The Security Leaders Summit

Where Industry Leaders Meet to Shape the Future
  • Home
  • /
  • Security Leaders Summit

The Security Leaders Summit Dallas was held on Wednesday, March 25, 2015 at at the prestigious Dallas Country Club. The Summit brought together a community of senior IT executives for engaging peer-level interaction, discussions on new approaches to managing complexities in Information Security, and provided opportunities to collaborate with leaders in the industry.

With titles of CISO, CIO, CTO, VP and Directors in attendance, companies represented included Alliance Data, American Express, AT&T, Bank of America, BNSF Railway Company, Brinker International, Capital One, Dr Pepper Snapple Group, Edelman Worldwide, Experian, FedEx, Gamestop, GM Financial, Gold’s Gym, La Quinta Inns and Suites, Parkland Health & Hospital, Randstad USA, Santander, Southwest Airlines, Top Golf and University of Houston.

Throughout the day, the Summit Hosts, representing companies across a diversity of industries and sizes, shared their insights and knowledge with the distinguished group of attendees through their presentations, interviews and breakout roundtable discussions.

Summit Recap

Speakers, guests and our Platinum and Gold Sponsors enjoyed the Pre-Summit Reception and Dinner held at the Dallas Park City Club, where they had the opportunity to meet each other before the Summit.

For the Morning Keynote, David Chamberlin, EVP and leader of the Data Security & Privacy Group at Edelman, the world’s largest public relations firm, kicked off the Dallas Summit with his presentation on “Trust, Reputation and Data Security & Privacy.” David shared his insights regarding the intersection of trust, reputation and cybersecurity and how they affect an organization and how prepared or not prepared companies are today to handle the lifecycle of a data breach from discovery to remediation and everything in between. His opening presentation was the highest rated session of the day.

Download the Presentation

In the Executive Briefing, “The New Role of Analytics and the Need for Encrypted Traffic Management,” Grant Asplund. Director of Evangelism with Blue Coat, Platinum Sponsor, discussed how entire industries have been transformed through the use of data analytics. Grant included new approaches to mitigating risks and principles to consider when developing an overall security strategy.

During the morning break, guests had the chance to catch up with their peers and check out some of the latest innovation from the sponsors.

Brian Wrozek, CSO of Alliance Data facilitated an interview with Matt Fearin, Division CISO of Capital One, on “Leadership Challenges.” During the interview, both discussed the challenges and the dynamics of change they are facing, that is forcing them to rethink what success means to their organizations and to their businesses.

Neil Farquharson, Product Marketing Manager with ZixCorp, Platinum Sponsor presented on “The Criticality of Email Security.” In this Executive Briefing, Neil shared insights into implementing secure email solutions that increase productivity and mitigate risk, without creating employee frustration.

In the interview session, “The CISO Tool Box – Business Technologies for the Future,” Mary Dickerson, Chief Information Security Officer of the University of Houston and Cynthia Hicks, Information Security Officer of CoreLogic, shared what they are doing to ensure they are positioned for success in the future by having the right technologies in place. The interview focused on how they evaluate their current arsenal of technology tools to provide results to the business, the technologies they believe are the most successful to protect their business, gaps needed to be filled in order to help solve their problems, and new technologies they think have promise for the future.

In the Executive Briefing, “The New Enterprise Imperative – Securely Empowering the Mobile Worker,” Patrick J. Conte, Senior Vice President & General Manager, Worldwide Field Operations of Accellion, Gold Sponsor, discussed ways to securely empower your mobile workforce including the latest innovations in secure file sharing and collaboration, best practices for providing secure mobile access to enterprise content, how to leverage investments in existing infrastructure and systems and benefits and use cases for creating secure custom enterprise mobile apps.

In this interactive session, “CISOs Off the Cuff,” Summit Emcee Richard Warner engaged executives in the question, “How has the conversation changed with your senior management as it relates to setting security strategy?”

Dave Larson, Chief Technology Officer and Vice President, Product with Corero, Gold Sponsor, presented on “A Hybrid Approach – Rewriting the Rules for DDoS Defense.” Dave highlighted the dilemmas facing many organizations, when it comes to implementing an effective DDoS defense strategy. Whether to deploy on-premises DDoS appliances or subscribe to a cloud based anti-DDoS provider, these decisions are not taken lightly, as the DDoS threat landscape is wide ranging. Dave discussed several strategies for implementing a comprehensive, purposeful defense against the implications of a DDoS attack.

Over lunch at the Dallas Country Club, guests had the opportunity to continue their discussions.

Matt Comyns, Global Head of Cyber Security Practice at Russell Reynolds Associates, spoke on “The Value of a CISO – An Update on Compensation Packages.” In this session, Matt described opportunities information security executives have in the U.S. and also internationally. With top compensation packages now in the $1.5+ million, Matt stated the “rising tide in compensation is moving the overall average to $350K.” Matt wrapped up his presentation with his perspective on areas that will have importance in the future, including Deputy CISOs and Heads of Identity and Access Management. Matt can be reached at Matt.Comyns@russellreynolds.com.

In the Executive Briefing – “Cyber Security is a Team Sport,” Doug Simpson, Enterprise Security with Intel Security, Silver Sponsor spoke on the need to not only work together across companies, but also to break down the barriers within your business that prevents teams from working together. Doug stressed the focus is on a common adversary, so we must work together to secure our critical data and IT assets.

During this interactive session, attendees discussed and debated the CISO role of the future.

Scott Cressman, Senior Product Manager with OpenDNS, Silver Sponsor, provided an Executive Briefing on “The New Security Stack: 2015–2020.” Scott highlighted the new IT landscape with boundless surface to protect from entirely new threats, in a world filled with more sophisticated attackers. His presentation focused on how to re-establish the benefits of a secure network perimeter in a world where one no longer exists.

In the Executive Roundtable sessions, attendees broke out into different topics for peer-to-peer discussions.

Some of the executives leading the discussions included Ken Seeley, Director, Information Security of Santander Consumer, Michael Plummer, Chief Information Security Officer with the U.S. Department of Veteran Affairs, David Stanowick, Former Chief Information Security Officer, IT Risk Management, Intertek and Marc Crudgington, Chief Information Security Officer of Woodforest National Bank.

The Security Leaders Summit wrapped up the day with an evening reception where everyone had a chance to unwind.

Be sure to visit the photo gallery.

Platinum Sponsors

Blue Coat Systems

Blue Coat Blue Coat empowers enterprises to safely and securely choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets. Blue Coat has a long history of protecting organizations, their data and their employees and is the trusted brand to 15,000 customers worldwide, including 86 percent of the FORTUNE Global 500. With a robust portfolio of intellectual property anchored by more than 200 patents and patents pending, the company continues to drive innovations that assure business continuity, agility and governance.

For additional information, please visit: www.bluecoat.com.

Please read a new study from ESG describing the growth of encryption and strategies for protection. Read the report, “Network Encryption and its Impact on Network Security” to get the facts and figures about the nature of the threat and the actions you can take now to deepen your defenses.

ZixCorp

ZixCorp is a leader in email data protection. ZixCorp offers industry-leading email encryption, a unique email DLP solution and an innovative email BYOD solution to meet your company’s data protection and compliance needs. ZixCorp is trusted by the nation’s most influential institutions in healthcare, finance and government for easy to use secure email solutions. ZixCorp is publicly traded on the Nasdaq Global Market under the symbol ZIXI, and its headquarters are in Dallas, Texas.

For more information, visit zixcorp.com and also access: A Simple Approach to BYOD

Gold Sponsors

Accellion

Accellion provides the leading mobile content platform that increases enterprise productivity and ensures data security and compliance. As the foremost provider of private cloud solutions for secure mobile content management, Accellion offers enterprise organizations the scalability, flexibility, control and security to enable a mobile workforce with the tools they need to create, access and share information securely, wherever work takes them. More than 12 million business users and 2,000 of the world’s leading corporations and government agencies use Accellion solutions to increase business productivity, protect intellectual property, ensure compliance and reduce IT costs. For more information please visit: www.accellion.com or call 650-485-4300.

Discover how to securely enable a mobile workforce
Enable your mobile enterprise with kiteworks
kiteworks Solution Overview
kiteworks Private Cloud Deployments

Corero Network Security

Corero Network Security, an organization’s First Line of Defense® against DDoS attacks and cyber threats, is a pioneer in global network security. Corero products and services provide online Enterprises, Service Providers, Hosting Providers and Managed Security Service Providers with an additional layer of security capable of inspecting Internet traffic and enforcing real-time access and monitoring policies designed to match the needs of the protected business. Corero technology enhances any defense-in-depth security architecture with a scalable, flexible and responsive defense against DDoS attacks and cyber threats before they reach the targeted IT infrastructure allowing online services to perform as intended. For more information, visit www.corero.com.

Corero DDoS Trends and Analysis Quarterly Report
• DDoS Defense video: http://www.corero.com/ddos_defense_overview_video

Silver Sponsors

Intel Security

McAfee is now part of Intel Security. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique McAfee Global Threat Intelligence, Intel Security is intensely focused on developing proactive, proven security solutions and services that protect systems, networks, and mobile devices for business and personal use around the world. Intel Security is combining the experience and expertise of McAfee with the innovation and proven performance of Intel to make security an essential ingredient in every architecture and on every computing platform. The mission of Intel Security is to give everyone the confidence to live and work safely and securely in the digital world. www.intelsecurity.com.

OpenDNS

OpenDNS is a leading provider of network security and DNS services, enabling the world to connect to the Internet with confidence on any device, anywhere, anytime. The Umbrella cloud-delivered network security service blocks advanced attacks, as well as malware, botnets and phishing threats regardless of port, protocol or application. Its predictive intelligence uses machine learning to automate protection against emergent threats before they can reach customers. OpenDNS protects all devices globally without hardware to install or software to maintain. For more information, please visit: www.opendns.com.

Bronze Sponsors

Alert Logic

Alert Logic, the leader in security and compliance solutions for the cloud, provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Fully managed by a team of experts, the Alert Logic Security-as-a-Service solution provides network, system and web application protection immediately, wherever your IT infrastructure resides. Alert Logic partners with the leading cloud platforms and hosting providers to protect over 3,000 organizations worldwide. Built for cloud scale, our patented platform stores petabytes of data, analyzes over 450 million events and identifies over 60,000 security incidents each month, which are managed by our 24×7 Security Operations Center. Alert Logic, founded in 2002, is headquartered in Houston, Texas, with offices in Seattle, Dallas, Cardiff, Belfast and London. For more information, please visit www.alertlogic.com or contact David Hillock – Territory Manager, dhillock@alertlogic.com.

BeyondTrust

BeyondTrust provides context-aware Privileged Account Management and Vulnerability Management software solutions that deliver the visibility necessary to reduce IT security risks and simplify compliance reporting.

We empower organizations to not only mitigate user-based risks arising from misuse of system or device privileges, but also identify and remediate asset vulnerabilities targeted by cyber attacks. As a result, our customers are able to address both internal and external threats, while making every device – physical, virtual, mobile and cloud – as secure as possible.

BeyondTrust solutions are unified under the BeyondInsight IT Risk Management Platform, which provides IT and security teams a single, contextual lens through which to view user and asset risk. This clear, consolidated risk profile enables proactive, joint decision-making while ensuring that daily operations are guided by common goals for risk reduction.

The company is privately held, and headquartered in Phoenix, Arizona. For more information, visit: www.beyondtrust.com or contact Luke Morrow, Regional Sales Manager, lmorrow@beyondtrust.com

Or you can access more information here:
BeyondTrust Corporate Overview
Gartner report: Gartner Technology – BeyondTrust – Issue 2

Oplogics

Oplogics is a new interactive platform designed to increase awareness among employees about how security breaches happen and how to avoid them. We engage employees with information that’s easy to understand and enjoyable to use. Then we measure the results.

The “Op” in our name refers to operant conditioning, one of the foundations of modern psychology. Our approach is based on the science of human behavior.

Oplogics is unique in three ways:

Our roots are in digital marketing and consumer behavior. Oplogics comes from What’s Up Interactive, an agency with more than 25 years in web marketing and video production for companies including AT&T, Trane Air Conditioning and Fox Television Stations. So everything we do for an Oplogics client conforms to their brand standards and culture.

We continuously update information on the company-branded intranet or extranet using innovative promotional techniques. Employees know the website is the place to go for clear, concise information about threats and how to respond.

And our quiz engine is designed to engage users with timed, interactive questions and deliver a clear graphic representation of the metrics that show how desired behavior around security awareness is improving among employees.

Visit us at www.oplogics.com or contact Ben Stanfield at: bstanfield@oplogics.com.

Security Innovation

Security Innovation focuses on the most difficult IT Security problem, and the root cause of most data breaches — insecure software applications. For more than a decade, we’ve helped organizations build internal expertise, uncover critical vulnerabilities, and improve the process by which applications are built. The company’s solutions are based on the three pillars of a secure Software Development Lifecycle (SDLC), which feed into one another to create an ecosystem of repeatable, secure software development: Standards, Education, and Assessment. Our flagship products include TeamProfessor, the industry’s largest library of application security eLearning courses, and TeamMentor, “out of the box” secure development standards.

For more information visit: www.securityinnovation.com

Wombat Security Technologies


Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. Their SaaS cyber security education solution includes a platform of integrated broad assessments, and a library of simulated attacks and brief interactive training modules, to reduce employee susceptibility to attack, even phishing attacks, over 80%

For more information visit www.wombatsecurity.com or contact: Shea Garber, 412-621-1484 x 120, or sgarber@wombatsecurity.com.

Download Wombat Security Technologies Case Study Manufacturing

WiFi Sponsors

CloudPassage

CloudPassage® is the leading software-defined security provider for cloud infrastructure. We’ve invested four years and over $20m in Halo®, the industry’s only SDSec platform purpose-built for seamless, scalable security & compliance across any mix of private cloud, public IaaS, and hybrid/multi-cloud environments.

Industry-leading enterprises trust Halo to protect their cloud and software-defined datacenter environments. Founded in 2010 and headquartered in San Francisco, CloudPassage is backed by leading investors including Benchmark Capital, Musea Ventures, Tenaya Capital, Shasta Ventures, and Meritech Capital. For more information visit us at: www.cloudpassage.com.

More information: Cloud Passage – What CSOs Need to Know about SDSec

Note that we have moved our office – new address and contact:
CloudPassage, Inc. 180 Townsend Street, Third Floor, San Francisco, CA 94107
Phone: 800-215-7404 Fax: 415-354-3417 sales@cloudpassage.com

SAINT

SAINT Corporation, a global leader in network security, offers the SAINT security suite including integrated vulnerability assessment, penetration testing, compliance reporting, and configuration assessment. Examine your network with the SAINT vulnerability scanner, and expose where an attacker could breach your network. Go to a higher level of visibility with penetration testing tools and exploit the vulnerability to prove its existence without a doubt. SAINT can help to –

• Manage and reduce security risks to your enterprise
• Document compliance with government and industry regulations like PCI, NERC, HIPAA, SOX, FISMA, and with internal policies.
• Emulate potential attackers with the suite of exploit tools.
• Perform configuration audits with policies defined by FDCC & USGCB. SAINT is SCAP 1.2 validated by NIST.

SAINT software is available to download, as a cloud service (SAINTCloud) or on a preloaded appliance (SAINTbox). The software includes enterprise functionality; customizable dashboards and data analysis; and a friendly interface. For more information, visit www.saintcorporation.com

Hosts

The Security Leaders Summit Dallas 2015 was hosted by Information Security and IT Executives from across a variety of industries in the area. The Summit Hosts served as the face of the Summit and throughout the day, they shared their insights during presentations, interactive sessions, and facilitated peer-to-peer executive roundtable discussions. The hosts included:

MaddenS David Chamberlin
Global Leader, Data Security & Privacy Group
Executive Vice President and General Manager

Edelman
Read Bio

MaddenS Matt Comyns
Global Head of Cyber Security Practice
Russell Reynolds Associates
Read Bio

MaddenS Mignona Cote
Sr. Director, Global Information Security
Aetna

MaddenS Marc Crudgington
Chief Information Security Officer
Woodforest National Bank
Read Bio

MaddenS Mary Dickerson
Executive Director for IT Security and Chief Information Security Officer
University of Houston and the University of Houston System
Read Bio

MaddenS Ross Henton
Director of Information Security
American Express Global Business Travel
Read Bio

MaddenS Cynthia Hicks
Vice President Information Security Officer
CoreLogic
Read Bio

MaddenS Michael Plummer
Chief Information Security Officer
U.S. Department of Veteran Affairs
Read Bio

MaddenS Ken Seeley
Director, Information Security
Santander Consumer
Read Bio

MaddenS David Stanowick
Former Chief Information Security Officer, IT Risk Management
Intertek
Read Bio

MaddenS Ken Waterman
Chief Technology Officer and Chief Information Security Officer
Textron Inc.
Read Bio

MaddenS Brian Wrozek
Chief Security Officer
Alliance Data
Read Bio

Time Description
7:15am – 8:25am Breakfast and Networking in the Sponsor Pavilion Gallery
8:25am – 8:45am

Welcome Remarks

North Ballroom
8:45am – 9:15am

Morning Keynote – “Trust, Reputation and Data Security & Privacy”

Geoff AranoffDavid Chamberlin
Global Leader, Data Security & Privacy Group
Executive Vice President and General Manager

Edelman
Read Bio

David Chamberlin, EVP and leader of the Data Security & Privacy Group at Edelman, the world’s largest public relations firm, will kick off the Dallas Summit with the Morning Keynote. David will share his insights regarding the intersection of trust, reputation and cybersecurity and how they affect an organization, how prepared or not prepared companies are today to handle the lifecycle of a data breach from discovery to remediation and everything in between, what are the obstacles to success during a crisis such as a breach, what is key to success, and what he envisions will change in the future that will make it harder or easier for companies to respond to their customers and stakeholders.

North Ballroom
9:15am – 9:35am

“Game Changer’s Interview”

Geoff AranoffKen Waterman
Chief Technology Officer and Chief Information Security Officer
Textron
Read Bio

In this interview session Ken Waterman, CTO and CISO of Textron will provide insight into what he is doing to drive innovation at his organization to help move the business forward and his plans to execute on his vision.

Textron is a Fortune 500 company with revenue of over $13 billion, approximately 34,000 employees and presence in 25 countries. A multi-industry company, Textron leverages its global network of aircraft, defense, industrial and finance businesses to create innovative solutions and services. Textron is known around the world for its powerful brands such as Bell Helicopter, Cessna, Beechcraft, Hawker, Jacobsen, Kautex, Lycoming, E-Z-GO, Greenlee, and Textron Systems

North Ballroom
9:35am – 10:05am

Executive Briefing – “The New Role of Analytics and the Need for Encrypted Traffic Management”

Geoff AranoffGrant Asplund
Director of Evangelism
Blue Coat, Platinum Sponsor
Read Bio

In many respects, network traffic data (and associated metadata) is the raw material CISO’s use to develop their risk profile(s) and create the appropriate policy decisions…And, suffice to say, there is certainly no shortage of data in today’s enterprise…most organizations have a long list of log-file producing, report generating, alert notifying technologies. The challenge is to instrument the network in order to be able to quickly and easily see all of the right data and to be able to immediately see what [data] matters most. This can be especially challenging considering the increasing amount of network traffic being encrypted using SSL.

Additionally, today’s threat landscape is constantly evolving and the threat actors are continually adapting their techniques in order to evade detection. Security teams today must have full and complete visibility into all network traffic combined with accurate global threat intelligence.

In this session, Grant will discuss how entire industries have been transformed through the use of data analytics. He will discuss new approaches to mitigating risks and principles to consider when developing an overall security strategy.

North Ballroom
10:05am – 10:40am Break
10:40am – 11:00am

“Insights and Interviews – Leadership Challenges”

Geoff AranoffBrian Wrozek
Chief Security Officer
Alliance Data
Read Bio

As the leadership role of a security organization continues to evolve at a rapid pace with expanded responsibilities, the value delivered by the information security/risk organization has become critical to the success of the enterprise. Successful security leaders are taking the long view of their role as they develop strategies to help enable their businesses to move quicker, positively impact the bottom, and ensure the protection of its assets. In an interview setting, Brian Wrozek, CSO of Alliance Data, will facilitate the interview discussions with CISOs who will share their insights into the challenges and the dynamics of change that are forcing them to rethink what success means to their organizations and to their businesses.

North Ballroom
11:00am – 11:30am

“The Criticality of Email Security”

Geoff AranoffNeil Farquharson
Product Marketing Manager
ZixCorp, Platinum Sponsor
Read Bio

The recent Sony breach, among others, has reminded us of the importance of securing emails. Organizations need to be confident that the millions of emails leaving their network each day are protected where necessary, whether sent from a desktop or from a mobile device. Implementing secure email solutions should increase productivity and mitigate risk without creating employee frustration. Join in the discussion with Zix security expert, Neil Farquharson, for solutions to solve your most pressing secure email challenges.

North Ballroom
11:30am – 11:50am

“The CISO ToolBox – Business Technologies for the Future”

ZandoliSMary Dickerson
Executive Director for IT Security and Chief Information Security Officer
University of Houston and the University of Houston System
Read Bio

ZandoliSCynthia Hicks
Vice President and Information Security Officer
CoreLogic
Read Bio

In this session, Mary Dickerson, Chief Information Security Officer of the University of Houston and Cynthia Hicks, Information Security Officer of CoreLogic will share what they are doing to ensure they are positioned for success in the future by having the right technologies in place. This discussion, while not focused on vendor specific products, will focus on existing technologies that are viewed as being on the critical path to success and new technologies that have promise for the future.

The University of Houston is a state research university and the flagship institution of the University of Houston System, it is the third-largest university in Texas with nearly 41,000 students.

With revenue of close to $2 billion, CoreLogic, Inc. is a North American corporation providing financial, property and consumer information, analytics and business intelligence. Headquartered in Irvine, CA, the company analyzes information assets and data to provide clients with analytics and customized data services.

North Ballroom
11:50am – 12:10pm

Executive Briefing – “The New Enterprise Imperative – Securely Empowering the Mobile Worker”

Geoff AranoffPatrick J. Conte
Senior Vice President & General Manager, Worldwide Field Operations
Accellion, Gold Sponsor
Read Bio

Employees have a growing requirement for working with corporate information at any time, from any place, and on any device. IT is being increasingly asked to support the business by enabling a new generation of applications for the mobile workforce.

A major hurdle facing enterprise IT is providing vital, confidential enterprise content to these mobile workers without increasing data security risks. IT may provide systems for accessing corporate data, but if they are too cumbersome or difficult for employees to use – they will find (or may have already found) alternatives in order to get their jobs done.

This presentation will discuss ways to securely empower your mobile workforce including:
• The latest innovations in secure file sharing and collaboration
• Best practices for providing secure mobile access to enterprise content
• How to leverage investments in existing infrastructure and systems
• Benefits and use cases for creating secure custom enterprise mobile apps

North Ballroom
12:10pm – 12:20pm

“CISOs Off the Cuff”

In this interactive session, Summit Emcee, Richard Warner, will engage executives in attendance on their hot issues of the day and their corresponding challenges.

North Ballroom
12:20pm – 12:40pm

“A Hybrid Approach – Rewriting the Rules for DDoS Defense”

Geoff AranoffDave Larson
Chief Technology Officer and Vice President, Product
Corero, Gold Sponsor
Read Bio

The dilemma facing many organizations, when it comes to implementing an effective DDoS defense strategy, is whether to deploy on-premises DDoS appliances or subscribe to a cloud based anti-DDoS provider. These decisions are not taken lightly, as the DDoS threat landscape is wide ranging. Beginning with well-recognized brute-force volumetric attacks, designed to saturate your Internet pipe and take services and infrastructure down, and extending to application layer attacks, that are ‘low and slow’—difficult to detect. When assessing the most appropriate strategy for comprehensive, purposeful defense against the implications of a DDoS attack, the solutions are not an apples-to-apples comparison, but there is a recommended approach to protect against the entire spectrum of DDoS attacks.

North Ballroom
12:40pm – 1:30pm Lunch South Ballroom
1:30pm – 1:55pm

“The Value of a CISO – An Update on Compensation Packages”

Geoff AranoffMatt Comyns
Global Head of Cyber Security Practice
Russell Reynolds Associates
Read Bio

In this afternoon session, Matt Comyns, Global Co-head of the Cyber Security Practice and a leader in the Digital Transformation practice at Russell Reynolds Associates, will share his insights into the CISO of the future, the increasing value of the role to the business, the shift in compensation to align with the increased value, his discussions with the C Suite, and what separates the top tier CISOs from the rest.

Russell Reynolds Associates is an executive leadership and search firm, serving clients globally for 45 years. The company advises clients on recruiting and retaining outstanding and impactful leaders.

North Ballroom
1:55pm – 2:05pm

Executive Briefing – “Cyber Security is a Team Sport”

Geoff AranoffDoug Simpson
Enterprise Security
Intel Security, Silver Sponsor
Read Bio

Every connected organization is dealing with Cyber threats. We can no longer “go it alone”. We have a common adversary so we must work together to secure our critical data and IT assets. This is not only a call to work together across companies / organizations but also to break down the barriers within your business that prevents teams from working together.

North Ballroom
2:05pm – 2:35pm

“The CISO Role of the Future”

North Ballroom
2:35pm – 2:45pm

Executive Briefing – “The New Security Stack: 2015–2020”

Geoff AranoffScott Cressman
Senior Product Manager
OpenDNS Silver Sponsor
Read Bio

What does it mean when we say ‘the perimeter is dead?’ We know that we now live in a world with myriad devices with wi-fi and cellular connections, employees working outside the office, and applications and data moving to the cloud. It’s a brand new IT landscape, with a boundless surface to protect from entirely new threats, in a world filled with more sophisticated attackers. What are we going to do? What should the new security stack look like? Let’s talk about how to re-establish the benefits of a secure network perimeter in a world where one no longer exists.

North Ballroom
2:45pm – 3:05pm Afternoon Break
3:05pm – 4:30pm

Executive Roundtable Discussions with Debrief

Breakout sessions with your peers on topics determined by attendees during registration.

Topic 1: Cloud Computing Continues to Grow – How Do You Improve Governance and Practices to Protect Your Organization in the Cloud?

Robert MimsKen Seeley
Director, Information Security
Santander Consumer
Read Bio

read more

Topic 2: Ethical Questions in Information Security

Robert MimsRoss Henton
Director of Information Security
American Express Global Business Travel
Read Bio

read more

Topic 3: What are the Trophies your Company Needs to Protect?

Robert MimsMichael Plummer
Chief Information Security Officer
U.S. Department of Veteran Affairs
Read Bio

read more

Topic 4: What more can be done for Malware Protection?

Robert MimsDavid Stanowick
Former Chief Information Security Officer, IT Risk Management
Intertek
Read Bio

read more

Topic 5: Next Generation Security Analytics & Threat Intelligence

Robert MimsMarc Crudgington
Chief Information Security Officer
Woodforest National Bank
Read Bio

read more

North Ballroom
4:30pm – 4:45pm

Closing Remarks

North Ballroom
4:45pm – 5:45pm Reception in the Sponsor Pavilion with Prize Drawings Gallery

Venue

The St. Regis

Dallas Country Club

Founded in 1896, the Dallas Country Club is the most prestigious and exclusive property in the area for hosting the Security Leaders Summit. Spanning 117 acres, the property has magnificent views of Turtle Creek and the historic skyline of downtown Dallas. The ballroom has been the chosen venue for many of the city’s elite programs.

For our out of town guests, located nearby is Highland Park Village, “the Rodeo Drive of Dallas” an upscale shopping mall that includes high end dining, theatre and exclusive, luxury stores such as Carolina Herrera, Christian Dior, Christian Louboutin, Escada, Harry Winston, Chanel, Hermes, and Jimmy Choo.

Parking

Complimentary self parking.

Please let the guard at the gate know that you are with the “Executive Alliance Security Leaders Summit” and they will direct you to the Main Ballroom Parking lot.

Directions

Dallas Country Club
4155 Mockingbird Lane, Dallas, TX 75205
(214) 521-2151
Dallas Country Club

Hotels

If you need a hotel room for the Security Leaders Summit Dallas 2015, here is a list of a few of the hotels within 4 miles of the Dallas Country Club:

The Lumen, Kimpton (1.2 miles) (214) 219-2400, (800) 908-1140
The Highland Dallas, Curio (1.4 miles) (214) 520 – 7969, (Formerly the Palomar Hotel, just purchased by Hilton)
Wyndham Dallas Love Field (2.1 miles) (214) 357-8500, (877) 999-3223
Warwick Melrose (2.2 miles) (214) 521-5151, (800) 916-4339
Hilton Dallas/Park Cities (2.7 miles) (214) 368-0400, (800) HILTONS
Rosewood Mansion (2.7 miles) (214) 559-2100, (888) 767-3966
Le Meridien (4.0 miles) (214) 871-7111, (800) 543-4300, (888) 978-6518

Airports

Dallas Love Field Airport is 15 minutes from Dallas Country Club and DFW Airport is 35-45 min.

If you are interested in sponsoring our 2016 Dallas Summit or would like more information about sponsor packages, please call 678-445-1919 or email us at info@execalliance.com.

2015 Platinum Sponsors

spo_blueCoatAbout Blue Coat Systems

Blue Coat empowers enterprises to safely and securely choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets. Blue Coat has a long history of protecting organizations, their data and their employees and is the trusted brand to 15,000 customers worldwide, including 86 percent of the FORTUNE Global 500. With a robust portfolio of intellectual property anchored by more than 200 patents and patents pending, the company continues to drive innovations that assure business continuity, agility and governance.

ZixCorp-logoAbout ZixCorp

ZixCorp is a leader in email data protection. ZixCorp offers industry-leading email encryption, a unique email DLP solution and an innovative email BYOD solution to meet your company’s data protection and compliance needs. ZixCorp is trusted by the nation’s most influential institutions in healthcare, finance and government for easy to use secure email solutions. ZixCorp is publicly traded on the Nasdaq Global Market under the symbol ZIXI, and its headquarters are in Dallas, Texas. For more information, visit www.zixcorp.com.

2015 Gold Sponsors

spo-accellionAbout Accellion

Accellion provides the leading mobile content platform that increases enterprise productivity and ensures data security and compliance. As the foremost provider of private cloud solutions for secure mobile content management, Accellion offers enterprise organizations the scalability, flexibility, control and security to enable a mobile workforce with the tools they need to create, access and share information securely, wherever work takes them. More than 12 million business users and 2,000 of the world’s leading corporations and government agencies use Accellion solutions to increase business productivity, protect intellectual property, ensure compliance and reduce IT costs. For additional information visit www.accellion.com.

spo-accellionAbout Corero

Corero Network Security, an organization’s First Line of Defense® against DDoS attacks and cyber threats, is a pioneer in global network security. Corero products and services provide online Enterprises, Service Providers, Hosting Providers and Managed Security Service Providers with an additional layer of security capable of inspecting Internet traffic and enforcing real-time access and monitoring policies designed to match the needs of the protected business. Corero technology enhances any defense-in-depth security architecture with a scalable, flexible and responsive defense against DDoS attacks and cyber threats before they reach the targeted IT infrastructure allowing online services to perform as intended. For more information, visit www.corero.com.

2015 Silver Sponsors

spo_blueCoatAbout Intel Security

McAfee is now part of Intel Security. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique McAfee Global Threat Intelligence, Intel Security is intensely focused on developing proactive, proven security solutions and services that protect systems, networks, and mobile devices for business and personal use around the world. Intel Security is combining the experience and expertise of McAfee with the innovation and proven performance of Intel to make security an essential ingredient in every architecture and on every computing platform. The mission of Intel Security is to give everyone the confidence to live and work safely and securely in the digital world. www.intelsecurity.com.

spo-proofPointAbout OpenDNS

OpenDNS is a leading provider of network security and DNS services, enabling the world to connect to the Internet with confidence on any device, anywhere, anytime. The Umbrella cloud-delivered network security service blocks advanced attacks, as well as malware, botnets and phishing threats regardless of port, protocol or application. Its predictive intelligence uses machine learning to automate protection against emergent threats before they can reach customers. OpenDNS protects all devices globally without hardware to install or software to maintain. For more information, please visit: www.opendns.com.

2015 Bronze Sponsors

spo-securityInnovationAbout Alert Logic

Alert Logic, the leader in security and compliance solutions for the cloud, provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Fully managed by a team of experts, the Alert Logic Security-as-a-Service solution provides network, system and web application protection immediately, wherever your IT infrastructure resides. Alert Logic partners with the leading cloud platforms and hosting providers to protect over 3,000 organizations worldwide. Built for cloud scale, our patented platform stores petabytes of data, analyzes over 450 million events and identifies over 60,000 security incidents each month, which are managed by our 24×7 Security Operations Center. Alert Logic, founded in 2002, is headquartered in Houston, Texas, with offices in Seattle, Dallas, Cardiff, Belfast and London. For more information, please visit www.alertlogic.com.

spo-proofPointAbout BeyondTrust

BeyondTrust provides context-aware Privileged Account Management and Vulnerability Management software solutions that deliver the visibility necessary to reduce IT security risks and simplify compliance reporting.

We empower organizations to not only mitigate user-based risks arising from misuse of system or device privileges, but also identify and remediate asset vulnerabilities targeted by cyber attacks. As a result, our customers are able to address both internal and external threats, while making every device – physical, virtual, mobile and cloud – as secure as possible.

BeyondTrust solutions are unified under the BeyondInsight IT Risk Management Platform, which provides IT and security teams a single, contextual lens through which to view user and asset risk. This clear, consolidated risk profile enables proactive, joint decision-making while ensuring that daily operations are guided by common goals for risk reduction.

The company is privately held, and headquartered in Phoenix, Arizona. For more information, visit www.beyondtrust.com

spo-securityInnovationAbout Oplogics

Oplogics is a new interactive platform designed to increase awareness among employees about how security breaches happen and how to avoid them. We engage employees with information that’s easy to understand and enjoyable to use. Then we measure the results.
The “Op” in our name refers to operant conditioning, one of the foundations of modern psychology. Our approach is based on the science of human behavior.

Oplogics is unique in three ways.

Our roots are in digital marketing and consumer behavior. Oplogics comes from What’s Up Interactive, an agency with more than 25 years in web marketing and video production for companies including AT&T, Trane Air Conditioning and Fox Television Stations. So everything we do for an Oplogics client conforms to their brand standards and culture.

We continuously update information on the company-branded intranet or extranet using innovative promotional techniques. Employees know the website is the place to go for clear, concise information about threats and how to respond.

And our quiz engine is designed to engage users with timed, interactive questions and deliver a clear graphic representation of the metrics that show how desired behavior around security awareness is improving among employees.

Visit us at www.oplogics.com or contact Ben Stanfield bstanfield@oplogics.com.

spo-securityInnovationAbout Security Innovation

Security Innovation focuses on the most difficult IT Security problem, and the root cause of most data breaches — insecure software applications. For more than a decade, we’ve helped organizations build internal expertise, uncover critical vulnerabilities, and improve the process by which applications are built. The company’s solutions are based on the three pillars of a secure Software Development Lifecycle (SDLC), which feed into one another to create an ecosystem of repeatable, secure software development: Standards, Education, and Assessment. Our flagship products include TeamProfessor, the industry’s largest library of application security eLearning courses, and TeamMentor, “out of the box” secure development standards.

spo-securityInnovationAbout Wombat Security Technologies

Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. Their SaaS cyber security education solution includes a platform of integrated broad assessments, and a library of simulated attacks and brief interactive training modules, to reduce employee susceptibility to attack, even phishing attacks, over 80%.

2015 Wi-Fi Sponsor

spo-accellionAbout CloudPassage

CloudPassage® is the leading software-defined security provider for cloud infrastructure. We’ve invested four years and over $20m in Halo®, the industry’s only SDSec platform purpose-built for seamless, scalable security & compliance across any mix of private cloud, public IaaS, and hybrid/multi-cloud environments.

Industry-leading enterprises trust Halo to protect their cloud and software-defined datacenter environments. Founded in 2010 and headquartered in San Francisco, CloudPassage is backed by leading investors including Benchmark Capital, Musea Ventures, Tenaya Capital, Shasta Ventures, and Meritech Capital.

spo-securityInnovationAbout SAINT

SAINT Corporation, a global leader in network security, offers the SAINT security suite including integrated vulnerability assessment, penetration testing, compliance reporting, and configuration assessment. Examine your network with the SAINT vulnerability scanner, and expose where an attacker could breach your network. Go to a higher level of visibility with penetration testing tools and exploit the vulnerability to prove its existence without a doubt. SAINT can help to –

• Manage and reduce security risks to your enterprise
• Document compliance with government and industry regulations like PCI, NERC, HIPAA, SOX, FISMA, and with internal policies.
• Emulate potential attackers with the suite of exploit tools.
• Perform configuration audits with policies defined by FDCC & USGCB.

SAINT software is available to download, as a cloud service (SAINTCloud), or preloaded on an appliance (SAINTbox). The software includes enterprise functionality; customizable dashboards and data analysis; and a friendly interface. For more information, visit www.saintcorporation.com

Summit Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Bronze Sponsors

Wi-Fi Sponsor

OTHER PAST PROGRAMS

Guest Feedback

The past two New York Summits have led to 15 follow-up meetings and helped to make our New York rep the top sales rep in...

Ed Adams, Chief Executive Officer, Security Innovation
VIEW MORE GUEST FEEDBACK IT Security Leaders

I was honored to participate in this Summit. I thought the candid discussions with senior security professionals was refreshing and informative.”...

Eric Yancy, Information Security Officer, GetThere
VIEW MORE GUEST FEEDBACK IT Security Leaders

Best one-on-one with both peers and solution providers. Also, perfect for one day of packed content....

Kevin McMahon, Sr. VP & Chief Compliance Officer, Calpine Corporation
VIEW MORE GUEST FEEDBACK IT Security Leaders

Excellent information sharing and networking....

Gary Toretti, Chief Information Security Officer, Sabre Corporation
VIEW MORE GUEST FEEDBACK IT Security Leaders

The EA Summits provide me with the opportunity to speak with peers that I can trust....

Scot Miller, VP & Chief Information Security Officer, HMS Healthcare
VIEW MORE GUEST FEEDBACK IT Security Leaders