The Security Leaders Summit

Where Industry Leaders Meet to Shape the Future
  • Home
  • /
  • Security Leaders Summit

The Security Leaders Summit New York Spring was held on Thursday, May 14, 2015 at the historic Roosevelt Hotel. The Summit brought together a community of senior IT executives for engaging peer-level interaction, discussions on new approaches to managing complexities in Information Security, and will provide opportunities to collaborate with leaders in the industry. Throughout the day, the Summit Hosts, representing companies across a diversity of industries and sizes, shared their insights and knowledge with the distinguished group of attendees through their presentations, interviews and breakout roundtable discussions.

Summit Recap

David Chamberlin, EVP and leader of the Data Security & Privacy Group at Edelman, the world’s largest public relations firm, kicked off the New York Summit with the Morning Keynote on “Trust, Reputation and Data Security & Privacy.” David shared his insights regarding the intersection of trust, reputation and cybersecurity and how they affect an organization. Download Presentation.

In this morning interview session facilitated by Summit Emcee, Richard Warner, Denise Hucke, VP, Chief Business Security Officer for US & Canada at ADP and Jim Moran, Chief Information Security Officer of Educational Testing Service discussed their focus on the future structure of a security organization, programs to develop existing talent, and what they are putting in place to keep their key team members.

Grant Asplund, Director of Evangelism at Blue Coat, Platinum Sponsor, presented “The New Role of Analytics and the Need for Encrypted Traffic Management.” Grant shared information on how entire industries have been transformed through the use of data analytics, the new approaches to mitigating risks, and principles to consider when developing an overall security strategy. For a copy of the presentation or background information he presented on, please contact Grant at grant.asplund@bluecoat.com

In the interview session, “Game Changers,” David Hahn, Chief Information Security Officer of The Hearst Corporation and John Whiting, Business Information Security Officer with AIG, shared their perspectives on what they are doing to drive innovation at their organizations to help move their businesses forward and how they are approaching building an innovative culture to execute on their vision.

Stephen Gates, Chief Security Evangelist at Corero Network Security, Gold Sponsor, highlighted the dilemmas facing many organizations, when it comes to implementing an effective DDoS defense strategy. Whether to deploy on-premises DDoS appliances or subscribe to a cloud based anti-DDoS provider, these decisions are not taken lightly, as the DDoS threat landscape is wide ranging.Stephen discussed several strategies for implementing a comprehensive, purposeful defense against the implications of a DDoS attack.

In the presentation, “Why Employees Remain the Greatest IT Security Risk and How to Change Their Behavior,” Summit Emcee Richard Warner, discussed how organizations can raise awareness of online security risks, change employee behavior and measure results. Richard Warner, shared what works, and what hasn’t as companies adopt behavior management.

Geoff Bibby, Vice President, Corporate Marketing with ZixCorp, Gold Sponsor presented on “The Criticality of Email Security.” In this Executive Briefing, Geoff shared insights into implementing secure email solutions that increase productivity and mitigate risk, without creating employee frustration.

In the presentation, “How To Position Yourself for Success in a Changing Market,” Matt Comyns, Global Co-head of the Cyber Security Practice and a leader in the Digital Transformation practice at Russell Reynolds Associates, shared insights into what sets top tier security executives from the crowd, what are the key success factors of why an executive “wins the job,” what is driving the need for a diversity of new talent, and the shift in compensation for the industry as a whole. Matt can be reached at Matt.Comyns@russellreynolds.com.

In the Executive Briefing, “Security Connected – Where Security Obligated Executives Should Focus,” George Younan, Enterprise Security Architect with Intel Security, Silver Sponsor, spoke on the need to not only work together across companies, but also to break down the barriers within your business that prevents teams from working together. George stressed the focus is on a common adversary, so the information security community must work together to secure critical data and IT assets.

The afternoon Executive Roundtable discussions offered the opportunity for peer-to-peer discussions across a variety of topics. The topics were facilitated by executives attending the Summit and wrapped up with a debrief of the relevant points on each of the topics.

Guests of the Security Leaders Summit wrapped up the day with the Reception and the opportunity to continue their conversations.

Be sure to visit the photo gallery.

Platinum Sponsors

Blue Coat Systems

Blue Coat empowers enterprises to safely and securely choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets. Blue Coat has a long history of protecting organizations, their data and their employees and is the trusted brand to 15,000 customers worldwide, including 86 percent of the FORTUNE Global 500. With a robust portfolio of intellectual property anchored by more than 200 patents and patents pending, the company continues to drive innovations that assure business continuity, agility and governance. Visit www.bluecoat.com

• A new study from ESG describing the growth of encryption and strategies for protection. Read the report, “Network Encryption and its Impact on Network Security” to get the facts and figures about the nature of the threat and the actions you can take now to deepen your defenses

ZixCorp

ZixCorp is a leader in email data protection. ZixCorp offers industry-leading email encryption, a unique email DLP solution and an innovative email BYOD solution to meet your company’s data protection and compliance needs. ZixCorp is trusted by the nation’s most influential institutions in healthcare, finance and government for easy to use secure email solutions. ZixCorp is publicly traded on the Nasdaq Global Market under the symbol ZIXI, and its headquarters are in Dallas, Texas.

For more information, visit zixcorp.com and also access: A Simple Approach to BYOD

Gold Sponsors

Corero Network Security

Corero Network Security, an organization’s First Line of Defense® against DDoS attacks and cyber threats, is a pioneer in global network security. Corero products and services provide online Enterprises, Service Providers, Hosting Providers and Managed Security Service Providers with an additional layer of security capable of inspecting Internet traffic and enforcing real-time access and monitoring policies designed to match the needs of the protected business. Corero technology enhances any defense-in-depth security architecture with a scalable, flexible and responsive defense against DDoS attacks and cyber threats before they reach the targeted IT infrastructure allowing online services to perform as intended. For more information, visit www.corero.com.

Corero DDoS Trends and Analysis Quarterly Report
• DDoS Defense video: http://www.corero.com/ddos_defense_overview_video

Silver Sponsors

Intel Security

McAfee is now part of Intel Security. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique McAfee Global Threat Intelligence, Intel Security is intensely focused on developing proactive, proven security solutions and services that protect systems, networks, and mobile devices for business and personal use around the world. Intel Security is combining the experience and expertise of McAfee with the innovation and proven performance of Intel to make security an essential ingredient in every architecture and on every computing platform. The mission of Intel Security is to give everyone the confidence to live and work safely and securely in the digital world. www.intelsecurity.com.

Bronze Sponsors

BeyondTrust

BeyondTrust provides context-aware Privileged Account Management and Vulnerability Management software solutions that deliver the visibility necessary to reduce IT security risks and simplify compliance reporting.

We empower organizations to not only mitigate user-based risks arising from misuse of system or device privileges, but also identify and remediate asset vulnerabilities targeted by cyber attacks. As a result, our customers are able to address both internal and external threats, while making every device – physical, virtual, mobile and cloud – as secure as possible.

BeyondTrust solutions are unified under the BeyondInsight IT Risk Management Platform, which provides IT and security teams a single, contextual lens through which to view user and asset risk. This clear, consolidated risk profile enables proactive, joint decision-making while ensuring that daily operations are guided by common goals for risk reduction.

The company is privately held, and headquartered in Phoenix, Arizona. For more information, visit: www.beyondtrust.com or contact Kevin McNally, kmcnally@beyondtrust.com or Rick Yodice at ryodice@beyondtrust.com.

Or you can access more information here:
BeyondTrust Corporate Overview
Gartner report: Gartner Technology – BeyondTrust – Issue 2

Security Innovation

Security Innovation focuses on the most difficult IT Security problem, and the root cause of most data breaches — insecure software applications. For more than a decade, we’ve helped organizations build internal expertise, uncover critical vulnerabilities, and improve the process by which applications are built. The company’s solutions are based on the three pillars of a secure Software Development Lifecycle (SDLC), which feed into one another to create an ecosystem of repeatable, secure software development: Standards, Education, and Assessment. Our flagship products include TeamProfessor, the industry’s largest library of application security eLearning courses, and TeamMentor, “out of the box” secure development standards.

For more information visit: www.securityinnovation.com

THALES e-Security

Thales e-Security is a leading global provider of trusted cryptographic solutions with a 40-year track record of protecting the world’s most sensitive applications and information. Thales solutions enhance privacy, trusted identities, and secure payments with certified, high performance encryption and digital signature technology for customers in a wide range of markets including financial services, high technology, manufacturing, and government. Thales e-Security has a worldwide support capability, with regional headquarters in the United States, United Kingdom, and Hong Kong. Visit www.thales-esecurity.com

WiFi Sponsors

NetSpi

Using our consulting team’s deep security knowledge and our proprietary CorrelatedVM vulnerability management & reporting solution, NetSPI acts as a trusted advisor to large enterprises by providing deep-dive, manual penetration testing – from mobile applications to entire networks and infrastructures. NetSPI also provides assessment and vulnerability management advisory services designed to analyze and mitigate risks and ensure compliance with relevant regulations and industry standards.

Utilizing its proven and comprehensive methodology in conjunction with its adaptive and responsive client service – NetSPI is more than a vendor, its partner you can trust with your most critical assets.

More information is available at www.netspi.com

SAINT

SAINT Corporation, a global leader in network security, offers the SAINT security suite including integrated vulnerability assessment, penetration testing, compliance reporting, and configuration assessment. Examine your network with the SAINT vulnerability scanner, and expose where an attacker could breach your network. Go to a higher level of visibility with penetration testing tools and exploit the vulnerability to prove its existence without a doubt. SAINT can help to –

• Manage and reduce security risks to your enterprise
• Document compliance with government and industry regulations like PCI, NERC, HIPAA, SOX, FISMA, and with internal policies.
• Emulate potential attackers with the suite of exploit tools.
• Perform configuration audits with policies defined by FDCC & USGCB. SAINT is SCAP 1.2 validated by NIST.

SAINT software is available to download, as a cloud service (SAINTCloud) or on a preloaded appliance (SAINTbox). The software includes enterprise functionality; customizable dashboards and data analysis; and a friendly interface. For more information, visit www.saintcorporation.com

Hosts

The Security Leaders Summit New York Spring 2015 was hosted by Information Security and IT Executives from across a variety of industries in the area. The Summit Hosts served as the face of the Summit and throughout the day, they shared their insights during presentations, interactive sessions, and facilitate peer-to-peer executive roundtable discussions. The hosts were:

MaddenS David Chamberlin
Global Leader, Data Security & Privacy Group
Executive Vice President and General Manager

Edelman
Read Bio

MaddenS Matt Comyns
Global Head of Cyber Security Practice
Russell Reynolds Associates
Read Bio

photo_comingSoonS David Hahn
Chief Information Security Officer
The Hearst Corporation
Read Bio

photo_comingSoonS Denise Hucke
VP, Chief Business Security Officer for US & Canada
ADP
Read Bio

photo_comingSoonS Nashira Layade
Executive Director, Privacy & Information Security
Time Warner Corporate

photo_comingSoonS Jim Moran
Chief Information Security Officer
Educational Testing Service
Read Bio

photo_comingSoonS Nick Nedostup
Chief Information Security Officer
Tyco International
Read Bio

photo_comingSoonS Steven Santamorena
Security Officer
CareCentrix

MaddenS John Whiting
Business Information Security Officer
AIG
Read Bio

Time Description
7:15am – 8:25am Breakfast and Networking in the Sponsor Pavilion Palm Room – Lobby Level
8:25am – 8:35am Transition to Ballroom
8:35am – 8:55am

Welcome Remarks

Terrace Ballroom – Lobby Level
8:55am – 9:35am

Morning Keynote – “Trust, Reputation and Data Security & Privacy”

Geoff AranoffDavid Chamberlin
Global Leader, Data Security & Privacy Group
Executive Vice President and General Manager

Edelman
Read Bio

David Chamberlin, EVP and General Manager of the Data Security & Privacy Group at Edelman, the world’s largest independently owned public relations firm, will kick off the New York Spring Summit with the Morning Keynote. David will share his insights into how prepared or not prepared companies are today to handle the lifecycle of a data breach from discovery to remediation and everything in between, what are the obstacles to success during a crisis such as a breach, what is key to success, and what he envisions will change in the future that will make it harder or easier for companies to respond to their customers and stakeholders.

Terrace Ballroom – Lobby Level
9:35am – 10:10am

“The Talent Gap – Expectations for The Future”

ZandoliSDenise Hucke
VP, Chief Business Security Officer for US & Canada
ADP
Read Bio

ZandoliSNashira Layade
Executive Director, Privacy & Information Security
Time Warner Corporate

ZandoliSJim Moran
Chief Information Security Officer
Educational Testing Service
Read Bio

One of the biggest challenges facing the information security industry today is the shortfall of talent, in terms of skills and the number of available resources. Security executives struggle to not only attract top talent, but to keep them. With demand exceeding supply, how are organizations going to be staffed in the future, attract, and retain talent? In this morning session, Denise Hucke, VP, Chief Business Security Officer for US & Canada at ADP and Jim Moran, Chief Information Security Officer of Educational Testing Service will share their thoughts on the future structure of a security organization, programs to develop existing talent, and what they are putting in place to keep their key team members.

Terrace Ballroom – Lobby Level
10:10am – 10:40am

Executive Briefing – “The New Role of Analytics and the Need for Encrypted Traffic Management”

Geoff AranoffGrant Asplund
Director of Evangelism
Blue Coat, Platinum Sponsor
Read Bio

In many respects, network traffic data (and associated metadata) is the raw material CISO’s use to develop their risk profile(s) and create the appropriate policy decisions…And, suffice to say, there is certainly no shortage of data in today’s enterprise…most organizations have a long list of log-file producing, report generating, alert notifying technologies. The challenge is to instrument the network in order to be able to quickly and easily see all of the right data and to be able to immediately see what [data] matters most. This can be especially challenging considering the increasing amount of network traffic being encrypted using SSL In this session, Grant will discuss how entire industries have been transformed through the use of data analytics. He will discuss new approaches to mitigating risks and principles to consider when developing an overall security strategy.

Terrace Ballroom – Lobby Level
10:40am – 11:10am Break Palm Room – Lobby Level
11:10am – 11:20am Transition to Ballroom
11:20am – 11:50am

“Game Changers Interview – Driving Innovation”

ZandoliSDavid Hahn
Chief Information Security Officer
The Hearst Corporation
Read Bio

ZandoliSJohn Whiting
Business Information Security Officer
AIG
Read Bio

In this interview session, David Hahn, Chief Information Security Officer of The Hearst Corporation and John Whiting, Business Information Security Officer with AIG, will share their insights into what they are doing to drive innovation at their organizations to help move their businesses forward and how they are approaching building an innovative culture to execute on their vision.

Terrace Ballroom – Lobby Level
11:50am – 12:10pm

“A Hybrid Approach – Rewriting the Rules for DDoS Defense”

Geoff AranoffStephen Gates
Chief Security Evangelist
Corero Network Security, Gold Sponsor
Read Bio

The dilemma facing many organizations, when it comes to implementing an effective DDoS defense strategy, is whether to deploy on-premises DDoS appliances or subscribe to a cloud based anti-DDoS provider. These decisions are not taken lightly, as the DDoS threat landscape is wide ranging. Beginning with well-recognized brute-force volumetric attacks, designed to saturate your Internet pipe and take services and infrastructure down, and extending to application layer attacks, that are ‘low and slow’—difficult to detect. When assessing the most appropriate strategy for comprehensive, purposeful defense against the implications of a DDoS attack, the solutions are not an apples-to-apples comparison, but there is a recommended approach to protect against the entire spectrum of DDoS attacks.

Terrace Ballroom – Lobby Level
12:10pm – 12:30pm

“CISOs Off the Cuff”


In this interactive session, Summit Emcee, Richard Warner, will engage the guests in attendance in discussing their most relevant issues of the day.

Terrace Ballroom – Lobby Level
12:30pm – 12:50pm

“The Criticality of Email Security”

Elliott GlazerGeoff Bibby
Vice President, Corporate Marketing
ZixCorp, Gold Sponsor
Read Bio

The recent Sony breach, among others, has reminded us of the importance of securing emails. Organizations need to be confident that the millions of emails leaving their network each day are protected where necessary, whether sent from a desktop or from a mobile device. Implementing secure email solutions should increase productivity and mitigate risk without creating employee frustration. In this discussion, Geoff Bibby, Vice President of Corporate Marketing with ZixCorp will share insights into solutions to help solve your most pressing secure email challenges.

Terrace Ballroom – Lobby Level
12:50pm – 1:50pm Lunch Roosevelt Grill – Lobby Level
1:50pm – 2:00pm Transition to Ballroom
2:00pm – 2:40pm

“How To Position Yourself for Success in a Changing Market”

Elliott GlazerMatt Comyns
Global Head of Cyber Security Practice
Russell Reynolds Associates
Read Bio

Matt Comyns, Global Co-head of the Cyber Security Practice and a leader in the Digital Transformation practice at Russell Reynolds Associates, will share provide insights into new areas of increasing compensation for security executives, what is driving the need, and the shift in compensation for the industry as a whole.

Russell Reynolds Associates is an executive leadership and search firm, serving clients globally for 45 years. The company advises clients on recruiting and retaining outstanding and impactful leaders.

Terrace Ballroom – Lobby Level
2:40pm – 2:50pm

Executive Briefing – “Security Connected – Where Security Obligated Executives Should Focus”

Elliott GlazerGeorge Younan
Enterprise Security Architect
Intel Security, Silver Sponsor
Read Bio

Every connected organization is dealing with Cyber threats. We can no longer “go it alone”. We have a common adversary so we must work together to secure our critical data and IT assets. This is not only a call to work together across companies / organizations but also to break down the barriers within your business that prevents teams from working together.

Terrace Ballroom – Lobby Level
2:50pm – 4:30pm Executive Roundtable Discussions and Debrief with Afternoon Break Mid-Way Terrace Ballroom – Lobby Level
4:30pm – 4:45pm

Closing Remarks

Terrace Ballroom – Lobby Level
4:45pm – 5:45pm Reception in the Sponsor Pavilion with Prize Drawings Palm Room – Lobby Level

Venue

Hilton New York, Avenue of the AmericasThe Roosevelt Hotel

45 East 45TH St. at Madison Avenue, New York, NY 10017
212-661-9600

For a classic New York City hotel experience, none of the other Hotels in New York City comes close to The Roosevelt Hotel. Opened in 1924 at the height of the Jazz Age, the “Grand Dame of Madison Avenue” continues to impress guests in its prime location at Madison Avenue and 45th Street in midtown Manhattan. The historic hotel has gone through major renovations over the last few years to the lobby and most recently its 1015 rooms.

Convenient to Grand Central Terminal, JFK International, Newark Liberty International and LaGuardia airports. Near the Empire State Building, 5th Avenue shopping and world-famous shows on Broadway, guests are only steps away from the action found within the heart of the world’s most exciting city.

Room Rate and How To Book

Hilton New York, Avenue of the AmericasEach guestroom features a HD flat-screen TV with cable channels, iPod/mp3-equipped clock radio, premium bedding, wireless Internet access, dual telephone lines with voicemail, dataport capabilities, individual climate control, luxury personal care amenities, hair dryers, and irons and ironing boards to assure that you have all the comforts of home.

For New York City business travelers, each of our guestrooms provides a sofa chair, solid wood desk, desk lamp with Internet and DC plugs, an comfortable desk chair and high-speed Internet access so you’re able to be productive away from the office.

Executive Alliance has negotiated a special rate with The Roosevelt Hotel New York for Summit attendees for May 13th and May 14. This is limited availability. You can make a reservation by contacting the Hotel Reservations directly at 1-888-833-3969 and ask for Executive Alliance Security Leaders Summit rate of $249.00 or you can reserve your discount rate online at: Roosevelt Hotel NY – Summit Special Rate

Amenities

Hilton New York, Avenue of the Americas
The hotel has a fitness center, business center, valet parking, rooftop lounge, onsite restaurants, and room service.

Parking

Local Parking Garages
246 East 45th Street
Between 2nd and 3rd Ave
212-972-2747

Valet parking is available at the front entrance of hotel. The Roosevelt Hotel assumes no responsibility for vehicles parked in any garage. Parking charges are guest’s responsibility.

Directions

View Map

If you are interested in sponsoring our 2016 New York “Spring” Summit or would like more information about sponsor packages, please call 678-445-1919 or email us at info@execalliance.com.

2015 Platinum Sponsor

spo_blueCoatAbout Blue Coat Systems

Blue Coat empowers enterprises to safely and securely choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets. Blue Coat has a long history of protecting organizations, their data and their employees and is the trusted brand to 15,000 customers worldwide, including 86 percent of the FORTUNE Global 500. With a robust portfolio of intellectual property anchored by more than 200 patents and patents pending, the company continues to drive innovations that assure business continuity, agility and governance.

2015 Gold Sponsors

spo-accellionAbout Corero

Corero Network Security, an organization’s First Line of Defense® against DDoS attacks and cyber threats, is a pioneer in global network security. Corero products and services provide online Enterprises, Service Providers, Hosting Providers and Managed Security Service Providers with an additional layer of security capable of inspecting Internet traffic and enforcing real-time access and monitoring policies designed to match the needs of the protected business. Corero technology enhances any defense-in-depth security architecture with a scalable, flexible and responsive defense against DDoS attacks and cyber threats before they reach the targeted IT infrastructure allowing online services to perform as intended. For more information, visit www.corero.com.

ZixCorp-logoAbout ZixCorp

ZixCorp is a leader in email data protection. ZixCorp offers industry-leading email encryption, a unique email DLP solution and an innovative email BYOD solution to meet your company’s data protection and compliance needs. ZixCorp is trusted by the nation’s most influential institutions in healthcare, finance and government for easy to use secure email solutions. ZixCorp is publicly traded on the Nasdaq Global Market under the symbol ZIXI, and its headquarters are in Dallas, Texas. For more information, visit www.zixcorp.com.

2015 Silver Sponsor

spo_blueCoatAbout Intel Security

McAfee is now part of Intel Security. With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique McAfee Global Threat Intelligence, Intel Security is intensely focused on developing proactive, proven security solutions and services that protect systems, networks, and mobile devices for business and personal use around the world. Intel Security is combining the experience and expertise of McAfee with the innovation and proven performance of Intel to make security an essential ingredient in every architecture and on every computing platform. The mission of Intel Security is to give everyone the confidence to live and work safely and securely in the digital world. www.intelsecurity.com.

2015 Bronze Sponsors

spo-proofPointAbout BeyondTrust

BeyondTrust provides context-aware Privileged Account Management and Vulnerability Management software solutions that deliver the visibility necessary to reduce IT security risks and simplify compliance reporting.

We empower organizations to not only mitigate user-based risks arising from misuse of system or device privileges, but also identify and remediate asset vulnerabilities targeted by cyber attacks. As a result, our customers are able to address both internal and external threats, while making every device – physical, virtual, mobile and cloud – as secure as possible.

BeyondTrust solutions are unified under the BeyondInsight IT Risk Management Platform, which provides IT and security teams a single, contextual lens through which to view user and asset risk. This clear, consolidated risk profile enables proactive, joint decision-making while ensuring that daily operations are guided by common goals for risk reduction.

The company is privately held, and headquartered in Phoenix, Arizona. For more information, visit www.beyondtrust.com

spo-securityInnovationAbout Security Innovation

Security Innovation focuses on the most difficult IT Security problem, and the root cause of most data breaches — insecure software applications. For more than a decade, we’ve helped organizations build internal expertise, uncover critical vulnerabilities, and improve the process by which applications are built. The company’s solutions are based on the three pillars of a secure Software Development Lifecycle (SDLC), which feed into one another to create an ecosystem of repeatable, secure software development: Standards, Education, and Assessment. Our flagship products include TeamProfessor, the industry’s largest library of application security eLearning courses, and TeamMentor, “out of the box” secure development standards.

spo-securityInnovationThales e-Security

Thales e-Security is a leading global provider of trusted cryptographic solutions with a 40-year track record of protecting the world’s most sensitive applications and information. Thales solutions enhance privacy, trusted identities, and secure payments with certified, high performance encryption and digital signature technology for customers in a wide range of markets including financial services, high technology, manufacturing, and government. Thales e-Security has a worldwide support capability, with regional headquarters in the United States, United Kingdom, and Hong Kong.
Visit www.thales-esecurity.com

2015 Wi-Fi Sponsors

spo-proofPointAbout NetSPI

Using our consulting team’s deep security knowledge and our proprietary CorrelatedVM vulnerability management & reporting solution, NetSPI acts as a trusted advisor to large enterprises by providing deep-dive, manual penetration testing – from mobile applications to entire networks and infrastructures. NetSPI also provides assessment and vulnerability management advisory services designed to analyze and mitigate risks and ensure compliance with relevant regulations and industry standards.

Utilizing its proven and comprehensive methodology in conjunction with its adaptive and responsive client service – NetSPI is more than a vendor, its partner you can trust with your most critical assets.

More information is available at www.netspi.com

spo-securityInnovationAbout SAINT

SAINT Corporation, a global leader in network security, offers the SAINT security suite including integrated vulnerability assessment, penetration testing, compliance reporting, and configuration assessment. Examine your network with the SAINT vulnerability scanner, and expose where an attacker could breach your network. Go to a higher level of visibility with penetration testing tools and exploit the vulnerability to prove its existence without a doubt. SAINT can help to –

• Manage and reduce security risks to your enterprise
• Document compliance with government and industry regulations like PCI, NERC, HIPAA, SOX, FISMA, and with internal policies.
• Emulate potential attackers with the suite of exploit tools.
• Perform configuration audits with policies defined by FDCC & USGCB.

SAINT software is available to download, as a cloud service (SAINTCloud), or preloaded on an appliance (SAINTbox). The software includes enterprise functionality; customizable dashboards and data analysis; and a friendly interface. For more information, visit www.saintcorporation.com

Summit Sponsors

Platinum Sponsor

Gold Sponsors

Silver Sponsor

Bronze Sponsors

Wi-Fi Sponsors

OTHER PAST PROGRAMS

Guest Feedback

The past two New York Summits have led to 15 follow-up meetings and helped to make our New York rep the top sales rep in...

Ed Adams, Chief Executive Officer, Security Innovation
VIEW MORE GUEST FEEDBACK IT Security Leaders

I was honored to participate in this Summit. I thought the candid discussions with senior security professionals was refreshing and informative.”...

Eric Yancy, Information Security Officer, GetThere
VIEW MORE GUEST FEEDBACK IT Security Leaders

Best one-on-one with both peers and solution providers. Also, perfect for one day of packed content....

Kevin McMahon, Sr. VP & Chief Compliance Officer, Calpine Corporation
VIEW MORE GUEST FEEDBACK IT Security Leaders

Excellent information sharing and networking....

Gary Toretti, Chief Information Security Officer, Sabre Corporation
VIEW MORE GUEST FEEDBACK IT Security Leaders

The EA Summits provide me with the opportunity to speak with peers that I can trust....

Scot Miller, VP & Chief Information Security Officer, HMS Healthcare
VIEW MORE GUEST FEEDBACK IT Security Leaders