The Security Leaders Summit

Where Industry Leaders Meet to Shape the Future
  • Home
  • /
  • Security Leaders Summit

“I was honored to participate in the Dallas Security Leaders Summit. I thought the candid discussions with senior security professionals was refreshing and informative.” Eric Yancy, Information Security Officer, GetThere

The Security Leaders Summit Dallas was held on Wednesday, March 23, 2016 at the InterContinental Dallas. The Summit brought together a community of senior IT executives for engaging peer-level interaction, discussions on new approaches to managing complexities in Information Security, and provided opportunities to collaborate with leaders in the industry. Throughout the day, the Summit Hosts, representing companies across a diversity of industries and sizes, shared their insights and knowledge with the distinguished group of attendees through their presentations, interviews and breakout roundtable discussions.

Summit Recap


Sarath Geethakumar, Head of Security Architecture and Engineering at The Home Depot, kicked off the Dallas Summit with insights into the state of the information security industry and the challenges facing the industry. Sareth shared The Home Depot’s vision on where they need to take their organization to ensure their company brand is protected in the future, where they expect success, and how they expect to achieve their vision.


Sami Laine, Principal Technologist at CloudPassage, Silver Sponsor, provided an executive briefing on the “Speed Of Business Is Breaking Security – Automate Or Die.” During his briefing, Sami highlighted that a new approach is needed to deliver security in any application hosting environment, on demand and at any scale, due to the way today’s business requirements for speed and agility are rapidly transforming delivery of IT. His presentation focused on approaches to the key challenges around visibility, threat isolation, compliance and automation.


In the interview session, “Conversations with Execs in the Corner Office,” Paul Horn, CISO of HD Vest Financial Services, Gary Toretti, CISO and VP of Risk & Security at Sabre Corporation and Carol Weaver, VP of IT Security at GM Financial, discussed the critical challenges facing them today as leaders, how they are measuring success and their plans to deliver increasing value to their organizations, and what it will take to get there.


Brian Keynon, Senior Vice President & Chief Strategy Officer at Blue Coat Systems, Platinum Sponsor, provided insight into the unprecedented power that cloud applications have opened up. With the rapid pace of adoption of the cloud, many security and compliance teams are being left behind while users, devices and data are now interacting with a variety of new cloud services and entirely circumventing the control of the organization. Brian discussed these challenges and provided practical advice on how these issues can be safely overcome.


Attendees had the chance to catch up with each other during the morning break and continue the conversations.


After the morning break, the Summit kicked back into high gear with the interview session, “Game Changers.” During this session, Harvey Ewing, CISO at G6 Hospitality and Robert Pace, VP of Information Security and Compliance at First American Payment Systems, provided insight into what they are doing to drive innovation at their organizations to help move their businesses forward and how they are approaching building an innovative culture to execute on their vision.


Ed Adams, Chief Executive Officer & Ponemon Institute Fellow, Security Innovation, Platinum Sponsor received high marks on the survey responses with his presentation on “Connected Cars – What Possibly Could Go Wrong?” Ed spoke on the planned benefits of Vehicle-to-Vehicle (V2V) communications and the serious concerns about safety and privacy. Ed discussed the challenges of developing such a massive system, the risks of software and infotainment systems in cars and privacy concerns (the big brother and NSA worries).


During lunch, guests and sponsors had the opportunity to spend a relaxing hour meeting new people and catching up.


In the session, “Securing Rogue File Sharing – Your Most Vulnerable Data Leak Threat Vector,” Brian Winter, Regional Sales Manager at Accellion, Gold Sponsor, discussed best practices for secure file sharing. Brian shared insights into the latest advancements in secure file sharing and collaboration, best practices for providing security without compromising productivity and how to leverage investments in existing content systems.


In the interview session, “Business Technologies for the Future,” Scott Bonneau, VP of IT, Security & Corporate Functions at Dr Pepper Snapple Group, and Scot Miller, VP and Chief Information Security Officer at HMS, shared what they are doing to ensure they are positioned for success in the future by having the right technologies in place. This discussion focused on existing technologies that are viewed as being on the critical path to success and new technologies that have promise for the future.


Brian Henger, Regional Vice President at Malwarebytes, Gold Sponsor, spoke on “Psychological Warfare: How Cyber Criminals Mess With People’s Minds.” Brian discussed current attacks used by cyber criminals that employ both the latest in threat tech and social engineering tactics and why cyber criminals have put more stock in advertising and psychology than innovations in tech.


The session, Executive Roundtables, received great feedback on the breakout topics and the executives facilitating the topics in these peer-to-peer discussions. The roundtables were led by Mary Dickerson, Chief Information Security Officer of University of Houston and the University of Houston System, Randall Mills, Chief Technology Officer at Netcare Now/24 Hour Physicans, Eric Yancy, Information Security Officer at GetThere, Amyn Gilani, Vice President of Cyber Threat at Goldman Sachs, and Parrish Gunnels, CISO at Invitation Homes.


Tom Moore, Consulting Systems Engineer with OpenDNS now part of Cisco, Silver Sponsor, provided an executive briefing on “Security Beyond the Firewall.” Tom discussed the need for a predictive security intelligence program in order that CISOs can prevent, contain and be informed of targeted attacks. Tom shared insights into identifying adversarial patterns once they’ve entered the network and how security approaches can leverage data to prevent attacks before they happen.


In the last session of the day, “Cyber-Security, Trends in Human Capital,” Matt Comyns, Global Head of the Cyber Security Practice at Russell Reynolds Associates, provided the latest trends in compensation for the security industry, which areas in security are becoming increasingly important to the C-Suite, and where he sees opportunity in the future. Matt highlighted the growth in international opportunities as a stepping stone for careers back in the States. For Matt’s presentation or questions, please email Matt at Matt.Comyns@russellreynolds.com.


At the end of the day, guests had the chance to unwind and enjoy the afternoon reception and prize drawings by our Sponsors.

Platinum Sponsors

Blue Coat Systems


Blue Coat empowers enterprises to safely and securely choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets. Blue Coat has a long history of protecting organizations, their data and their employees and is the trusted brand to 15,000 customers worldwide, including 86 percent of the FORTUNE Global 500. With a robust portfolio of intellectual property anchored by more than 200 patents and patents pending, the company continues to drive innovations that assure business continuity, agility and governance. For additional information, please visit www.bluecoat.com.

• A new study from ESG describing the growth of encryption and strategies for protection. Read the report, “Network Encryption and its Impact on Network Security” to get the facts and figures about the nature of the threat and the actions you can take now to deepen your defenses.

Security Innovation

Security Innovation focuses on the most difficult IT Security problem, and the root cause of most data breaches — insecure software applications. For more than a decade, we’ve helped organizations build internal expertise, uncover critical vulnerabilities, and improve the process by which applications are built. The company’s solutions are based on the three pillars of a secure Software Development Lifecycle (SDLC), which feed into one another to create an ecosystem of repeatable, secure software development: Standards, Education, and Assessment. Our flagship products include TeamProfessor, the industry’s largest library of application security eLearning courses, and TeamMentor, “out of the box” secure development standards. For more information, please visit: www.securityinnovation.com

Gold Sponsors

Accellion


Accellion, Inc. provides secure access to enterprise content wherever it is stored to enable increased enterprise productivity and ensure data security and compliance. Accellion, Inc. is the leading provider of private cloud solutions offering enterprise organizations the scalability, flexibility, control and security to enable a global workforce with the tools they need to securely create, access and share information, wherever work takes them. Accellion solutions are used by more than 12 million users and 2,000 of the world’s leading corporations and government agencies including Procter & Gamble; Indiana University Health; Kaiser Permanente; Hogan Lovells; Bridgestone; Harvard University; US Securities and Exchange Commission; and NASA. For more information, please visit www.accellion.com or call 650-485-4300.

Additional Resources:
kiteworks Security Overview Whitepaper
kiteworks End User Demo

Malwarebytes


Malwarebytes protects businesses against malicious threats that escape detection by traditional antivirus solutions. Malwarebytes Anti-Malware, the company’s flagship product, has a highly advanced heuristic detection engine that has removed more than five billion malicious threats from computers worldwide. SMBs and enterprise businesses worldwide trust Malwarebytes to protect their data. Founded in 2008, the company is headquartered in California with offices in Europe, and a global team of researchers and experts. For more information, please visit www.malwarebytes.com/business.

Download a copy of the Malwarebytes Research Brief: Operation Fingerprint to get a look into several Angler Exploit Kit malvertising campaigns.

Silver Sponsors

CloudPassage

CloudPassage Halo® is the world’s leading agile security platform that empowers our customers to take full advantage of cloud infrastructure with the confidence that their critical business assets are protected. Halo delivers a comprehensive set of continuous security and compliance functions right where it counts — at the workload. Our platform orchestrates security on-demand, at any scale and works in any cloud or virtual infrastructure (private, public, hybrid or virtual data center). For more information, please visit www.cloudpassage.com.

OpenDNS


OpenDNS is a leading provider of network security and DNS services, enabling the world to connect to the Internet with confidence on any device, anywhere, anytime. The Umbrella cloud-delivered network security service blocks advanced attacks, as well as malware, botnets and phishing threats regardless of port, protocol or application. Its predictive intelligence uses machine learning to automate protection against emergent threats before they can reach customers. OpenDNS protects all devices globally without hardware to install or software to maintain. For more information, please contact Patrick Merchant or visit www.opendns.com.

Whitepaper available: Automated Protection Against Advanced Attacks

Bronze Sponsors

Alert Logic

Alert Logic, the leader in security and compliance solutions for the cloud, provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Fully managed by a team of experts, the Alert Logic Security-as-a-Service solution provides network, system and web application protection immediately, wherever your IT infrastructure resides. Alert Logic partners with the leading cloud platforms and hosting providers to protect over 3,000 organizations worldwide. Built for cloud scale, our patented platform stores petabytes of data, analyzes over 450 million events and identifies over 60,000 security incidents each month, which are managed by our 24×7 Security Operations Center. Alert Logic, founded in 2002, is headquartered in Houston, Texas, with offices in Seattle, Dallas, Cardiff, Belfast and London. For more information, please visit www.alertlogic.com or contact David McBreairty and David Hillock.

BeyondTrust


BeyondTrust is a global cyber security company that believes preventing data breaches requires the right visibility to enable control over internal and external risks. We give you the visibility to confidently reduce risks and the control to take proactive, informed action against data breach threats. And because threats can come from anywhere, we built a platform that unifies the most effective technologies for addressing both internal and external risk: Privileged Account Management and Vulnerability Management. Our solutions grow with your needs, making sure you maintain control no matter where your company goes. BeyondTrust’s security solutions are trusted by over 4,000 customers worldwide, including half of the Fortune 100. To learn more about BeyondTrust, please visit www.beyondtrust.com or contact us at: Kurt Neurauter; (602) 734-1398 and Josh Yarbrough; (978) 206-3620.

Exabeam


Exabeam is a user behavior analytics solution that leverages existing log data to quickly detect modern cyber attacks, prioritize security incidents, and accelerate effective response. Unique among UBA products, Exabeam’s Stateful User Tracking™ automatically creates a complete timeline of every event and anomaly tied to an attack — across devices, IP addresses, and credentials — and uses that timeline to assess risk and automate many tasks of incident response. As a result, Exabeam not only improves security, but also transforms SOC efficiency and productivity. By operating on existing data and requiring no agents or network taps, Exabeam delivers value within hours, not weeks.To learn more about Exabeam, please visit www.exabeam.com

Fidelis Cybersecurity


Fidelis Cybersecurity protects the world’s most sensitive data by equipping organizations to detect, investigate and stop advanced cyber attacks. Our products, services and proprietary threat intelligence enable customers to proactively face advanced threats and prevent data theft with immediate detection, monitoring and response capabilities. With our Fidelis XPS and Resolution1 Platform, customers can get one step ahead of any attacker before a major breach hits. To learn more, please visit www.fidelissecurity.com and follow us on Twitter @FidelisCyber.

Forcepoint


Forcepoint safeguards users, data and networks against the most determined adversaries, from accidental or malicious insider threats to outside attackers, across the entire threat lifecycle. Forcepoint protects data everywhere – in the cloud, on the road, in the office – simplifying compliance and enabling better decision-making and more efficient remediation. Forcepoint empowers organizations to concentrate on what’s most important to them while automating routine security tasks. More than 22,000 organizations around the world rely on Forcepoint. Based in Austin, Texas, with worldwide sales, service, security laboratories and product development, Forcepoint is a joint venture of the Raytheon Company and Vista Equity Partners. For more information, please visit www.forcepoint.com

Hosts

The Security Leaders Summit Dallas 2016 was hosted by information security and IT executives from across the area. The Hosts served as the face of the Summit and throughout the program they shared their insights during presentations, interview sessions, and our executive peer-to-peer discussions. The Hosts included:

Scott Bonneau
Vice President of IT, Security & Corporate Functions
Dr. Pepper Snapple Group
Read Bio

Matt Comyns
Matt Comyns
Global Co-Head of Cyber Security Practice
Russell Reynolds Associates
Read Bio

Mary Dickerson
Chief Information Security Officer
University of Houston and the University of Houston System
Read Bio

MaddenS Harvey Ewing
Chief Information Security Officer
G6 Hospitality LLC
Read Bio

MaddenS Jamil Farshchi
Vice President & Chief Information Security Officer
The Home Depot, Inc.
Read Bio

Ajay Gupta
Global Chief Information Security Officer
Pizza Hut/Yum! Brands
Read Bio

Paul Horn
Chief Information Security Officer
HD Vest Financial Services
Read Bio

Scot Miller
Vice President, Chief Information Security Officer
HMS
Read Bio

Randall Mills
Chief Technology Officer
Netcare Now/24 Hour Physicians
Read Bio

Robert Pace
Vice President, Information Security & Compliance
First American Payment Systems
Read Bio

Gary Toretti
Vice President & Chief Information Security Officer of Risk & Security
Sabre Corporation
Read Bio

MaddenS Carol Weaver
Vice President of IT Security
GM Financial
Read Bio

Eric Yancy
Information Security Officer
GetThere
Read Bio

Held on Wednesday, March 23, 2016

Time Description
7:15am – 8:30am Registration Opens with a Breakfast Buffet and Networking in the Sponsor Pavilion Garden Court III
8:30am – 8:50am

“Welcome and Opening Remarks”

Malachite Showroom
8:50am – 9:25am

Morning Keynote – “State of the Industry”

Jamil Farshchi
Vice President & Chief Information Security Officer
The Home Depot, Inc.
Read Bio

Jamil Farshchi, Vice President and Chief Information Security Officer at The Home Depot will open up the Dallas Summit with insights into the state of the information security industry and the challenges facing the industry. Jamil will share his vision on where he needs to take his organization to ensure his company brand is protected in the future, where he expects success, and how he expects to achieve his vision. The Home Depot is the largest home improvement retailer with $84 billion in revenues and 371,000 employees.

Malachite Showroom
9:25am – 9:35am

“Speed Of Business Is Breaking Security – Automate Or Die”

Sami Laine
Principal Technologist
CloudPassage, Silver Sponsor
Read Bio

Today’s business requirements for speed and agility are rapidly transforming delivery of IT. This change is upsetting the ability of security organizations to maintain and extend their controls into the modern infrastructure. A new approach is needed to deliver security in any application hosting environment, on demand and at any scale. This presentation focuses on solution approaches to the key challenges around visibility, threat isolation, compliance and automation.

Malachite Showroom
9:35am – 10:00am

“Conversations with Execs in the Corner Office – Leadership Challenges”

Paul Horn
Chief Information Security Officer
HD Vest Financial Services
Read Bio

Gary Toretti
Vice President & Chief Information Security Officer of Risk & Security
Sabre Corporation

Read Bio

Carol Weaver
Vice President of IT Security
GM Financial
Read Bio


The business challenges and the dynamics of change are forcing security and privacy leaders to rethink their roles and what success means to their organizations and to their businesses. As the leadership role of security organizations continue to evolve at a rapid pace with expanded responsibilities, the value delivered by these organizations is becoming increasingly critical to the success of the enterprise. Successful leaders are taking the long view of their role as they develop strategies to help enable their businesses to move quicker, positively impact the bottom, and ensure the protection of its assets, customers, and their brands.

In this interview session, Paul Horn, CISO of HD Vest Financial Services, Gary Toretti, CISO and VP of Risk & Security at Sabre Corporation and Carol Weaver, VP of IT Security at GM Financial, will discuss how they plan to deliver increasing value to their organizations, what it will take to get there, and what they expect to accomplish.

Malachite Showroom
10:00am – 10:30am

“The Industry Need for Cloud Generation Security”

Brian Kenyon
Senior Vice President & Chief Strategy Officer
Blue Coat Systems, Platinum Sponsor
Read Bio

The unprecedented power of cloud applications have opened up amazing new possibilities for IT organizations, lines-of-business, and users to empower work needs. Whether sanctioned or not, these cloud applications can have a dark side. The rapid pace of adoption has left most security and compliance teams behind. Users, devices and data are now interacting with a variety of new cloud services while entirely circumventing the control of the organization. This has introduced new risk factors for organizations already struggling under the duress of the traditional threat landscape. However, it doesn’t have to be this way; Cloud applications and services can be adopted rapidly and securely as Info Security teams proactively build in security for users, devices and data. Please join Blue Coat as we discuss these new challenges and provide practical advice on how these issues can be safely overcome.

Malachite Showroom
10:30am – 11:10am Break and Networking in the Sponsor Pavilion Garden Court III
11:10am – 11:40am

“Game Changers – Driving Innovation”

Harvey Ewing
Chief Information Security Officer
G6 Hospitality LLC
Read Bio

Robert Pace
Vice President, Information Security & Compliance
First American Payment Systems

Read Bio

In this session, Harvey Ewing, CISO at G6 Hospitality and Robert Pace, VP of Information Security and Compliance at First American Payment Systems will discuss what they are doing to drive innovation at their organizations to help move their businesses forward and how they are approaching building an innovative culture to execute on their vision.

G6 Hospitality owns, operates and franchises over 1,300 economy lodging locations under the iconic Motel 6 brand and the Studio 6 Extended Stay brand and employs more than 10,000 team members across the U.S. and Canada. An industry leader in merchant services, First American Payment Systems is ranked as one of the top privately-owned merchant acquirers in the United States.

Malachite Showroom
11:40am – 12:10pm

“Connected Cars – What Could Possibly Go Wrong?”

Ed Adams
Chief Executive Officer & Ponemon Institute Fellow
Security Innovation, Platinum Sponsor
Read Bio

Vehicle-to-Vehicle (V2V) communications is achieved through wireless exchange of data between nearby vehicles. Both the US and EU have issued notices to car manufacturers – very soon all cars will carry V2V equipment and broadcast speed and location constantly. V2V enables vehicles to sense hazards, issue warnings, and if necessary stop the vehicle. The US Dept. of Transportation predicts V2V will prevent 76 percent of the crashes on the roadway, saving 10,000 lives per year. But with these benefits come serious concerns about safety and privacy. Will hackers be able to take control of your car? Will the government be able to track your vehicle movements?

This presentation will provide insight into these questions as well as the following topics:
• The challenges of developing such a massive system
• The risks of software and infotainment systems in cars
• Privacy concerns (the big brother and NSA worries)

Malachite Showroom
12:10pm – 1:20pm Lunch in the Sponsor Pavilion Garden Court III
1:20pm – 1:40pm

“Securing Rogue File Sharing – Your Most Vulnerable Data Leak Threat Vector”

Brian Winter
Regional Sales Manager
Accellion, Gold Sponsor
Read Bio

Insecure and unmanaged file sharing has proven to be one of the largest sources of data leaks. Yet, your employees have a genuine need for securely sharing documents with team members, partners, customers, suppliers, and other external parties. How do you enable the business to maintain speed and agility while providing the protection it needs and also meeting compliance requirements?

This presentation will discuss key best practices for secure file sharing including:
• The latest advancements in secure file sharing and collaboration
• Best practices for providing security without compromising productivity
• How to leverage investments in existing content systems

Malachite Showroom
1:40pm – 2:10pm

“The CISO Toolbox – Business Technology for the Future”

Scott Bonneau
Vice President of IT, Security and Corporate Functions
Dr Pepper Snapple Group
Read Bio

Scot Miller
Vice President, Chief Information Security Officer
HMS
Read Bio

In this interview session, Scott Bonneau, VP of IT, Security & Corporate Functions at Dr Pepper Snapple Group, along with Scot Miller, VP and Chief Information Security Officer at HMS, will share what they are doing to ensure they are positioned for success in the future by having the right technologies in place. This discussion, while not focused on vendor specific products, will focus on existing technologies that are viewed as being on the critical path to success and new technologies that have promise for the future.

Dr Pepper Snapple Group is an American beverage company with 19,000 employees and $6 billion in revenue.

HMS delivers the broadest range of cost containment solutions in healthcare. Based in Irving, Texas, HMS has more than 2,300 employees in 25-plus offices across the country.

Malachite Showroom
2:10pm – 2:30pm

“Psychological Warfare: How Cyber Criminals Mess With People’s Minds”

Brian Henger
Regional Vice President
Malwarebytes, Gold Sponsor
Read Bio

Today’s cyber-attacks might utilize the most complex threat technology to date but much of the threat lies outside of the code. When attackers utilize a technological attack combined with psychology, similar to what advertisers use, their spread and effectiveness increases greatly. While most of the security industry is focusing on assisting both consumers and the enterprise from a technical stance, employing new monitoring systems and patching security holes, at the end of the day, the ultimate target for cyber criminals are users. We’ll discuss current attacks used by cyber criminals that employ both the latest in threat tech and social engineering tactics; why cyber criminals have put more stock in advertising and psychology than innovations in tech; and what options exist to protect users from these threats.

Malachite Showroom
2:30pm – 3:50pm

Executive Roundtable Discussions with Debrief

Breakout sessions with your peers on topics determined by attendees during registration.

Topic 1: “Information Security and the Business: Changing the Conversation”

Robert MimsAjay Gupta
Global Information Security Officer
Pizza Hut/Yum! Brands
Read Bio

read more

Topic 2: “Taking the Pulse of Information Security”

Robert MimsMary Dickerson
Chief Information Security Officer
University of Houston and the University of Houston System
Read Bio

read more

Topic 3: “Security Awareness Training and Internal Threats – Where Impact Occurs”

Robert MimsRandall Mills
Chief Technology Officer
Netcare Now/24 Hour Physicans
Read Bio

read more

Topic 4: “The Acceleration of Cloud Security”

Robert MimsEric Yancy
Information Security Officer
GetThere
Read Bio

read more

Topic 5: In Front of the Breach: Preparation & Action

read more

Topic 6: “Governance and the Cloud – Strategies for Confidence”

read more

Topic 7: “Malware – The Challenge Continues”

read more

Malachite Showroom
3:50pm – 4:00pm

“Security Beyond the Firewall”

Tom Moore
Consulting Systems Engineer
OpenDNS now part of Cisco, Silver Sponsor
Read Bio

A decade ago, firewalls and antivirus software were enough to protect against infiltration, but today’s threats are stealthy and patient. Without a predictive security intelligence program, an organization lacks proactive defense and potentially compromises massive amounts of sensitive data. How can CISOs prevent, contain and inform on targeted attacks? How does a security team identify adversarial patterns once they’ve entered the network? We will lead a conversation on both old and new attack techniques, and how security approaches can leverage data to prevent attacks before they happen.

Malachite Showroom
4:00pm – 4:30pm

Afternoon Keynote – “How the Compensation Market is Changing to Reflect Security’s Importance”

Matt Comyns
Global Head of Cyber Security Practice
Russell Reynolds Associates
Read Bio

In the afternoon keynote, Matt Comyns, Global Co-head of the Cyber Security Practice, will provide the latest trends in compensation for the security industry, what areas in security are becoming increasingly important to the C-Suite, and where he sees opportunity in the future.

Russell Reynolds Associates is an executive leadership and search firm, serving clients globally for 45 years. The company advises clients on recruiting and retaining outstanding and impactful leaders.

Malachite Showroom
4:30pm – 4:45pm Closing Remarks Malachite Showroom
4:45pm – 5:45pm Reception and Networking with Prize Drawings Garden Court III

Venue

InterContinentalHotel-DallasInterContinental Dallas
15201 Dallas Pkwy, Addison, TX 75001
Phone: (972) 386-6000
http://www.icdallas.com/

Luxury Hotel in Dallas
The InterContinental Dallas combines upscale accommodations with premium amenities like courtesy shuttle service and the city’s premier event space all while you bask in the warm Texas hospitality. Boasting natural textures inspired by the Texas landscape and works by local artists, the recently redesigned lobby and restaurant are the perfect place to unwind before or after an exciting day in Dallas.

Located in the Addison, Texas business district, the InterContinental Dallas is close to companies like Mary Kay World Headquarters, Bank of America, USAA, Wells Fargo, Fannie Mae and top Dallas dining destinations. With easy access to multiple highways in the area, top attractions like Six Flags Over Texas and sports venues like AT&T Stadium, home of the Dallas Cowboys, are just a short drive away. InterContinental® Dallas is also one of the top hotels near Galleria Dallas, and our courtesy shuttle service makes it easy to enjoy a memorable shopping outing.

Services & Amenities

InterContinentalHotel-Dallas-room

The InterContinental Dallas offers state-of-the-art business and fitness center as well as room service and much more. Relax and enjoy a spa service or unwind with a gourmet meal at Q de Cheval, the award-winning restaurant.

Guestrooms

InterContinentalHotel-Dallas-room

The special rate for attendees of the Summit at the InterContinental Dallas Hotel has expired ($199.00 per night for March 22nd and March 23rd). The Hotel coordinator however will try to assist you if additional rooms are still needed. Contact Freida Reed directly at freida.reed@ihg.com and include your nights needed and room/bed type and she will follow-up with you.

The hotel is currently offering special rates on their website from $222.00 and up per night. If you run into any issues, email us at info@execalliance.com and include your room night needs and we will work with the hotel for you.

Parking

Valet Parking at the hotel is available for $12.00 per car, overnight parking is $18.00 per car.

Complimentary Self-Parking is available on a space and availability basis.

Parking in the InterContinental Parking Garage is available at the prevailing rate; parking garage rate is currently $10.00 per car, with no in and out privileges.

Directions

InterContinental Dallas
15201 Dallas Pkwy, Addison, TX 75001
Phone: (972) 386-6000
http://www.icdallas.com/

From Dallas/Fort Worth International Airport (DFW)

Distance 21 MI
Time by taxi: 26 minutes

Take International Pkwy and I-635 E to Dallas Pkwy in Addison. Take the exit toward Belt Line Rd/Arapaho Rd from Dallas North Tollway N. Continue on Dallas Pkwy for 0.8 miles and the InterContinental Dallas will be on your right.

From Dallas Love Field Airport (DAL)

Distance 11 MI
Time by taxi: 21 minutes

Take Dallas North Tollway N from Herb Kelleher Way and W Mockingbird Lane. Follow Dallas North Tollway N to Dallas Pkwy in Addison. Take the exit toward Belt Line Rd/Arapaho Rd from Dallas North Tollway N. Continue on Dallas Pkwy for 0.8 miles and the InterContinental Dallas will be on your right.

View Larger Map

Map of InterContinental Dallas

If you are interested in sponsoring our Summits, Symposium, or Custom Dinner Programs, please call Executive Alliance at 678-445-1919 or email us at info@execalliance.com.

Platinum Sponsors

spo_blueCoatAbout Blue Coat Systems

Blue Coat empowers enterprises to safely and securely choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets. Blue Coat has a long history of protecting organizations, their data and their employees and is the trusted brand to 15,000 customers worldwide, including 86 percent of the FORTUNE Global 500. With a robust portfolio of intellectual property anchored by more than 200 patents and patents pending, the company continues to drive innovations that assure business continuity, agility and governance. For more information, please visit www.bluecoat.com.

About Security Innovation

Security Innovation focuses on the most difficult IT Security problem, and the root cause of most data breaches — insecure software applications. For more than a decade, we’ve helped organizations build internal expertise, uncover critical vulnerabilities, and improve the process by which applications are built. The company’s solutions are based on the three pillars of a secure Software Development Lifecycle (SDLC), which feed into one another to create an ecosystem of repeatable, secure software development: Standards, Education, and Assessment. Our flagship products include TeamProfessor, the industry’s largest library of application security eLearning courses, and TeamMentor, “out of the box” secure development standards. For more information, please visit www.securityinnovation.com.

Gold Sponsors

spo-accellionAbout Accellion

Accellion provides the leading mobile content platform that increases enterprise productivity and ensures data security and compliance. As the foremost provider of private cloud solutions for secure mobile content management, Accellion offers enterprise organizations the scalability, flexibility, control and security to enable a mobile workforce with the tools they need to create, access and share information securely, wherever work takes them. More than 12 million business users and 2,000 of the world’s leading corporations and government agencies use Accellion solutions to increase business productivity, protect intellectual property, ensure compliance and reduce IT costs. For more information, please visit www.accellion.com.

About Malwarebytes

Malwarebytes protects businesses against malicious threats that escape detection by traditional antivirus solutions. Malwarebytes Anti-Malware, the company’s flagship product, has a highly advanced heuristic detection engine that has removed more than five billion malicious threats from computers worldwide. SMBs and enterprise businesses worldwide trust Malwarebytes to protect their data. Founded in 2008, the company is headquartered in California with offices in Europe, and a global team of researchers and experts. For more information, please visit www.malwarebytes.com/business

Silver Sponsors

spo-cloudpassageAbout CloudPassage

CloudPassage Halo® is the world’s leading agile security platform that empowers our customers to take full advantage of cloud infrastructure with the confidence that their critical business assets are protected. Halo delivers a comprehensive set of continuous security and compliance functions right where it counts — at the workload. Our platform orchestrates security on-demand, at any scale and works in any cloud or virtual infrastructure (private, public, hybrid or virtual data center). For more information, please visit www.cloudpassage.com.

spo-proofPointAbout OpenDNS (now part of Cisco)

OpenDNS (now part of Cisco) is a leading provider of network security and DNS services, enabling the world to connect to the Internet with confidence on any device, anywhere, anytime. The Umbrella cloud-delivered network security service blocks advanced attacks, as well as malware, botnets and phishing threats regardless of port, protocol or application. Its predictive intelligence uses machine learning to automate protection against emergent threats before they can reach customers. OpenDNS protects all devices globally without hardware to install or software to maintain. For more information, please visit: www.opendns.com.

Bronze Sponsors

spo-securityInnovationAbout Alert Logic

Alert Logic, the leader in security and compliance solutions for the cloud, provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Fully managed by a team of experts, the Alert Logic Security-as-a-Service solution provides network, system and web application protection immediately, wherever your IT infrastructure resides. Alert Logic partners with the leading cloud platforms and hosting providers to protect over 3,000 organizations worldwide. Built for cloud scale, our patented platform stores petabytes of data, analyzes over 450 million events and identifies over 60,000 security incidents each month, which are managed by our 24×7 Security Operations Center. Alert Logic, founded in 2002, is headquartered in Houston, Texas, with offices in Seattle, Dallas, Cardiff, Belfast and London. For more information, please visit www.alertlogic.com.

About BeyondTrust

BeyondTrust is a global cyber security company that believes preventing data breaches requires the right visibility to enable control over internal and external risks. We give you the visibility to confidently reduce risks and the control to take proactive, informed action against data breach threats. And because threats can come from anywhere, we built a platform that unifies the most effective technologies for addressing both internal and external risk: Privileged Account Management and Vulnerability Management. Our solutions grow with your needs, making sure you maintain control no matter where your company goes. BeyondTrust’s security solutions are trusted by over 4,000 customers worldwide, including half of the Fortune 100. To learn more about BeyondTrust, please visit www.beyondtrust.com.

About Exabeam

Exabeam is a user behavior analytics solution that leverages existing log data to quickly detect modern cyber attacks, prioritize security incidents, and accelerate effective response. Unique among UBA products, Exabeam’s Stateful User Tracking™ automatically creates a complete timeline of every event and anomaly tied to an attack — across devices, IP addresses, and credentials — and uses that timeline to assess risk and automate many tasks of incident response. As a result, Exabeam not only improves security, but also transforms SOC efficiency and productivity. By operating on existing data and requiring no agents or network taps, Exabeam delivers value within hours, not weeks.To learn more about Exabeam, please visit www.exabeam.com.

About Fidelis Cybersecurity

Fidelis Cybersecurity protects the world’s most sensitive data by equipping organizations to detect, investigate and stop advanced cyber attacks. Our products, services and proprietary threat intelligence enable customers to proactively face advanced threats and prevent data theft with immediate detection, monitoring and response capabilities. With our Fidelis XPS and Resolution1 Platform, customers can get one step ahead of any attacker before a major breach hits. To learn more, please visit www.fidelissecurity.com and follow us on Twitter @FidelisCyber.

spo-ForcpointAbout Forcepoint

Forcepoint safeguards users, data and networks against the most determined adversaries, from accidental or malicious insider threats to outside attackers, across the entire threat lifecycle. Forcepoint protects data everywhere – in the cloud, on the road, in the office – simplifying compliance and enabling better decision-making and more efficient remediation. Forcepoint empowers organizations to concentrate on what’s most important to them while automating routine security tasks. More than 22,000 organizations around the world rely on Forcepoint. Based in Austin, Texas, with worldwide sales, service, security laboratories and product development, Forcepoint is a joint venture of the Raytheon Company and Vista Equity Partners. For more information, please visit www.forcepoint.com.

Summit Sponsors

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Bronze Sponsors

OTHER PAST PROGRAMS

Guest Feedback

The past two New York Summits have led to 15 follow-up meetings and helped to make our New York rep the top sales rep in...

Ed Adams, Chief Executive Officer, Security Innovation
VIEW MORE GUEST FEEDBACK IT Security Leaders

I was honored to participate in this Summit. I thought the candid discussions with senior security professionals was refreshing and informative.”...

Eric Yancy, Information Security Officer, GetThere
VIEW MORE GUEST FEEDBACK IT Security Leaders

Best one-on-one with both peers and solution providers. Also, perfect for one day of packed content....

Kevin McMahon, Sr. VP & Chief Compliance Officer, Calpine Corporation
VIEW MORE GUEST FEEDBACK IT Security Leaders

Excellent information sharing and networking....

Gary Toretti, Chief Information Security Officer, Sabre Corporation
VIEW MORE GUEST FEEDBACK IT Security Leaders

The EA Summits provide me with the opportunity to speak with peers that I can trust....

Scot Miller, VP & Chief Information Security Officer, HMS Healthcare
VIEW MORE GUEST FEEDBACK IT Security Leaders