The Security Leaders Summit

Where Industry Leaders Meet to Shape the Future
  • Home
  • /
  • Security Leaders Summit

The Security Leaders’ Summit New York Spring was held on Tuesday, April 29, 2014 at The Hilton Avenue of the Americas. With 100 executives in attendance from across the Tri-State region, the Summit offered an exceptional experience for attendees to engage in thought provoking discussions, hear from industry leaders, have peer-to-peer conversations and meet some of the most interesting people in the area. Throughout the day the Summit Hosts, executives representing companies across a diversity of industries and sizes, shared their insights and knowledge with the distinguished group of attendees through their presentations, interview sessions and facilitation of executive roundtable discussions.

Summit Recap

In the opening keynote, Elliott Glazer, Chief Security Officer of Dun and Bradstreet, spoke on “Talking SMAC (Social Networks, Mobile, Analytics, and Cloud) With Your Business Leaders.” In his presentation, Elliot highlighted SMAC is the reality of emerging business activities and practices, risk management empowers business leaders and stakeholders to make appropriate decisions about security, customer voices and public opinion must be considered, and the need for the development of operating models and scenarios that work for both business and risk/security.

Geoff Bibby, Vice President, Corporate Marketingwith ZixCorp, Gold Sponsor provided an Executive Briefing on “BYOD: A Fresh Perspective-Avoid a Bring-Your-Own-DISASTER Scenario.”Geoff provided insights into recent survey results on how employees are using their phones, disabling auto-lock security, stats on employees following policies, and the increasing number of personal devices in the workplace. During his presentation, Geoff focused on the move to BYOD security by managing access versus devices.

Download the presentation: 2014 Security Leaders’ Summit New York Spring – ZixCorp Speaker, Geoff Bibby

In the session, “Game Changers,” John Kirkwood, Former CISO of Delhaize America, shared his insights into what it means to be a game changer and facilitated a discussion with Scott Goodhart, VP Global Network and Chief Information Security Officer at AES Corporation, on what each of them are doing to drive innovation, what is creating the need to be innovative or a game changer and the positive impacts on the business.

In “Trends, Drivers and Impacts,” Sr. Technology Evangelist, Grant Asplund of Blue Coat Systems, Platinum Sponsor, presented “Revolutionizing Advanced Threat Protection.” During this session, Grant presented findings from their research organization on trends on the evolving landscape of threat management, time and window of opportunity, and modern countermeasures.



Download the presentation: 2014 Security Leaders’ Summit New York – Blue Coat Speaker, Grant Asplund

In the session “Insights and Interviews – “The Value Driven Security Organization,” Summit Emcee Richard Warner interviewed Todd Bearman, CISO of Towers Watson, on how he plans to deliver increasing value to his organization, what it will take to get there, and what he expects in terms of success. Todd shared insights on leveraging the processes and rigor while working in the financial industry to his current organization.

Kris Lovejoy, General Manager of IBM Security Services Division, Platinum Sponsor and former CISO at IBM, shared insights into how she built her organization as a CISO, how she allocated roles and responsibility and how she put leveraged best practices.

In the afternoon session after lunch, “Off the Cuff,” Summit Emcee Richard Warner provided some of the latest data points and trends on social media and engaged the audience in conversations on governance and policy and the use of social media in their organizations moving forward.

Dave Hart, Vice President of Enterprise Accounts for Accellion, Gold Sponsor provided an Executive Briefing on “Increasing Mobile Productivity While Protecting Enterprise Data.” Dave shared insights on how the need for mobile productivity is transforming the way enterprises do business. Implementing a BYOD policy can help increase mobile productivity, as teams work whenever and wherever they prefer, while still be able to keep files secure and mitigate compliance risks.

The breakout Executive Roundtable discussions for peer-to-peer discussions, kept the afternoon lively and engaging as attendees had the opportunity to choose from 10 different topics.

Topics were facilitated by security executives including Jim Moran, Chief Information Security Officer, Educational Testing Service, Wayne Proctor, Director, Information Security & IT Risk Management, UPS, Marc Appelbaum, IT Security Officer, Meridian Health, Martin Gomberg, Senior VP & Global Director, Security & Business Protection, A&E Television Networks, Hari Shah, Divisional Vice-President, Coach, Inc, Bala Rajagopalan, Information Security Officer, ConvergEx Group, Max Tumarinson, VP of Information Security, Amalgamated Bank, Anil Jampana, Chief Security Officer, Nutrisystem and Laura Jagodzinski, VP Chief Information Security Officer, Realogy Holdings Corporation. Todd Bearman, CISO of Towers Watson, facilitated the debriefs of the roundtable discussions.

The day wrapped up with an afternoon reception and prize drawings.

Be sure to visit the photo gallery.

Platinum Sponsors

Blue Coat Systems

Blue Coat empowers enterprises to safely and securely choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets. Blue Coat has a long history of protecting organizations, their data and their employees and is the trusted brand to 15,000 customers worldwide, including 86 percent of the FORTUNE Global 500. With a robust portfolio of intellectual property anchored by more than 200 patents and patents pending, the company continues to drive innovations that assure business continuity, agility and governance.



For additional information, please visit: www.bluecoat.com or contact Deborah.jagoe@bluecoat.com

IBM

IBM would like to thank you for attending the 2014 New York City Executive Alliance Security Leaders Summit. Executive Alliance continues to organize fantastic events where security leaders across all enterprises and industries can discuss recent trends and concerns. At IBM, we understand your concerns. In fact, we are the world’s largest security firm with over 4,000 consultants and 10 security operations centers worldwide to support our customers and help prevent them from becoming the next headline. Speaking of our security operations centers, each quarter our research team, the IBM X-Force, publishes a threat intelligence report which highlights risks and trends. We’ve provided it for you to review as well as a map of our dedicated sales team. Should you have any questions, please feel free to call or e-mail the contact on the map that covers your region.We hope you enjoy this report and again, thanks for attending the event.
IBM-1Q14 XForce Threat Intelligence Quarterly PDF

For more information on IBM Security Services, please visit: www.ibm.com/services/security

Gold Sponsors

Accellion

Accellion provides mobile solutions to enterprise organizations to enable increased business productivity while ensuring data security and compliance. As the leading provider of private cloud solutions for secure file sharing, Accellion offers enterprise organizations the scalability, flexibility, control and security to enable a mobile workforce with the tools they need to create, access and share information securely, wherever work takes them. More than 12 million users and 2,000 of the world’s leading corporations and government agencies use Accellion solutions to increase business productivity, protect intellectual property, ensure compliance and reduce IT costs. For more information please visit: www.accellion.com or call 650-485-4300.
Information for Downloads
kiteworks™ by Accellion Solution Overview
kiteworks Content Connectors
kiteworks Mobile Apps
kiteworks Private Cloud Deployments

Zix Corporation

ZixCorp offers industry-leading email encryption, a unique email DLP solution and an innovative email BYOD solution to meet your company’s data protection and compliance needs. ZixCorp is trusted by the nation’s most influential institutions in healthcare, finance and government for easy to use secure email solutions. For more information, visit www.zixcorp.com.

A SIMPLE BYOD APPROACH TO BYOD: How Zix Gets It Right
The Power of Everyone: How Community-Based Email Encryption Strengthens Security

Participating Sponsor

AirWatch by VMware

AirWatch by VMware is the leader in enterprise mobility management, with more than 10,000 global customers. The AirWatch platform includes industry-leading mobile device, email, application, content, and browser management solutions. Acquired by VMware in February 2014, AirWatch is based in Atlanta and can be found online at www.air-watch.com.

Wi-Fi Sponsor

RiskIQ

RiskIQ™ was built with a purpose in mind: obtaining visibility over the endless landscape that is the great unknown–the Web. Google’s got this covered for search, but we’ll pick up the ball when it comes to security. We view ourselves as an organization that is personally taking on the task of ensuring that the web and mobile landscapes go from being uncharted blobs of unknown risk, to carefully charted maps that ensure complete visibility. At the same time, we’re committed to ensuring that this information is available to everyone. But it’s not enough to just make risk visible. We’re committed to making risk intelligent. For more information please contact: ben.merchant@riskiq.net.

Hosts

The Security Leaders Summit New York Spring 2014 will be hosted by Information Security and IT Executives from across the region. The Summit Hosts serve as the face of the Summit and throughout the day, they will share their insights during Presentations, Interview Sessions and our Executive Roundtable Discussions. The Hosts to-date include:

photo_comingSoonS Marc Appelbaum
IT Security Officer
Meridian Health
Read Bio

photo_comingSoonS Todd Bearman
Chief Information Security Officer
Towers Watson
Read Bio

photo_comingSoonS Elliott Glazer
Chief Security Officer
Dun and Bradstreet
Read Bio

photo_comingSoonS Martin Gomberg
Senior VP & Global Director, Security & Business Protection
A&E Television Networks
Read Bio

photo_comingSoonS Scott Goodhart
VP Global Network & CISO
AES Corporation
Read Bio

photo_comingSoonS Ray Hawkins
Chief Information Security Officer
Genesis HealthCare Corporation
Read Bio

photo_comingSoonS Laura Jagodzinski
VP Chief Information Security Officer
Realogy Holdings Corporation
Read Bio

photo_comingSoonS Anil Jampana
Chief Security Officer
Nutrisystem
Read Bio

MaddenS John Kirkwood
Global Chief Information Security Officer
Delhaize America, Inc.
Read Bio

photo_comingSoonS Jim Moran
Chief Information Security Officer
Educational Testing Service
Read Bio

photo_comingSoonS Wayne Proctor
Director, Information Security & IT Risk Management
UPS
Read Bio

photo_comingSoonS Bala Rajagopalan
Information Security Officer
ConvergEx Group, LLC
Read Bio

photo_comingSoonS Hari Shah
Division Vice President, Information Security & Business Continuity
Coach, Inc.
Read Bio

photo_comingSoonS Max Tumarinson
FVP/CISO
Amalgamated Bank
Read Bio

Time Description
7:30am – 8:30am Registration Opens with Breakfast Buffet and Networking in the Sponsor Pavilion Rendezvous Ballroom
8:30am – 8:45am Welcome and Opening Remarks Trianon Ballroom
8:45am – 9:15am

Opening Keynote: “Talking SMAC (Social Networks, Mobile, Analytics, and Cloud) With Your Business Leaders”

Elliott GlazerElliott Glazer
Chief Security Officer
Dun and Bradstreet
Read Bio

In the eyes of risk and security leaders, Social Networks, Mobile, Analytics, Cloud (SMAC) are among the most challenging threats they face, but in the eyes of the business leader these are the game changing capabilities they must have to survive and thrive. In order to stay relevant and be considered a valued asset in the eyes of the business the risk and security leader must be able to look past the negative aspects and potential impacts associated with these capabilities and help the business succeed in effective use of these new capabilities, while managing risk.

In this opening keynote, Elliott Glazer, CSO of Dun and Bradstreet, will focus on finding a positive path forward for both the risk and security leader and the business leadership for the adoption of SMAC.

Trianon Ballroom
9:15am – 9:30am

Executive Briefing : “BYOD: A Fresh Perspective – Avoid a Bring-Your-Own-DISASTER Scenario”

Elliott GlazerGeoff Bibby
Vice President, Corporate Marketing
ZixCorp, Gold Sponsor
Read Bio

Your users are bringing their own devices – and potentially a variety of security, legal and HR disasters – to and from work. With many unique roles and responsibilities within your organization, there are a variety of use cases related to BYOD. Join mobile security experts from ZixCorp for real-world use cases and solutions to solve your most pressing BYOD challenges.

Trianon Ballroom
9:30am – 10:00am

“Game Changers”

ZandoliSScott Goodhart
Chief Information Security Officer
AES Corporation
Read Bio

ZandoliSJohn Kirkwood
Global Chief Information Security Officer
Delhaize America, Inc.
Read Bio

In this interview session, John Kirkwood, Former CISO of Delhaize America, will share his insights and facilitate a discussion with Scott Goodhart, VP Global Network and Chief Information Security Officer at AES Corporationon what each of them are doing to drive innovation in their organizations to help move the company forward, how they are approaching “security for the future” and the challenges and successes they are seeing to-date.

Trianon Ballroom
10:00am – 10:30am

Trends, Drivers and Impacts – “A Complete Lifecycle Approach to Advanced Threat Protection”

Geoff AranoffGrant Asplund
Sr. Technology Evangelist
Blue Coat, Platinum Sponsor
Read Bio

Due to the inevitability of advanced targeted attacks that fly under the radar of traditional, preventative-based security technologies, there is a shift toward a more modern defense-in-depth strategy—one that provides the intelligence, context, and real-time situational awareness needed to block, detect and respond to today’s advanced cyber threats.

Using the latest data points from the advanced research team at Blue Coat, Sr. Technology Evangelist, Grant Asplund will share:
• The latest trends
• What is driving the trends
• Expected impact
• and Approaches that can help empower your digital enterprise and organization, enabling you to adopt the best new technologies that drive your business.

The Advanced Threat Lifecycle Defense is the first to integrate a business process view that aligns with how your security team operationalizes new intelligence and technologies to fortify your security infrastructure against future attacks.

Trianon Ballroom
10:30am – 11:00am Break and Networking in the Sponsor Pavilion Rendezvous Ballroom
11:00am – 11:30am

Insights and Interviews – “The Value Driven Security Organization”

Elliott GlazerTodd Bearman
Chief Information Security Officer
Towers Watson
Read Bio

The business challenges and the dynamics of change are forcing security leaders to constantly rethink what success means to their organizations and to their businesses. Corporate leadership is under increased pressure to reinvent business strategies, services and products to combat shrinking profit margins and diminishing competitive advantages. As the leadership role of a security organization continues to evolve at a rapid pace with expanded responsibilities, the value delivered by the information security/risk organization is becoming increasingly critical to the success of the enterprise. Successful security leaders are taking the long view of their role as they develop strategies to help enable their businesses to move quicker, positively impact the bottom, and ensure the protection of its assets.

In this interview session, Summit Emcee Richard Warner interviews Todd Bearman, CISO of Towers Watson, on how he plans to deliver increasing value to his organization, what it will take to get there, and what he expects in terms of success.

With more than 14,000 associates around the world, Towers Watson is a leading global professional services company that helps organizations improve performance through effective people, risk and financial management, by offering consulting, technology and solutions in the areas of benefits, talent management, rewards, and risk and capital management.

Trianon Ballroom
11:30am – 12:00pm

“Building a Strategic Defense Against the Global Threat Landscape: Understand the Attackers and Protect the Business”

Jim RouthKris Lovejoy
General Manager
IBM Security Services Division
Read Bio

Cyber threats have become a boardroom agenda with the potential to bring down an organization’s network, create compliance issues, damage bottom lines, and impact brand reputation. Additionally, disparate security technologies create ‘security silos,’ increasing cost and complexity of security management, and making it almost impossible to uniformly monitor security threats across IT environments. New approaches and innovations in technology can help businesses address these challenges with a highly secure network infrastructure, analytics, and the optimal blend of on-premise and next-generation cloud-managed security capabilities.

IBM’s Kris Lovejoy has first-hand experience in this area. Prior to heading IBM’s Security Services business, which was ranked as a leader in Gartner Group’s 2014 Managed Security Services Provider Magic Quadrant, Kris served as IBM’s CISO where she used a framework of essential security practices to engage with IBM’s board. The framework proved instrumental in prioritizing security investments and the development of an assessment program to measure and report progress to the board.

In this session, Kris will outline the major threats businesses face in addressing the growth of cyber incidents and sophisticated attacks — and how companies can better prepare and defend their crown jewel enterprise business data. Kris will share her perspectives, previewing the 2014 Cyber Security Intelligence Index and the implementation of IBM’s 10 Essential Practices – the basis of IBM’s approach to securing itself and thousands of businesses around the world.

Trianon Ballroom
12:00pm – 1:00pm Lunch in the Sponsor Pavilion Rendezvous Ballroom
1:00pm – 1:15pm Transition to Ballroom
1:15pm – 1:45pm

“Off the Cuff”

In this session, Summit Emcee Richard Warner will provide some of the latest data points and trends and engage the audience in their feedback and input.

Trianon Ballroom
1:45pm – 2:00pm

Executive Briefing – “Increasing Mobile Productivity While Protecting Enterprise Data”

Jim RouthDave Hart
Vice President / Enterprise Accounts for Accellion
Accellion, Gold Sponsor
Read Bio

The need for mobile productivity is transforming the way enterprises do business. Employees need the ability to edit and create documents, access information that is stored in ECM systems, or share files with co-workers – all from their mobile devices. They need to be as productive away from the office as they are at their desks. Implementing a BYOD policy can help increase mobile productivity, as teams work whenever and wherever they prefer. However, to ensure the security of files and enterprise data, organizations need to carefully select technology that enables this policy. This session will explore how to enable mobile productivity to increase efficiencies, while keeping files secure and mitigating compliance risks.

Trianon Ballroom
2:00pm – 2:50pm

Executive Roundtable Discussions Facilitated by Summit Hosts

Breakout sessions with your peers on topics determined by attendees during registration. The topics are facilitated by the Summit Hosts.

Topic 1: How to Make Applications Secure?

Robert MimsJim Moran
Chief Information Security Officer
Educational Testing Service
Read Bio

read more

Topic 2: Cloud Security: Peeling the Onion

Chris BullockWayne Proctor
Director, Information Security & IT Risk Management
UPS
Read Bio

read more

Topic 3: The True Cost of Data Loss Prevention

Mike ThomasMarc Appelbaum
IT Security Officer
Meridian Health
Read Bio

read more

Topic 4: Meeting Industry, Government and Corporate Regulations

Charles NewberryMartin Gomberg
Senior VP & Global Director, Security & Business Protection
A&E Television Networks
Read Bio

read more

Topic 5: Advanced Persistent Threats – Once a Target, Always a Target?

Charles NewberryHari Shah
Divisional Vice-President
Coach, Inc.
Read Bio

read more

Topic 6: Cyber Security: Finding the Needle in the Big Data Haystack

Charles NewberryBala Rajagopalan
Information Security Officer
ConvergEx Group, LLC
Read Bio

read more

Topic 7: Endpoint Security – The Last Line of Defense

Charles NewberryMax Tumarinson
VP of Information Security
Amalgamated Bank
Read Bio

read more

Topic 8: Ethical hacking: Does “Hire a Hacker” Work?

Charles NewberryRay Hawkins
Chief Information Security Officer
Genesis HealthCare Corporation
Read Bio

read more

Topic 9: Security Awareness: A Polarizing Issue

Charles NewberryAnil Jampana
Chief Security Officer
Nutrisystem
Read Bio

read more

Topic 10: “Data Mobility: Pitting Productivity Against Protection”

Charles NewberryLaura Jagodzinski
VP Chief Information Security Officer
Realogy Holdings Corporation
Read Bio

read more

Trianon Ballroom
2:50pm – 3:10pm Break Rendezvous Ballroom
3:10pm – 4:20pm

2nd Rotation of Executive Roundtable Discussions Facilitated by Summit Hosts

Breakout sessions continue as attendees move to another topic for discussion with their peers. At the end of the 2nd rotation, a debrief of the discussions on each of the topics will be provided by the Summit Hosts.

Trianon Ballroom
4:20pm – 4:30pm Closing Remarks Trianon Ballroom
4:30pm – 5:30pm Reception in the Sponsor Pavilion with Prize Drawings Rendezvous Ballroom

Venue

Hilton New York, Avenue of the AmericasHilton Avenue of the Americas

1335 Avenue of the Americas, New York, NY 10019
(212) 586-7000

Located in the heart of New York City, the Hilton New York is just steps away from New York’s premier attractions. Conveniently situated in Midtown Manhattan, the hotel is one of the most sophisticated New York hotels and is within walking distance of Times Square, Radio City Music Hall, Fifth Avenue shopping, the Broadway Theatre district, Central Park, The Museum of Modern Art (MOMA) and many more iconic New York landmarks.

Room Rate and How To Book

Hilton New York, Avenue of the AmericasSelect from a variety of modern, spacious guest rooms featuring on-demand entertainment and high-speed internet access. Upgrade to a suite and enjoy complimentary Executive Lounge access. This exquisite New York hotel provides a diverse choice of dining options.

For our Summit attendees, we have a discounted rate with the Hilton New York (Ave of the Americas) of $309.00 per night (regular rates are $379 and up). Rooms at the discount rate are limited and will be offered April 28 – April 30, 2014, subject to availability. To reserve your special rate with the Hilton Midtown Hotel – please call Hotel reservations at 212-586-7000 (or toll free 855-760-0871), ask for Reservations and the special rate code is EXEA.

You may also reserve online by visiting this website: New York Midtown – Security Leaders’ Summit New York

Amenities

The hotel has a fitness center, business center, valet parking, rooftop lounge, onsite restaurants, and room service.

Parking

  • Self parking – Not Available
  • Valet parking – $60.00 ($51 for Sedan Cars)
  • Other Parking Information – Entrance located in back-W.53rd bet 6&7th Ave

Directions

On Avenue of the Americas (6th Ave.) between West 53rd and West 54th Streets. 53rd street is west bound and 54th street is east bound.Laguardia is 8 miles, JFK is 17 miles, Newark is 15 miles, Grand Central station is 15 minutes across town, Penn Station is 15 minutes downtown and Port Authority is 10 minutes downtown.

View Larger Map

John F. Kennedy International Airport

  • Van Wyck Expressway North To Long Island Expressway (LIE) West and watch for signs to Queens Midtown Tunnel to 34th street . Go west accross 34th street to Avenue of the Americas (6th Avenue). Make a right and go up the Avenue to 53rd st.

Newark International Airport

  • Look for signs to New Jersey Turnpike (I-95 N) follow signs to Lincoln Tunnel, tunnel exits at west 40th street and 9th ave, drive east on 40th street to Avenue of the Americas and turn left on 53rd street

La Guardia Airport

  • Grand Central Parkway to Brooklyn Queens Expressway South to Long Island Expressway West. Follow signs for Queens Midtown Tunnel to 34th Street . Take 34th Street West to Avenue of the Americas (6th Avenue). Make a right and go to 53rd st.

If you are interested in sponsoring the event or would like more information about sponsor packages, please call 678-445-1919 or email us at info@execalliance.com.

Platinum Sponsors

spo_blueCoatAbout Blue Coat Systems

Blue Coat empowers enterprises to safely and securely choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets. Blue Coat has a long history of protecting organizations, their data and their employees and is the trusted brand to 15,000 customers worldwide, including 86 percent of the FORTUNE Global 500. With a robust portfolio of intellectual property anchored by more than 200 patents and patents pending, the company continues to drive innovations that assure business continuity, agility and governance.

spo_ibmAbout IBM

With more than 40 years of security experience, IBM is helping clients take a broad, holistic view of security intelligence across their entire business. IBM has worldwide research labs developing the latest security technology innovations and delivering them across nine global security operation centers to help clients maintain an appropriate security posture. IBM Managed Security Services delivers the expertise, tools and infrastructure clients need to secure their business and information assets from constant Internet attacks, often at a fraction of the cost of in-house security resources. For more information on IBM Security Services, please visit: www.ibm.com/services/security

Gold Sponsors

spo-accellionAbout Accellion

Accellion provides mobile solutions to enterprise organizations to enable increased business productivity while ensuring data security and compliance. As the leading provider of private cloud solutions for secure file sharing, Accellion offers enterprise organizations the scalability, flexibility, control and security to enable a mobile workforce with the tools they need to create, access and share information securely, wherever work takes them. More than 12 million users and 2,000 of the world’s leading corporations and government agencies use Accellion solutions to increase business productivity, protect intellectual property, ensure compliance and reduce IT costs. For additional information visit www.accellion.com.

ZixCorp-logoAbout ZixCorp

ZixCorp is a leader in email data protection. ZixCorp offers industry-leading email encryption, a unique email DLP solution and an innovative email BYOD solution to meet your company’s data protection and compliance needs. ZixCorp is trusted by the nation’s most influential institutions in healthcare, finance and government for easy to use secure email solutions. ZixCorp is publicly traded on the Nasdaq Global Market under the symbol ZIXI, and its headquarters are in Dallas, Texas. For more information, visit www.zixcorp.com.

Participating Sponsor

spo-accellionAbout AirWatch by VMware

AirWatch by VMware is the leader in enterprise mobility management, with more than 10,000 global customers. The AirWatch platform includes industry-leading mobile device, email, application, content, and browser management solutions. Acquired by VMware in February 2014, AirWatch is based in Atlanta and can be found online at www.air-watch.com.

Wi-Fi Sponsor

spo-accellionAbout RiskIQ

RiskIQ™ was built with a purpose in mind: obtaining visibility over the endless landscape that is the great unknown–the Web. Google’s got this covered for search, but we’ll pick up the ball when it comes to security. We view ourselves as an organization that is personally taking on the task of ensuring that the web and mobile landscapes go from being uncharted blobs of unknown risk, to carefully charted maps that ensure complete visibility. At the same time, we’re committed to ensuring that this information is available to everyone. But it’s not enough to just make risk visible. We’re committed to making risk intelligent.

Guest Feedback

I had a great time meeting with colleagues and covering relevant topics to our disciplines. I met the right vendors and was able to...

Dan Reynolds, VP, Chief of Security & Information Architecture, Omnicom Media Group
VIEW MORE GUEST FEEDBACK IT Security Leaders

This National Security leaders Symposium is a great opportunity to review best practices across the industry, evaluate some of the latest technologies and solutions from...

James Beeson, Chief Information Security Officer, GE Capital Americas
VIEW MORE GUEST FEEDBACK IT Security Leaders

As Cyberthreat is the number one threat, it is everyone’s responsibility to educate themselves to protect us from cyberwar. ...

Raj Patel, Chief Information Security Officer, City of Palo Alto
VIEW MORE GUEST FEEDBACK IT Security Leaders

I look forward to the Executive Alliance event each year. The agenda provides a variety of topics and formats that generate stimulating conversations that I...

Darin Mastricola, AVP, IT Risk, Security, and Compliance, Endurance Services Ltd.
VIEW MORE GUEST FEEDBACK IT Security Leaders