The Security Leaders Summit

Where Industry Leaders Meet to Shape the Future
  • Home
  • /
  • Security Leaders Summit

The Security Leaders’ Summit Houston was held on Thursday, March 13, 2014 at The St. Regis Hotel in Houston, Texas. The Summit drew senior technology executives from the Houston and surrounding area with titles of CISO,CIO, VP and Director. Hosted by information security executives who helped develop the content and agenda, the Summit received outstanding feedback from attendees with comments such as “this was the most relevant conference I have attended,” “the Summit was focused on the right discussions,” and “the environment was right for being able to have engaging conversations with my peers.”

Summit Recap

Geoff Aranoff, Chief Information Security Officer of Broadcom, a FORTUNE 500 company and global leader in semiconductor solutions for wired and wireless communications, opened up the Summit with the morning keynote, “Business Risks of the Past and a Glimpse Into the Future.” Geoff provided his insights into four key areas of focus for him at Broadcom as Cloud, Data Analytics, Mobile Devices/BYOD/Social and Cyber & Insider Threats. For each of these areas, Geoff discussed his viewpoint on progress by vendors, how he is leveraging these environments to drive down costs and to help scale the organization, challenges he still sees, trends and expectations for the future.

Download a copy of the presentation: 2014 Security Leaders Summit Houston – Geoff Aranoff, Morning Keynote.

In the session, “Game Changers,” Summit Emcee Richard Warner interviewed Mike Coogan, Director of Information Security at Waste Management, Inc. on how he is driving innovation within his security organization. The company’s network includes collection operations, transfer stations, landfill disposal sites, waste-to-energy plants, recycling plants, beneficial-use landfill gas projects and independent power production plants. Mike discussed how his focus is on people as the leverage to innovate and technologies play the supporting role. Building an organization that is insightful, has the ability to analyze and focus on things that matter, that can proactively connect what they are doing to helping the business be successful, and most importantly, are passionate about what they do is what will create the right environment to innovate.

In Trends, Drivers and Impacts, Sr. Technology Evangelist, Grant Asplund of Blue Coat Systems, Platinum Sponsor, presented “Revolutionizing Advanced Threat Protection.” During this session, Grant presented findings from their research organization on trends on the evolving landscape of threat management, time and window of opportunity, and modern countermeasures.

Download the presentation: 2014 Security Leaders’ Summit Houston – Blue Coat Speaker, Grant Asplund

Attendees had the opportunity to enjoy informal conversations at breaks and throughout the day.

In “Insights & Interviews,” Igor Volovich, VP, Information Security & Cyber Risk Management at Invensys weighed in on his thoughts on what it will take to be successful in this fast-paced environment. With the recent acquisition of Invensys by Schneider Electric, Igor discussed his role in the M&A activities, where he is focusing his team, how his role is evolving, what is driving the change, and what he envisions the security organization of the future looking like.

During the session, “Executive Briefing,” Mike Reed, Partner Evangelist at MobileIron, Silver Sponsor, brought to light the “BYOD Trust Gap.” Mike shared their latest research and trends on perceptions by different age groups of employees on their perceptions of what employers can see on their mobile devices, their priorities on privacy concerns and their feedback on how to bridge the trust gap.

Download the presentation: MobileIron – Privacy in a BYOD World

Always rated as one of the top sessions of the Summits, the breakout Executive Roundtable discussions did not disappoint the Houston attendees according to survey results.

Six different topics were facilitated by security executives including Stuart Wagner, Director, IT Security & Compliance at Enterprise Products, Mary Dickerson, Executive Director, IT Security & Chief Information Security Officer at The University of Houston, Barbara McCrary, Chief Information Security Officer at Oklahoma State Regents for Higher Educations, Willis Marti, Director & CISO, Networking & Information Security with Texas A&M University, Mark Freed, Director of Global IT Security at FMC Technologies, Inc., and Joel Bandy, Chief Information Security Officer, of Presbyterian Communities & Services. After two rotations, debriefs were given on the major issues discussed at the breakouts. Mike Fair, responsible for information security at Academy Sports & Outdoors facilitated the debriefs. Pictured with Mike on his left is Stuart Wagner, Director, IT Security & Compliance at Enterprise Products.

After a second rotation of executive roundtable discussions, the day wrapped up with a reception in the Sponsor Pavilion.

Be sure to visit the photo gallery.

Platinum Sponsor

Blue Coat Systems

Blue Coat empowers enterprises to safely and securely choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets. Blue Coat has a long history of protecting organizations, their data and their employees and is the trusted brand to 15,000 customers worldwide, including 86 percent of the Fortune® Global 500. With a robust portfolio of intellectual property anchored by more than 200 patents and patents pending, the company continues to drive innovations that assure business continuity, agility and governance.

Spending on security is up, with 89% of IT security budgets rising or holding steady. But as we discussed at the IT Ledaer’s summit, successful attacks and advanced threats are on the rise too, with more than 60% of respondents in a new study reporting at least one successful breach in 2013. What’s the best strategy for preparing for and responding to today’s evolving threat landscape? The first step is to learn more and gain fresh insights from your peers. Read the 2014 Cyberthreat Defense Report from the CyberEdge Group.

Questions/ Comments for Blue Coat? Contact us directly for assistance:
Grant Asplund, Sr. Technology Evangelist
Vicky Giakoumis, Marketing Manager

Silver Sponsor

MobileIron

MobileIron’s mission is to enable global companies to become Mobile First organizations, embracing mobility as their primary IT platform in order to transform their businesses and increase their competitiveness.

Mobile technology is driving a massive shift in the ability of IT to support the way people want to work. Mobile First organizations focus on building superb mobile user experiences that are available anywhere users need them. They have to move fast and adopt new technologies rapidly.

Companies around the world rely on MobileIron’s scalable architecture, rapid innovation, and best practices as the foundation for their transformation into Mobile First organizations.

Mobile Trust Gap paper

Bridging the Mobile Trust Gap

Bronze Sponsor

Imperva

More companies trust Imperva to secure their data than any other vendor. Imperva’s proven solutions deliver activity monitoring, real-time protection and risk management of critical business data and applications.

Imperva solutions overcome many of the security challenges faced by IT organizations by delivering accurate, actionable information on all data access, usage, and business processes within real-world production environments, and without impacting the efficiency of business functions.

The global leader in Application Data Security, Imperva’s award-winning governance and protection solutions provide full visibility and control of enterprise data from the database, through the application, to the accountable end user. Contact us at: www.imperva.com.

For more information – for whitepapers visit: http://www.imperva.com/resources/whitepapers.asp

Contact us: Paul Allee, Regional Sales Manager, paul.allee@imperva.com

Participating Sponsors

Code42

Code42 develops intuitive, optimized technology to securely manage and protect the world’s data. Its award-winning CrashPlan backup solutions manage exabytes of data across millions of devices and for some of the largest organizations in the world. And its SharePlan enterprise-grade file sync/share enables real-time collaboration while enforcing corporate security requirements. Visit: http://www.code42.com

Contact us: Grant Gowery, Grant.gowery@code42.com, 832-349-2773
For more Information: Code 42 – Why You Can’t Ignore Endpoint Backup Protection

RSA – The Security Division of EMC

RSA, The Security Division of EMC, is the premier provider of security, risk and compliance management solutions for business acceleration. RSA helps the world’s leading organizations succeed by solving their most complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding mobile access and collaboration, proving compliance, and securing virtual and cloud environments. For more information, please visit: www.EMC.com/RSA

Hosts

The Security Leaders Summit Houston 2014 will be hosted by information security and IT executives from across the region. The Summit Hosts serve as the face of the Summit and throughout the day, they will share their insights during presentations, interview sessions and our executive roundtable discussions. The Hosts to-date include:

photo_comingSoonS Geoff Aranoff
Chief Information Security Officer
Broadcom Corporation
Read Bio

photo_comingSoonS Joel Bandy
Chief Information Security Officer
Presbyterian Communities and Services
Read Bio

photo_comingSoonS Patsy Boozer
Chief Information Security Officer
City of San Antonio
Read Bio

photo_comingSoonS Mike Coogan
Director, Information Security
Waste Management
Read Bio

photo_comingSoonS Mary E. Dickerson
Executive Director, IT Security and Chief Information Security Officer
University of Houston
Read Bio

photo_comingSoonS Angelique Grado
Information Security Officer
Air Liquide America
Read Bio

MaddenS Tom Madden
Chief Information Security Officer
Consolidated Graphics, Inc.
Read Bio

photo_comingSoonS Willis Marti
Director and CISO, Networking and Information Security
Texas A&M University
Read Bio

photo_comingSoonS Patrick Sullivan
Chief Information Security Officer
GE Oil & Gas
Read Bio

photo_comingSoonS Igor Volovich
Vice President, Information Security & Cyber Risk Management
Invensys
Read Bio

photo_comingSoonS Stuart Wagner
Director, IT Security & Compliance
Enterprise Products
Read Bio

photo_comingSoonS Brian Wrozek
IT Security Director
Texas Instruments
Read Bio

YomineS
Dan Yomine
Vice President, Global Information Security
Bank of America
Read Bio

Time Description
7:30am – 8:45am Registration Opens with Breakfast Buffet and Networking in the Sponsor Pavilion Astor Ballroom Prefunction
8:45am – 9:00am Welcome and Opening Remarks Astor Ballroom
9:00am – 9:35am

Morning Opening Keynote: “Business Risks of the Past and a Glimpse Into the Future”

Geoff AranoffGeoff Aranoff
Chief Information Security Officer
Broadcom Corporation
Read Bio

In today’s world, where electronic data reigns and the speed of business is driven by the technologies that support the data, security is often an afterthought. In the opening keynote, Geoff Aranoff, CISO of Broadcom, will share his insights on upcoming trends in the world of security and the challenges the industry faces in relation to cyber threats, mobility, data analytics, and cloud. Geoff will set the stage by first examining the current risk state of affairs for those trends, and share what he has done at Broadcom to deal with them.

Astor Ballroom
9:35am – 10:00am

“Game Changers”

Geoff AranoffMike Coogan
Director, Information Security
Waste Management
Read Bio

Summit Emcee, Richard Warner, radio and TV business commentator, interviews Mike Coogan, on what he is doing to drive innovation at his organization and how he expects it to positively impact the business.

Astor Ballroom
10:00am – 10:30am

“A Complete Lifecycle Approach to Advanced Threat Protection”

Geoff AranoffGrant Asplund
Sr. Technology Evangelist
Blue Coat, Platinum Sponsor
Read Bio

Due to the inevitability of advanced targeted attacks that fly under the radar of traditional, preventative-based security technologies, there is a shift toward a more modern defense-in-depth strategy—one that provides the intelligence, context, and real-time situational awareness needed to block, detect and respond to today’s advanced cyber threats. This Advanced Threat Lifecycle Defense is the first to integrate a business process view that aligns with how your security team operationalizes new intelligence and technologies to fortify your security infrastructure against future attacks. Find out how this approach will empower your digital enterprise and organization, enabling you to adopt the best new technologies that drive your business.

Astor Ballroom
10:30am – 11:00am Break and Networking in the Sponsor Pavilion Astor Ballroom Prefunction
11:00am – 11:10am Transition to Ballroom
11:10am – 12:00pm

Insights & Interviews

MaddenSTom Madden
Chief Information Security Officer
Consolidated Graphics, Inc.
Read Bio

ZandoliSIgor Volovich
VP, Information Security & Cyber Risk Management
Invensys
Read Bio

The business challenges and the dynamics of change are forcing security leaders to constantly rethink what success means to the organization. Corporate leadership is under increased pressure to reinvent business strategies, services and products to combat shrinking profit margins and diminishing competitive advantages. In a world of constant change, “security as usual” is not nearly enough.

In this interview session, Summit Emcee, Richard Warner, will ask Tom Madden, CISO at Consolidated Graphics and Igor Volovich, VP, Information Security & Cyber Risk Management at Invensys to weigh in on their thoughts on what it will take to be successful in this fast-paced environment.

Headquartered in Houston, Texas, Consolidated Graphics, with over $1 billion in revenue, is one of North America’s leading general commercial printing companies. CGX has the largest and most technologically advanced sheetfed printing capabilities in North America, a sizeable and strategically important web printing capability, industry-leading digital printing services, a rapidly growing number of fulfillment centers and proprietary Internet-based technology solutions

Invensys is a global technology company that works in partnership with a broad range of industrial and commercial customers to design and supply advanced technologies that optimize their operational performance and profitability. Active in over 180 countries, they employ more than 16,500 people across four business segments: Software, Industrial Automation, Energy Controls and Appliance.

Astor Ballroom
12:00pm – 12:15pm

The BYOD Trust Gap

Geoff AranoffMike Reed
Partner Evangelist
MobileIron, Silver Sponsor
Read Bio

A successful BYOD program is built on trust. However, most employees do not trust their employers with personal data. This is the Trust Gap, and it leads to rogue devices, legal and security risk, user dissatisfaction, and lack of support for IT-sponsored initiatives. It is a complex topic, and companies have struggled to develop a set of practical guidelines to address mobile privacy effectively, especially for BYOD deployments.

In this session:
• Learn what your employees really think you are doing with their mobile data
• Establish communications programs to address confusion about data visibility and handling
• Implement privacy best practices to support a more successful and secure BYOD program

Astor Ballroom
12:15pm – 1:15pm Lunch in the Sponsor Pavilion Plaza Ballroom
1:15pm – 1:25pm Transition to Ballroom
1:25pm – 2:30pm

Executive Roundtable Discussions Facilitated by Summit Hosts

Breakout sessions with your peers on topics determined by attendees during registration. The topics are facilitated by the Summit Hosts.

Topic 1: “Advanced Persistent Threats – Once a Target, Always a Target?”

Robert MimsStuart Wagner
Director, IT Security & Compliance
Enterprise Products
Read Bio

read more

Topic 2: “Triage for Corporate Security: Freeing Up Your Best and Brightest to Work on the Really Difficult Issues”

Chris BullockMary E. Dickerson
Executive Director, IT Security and Chief Information Security Officer
University of Houston
Read Bio

read more

Topic 3: “Mobile Security – Coming to Terms with the New World Order “

Mike ThomasDan Yomine
Vice President, Global Information Security
Bank of America
Read Bio

read more

Topic 4: “Ethical Hacking: Does “Hire a Hacker” Work?”

Charles NewberryWillis Marti
Director and CISO, Networking and Information Security
Texas A&M University
Read Bio

read more

Topic 5: “The True Cost of Data Loss Prevention”

Tim BurkeAngelique Grado
Information Security Officer
Air Liquide America
Read Bio

read more

Topic 6: “How to Make Applications Secure”

Tim BurkeJoel Bandy
Chief Information Security Officer
Presbyterian Communities and Services
Read Bio

read more

Astor Ballroom
2:30pm – 3:00pm Break
3:00pm – 4:15pm

2nd Rotation of Executive Roundtable Discussions Facilitated by Summit Hosts

Breakout sessions continue as attendees move to another topic for discussion with their peers. At the end of the 2nd rotation, a debrief of the discussions on each of the topics will be provided by the Summit Hosts.

Astor Ballroom
4:15pm – 4:30pm Closing Remarks Astor Ballroom
4:30pm – 5:30pm Reception in the Sponsor Pavilion with Prize Drawings Astor Ballroom Prefunction

Venue

The St. Regis

The St. Regis – A Five Star Houston Luxury Hotel

1919 Briar Oaks Lane, Houston, TX 77027
(713) 840-7600

The St. Regis Houston is nestled in the epicenter of the nation’s energy capital, conveniently situated between River Oaks, Houston’s most exclusive residential neighborhood, and the Galleria Houston, an international mecca for luxury shopping and world-class entertainment.

Room Rate and Booking

Rooms are based on availability at the St. Regis Hotel at their current website rate when booking. Visit their website to book your room: St. Regis Hotel

Floor-to-ceiling windows frame extraordinary views of the Houston skyline or a tree-lined park from each Superior or Deluxe Guest Room. Relax in a casually elegant urban sanctuary, complete with the signature St. Regis pillow-top bed and sumptuous custom furnishings. Classic-designed chrome fittings and rich granite countertops in the bathroom, and state-of-the-art technology surround travelers with the comforts of a gracious home.
The St. Regis

Room amenities include:
• Choice of 1 King or 2 Double beds
• Deluxe location with high floor or superior view
• Floor to ceiling windows
• Pillow-top mattress with fine Italian bed linens
• Oversized desk area with data port line and ergonomically designed chair
• Wi-Fi High Speed Internet Access (charge)
• 37 inch flat panel HDTV
• HD DVD player
• Bose Wave CD Radio
• “Jack-Pack” electronic recharging device
• Remède bath amenities
• Fully stocked mini bar

There are numerous hotels in the area and the Galleria just over a mile away. Here are a few within 1 ½ miles of The St. Regis:
Courtyard by Marriott Galleria
Crowne Plaza River Oaks
Hotel Granduca
Houston Marriott West
Royal Sonesta Hotel
Westin Galleria

Amenities

The hotel has an onsite workout facility, outdoor pool, and spa.

Parking

Valet Parking: day rate of $10.00 per car
Overnight Valet Parking: $25.00 per car

Directions

Hobby Airport (HOU)
Travel Distance: Approximately 19.31 km/12.0 miles
Options for getting to and from the hotel include:

Transportation Services of Houston
Fee: $98.75 + Gratuities
Hours: 24 hours
Contact: (713) 840-7600; Reservation Required

Taxi
Fee: $45.00 Zoned Fare

Express Shuttle Service http://www.supershuttle.com (800)-258-3826
First Passenger: $23.00
Each Additional Passenger: $7.00
Fuel Surcharge: $1.00
Max Passengers: 10

George Bush Intercontinental Airport (IAH)
Travel Distance: Approximately 27.36 km/17.0 miles
Options for getting to and from the hotel include:

Taxi
Fee: $65.00 Zoned Fare

Express Shuttle Service http://www.supershuttle.com (800)-258-3826
First Passenger: $27.00
Each Additional Passenger: $7.00
Fuel Surcharge: $1.00
Max Passengers: 10

By Rental Car
Enterprise Rent-A-Car
Contact: (713) 645-7222
Hertz Car Rental
Contact: (713) 629-0190
Avis Rent A Car
Contact: (713) 629-7230
Budget Car Rental
Contact: (713) 840-0007
Thrifty Car Rental
Contact: (713) 622-4034

By Hotel Shuttle
Hours of operation:
Monday – Friday
07:00 AM to 11:00 PM
Saturday – Sunday
10:00 AM to 02:00 PM
7 Days a Week
06:00 PM to 10:00 PM

From Galveston (South)

• Take Interstate 45 North to Highway 59 South (Victoria).
• Take 59 South to 610 North.
• Exit at San Felipe and turn right.
• Turn left on Briak Oaks Lane, which is the 2nd traffic light. The hotel is on the right.

From San Antonio (West)

• Take Interstate 10 East to Interstate 610 South.
• Exit at San Felipe and turn left under the freeway.
• Turn left onto Briar Oaks Lane, which is the 3rd light. The hotel is on the right.

From Beaumont (East)

• Take Interstate 10 West to West I-610 Loop South.
• Continue 2 exits and exit on San Felipe via the ramp to the right.
• Turn left on San Felipe Road under the I-610 Loop South Overpass.
• Turn left on Briar Oaks Lane at the 3rd light, and the hotel is on the right.

From Dallas (North)

• Take Interstate 45 South to Interstate 610 West. I-610 West becomes I-610 South.
• Exit on San Felipe and turn left under the freeway.
• Turn left on Briar Oaks Lane (3rd light) and the hotel is on the right.

Platinum Sponsor

spo_blueCoatAbout Blue Coat Systems

Blue Coat empowers enterprises to safely and securely choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets. Blue Coat has a long history of protecting organizations, their data and their employees and is the trusted brand to 15,000 customers worldwide, including 86 percent of the FORTUNE Global 500. With a robust portfolio of intellectual property anchored by more than 200 patents and patents pending, the company continues to drive innovations that assure business continuity, agility and governance.

Silver Sponsor

spo-impervaAbout MobileIron

MobileIron’s mission is to enable global companies to become Mobile First organizations, embracing mobility as their primary IT platform in order to transform their businesses and increase their competitiveness.

Mobile technology is driving a massive shift in the ability of IT to support the way people want to work. Mobile First organizations focus on building superb mobile user experiences that are available anywhere users need them. They have to move fast and adopt new technologies rapidly.

Companies around the world rely on MobileIron’s scalable architecture, rapid innovation, and best practices as the foundation for their transformation into Mobile First organizations.

Bronze Sponsor

spo-impervaAbout Imperva

More companies trust Imperva to secure their data than any other vendor. Imperva’s proven solutions deliver activity monitoring, real-time protection and risk management of critical business data and applications.

Imperva solutions overcome many of the security challenges faced by IT organizations by delivering accurate, actionable information on all data access, usage, and business processes within real-world production environments, and without impacting the efficiency of business functions.

The global leader in Application Data Security, Imperva’s award-winning governance and protection solutions provide full visibility and control of enterprise data from the database, through the application, to the accountable end user. Contact us at: www.imperva.com.

Participating Sponsors

spo_blueCoatAbout Code42

Code42 develops intuitive, optimized technology to securely manage and protect the world’s data. Its award-winning CrashPlan backup solutions manage exabytes of data across millions of devices and for some of the largest organizations in the world. And its SharePlan enterprise-grade file sync/share enables real-time collaboration while enforcing corporate security requirements. Visit: http://www.code42.com/.

spo_blueCoatAbout RSA

RSA, The Security Division of EMC, is the premier provider of security, risk and compliance management solutions for business acceleration. RSA helps the world’s leading organizations succeed by solving their most complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding mobile access and collaboration, proving compliance, and securing virtual and cloud environments. For more information, please visit www.EMC.com/RSA.

Summit Sponsors

Platinum Sponsor

Silver Sponsor

Bronze Sponsor

Participating Sponsors

OTHER PAST PROGRAMS

Guest Feedback

The past two New York Summits have led to 15 follow-up meetings and helped to make our New York rep the top sales rep in...

Ed Adams, Chief Executive Officer, Security Innovation
VIEW MORE GUEST FEEDBACK IT Security Leaders

I was honored to participate in this Summit. I thought the candid discussions with senior security professionals was refreshing and informative.”...

Eric Yancy, Information Security Officer, GetThere
VIEW MORE GUEST FEEDBACK IT Security Leaders

Best one-on-one with both peers and solution providers. Also, perfect for one day of packed content....

Kevin McMahon, Sr. VP & Chief Compliance Officer, Calpine Corporation
VIEW MORE GUEST FEEDBACK IT Security Leaders

Excellent information sharing and networking....

Gary Toretti, Chief Information Security Officer, Sabre Corporation
VIEW MORE GUEST FEEDBACK IT Security Leaders

The EA Summits provide me with the opportunity to speak with peers that I can trust....

Scot Miller, VP & Chief Information Security Officer, HMS Healthcare
VIEW MORE GUEST FEEDBACK IT Security Leaders