The Security Leaders Summit

Where Industry Leaders Meet to Shape the Future
  • Home
  • /
  • Security Leaders Summit

The Security Leaders Summit New York Spring was held on Thursday, April 14, 2016 at the Hilton Midtown. The Summit brought together a community of senior IT executives for engaging peer-level interaction, discussions on new approaches to managing complexities in Information Security, and provided opportunities to collaborate with leaders in the industry. Throughout the day, the Summit Hosts, representing companies across a diversity of industries and sizes, shared their insights and knowledge with the distinguished group of attendees through their presentations, interviews and breakout roundtable discussions.

Summit Recap

In the morning keynote, Shawn Banerji with Information Officers and FinTech Practices, Global Technology Sector at Russell Reynolds, an executive leadership and search firm, delved into the role of the CISO moving forward and trends in compensation packages. Shawn highlighted cyber risk has become the #1 risk for most companies and boards and this is one of the leading indicators for increased responsibilities in a security organization and associated compensation. Emerging roles discussed included: Business Line Information Security Officer, Head of 3rd Party/Vendor Risk & Compliance, Head of Insider Threat, Regional Information Security Officers and Head of Product Security (IoT). With the new responsibilities and roles, HR teams are having to break with standards to accommodate highly sought after information security executives, who in many cases require compensation increases of 25% or more. Compensations are now running at $1.5+ million for CISOs at Fortune 500 companies and on average in the $300k – $750k range for senior security executives at medium to large organizations. For more information on Shawn’s presentation, please reach out to him directly at Shawn.Banerji@russellreynolds.com


In the executive briefing on “The Speed Of Business Is Breaking Security – Automate Or Die,” Mark Aklian, Cloud Security Evangelist for CloudPassage, Silver Sponsor, received very positive feedback from the attendee survey results on his insights into how to align security with the speed of modern IT. Download the presentation


With Richard Warner, Summit Emcee as the interview moderator for the session, “Conversations with Execs in the Corner Office,” David Hahn, CISO at the Hearst Corporation and John Masserini, CISO at MIAX Options, discussed how their own organizations are building trust across their companies, their need to move forward in helping to impact revenue, and the ongoing conversations they are holding with their teams focused much more on strategic versus tactical issues.

In the presentation, “The Industry Need for Cloud Generation Security,” Bradon Rogers, Senior Vice President, Product Strategy and Operations at Blue Coat Systems, Platinum Sponsor, shared insights into challenges dealing with the infrastructure used by attackers to gain information and the rise of encrypted traffic, which is now considered common ground for both the good and the bad guys. For ensuring safe passage of data to the cloud, Bradon highlighted the need to ensure control over the evolving network and protection of next-generation endpoints through device agnostic protection. Download the presentation


During the morning break, attendees and Summit sponsors had the chance to continue their conversations from the morning sessions.


In the session, “Securing Rogue File Sharing – Your Most Vulnerable Data Leak Threat Vector,” David Hart, Enterprise Account Sales with Accellion, Gold Sponsor, presented their research findings and best practices on the latest advancements in secure file sharing and collaboration, the ability to provide security without compromising productivity and how to leverage investments in existing content systems.


In a facilitated interview session, “Business Technologies for the Future,” with Joel Rosenblatt, Director, Computer & Network Security at Columbia University and Darin Mastricola, Vice President, of IT Security and Compliance at Endurance Specialty Holdings Ltd., discussions focused on the evaluation of their current arsenal of technology tools, the technologies they believe are the most successful in what they do to protect your business, their gaps and what is needed in the marketplace and technologies they think have promise for the future.


Neil Farquharson, Technology Evangelist for ZixCorp, Gold Sponsor presented on “Email Security.” Neil Farquharson shared insights into the latest and challenges they are seeing and how organizations are solving their most pressing secure email challenges.


During lunch, guests and sponsors had the opportunity to spend a relaxing hour meeting new people and catching up.


After lunch, the Summit kicked back into high gear with Nashira Layade, Executive Director, Privacy & Information Security at Time Warner, discussing the most critical areas of her organization where she needs to be innovative and what is driving the need, her strategies for building capabilities for an agile infrastructure, the most difficult obstacles in her way to being innovative and what are going to be the key factors to her success in the future.


Brian Henger, Regional Vice President of Malwarebytes, Gold Sponsor, presented on “Psychological Warfare: How Cyber Criminals Mess With People’s Minds.” Brian shared insights into how cyber criminals are now investing more time and resources in advertising and psychology than technologies to gain access to data, the underlying social engineering tactics to gain access and solutions to consider to protect against these tactics.

The Executive Roundtables received excellent feedback from the Summit attendees, including “valuable peer-to-peer discussions,” and “great way to round out the afternoon.” The roundtables were facilitated by Dana Thurston-Nuzzo, SVP & Group Information Security Officer with Citigroup, Mike Lamberg, VP & CISO with OpenLink Financial, LLC, John Michaels, CTO & CISO with Maxim Group, Joel Rosenblatt, Director of Computer & Network Security with Columbia University, Sarathi Yerra, Information Security Officer, with MFA Financial, Inc., James Cusick, CSO & Director of IT Operations, with Wolters Kluwer, CT Corporation, and Preetam Sirur, Senior Director, IT Risk & Security, with Standard & Poor’s Rating Services.

Download an example of one of the roundtable discussions facilitated by James Cusick, Chief Security Officer & Director IT Operations at Wolters Kluwer, CT Corporation, on the topic “Information Security & the Business – Changing the Conversation.”

In the final session of the day, Jeremy Major, Regional Sales Manager with OpenDNS, now part of Cisco, provided an executive briefing on “Security Beyond the Firewall.” Jeremy shared how today’s threats are stealthy and patient where a decade ago, firewalls and antivirus software were enough to protect against infiltration. In his briefing he highlighted how a security team can identify adversarial patterns once they’ve entered the network, insights into new attack techniques, and what security approaches can leverage data to prevent attacks before they happen.


During the afternoon reception, attendees and Summit sponsors had the opportunity to unwind, keep the conversations going and have fun with the prize drawings, include a drone, bose speakers, an Apple TV and gift cards.

Be sure to visit the photo gallery.

Platinum Sponsor

Blue Coat Systems

Blue Coat empowers enterprises to safely and securely choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets. Blue Coat has a long history of protecting organizations, their data and their employees and is the trusted brand to 15,000 customers worldwide, including 86 percent of the FORTUNE Global 500. With a robust portfolio of intellectual property anchored by more than 200 patents and patents pending, the company continues to drive innovations that assure business continuity, agility and governance. For additional information, please visit:

• A new study from ESG describing the growth of encryption and strategies for protection. Read the report, “Network Encryption and its Impact on Network Security” to get the facts and figures about the nature of the threat and the actions you can take now to deepen your defenses.
• Or visit www.bluecoat.com.

Gold Sponsors

Accellion

Accellion, Inc. provides secure access to enterprise content wherever it is stored to enable increased enterprise productivity and ensure data security and compliance. Accellion, Inc. is the leading provider of private cloud solutions offering enterprise organizations the scalability, flexibility, control and security to enable a global workforce with the tools they need to securely create, access and share information, wherever work takes them. Accellion solutions are used by more than 12 million users and 2,000 of the world’s leading corporations and government agencies including Procter & Gamble; Indiana University Health; Kaiser Permanente; Hogan Lovells; Bridgestone; Harvard University; US Securities and Exchange Commission; and NASA. For more information, please visit www.accellion.com or call 650-485-4300.

Additional Resources:
kiteworks Security Overview Whitepaper
kiteworks End User Demo

Malwarebytes

Malwarebytes protects businesses against malicious threats that escape detection by traditional antivirus solutions. Malwarebytes Anti-Malware, the company’s flagship product, has a highly advanced heuristic detection engine that has removed more than five billion malicious threats from computers worldwide. SMBs and enterprise businesses worldwide trust Malwarebytes to protect their data. Founded in 2008, the company is headquartered in California with offices in Europe, and a global team of researchers and experts. For more information, please visit www.malwarebytes.com/business.

Download a copy of the Malwarebytes Research Brief: Operation Fingerprint to get a look into several Angler Exploit Kit malvertising campaigns.

ZixCorp

ZixCorp is a leader in email data protection. ZixCorp offers industry-leading email encryption, a unique email DLP solution and an innovative email BYOD solution to meet your company’s data protection and compliance needs. ZixCorp is trusted by the nation’s most influential institutions in healthcare, finance and government for easy to use secure email solutions. ZixCorp is publicly traded on the Nasdaq Global Market under the symbol ZIXI, and its headquarters are in Dallas, Texas. For more information, please visit www.zixcorp.com or contact Andrew Verderame, Regional Sales Manager, 603-777-7112.

Ebook: The Risks of Email and the Rewards of Innovative Encryption

Silver Sponsors

CloudPassage

CloudPassage Halo® is the world’s leading agile security platform that empowers our customers to take full advantage of cloud infrastructure with the confidence that their critical business assets are protected. Halo delivers a comprehensive set of continuous security and compliance functions right where it counts — at the workload. Our platform orchestrates security on-demand, at any scale and works in any cloud or virtual infrastructure (private, public, hybrid or virtual data center). For more information, please visit www.cloudpassage.com or contact Larry Bianculli.

OpenDNS

OpenDNS is a leading provider of network security and DNS services, enabling the world to connect to the Internet with confidence on any device, anywhere, anytime. The Umbrella cloud-delivered network security service blocks advanced attacks, as well as malware, botnets and phishing threats regardless of port, protocol or application. Its predictive intelligence uses machine learning to automate protection against emergent threats before they can reach customers. OpenDNS protects all devices globally without hardware to install or software to maintain. For more information, please contact Jeremy Majors or visit www.opendns.com.

Whitepaper available: Automated Protection Against Advanced Attacks

Bronze Sponsors

Alert Logic
Alert Logic, the leader in security and compliance solutions for the cloud, provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Fully managed by a team of experts, the Alert Logic Security-as-a-Service solution provides network, system and web application protection immediately, wherever your IT infrastructure resides. Alert Logic partners with the leading cloud platforms and hosting providers to protect over 3,000 organizations worldwide. Built for cloud scale, our patented platform stores petabytes of data, analyzes over 450 million events and identifies over 60,000 security incidents each month, which are managed by our 24×7 Security Operations Center. Alert Logic, founded in 2002, is headquartered in Houston, Texas, with offices in Seattle, Dallas, Cardiff, Belfast and London. For more information, please visit www.alertlogic.com.

BeyondTrust

BeyondTrust is a global cyber security company that believes preventing data breaches requires the right visibility to enable control over internal and external risks. We give you the visibility to confidently reduce risks and the control to take proactive, informed action against data breach threats. And because threats can come from anywhere, we built a platform that unifies the most effective technologies for addressing both internal and external risk: Privileged Account Management and Vulnerability Management. Our solutions grow with your needs, making sure you maintain control no matter where your company goes. BeyondTrust’s security solutions are trusted by over 4,000 customers worldwide, including half of the Fortune 100. To learn more about BeyondTrust, please visit www.beyondtrust.com or contact Kevin McNally.

Forcepoint

Forcepoint safeguards users, data and networks against the most determined adversaries, from accidental or malicious insider threats to outside attackers, across the entire threat lifecycle. Forcepoint protects data everywhere – in the cloud, on the road, in the office – simplifying compliance and enabling better decision-making and more efficient remediation. Forcepoint empowers organizations to concentrate on what’s most important to them while automating routine security tasks. More than 22,000 organizations around the world rely on Forcepoint. Based in Austin, Texas, with worldwide sales, service, security laboratories and product development, Forcepoint is a joint venture of the Raytheon Company and Vista Equity Partners. For more information, please visit www.forcepoint.com or contact Shaun Stalker, Sr. Enterprise Account Manager, or Jason DeHanes, Enterprise Account Manager.

Whitepapers available:
Forcepoint Overview
Forcepoint 2016 Security Predictions

Security Innovation

Security Innovation focuses on the most difficult IT Security problem, and the root cause of most data breaches — insecure software applications. For more than a decade, we’ve helped organizations build internal expertise, uncover critical vulnerabilities, and improve the process by which applications are built. The company’s solutions are based on the three pillars of a secure Software Development Lifecycle (SDLC), which feed into one another to create an ecosystem of repeatable, secure software development: Standards, Education, and Assessment. Our flagship products include TeamProfessor, the industry’s largest library of application security eLearning courses, and TeamMentor, “out of the box” secure development standards. For more information, please visit: www.securityinnovation.com

Thales

Thales e-Security is a leading global provider of trusted cryptographic solutions with a 40-year track record of protecting the world’s most sensitive applications and information. Thales solutions enhance privacy, trusted identities, and secure payments with certified, high performance encryption and digital signature technology for customers in a wide range of markets including financial services, high technology, manufacturing, and government. Thales e-Security has a worldwide support capability, with regional headquarters in the United States, United Kingdom, and Hong Kong. Please visit www.thales-esecurity.com.

Wi-Fi Sponsor

Saint
SAINT Corporation, a global leader in network security, offers the SAINT security suite including integrated vulnerability assessment, penetration testing, compliance reporting, and configuration assessment. Examine your network with the SAINT vulnerability scanner, and expose where an attacker could breach your network. Go to a higher level of visibility with penetration testing tools and exploit the vulnerability to prove its existence without a doubt. SAINT can help to:

• Manage and reduce security risks to your enterprise
• Document compliance with government and industry regulations like PCI, NERC, HIPAA, SOX, FISMA, and with internal policies.
• Emulate potential attackers with the suite of exploit tools.
• Perform configuration audits with policies defined by FDCC & USGCB.
SAINT software is available to download, as a cloud service (SAINTCloud), or preloaded on an appliance (SAINTbox). The software includes enterprise functionality; customizable dashboards and data analysis; and a friendly interface. For more information, please visit www.saintcorporation.com.

Hosts

The Security Leaders Summits are hosted by information security and IT executives from across the area. The Summit Hosts served as the face of the Summit and throughout the program they shared their insights during presentations, interview sessions, and our executive peer-to-peer discussions. Hosts included:

Shawn Banerji
Information Officers & FinTech Practice
Russell Reynolds Associates, Inc.
Read Bio

James Cusick
Chief Security Officer & Director IT Operations
Wolters Kluwer, CT Corporation
Read Bio

photo_comingSoonS David Hahn
Vice President & Chief Information Security Officer
Hearst Corporation
Read Bio

Michael Lamberg
Vice President & Chief Information Security Officer
OpenLink Financial, LLC
Read Bio

Nashira Layade
Executive Director, Privacy & Information Security
Time Warner
Read Bio

John Masserini
Vice President & Chief Information Security Officer
MIAX Options
Read Bio

Darin Mastricola
Vice President, IT Security and Compliance
Endurance Specialty Holdings Ltd.
Read Bio

John Michaels
Chief Technology Officer & Chief Information Security Officer
Maxim Group

Joel Rosenblatt
Director, Computer & Network Security
Columbia University
Read Bio

Preetam Sirur
Senior Director, IT Risk and Security
Standard & Poor’s Rating Services
Read Bio

Dana Thurston-Nuzzo
Group Information Security Officer & Senior Vice President
Citigroup
Read Bio

photo_comingSoonS Raj Yadav
Director, Information Security
Thomson Reuters

photo_comingSoonS Sarathi Yerra
Information Security Officer
MFA Financial Inc.

Held on Thursday, April 14, 2016

Time Description
7:15am – 8:30am Breakfast and Networking in the Sponsor Pavilion Rendezvous Trianon
8:30am – 8:50am Welcome and Opening Remarks Trianon Complex
8:50am – 9:20am

Morning Keynote– “How the Compensation Market is Changing to Reflect Security’s Importance”

Shawn Banerji
Information Officers and FinTech Practices
Russell Reynolds Associates
Read Bio

Shawn Banerji, a member of the Information Officers (IOP) and FinTech Practices within the Global Technology Sector (GTS) of Russell Reynolds Associates, will provide the latest insights into compensation trends in the information security marketplace. Shawn will discuss new areas of increasing compensation, what is driving the need, what sets apart the top CISOs and recommended strategies on how to ensure you make the shortlist. In addition, Shawn will share insights into CISOs that cross over to the CIO position and how they are making this move.

Russell Reynolds Associates is an executive leadership and search firm, serving clients globally for 45 years. The company advises clients on recruiting and retaining outstanding and impactful leaders.

Trianon Complex
9:20am – 9:30am

“The Speed Of Business Is Breaking Security – Automate Or Die”

Mark Aklian
Enterprise Sales Engineer
CloudPassage, Silver Sponsor
Read Bio

Today’s business requirements for speed and agility are rapidly transforming delivery of IT. This change is upsetting the ability of security organizations to maintain and extend their controls into the modern infrastructure. A new approach is needed to deliver security in any application hosting environment, on demand and at any scale. This presentation focuses on solution approaches to the key challenges around visibility, threat isolation, compliance and automation.

Trianon Complex
9:30am – 10:00am

“Conversations with Execs in the Corner Office – Leadership Challenges”

David Hahn
VP & Chief Information Security Officer
Hearst Corporation
Read Bio

John Masserini
VP and Chief Information Security Officer
MIAX Options
Read Bio

The business challenges and the dynamics of change are forcing security and privacy leaders to rethink their roles and what success means to their organizations and to their businesses. As the leadership role of security organizations continue to evolve at a rapid pace with expanded responsibilities, the value delivered by these organizations is becoming increasingly critical to the success of the enterprise. Successful leaders are taking the long view of their role as they develop strategies to help enable their businesses to move quicker, positively impact the bottom, and ensure the protection of its assets, customers, and their brands.

In this interview session, David Hahn, VP & CISO of Hearst Corporation and John Masserini, VP & CISO of MIAX Options, will discuss how they plan to deliver increasing value to their organizations, what it will take to get there, and what they expect to accomplish.

Trianon Complex
10:00am – 10:30am

“The Industry Need for Cloud Generation Security”

Bradon Rogers
Senior Vice President, Product Strategy and Operations
Blue Coat Systems, Platinum Sponsor
Read Bio

The unprecedented power of cloud applications have opened up amazing new possibilities for IT organizations, lines-of-business, and users to empower work needs. Whether sanctioned or not, these cloud applications can have a dark side. The rapid pace of adoption has left most security and compliance teams behind. Users, devices and data are now interacting with a variety of new cloud services while entirely circumventing the control of the organization. This has introduced new risk factors for organizations already struggling under the duress of the traditional threat landscape. However, it doesn’t have to be this way; Cloud applications and services can be adopted rapidly and securely as Info Security teams proactively build in security for users, devices and data. Please join Blue Coat as we discuss these new challenges and provide practical advice on how these issues can be safely overcome.

Trianon Complex
10:30am – 11:10am Break and Networking in the Sponsor Pavilion Rendezvous Trianon
11:10am – 11:30am “CISOs Off the Cuff”

In this interactive session with attendees, Summit Emcee Richard Warner will facilitate discussion on some of the top issues and challenges.

Trianon Complex
11:30am – 11:50am

“Securing Rogue File Sharing – Your Most Vulnerable Data Leak Threat Vector”

David Hart
Enterprise Account Sales
Accellion, Gold Sponsor
Read Bio

Insecure and unmanaged file sharing has proven to be one of the largest sources of data leaks. Yet, your employees have a genuine need for securely sharing documents with team members, partners, customers, suppliers, and other external parties. How do you enable the business to maintain speed and agility while providing the protection it needs and also meeting compliance requirements?

This presentation will discuss key best practices for secure file sharing including:
• The latest advancements in secure file sharing and collaboration
• Best practices for providing security without compromising productivity
• How to leverage investments in existing content systems

Trianon Complex
11:50am – 12:10pm

“Business Technologies for the Future”

Darin Mastricola
Vice President, IT Security and Compliance
Endurance Specialty Holdings Ltd.
Read Bio

Joel Rosenblatt
Director, Computer & Network Security
Columbia University
Read Bio

In this interview session, Darin Mastricola, VP of IT Security and Compliance at Endurance Specialty Holdings, along with Joel Rosenblatt, Director, Computer & Network Security at Columbia University, will share what they are doing to ensure they are positioned for success in the future by having the right technologies in place. This discussion, while not focused on vendor specific products, will focus on existing technologies that are viewed as being on the critical path to success and new technologies that have promise for the future.

Endurance Specialty Holdings Ltd. is a global specialty provider of property and casualty insurance and reinsurance. Through its operating subsidiaries, Endurance writes agriculture, casualty and other specialty, professional lines and property, marine and energy lines of insurance and catastrophe, property, casualty, professional lines and specialty lines of reinsurance.

Columbia University is one of the world’s most important centers of research and at the same time a distinctive and distinguished learning environment for undergraduates and graduate students in many scholarly and professional fields. The University recognizes the importance of its location in New York City and seeks to link its research and teaching to the vast resources of a great metropolis.

Trianon Complex
12:10pm – 12:30pm

Executive Briefing – “Email Security”

Neil Farquharson
Technology Evangelist
ZixCorp, Gold Sponsor
Read Bio

The recent highly public breaches has reminded us of the increasing importance of securing emails. Organizations need to be confident that the millions of emails leaving their network each day are protected where necessary, whether sent from a desktop or from a mobile device. Implementing secure email solutions should increase productivity and mitigate risk without creating employee frustration.
Join Neil Farquharson at ZixCorp for a discussion on trends and challenges they are seeing, and how organization are solving their most pressing secure email challenges.

Trianon Complex
12:30pm – 1:40pm Lunch and Networking in the Sponsor Pavilion Rendezvous Trianon
1:40pm – 2:00pm

“Game Changers – Driving Innovation”

Nashira Layade
Executive Director, Privacy & Information Security
Time Warner
Read Bio

In this session, Nashira Layade and other heads of information security, will discuss what they are doing to drive innovation at their organizations to help move their businesses forward and how they are approaching building an innovative culture to execute on their vision.

Time Warner Inc. is an American Multinational media and entertainment conglomerate that is currently the world’s third largest television networks and filmed TV & entertainment company in terms of revenue and one of the world’s largest media conglomerates.

Trianon Complex
2:00pm – 2:20pm

“Psychological Warfare: How Cyber Criminals Mess With People’s Minds”

Brian Henger
Regional Vice President
Malwarebytes, Gold Sponsor
Read Bio

Today’s cyber-attacks might utilize the most complex threat technology to date but much of the threat lies outside of the code. When attackers utilize a technological attack combined with psychology, similar to what advertisers use, their spread and effectiveness increases greatly. While most of the security industry is focusing on assisting both consumers and the enterprise from a technical stance, employing new monitoring systems and patching security holes, at the end of the day, the ultimate target for cyber criminals are users. We’ll discuss current attacks used by cyber criminals that employ both the latest in threat tech and social engineering tactics; why cyber criminals have put more stock in advertising and psychology than innovations in tech; and what options exist to protect users from these threats.

Trianon Complex
2:20pm – 4:15pm

Executive Roundtable Discussions with a Break and Debrief

Breakout sessions with your peers on topics determined by attendees during registration.

Topic 1: “Governance and the Cloud – Strategies for Confidence”

Robert MimsDana Thurston-Nuzzo
Group Information Security Officer & Senior Vice President
Citigroup
Read Bio

read more

Topic 2: “Security Awareness Training and Internal Threats – Where Impact Occurs”

Robert MimsMichael Lamberg
Vice President & Chief Information Security Officer
OpenLink Financial, LLC
Read Bio

read more

Topic 3: “Malware – The Challenge Continues”

Robert MimsJohn Michaels
Chief Technology Officer & Chief Information Security Officer
Maxim Group

read more

Topic 4: “A Mobile Security Strategy – Changes for the Future”

Robert MimsRaj Yadav
Director, Information Security
Thomson Reuters

read more

Topic 5: “The Acceleration of Cloud Security”

Robert MimsJoel Rosenblatt
Director, Computer & Network Security
Columbia University Business School

Read Bio

read more

Topic 6: “Vulnerability Management – Dealing with Increasing Complexities”

Robert MimsSarathi Yerra
Information Security Officer
MFA Financial Inc.

read more

Topic 7: “Information Security & the Business: Changing the Conversation”

Robert MimsJames Cusick
Chief Security Officer & Director IT Operations
Wolters Kluwer, CT Corporation
Read Bio

read more

Topic 8: “New Perspectives on Assessing and Maximizing Your Data Protection”

Robert MimsPreetam Sirur
Senior Director, IT Risk and Security
Standard & Poor’s Rating Services
Read Bio

read more


4:15pm – 4:25pm

Executive Briefing – “Security Beyond the Firewall”

Jeremy Major
Regional Sales Manager
OpenDNS now part of Cisco, Silver Sponsor


A decade ago, firewalls and antivirus software were enough to protect against infiltration, but today’s threats are stealthy and patient. Without a predictive security intelligence program, an organization lacks proactive defense and potentially compromises massive amounts of sensitive data. How can CISOs prevent, contain and inform on targeted attacks? How does a security team identify adversarial patterns once they’ve entered the network? We will lead a conversation on both old and new attack techniques, and how security approaches can leverage data to prevent attacks before they happen.

Trianon Complex
4:25pm – 4:40pm Closing Remarks Trianon Complex
4:40pm – 5:45pm Reception and Prize Drawings Rendezvous Trianon

Venue

Hilton New York, Avenue of the AmericasNew York Hilton Midtown
1335 Avenue of the Americas, New York, NY 10019
(212) 586-7000

Located in the heart of New York City, the Hilton New York is just steps away from New York’s premier attractions. Conveniently situated in Midtown Manhattan, the hotel is one of the most sophisticated New York hotels and is within walking distance of Times Square, Radio City Music Hall, Fifth Avenue shopping, the Broadway Theatre district, Central Park, The Museum of Modern Art (MOMA) and many more iconic New York landmarks.

Room Rate and How To Book

Hilton New York, Avenue of the AmericasSelect from a variety of modern, spacious guest rooms featuring on-demand entertainment and high-speed internet access. Upgrade to a suite and enjoy complimentary Executive Lounge access. This exquisite New York hotel provides a diverse choice of dining options.

We have negotiated a special rate at the New York Hilton Midtown for Summit attendees at $339.00 (regular rates are $359 and up per night). The deadline to receive the discount has been extended to Friday, March 25, 2016 and the room block is limited so reserve early.

To make reservations:
* Call the hotel at 212-586-7000, ask for Reservations, and reference the group discount code ALNCE.
* Book online using the special weblink by clicking here.

If you have any challenges, please email us at info@execalliance.com and include your room night needs and we will work with the hotel on your behalf.

Amenities

The hotel has a fitness center, business center, valet parking, onsite restaurants, and room service.

Parking

  • Self parking – Not Available
  • Valet parking – $55 standard, $67 SUV
  • Other Parking Information – Entrance located in back-W.53rd bet 6&7th Ave

Directions

On Avenue of the Americas (6th Ave.) between West 53rd and West 54th Streets. 53rd street is west bound and 54th street is east bound.  Laguardia is 8 miles, JFK is 17 miles, Newark is 15 miles, Grand Central station is 15 minutes across town, Penn Station is 15 minutes downtown and Port Authority is 10 minutes downtown.

View Larger Map

John F. Kennedy International Airport

  • Van Wyck Expressway North To Long Island Expressway (LIE) West and watch for signs to Queens Midtown Tunnel to 34th street . Go west across 34th street to Avenue of the Americas (6th Avenue).  Make a right and go up the Avenue to 53rd st.

Newark International Airport

  • Look for signs to New Jersey Turnpike (I-95 N) follow signs to Lincoln Tunnel, tunnel exits at west 40th street and 9th ave, drive east on 40th street to Avenue of the Americas and turn left on 53rd street.

La Guardia Airport

  • Grand Central Parkway to Brooklyn Queens Expressway South to Long Island Expressway West. Follow signs for Queens Midtown Tunnel to 34th Street . Take 34th Street West to Avenue of the Americas (6th Avenue). Make a right and go to 53rd st.

If you are interested in sponsoring our Summits, Symposium, or Custom Dinner Programs, please call Executive Alliance at 678-445-1919 or email us at info@execalliance.com.

Platinum Sponsor

spo_blueCoatAbout Blue Coat Systems

Blue Coat empowers enterprises to safely and securely choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets. Blue Coat has a long history of protecting organizations, their data and their employees and is the trusted brand to 15,000 customers worldwide, including 86 percent of the FORTUNE Global 500. With a robust portfolio of intellectual property anchored by more than 200 patents and patents pending, the company continues to drive innovations that assure business continuity, agility and governance.

Gold Sponsors

spo-accellionAbout Accellion

Accellion provides the leading mobile content platform that increases enterprise productivity and ensures data security and compliance. As the foremost provider of private cloud solutions for secure mobile content management, Accellion offers enterprise organizations the scalability, flexibility, control and security to enable a mobile workforce with the tools they need to create, access and share information securely, wherever work takes them. More than 12 million business users and 2,000 of the world’s leading corporations and government agencies use Accellion solutions to increase business productivity, protect intellectual property, ensure compliance and reduce IT costs. For more information, please visit www.accellion.com.

About Malwarebytes

Malwarebytes protects businesses against malicious threats that escape detection by traditional antivirus solutions. Malwarebytes Anti-Malware, the company’s flagship product, has a highly advanced heuristic detection engine that has removed more than five billion malicious threats from computers worldwide. SMBs and enterprise businesses worldwide trust Malwarebytes to protect their data. Founded in 2008, the company is headquartered in California with offices in Europe, and a global team of researchers and experts. For more information, please visit www.malwarebytes.com/business

ZixCorp-logoAbout ZixCorp

ZixCorp is a leader in email data protection. ZixCorp offers industry-leading email encryption, a unique email DLP solution and an innovative email BYOD solution to meet your company’s data protection and compliance needs. ZixCorp is trusted by the nation’s most influential institutions in healthcare, finance and government for easy to use secure email solutions. ZixCorp is publicly traded on the Nasdaq Global Market under the symbol ZIXI, and its headquarters are in Dallas, Texas. For more information, please visit www.zixcorp.com.

Silver Sponsors

spo-cloudpassageAbout CloudPassage

CloudPassage Halo® is the world’s leading agile security platform that empowers our customers to take full advantage of cloud infrastructure with the confidence that their critical business assets are protected. Halo delivers a comprehensive set of continuous security and compliance functions right where it counts — at the workload. Our platform orchestrates security on-demand, at any scale and works in any cloud or virtual infrastructure (private, public, hybrid or virtual data center). For more information, please visit www.cloudpassage.com.

spo-proofPointAbout OpenDNS

OpenDNS is a leading provider of network security and DNS services, enabling the world to connect to the Internet with confidence on any device, anywhere, anytime. The Umbrella cloud-delivered network security service blocks advanced attacks, as well as malware, botnets and phishing threats regardless of port, protocol or application. Its predictive intelligence uses machine learning to automate protection against emergent threats before they can reach customers. OpenDNS protects all devices globally without hardware to install or software to maintain. For more information, please visit: www.opendns.com.

Bronze Sponsors

spo-securityInnovationAbout Alert Logic

Alert Logic, the leader in security and compliance solutions for the cloud, provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Fully managed by a team of experts, the Alert Logic Security-as-a-Service solution provides network, system and web application protection immediately, wherever your IT infrastructure resides. Alert Logic partners with the leading cloud platforms and hosting providers to protect over 3,000 organizations worldwide. Built for cloud scale, our patented platform stores petabytes of data, analyzes over 450 million events and identifies over 60,000 security incidents each month, which are managed by our 24×7 Security Operations Center. Alert Logic, founded in 2002, is headquartered in Houston, Texas, with offices in Seattle, Dallas, Cardiff, Belfast and London. For more information, please visit www.alertlogic.com.

About BeyondTrust

BeyondTrust is a global cyber security company that believes preventing data breaches requires the right visibility to enable control over internal and external risks. We give you the visibility to confidently reduce risks and the control to take proactive, informed action against data breach threats. And because threats can come from anywhere, we built a platform that unifies the most effective technologies for addressing both internal and external risk: Privileged Account Management and Vulnerability Management. Our solutions grow with your needs, making sure you maintain control no matter where your company goes. BeyondTrust’s security solutions are trusted by over 4,000 customers worldwide, including half of the Fortune 100. To learn more about BeyondTrust, please visit www.beyondtrust.com.

spo-ForcpointAbout Forcepoint

Forcepoint safeguards users, data and networks against the most determined adversaries, from accidental or malicious insider threats to outside attackers, across the entire threat lifecycle. Forcepoint protects data everywhere – in the cloud, on the road, in the office – simplifying compliance and enabling better decision-making and more efficient remediation. Forcepoint empowers organizations to concentrate on what’s most important to them while automating routine security tasks. More than 22,000 organizations around the world rely on Forcepoint. Based in Austin, Texas, with worldwide sales, service, security laboratories and product development, Forcepoint is a joint venture of the Raytheon Company and Vista Equity Partners. For more information, please visit www.forcepoint.com.

spo-thales-esecurity.comAbout Thales e-Security

Thales e-Security is a leading global provider of trusted cryptographic solutions with a 40-year track record of protecting the world’s most sensitive applications and information. Thales solutions enhance privacy, trusted identities, and secure payments with certified, high performance encryption and digital signature technology for customers in a wide range of markets including financial services, high technology, manufacturing, and government. Thales e-Security has a worldwide support capability, with regional headquarters in the United States, United Kingdom, and Hong Kong. Visit www.thales-esecurity.com.

About Security Innovation

Security Innovation focuses on the most difficult IT Security problem, and the root cause of most data breaches — insecure software applications. For more than a decade, we’ve helped organizations build internal expertise, uncover critical vulnerabilities, and improve the process by which applications are built. The company’s solutions are based on the three pillars of a secure Software Development Lifecycle (SDLC), which feed into one another to create an ecosystem of repeatable, secure software development: Standards, Education, and Assessment. Our flagship products include TeamProfessor, the industry’s largest library of application security eLearning courses, and TeamMentor, “out of the box” secure development standards. For more information, please visit www.securityinnovation.com.

Wi-Fi Sponsor

spo-securityInnovationAbout SAINT

SAINT Corporation, a global leader in network security, offers the SAINT security suite including integrated vulnerability assessment, penetration testing, compliance reporting, and configuration assessment. Examine your network with the SAINT vulnerability scanner, and expose where an attacker could breach your network. Go to a higher level of visibility with penetration testing tools and exploit the vulnerability to prove its existence without a doubt. SAINT can help to –

• Manage and reduce security risks to your enterprise
• Document compliance with government and industry regulations like PCI, NERC, HIPAA, SOX, FISMA, and with internal policies.
• Emulate potential attackers with the suite of exploit tools.
• Perform configuration audits with policies defined by FDCC & USGCB.

SAINT software is available to download, as a cloud service (SAINTCloud), or preloaded on an appliance (SAINTbox). The software includes enterprise functionality; customizable dashboards and data analysis; and a friendly interface. For more information, visit www.saintcorporation.com

Summit Sponsors

Platinum Sponsor

Gold Sponsors

Silver Sponsors

Bronze Sponsors

Wi-Fi Sponsor

OTHER PAST PROGRAMS

Guest Feedback

The past two New York Summits have led to 15 follow-up meetings and helped to make our New York rep the top sales rep in...

Ed Adams, Chief Executive Officer, Security Innovation
VIEW MORE GUEST FEEDBACK IT Security Leaders

I was honored to participate in this Summit. I thought the candid discussions with senior security professionals was refreshing and informative.”...

Eric Yancy, Information Security Officer, GetThere
VIEW MORE GUEST FEEDBACK IT Security Leaders

Best one-on-one with both peers and solution providers. Also, perfect for one day of packed content....

Kevin McMahon, Sr. VP & Chief Compliance Officer, Calpine Corporation
VIEW MORE GUEST FEEDBACK IT Security Leaders

Excellent information sharing and networking....

Gary Toretti, Chief Information Security Officer, Sabre Corporation
VIEW MORE GUEST FEEDBACK IT Security Leaders

The EA Summits provide me with the opportunity to speak with peers that I can trust....

Scot Miller, VP & Chief Information Security Officer, HMS Healthcare
VIEW MORE GUEST FEEDBACK IT Security Leaders