The Security Leaders Summit

Where Industry Leaders Meet to Shape the Future
  • Home
  • /
  • Security Leaders Summit

The Security Leaders Summit Boston was held on Thursday, September 25, 2014 at the Mandarin Oriental Boston Hotel. The Summit brought together an outstanding community of senior IT executives for engaging peer-level interaction, discussions on new approaches to managing complexities in Information Security and provided opportunities to collaborate with leaders in the industry. Throughout the day, the Summit Hosts, representing companies across a diversity of industries and sizes, shared insights and knowledge with the distinguished group of attendees through their presentations, interviews and breakout roundtable discussions.

Summit Recap

In the opening session, “Driving Innovation,” Summit Emcee Richard Warner interviewed David Reis, Ph.D., Vice President of IT Governance and PMO & Chief Information Security Officer at Lahey Health (center) and Esmond Kane, Deputy Chief Information Security Officer at Partners Healthcare System (far right) on what each of them is doing to drive innovation at their organizations to help move their businesses forward. Both of the CISOs brought to light the underlying critical success factor in driving innovation is having the right culture and how difficult it is to change the culture of an organization. Innovation is occurring at both of their organizations as more systems become integrated giving them the opportunity to capture data for better decision making. Esmond’s organization is measuring success through KRIs (Key Risk Indicators) which align with his business’ KPIs (Key Performance Indicators).

David Billeter, Vice President, Global Security, Privacy and Regulatory Compliance of Staples will provided his perspective on the “state of the information security industry.” Dave provided insights into his role and breadth of responsibility and how his information security organization is positioning his organization for success in for the future.

In the Executive Briefing, “One Day Wonders…How Cyber Criminals Are Hiding in Plain Sight…” Grant Asplund, Director of Evangelism at Blue Coat Systems, Summit Platinum Sponsor, shared some of the latest trends that are highlighting the increased need for real time global intelligence. In his presentation, Grant discussed the need for organizations to utilize security controls with real-time global intelligence, have solutions in place that comprehensively assess and assign a risk value based on multiple factors including context around domains, IP address, and site popularity.

During the morning break, guests had the chance to catch up with their peers.

In the “Leadership Challenges” interview session, Tony Faria, Chief Information Security Officer at FM Global, Mark Morrison, Chief Information Security Officer at State Street Corporation, and John Schramm, Vice President of Global Information Risk Management and Chief Information Risk Officer at Manulife Financial, shared with the attendees how they are moving their organizations to the next level, partnering better with the business, and enabling employees to truly be part of a borderless enterprise.

Patrick Conte, Senior Vice President & General Manager, Worldwide Field Operations at Accellion, Gold Sponsor, provided an Executive Briefing on “Increasing Mobile Productivity While Protecting Enterprise Data.” Pat shared insights on how the need for mobile productivity is transforming the way enterprises do business. Implementing a BYOD policy can help increase mobile productivity, as teams work whenever and wherever they prefer, while still be able to keep files secure and mitigate compliance risks.

Matt Comyns, Global Co-Head of the Cyber Security Practice at Russell Reynolds Associates, shared his insights into the expanded role of the CISO to the business and the upward shift in compensation in his presentation, “The Rising Value of the CISO.” With some compensation packages now in the $500,000+ range with bonuses, Matt stated the “rising tide in compensation is moving the average minimum to $300,000 and above.” Matt wrapped up his presentation with his perspective on what separates the top tier CISOs from the rest – vision, polished communication skills that provide for a great presence, and the ability to attract talent to the organization.

Geoff Bibby, Vice President, Corporate Marketing at ZixCorp, Gold Sponsor kicked off the afternoon sessions with an Executive Briefing on “BYOD: A Fresh Perspective-Avoid a Bring-Your-Own-DISASTER Scenario.” Geoff provided insights into recent survey results on how employees are using their phones, disabling auto-lock security, stats on employees following policies, and the increasing number of personal devices in the workplace. During his presentation, Geoff focused on the move to BYOD security by managing access versus devices.

The afternoon Executive Roundtables set the stage for peer-to-peer discussions across a range of seven different topics. After the first hour, guests had the opportunity to choose a second topic for discussion with their peers.

The Security Leaders Summit in Boston wrapped up with an afternoon reception and the opportunity to continue discussions.

Be sure to visit the photo gallery.

Platinum Sponsor

Blue Coat Systems

Blue Coat empowers enterprises to safely and securely choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets. Blue Coat has a long history of protecting organizations, their data and their employees and is the trusted brand to 15,000 customers worldwide, including 86 percent of the FORTUNE Global 500. With a robust portfolio of intellectual property anchored by more than 200 patents and patents pending, the company continues to drive innovations that assure business continuity, agility and governance.

For additional information, please visit: www.bluecoat.com or contact Deborah.jagoe@bluecoat.com

Gold Sponsor

Accellion

Accellion provides mobile solutions to enterprise organizations to enable increased business productivity while ensuring data security and compliance. As the leading provider of private cloud solutions for secure file sharing, Accellion offers enterprise organizations the scalability, flexibility, control and security to enable a mobile workforce with the tools they need to create, access and share information securely, wherever work takes them. More than 12 million users and 2,000 of the world’s leading corporations and government agencies use Accellion solutions to increase business productivity, protect intellectual property, ensure compliance and reduce IT costs. For more information please visit: www.accellion.com or call 650-485-4300.
Information for Downloads
kiteworks™ by Accellion Solution Overview
kiteworks Content Connectors
kiteworks Mobile Apps
kiteworks Private Cloud Deployments

Zix Corporation

ZixCorp is a leader in email data protection. ZixCorp offers industry-leading email encryption, a unique email DLP solution and an innovative email BYOD solution to meet your company’s data protection and compliance needs. ZixCorp is trusted by the nation’s most influential institutions in healthcare, finance and government for easy to use secure email solutions. ZixCorp is publicly traded on the Nasdaq Global Market under the symbol ZIXI, and its headquarters are in Dallas, Texas.
For more information, visit zixcorp.com and Zip Corporation BYOD.

Bronze Sponsors

Imperva

Imperva, pioneering the third pillar of enterprise security, fills the gaps in endpoint and network security by directly protecting high-value applications and data assets in physical and virtual data centers. With an integrated security platform built specifically for modern threats, Imperva data center security provides the visibility and control needed to neutralize attack, theft, and fraud from inside and outside the organization, mitigate risk, and streamline compliance. Over 3,000 customers in more than 75 countries rely on our SecureSphere® platform to safeguard their business. Imperva is headquartered in Redwood Shores, California. Learn more: www.imperva.com, our blog, on Twitter.

For more information download:

Imperva White Papers & eBooks
Imperva Analyst Report – Magic Quadrant

NetSpi Corporation

Using our consulting team’s deep security knowledge and our proprietary CorrelatedVM vulnerability management & reporting solution, NetSPI acts as a trusted advisor to large enterprises by providing deep-dive, manual penetration testing – from mobile applications to entire networks and infrastructures. NetSPI also provides assessment and vulnerability management advisory services designed to analyze and mitigate risks and ensure compliance with relevant regulations and industry standards.

Utilizing its proven and comprehensive methodology in conjunction with its adaptive and responsive client service – NetSPI is more than a vendor, its partner you can trust with your most critical assets. More information is available at http://www.netspi.com/

Proofpoint

Proofpoint, Inc. is a leading security-as-a-service provider that focuses on cloud-based solutions for threat protection, compliance, archiving & governance and secure communications. Organizations around the world depend on Proofpoint’s expertise, patented technologies and on-demand delivery system to protect against phishing, malware and spam, safeguard privacy, encrypt sensitive information, and archive and govern messages and critical enterprise information. More information is available at: www.proofpoint.com

For more information, download:
Proofpoint Enterprise Protection
Proofpoint Enterprise Privacy
Proofpoint Email Archiving

Proofpoint Social Media Archive
Proofpoint Enterprise Governance
Proofpoint Targeted Attack

www.proofpoint.com

Security Innovation

Security Innovation focuses on the most difficult IT Security problem, and the root cause of most data breaches — insecure software applications. For more than a decade, we’ve helped organizations build internal expertise, uncover critical vulnerabilities, and improve the process by which applications are built. The company’s solutions are based on the three pillars of a secure Software Development Lifecycle (SDLC), which feed into one another to create an ecosystem of repeatable, secure software development: Standards, Education, and Assessment. Our flagship products include TeamProfessor, the industry’s largest library of application security eLearning courses, and TeamMentor, “out of the box” secure development standards. For more information visit: https://www.securityinnovation.com/

Wi-Fi Sponsors

BeyondTrust

BeyondTrust provides context-aware Privileged Account Management and Vulnerability Management software solutions that deliver the visibility necessary to reduce IT security risks and simplify compliance reporting.

We empower organizations to not only mitigate user-based risks arising from misuse of system or device privileges, but also identify and remediate asset vulnerabilities targeted by cyber attacks. As a result, our customers are able to address both internal and external threats, while making every device – physical, virtual, mobile and cloud – as secure as possible.

BeyondTrust solutions are unified under the BeyondInsight IT Risk Management Platform, which provides IT and security teams a single, contextual lens through which to view user and asset risk. This clear, consolidated risk profile enables proactive, joint decision-making while ensuring that daily operations are guided by common goals for risk reduction.

The company is privately held, and headquartered in Phoenix, Arizona. For more information, visit us atwww.beyondtrust.com or contact us at sales@beyondtrust.com.

Ionic Security

Ionic is a security startup on a mission to protect enterprise data. Fundamentally, we believe that true security comes through unification, not point products; that companies need to manage and protect data through its entire lifecycle, no matter where it resides. Our solution extends from discovering risk to retiring data, whether it’s on the network, in the cloud, or on a mobile device. Our customers realize that once they know – and can control – the “who, what, where, when, and how” for every piece of critical data, they can move to the cloud, create work-from-home policies, allow full BYOD policies, and more. With Ionic’s technology, IT becomes a business enabler, not a roadblock.

OpenDNS

OpenDNS is a leading provider of network security and DNS services, enabling the world to connect to the Internet with confidence on any device, anywhere, anytime. The Umbrella cloud-delivered network security service blocks advanced attacks, as well as malware, botnets and phishing threats regardless of port, protocol or application. Its predictive intelligence uses machine learning to automate protection against emergent threats before they can reach customers. OpenDNS protects all devices globally without hardware to install or software to maintain. For more information, please visit: www.opendns.com.

Hosts

The Security Leaders Summit Boston 2014 was hosted by Information Security and IT Executives from across a variety of industries in the area. The Summit Hosts served as the face of the Summit and throughout the day, they shared insights during presentations, interactive sessions, and facilitated peer-to-peer executive roundtable discussions. The hosts to-date included:

MaddenS David Billeter
Vice President, Global Security, Privacy and Regulatory Compliance
Staples

MaddenS Matt Comyns
Global Head of Cyber Security Practice
Russell Reynolds Associates
Read Bio

MaddenS Tony Faria
Chief Information Security Officer
FM Global

MaddenS Esmond Kane
Deputy Chief Information Security Officer
Partners HealthCare System
Read Bio

MaddenS Mark J. Morrison
Senior Vice President & Chief Information Security Officer
State Street Corporation
Read Bio

MaddenS David Reis, Ph.D.
Vice President of IT Governance and PMO & Chief Information Security Officer
Lahey Health
Read Bio

MaddenS Paul Scheib
Chief Information Security Officer
Children’s Hospital of Boston
Read Bio

MaddenS John R. Schramm
Vice President of Global Information Risk Management and Chief Information Risk Officer
Manulife Financial
Read Bio

MaddenS Deborah Stevens
Chief Security Officer
Tufts Health Plan

Time Description
7:30am – 8:30am Registration Opens with Breakfast Buffet and Networking in the Sponsor Pavilion Oriental Gallery
8:30am – 8:40am Transition to Ballroom
8:40am – 9:00am Welcome and Opening Remarks Oriental Ballroom
9:00am – 9:30am

Morning Keynote

Elliott GlazerDavid Billeter
Vice President, Global Security, Privacy and Regulatory Compliance
Staples


In the Morning Keynote, David Billeter, Vice President, Global Security, Privacy and Regulatory Compliance of Staples will provide his perspective on the “state of the information security industry.” He will discuss what he is seeing in his business and in talking with his peers, industry experts and vendors, what he perceives as the challenges the industry is facing and where does he expect to see success. David will provide insights into his role and breadth of responsibility and what his information security organization is doing to ensure his organization is positioned for success in for the future.

With $25 billion in revenue and 90,000+ employees, Staples provides office products via retail, online and delivery capabilities. Headquartered outside of Boston, Staples operates throughout North and South America, Europe, Asia, Australia and New Zealand.

Oriental Ballroom
9:30am – 10:00am

Insights & Interviews – “Driving Innovation”

ZandoliSEsmond Kane
Deputy Chief Information Security Officer
Partners Healthcare System
Read Bio

ZandoliSDavid Reis, Ph.D.
Vice President of IT Governance and PMO & Chief Information Security Officer
Lahey Health
Read Bio

ZandoliSPaul Scheib
Chief Information Security Officer
Children’s Hospital of Boston
Read Bio

In this interview session, Summit Emcee Richard Warner interviews Esmond Kane, Deputy Chief Information Security Officer at Partners Healthcare System, David Reis, Ph.D., Vice President of IT Governance and PMO & Chief Information Security Officer at Lahey Health and Paul Scheib, Chief Information Security Officer at Children’s Hospital of Boston on what each of them is doing to drive innovation at their organizations to help move their businesses forward, how they are approaching building an innovative culture, and the challenges and successes they are seeing to-date as they focus on the use of technologies, processes and people to execute on their visions.

Oriental Ballroom
10:00am – 10:30am

Executive Briefing – “One Day Wonders…How Cyber Criminals Are Hiding in Plain Sight…”

Geoff AranoffGrant Asplund
Director of Evangelism
Blue Coat, Platinum Sponsor
Read Bio

Over a 90 day period, of the 660M new Hostnames, 470M existed 24 hours or less. While most of these are legitimate and exist to deliver a better user experience, there is a darker side. Of the top 50 domains responsible for these ‘one-day-wonders’ fully 22% were identified as malicious. This tactic is popular with cyber criminals because they 1.) Keep security solutions guessing since dynamic domains are harder to thwart than static domains. 2.) Overwhelm security solutions by generating a high volume of domains increasing the chances some percentage will be missing security controls and 3.) Hide from security solutions simply by combining ‘one-day-wonders’ with encryption and running incoming malware and/or outgoing data theft over SSL.

This presentation will discuss:
• Why organizations should utilize security controls with real-time global intelligence in order to identify One-Day-Wonders
• Why organizations should have solutions in place that comprehensively assess and assign a risk value based on multiple factors including context around domains, IP address, site popularity
• The need for a baseline of hostnames for rapid detection of anomalies
• Highly granular policy controls must include detailed policy creation, threat risk levels and hostname baselines to help automate defenses and fortify security postures
• Why ETM (Encrypted Traffic Management) is rapidly becoming a top priority for enterprises in order to expose vulnerabilities and risks as a result of the significant increase in use of SSL

Oriental Ballroom
10:30am – 11:00am Break and Networking in the Sponsor Pavilion Oriental Gallery
11:00am – 11:10am Transition to Ballroom
11:10am – 11:40am

“Game Changers – Leadership Challenges”

ZandoliSTony Faria
Chief Information Security Officer
FM Global

ZandoliSMark J. Morrison
Senior Vice President & Chief Information Security Officer
State Street Corporation
Read Bio

ZandoliSJohn R. Schramm
Vice President of Global Information Risk Management and Chief Information Risk Officer
Manulife Financial
Read Bio

In this interview session, Tony Faria, Chief Information Security Officer at FM Global, Mark Morrison, Chief Information Security Officer at State Street Corporation, and John Schramm, Vice President of Global Information Risk Management and Chief Information Risk Officer at Manulife Financial, will discuss how they are moving their organizations to the next level, partnering better with the business, and enabling employees to truly be part of a borderless enterprise.

Oriental Ballroom
11:40am – 12:00pm

Executive Briefing – “Increasing Mobile Productivity While Protecting Enterprise Data”

Geoff AranoffPatrick J. Conte
Senior Vice President & General Manager, Worldwide Field Operations
Accellion, Gold Sponsor
Read Bio

The need for mobile productivity is transforming the way enterprises do business. Employees need the ability to edit and create documents, access information that is stored in ECM systems, or share files with co-workers – all from their mobile devices. They need to be as productive away from the office as they are at their desks. Implementing a BYOD policy can help increase mobile productivity, as teams work whenever and wherever they prefer. However, to ensure the security of files and enterprise data, organizations need to carefully select technology that enables this policy. This session will explore how to enable mobile productivity to increase efficiencies, while keeping files secure and mitigating compliance risks.

Oriental Ballroom
12:00pm – 12:30pm

“The Rising Value of the CISO”

Geoff AranoffMatt Comyns
Global Co-Head of Cyber Security Practice
Russell Reynolds Associates


Matt Comyns, Global Co-Head of the Cyber Security Practice and a leader in the Digital Transformation practice at Russell Reynolds Associates, will delve into the trends he is seeing in the role of the CISO of the future, the increasing value of the role to the business, the shift towards higher compensation to align with the increased value of the role, and his discussions with the C Suite. Matt will also share insights into what separates the top tier CISOs from the rest as companies look for a short list of leaders to hire. Russell Reynolds Associates is an executive leadership and search firm, serving clients globally for 45 years. The company advises clients on recruiting and retaining outstanding and impactful leaders.

Oriental Ballroom
12:30pm – 1:30pm Lunch in the Sponsor Pavilion Oriental Gallery
1:30pm – 1:40pm Transition to Ballroom
1:40pm – 2:00pm

Executive Briefing : “BYOD: A Fresh Perspective – Avoid a Bring-Your-Own-DISASTER Scenario”

Elliott GlazerGeoff Bibby
Vice President, Corporate Marketing
ZixCorp, Gold Sponsor
Read Bio

Your users are bringing their own devices – and potentially a variety of security, legal and HR disasters – to and from work. With many unique roles and responsibilities within your organization, there are a variety of use cases related to BYOD. Join mobile security experts from ZixCorp for real-world use cases and solutions to solve your most pressing BYOD challenges.

Oriental Ballroom
2:00pm – 3:00pm

Executive Roundtable Discussions Facilitated by Summit Hosts

Breakout sessions with your peers on topics determined by attendees during registration. The topics are facilitated by the Summit Hosts.

Topic 1: Information Security’s Strategic Value to the Business

read more

Topic 2: Advanced Persistent Threats – Building Cyber Resilience

read more

Topic 3: Reducing Application Security Risk

read more

Topic 4: Information Security Governance and Compliance

read more

Topic 5: Security Awareness and Changing Behavior

read more

Topic 6: Leveraging the Cloud for Business Agility While Managing Risks

read more

Topic 7: The True Cost of Data Loss Prevention

read more

Oriental Ballroom
3:00pm – 3:15pm Break
3:15pm – 4:15pm

2nd Rotation of Executive Roundtable Discussions Facilitated by Summit Hosts

Breakout sessions continue as attendees move to another topic for discussion with their peers. At the end of the 2nd rotation, a debrief of the discussions on each of the topics will be provided by the Summit Hosts.

Oriental Ballroom
4:15pm – 4:30pm Closing Remarks Oriental Ballroom
4:30pm – 5:30pm Reception in the Sponsor Pavilion with Prize Drawings Oriental Gallery

Mandarin Oriental, Boston Hotel

776 Boylston Street,
Boston, MA 02199
(617)535-8888

Westin-StFrancis-exterior
Awarded both the esteemed AAA Five Diamond Award rating and the coveted Forbes Five-Star award, Mandarin Oriental, Boston enjoys a covetable location on the city’s famous Boylston Street. Blending Oriental luxury with Bostonian style, we offer beautiful rooms, fabulous food and one of the city’s best spas.





Enjoying a prime Back Bay location, Mandarin Oriental, Boston is perfectly situated for all of the city’s major attractions.
• Located on Boylston Street, one of Boston’s most desirable addresses
• Within walking distance of Boston’s historic sites and landmarks
• Close proximity to the city’s famous sporting, cultural and entertainment venues
• Directly connected to the Prudential Center, home to the city’s premier businesses and boutiques

Room Rate and Booking

Westin-StFrancis-interiorDesigned in a Modern art style incorporating chic Art Deco touches, our rooms and suites exude a sense of classic luxury.

We have negotiated a discount rate of $395.00 per night for Summit attendees (regularly $625 and up). Rooms at this rate are limited.

Reserve by contacting the hotel directly at 617-535-8880 and asking for the Executive Alliance rate. The rate is only available to reserve until 8/26.

Other hotels in the area include: Westin Copley, Fairmont Copley, Colonade, Lenox Hotel, and Courtyard Copley Square.

Parking

Valet parking at the hotel is available at a special rate of $35 per car for events. Guests may self park at other local garages.

If you are interested in sponsoring the event or would like more information about sponsor packages, please call 678-445-1919 or email us at info@execalliance.com.

Platinum Sponsor

spo_blueCoatAbout Blue Coat Systems

Blue Coat empowers enterprises to safely and securely choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets. Blue Coat has a long history of protecting organizations, their data and their employees and is the trusted brand to 15,000 customers worldwide, including 86 percent of the FORTUNE Global 500. With a robust portfolio of intellectual property anchored by more than 200 patents and patents pending, the company continues to drive innovations that assure business continuity, agility and governance.

Gold Sponsors

spo-accellionAbout Accellion

Accellion provides mobile solutions to enterprise organizations to enable increased business productivity while ensuring data security and compliance. As the leading provider of private cloud solutions for secure file sharing, Accellion offers enterprise organizations the scalability, flexibility, control and security to enable a mobile workforce with the tools they need to create, access and share information securely, wherever work takes them. More than 12 million users and 2,000 of the world’s leading corporations and government agencies use Accellion solutions to increase business productivity, protect intellectual property, ensure compliance and reduce IT costs. For additional information visit www.accellion.com.

ZixCorp-logoAbout ZixCorp

ZixCorp is a leader in email data protection. ZixCorp offers industry-leading email encryption, a unique email DLP solution and an innovative email BYOD solution to meet your company’s data protection and compliance needs. ZixCorp is trusted by the nation’s most influential institutions in healthcare, finance and government for easy to use secure email solutions. ZixCorp is publicly traded on the Nasdaq Global Market under the symbol ZIXI, and its headquarters are in Dallas, Texas. For more information, visit www.zixcorp.com.

Bronze Sponsors

spo-impervaAbout Imperva

Imperva, pioneering the third pillar of enterprise security, fills the gaps in endpoint and network security by directly protecting high-value applications and data assets in physical and virtual data centers. With an integrated security platform built specifically for modern threats, Imperva data center security provides the visibility and control needed to neutralize attack, theft, and fraud from inside and outside the organization, mitigate risk, and streamline compliance. Over 3,000 customers in more than 75 countries rely on our SecureSphere® platform to safeguard their business. Imperva is headquartered in Redwood Shores, California. Learn more: www.imperva.com, our blog, on Twitter.

spo-proofPointAbout NetSPI

Using our consulting team’s deep security knowledge and our proprietary CorrelatedVM vulnerability management & reporting solution, NetSPI acts as a trusted advisor to large enterprises by providing deep-dive, manual penetration testing – from mobile applications to entire networks and infrastructures. NetSPI also provides assessment and vulnerability management advisory services designed to analyze and mitigate risks and ensure compliance with relevant regulations and industry standards.

Utilizing its proven and comprehensive methodology in conjunction with its adaptive and responsive client service – NetSPI is more than a vendor, its partner you can trust with your most critical assets.

More information is available at www.netspi.com

spo-proofPointAbout Proofpoint

Proofpoint is a pioneering security-as-a-service provider that focuses on cloud-based solutions for threat protection, compliance, archiving & governance and secure communications. Organizations around the world depend on Proofpoint’s expertise, patented technologies and on-demand delivery system to protect against phishing, malware and spam, safeguard privacy, encrypt sensitive information, and archive and govern messages and critical enterprise information. More information is available at www.proofpoint.com

spo-securityInnovationAbout Security Innovation

Security Innovation focuses on the most difficult IT Security problem, and the root cause of most data breaches — insecure software applications. For more than a decade, we’ve helped organizations build internal expertise, uncover critical vulnerabilities, and improve the process by which applications are built. The company’s solutions are based on the three pillars of a secure Software Development Lifecycle (SDLC), which feed into one another to create an ecosystem of repeatable, secure software development: Standards, Education, and Assessment. Our flagship products include TeamProfessor, the industry’s largest library of application security eLearning courses, and TeamMentor, “out of the box” secure development standards.

Wi-Fi Sponsor

spo-proofPointAbout BeyondTrust

BeyondTrust provides context-aware Privileged Account Management and Vulnerability Management software solutions that deliver the visibility necessary to reduce IT security risks and simplify compliance reporting.

We empower organizations to not only mitigate user-based risks arising from misuse of system or device privileges, but also identify and remediate asset vulnerabilities targeted by cyber attacks. As a result, our customers are able to address both internal and external threats, while making every device – physical, virtual, mobile and cloud – as secure as possible.

BeyondTrust solutions are unified under the BeyondInsight IT Risk Management Platform, which provides IT and security teams a single, contextual lens through which to view user and asset risk. This clear, consolidated risk profile enables proactive, joint decision-making while ensuring that daily operations are guided by common goals for risk reduction.

The company is privately held, and headquartered in Phoenix, Arizona. For more information, visit www.beyondtrust.com

spo-proofPointAbout Ionic Security

Ionic is a security startup on a mission to protect enterprise data. Fundamentally, we believe that true security comes through unification, not point products; that companies need to manage and protect data through its entire lifecycle, no matter where it resides. Our solution extends from discovering risk to retiring data, whether it’s on the network, in the cloud, or on a mobile device. Our customers realize that once they know – and can control – the “who, what, where, when, and how” for every piece of critical data, they can move to the cloud, create work-from-home policies, allow full BYOD policies, and more. With Ionic’s technology, IT becomes a business enabler, not a roadblock.

spo-proofPointAbout OpenDNS

OpenDNS is a leading provider of network security and DNS services, enabling the world to connect to the Internet with confidence on any device, anywhere, anytime. The Umbrella cloud-delivered network security service blocks advanced attacks, as well as malware, botnets and phishing threats regardless of port, protocol or application. Its predictive intelligence uses machine learning to automate protection against emergent threats before they can reach customers. OpenDNS protects all devices globally without hardware to install or software to maintain. For more information, please visit: www.opendns.com.

Guest Feedback

Each time I participate in an Executive Alliance Summit, the attendees are very interactive and have a variety of backgrounds and experiences. I thoroughly...

Geoff Aranoff, Chief Information Security Officer, Broadcom
VIEW MORE GUEST FEEDBACK IT Security Leaders

The Security Leaders Summit brings together security execs who come at problems from multiple angles and backgrounds, but usually share common challenges. We don't always...

Justine Aitel, Chief Information Security Officer, Dow Jones & Company, Inc.
VIEW MORE GUEST FEEDBACK IT Security Leaders

As Cyberthreat is the number one threat, it is everyone’s responsibility to educate themselves to protect us from cyberwar. ...

Raj Patel, Chief Information Security Officer, City of Palo Alto
VIEW MORE GUEST FEEDBACK IT Security Leaders

I look forward to the Executive Alliance event each year. The agenda provides a variety of topics and formats that generate stimulating conversations that I...

Darin Mastricola, AVP, IT Risk, Security, and Compliance, Endurance Services Ltd.
VIEW MORE GUEST FEEDBACK IT Security Leaders