The Security Leaders Summit

Where Industry Leaders Meet to Shape the Future
  • Home
  • /
  • Security Leaders Summit

The Security Leaders Summit Atlanta was held on Wednesday, October 15, 2014 at The Ritz-Carlton, Buckhead. With feedback that included “This was an outstanding event in terms of the ability to meet with my peers in the community,” and “The content was on target and had the right mix executives and expertise from the vendors,” the Summit brought together a community of senior IT executives for engaging peer-level interaction and discussions on new approaches to managing complexities in Information Security. Throughout the day, the Summit Hosts, representing companies across a diversity of industries and sizes, shared their insights and knowledge with the distinguished group of attendees through their presentations, interviews and breakout roundtable discussions.

Summit Recap

To a capacity crowd, Matt Comyns, Global Co-Head of the Cyber Security Practice and a leader in the Digital Transformation practice at Russell Reynolds Associates, provided the opening Keynote on “The Rising Value of the CISO.” Matt shared insights into the increased responsibilities being asked of CISOs, the expanded skill sets needed to be successful, compensation packages and their worth, and best practices for nailing job interviews.

In the Executive Briefing, “One Day Wonders…How Cyber Criminals Are Hiding in Plain Sight…” Grant Asplund, Director of Evangelism at Blue Coat Systems, Summit Platinum Sponsor, shared some of the latest trends that are highlighting the increased need for real time global intelligence. In his presentation, Grant discussed the need for organizations to utilize security controls with real-time global intelligence and have solutions in place that comprehensively assess and assign a risk value.

In the session, “Insights & Interviews – Are Payments Ever Safe? What You Need to Know to Protect Your Business,” Summit Emcee, interviewed Paul Kleinschnitz, Senior Vice President, GM Cyber-security Solutions at First Data Corporation on the trends in the payment industry relative to security, what leading businesses are doing to safeguard their customers’ data and how his organization is taking a proactive stance towards cyber threats.

During the morning break, guests had a chance to reconnect.

Nick W. Bradley, Practice Lead, Threat Intelligence and Analysis Office of Special Security Intelligence Development at IBM, Platinum Sponsor, presented on the latest findings from The IBM Managed Security Services Threat Research Group, which he leads. After the presentation, Nick fielded questions on specific industries under attack and trends for the future. View the latest research report at IBM XForce Threat Intelligence Quarterly 3Q2014

In the interview session, Leadership Challenges, Nicole Keaton, Senior Vice President, Identity and Access Management of SunTrust, Steve Dotson, Chief Information Security Officer of First Advantage Corporation, and >strong>Rob Mims, Chief Information Security Officer of AGL Resources, discussed how they are moving their organizations to the next level, partnering better with the business, and what they believe are the most critical areas for a CISO to consider for the future.

Geoff Bibby, Vice President, Corporate Marketing at ZixCorp, Gold Sponsor provided an Executive Briefing on “BYOD: A Fresh Perspective-Avoid a Bring-Your-Own-DISASTER Scenario.” Geoff provided insights into recent survey results on how employees are using their phones, disabling auto-lock security, stats on employees following policies, and the increasing number of personal devices in the workplace. During his presentation, Geoff focused on the move to BYOD security by managing access versus devices.

Patrick Conte, Senior Vice President & General Manager, Worldwide Field Operations at Accellion, Gold Sponsor, kicked off the afternoon session with a presentation on “Increasing Mobile Productivity While Protecting Enterprise Data.” Pat shared insights on how the need for mobile productivity is transforming the way enterprises do business. Implementing a BYOD policy can help increase mobile productivity, as teams work whenever and wherever they prefer, while still be able to keep files secure and mitigate compliance risks.

Darryl Defendorf, Senior Director, IT Risk Management & Compliance at McKesson Corporation and Eli Phetteplace, Senior Head of Enterprise Data at The Weather Company shared their insights in the interview session, “Talent for the Future – A Looming Crisis?” into how the roles of a security organization are evolving, the skills they see needed for the future, the shortfall the industry is facing, and what they are doing to build talent from within.

The afternoon Executive Roundtables set the stage for peer-to-peer discussions across a range of different topics. Summit Hosts facilitating the roundtable discussions included Scott Barronton, Vice President Security Risk Programs at Equifax, John Bruggemann, Chief Information Security Officer of GE Energy Management, Alfred Barker, Chief Information Security Officer at University of North Georgia, Gram Ludlow, Information Risk Management of The Coca-Cola Company, Brian Phillips, Director, Information Security at Macy’s, and Antonio Andrews, Divisional Chief Information Security Officer of General Motors.

After the first hour, guests had the opportunity to choose a second topic for discussion with their peers.

The Security Leaders Summit in Atlanta wrapped up with an afternoon reception and the opportunity to continue discussions.

Be sure to visit the Photo Gallery.

Platinum Sponsors

Blue Coat Systems

Blue Coat empowers enterprises to safely and securely choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets. Blue Coat has a long history of protecting organizations, their data and their employees and is the trusted brand to 15,000 customers worldwide, including 86 percent of the FORTUNE Global 500. With a robust portfolio of intellectual property anchored by more than 200 patents and patents pending, the company continues to drive innovations that assure business continuity, agility and governance.

For additional information, please visit: www.bluecoat.com or contact Deborah.jagoe@bluecoat.com

IBM

IBM would like to thank you for attending the 2014 Executive Alliance Atlanta Security Leaders Summit. Executive Alliance continues to organize fantastic events where security leaders across all enterprises and industries can discuss recent trends and concerns. At IBM, we understand your concerns. In fact, we are the world’s largest security firm with over 4,000 consultants and 10 security operations centers worldwide to support our customers and help prevent them from becoming the next headline. Speaking of our security operations centers, each quarter our research team, the IBM X-Force, publishes a threat intelligence report which highlights risks and trends. We’ve attached it for you to review as well as a map of our dedicated sales team. Also, earlier this year, IBM and the Ponemon Institute published “The Cost of a Data Breach Study.” Since then, we’ve developed a tool to help organizations determine the impact a data breach. You may access that tool here.

Should you have any questions, please feel free to call or e-mail the contact on the map that covers your region. We hope you enjoy the report and the data breach calculator and again, thanks for attending the event.
IBM XForce Threat Intelligence Quarterly 3Q2014

Gold Sponsors

Accellion

Accellion provides mobile solutions to enterprise organizations to enable increased business productivity while ensuring data security and compliance. As the leading provider of private cloud solutions for secure file sharing, Accellion offers enterprise organizations the scalability, flexibility, control and security to enable a mobile workforce with the tools they need to create, access and share information securely, wherever work takes them. More than 12 million users and 2,000 of the world’s leading corporations and government agencies use Accellion solutions to increase business productivity, protect intellectual property, ensure compliance and reduce IT costs. For more information please visit: www.accellion.com or call 650-485-4300.
Information for Downloads
kiteworks™ by Accellion Solution Overview
kiteworks Content Connectors
kiteworks Mobile Apps
kiteworks Private Cloud Deployments

Zix Corporation

ZixCorp is a leader in email data protection. ZixCorp offers industry-leading email encryption, a unique email DLP solution and an innovative email BYOD solution to meet your company’s data protection and compliance needs. ZixCorp is trusted by the nation’s most influential institutions in healthcare, finance and government for easy to use secure email solutions. ZixCorp is publicly traded on the Nasdaq Global Market under the symbol ZIXI, and its headquarters are in Dallas, Texas.

For more information, visit zixcorp.com and Zip Corporation BYOD.

Bronze Sponsors

AirWatch by VMware

AirWatch by VMware is the leader in enterprise mobility management, with more than 10,000 global customers. The AirWatch platform includes industry-leading mobile device, email, application, content, and browser management solutions. Acquired by VMware in February 2014, AirWatch is based in Atlanta and can be found online at http://www.air-watch.com/

Imperva

Imperva, pioneering the third pillar of enterprise security, fills the gaps in endpoint and network security by directly protecting high-value applications and data assets in physical and virtual data centers. With an integrated security platform built specifically for modern threats, Imperva data center security provides the visibility and control needed to neutralize attack, theft, and fraud from inside and outside the organization, mitigate risk, and streamline compliance. Over 3,000 customers in more than 75 countries rely on our SecureSphere® platform to safeguard their business. Imperva is headquartered in Redwood Shores, California. Learn more: www.imperva.com, our blog, on Twitter.

For more information download:Imperva Company Overview
Or contact: Paula Moeller, Regional Sales Manager, paula.moeller@imperva.com, (678) 353-6512
Chris Jacob, Regional Sales Manager, SLED, chris.jacob@imperva.com, (678) 548-2901

Security Innovation

Security Innovation focuses on the most difficult IT Security problem, and the root cause of most data breaches — insecure software applications. For more than a decade, we’ve helped organizations build internal expertise, uncover critical vulnerabilities, and improve the process by which applications are built. The company’s solutions are based on the three pillars of a secure Software Development Lifecycle (SDLC), which feed into one another to create an ecosystem of repeatable, secure software development: Standards, Education, and Assessment. Our flagship products include TeamProfessor, the industry’s largest library of application security eLearning courses, and TeamMentor, “out of the box” secure development standards.

For more information visit: https://www.securityinnovation.com/

Hosts

The Security Leaders Summit Atlanta 2014 was hosted by Information Security and IT Executives from across a variety of industries in the area. The Summit Hosts served as the face of the Summit and throughout the day, they shared their insights during presentations, interactive sessions, and facilitate peer-to-peer executive roundtable discussions. The hosts included:

MaddenS Antonio Andrews
Divisional Chief Information Security Officer
General Motors
Read Bio

MaddenS Alfred Barker
Chief Information Security Officer
University of North Georgia
Read Bio

MaddenS Scott Barronton
Vice President, Security Risk Programs
Equifax
Read Bio

MaddenS John Bruggemann
Chief Information Security Officer
GE Energy Management
Read Bio

MaddenS Matt Comyns
Global Co-Head of Cyber Security Practice
Russell Reynolds Associates
Read Bio

Darryl Defendorf
Darryl Defendorf
Senior Director, IT Risk Mgmt & Compliance
McKesson
Read Bio

MaddenS Steve Dotson
Chief Information Security Officer
First Advantage Corporation
Read Bio

MaddenS Nicole Keaton
Senior Vice President, Identity and Access Management
SunTrust
Read Bio

MaddenS Paul Kleinschnitz
Senior Vice President, GM Cyber-security Solutions
First Data Corporation
Read Bio

MaddenS Gram Ludlow
Information Risk Management
The Coca-Cola Company
Read Bio

MaddenS Robert Mims
Managing Director, Chief Information Security Officer
AGL Resources
Read Bio

MaddenS Eli Phetteplace
Director Enterprise Data
The Weather Company
Read Bio

MaddenS Brian Phillips
Director, Information Security
Macy’s, Inc.
Read Bio

Time Description
7:30am – 8:40am Registration Opens with Breakfast Buffet and Networking in the Sponsor Pavilion Gallery
8:40am – 9:00am Welcome and Opening Remarks Plaza Ballroom
9:00am – 9:25am

“Opening Keynote – The Rising Value of the CISO”

Geoff AranoffMatt Comyns
Global Co-Head of Cyber Security Practice
Russell Reynolds Associates
Read Bio

In the morning Opening Keynote, Matt Comyns, Global Co-Head of the Cyber Security Practice and a leader in the Digital Transformation practice at Russell Reynolds Associates, will delve into the trends he is seeing in the role of the CISO of the future, the increasing value of the role to the business, the shift towards higher compensation to align with the increased value of the role, and his discussions with the C Suite. Matt will also share insights into what separates the top tier CISOs from the rest as companies look for a short list of leaders to hire. Russell Reynolds Associates is an executive leadership and search firm, serving clients globally for 45 years. The company advises clients on recruiting and retaining outstanding and impactful leaders.

Plaza Ballroom
9:25am – 9:55am

Executive Briefing – “One Day Wonders…How Cyber Criminals Are Hiding in Plain Sight…”

Geoff AranoffGrant Asplund
Director of Evangelism
Blue Coat, Platinum Sponsor
Read Bio

Over a 90 day period, of the 660M new Hostnames, 470M existed 24 hours or less. While most of these are legitimate and exist to deliver a better user experience, there is a darker side. Of the top 50 domains responsible for these ‘one-day-wonders’ fully 22% were identified as malicious. This tactic is popular with cyber criminals because they 1.) Keep security solutions guessing since dynamic domains are harder to thwart than static domains. 2.) Overwhelm security solutions by generating a high volume of domains increasing the chances some percentage will be missing security controls and 3.) Hide from security solutions simply by combining ‘one-day-wonders’ with encryption and running incoming malware and/or outgoing data theft over SSL.

This presentation will discuss:
• Why organizations should utilize security controls with real-time global intelligence in order to identify One-Day-Wonders
• Why organizations should have solutions in place that comprehensively assess and assign a risk value based on multiple factors including context around domains, IP address, site popularity
• The need for a baseline of hostnames for rapid detection of anomalies
• Highly granular policy controls must include detailed policy creation, threat risk levels and hostname baselines to help automate defenses and fortify security postures
• Why ETM (Encrypted Traffic Management) is rapidly becoming a top priority for enterprises in order to expose vulnerabilities and risks as a result of the significant increase in use of SSL

Plaza Ballroom
9:55am – 10:20am

Insights & Interviews – “Are Payments Ever Safe? What You Need to Know to Protect Your Business.”

Elliott GlazerPaul Kleinschnitz
Senior Vice President, GM Cyber-security Solutions
First Data Corporation
Read Bio

We’ve all seen the news. Another business hacked, another strain of malware exposed. The continued success of these cyber-actors is fueling costs – in business recovery and in reputation — that just seem to escalate, and it just seems endless. What’s a business to do? In this interview session, Richard Warner, Summit Emcee, will interview Paul Kleinschnitz, Senior Vice President, GM Cyber-security Solutions at First Data Corporation on payment security: what you need to know and what leading businesses are doing to safeguard their customers’ data. Find out more about how these hacks occur, and what encryption and tokenization can do to mitigate risk. Learn what you need to do to defend against cyber-actors, and to take a proactive stance in your own protection. Hear from business leaders about how they are approaching the questions of risk mitigation, and internalize their experiences as your own.

Plaza Ballroom
10:20am – 10:50am Break and Networking in the Sponsor Pavilion Gallery
10:50am – 10:55am Transition to Ballroom
10:55am – 11:25am

Trends, Drivers and Impacts – “IBM Threat Research and the Cyber Security Index”

Geoff AranoffNick W. Bradley
Practice Lead, Threat Intelligence and Analysis Office of Special Security Intelligence Development (OSSID)
IBM, Platinum Sponsor
Read Bio

The IBM Managed Security Services Threat Research Group, led by Nick Bradley, is a small hand picked group of IBM senior threat analysts and researchers who comb through enormous amounts of data looking for the latest and greatest threats. IBM Managed Security Services continuously monitors billions of events per year, as reported by nearly 1,000 of our clients in 133 countries. In these events, attacks, and incidents are the puzzle pieces that tell us what is happening and what might soon be happening on the threat landscape. This group provides research papers on these items of interest and also provides mitigation methods, if available, for those threats. Additionally, this team publishes the IBM Cyber Security Index which is a high-level overview of the major threats trending across businesses worldwide over the past year.

Plaza Ballroom
11:25am – 11:55am

“Game Changers – Leadership Challenges”

ZandoliSSteve Dotson
Chief Information Security Officer
First Advantage Corporation
Read Bio

ZandoliSNicole Keaton
Senior Vice President, Identity and Access Management
SunTrust
Read Bio

ZandoliSRobert Mims
Managing Director, Chief Information Security Officer
AGL Resources
Read Bio

In this interview session, Nicole Keaton, Senior Vice President, Identity and Access Management of SunTrust, will facilitate discussions with Steve Dotson, Chief Information Security Officer of First Advantage Corporation, and Rob Mims, Chief Information Security Officer of AGL Resources, on how they are moving their organizations to the next level, partnering better with the business, and enabling employees to truly be part of a borderless enterprise.

Plaza Ballroom
11:55am – 12:15pm

Executive Briefing : “BYOD: A Fresh Perspective – Avoid a Bring-Your-Own-DISASTER Scenario”

Elliott GlazerGeoff Bibby
Vice President, Corporate Marketing
ZixCorp, Gold Sponsor
Read Bio

Your users are bringing their own devices – and potentially a variety of security, legal and HR disasters – to and from work. With many unique roles and responsibilities within your organization, there are a variety of use cases related to BYOD. Join mobile security experts from ZixCorp for real-world use cases and solutions to solve your most pressing BYOD challenges.

Plaza Ballroom
12:15pm – 1:00pm Lunch in the Sponsor Pavilion Gallery
1:00pm – 1:10pm Transition to Ballroom
1:10pm – 1:30pm

Executive Briefing – “Increasing Mobile Productivity While Protecting Enterprise Data”

Geoff AranoffPatrick J. Conte
Senior Vice President & General Manager, Worldwide Field Operations
Accellion, Gold Sponsor
Read Bio

The need for mobile productivity is transforming the way enterprises do business. Employees need the ability to edit and create documents, access information that is stored in ECM systems, or share files with co-workers – all from their mobile devices. They need to be as productive away from the office as they are at their desks. Implementing a BYOD policy can help increase mobile productivity, as teams work whenever and wherever they prefer. However, to ensure the security of files and enterprise data, organizations need to carefully select technology that enables this policy. This session will explore how to enable mobile productivity to increase efficiencies, while keeping files secure and mitigating compliance risks.

Plaza Ballroom
1:30pm – 2:00pm

“Talent for the Future – A Looming Crisis?”

HibbsSDarryl Defendorf
Senior Director, IT Risk Mgmt & Compliance
McKesson
Read Bio

ZandoliSEli Phetteplace
Head of Enterprise Data
The Weather Company
Read Bio

The demand for information security people that are qualified far surpasses the supply. Surveys reflect that more than half of security professionals and business execs say there is not enough talent to handle their companies’ security needs. In this session, Darryl Defendorf, Senior Director, IT Risk Mgmt & Compliance at McKesson and Eli Phetteplace, Head of Enterprise Data at The Weather Company, share their insights into how the roles of a security organization are evolving, the skills they see needed for the future, what they are doing to build talent from within, and as a leader, the new skills they need to be developing.

Plaza Ballroom
2:00pm – 3:00pm

Executive Roundtable Discussions Facilitated by Summit Hosts

Breakout sessions with your peers on topics determined by attendees during registration. The topics are facilitated by the Summit Hosts.

Topic 1: Information Security’s Strategic Value to the Business

Robert MimsScott Barronton
Vice President, Security Risk Programs
Equifax
Read Bio

read more

Topic 2: The True Cost of Data Loss Prevention

Robert MimsJohn Bruggemann
Chief Information Security Officer
GE Energy Management
Read Bio

read more

Topic 3: Information Security Governance and Compliance

Robert MimsAlfred Barker
Chief Information Security Officer
University of North Georgia
Read Bio

read more

Topic 4: Leveraging the Cloud for Business Agility While Managing Risks

Robert MimsGram Ludlow
Information Risk Management
The Coca-Cola Company
Read Bio

read more

Topic 5: Mobile Security – Moving From Policy to Implementation

Robert MimsBrian Phillips
Director, Information Security
Macy’s, Inc.
Read Bio

read more

Topic 6: Freeing Up Your Best and Brightest For Difficult Issues

Robert MimsAntonio Andrews
Divisional Chief Information Security Officer
General Motors
Read Bio

read more

Plaza Ballroom
3:00pm – 3:15pm Break
3:15pm – 4:15pm

2nd Rotation of Executive Roundtable Discussions Facilitated by Summit Hosts

Breakout sessions continue as attendees move to another topic for discussion with their peers. At the end of the 2nd rotation, a debrief of the discussions on each of the topics will be provided by the Summit Hosts.

Plaza Ballroom
4:15pm – 4:30pm Closing Remarks Plaza Ballroom
4:30pm – 5:30pm Reception in the Sponsor Pavilion with Prize Drawings Gallery

Venue

InterContinentalHotel-Buckhead-exteriorLuxury hotel in Buckhead, Atlanta defines comfort and elegance.

Surround yourself with an irresistible combination of Southern hospitality and smart sophistication at The Ritz-Carlton, Buckhead, one of the most ideally located Buckhead luxury hotels offering effortless access to the city’s finest shopping, dining and entertainment establishments. Here, you can experience traditions both timeless and new that leave indelible memories. Celebrate a superb day of shopping with high tea by the fireplace. Join our sommelier every Friday for a wine tasting at our communal table in The Café. Retreat to the Spa Level for a day of unrivaled pampering. Share these unforgettable moments and others in our guest memory books, located in the lobby and in the Club Lounge.

Renowned as an Atlanta social hub with exquisite dining, beautiful ballrooms and the most luxurious hotel accommodations in the city, The Ritz-Carlton, Buckhead features:

  • 510 elegantly appointed guest rooms, including 56 suites featuring bay window views of the city’s skyline
  • More than 23,000 square feet of function and meeting space, including two ballrooms
  • Convenient access to prestigious Buckhead shopping, cultural attractions and more
  • Close proximity to MARTA mass transit (Take North Line, Exit Buckhead Station, N7)

Amenities

InterContinentalHotel-Buckhead-poolThe hotel has a spa, fitness center, indoor saline pool, dry cleaning and laundry services, business center, valet and self-parking, onsite restaurants, and 24 hour in-room dining.

Room Rate and How To Book

InterContinentalHotel-Buckhead-room

We have negotiated a special rate at the Ritz Carlton Buckhead for Summit attendees of $219.00 night (regular rates begin at $469 night). The room block is limited so reserve early. The deadline for the discount is 9/26/14.

To make your reservations please call 1-800-826-0708 and use the group name of Executive Alliance.

To reserve online, visit: http://www.ritzcarlton.com/en/Properties/Buckhead/Default.htm and use the group code: EAIEAIA

Directions

The Ritz-Carlton, Buckhead
3434 Peachtree Road, N.E., Atlanta, Georgia 30326
Phone:(404) 237-2700
http://www.ritzcarlton.com/en/Properties/Buckhead/Default.htm

Directions From Hartsfield-Jackson International Airport (Domestic Terminal)

Take I-85 North
I-75 and I-85 will merge approaching downtown and then split (the HOV lane is shared for both 75 & 85 North)
Stay on I-85 North (the three left lanes)
Take GA 400 North to Buckhead, Exit #87
Continue to Exit #2, “Lenox-Buckhead”
Turn right at the end of the ramp
Follow signs for Peachtree Road (141) South
Continue through first stoplight
Hotel is the first building on the right after the first stoplight; turn right into the entrance before the next stoplight

Directions From Chattanooga, Tennessee

Take I-75 South to Atlanta
Take Exit #255 “West Paces Ferry Road” and turn left onto West Paces Ferry Road
Continue three miles and go through the Peachtree Road intersection
Take the first left after Peachtree Road onto Bolling Way, then right onto Peachtree Road
Continue North on Peachtree Road approximately one mile (Lenox Square will be on the right and the Monarch Plaza office building on the left)
Turn left at the stoplight, then take a right and follow the drive to the hotel Porte cochere

Directions From Birmingham, Alabama

Take I-20 to Atlanta
Follow the signs to I-85 North through downtown Atlanta
I-75 and I-85 will merge approaching downtown and then split (the HOV lane is shared for both 75 & 85 North)
Stay on I-85 North (the three left lanes)
Take Georgia 400 North to Buckhead (Exit #87)
Continue to Exit #2 “Lenox-Buckhead”
Turn right at the end of the ramp
Follow signs for Peachtree Road South
Hotel is the first building on the right after the first stoplight; turn right into the entrance before the next stoplight

Directions From Greenville, South Carolina

Take I-85 South to Atlanta
Take Exit #88 “Lenox Road,” and turn right onto Lenox Road
Stay on Lenox Road for approximately two miles to Peachtree Road
Turn left on Peachtree Road, then right at the stoplight
Take another right and follow the drive to the hotel Porte cochere

Parking

Valet parking at the hotel is available at a special day rate of $16. Just advise them you are with the Security Summit.

Self Parking is behind the hotel: rates are 2-12 hours for $9.00, and over 12 hours is $17.00

If you are interested in sponsoring the event or would like more information about sponsor packages, please call 678-445-1919 or email us at info@execalliance.com.

Platinum Sponsor

spo_blueCoatAbout Blue Coat Systems

Blue Coat empowers enterprises to safely and securely choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets. Blue Coat has a long history of protecting organizations, their data and their employees and is the trusted brand to 15,000 customers worldwide, including 86 percent of the FORTUNE Global 500. With a robust portfolio of intellectual property anchored by more than 200 patents and patents pending, the company continues to drive innovations that assure business continuity, agility and governance.

spo_ibmAbout IBM

With more than 40 years of security experience, IBM is helping clients take a broad, holistic view of security intelligence across their entire business. IBM has worldwide research labs developing the latest security technology innovations and delivering them across nine global security operation centers to help clients maintain an appropriate security posture. IBM Managed Security Services delivers the expertise, tools and infrastructure clients need to secure their business and information assets from constant Internet attacks, often at a fraction of the cost of in-house security resources. For more information on IBM Security Services, please visit: www.ibm.com/services/security

Gold Sponsors

spo-accellionAbout Accellion

Accellion provides mobile solutions to enterprise organizations to enable increased business productivity while ensuring data security and compliance. As the leading provider of private cloud solutions for secure file sharing, Accellion offers enterprise organizations the scalability, flexibility, control and security to enable a mobile workforce with the tools they need to create, access and share information securely, wherever work takes them. More than 12 million users and 2,000 of the world’s leading corporations and government agencies use Accellion solutions to increase business productivity, protect intellectual property, ensure compliance and reduce IT costs. For additional information visit www.accellion.com.

ZixCorp-logoAbout ZixCorp

ZixCorp is a leader in email data protection. ZixCorp offers industry-leading email encryption, a unique email DLP solution and an innovative email BYOD solution to meet your company’s data protection and compliance needs. ZixCorp is trusted by the nation’s most influential institutions in healthcare, finance and government for easy to use secure email solutions. ZixCorp is publicly traded on the Nasdaq Global Market under the symbol ZIXI, and its headquarters are in Dallas, Texas. For more information, visit www.zixcorp.com.

Bronze Sponsors

spo-accellionAbout AirWatch by VMware

AirWatch by VMware is the leader in enterprise mobility management, with more than 10,000 global customers. The AirWatch platform includes industry-leading mobile device, email, application, content, and browser management solutions. Acquired by VMware in February 2014, AirWatch is based in Atlanta and can be found online at www.air-watch.com.

spo-impervaAbout Imperva

Imperva, pioneering the third pillar of enterprise security, fills the gaps in endpoint and network security by directly protecting high-value applications and data assets in physical and virtual data centers. With an integrated security platform built specifically for modern threats, Imperva data center security provides the visibility and control needed to neutralize attack, theft, and fraud from inside and outside the organization, mitigate risk, and streamline compliance. Over 3,000 customers in more than 75 countries rely on our SecureSphere® platform to safeguard their business. Imperva is headquartered in Redwood Shores, California. Learn more: www.imperva.com, our blog, on Twitter.

spo-securityInnovationAbout Security Innovation

Security Innovation focuses on the most difficult IT Security problem, and the root cause of most data breaches — insecure software applications. For more than a decade, we’ve helped organizations build internal expertise, uncover critical vulnerabilities, and improve the process by which applications are built. The company’s solutions are based on the three pillars of a secure Software Development Lifecycle (SDLC), which feed into one another to create an ecosystem of repeatable, secure software development: Standards, Education, and Assessment. Our flagship products include TeamProfessor, the industry’s largest library of application security eLearning courses, and TeamMentor, “out of the box” secure development standards.

Guest Feedback

I had a great time meeting with colleagues and covering relevant topics to our disciplines. I met the right vendors and was able to...

Dan Reynolds, VP, Chief of Security & Information Architecture, Omnicom Media Group
VIEW MORE GUEST FEEDBACK IT Security Leaders

This National Security leaders Symposium is a great opportunity to review best practices across the industry, evaluate some of the latest technologies and solutions from...

James Beeson, Chief Information Security Officer, GE Capital Americas
VIEW MORE GUEST FEEDBACK IT Security Leaders

As Cyberthreat is the number one threat, it is everyone’s responsibility to educate themselves to protect us from cyberwar. ...

Raj Patel, Chief Information Security Officer, City of Palo Alto
VIEW MORE GUEST FEEDBACK IT Security Leaders

I look forward to the Executive Alliance event each year. The agenda provides a variety of topics and formats that generate stimulating conversations that I...

Darin Mastricola, AVP, IT Risk, Security, and Compliance, Endurance Services Ltd.
VIEW MORE GUEST FEEDBACK IT Security Leaders