7:00 AM - 8:30 AM        

Networking Breakfast

8:00 AM - 8:30 AM          

End User Keynote: A Blended Family: A Privacy & Security Partnership

Speaker: Darrin Reynolds, Risk Manager, Emerging Regulations, Amazon

Description: This session will focus on the important, absolutely necessary partnership between privacy and security. Oftentimes these two disciplines are confused with each other, but the success of a privacy program is dependent on a strong partnership with security – just as a security program can find value with their privacy counterparts. We will engage in a discussion about creating and fostering relationships with privacy programs. The success of protecting an organization’s information is only improved for forging a strong bond between privacy and security. 5 bullet points that describe what the attendee will learn from your session:

1. The importance of including privacy in the planning, implementation, and monitoring of a security program

2. The principles that govern a privacy program

3. How privacy frameworks and principles map to the information security equivalents

4. Privacy through the experience of an information security officer

5. Best practices about creating a strong relationship with the privacy officer

8:30 AM - 9:00 AM

Keynote: Qualys - Continuous Visibility and Security in a Hybrid Enterprise

Speakers: Chris Carlson, Vice President, Product Management, Qualys | Peeyush Patel, Vice President, Information Security, Experian

Description: Organizations embracing clouds, elastic workloads, mobile, IoT, and big data must shift security from an afterthought to a core practice of safeguarding data from endpoints to the cloud. Featuring a case study presentation by Experian and using examples from other leading enterprises, this session discusses how CISOs can:

- reduce the attack surface by regaining visibility across hybrid IT environments

- automate processes to build security into DevOps

‍‍‍- secure the journey to the cloud from beginning to end

9:30 AM - 12:00 PM

1:1 Meeting Zone

Description: 1:1 Meetings between Suppliers and Delegates

12:15 PM - 1:30 PM

Awards Luncheon with Conference Closing Q&A

1:30 PM - 11:59 PM          

Departures

2018 Agenda

Day 1 - Sunday, May 20, 2018

2:00 PM - 6:00 PM        

Registration

5:00 PM - 5:10 PM          

Welcome and Introduction to Security Leadership Exchange

Speaker: Philip McKay, CEO, nGage Events

5:10 PM - 6:00 PM

Executive Spotlight: Model Driven Security: It's Here Today

Speaker: Jim Routh, CISM, CSSLP, Chief Security Officer, Aetna

Description: Three years ago, Aetna Global Security hired a chief data scientist for security – a former NSA data scientist who did an outstanding job building over a hundred models and a big-data infrastructure dedicated to security. The purpose of hiring this data scientist: To take multiple sources of log files from newly deployed controls and determine how best to allocate scarce resources for cyber hunting. Soon, while this project was underway, six other implementations of machine-learning-driven point solutions catapulted Aetna Global Security into a model-driven security deployment using data analytics. In this keynote address, which will set the tone for our cybersecurity discussions at this two-day event, Jim Routh, Chief Security Officer at Aetna, will discuss what his organization learned from this experience, and the implications for security talent management and information sharing going forward.

6:00 PM - 8:30 PM          

Security Leadership Exchange Welcome Dinner‍‍‍

Day 2 - Monday, May 21, 2018

7:00 AM - 8:00 AM        

Networking Breakfast

8:00 AM - 8:50 AM          

End User Keynote: The Art of Aligning Security Goals with Business Goals

Speaker: Devon Bryan, CISO, The Federal Reserve‍‍‍

Description: It’s been said that one of the great paradoxes of our generation is that the same internet technologies that bring so much positive transformation – and in some cases disruption – also bring with them so much peril from cyber miscreants seeking to subvert, disrupt, and exploit internet-connected systems. As is true with so many other aspects of our lives, the go-to-market strategies of modern business is now also IT-centric and is synonymous with staggering volumes of very sensitive information constantly processed in real time across intricately connected, and increasingly global, high-speed data networks. This panel discussion will address how: CISOs are tacking this challenge of digital transformation CISOs are balancing threat-driven, risk-based trade-offs to ensure that cybersecurity programs, policies, and strategies enable business to go further To better collaborate and partner with business colleagues to make sure expectations are met and go-to-market strategies are supported

8:50 AM - 9:10 AM  

Keynote Presentation: IBM  - The Role of Security in Digital Transformation

Speaker: David Cass, Global Partner Cloud Security Services & CISO Cloud & SaaS Operations, IBM

9:25 AM - 11:25 PM

Use Case Boardroom Presentations

Description: 25 minute breakout sessions. Suppliers and delegates discuss challenges faced, strategy, implementation, outcome, and the future.

11:30 PM - 12:30 PM

Networking Lunch

12:40 PM - 1:05 PM          

Fireside Chat: ManageEngine - Securing Active Directory: Key controls that most organizations fail to secure

Speaker: Derek Melber, Chief Technology Evangelist, ManageEngine

Description: In order to secure key aspects of Active Directory from internal and external threats, key security controls must be configured, monitored, and maintained. Derek, Active Directory MVP, will cover the most important security controls that organizations fail to monitor and maintain, which is allowing for the constant breaches that we all see being reported. Derek will cover security such as password policies, privileged groups, authentication protocols, and even service accounts.

1:05 PM - 1:50 PM        

CISO Panel Discussion: Developing a Leading-Edge Intelligence Program

Moderator: Tim Callahan, SVP, Global Chief Security Officer, Aflac

Panelists: Mike Towers, VP and CISO, Allergan | Richard Rushing, CISO, Motorola Mobility | Joey Johnson, CISO, Premise Health | Pierre D. Boisrond, Ph.D., C|EH, nCSE, Information Security Engineering Team Lead, Aviall, A Boeing Company | Hussein Syed, CISO, RWJBarnabas Health

Description: Many information security professionals will remember when we relied primarily on a defensive posture to protect our organizations from cyberthreats. We spoke about the layers of defense and took comfort if we could architect in three or four layers to keep the bad guys out. It seems the criminals also began to understand the defensive in-depth strategy. They started to find the soft underbelly of defenses and attacked there – using the help of innocent technology users through social engineering, phishing and other methods to get through. Security professionals had to start looking at security from a different angle. This panel will detail the methods and best practices when implementing a leading threat intelligence program.

• Attendees will learn about the changes in defensive posture that have led to security professionals looking at security from an outside perspective.

• Attendees will learn about proactive measures that can be taken to stay ahead of criminals and hackers, particularly how to implement a threat intelligence program.

• Attendees will learn about the two general types of intelligence – strategic and tactical – and how to utilize them as proactive mechanisms.

• Attendees will learn where intelligence comes from.

• Attendees will learn how to convert internal information to intelligence, as well as best practices associated with this method

2:00 PM - 3:25 PM

Use Case Boardroom Presentations

Description: 25 minute breakout sessions. Suppliers and delegates discuss challenges faced, strategy, implementation, outcome, and the future.

3:30 PM - 6:25 PM          

1:1 Meeting Zone

Description: 1:1 Meetings between Suppliers and Delegates

6:25 PM - 7:00 PM

Free Time

7:00 PM - 9:30 PM

Security Leadership Exchange Networking Dinner

Day 3 - Tuesday, May 22, 2018

Agenda Topic Quick Links (Click a session below to view full details)‍‍‍

arrow3
arrow3
arrow3
arrow3
arrow3
arrow3
arrow3
arrow3

“An exceptional conference experience through cutting edge content, peer-to-peer ‍‍‍information sharing, and ready to implement solutions.”

May 20-22, 2018 | Ponte Vedra Inn & Club, Ponte Vedra Beach, FL

Click to Inquire about Attending Security Leadership ExchangeClick to Inquire about Sponsoring Security Leadership Exchange

Security Leadership Exchange is produced by the MIS Training Institute in conjunction with nGage Events LLC

© 2018 Security Leadership Exchange

About

Contact

Why Attend

Agenda

Home

nGage Events LogoMISTI Logo

May 20-22, 2018 | Ponte Vedra Inn & Club | Ponte Vedra Beach, FL

Security Leadership Exchange Logo

Why Sponsor

Venue