monitoring and Investigations with BiosAndrew Dailey, CPP
 
Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxNakhoudah
 
Security of Things World USA 2016 - Post Event Report
Security of Things World USA 2016 - Post Event ReportSecurity of Things World USA 2016 - Post Event Report
Security of Things World USA 2016 - Post Event ReportRamona Kohrs
 
The most innovative cybersecurity leaders to watch in 2024.pdf
The most innovative cybersecurity leaders to watch in 2024.pdfThe most innovative cybersecurity leaders to watch in 2024.pdf
The most innovative cybersecurity leaders to watch in 2024.pdfInsightsSuccess4
 
HispanoTech Event - The Cyber Security Readiness of Canadian Organizations
HispanoTech Event - The Cyber Security Readiness of Canadian OrganizationsHispanoTech Event - The Cyber Security Readiness of Canadian Organizations
HispanoTech Event - The Cyber Security Readiness of Canadian OrganizationsFernando Blasco
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AWard Pyles
 
ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)Julie Bridgen
 
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us SolarWinds
 
CISO Summit 2020 Post Event Report
CISO Summit 2020 Post Event ReportCISO Summit 2020 Post Event Report
CISO Summit 2020 Post Event ReportSarthak Nanda
 
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 ReportRahul Neel Mani
 

Ähnlich wie Ciso NYC (20)

Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
 
12 Top Talks from the 2017 R-CISC Summit
12 Top Talks from the 2017 R-CISC Summit12 Top Talks from the 2017 R-CISC Summit
12 Top Talks from the 2017 R-CISC Summit
 
The 10 Best Cyber Leaders Igniting the Future of Security with Innovation.pdf
The 10 Best Cyber Leaders Igniting the Future of Security with Innovation.pdfThe 10 Best Cyber Leaders Igniting the Future of Security with Innovation.pdf
The 10 Best Cyber Leaders Igniting the Future of Security with Innovation.pdf
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
 
Building Cyber Resilience
Building Cyber ResilienceBuilding Cyber Resilience
Building Cyber Resilience
 
10 Most Influential Business Leaders in Cyber Security April 2022.pdf
10 Most Influential Business Leaders in Cyber Security  April 2022.pdf10 Most Influential Business Leaders in Cyber Security  April 2022.pdf
10 Most Influential Business Leaders in Cyber Security April 2022.pdf
 
CRI-Exec-Cyber-Briefings (1)
CRI-Exec-Cyber-Briefings (1)CRI-Exec-Cyber-Briefings (1)
CRI-Exec-Cyber-Briefings (1)
 
The State of Cyber
The State of CyberThe State of Cyber
The State of Cyber
 
Internet and Social Media Monitoring and Investigations with Bios
Internet and Social Media Monitoring and Investigations with BiosInternet and Social Media Monitoring and Investigations with Bios
Internet and Social Media Monitoring and Investigations with Bios
 
Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptx
 
Security of Things World USA 2016 - Post Event Report
Security of Things World USA 2016 - Post Event ReportSecurity of Things World USA 2016 - Post Event Report
Security of Things World USA 2016 - Post Event Report
 
The most innovative cybersecurity leaders to watch in 2024.pdf
The most innovative cybersecurity leaders to watch in 2024.pdfThe most innovative cybersecurity leaders to watch in 2024.pdf
The most innovative cybersecurity leaders to watch in 2024.pdf
 
HispanoTech Event - The Cyber Security Readiness of Canadian Organizations
HispanoTech Event - The Cyber Security Readiness of Canadian OrganizationsHispanoTech Event - The Cyber Security Readiness of Canadian Organizations
HispanoTech Event - The Cyber Security Readiness of Canadian Organizations
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
 
ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
 
CISO Summit 2020 Post Event Report
CISO Summit 2020 Post Event ReportCISO Summit 2020 Post Event Report
CISO Summit 2020 Post Event Report
 
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
 

Kürzlich hochgeladen

CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceanilsa9823
 
operational plan ppt.pptx nursing management
operational plan ppt.pptx nursing managementoperational plan ppt.pptx nursing management
operational plan ppt.pptx nursing managementTulsiDhidhi1
 
internal analysis on strategic management
internal analysis on strategic managementinternal analysis on strategic management
internal analysis on strategic managementharfimakarim
 
Dealing with Poor Performance - get the full picture from 3C Performance Mana...
Dealing with Poor Performance - get the full picture from 3C Performance Mana...Dealing with Poor Performance - get the full picture from 3C Performance Mana...
Dealing with Poor Performance - get the full picture from 3C Performance Mana...Hedda Bird
 
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, MumbaiPooja Nehwal
 
Does Leadership Possible Without a Vision.pptx
Does Leadership Possible Without a Vision.pptxDoes Leadership Possible Without a Vision.pptx
Does Leadership Possible Without a Vision.pptxSaqib Mansoor Ahmed
 
Continuous Improvement Infographics for Learning
Continuous Improvement Infographics for LearningContinuous Improvement Infographics for Learning
Continuous Improvement Infographics for LearningCIToolkit
 
Agile Coaching Change Management Framework.pptx
Agile Coaching Change Management Framework.pptxAgile Coaching Change Management Framework.pptx
Agile Coaching Change Management Framework.pptxalinstan901
 
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Pooja Nehwal
 

Kürzlich hochgeladen (20)

CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
 
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
operational plan ppt.pptx nursing management
operational plan ppt.pptx nursing managementoperational plan ppt.pptx nursing management
operational plan ppt.pptx nursing management
 
internal analysis on strategic management
internal analysis on strategic managementinternal analysis on strategic management
internal analysis on strategic management
 
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Discover -CQ Master Class - Rikita Wadhwa.pdf
Discover -CQ Master Class - Rikita Wadhwa.pdfDiscover -CQ Master Class - Rikita Wadhwa.pdf
Discover -CQ Master Class - Rikita Wadhwa.pdf
 
Dealing with Poor Performance - get the full picture from 3C Performance Mana...
Dealing with Poor Performance - get the full picture from 3C Performance Mana...Dealing with Poor Performance - get the full picture from 3C Performance Mana...
Dealing with Poor Performance - get the full picture from 3C Performance Mana...
 
Becoming an Inclusive Leader - Bernadette Thompson
Becoming an Inclusive Leader - Bernadette ThompsonBecoming an Inclusive Leader - Bernadette Thompson
Becoming an Inclusive Leader - Bernadette Thompson
 
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote SpeakerLeadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
 
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
 
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
 
Empowering Local Government Frontline Services - Mo Baines.pdf
Empowering Local Government Frontline Services - Mo Baines.pdfEmpowering Local Government Frontline Services - Mo Baines.pdf
Empowering Local Government Frontline Services - Mo Baines.pdf
 
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg PartnershipUnlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
 
LoveLocalGov - Chris Twigg, Inner Circle
LoveLocalGov - Chris Twigg, Inner CircleLoveLocalGov - Chris Twigg, Inner Circle
LoveLocalGov - Chris Twigg, Inner Circle
 
Does Leadership Possible Without a Vision.pptx
Does Leadership Possible Without a Vision.pptxDoes Leadership Possible Without a Vision.pptx
Does Leadership Possible Without a Vision.pptx
 
Continuous Improvement Infographics for Learning
Continuous Improvement Infographics for LearningContinuous Improvement Infographics for Learning
Continuous Improvement Infographics for Learning
 
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdfImagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
 
Agile Coaching Change Management Framework.pptx
Agile Coaching Change Management Framework.pptxAgile Coaching Change Management Framework.pptx
Agile Coaching Change Management Framework.pptx
 
Peak Performance & Resilience - Dr Dorian Dugmore
Peak Performance & Resilience - Dr Dorian DugmorePeak Performance & Resilience - Dr Dorian Dugmore
Peak Performance & Resilience - Dr Dorian Dugmore
 
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
 

Ciso NYC

  • 2. Our promise: We only invite CISOs who are top leaders regionally, nationally and globally who make strong contributions to their peers by openly sharing ideas, experiences, successes and failures. “by CISOs, for CISOs”
  • 3. Zouhair Guelzim VP & CISO L’Oréal Americas BREAKAWAY LEADER Please join us at the New York CISO Executive Summit, a gathering dedicated to CISOs. This is our opportunity to leverage the expertise of our peers, share innovative ideas and inspire our community. Your 2016 Governing Body Chairs Raymond Lipps Senior Director, Global IT Security Celgene Corporation Mark Viola VP, Global CISO Henry Schein, Inc. Michael Higgins VP & CISO NBCUniversal, Inc. John J. Masserini CSO Miami International Holdings BREAKAWAY LEADER Kylie Watson CISO Sumitomo Mitsui Banking Corporation Linda Betz CISO The Travelers Companies, Inc. Deborah Snyder CISO New York State Mark Connelly CISO Thomson Reuters BREAKAWAY LEADER Jay Leek CISO Blackstone
  • 4. Governing Body As Governing Body members, we represent the largest organizations in our region and are responsible for the strategic direction of the CISO Executive Summit. Zulfi Ahmed SVP & Global CISO MetLife George Antoniou Director Information Security Delaware North Companies Chris Armstrong CISO CVR Energy, Inc. Vikrant Arora CISO & Corporate Risk Officer New York City Health and Hospitals Corporation Anthony Basile CISO AllianceBernstein L.P. Medha Bhalodkar CISO Columbia University Dennis Brixius VP & CSO McGraw Hill Financial Ken Brothers VP & Director, Information Security Services Federal Home Loan Bank Of New York Ralph Carey Manager, Global Information Security & Privacy Terex Corporation David Cass Chief Information Security Officer Cloud & SaaS Operational Services IBM Roland Cloutier Global CSO ADP BREAKAWAY LEADER Andrew Conte IS Officer The Guardian Life Insurance Company of America Brendan Conway Global Director of Information Security & Risk Management Coty Inc. Dennis Dickstein Chief Privacy & Information Security Officer UBS Financial Services Inc. Thomas Dunbar SVP & Chief Information Risk Officer XL Catlin Stephen Gilmer CISO Sikorsky Aircraft Corporation Tariq Habib CISO Metropolitan Transportation Authority Ronen Halevy Director of Information Security Sony Corporation of America Christopher Hall Deputy CISO BNY Mellon Jaswinder Hayre CISO Dow Jones & Company, Inc. Shukri Khader CISO Keurig Green Mountain, Inc. Neal Kirschner CISO The Madison Square Garden Company Jonathan Klein CISO Broadridge Financial Solutions, Inc. Mark Leary VP & CISO Xerox Corporation Marty Leidner CISO The Rockefeller University Brian Lozada CISO Duff & Phelps
  • 5. RESERVE YOUR SEAT TODAYGoverning Body Tomas Maldonado Global CISO International Flavors & Fragrances Inc. Latha Maripuri Global CISO News Corporation John McCaffrey CIO Westchester County Kevin McGee Chief Risk Officer HCL Technologies Limited Sanju Misra CISO Praxair, Inc. Michael Palmer Chief Information Security Officer National Football League Dan Reynolds VP, Chief of Sec. & Info. Arch. Omnicom Group Inc. Timothy Rogers Sr. Mgr., Chief Sec. Architect United Technologies Corporation Ramin Safai CISO Jefferies & Company, Inc. Diane Schwartz Global Director, Information Security & Compliance Fast Retailing Pat Stack IT Director, Enterprise Applications Eastman Kodak Company Roy Thetford VP, ISO Federal Reserve Bank of New York Derek Vadala Managing Director, CISO Moody’s Corporation ViJay Viswanathan VP & CISO HD Supply Holdings, Inc. Stephen Ward CSO & CISO TIAA Financial Services Glenn Watt VP & CISO Medidata Solutions Laraine Weglarz CISO Kering John Whiting CISO DDB Worldwide Robert Zandoli Global CISO Bunge Limited BRE AK AWAY LE ADERSHIP 2016 CIS The Breakaway Leadership Award honors CISOs who are revolutionizing their organization’s competitive position in the evolving economy through visionary leadership and business transformation. Built on peer recognition, this is the most influential CISO leadership awards program of the year. BREAKAWAY LEADERSHIP AWARD
  • 6. Speakers Allan Carey VP, Business Development PhishMe David Cass Chief Information Security Officer Cloud & SaaS Operational Services IBM Mark Connelly CISO Thomson Reuters BREAKAWAY LEADER Brian Lozada CISO Duff & Phelps Tomas Maldonado Global CISO International Flavors & Fragrances Inc. Brian Contos Chief Security Strategist Securonix Brendan Conway Global Director of Information Security & Risk Management Coty Inc. Stephen Gilmer CISO Sikorsky Aircraft Corporation Greig Arnold VP, Executive Advisory (Financial Services) Optiv Vikrant Arora CISO & Corporate Risk Officer New York City Health and Hospitals Corporation Mike Buratowski SVP, Cybersecurity Services Fidelis Cybersecurity Sam King Chief Strategy Officer Veracode George Kurtz President/CEO & Co-Founder CrowdStrike Marty Leidner CISO The Rockefeller University Mark Goldstein Deputy CISO Forcepoint Gabriel Gumbs VP & Chief Product Strategist Identity Finder Chris Inglis Former Deputy Director National Security Agency John J. Masserini CSO Miami International Holdings BREAKAWAY LEADER
  • 7. RESERVE YOUR SEAT TODAYSpeakers Michael Palmer Chief Information Security Officer National Football League Mariano Nunez CEO & Co-Founder Onapsis, Inc. Ramin Safai CISO Jefferies & Company, Inc. Pat Stack IT Director, Enterprise Applications Eastman Kodak Company Adam Vincent CEO Threat Connect Mark Viola VP, Global CISO Henry Schein, Inc. Kylie Watson CISO Sumitomo Mitsui Banking Corporation Glenn Watt VP & CISO Medidata Solutions Jeff Williams Chief Technology Officer/Co-Founder Contrast Security Joe Quigg Cyber Security & Risk Leader Bay Dynamic Kurt Stammberger Chief Marketing Officer Fortscale Stephen Ward CSO & CISO TIAA Financial Services John Whiting CISO DDB Worldwide
  • 8. May 23, 2016 | 7:00am – 5:00pm Conrad New York Registration & Breakfast Opening Keynote Breakout Sessions & Networking Luncheon Keynote Breakout Sessions & Networking Closing Keynote Closing Reception & Prize Drawings 7:00am 7:45am 8:30am 11:40am 12:50pm 3:40pm 4:20pm Charitable Partner Our invitation-only conference is private and limited to qualified senior leaders who meet strict delegate criteria. For more information, please contact: Mike Magura | 503-808-9819 | mike.magura@evanta.com RESERVE YOUR SEAT TODAY Agenda Overview
  • 9. RESERVE YOUR SEAT TODAYKeynote Lessons Learned in the New Era of Security Chris Inglis Former Deputy Director National Security Agency Former deputy director of the NSA, Chris Inglis acted as the agency’s COO. Prior to his retirement in 2014, Inglis spent most of his time defending the NSA from revelations by former contractor Edward Snowden. A 1976 graduate of the U.S. Air Force Academy, Inglis holds advanced degrees in engineering and computer science from Columbia University, Johns Hopkins University and The George Washington University. He is also a graduate of the Kellogg Business School executive development program, the U.S. Air Force Air War College, Air Command and Staff College, and Squadron Officers’ School. As deputy director of the U.S. National Security Agency at the time of the country’s most notorious insider attack – the Edward Snowden breach – Chris Inglis experienced the dawning of a new age of security first-hand. Inglis shares his insights on the critical actions that security leaders must take to evaluate their readiness for a major breach, and the critical capabilities required to deal with modern cyberthreats. In this engaging keynote, Inglis imparts the lessons learned from the Snowden case and other hard- earned wisdom from the latest barrage of high-profile breaches.
  • 10. Keynote Stephen Ward is CISO at TIAA, providing direction and ingenuity over cybersecurity and technology risk. In this role, he manages the identification and remediation of IT risks and the security technologies that safeguard the company’s information assets from attacks. In addition to cybersecurity and risk, Ward provides a comprehensive governance structure pertaining to security standards, processes and threats across the firm’s various security disciplines. He has more than 16 years of experience in physical security, fraud, cybersecurity, risk and information security. Stephen Ward CSO & CISO TIAA Financial Services Presenting to Your Board – It’s All About the “What” Effective board presentations aren’t necessarily about fancy slide decks or weeks of rehearsal. As a CISO, successful board presentations rely on the ability to clearly communicate three critical messages: the threats your industry faces, the organization’s technology risk and control posture, and security’s road map and progress. Steve Ward rolls these factors into one business measurement service that simplistically shows the board how each has morphed over time. In this keynote, Ward will not talk about “how” to present to your boards. Instead, he’ll provide real examples of “what” to present to boards in order to earn a coveted voice at the table. Session Sponsor: IBM
  • 11. Valuable Experience and Knowledge “Time is valuable, and I guard it carefully, which is why I make an effort to attend the CISO Executive Summit. The interactions with my peers, and their shared experiences, allow me to come away from the summit with new ideas that allow for a superior outcome for our business.” Stephen Gilmer CISO Sikorsky Aircraft Corporation
  • 12. Featured Session Session Sponsor: NTT Com Solutions Mark Connelly is the CISO for Thomson Reuters, overseeing security operations, governance, risk and compliance, application security, policies and controls, infrastructure security, and security awareness and training. Connelly was named CISO of the Year for the Northeast region in 2011 and an a Top 10 Breakaway Leader in 2013. He holds an M.S. from the Sever Institute at Washington University, a B.A. from Washington University, an M.A. from University of Missouri, and is a CISM, CGEIT, and CRISC. Business Value and Security – No Longer an Either/Or In today’s business world, information security and risk management are at the nexus of business opportunity and customer expectations. As a critical business value attribute, CISOs and the functions they directly or indirectly influence play an increasingly business-critical function. Boards know it, customers know it and CISOs know it. Continuing to deliver value that the business truly understands and actively supports is key to the overall success of CISOs and the business. Mark Connelly shares his insights on how to best deliver that business value with information security and risk management as a key attribute of the company’s value. BREAKAWAY LEADER Mark Connelly CISO Thomson Reuters
  • 13. Featured Session RESERVE YOUR SEAT TODAY As CSO, John Masserini is responsible for information security, physical security, business continuity and privacy for the MIAX Options Exchange. Prior to joining MIAX, Masserini was the CISO for Dow Jones, overseeing security and risk management for all of the Dow Jones and Wall Street Journal brands. He has held key leadership positions at several information security market leaders. Masserini was named ISE Northeast Security Executive of the Year in 2010 and one of the Evanta Top 10 Breakaway Leaders of 2013. John J. Masserini CSO Miami International Holdings Beyond IAM – Moving the Needle on User Provisioning and Identity Management It’s one of the oldest problems in the security industry, and yet, it has few solutions, fewer best practices and almost no attention. Addressing general user access controls, along with privileged access, is one of the most complex and intimidating efforts a CISO can face. With maturing biometric and geolocational solutions, as well as the use of new tools like user-behavior analytics, CISOs can drastically improve their identity monitoring, provisioning and management. John Masserini shares his insights into this opportunity for CISOs to elevate their security posture and business- leader profile at the same time. Session Sponsor: Dell Software
  • 14. Featured Session As CISO for Sumitomo Mitsui Banking Corporation, Kylie Watson is charged with establishing security strategy and direction, and is the corporate advocate for information security best practices. She is responsible for defining the company’s security vision in support of the business and promoting a culture of security. Watson’s role also includes system risk management and security operations. Watson has more than 20 years of experience in IT. Prior to joining SMBC, Watson worked for IBM in Australia and Monbusho, Japan. She holds CISSP, CISM and CRISC certifications. Kylie Watson CISO Sumitomo Mitsui Banking Corporation Cyber Risk is Business Risk – Changing the Security Narrative As the world of cybersecurity grows scarier by the moment, the CISO is becoming an integral business partner. While this elevated notoriety has brought increased budgets, influence and engagement from leadership, it also has many business leaders assuming that the CISO will simply manage all aspects of corporate cyber risk. Changing the business’ mindset to view cyber risk as a business issue – not an IT one – can be a challenging hurdle to clear. Learn how Kylie Watson successfully shifted her organization’s thinking about cyber risk and gained sponsorship from her CEO through the development of a cyber risk committee. Session Sponsor: Palo Alto Networks
  • 15. Featured Session RESERVE YOUR SEAT TODAY Session Sponsor: CrowdStrike Serial entrepreneur George Kurtz is president and co-founder of CrowdStrike, a big data and security technology company focused on helping enterprises and governments protect their most sensitive intellectual property and national security information. Kurtz is an internationally recognized security expert, author, entrepreneur and speaker. He has more than 20 years of experience in the security space, including extensive experience driving revenue growth and scaling small and large organizations. George Kurtz President/CEO Co-Founder CrowdStrike Stop the Breach – Using Cloud as a Powerful Game Changer in the Fight Today’s hacktivist, criminal and nation-state adversaries have a tremendous asymmetric advantage over defenders that manifests itself in the constant stream of breaches. George Kurtz shares a new approach for meaningfully changing the game and shifting the advantage to defense. Through fascinating war stories and real-world examples, Kurtz will discuss how the use of cloud-based security technologies is thwarting and deterring some of the most persistent and advanced adversaries.
  • 16. Featured Session Session Sponsor: Forcepoint As a senior security strategist for Forcepoint, Mark Goldstein is a cybersecurity and privacy professional with more than 20 years’ experience in IT, security, sales, marketing, customer support, legal and privacy in commercial enterprises. Previously, he worked at America Online. Goldstein founded the “malvertising working group,” is a senior advisor for the Online Trust Alliance, mentor at MACH37 (cybersecurity incubator), and a member of the Northern Virginia Tech Council’s Cybersecurity and Privacy Committee as well as Infragard. He holds CIPP and CISSP certifications and an MBA from American University. Mark Goldstein Deputy CISO Forcepoint Building a Successful Audit Program to Keep Insider Threats at Bay Insider threats encompass more than just the obvious data thief. According to the CERT Insider Threat Center, in 2014, 53 percent of organizations experienced some type of insider incident. While your IT system can be a witness, victim or enabler, insider threat is more than a technology problem — policy, process, controls, risk management, auditing and monitoring all play critical roles in managing this invisible yet very real vulnerability. Mark Goldstein shares the key steps to managing and mitigating insider threats within your organization.
  • 17. Relevant, Applicable Content “The CISO Executive Summit is the only information security conference that speaks directly to the CISO, addressing the issues and challenges facing us today.” Ray Lipps Senior Director, Global IT Security Celgene Corporation
  • 18. Featured Session This session consists of three concise and compelling 15-minute presentations. Each brief, high-value presentation will extract a leading best practice or a breakthrough industry solution. Application Self-Protection – Revolutionizing Application Security Today’s enterprise runs on applications. Yet insecure applications have been the leading cause of breaches over the last eight years. Deep security instrumentation can provide application vulnerability detection and attack protection in a single platform, increasing power, accuracy and scalability. Emerging Provider: Fortscale Emerging Provider: Threat Connect Emerging Provider: Contrast Security Jeff Williams Chief Technology Officer/Co-Founder Contrast Security Behaving Badly – Analyzing Insider Threats Learn how to end insider threats with a new generation of autonomous, rule-free user behavior analytics based on machine learning. Kurt Stammberger Chief Marketing Officer Fortscale Adam Vincent CEO Threat Connect In Hot Pursuit – Faster and Smarter Security With adversaries moving at the speed of digital, every moment counts. CISOs must create organizational capabilities to swiftly detect and expel threats. Embrace the challenge of speedy security, examining methods to close the gap between you and your enemies.
  • 19. RESERVE YOUR SEAT TODAYExecutive Boardroom Executive boardrooms are private, closed-door sessions focused on candid dialogue between attendees. Seating is limited and reserved for CISOs (or equivalent). Sam King Chief Strategy Officer Veracode Moderator John Whiting CISO DDB Worldwide Discussion Leader Securing Your Software Supply Chain Enterprises are increasingly reliant on third-parties to speed innovation. But as recent breaches have shown, third-party software introduces significant risk and necessitates a security evaluation from these supply chain partners. Purchasing software from a vendor, outsourcing development, using open-source components or moving to the cloud all introduce risk that is out of a CISO’s direct control. Glenn Watt, John Whiting and Sam King lead this discussion on third-party security threats and how to protect your enterprise. Come prepared to share best practices for partnering with vendors and implementing approaches to assess the third party software protecting your enterprise. Session Sponsor: Veracode Glenn Watt VP CISO Medidata Solutions Discussion Leader To reserve your seat, please contact: Mike Magura 503-808-9819 mike.magura@evanta.com
  • 20. Executive Boardroom Brian Contos Chief Security Strategist Securonix Moderator Pat Stack IT Director, Enterprise Applications Eastman Kodak Company Discussion Leader Addressing Cybersecurity Challenges With Applied Security Analytics Data-driven artificial intelligence and unsupervised machine learning can now answer the question that has plagued information security practitioners since day one: How do you know when something is happening in your environment that shouldn’t? Led by Michael Palmer, Pat Stack and Securonix’s Brian Contos, this interactive discussion looks at advances in behavioral analytics that address critical security problems, featuring insights from security leaders who use advanced analytics to detect threats invisible to traditional security measures. Session Sponsor: Securonix
  • 21. Executive Boardroom Greig Arnold VP, Executive Advisory (Financial Services) Optiv Moderator Tomas Maldonado Global CISO International Flavors Fragrances Inc. Discussion Leader Session Sponsor: Optiv From CISO to CIRO – Evolving Skills for the Future The past year has seen a tidal shift from infrastructure-based to risk-based security programs. Board meetings, executive briefings and risk management concepts are now the norm. Successful CISOs are transforming their skills to meet the current and future needs of their organization. A chief information risk officer understands information risk management, third-party risk and regulatory requirements, and knows how to prepare board presentations and balance each of those priorities with the needs of the business. This boardroom discussion will focus on the changing role of the CISO and the necessary skills to earn – and keep – a seat at the table. RESERVE YOUR SEAT TODAY Michael Palmer Chief Information Security Officer National Football League Discussion Leader
  • 22. Executive Boardroom Mike Buratowski SVP, Cybersecurity Services Fidelis Cybersecurity Moderator Stephen Gilmer CISO Sikorsky Aircraft Corporation Discussion Leader Session Sponsor: Fidelis Cybersecurity The First 72 Hours The initial signs of a security incident are rarely black and white. The first questions CISOs must ask are “Is this a real incident?” and “How should I respond?” Stephen Gilmer and Mike Buratowski lead this discussion on the first and most critical hours of a potential incident response. While removing the attacker is obviously the end goal, security teams must first understand the nature and scope of the incident to identify the course of action that will be most effective while balancing the risk to the organization and the disruption that the response can cause.
  • 23. Executive Boardroom Marty Leidner CISO The Rockefeller University Discussion Leader David Cass Chief Information Security Officer Cloud SaaS Operational Services IBM Discussion Leader Session Sponsor: Bay Dynamics Managing Cyber Risk – Effective Communication with the Board CISOs are confident in what cybersecurity threat information to present to the board and what type of information the board wants to hear. However, much of this information is either misunderstood or too technical. How can CISOs streamline the process and provide more actionable information? For the board to make decisions regarding an organization’s cybersecurity risk posture, they need quantitative information framed in the context of relevant business concerns. This interactive dialogue provides insights on the tools and processes modern CISOs can use to translate cybersecurity risk into a language that non-security practitioners can understand and use to drive decisions. RESERVE YOUR SEAT TODAY Joe Quigg Cyber Security Risk Leader Bay Dynamics Moderator
  • 24. Executive Boardroom Pat Stack IT Director, Enterprise Applications Eastman Kodak Company Discussion Leader Mariano Nunez CEO Co-Founder Onapsis, Inc. Moderator Brendan Conway Global Director of Information Security Risk Management Coty Inc. Discussion Leader Session Sponsor: Onapsis, Inc. Defending Against the Rising Trend of SAP Cyberattacks Business-critical applications running on SAP are a goldmine for cyberattackers. They are also the highest-cost blind spot for many CISOs. As SAP applications continue to be the target of stealthy breaches, organizations must implement the right security products and ensure they have an SAP cybersecurity strategy. Brendan Conway, Pat Stack and Mariano Nunez lead this discussion on SAP cyber readiness, including recommendations for remediation plans, industry best practices for SAP cybersecurity, the latest vulnerability research, business-critical application security, and aligning internal and SAP security teams to operationalize SAP cybersecurity processes within an organization.
  • 25. Executive Boardroom RESERVE YOUR SEAT TODAY Gabriel Gumbs VP Chief Product Strategist Identity Finder, LLC Moderator Ramin Safai CISO Jefferies Company, Inc. Discussion Leader Session Sponsor: Identity Finder Security Process Improvement – How to Stop Worrying and Love Maturity Models There is no shortage of information security maturity models – COBIT, C2M2, Cybersecurity Capability Maturity Model, ISO/IEC 21827:2008, Sensitive Data Maturity Model, and many more. Each of them complete with a set of activities that mostly exist at a high level and are intended to protect data, specifically, sensitive data. Join Gabriel Gumbs and discussion leader Ramin Safai for this executive boardroom discussion on selecting and adopting processes improvement strategies, the pros and cons of existing maturity models and best practices for prioritizing the protection of sensitive data.
  • 26. Executive Boardroom Brian Lozada CISO Duff Phelps Discussion Leader Vikrant Arora CISO Corporate Risk Officer New York City Health and Hospitals Corporation Discussion Leader Session Sponsor: PhishMe 2016, Year of Ransomware – Can Technology Alone Prevent Phishing Attacks? 2016 is shaping up to be the year of the ransomware attack. As ransomware and phishing attacks continue to grow in number and sophistication, organizations need to reconsider their current security strategy. Companies continue to invest billions in technology to shore up their defenses against these threats – but is that enough? Is complete reliance on technology the answer? Or should we focus on the human and human behavior? Vikrant Arora, Brian Lozada and Allan Carey lead this discussion on the new threats faced by organizations, why relying on technology is dangerous and how to leverage all resources – including humans – for a stronger security posture. Allan Carey VP, Business Development PhishMe Moderator
  • 27. SM SM DON’T FACE CYBERSECURITY CHALLENGES ALONE For every challenge, imagine having a fellow CISO available with a proven solution. Join Your Peers Today at join.cisocoalition.com For more information, please contact Stuart Cohen, General Manager of CISO Coalition at 971-717-6665 or stuart.cohen@evanta.com. NATIONAL LEADERSHIP BOARD “Connecting with the best and brightest in the industry makes each one of us better equipped to combat the risk facing our organizations.” Steven Young VP, Security Risk Management, CISO Kellogg’s
  • 28. Thank you to our sponsors for their support. Local Sponsors National Thought Leaders National Sponsors Presenting Sponsors
  • 29. Quality Networking. Immeasurable Value. “There are few events I ensure I make time for every year, and the New York CISO Executive Summit is one of them. Year after year, this conference provides immeasurable value – from the breadth and depth of speakers, to the quality of the networking and peer sessions, the New York CISO Executive Summit is one to not be missed. It is truly a day I look forward to each year.” John J. Masserini CSO Miami International Holdings
  • 30. Schedule of Programs CIO Executive Summit Atlanta Boston Chicago Cincinnati Dallas Detroit Houston Minneapolis New Jersey New York Philadelphia San Francisco Southern California Toronto Vancouver, BC Washington, DC Global CIO Executive Summit Pennsylvania CXO Executive Summit (CIO/CISO/CDO) Calgary Charlotte Connecticut Denver Indianapolis Miami Milwaukee Montreal Orlando Phoenix Pittsburgh Seattle St. Louis CISO Executive Summit Atlanta Boston Chicago Cincinnati Dallas Detroit Houston Minneapolis New Jersey New York Philadelphia San Francisco Southern California Toronto Vancouver, BC Washington, DC Global CISO Executive Summit Pennsylvania CHRO Leadership Summit Atlanta Boston Chicago Cincinnati Dallas Detroit Houston Minneapolis New York Philadelphia/New Jersey San Francisco Southern California Toronto Vancouver, BC Washington, DC CFO Executive Summit Atlanta Chicago Dallas Houston Los Angeles New York San Francisco CISO Solutions Tour Atlanta Boston Chicago Cincinnati Dallas Detroit Houston Minneapolis New Jersey New York Philadelphia San Francisco Southern California Toronto Vancouver, BC Washington, DC CIO Institute Chicago Columbia Texas UC Berkeley CISO Institute Chicago Texas UC Berkeley
  • 31. RESERVE YOUR SEAT TODAYSchedule of Programs CIO Inner Circle Dinner Series Atlanta Boston Chicago Cincinnati Dallas Detroit Houston Minneapolis New Jersey New York Philadelphia San Francisco Southern California Toronto Vancouver, BC Washington, DC CISO Inner Circle Dinner Series Atlanta Boston Chicago Cincinnati Dallas Detroit Houston Minneapolis New Jersey New York Philadelphia San Francisco Southern California Toronto Vancouver, BC Washington, DC CDO Inner Circle Dinner Series Atlanta Boston Chicago Cincinnati Dallas Detroit Houston Minneapolis New York San Francisco Southern California Toronto Washington, DC CFO Invitational Atlanta Chicago Detroit Kansas City Milwaukee Minneapolis Orange County Pittsburgh Portland San Francisco Seattle Women’s Leadership Invitational San Francisco Global Sports Summit Aspen Global Sports Management Summit New York Collegiate Sports Summit Santa Monica The most trusted brand in the industry. Click here for detailed schedule.
  • 32. We make leaders better. ContactAndrewSaderat503-445-6568orandrew.sader@evanta.com Visit evantaacademy.com for more information. “Severalofourmostpromisingfrontlinemanagerswereamongthefirstto enroll.Wehaveseenimmediatevaluefromtheirparticipation.” – Wes Hargrove, SVP Development, 7-Eleven Guidance and thought leadership provided by General Colin Powell, Fortune 1000 CXOs and top professors from the most prestigious universities. UPCOMING CLASSES Frontline IT Leadership June 6 Enterprise Cybersecurity July 25 High Performance Leadership July 25 Women in Leadership July 25 ENROLL NOW Place PDA video here
  • 33. Our purpose: Evanta brings together the world’s most accomplished leaders to improve awareness and performance, because we believe effective collaboration is the key to individual and organizational prosperity.
  • 34. Presented by ©2016. All rights reserved.