The Security Leaders Summit

Where Industry Leaders Meet to Shape the Future
  • Home
  • /
  • Security Leaders Summit

The Security Leaders Summit ATLANTA
“Where Industry Leaders Shape the Future”

The Executive Alliance “Security Leaders Summit Atlanta” was held on Tuesday, October 18th, 2016 at the InterContinental Buckhead Atlanta. The Executive Alliance “Security Leaders Summit Atlanta” brought together a community of senior IT executives for engaging peer-level interaction, discussions on new approaches to managing complexities in Information Security, and provided opportunities to collaborate with leaders in the industry. Throughout the day, the Summit Hosts, representing companies across a diversity of industries and sizes, will share their insights and knowledge with the distinguished group of attendees through their presentations, interviews and breakout roundtable discussions.

“Top notch information sharing with the best of the best industry leaders!”
Steve Roach, Vice President of IT – FOCUS Brands

“Great summit.”
Paul Cornwell, Cyber Security Advisor – Delta Air Lines

“Always a first class event from moderator to presentations.”
Dan Webber, Chief Information Officer – Monocle Health

The Security Leaders Summit Atlanta opened up with networking and breakfast in the Sponsor Pavilion and Welcome Remarks by Mary Lou Heastings, CEO of Executive Alliance and Richard Warner, Summit Moderator.

The Morning Keynote, Jamey Cummings, Senior Client Partner, Co-Leader Global Cybersecurity Practice at Korn Ferry opened up the Summit with a compelling case of the talent shortage in the market place by providing a view into the hiring landscape, what areas are driving the demand for talent, key trends, and key success factors used in hiring broken out into “what you do” and “who you are.”

Security Roles – Downloads from Korn Ferry Institute
https://www.kornferry.com/expertise/roles-and-specialities/cybersecurity.

Lael Bellamy, Chief Privacy Officer at the Weather Company and Katherine Fithen, Chief Privacy Officer from The Coca-Cola Company, were interviewed in the session, “Conversations with Execs in the Corner Office.” In the interview, they brought to light how they are delivering increasing value to their organizations, their data privacy concerns as they move forward, and the increasing importance of partnerships within their own companies and third parties.

Cheryl D’Asti, Regional Sales Manager at Accellion, Gold Sponsor, spoke on “Securing Rogue File Sharing – Your Most Vulnerable Data Leak Threat Vector.” Cheryl shared the latest advancements in secure file sharing and collaboration, best practices for providing security without compromising productivity and how to leverage investments in existing content systems.

During the morning break, there was high energy as attendees had the chance to talk with their peers and meet with sponsors to discuss their products and services.

In the interview session, “Game Changers – A Focus on Innovation,” Scott Barronton, Chief Information Security Officer at D+H, and Paul Cornwell, Cyber Security Advisor at Delta Air Lines, shed light on the most critical areas of their organizations where they need to be innovative, what is driving the need now more than ever, and the impact they believe they can make to their companies.

Alex Chiu, Senior Pre-Sales Systems Engineer at ZixCorp, Gold Sponsor, shared insights into “The Criticality of Email Security.” With the increase in data breaches and the rise in external threats,
Alex discussed the secure email challenges of balancing productivity while mitigating risk.

The lunch break provided great opportunities for the conversations to continue from the morning sessions.

Richard Warner, Summit Moderator, presented on “The Talent Shortage – Steps Leaders. are Taking.” Richard highlighted the creativity, innovation and new strategies being used for hiring and retention of top talent.

Wesley Rhodes, Chief Technology Officer, Security Architecture Specialist, & Industry Advisor with IBM, Gold Sponsor, discussed the sophistication of an attack purposed to thwart normal countermeasures that lived inside an enterprise undetected for years. In his presentation, “How I Met your Data – A Case from the X-FILES,” Wesley shared what security organizations are up against and the new era of cognitive solutions that generate not just answers, but hypotheses, evidence-based reasoning and recommendations for better decision making in real time.

The last session of the day, the Executive Roundtable discussions, closed the Summit on a high note as guests rotated through two topics of peer-to-peer discussions. Executives facilitating these breakout topics included Sam Bruce , Chief Information Security Officer at Medac, Ray Griffin , Global Security Director at Equifax, Marian Reed , Director of Information Security and Risk Management at McKesson Corporation, Joshua Sorenson , Security Advisor at Delta Air Lines, Deena Swatzie , IT Security & Compliance Risk Steward with SunTrust Bank, and Dr. Todd Watson , Information Security Officer with the Board of Regents of the University System of Georgia.

The Summit closed with the afternoon reception outside in the courtyard on a beautiful Atlanta day.

Be sure to visit the Summit photos on the Gallery tab.

Platinum Sponsor

Accellion


Accellion, Inc. provides secure access to enterprise content wherever it is stored to enable increased enterprise productivity and ensure data security and compliance. Accellion, Inc. is the leading provider of private cloud solutions offering enterprise organizations the scalability, flexibility, control and security to enable a global workforce with the tools they need to securely create, access and share information, wherever work takes them. Accellion solutions are used by more than 12 million users and 2,000 of the world’s leading corporations and government agencies including Procter & Gamble; Indiana University Health; Kaiser Permanente; Hogan Lovells; Bridgestone; Harvard University; US Securities and Exchange Commission; and NASA. For more information, please visit www.accellion.com or call 650-485-4300.

Additional Resources:
kiteworks Security Overview Whitepaper
kiteworks End User Demo

Gold Sponsors

IBM


IBM is a globally integrated technology and consulting company headquartered in Armonk, New York. With operations in more than 170 countries, IBM attracts and retains some of the world’s most talented people to help solve problems and provide an edge for businesses, governments and non-profits. Innovation is at the core of IBM’s strategy. The company develops and sells software and systems hardware and a broad range of infrastructure, cloud and consulting services. Today, IBM is focused on four growth initiatives – business analytics, cloud computing, growth markets and Smarter Planet. IBMers are working with customers around the world to apply the company’s business consulting, technology and R&D expertise to build systems that enable dynamic and efficient organizations, better transportation, safer food, cleaner water and healthier populations. For more information on IBM GTS Mobility Services, please visit www.ibm.com/mobilefirst/us/en/.

ZixCorp


ZixCorp is a leader in email data protection. ZixCorp offers industry-leading email encryption, a unique email DLP solution and an innovative email BYOD solution to meet your company’s data protection and compliance needs. ZixCorp is trusted by the nation’s most influential institutions in healthcare, finance and government for easy to use secure email solutions. ZixCorp is publicly traded on the Nasdaq Global Market under the symbol ZIXI, and its headquarters are in Dallas, Texas. For more information, please visit www.zixcorp.com or contact Alex Chiu ,at Zix Corporation.
Ebook: The Risks of Email and the Rewards of Innovative Encryption

Bronze Sponsors

Alert Logic

Alert Logic, the leader in security and compliance solutions for the cloud, provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Fully managed by a team of experts, the Alert Logic Security-as-a-Service solution provides network, system and web application protection immediately, wherever your IT infrastructure resides. Alert Logic partners with the leading cloud platforms and hosting providers to protect over 3,000 organizations worldwide. Built for cloud scale, our patented platform stores petabytes of data, analyzes over 450 million events and identifies over 60,000 security incidents each month, which are managed by our 24×7 Security Operations Center. Alert Logic, founded in 2002, is headquartered in Houston, Texas, with offices in Seattle, Dallas, Cardiff, Belfast and London. For more information, please visit www.alertlogic.com or contact :Steve Soto

BeyondTrust


BeyondTrust is a global cyber security company that believes preventing data breaches requires the right visibility to enable control over internal and external risks. We give you the visibility to confidently reduce risks and the control to take proactive, informed action against data breach threats. And because threats can come from anywhere, we built a platform that unifies the most effective technologies for addressing both internal and external risk: Privileged Account Management and Vulnerability Management. Our solutions grow with your needs, making sure you maintain control no matter where your company goes. BeyondTrust’s security solutions are trusted by over 4,000 customers worldwide, including half of the Fortune 100. To learn more about BeyondTrust, please visit www.beyondtrust.com or contact Rich Pace or Steve Geng

Cloud Passage


CloudPassage Halo® is the world’s leading agile security platform that empowers our customers to take full advantage of cloud infrastructure with the confidence that their critical business assets are protected. Halo delivers a comprehensive set of continuous security and compliance functions right where it counts — at the workload. Our platform orchestrates security on-demand, at any scale and works in any cloud or virtual infrastructure (private, public, hybrid or virtual data center). For more information, please visit www.cloudpassage.com or contact Paul Thomas or Greg Stein

Forcepoint


Forcepoint safeguards users, data and networks against the most determined adversaries, from accidental or malicious insider threats to outside attackers, across the entire threat lifecycle. Forcepoint protects data everywhere – in the cloud, on the road, in the office – simplifying compliance and enabling better decision-making and more efficient remediation. Forcepoint empowers organizations to concentrate on what’s most important to them while automating routine security tasks. More than 22,000 organizations around the world rely on Forcepoint. Based in Austin, Texas, with worldwide sales, service, security laboratories and product development, Forcepoint is a joint venture of the Raytheon Company and Vista Equity Partners. For more information, please visit www.forcepoint.com or contact Russ Meyer or David Crook .

Whitepaper available: Forcepoint Sureview Insider Threat DataSheet

Security Innovation


Security Innovation focuses on the most difficult IT Security problem, and the root cause of most data breaches — insecure software applications. For more than a decade, we’ve helped organizations build internal expertise, uncover critical vulnerabilities, and improve the process by which applications are built. The company’s solutions are based on the three pillars of a secure Software Development Lifecycle (SDLC), which feed into one another to create an ecosystem of repeatable, secure software development: Standards, Education, and Assessment. Our flagship products include TeamProfessor, the industry’s largest library of application security eLearning courses, and TeamMentor, “out of the box” secure development standards. For more information, please contact Derek Reed or visit www.securityinnovation.com.

Thales


Thales e-Security is a leading global provider of trusted cryptographic solutions with a 40-year track record of protecting the world’s most sensitive applications and information. Thales solutions enhance privacy, trusted identities, and secure payments with certified, high performance encryption and digital signature technology for customers in a wide range of markets including financial services, high technology, manufacturing, and government. Thales e-Security has a worldwide support capability, with regional headquarters in the United States, United Kingdom, and Hong Kong. For more information, please visit www.thales-esecurity.com or contact Cortne Pappas

Varonis


Varonis is the leading provider of software solutions for unstructured, human-generated enterprise data. Varonis provides an innovative software platform that allows enterprises to map, analyze, manage and migrate their unstructured data. Varonis specializes in human-generated data, a type of unstructured data that includes an enterprise’s spreadsheets, word processing documents, presentations, audio files, video files, emails, text messages and any other data created by employees. This data often contains an enterprise’s financial information, product plans, strategic initiatives, intellectual property and numerous other forms of vital information. IT and business personnel deploy Varonis software for a variety of use cases, including data governance, data security, archiving, file synchronization, enhanced mobile data accessibility and information collaboration. For more information, please visit www.varonis.com or view the Boston University Case Study.

Hosts

The Security Leaders Summits are hosted by information security and IT executives from across the area. The Summit Hosts serve as the face of the Summit and throughout the program they shared their insights during presentations, interview sessions, and our executive peer-to-peer discussions. Hosts included:

 

Scott Barronton
Chief Information Security Officer
D+H
Read Bio

Lael Bellamy
Chief Privacy Officer
The Weather Company
Read Bio

Sam Bruce
Chief Information Security Officer
Medac
Read Bio

Paul Cornwell
Cyber Security Advisor
Delta Air Lines, Inc.
Read Bio

Jamey Cummings
Senior Client Partner, Co-Leader Global Cybersecurity Practice
Korn Ferry
Read Bio

Katherine Fithen
Chief Privacy Officer
The Coca- Cola Company
Read Bio

Ray Griffin
Global Security Director
Equifax
Read Bio

Marian Reed
Sr. Director of Information Security and Risk Management
McKesson Corporation
Read Bio

Joshua Sorensen
Security Advisor
Delta Air Lines, Inc.
Read Bio

Deena Swatzie
IT Security & Compliance Risk Steward
SunTrust Bank
Read Bio

Dr. Todd Watson
Information Security Officer
Board of Regents of the University System of Georgia
Read Bio

Tuesday, October 18th, 2016

Time Description
7:15am – 8:30am Breakfast and Networking in the Sponsor Pavilion Windsor D &E
8:30am – 8:50am Welcome and Opening Remarks Windsor C
8:50am – 9:30am Morning Keynote –
“Managing Your Career in a Dynamic Market”

Jamey Cummings
Senior Client Partner, Co-Leader Global Cybersecurity Center
Korn Ferry
Read Bio


Jamey Cummings, Senior Client Partner Co-Leader at Korn Ferry’s Cybersecurity Center of Expertise, will share insights into the latest in compensation for information security executives, trends on emerging roles, what sets apart the top tier from the rest and how best to effectively manage one’s career.
Korn Ferry is an organizational and people advisory firm and the world’s largest provider of executive search.

Windsor C
9:30am – 10:10am Insights & Interviews – “Conversations with Execs in the Corner Office”

Lael Bellamy
Chief Privacy Officer
The Weather Company
Read Bio

Katherine Fithen
Chief Privacy Officer
The Coca-Cola Company
Read Bio

The business challenges and the dynamics of change are forcing security and privacy leaders to rethink their roles and what success means to their organizations and to their businesses. As the leadership role of security organizations continue to evolve at a rapid pace with expanded responsibilities, the value delivered by these organizations is becoming increasingly critical to the success of the enterprise. Successful leaders are taking the long view of their role as they develop strategies to help enable their businesses to move quicker, positively impact the bottom, and ensure the protection of its assets, customers, and their brands.
In this interview session, Lael Bellamy, Chief Privacy Officer at the Weather Company and Katherine Fithen, Chief Privacy Officer from The Coca-Cola Company, will discuss how they plan to deliver increasing value to their organizations, what it will take to get there, and what they expect to accomplish

Windsor C
10:10am – 10:30am “Securing Rogue File Sharing – Your Most Vulnerable Data Leak Threat Vector”

Cheryl D’Asti
Regional Sales Manager
Accellion, Gold Sponsor
Read Bio


Insecure and unmanaged file sharing has proven to be one of the largest sources of data leaks. Yet, your employees have a genuine need for securely sharing documents with team members, partners, customers, suppliers, and other external parties. How do you enable the business to maintain speed and agility while providing the protection it needs and also meeting compliance requirements?
This presentation will discuss key best practices for secure file sharing including:
• The latest advancements in secure file sharing and collaboration
• Best practices for providing security without compromising productivity
• How to leverage investments in existing content systems

Windsor C
10:30am – 11:10am Break in the Sponsor Pavilion Windsor D &E
11:10am – 11:50am “Game Changers – A Focus on Innovation”

Scott Barronton
Chief Information
Security Officer

D+H
Read Bio

Paul Cornwell
Cyber Security Advisor
Delta Air Lines, Inc.
Read Bio

In this session, Scott Barronton, Chief Information Security Officer at D+H, and Paul Cornwell, Cyber Security Advisor at Delta Air Lines, will discuss what they are doing to drive innovation at their organizations to help move their businesses forward and how they are approaching building an innovative culture to execute on their vision.
With annual revenues in excess of $1.5 billion and more than 5,500 employees worldwide, D+H is a leading financial technology provider of global payments, lending and financial solutions.

Windsor C
11:50am – 12:10pm “The Criticality of Email Security”

Alex Chiu
Senior Pre-Sales Systems Engineer
Zix Corp. – Gold Sponsor
Read Bio


The increase in data breaches and the rise in external threats has reminded us of the importance of securing emails. Organizations need to be confident that the millions of emails leaving their network each day are protected where necessary, whether sent from a desktop or from a mobile device. Implementing secure email solutions should increase productivity and mitigate risk without creating employee frustration.
Join security experts from Zix for a discussion on solutions to solve your most pressing secure email challenges.

Windsor C
12:10pm – 1:25pm Lunch in the Sponsor Pavilion Windsor D &E
1:25pm – 1:55pm “The Talent Shortage – Steps Leaders are Taking”

With the extreme shortage of information security professionals in the marketplace – creativity, innovation and developing new strategies for hiring and retention are top of mind for senior leaders. In this session, executives will discuss what they are doing differently, the successes they are seeing, and what they expect the future to hold as they build their organizations.

Windsor C
1:55pm – 2:15pm “How I Met your Data – A Case from the X-FILES”

Wesley Rhodes
Chief Technology Officer, Security Architecture Specialist, & Industry Advisor
IBM, Gold Sponsor
Read Bio


Why Security Intelligence? From a recent case, learn firsthand the sophistication of the attack purposed to thwart normal countermeasures and live inside your enterprise undetected for years. This is what you are up against and why you need Cognitive Security Solutions.

Windsor C
2:15pm – 3:05pm

Executive Roundtable Discussions – Rotation #1

Breakout sessions with your peers on topics determined by attendees during registration. Attendees have the opportunity to participate in two roundtable discussions during the afternoon.

Topic #1:
Creating a High-Performing Information Risk Management Program

Ray Griffin
Global Security Director
Equifax
Read Bio

Topic #2:
Malware – The Challenge Continues

Joshua Sorenson
Security Advisor
Delta Air Lines, Inc.
Read Bio

Topic #3:
Security Awareness Training and Internal Threats – Where Impact Occurs

Dr. Todd Watson
Information Security Officer
Board of Regents of the University System of Georgia
Read Bio

Topic #4:
In Front of the Breach: Preparation & Action

Sam Bruce
Chief Information Security Officer
Medac
Read Bio

Topic #5:
Next Generation Security Analytics & Threat Intelligence

Marian Reed
Director of Information Security and Risk Management
McKesson Corporation
Read Bio

Topic #6:
Information Security & the Business:
Changing the Conversation

Deena Swatzie
IT Security &
Compliance Risk Steward

SunTrust Bank
Read Bio

 Windsor C
3:05pm – 3:30pm Break in the Sponsor Pavilion Windsor D&E
3:30pm – 4:30pm Executive Roundtable Discussions Rotation #2 with Debriefs Windsor C
4:30pm – 4:45pm Closing Remarks Windsor C
4:45pm – 5:45pm Reception Windsor D &E

Venue

InterContinentalHotel-Buckhead-exteriorThe InterContinental Buckhead defines comfort and elegance.

Located in the city’s most prestigious neighborhood, InterContinental Buckhead Atlanta offers an upscale urban retreat within easy reach of attractions and adventures. Our luxury hotel is only 7 miles to downtown Atlanta and easily accessible to leading business and tourist destinations. Enjoy shopping, dining, entertainment and top city attractions only steps from our highly desirable location, including Lenox Square, Phipps Plaza, the Georgia Aquarium, the CNN Studio Tour, the World of Coca-Cola, the Atlanta Symphony Orchestra and sporting events at the Georgia Dome, Philips Arena and Turner Field.

Renowned as an Atlanta social hub with exquisite dining, beautiful ballrooms and the most luxurious hotel accommodations in the city, The InterContinental, Buckhead features:

  • 433 elegantly appointed guest rooms, including 21 suites featuring bay window views of the city’s skyline
  • More than 31,000 square feet of function and meeting space
  • Convenient access to prestigious Buckhead shopping, cultural attractions and more
  • Close proximity to MARTA mass transit (Take North Line, Exit Buckhead Station, N7)

Amenities

InterContinentalHotel-Buckhead-poolThe hotel has a spa, fitness center, indoor saline pool, dry cleaning and laundry services, business center, valet and self-parking, onsite restaurants, and 24 hour in-room dining.

Room Rate and How To Book

InterContinentalHotel-Buckhead-room

We have negotiated a special rate at the InterContinental Buckhead for Summit attendees of $199.00 night (regular rates begin at $309/night). The room block is limited so reserve early. The deadline for the discount is 9/27/16.

To make your reservations my phone please call 404-946-9000, ask for Reservations, and ask for the Security Leaders Special rate..

To reserve online, visit: http://www.ihg.com/intercontinental/hotels/gb/en/atlanta/atlbh/hoteldetail

Parking

Valet parking at the hotel is available at a special day rate of $18.
Self Parking is available in their garage at $10 per day.

Directions

InterContinental, Buckhead Atlanta
3315 Peachtree Rd. Ne, Atlanta, Georgia, 30326
Phone: (404) 946-9000
http://www.ihg.com/intercontinental/hotels/gb/en/atlanta/atlbh/hoteldetail

Directions From Hartsfield-Jackson International Airport (Domestic Terminal)

Take I-85 North
Once past Downtown Atlanta, follow I-85 N (left lanes) for 2.7 miles.
At exit #87, veer slight right onto GA-400 N (following signs for Buckhead/Cumming).
Take exit #2, Lenox Rd/Buckhead.
Turn left onto Lenox Rd NE, 0.4 miles.
Turn left onto Piedmont Rd. NE, 0.4 miles.
Turn left onto Peachtree Rd. NE, 0.2 miles.
InterContinental Buckhead Atlanta will be on the right.

Directions From Chattanooga, Tennessee

Head southeast on I-75.
Take exit #251 (left lanes) and merge onto I-85 N, 2.6 mi.
At exit #87, veer slight right onto GA-400 N (following signs for Buckhead/Cumming), 2.5 mi.
Take exit #2, Lenox Rd/Buckhead.
Turn left onto Lenox Rd NE, 0.4 mi.
Turn left onto Piedmont Rd NE, 0.4 mi.
Turn left onto Peachtree Rd NE, 0.2 mi.
InterContinental Buckhead Atlanta will be on the right.

Directions From Birmingham, Alabama

Head east on I-20.
Take exit #57 towards I-75 N/I-85 N, 3.3 mi.
Once past downtown Atlanta, follow I-85 N (left lanes), 2.7 mi.
At exit #87, veer slight right onto GA-400 N (following signs for Buckhead/Cumming).
Take exit #2, Lenox Rd/Buckhead.
Turn left onto Lenox Rd NE, 0.4 mi.
Turn left onto Piedmont Rd NE, 0.4 mi.
Turn left onto Peachtree Rd NE, 0.2 mi.
InterContinental Buckhead Atlanta will be on the right.

Directions From Greenville, South Carolina

Head southwest on I-85.
Take exit #88, Lenox Rd toward GA-400 N/Cheshire Bridge Rd.
Turn right onto Lenox Rd, 0.1 mi.
Turn left onto Spring/Buford Hwy Connector, 0.1 mi.
Veer right onto Sidney Marcus Blvd NE, 0.2 mi.
Turn right and enter GA-400 N, 1.8 mi.
Take exit #2, Lenox Rd/Buckhead.
Turn left onto Lenox Rd NE, 0.4 mi.
Turn left onto Piedmont Rd NE, 0.4 mi.
Turn left onto Peachtree Rd NE, 0.2 mi.
InterContinental Buckhead Atlanta will be on the right.

“The best way for vendors to reach me is not through email or phone calls. Instead, be where I am such as the Executive Alliance programs. At programs like this, I am engaged and open to discussions.”
Tim Searcy, CISO of Protective Life Corporation

If you are interested in sponsoring our Summits, Symposium, or Custom Dinner Programs, please call Executive Alliance at 678-445-1919 or email us at info@execalliance.com.

Gold Sponsors

spo-accellionAbout Accellion

Accellion provides the leading mobile content platform that increases enterprise productivity and ensures data security and compliance. As the foremost provider of private cloud solutions for secure mobile content management, Accellion offers enterprise organizations the scalability, flexibility, control and security to enable a mobile workforce with the tools they need to create, access and share information securely, wherever work takes them. More than 12 million business users and 2,000 of the world’s leading corporations and government agencies use Accellion solutions to increase business productivity, protect intellectual property, ensure compliance and reduce IT costs. For more information, please visit www.accellion.com.

spo_ibmAbout IBM

IBM is a globally integrated technology and consulting company headquartered in Armonk, New York. With operations in more than 170 countries, IBM attracts and retains some of the world’s most talented people to help solve problems and provide an edge for businesses, governments and non-profits. Innovation is at the core of IBM’s strategy. The company develops and sells software and systems hardware and a broad range of infrastructure, cloud and consulting services. Today, IBM is focused on four growth initiatives – business analytics, cloud computing, growth markets and Smarter Planet. IBMers are working with customers around the world to apply the company’s business consulting, technology and R&D expertise to build systems that enable dynamic and efficient organizations, better transportation, safer food, cleaner water and healthier populations. For more information, please visit www.ibm.com/us-en/.

ZixCorp-logoAbout ZixCorp

ZixCorp is a leader in email data protection. ZixCorp offers industry-leading email encryption, a unique email DLP solution and an innovative email BYOD solution to meet your company’s data protection and compliance needs. ZixCorp is trusted by the nation’s most influential institutions in healthcare, finance and government for easy to use secure email solutions. ZixCorp is publicly traded on the Nasdaq Global Market under the symbol ZIXI, and its headquarters are in Dallas, Texas. For more information, please visit www.zixcorp.com.

Bronze Sponsors

spo-securityInnovationAbout Alert Logic

Alert Logic, the leader in security and compliance solutions for the cloud, provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Fully managed by a team of experts, the Alert Logic Security-as-a-Service solution provides network, system and web application protection immediately, wherever your IT infrastructure resides. Alert Logic partners with the leading cloud platforms and hosting providers to protect over 3,000 organizations worldwide. Built for cloud scale, our patented platform stores petabytes of data, analyzes over 450 million events and identifies over 60,000 security incidents each month, which are managed by our 24×7 Security Operations Center. Alert Logic, founded in 2002, is headquartered in Houston, Texas, with offices in Seattle, Dallas, Cardiff, Belfast and London. For more information, please visit www.alertlogic.com.

About BeyondTrust

BeyondTrust is a global cyber security company that believes preventing data breaches requires the right visibility to enable control over internal and external risks. We give you the visibility to confidently reduce risks and the control to take proactive, informed action against data breach threats. And because threats can come from anywhere, we built a platform that unifies the most effective technologies for addressing both internal and external risk: Privileged Account Management and Vulnerability Management. Our solutions grow with your needs, making sure you maintain control no matter where your company goes. BeyondTrust’s security solutions are trusted by over 4,000 customers worldwide, including half of the Fortune 100. To learn more about BeyondTrust, please visit www.beyondtrust.com.

spo-cloudpassageAbout CloudPassage

CloudPassage Halo® is the world’s leading agile security platform that empowers our customers to take full advantage of cloud infrastructure with the confidence that their critical business assets are protected. Halo delivers a comprehensive set of continuous security and compliance functions right where it counts — at the workload. Our platform orchestrates security on-demand, at any scale and works in any cloud or virtual infrastructure (private, public, hybrid or virtual data center). For more information, please visit www.cloudpassage.com.

spo-ForcpointAbout Forcepoint

Forcepoint safeguards users, data and networks against the most determined adversaries, from accidental or malicious insider threats to outside attackers, across the entire threat lifecycle. Forcepoint protects data everywhere – in the cloud, on the road, in the office – simplifying compliance and enabling better decision-making and more efficient remediation. Forcepoint empowers organizations to concentrate on what’s most important to them while automating routine security tasks. More than 22,000 organizations around the world rely on Forcepoint. Based in Austin, Texas, with worldwide sales, service, security laboratories and product development, Forcepoint is a joint venture of the Raytheon Company and Vista Equity Partners. For more information, please visit www.forcepoint.com.

About Security Innovation

Security Innovation focuses on the most difficult IT Security problem, and the root cause of most data breaches — insecure software applications. For more than a decade, we’ve helped organizations build internal expertise, uncover critical vulnerabilities, and improve the process by which applications are built. The company’s solutions are based on the three pillars of a secure Software Development Lifecycle (SDLC), which feed into one another to create an ecosystem of repeatable, secure software development: Standards, Education, and Assessment. Our flagship products include TeamProfessor, the industry’s largest library of application security eLearning courses, and TeamMentor, “out of the box” secure development standards. For more information, please visit www.securityinnovation.com.

spo-thales-esecurity.comAbout Thales e-Security

Thales e-Security is a leading global provider of trusted cryptographic solutions with a 40-year track record of protecting the world’s most sensitive applications and information. Thales solutions enhance privacy, trusted identities, and secure payments with certified, high performance encryption and digital signature technology for customers in a wide range of markets including financial services, high technology, manufacturing, and government. Thales e-Security has a worldwide support capability, with regional headquarters in the United States, United Kingdom, and Hong Kong. Visit www.thales-esecurity.com.

spo-varonis.comAbout Varonis

Varonis is the leading provider of software solutions for unstructured, human-generated enterprise data. Varonis provides an innovative software platform that allows enterprises to map, analyze, manage and migrate their unstructured data. Varonis specializes in human-generated data, a type of unstructured data that includes an enterprise’s spreadsheets, word processing documents, presentations, audio files, video files, emails, text messages and any other data created by employees. This data often contains an enterprise’s financial information, product plans, strategic initiatives, intellectual property and numerous other forms of vital information. IT and business personnel deploy Varonis software for a variety of use cases, including data governance, data security, archiving, file synchronization, enhanced mobile data accessibility and information collaboration. For more information, please visit https://www.varonis.com.

Summit Sponsors

Gold Sponsors

Bronze Sponsors

OTHER PAST PROGRAMS

Guest Feedback

The past two New York Summits have led to 15 follow-up meetings and helped to make our New York rep the top sales rep in...

Ed Adams, Chief Executive Officer, Security Innovation
VIEW MORE GUEST FEEDBACK IT Security Leaders

I was honored to participate in this Summit. I thought the candid discussions with senior security professionals was refreshing and informative.”...

Eric Yancy, Information Security Officer, GetThere
VIEW MORE GUEST FEEDBACK IT Security Leaders

Best one-on-one with both peers and solution providers. Also, perfect for one day of packed content....

Kevin McMahon, Sr. VP & Chief Compliance Officer, Calpine Corporation
VIEW MORE GUEST FEEDBACK IT Security Leaders

Excellent information sharing and networking....

Gary Toretti, Chief Information Security Officer, Sabre Corporation
VIEW MORE GUEST FEEDBACK IT Security Leaders

The EA Summits provide me with the opportunity to speak with peers that I can trust....

Scot Miller, VP & Chief Information Security Officer, HMS Healthcare
VIEW MORE GUEST FEEDBACK IT Security Leaders