The Security Leaders Summit

Where Industry Leaders Meet to Shape the Future
  • Home
  • /
  • Security Leaders Summit

The Security Leaders Summit Chicago was held on Wednesday, May 18, 2016 at the InterContinental Chicago Magnificent Mile. The Summit brought together a community of senior IT executives for engaging peer-level interaction, discussions on new approaches to managing complexities in Information Security, and provided opportunities to collaborate with leaders in the industry. Throughout the day, the Summit Hosts, representing companies across a diversity of industries and sizes, shared their insights and knowledge with the distinguished group of attendees through their presentations, interviews and breakout roundtable discussions.

Summit Recap

Morning Keynote, Karan Saberwal, Director of Cybersecurity, Assessments, Risk & Compliance at Discover Financial Services, kicked off the Summit with his perspectives on the state of the industry and cyber security trends. Conducting his own survey with security executives across the country, Karan highlighted some of the areas that the industry is not doing well such as simplifying security: Password and Usability, Risk Management: Liability and risk-of-breach exceed affordability, Planning: Continuously failing to justify investments and Execution: Budgeting, Resource Allocation, and Skilled Staff. Karan also highlighted from a risk perspective to most companies, cyber incidences (cybercrime, breaches and IT failures), now ranks as #3 behind business interruption and market volatility. He wrapped up his keynote with insights on future challenges for the industry, including: IoT will be bigger than the user threat, New Technologies, Shortage of qualified skills in security and External Threat Sophistication. If you attended the program and interested in speaking further with Karan about his presentation, please send an email to info@execalliance.com and we will get you connected.


In the executive briefing, “Speed Of Business Is Breaking Security – Automate Or Die,” Steve Opfer, Enterprise Sales Director at CloudPassage, Silver Sponsor, provided insight into how today’s rapid delivery of IT is upsetting the ability of security organizations to maintain and extend their controls into the modern infrastructure. This briefing focused on solution approaches to the key challenges around visibility, threat isolation, compliance and automation.


In the interview session, “Conversations with Execs in the Corner Office,” Aman Raheja, U.S. Chief Information Security Officer at BMO Financial Group, spoke on how he plans to deliver increasing value to his organization, what it will take to get there, and what he expects to accomplish. Aman shared insights into the talent shortage, security awareness among employees, and ensuring his organization is in synch with the business.


In the presentation, “The Industry Need for Cloud Generation Security, Brian Kenyon, Senior Vice President & Chief Strategy Officer at Blue Coat Systems, Platinum Sponsor, shared insights into challenges dealing with the infrastructure used by attackers to gain information and the rise of encrypted traffic, which is now considered common ground for both the good and the bad guys. For ensuring safe passage of data to the cloud, Brian highlighted the need to ensure control over the evolving network and protection of next-generation endpoints through device agnostic protection. Download the Presentation


Attendees had the opportunity for a little networking time during the morning break.


Getting high marks on attendee surveys, Mark Peters, Director, Automotive Business at Security Innovation, presented on the impending advancements in the connected car. He reviewed security concerns, the immense challenges in developing the massive systems, protecting data from being hacked, and the never ending privacy concerns. Mark brought to light key examples of the challenges…an S-Class Mercedes Benz, contains 100 million lines of code, accounting for 50% of the development price of the vehicle, versus only 7+ million lines of code on the 787 Dreamliner.


In the session, “Securing Rogue File Sharing – Your Most Vulnerable Data Leak Threat Vector,” Brian Winter, Regional Sales Manager at Accellion, Gold Sponsor, discussed best practices for secure file sharing. Brian shared insights into the latest advancements in secure file sharing and collaboration, best practices for providing security without compromising productivity and how to leverage investments in existing content systems.


In the interactive discussion “Game Changers – Driving Innovation,” security executives discussed new technologies they will need for the future and how security awareness programs will need to evolve to engage employees.


Neil Farquharson, Technology Evangelist for ZixCorp, Gold Sponsor presented on “Email Security.” Neil shared insights into the latest and challenges they are seeing and how organizations are solving their most pressing secure email challenges.


Guests enjoyed a relaxing lunch and continued the conversations that were started during the morning sessions.


After lunch, Natasha Taymourian, Consulting Systems Engineer with OpenDNS, now a part of Cisco, Silver Sponsor provided an executive briefing on “Security Beyond the Firewall.” Natasha discussed the need for a predictive security intelligence program in order that CISOs can prevent, contain and be informed of targeted attacks. She also shared insights into identifying adversarial patterns once they’ve entered the network and how security approaches can leverage data to prevent attacks before they happen.

The Executive Roundtables received excellent feedback from the Summit attendees, including “valuable peer-to-peer discussions,” and “great way to round out the afternoon.” The roundtables were facilitated by Stan Thompson, Senior Director, Risk & Control with Experian, Adam Page, CISO & Director of Application Services with NorthShore University HealthSystem, Kevin Wixted, Director, Information Security with DLA Piper, Shaoping Zhou, Information Security Officer with Topco Associates, and Joe Gaczewski, Information Security Program Manager, with William Blair & Company.


Brian Henger, Regional Vice President of Malwarebytes, Gold Sponsor, presented on “Psychological Warfare: How Cyber Criminals Mess With People’s Minds.” Brian shared insights into how cyber criminals are now investing more time and resources in advertising and psychology than technologies to gain access to data, the underlying social engineering tactics to gain access and solutions to consider to protect against these tactics.

In the Afternoon Keynote, Jamey Cummings, Senior Client Partner, Co-Leader Global Cybersecurity Practice at Korn Ferry, spoke on “Managing Your Career in a Dynamic Market.” Jamey shared insights into the landscape driving the demand for talent, the three types of Information Security/Technology Risk Executives emerging, key success factors for security leaders, and compensation ranges in the marketplace. In closing, Jamey highlighted the importance of 1) executives building their own brand, 2) investing in your own development and career progression plan, and 3) demonstrating strong leadership – building teams and developing top talent. If you would like to find out further information, please contact Jamey at Jamey.Cummings@kornferry.com


During the afternoon reception, attendees and Summit sponsors had the opportunity to unwind, keep the conversations going and have fun with the prize drawings.

Be sure to visit the photo gallery.

Platinum Sponsor

Blue Coat Systems

Blue Coat empowers enterprises to safely and securely choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets. Blue Coat has a long history of protecting organizations, their data and their employees and is the trusted brand to 15,000 customers worldwide, including 86 percent of the FORTUNE Global 500. With a robust portfolio of intellectual property anchored by more than 200 patents and patents pending, the company continues to drive innovations that assure business continuity, agility and governance. For additional information, please visit:

• A new study from ESG describing the growth of encryption and strategies for protection. Read the report, “Network Encryption and its Impact on Network Security” to get the facts and figures about the nature of the threat and the actions you can take now to deepen your defenses.
• Or visit www.bluecoat.com.

Gold Sponsors

Accellion

Accellion, Inc. provides secure access to enterprise content wherever it is stored to enable increased enterprise productivity and ensure data security and compliance. Accellion, Inc. is the leading provider of private cloud solutions offering enterprise organizations the scalability, flexibility, control and security to enable a global workforce with the tools they need to securely create, access and share information, wherever work takes them. Accellion solutions are used by more than 12 million users and 2,000 of the world’s leading corporations and government agencies including Procter & Gamble; Indiana University Health; Kaiser Permanente; Hogan Lovells; Bridgestone; Harvard University; US Securities and Exchange Commission; and NASA. For more information, please visit www.accellion.com or call 650-485-4300.

Additional Resources:
kiteworks Security Overview Whitepaper
kiteworks End User Demo

Malwarebytes

Malwarebytes protects businesses against malicious threats that escape detection by traditional antivirus solutions. Malwarebytes Anti-Malware, the company’s flagship product, has a highly advanced heuristic detection engine that has removed more than five billion malicious threats from computers worldwide. SMBs and enterprise businesses worldwide trust Malwarebytes to protect their data. Founded in 2008, the company is headquartered in California with offices in Europe, and a global team of researchers and experts. For more information, please visit www.malwarebytes.com/business.

Download a copy of the Malwarebytes Research Brief: Operation Fingerprint to get a look into several Angler Exploit Kit malvertising campaigns.

ZixCorp

ZixCorp is a leader in email data protection. ZixCorp offers industry-leading email encryption, a unique email DLP solution and an innovative email BYOD solution to meet your company’s data protection and compliance needs. ZixCorp is trusted by the nation’s most influential institutions in healthcare, finance and government for easy to use secure email solutions. ZixCorp is publicly traded on the Nasdaq Global Market under the symbol ZIXI, and its headquarters are in Dallas, Texas. For more information, please visit www.zixcorp.com or contact Steve Irons, VP of Sales, 781-993-6023.

Ebook: The Risks of Email and the Rewards of Innovative Encryption

Silver Sponsors

CloudPassage

CloudPassage Halo® is the world’s leading agile security platform that empowers our customers to take full advantage of cloud infrastructure with the confidence that their critical business assets are protected. Halo delivers a comprehensive set of continuous security and compliance functions right where it counts — at the workload. Our platform orchestrates security on-demand, at any scale and works in any cloud or virtual infrastructure (private, public, hybrid or virtual data center). For more information, please visit www.cloudpassage.com or contact Steve Opfer, Sales Director.

OpenDNS

OpenDNS is a leading provider of network security and DNS services, enabling the world to connect to the Internet with confidence on any device, anywhere, anytime. The Umbrella cloud-delivered network security service blocks advanced attacks, as well as malware, botnets and phishing threats regardless of port, protocol or application. Its predictive intelligence uses machine learning to automate protection against emergent threats before they can reach customers. OpenDNS protects all devices globally without hardware to install or software to maintain. For more information, please contact Britt Allen, 630-637-1613 or visit www.opendns.com.

Whitepaper available: Automated Protection Against Advanced Attacks

Bronze Sponsors

Alert Logic
Alert Logic, the leader in security and compliance solutions for the cloud, provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Fully managed by a team of experts, the Alert Logic Security-as-a-Service solution provides network, system and web application protection immediately, wherever your IT infrastructure resides. Alert Logic partners with the leading cloud platforms and hosting providers to protect over 3,000 organizations worldwide. Built for cloud scale, our patented platform stores petabytes of data, analyzes over 450 million events and identifies over 60,000 security incidents each month, which are managed by our 24×7 Security Operations Center. Alert Logic, founded in 2002, is headquartered in Houston, Texas, with offices in Seattle, Dallas, Cardiff, Belfast and London. For more information, please visit www.alertlogic.com or contact Adam Walsh, Territory Sales Manager.

BeyondTrust

BeyondTrust is a global cyber security company that believes preventing data breaches requires the right visibility to enable control over internal and external risks. We give you the visibility to confidently reduce risks and the control to take proactive, informed action against data breach threats. And because threats can come from anywhere, we built a platform that unifies the most effective technologies for addressing both internal and external risk: Privileged Account Management and Vulnerability Management. Our solutions grow with your needs, making sure you maintain control no matter where your company goes. BeyondTrust’s security solutions are trusted by over 4,000 customers worldwide, including half of the Fortune 100. To learn more about BeyondTrust, please visit www.beyondtrust.com or contact Jarrett Benavidez.

Forcepoint

Forcepoint safeguards users, data and networks against the most determined adversaries, from accidental or malicious insider threats to outside attackers, across the entire threat lifecycle. Forcepoint protects data everywhere – in the cloud, on the road, in the office – simplifying compliance and enabling better decision-making and more efficient remediation. Forcepoint empowers organizations to concentrate on what’s most important to them while automating routine security tasks. More than 22,000 organizations around the world rely on Forcepoint. Based in Austin, Texas, with worldwide sales, service, security laboratories and product development, Forcepoint is a joint venture of the Raytheon Company and Vista Equity Partners. For more information, please visit www.forcepoint.com or contact Patrick Curley or Philip Sullivan.

Whitepaper available: Forcepoint 2016 Global Threat Report

Security Innovation

Security Innovation focuses on the most difficult IT Security problem, and the root cause of most data breaches — insecure software applications. For more than a decade, we’ve helped organizations build internal expertise, uncover critical vulnerabilities, and improve the process by which applications are built. The company’s solutions are based on the three pillars of a secure Software Development Lifecycle (SDLC), which feed into one another to create an ecosystem of repeatable, secure software development: Standards, Education, and Assessment. Our flagship products include TeamProfessor, the industry’s largest library of application security eLearning courses, and TeamMentor, “out of the box” secure development standards. For more information, please contact Rick Filippo or visit www.securityinnovation.com.

Wombat Security Technologies

Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. Their SaaS cyber security education solution includes a platform of integrated broad assessments, and a library of simulated attacks and brief interactive training modules, to reduce employee susceptibility to attack, even phishing attacks, over 80%. For more information, please visit www.wombatsecurity.com or contact Greg Stewart or Mitch Sheffler.

Hosts

The Security Leaders Summits are hosted by information security and IT executives from across the area. The Summit Hosts served as the face of the Summit and throughout the program they shared their insights during presentations, interview sessions, and our executive peer-to-peer discussions. Hosts included:

Jamey Cummings
Senior Client Partner, Co-Leader Global Cybersecurity Practice
Korn Ferry
Read Bio

Joe Gaczewski
Information Security Program Manager
William Blair & Company

Adam Page
Chief Information Security Officer & Director of Application Services
NorthShore University HealthSystem
Read Bio

Aman Raheja
U.S. Chief Information Security Officer
BMO Financial Group
Read Bio

Karan Saberwal
Director of Cybersecurity, Assessments, Risk & Compliance
Discover Financial Services
Read Bio

Stan Thompson
Senior Director, Risk & Control
Experian

Kevin Wixted
Director, Information Security
DLA Piper

Shaoping Zhou
Information Security Officer
Topco Associates LLC
Read Bio

Held on Wednesday, May 18, 2016

Time Description
7:15am – 8:30am Breakfast and Networking in the Sponsor Pavilion Streeterville Room
8:30am – 8:50am

Welcome and Opening Remarks

Mary Lou Heastings, CEO, Executive Alliance, Inc.
Richard Warner, Summit Emcee

Avenue Ballroom
8:50am – 9:20am

Morning Keynote– “State of the Industry”

Karan Saberwal
Director of Cybersecurity, Assessments, Risk & Compliance
Discover Financial Services
Read Bio

Karan Saberwal, Director of Cybersecurity, Assessments, Risk & Compliance at Discover Financial Services, will kick off the Summit sharing his perspective and insights into the state of the information security industry, the challenges the industry is facing, where expectations are for success, and discussions being held with senior management and Boards. Karan will discuss what information security organizations are working on in terms of evolving security strategies, performance analytics & risk indicators in order to support compliance and regulations, and the business for today and in the future.

With over $6 billion in revenue, Discover Financial Services, Inc. is an American financial services company, which issues the Discover Card and operates the Discover and Pulse networks. Discover Card is the third largest credit card brand in the United States, with nearly 50 million cardholders.

Avenue Ballroom
9:20am – 9:30am

“Speed Of Business Is Breaking Security – Automate Or Die”

Steve Opfer
Enterprise Sales Director
CloudPassage, Silver Sponsor
Read Bio

Today’s business requirements for speed and agility are rapidly transforming delivery of IT. This change is upsetting the ability of security organizations to maintain and extend their controls into the modern infrastructure. A new approach is needed to deliver security in any application hosting environment, on demand and at any scale. This presentation focuses on solution approaches to the key challenges around visibility, threat isolation, compliance and automation.

Avenue Ballroom
9:30am – 9:50am

Insights & Interviews – “Conversations with Execs in the Corner Office”

Aman Raheja
U.S. Chief Information Security Officer
BMO Financial Group
Read Bio

The business challenges and the dynamics of change are forcing security and privacy leaders to rethink their roles and what success means to their organizations and to their businesses. As the leadership role of security organizations continue to evolve at a rapid pace with expanded responsibilities, the value delivered by these organizations is becoming increasingly critical to the success of the enterprise. Successful leaders are taking the long view of their role as they develop strategies to help enable their businesses to move quicker, positively impact the bottom, and ensure the protection of its assets, customers, and their brands.

In this interview session, Aman Raheja, the U.S. Chief Information Security Officer for BMO Financial Group & Managing Director, Global Information & Technology Risk Management, along with other CISOs, will discuss how they plan to deliver increasing value to their organizations, what it will take to get there, and what they expect to accomplish.

Avenue Ballroom
9:50am – 10:20am

“The Industry Need for Cloud Generation Security”

Brian Kenyon
Senior Vice President & Chief Strategy Officer
Blue Coat Systems, Platinum Sponsor
Read Bio

The unprecedented power of cloud applications have opened up amazing new possibilities for IT organizations, lines-of-business, and users to empower work needs. Whether sanctioned or not, these cloud applications can have a dark side. The rapid pace of adoption has left most security and compliance teams behind. Users, devices and data are now interacting with a variety of new cloud services while entirely circumventing the control of the organization. This has introduced new risk factors for organizations already struggling under the duress of the traditional threat landscape. However, it doesn’t have to be this way; Cloud applications and services can be adopted rapidly and securely as Info Security teams proactively build in security for users, devices and data. Please join Blue Coat as we discuss these new challenges and provide practical advice on how these issues can be safely overcome.

Avenue Ballroom
10:20am – 11:00am Break and Networking in the Sponsor Pavilion Streeterville Room
11:00am – 11:30am

“Connected Cars – What Could Possibly Go Wrong?”

Mark Peters
Director, Automotive Business
Security Innovation
Read Bio

Vehicle-to-Vehicle (V2V) communications is achieved through wireless exchange of data between nearby vehicles. Both the US and EU have issued notices to car manufacturers – very soon all cars will carry V2V equipment and broadcast speed and location constantly. V2V enables vehicles to sense hazards, issue warnings, and if necessary stop the vehicle. The US Dept. of Transportation predicts V2V will prevent 76 percent of the crashes on the roadway, saving 10,000 lives per year. But with these benefits come serious concerns about safety and privacy. Will hackers be able to take control of your car? Will the government be able to track your vehicle movements?

This presentation will provide insight into these questions as well as the following topics:
• The challenges of developing such a massive system
• The risks of software and infotainment systems in cars
• Privacy concerns (the big brother and NSA worries)

Avenue Ballroom
11:30am – 11:50am

“Securing Rogue File Sharing – Your Most Vulnerable Data Leak Threat Vector”

Brian Winter
Regional Sales Manager
Accellion, Gold Sponsor
Read Bio

Insecure and unmanaged file sharing has proven to be one of the largest sources of data leaks. Yet, your employees have a genuine need for securely sharing documents with team members, partners, customers, suppliers, and other external parties. How do you enable the business to maintain speed and agility while providing the protection it needs and also meeting compliance requirements?

This presentation will discuss key best practices for secure file sharing including:
• The latest advancements in secure file sharing and collaboration
• Best practices for providing security without compromising productivity
• How to leverage investments in existing content systems

Avenue Ballroom
11:50am – 12:10am

“Game Changers – Driving Innovation”

In this interactive session, security executives will discuss what they are doing to drive innovation at their organizations to help move their businesses forward and how they are approaching building an innovative culture to execute on their vision.

Avenue Ballroom
12:10pm – 12:30pm

Executive Briefing – “Email Security”

Neil Farquharson
Technology Evangelist
ZixCorp, Gold Sponsor
Read Bio

The recent highly public breaches has reminded us of the increasing importance of securing emails. Organizations need to be confident that the millions of emails leaving their network each day are protected where necessary, whether sent from a desktop or from a mobile device. Implementing secure email solutions should increase productivity and mitigate risk without creating employee frustration.
Join Neil Farquharson at ZixCorp for a discussion on trends and challenges they are seeing, and how organization are solving their most pressing secure email challenges.

Avenue Ballroom
12:30pm – 1:40pm Lunch in the Sponsor Pavilion Streeterville Room
1:40pm – 1:50pm

“Security Beyond the Firewall”

Natasha Taymourian
Consulting Systems Engineer
OpenDNS, now a part of Cisco, Silver Sponsor
Read Bio

A decade ago, firewalls and antivirus software were enough to protect against infiltration, but today’s threats are stealthy and patient. Without a predictive security intelligence program, an organization lacks proactive defense and potentially compromises massive amounts of sensitive data. How can CISOs prevent, contain and inform on targeted attacks? How does a security team identify adversarial patterns once they’ve entered the network? We will lead a conversation on both old and new attack techniques, and how security approaches can leverage data to prevent attacks before they happen.

Avenue Ballroom
1:50pm – 3:00pm

Executive Roundtable Discussions with a Break and Debrief

Breakout sessions with your peers on topics determined by attendees during registration.

Topic 1: “In Front of the Breach: Preparation & Action”

Robert MimsStan Thompson
Senior Director, Risk & Control
Experian

read more

Topic 2: “Vulnerability Management – Dealing with Increasing Complexities”

Robert MimsAdam Page
Chief Information Security Officer & Director of Application Services
NorthShore University HealthSystem
Read Bio

read more

Topic 3: “Malware – The Challenge Continues”

Robert MimsKevin Wixted
Director, Information Security
DLA Piper

read more

Topic 4: “A Mobile Security Strategy – Changes for the Future”

Robert MimsShaoping Zhou
Information Security Officer
Topco Associates
Read Bio

read more

Topic 5: “Information Security & the Business: Changing the Conversation”

Robert MimsJoe Gaczewski
Information Security Program Manager
William Blair & Company

read more

Topic 6: “The Acceleration of Cloud Security”

read more

Avenue Ballroom
3:30pm – 3:50pm

“Psychological Warfare: How Cyber Criminals Mess With People’s Minds”

Brian Henger
Regional Vice President, Central US
Malwarebytes, Gold Sponsor
Read Bio

Today’s cyber-attacks might utilize the most complex threat technology to date but much of the threat lies outside of the code. When attackers utilize a technological attack combined with psychology, similar to what advertisers use, their spread and effectiveness increases greatly. While most of the security industry is focusing on assisting both consumers and the enterprise from a technical stance, employing new monitoring systems and patching security holes, at the end of the day, the ultimate target for cyber criminals are users. We’ll discuss current attacks used by cyber criminals that employ both the latest in threat tech and social engineering tactics; why cyber criminals have put more stock in advertising and psychology than innovations in tech; and what options exist to protect users from these threats.

Avenue Ballroom
3:50pm – 4:30pm

Afternoon Keynote – “Managing A CISO Career in a Dynamic Market”

Jamey Cummings
Senior Client Partner, Co-Leader Global Cybersecurity Practice
Korn Ferry
Read Bio

Afternoon Keynote, Jamey Cummings, Senior Client Partner in Korn Ferry’s Global Technology Practice and co-leader of the Firm’s Global Cybersecurity Practice will close the Summit on a high note as he shares his insights on the latest in compensation for information security executives, future trends, what sets apart the top tier from the rest and how best to effectively manage one’s career.

Korn Ferry is an organizational and people advisory firm and the world’s largest provider of executive search.

Avenue Ballroom
4:30pm – 4:45pm Closing Remarks Avenue Ballroom
4:45pm – 5:45pm Reception and Networking with Prize Drawings Streeterville Room Prefunction

Venue

InterContinental Chicago Magnificent Mile
505 N Michigan Ave, Chicago, IL 60611
(312) 944-4100

Historic Michigan Avenue Hotel
The InterContinental Chicago Magnificent Mile is one of the most beautiful historic hotels in Chicago. Originally built in 1929 as the Medinah Athletic Club, a luxury men’s club for members of the Shrine organization, the club fell victim to the stock-market crash and was forced to close its doors in 1934. InterContinental Hotels bought the property in 1988, and immediately began renovations. A quarter of a billion dollars and 12 years later, this truly magnificent hotel was re-introduced to Chicago.

When the InterContinental Chicago opened its doors, it was presented as a gift to the city. Since then it has been the recipient of numerous awards for its architecture and design. The hotel’s guests have included international dignitaries, politicians and Hollywood celebrities. The hotel prides itself both for its beautiful décor and for the impeccable service they provide to match it.

Guestrooms

Treat yourself to a premier luxury hotel designed to capture the essence of 1920’s Chicago style with a modern twist. The InterContinental Chicago Magnificent Mile features delightful details, right down to the draperies, carpets and stunning murals. Choose your accommodations from a luxurious variety of room types.

There is not a room block at the InterContinental during the summit dates, however, they are offering specials on their website. Currently, rates start at $309/night. Contact the hotel directly at 312-944-4100 or visit their website at www.icchicagohotel.com.

Additionally, there are numerous hotels in the area near the InterContinental Magnificent Mile for your stay. Many are within walking distance and below are a few options:
* Marriott, 312-836-0100, 2 blocks
* Embassy Suites, 312-836-5900, 2 blocks
* DoubleTree, 312-787-6100, 3 blocks
* Hilton Garden Inn, 312-595-0000, 3 blocks
* Sheraton Grand, 312-464-1000, 4 blocks
* Omni, 312-944-6664, 4 blocks
* Hyatt, 312-787-1234, 5 blocks

Amenities

The InterContinental Chicago Magnificent Mile is a place where old-world style meets modern convenience. Enjoy a relaxing and rejuvenating stay enhanced by exceptional service. Take a dip in our ornate hotel pool. Stay connected in our 24-hour business center. Grab a quick workout in our state-of-the-art fitness center spanning three levels. Book your next stay at our luxury hotel and delight in a host of amenities.

Spa and Health Club

Soothe mind, body and spirit with a visit to InterContinental Chicago’s spa and health club. Featuring two levels, three treatment rooms and a sauna in the men and women’s locker rooms, the hotel’s health club and spa offers guests the chance to nurture and refresh. Choose from reflexology treatments, the latest in aromatherapy or a sugar honey polish. Relax with a classic Swedish massage or Hot Stone massage. Let the dedicated spa professionals prepare your perfect day of replenishment.

Parking

  • Self-Parking – Not Available
  • Valet Parking – $23 Discounted Daytime ($67 standard)

Directions

InterContinental Chicago Magnificent Mile
505 N Michigan Ave, Chicago, IL 60611
View Larger Map

From Madison, Wisconsin, Chicago’s Northwest suburbs or O’Hare Airport

  • Follow 90 East into downtown Chicago. Take the Ohio Street exit, and follow Ohio Street 1 1/4 miles to Michigan Avenue. Turn right on Michigan, and proceed one block. Turn left at the next corner-Illinois Street. Proceed east on Illinois one block to the traffic circle. Follow the circle around to Michigan Avenue, and take a right. The doorman and valet parkers will be on Michigan Avenue to assist you.

From Chicago’s Western suburbs or Highway 290 East, The Eisenhower:

  • Follow 290 East into downtown Chicago, at which point 290 becomes Congress Parkway. Follow Congress approximately 1 1/2 miles to Michigan Avenue. Turn left on Michigan Avenue, and proceed one mile to the bridge over the Chicago River. After crossing the bridge, the hotel is the third building on the right-hand side. The doorman and valet parkers will be on Michigan Avenue to assist you.

From Michigan, Ohio, Indiana or Highway 57:

  • Guests arriving from Ohio and Michigan on 80 / 94, Indiana on 90 East or Southern Illinois on Highway 57 should follow all signs to 90 / 94 West. Once on 90 / 94 West, proceed into the downtown area and the Monroe Street East exit. Go 1 1/2 miles to Michigan Avenue. Turn left onto Michigan, and proceed half a mile to the bridge of the Chicago River. Cross the bridge, and proceed three buildings down on the right-hand side. Valet parkers and doormen will be on Michigan Avenue to assist with luggage and parking.

From Stevenson Expressway, Midway, Chicago’s Southwest suburbs or Lake Shore Drive North:

  • Travel east on I-55 and merge with Lake Shore Drive North. Take the third exit-Monroe Street-and follow it two blocks to Michigan Avenue. Turn right on Michigan, then proceed half a mile, and cross the bridge of the Chicago River. The hotel will be the third building after the bridge on the right-hand side. Pull up in front of the hotel on Michigan Avenue, where doormen and valet parkers are located.

From Chicago’s North Shore and Lake Shore Drive South:

  • From Lake Shore Drive, exit at Grand Avenue. Follow Grand three blocks to Columbus Drive. Turn left on Columbus, and proceed two blocks to the NBC Tower. Take a right turn into the NBC driveway, and follow it all the way to Michigan Avenue. Turn right on Michigan. Doormen and valet parkers will be on Michigan to assist you.

If you are interested in sponsoring our Summits, Symposium, or Custom Dinner Programs, please call Executive Alliance at 678-445-1919 or email us at info@execalliance.com.

Platinum Sponsor

spo_blueCoatAbout Blue Coat Systems

Blue Coat empowers enterprises to safely and securely choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets. Blue Coat has a long history of protecting organizations, their data and their employees and is the trusted brand to 15,000 customers worldwide, including 86 percent of the FORTUNE Global 500. With a robust portfolio of intellectual property anchored by more than 200 patents and patents pending, the company continues to drive innovations that assure business continuity, agility and governance. For more information, please visit www.bluecoat.com.

Gold Sponsors

spo-accellionAbout Accellion

Accellion provides the leading mobile content platform that increases enterprise productivity and ensures data security and compliance. As the foremost provider of private cloud solutions for secure mobile content management, Accellion offers enterprise organizations the scalability, flexibility, control and security to enable a mobile workforce with the tools they need to create, access and share information securely, wherever work takes them. More than 12 million business users and 2,000 of the world’s leading corporations and government agencies use Accellion solutions to increase business productivity, protect intellectual property, ensure compliance and reduce IT costs. For more information, please visit www.accellion.com.

About Malwarebytes

Malwarebytes protects businesses against malicious threats that escape detection by traditional antivirus solutions. Malwarebytes Anti-Malware, the company’s flagship product, has a highly advanced heuristic detection engine that has removed more than five billion malicious threats from computers worldwide. SMBs and enterprise businesses worldwide trust Malwarebytes to protect their data. Founded in 2008, the company is headquartered in California with offices in Europe, and a global team of researchers and experts. For more information, please visit www.malwarebytes.com/business

ZixCorp-logoAbout ZixCorp

ZixCorp is a leader in email data protection. ZixCorp offers industry-leading email encryption, a unique email DLP solution and an innovative email BYOD solution to meet your company’s data protection and compliance needs. ZixCorp is trusted by the nation’s most influential institutions in healthcare, finance and government for easy to use secure email solutions. ZixCorp is publicly traded on the Nasdaq Global Market under the symbol ZIXI, and its headquarters are in Dallas, Texas. For more information, please visit www.zixcorp.com.

Silver Sponsors

spo-cloudpassageAbout CloudPassage

CloudPassage Halo® is the world’s leading agile security platform that empowers our customers to take full advantage of cloud infrastructure with the confidence that their critical business assets are protected. Halo delivers a comprehensive set of continuous security and compliance functions right where it counts — at the workload. Our platform orchestrates security on-demand, at any scale and works in any cloud or virtual infrastructure (private, public, hybrid or virtual data center). For more information, please visit www.cloudpassage.com.

spo-proofPointAbout OpenDNS

OpenDNS is a leading provider of network security and DNS services, enabling the world to connect to the Internet with confidence on any device, anywhere, anytime. The Umbrella cloud-delivered network security service blocks advanced attacks, as well as malware, botnets and phishing threats regardless of port, protocol or application. Its predictive intelligence uses machine learning to automate protection against emergent threats before they can reach customers. OpenDNS protects all devices globally without hardware to install or software to maintain. For more information, please visit: www.opendns.com.

Bronze Sponsors

spo-securityInnovationAbout Alert Logic

Alert Logic, the leader in security and compliance solutions for the cloud, provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Fully managed by a team of experts, the Alert Logic Security-as-a-Service solution provides network, system and web application protection immediately, wherever your IT infrastructure resides. Alert Logic partners with the leading cloud platforms and hosting providers to protect over 3,000 organizations worldwide. Built for cloud scale, our patented platform stores petabytes of data, analyzes over 450 million events and identifies over 60,000 security incidents each month, which are managed by our 24×7 Security Operations Center. Alert Logic, founded in 2002, is headquartered in Houston, Texas, with offices in Seattle, Dallas, Cardiff, Belfast and London. For more information, please visit www.alertlogic.com.

About BeyondTrust

BeyondTrust is a global cyber security company that believes preventing data breaches requires the right visibility to enable control over internal and external risks. We give you the visibility to confidently reduce risks and the control to take proactive, informed action against data breach threats. And because threats can come from anywhere, we built a platform that unifies the most effective technologies for addressing both internal and external risk: Privileged Account Management and Vulnerability Management. Our solutions grow with your needs, making sure you maintain control no matter where your company goes. BeyondTrust’s security solutions are trusted by over 4,000 customers worldwide, including half of the Fortune 100. To learn more about BeyondTrust, please visit www.beyondtrust.com.

spo-ForcpointAbout Forcepoint

Forcepoint safeguards users, data and networks against the most determined adversaries, from accidental or malicious insider threats to outside attackers, across the entire threat lifecycle. Forcepoint protects data everywhere – in the cloud, on the road, in the office – simplifying compliance and enabling better decision-making and more efficient remediation. Forcepoint empowers organizations to concentrate on what’s most important to them while automating routine security tasks. More than 22,000 organizations around the world rely on Forcepoint. Based in Austin, Texas, with worldwide sales, service, security laboratories and product development, Forcepoint is a joint venture of the Raytheon Company and Vista Equity Partners. For more information, please visit www.forcepoint.com.

About Security Innovation

Security Innovation focuses on the most difficult IT Security problem, and the root cause of most data breaches — insecure software applications. For more than a decade, we’ve helped organizations build internal expertise, uncover critical vulnerabilities, and improve the process by which applications are built. The company’s solutions are based on the three pillars of a secure Software Development Lifecycle (SDLC), which feed into one another to create an ecosystem of repeatable, secure software development: Standards, Education, and Assessment. Our flagship products include TeamProfessor, the industry’s largest library of application security eLearning courses, and TeamMentor, “out of the box” secure development standards. For more information, please visit www.securityinnovation.com.

spo-securityInnovationAbout Wombat Security Technologies

Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. Their SaaS cyber security education solution includes a platform of integrated broad assessments, and a library of simulated attacks and brief interactive training modules, to reduce employee susceptibility to attack, even phishing attacks, over 80%. For more information, please visit www.wombatsecurity.com.

Summit Sponsors

Platinum Sponsor

Gold Sponsors

Silver Sponsors

Bronze Sponsors

OTHER PAST PROGRAMS

Guest Feedback

The past two New York Summits have led to 15 follow-up meetings and helped to make our New York rep the top sales rep in...

Ed Adams, Chief Executive Officer, Security Innovation
VIEW MORE GUEST FEEDBACK IT Security Leaders

I was honored to participate in this Summit. I thought the candid discussions with senior security professionals was refreshing and informative.”...

Eric Yancy, Information Security Officer, GetThere
VIEW MORE GUEST FEEDBACK IT Security Leaders

Best one-on-one with both peers and solution providers. Also, perfect for one day of packed content....

Kevin McMahon, Sr. VP & Chief Compliance Officer, Calpine Corporation
VIEW MORE GUEST FEEDBACK IT Security Leaders

Excellent information sharing and networking....

Gary Toretti, Chief Information Security Officer, Sabre Corporation
VIEW MORE GUEST FEEDBACK IT Security Leaders

The EA Summits provide me with the opportunity to speak with peers that I can trust....

Scot Miller, VP & Chief Information Security Officer, HMS Healthcare
VIEW MORE GUEST FEEDBACK IT Security Leaders