The Security Leaders Summit

Where Industry Leaders Meet to Shape the Future
  • Home
  • /
  • Security Leaders Summit

The Security Leaders Summit Atlanta will be held on Wednesday, October 15, 2014 at The Ritz-Carlton, Buckhead. The Summit will bring together a community of senior IT executives for engaging peer-level interaction, discussions on new approaches to managing complexities in Information Security, and will provide opportunities to collaborate with leaders in the industry. Throughout the day, the Summit Hosts, representing companies across a diversity of industries and sizes, will share their insights and knowledge with the distinguished group of attendees through their presentations, interviews and breakout roundtable discussions.

OPENING KEYNOTE – “THE RISING VALUE OF THE CISO”


Matt Comyns
Global Co-Head of Cyber Security Practice
Russell Reynolds Associates

In the morning Opening Keynote, Matt Comyns, Global Co-Head of Cyber Security Practice and a leader in the Digital Transformation practice at Russell Reynolds Associates, will delve into the trends he is seeing in the role of the CISO of the future, the increasing value of the role to the business, the shift towards higher compensation to align with the increased value of the role, and his discussions with the C Suite. Matt will also share insights into what separates the top tier CISOs from the rest as companies look for a short list of leaders to hire. Russell Reynolds Associates is an executive leadership and search firm, serving clients globally for 45 years. The company advises clients on recruiting and retaining outstanding and impactful leaders.

Hosted by Executive Alliance, the Security Leaders Summits held across the country are attended by the most senior level technology executives from Fortune 500 and 1000 companies, government and education, and offer access and insight into the people leading these organizations. With titles of CISO, CIO, VP and Director attending the Summits, the discussions are focused on topics that are relevant and timely to the leadership challenges in today’s environment.

To REGISTER as our complimentary guest for the Security Leaders Summit, click here.

Hosts

The Security Leaders Summit Atlanta 2014 will be hosted by Information Security and IT Executives from across a variety of industries in the area. The Summit Hosts serve as the face of the Summit and throughout the day, they will share their insights during presentations, interactive sessions, and facilitate peer-to-peer executive roundtable discussions. The hosts to-date include:

MaddenS Alfred Barker
Chief Information Security Officer
University of North Georgia
Read Bio

MaddenS John Bruggemann
Chief Information Security Officer
GE Energy Management
Read Bio

MaddenS Matt Comyns
Global Co-Head of Cyber Security Practice
Russell Reynolds Associates
Read Bio

MaddenS Steve Dotson
Chief Information Security Officer
First Advantage Corporation

MaddenS Nicole Keaton
Senior Vice President, Identity and Access Management
SunTrust

MaddenS Paul Kleinschnitz
Senior Vice President, GM Cyber-security Solutions
First Data Corporation
Read Bio

MaddenS Robert Mims
Managing Director, Chief Information Security Officer
AGL Resources
Read Bio

Time Description
7:30am – 8:40am Registration Opens with Breakfast Buffet and Networking in the Sponsor Pavilion Gallery
8:40am – 9:00am Welcome and Opening Remarks Plaza Ballroom
9:00am – 9:25am

“Opening Keynote – The Rising Value of the CISO”

Geoff AranoffMatt Comyns
Global Co-Head of Cyber Security Practice
Russell Reynolds Associates
Read Bio

In the morning Opening Keynote, Matt Comyns, Global Co-Head of the Cyber Security Practice and a leader in the Digital Transformation practice at Russell Reynolds Associates, will delve into the trends he is seeing in the role of the CISO of the future, the increasing value of the role to the business, the shift towards higher compensation to align with the increased value of the role, and his discussions with the C Suite. Matt will also share insights into what separates the top tier CISOs from the rest as companies look for a short list of leaders to hire. Russell Reynolds Associates is an executive leadership and search firm, serving clients globally for 45 years. The company advises clients on recruiting and retaining outstanding and impactful leaders.

Plaza Ballroom
9:25am – 9:55am

Insights & Interviews – “Are Payments Ever Safe? What You Need to Know to Protect Your Business.”

Elliott GlazerPaul Kleinschnitz
Senior Vice President, GM Cyber-security Solutions
First Data Corporation
Read Bio

We’ve all seen the news. Another business hacked, another strain of malware exposed. The continued success of these cyber-actors is fueling costs – in business recovery and in reputation — that just seem to escalate, and it just seems endless. What’s a business to do? In this interview session, Paul Kleinschnitz, Senior Vice President, GM Cyber-security Solutions at First Data Corporation will moderate a session with other heads of information security and will review payment security: what you need to know, and what leading businesses are doing to safeguard their customers’ data. Find out more about how these hacks occur, and what encryption and tokenization can do to mitigate risk. Learn what you need to do to defend against cyber-actors, and to take a proactive stance in your own protection. Hear from business leaders about how they are approaching the questions of risk mitigation, and internalize their experiences as your own.

Plaza Ballroom
9:55am – 10:25am

Executive Briefing – “One Day Wonders…How Cyber Criminals Are Hiding in Plain Sight…”

Geoff AranoffGrant Asplund
Director of Evangelism
Blue Coat, Platinum Sponsor
Read Bio

Over a 90 day period, of the 660M new Hostnames, 470M existed 24 hours or less. While most of these are legitimate and exist to deliver a better user experience, there is a darker side. Of the top 50 domains responsible for these ‘one-day-wonders’ fully 22% were identified as malicious. This tactic is popular with cyber criminals because they 1.) Keep security solutions guessing since dynamic domains are harder to thwart than static domains. 2.) Overwhelm security solutions by generating a high volume of domains increasing the chances some percentage will be missing security controls and 3.) Hide from security solutions simply by combining ‘one-day-wonders’ with encryption and running incoming malware and/or outgoing data theft over SSL.

This presentation will discuss:
• Why organizations should utilize security controls with real-time global intelligence in order to identify One-Day-Wonders
• Why organizations should have solutions in place that comprehensively assess and assign a risk value based on multiple factors including context around domains, IP address, site popularity
• The need for a baseline of hostnames for rapid detection of anomalies
• Highly granular policy controls must include detailed policy creation, threat risk levels and hostname baselines to help automate defenses and fortify security postures
• Why ETM (Encrypted Traffic Management) is rapidly becoming a top priority for enterprises in order to expose vulnerabilities and risks as a result of the significant increase in use of SSL

Plaza Ballroom
10:25am – 10:55am Break and Networking in the Sponsor Pavilion Gallery
10:55am – 11:00am Transition to Ballroom
11:00am – 11:25am

“Game Changers – Leadership Challenges”

ZandoliSSteve Dotson
Chief Information Security Officer
First Advantage Corporation

ZandoliSNicole Keaton
Senior Vice President, Identity and Access Management
SunTrust

ZandoliSRobert Mims
Managing Director, Chief Information Security Officer
AGL Resources
Read Bio

In this interview session, Nicole Keaton, Senior Vice President, Identity and Access Management of SunTrust, will facilitate discussions with Steve Dotson, Chief Information Security Officer of First Advantage Corporation, and Rob Mims, Chief Information Security Officer of AGL Resources, on how they are moving their organizations to the next level, partnering better with the business, and enabling employees to truly be part of a borderless enterprise.

Plaza Ballroom
11:25am – 11:55am

Trends, Drivers and Impacts – “IBM Threat Research and the Cyber Security Index”

Geoff AranoffNick W. Bradley
Practice Lead, Threat Intelligence and Analysis Office of Special Security Intelligence Development (OSSID)
IBM, Platinum Sponsor
Read Bio

The IBM Managed Security Services Threat Research Group, led by Nick Bradley, is a small hand picked group of IBM senior threat analysts and researchers who comb through enormous amounts of data looking for the latest and greatest threats. IBM Managed Security Services continuously monitors billions of events per year, as reported by nearly 1,000 of our clients in 133 countries. In these events, attacks, and incidents are the puzzle pieces that tell us what is happening and what might soon be happening on the threat landscape. This group provides research papers on these items of interest and also provides mitigation methods, if available, for those threats. Additionally, this team publishes the IBM Cyber Security Index which is a high-level overview of the major threats trending across businesses worldwide over the past year.

Plaza Ballroom
11:55am – 12:10pm

CIO Discussions – “Off the Cuff”

In this interview session, CIOs will provide their input into where the role of the information security officer is headed and insights into where they see challenges and successes for the security organization.

Plaza Ballroom
12:10pm – 1:00pm Lunch in the Sponsor Pavilion Gallery
1:00pm – 1:10pm Transition to Ballroom
1:10pm – 1:30pm

Executive Briefing – “Increasing Mobile Productivity While Protecting Enterprise Data”

Geoff AranoffPatrick J. Conte
Senior Vice President & General Manager, Worldwide Field Operations
Accellion, Gold Sponsor
Read Bio

The need for mobile productivity is transforming the way enterprises do business. Employees need the ability to edit and create documents, access information that is stored in ECM systems, or share files with co-workers – all from their mobile devices. They need to be as productive away from the office as they are at their desks. Implementing a BYOD policy can help increase mobile productivity, as teams work whenever and wherever they prefer. However, to ensure the security of files and enterprise data, organizations need to carefully select technology that enables this policy. This session will explore how to enable mobile productivity to increase efficiencies, while keeping files secure and mitigating compliance risks.

Plaza Ballroom
1:30pm – 2:00pm

Trends, Drivers and Impacts

An update on some of the most important trends, their drivers and expected impacts.

Plaza Ballroom
2:00pm – 3:00pm

Executive Roundtable Discussions Facilitated by Summit Hosts

Breakout sessions with your peers on topics determined by attendees during registration. The topics are facilitated by the Summit Hosts.

Plaza Ballroom
3:00pm – 3:15pm Break
3:10pm – 4:15pm

2nd Rotation of Executive Roundtable Discussions Facilitated by Summit Hosts

Breakout sessions continue as attendees move to another topic for discussion with their peers. At the end of the 2nd rotation, a debrief of the discussions on each of the topics will be provided by the Summit Hosts.

Plaza Ballroom
4:15pm – 4:30pm Closing Remarks Plaza Ballroom
4:30pm – 5:30pm Reception in the Sponsor Pavilion with Prize Drawings Gallery

Venue

InterContinentalHotel-Buckhead-exteriorLuxury hotel in Buckhead, Atlanta defines comfort and elegance.

Surround yourself with an irresistible combination of Southern hospitality and smart sophistication at The Ritz-Carlton, Buckhead, one of the most ideally located Buckhead luxury hotels offering effortless access to the city’s finest shopping, dining and entertainment establishments. Here, you can experience traditions both timeless and new that leave indelible memories. Celebrate a superb day of shopping with high tea by the fireplace. Join our sommelier every Friday for a wine tasting at our communal table in The Café. Retreat to the Spa Level for a day of unrivaled pampering. Share these unforgettable moments and others in our guest memory books, located in the lobby and in the Club Lounge.

Renowned as an Atlanta social hub with exquisite dining, beautiful ballrooms and the most luxurious hotel accommodations in the city, The Ritz-Carlton, Buckhead features:

  • 510 elegantly appointed guest rooms, including 56 suites featuring bay window views of the city’s skyline
  • More than 23,000 square feet of function and meeting space, including two ballrooms
  • Convenient access to prestigious Buckhead shopping, cultural attractions and more
  • Close proximity to MARTA mass transit (Take North Line, Exit Buckhead Station, N7)

Amenities

InterContinentalHotel-Buckhead-poolThe hotel has a spa, fitness center, indoor saline pool, dry cleaning and laundry services, business center, valet and self-parking, onsite restaurants, and 24 hour in-room dining.

Room Rate and How To Book

InterContinentalHotel-Buckhead-room

We have negotiated a special rate at the Ritz Carlton Buckhead for Summit attendees of $219.00 night (regular rates begin at $469 night). The room block is limited so reserve early. The deadline for the discount is 9/22/14.

To make your reservations please call 1-800-826-0708 and use the group name of Executive Alliance.

To reserve online, visit: http://www.ritzcarlton.com/en/Properties/Buckhead/Default.htm and use the group code: EAIEAIA

Directions

The Ritz-Carlton, Buckhead
3434 Peachtree Road, N.E., Atlanta, Georgia 30326
Phone:(404) 237-2700
http://www.ritzcarlton.com/en/Properties/Buckhead/Default.htm

Directions From Hartsfield-Jackson International Airport (Domestic Terminal)

Take I-85 North
I-75 and I-85 will merge approaching downtown and then split (the HOV lane is shared for both 75 & 85 North)
Stay on I-85 North (the three left lanes)
Take GA 400 North to Buckhead, Exit #87
Continue to Exit #2, “Lenox-Buckhead”
Turn right at the end of the ramp
Follow signs for Peachtree Road (141) South
Continue through first stoplight
Hotel is the first building on the right after the first stoplight; turn right into the entrance before the next stoplight

Directions From Chattanooga, Tennessee

Take I-75 South to Atlanta
Take Exit #255 “West Paces Ferry Road” and turn left onto West Paces Ferry Road
Continue three miles and go through the Peachtree Road intersection
Take the first left after Peachtree Road onto Bolling Way, then right onto Peachtree Road
Continue North on Peachtree Road approximately one mile (Lenox Square will be on the right and the Monarch Plaza office building on the left)
Turn left at the stoplight, then take a right and follow the drive to the hotel Porte cochere

Directions From Birmingham, Alabama

Take I-20 to Atlanta
Follow the signs to I-85 North through downtown Atlanta
I-75 and I-85 will merge approaching downtown and then split (the HOV lane is shared for both 75 & 85 North)
Stay on I-85 North (the three left lanes)
Take Georgia 400 North to Buckhead (Exit #87)
Continue to Exit #2 “Lenox-Buckhead”
Turn right at the end of the ramp
Follow signs for Peachtree Road South
Hotel is the first building on the right after the first stoplight; turn right into the entrance before the next stoplight

Directions From Greenville, South Carolina

Take I-85 South to Atlanta
Take Exit #88 “Lenox Road,” and turn right onto Lenox Road
Stay on Lenox Road for approximately two miles to Peachtree Road
Turn left on Peachtree Road, then right at the stoplight
Take another right and follow the drive to the hotel Porte cochere

Parking

Valet parking at the hotel is available at a special day rate of $16.

If you are interested in sponsoring the event or would like more information about sponsor packages, please call 678-445-1919 or email us at info@execalliance.com.

Platinum Sponsor

spo_blueCoatAbout Blue Coat Systems

Blue Coat empowers enterprises to safely and securely choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets. Blue Coat has a long history of protecting organizations, their data and their employees and is the trusted brand to 15,000 customers worldwide, including 86 percent of the FORTUNE Global 500. With a robust portfolio of intellectual property anchored by more than 200 patents and patents pending, the company continues to drive innovations that assure business continuity, agility and governance.

spo_ibmAbout IBM

With more than 40 years of security experience, IBM is helping clients take a broad, holistic view of security intelligence across their entire business. IBM has worldwide research labs developing the latest security technology innovations and delivering them across nine global security operation centers to help clients maintain an appropriate security posture. IBM Managed Security Services delivers the expertise, tools and infrastructure clients need to secure their business and information assets from constant Internet attacks, often at a fraction of the cost of in-house security resources. For more information on IBM Security Services, please visit: www.ibm.com/services/security

Gold Sponsors

spo-accellionAbout Accellion

Accellion provides mobile solutions to enterprise organizations to enable increased business productivity while ensuring data security and compliance. As the leading provider of private cloud solutions for secure file sharing, Accellion offers enterprise organizations the scalability, flexibility, control and security to enable a mobile workforce with the tools they need to create, access and share information securely, wherever work takes them. More than 12 million users and 2,000 of the world’s leading corporations and government agencies use Accellion solutions to increase business productivity, protect intellectual property, ensure compliance and reduce IT costs. For additional information visit www.accellion.com.

ZixCorp-logoAbout ZixCorp

ZixCorp is a leader in email data protection. ZixCorp offers industry-leading email encryption, a unique email DLP solution and an innovative email BYOD solution to meet your company’s data protection and compliance needs. ZixCorp is trusted by the nation’s most influential institutions in healthcare, finance and government for easy to use secure email solutions. ZixCorp is publicly traded on the Nasdaq Global Market under the symbol ZIXI, and its headquarters are in Dallas, Texas. For more information, visit www.zixcorp.com.

Bronze Sponsors

spo-impervaAbout Imperva

Imperva, pioneering the third pillar of enterprise security, fills the gaps in endpoint and network security by directly protecting high-value applications and data assets in physical and virtual data centers. With an integrated security platform built specifically for modern threats, Imperva data center security provides the visibility and control needed to neutralize attack, theft, and fraud from inside and outside the organization, mitigate risk, and streamline compliance. Over 3,000 customers in more than 75 countries rely on our SecureSphere® platform to safeguard their business. Imperva is headquartered in Redwood Shores, California. Learn more: www.imperva.com, our blog, on Twitter.

spo-securityInnovationAbout Security Innovation

Security Innovation focuses on the most difficult IT Security problem, and the root cause of most data breaches — insecure software applications. For more than a decade, we’ve helped organizations build internal expertise, uncover critical vulnerabilities, and improve the process by which applications are built. The company’s solutions are based on the three pillars of a secure Software Development Lifecycle (SDLC), which feed into one another to create an ecosystem of repeatable, secure software development: Standards, Education, and Assessment. Our flagship products include TeamProfessor, the industry’s largest library of application security eLearning courses, and TeamMentor, “out of the box” secure development standards.

Guest Feedback

I had a great time meeting with colleagues and covering relevant topics to our disciplines. I met the right vendors and was able to...

Dan Reynolds, VP, Chief of Security & Information Architecture, Omnicom Media Group
VIEW MORE GUEST FEEDBACK IT Security Leaders

This National Security leaders Symposium is a great opportunity to review best practices across the industry, evaluate some of the latest technologies and solutions from...

James Beeson, Chief Information Security Officer, GE Capital Americas
VIEW MORE GUEST FEEDBACK IT Security Leaders

As Cyberthreat is the number one threat, it is everyone’s responsibility to educate themselves to protect us from cyberwar. ...

Raj Patel, Chief Information Security Officer, City of Palo Alto
VIEW MORE GUEST FEEDBACK IT Security Leaders

I look forward to the Executive Alliance event each year. The agenda provides a variety of topics and formats that generate stimulating conversations that I...

Darin Mastricola, AVP, IT Risk, Security, and Compliance, Endurance Services Ltd.
VIEW MORE GUEST FEEDBACK IT Security Leaders