ISE® West Schedule of Events 2018

ISE® WEST PRIVATE WELCOME DINNER
Answering the "Are We Okay?" Question: Simplifying for Certainty About Advanced Threats

August 15, 2018
5:30pm - 8:30pm
Harris’ The San Francisco Steakhouse
2100 Van Ness Avenue
San Francisco, CA 94109
Registration
Chuck Markarian

Chuck Markarian
Chief Information Security Officer
PACCAR
Biography

With every new breach, board members and leadership teams want to know if their business is protected and ask information security leaders the ever-familiar question - “Are we ok?”. Definitive answers are difficult to provide. Enterprises have implemented endpoint security programs that are complex, unable to keep up with the pace at which attackers are developing never-before-seen techniques. The threats vs. protections arms race has resulted in multiple niche products on endpoints, making the endpoint environment complex, and exposure difficult to assess. It is crucial for enterprise security leaders and their teams to implement an endpoint strategy that addresses the scope of these new attack techniques and tactics while reducing the complexity and increasing the performance of the endpoint environment.

Join our conversation as we discuss how enterprise security leaders can get to certainty with an endpoint security program that stops never-before-seen attacker techniques while reducing complexity and cost.

August 16, 2018

11:00 AM - 3:00 PM: Registration

Location: Pre-function of Elizabethan Ballrooms C&D, 2nd floor

11:15 AM: ISE® Signature Luncheon *Invitation Only

Location: Elizabethan B, 2nd floor

Sponsored by:

Maximizing the Potential of Man and Machine

There’s a lot of buzz in the cybersecurity industry around artificial intelligence, automation, and orchestration. Some view them as the Next Great Hope, while others would replace that last word with “Hype.” Despite what you might hear from some optimistic vendors, AI and automation aren’t the perfect panacea for all your cybersecurity challenges. For example, highly dynamic activities that require a great deal of expertise are not the most suitable candidates for automated decisioning. Human intuition is essential to things like hunting and forensics while automation can work wonders for simpler, repetitive, time-guzzling tasks that require human fingers more than human brains. Join our conversation as we discuss how you can leverage the automation and orchestration boom to your advantage, to build solid SOC solutions that incorporate the best of manual and automated processes.

12:50 PM: Welcoming Remarks and Introductions

Location: Elizabethan C&D, 2nd floor
Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

T.E.N.'s CEO & President will welcome guests, provide an overview of the program agenda and event purpose, and introduce the speakers and sponsors of the ISE® West Executive Forum and Awards 2018.

1:00 PM: Keynote Address

Location: Elizabethan C&D, 2nd floor
Pritesh Parekh

Pritesh Parekh
VP & Chief Security Officer
Zuora
San Francisco, CA
ISE® West Executive Award Finalist 2016
ISE® North America Executive: Commercial Award Finalist 2016
ISE® West Executive Award Finalist 2017
ISE® North America Executive: Financial Award Winner 2017

Biography

1:35 PM: Interactive Executive Roundtables

Location: Elizabethan C&D, 2nd floor

The Interactive Executive Roundtables brings together ISE® Nominees, industry leaders, invited guests, and sponsor delegates to meet each other and join in interactive discussions on key industry issues as well as share best practices.  The interactive roundtable discussions are hosted by our distinguished ISE® Alumni who are leading CISOs and Information Security Executives.

Rebalancing the SOC

Sponsored by:

Central to safeguarding against cyber threats is a corporation's SOC. Security operations require constant innovation to keep up with the businesses they protect and to mitigate potential damage from the threats against them, especially because skilled SOC analysts are so hard to find and retain. The exponential growth in security-relevant data coupled with the ongoing challenge of finding training and retaining skilled security analysts to monitor and respond to that data creates a critical and vexing problem for security organizations. However, by marrying the benefits of skilled analysts with automation, orchestration and AI, your organization can create a much more hospitable, efficient, and effective SOC. With revolutionary technologies advancing security operations, like AI-based expert systems, an autonomous analyst is no longer a concept, but a reality.

Security That Works Outside the Perimeter

Sponsored by:

The days of working within four office walls are long-gone. In fact, 43% of Americans work remotely at least some of the time. Your team works from their desks, but also from home, from the airport, from the coffee shop around the corner—the list goes on. Your employees are using modern cloud applications that allow them to work from anywhere, but is your security solution keeping up with this new perimeter? It’s important to balance security and end user flexibility to meet compliance requirements for your organization. Furthermore, end users aren’t just your employees any more. Customers, partners, and suppliers are all demanding access on-the-go and on multiple devices. Join our conversation as we discuss the challenges of securing your organization in a perimeterless world and how we can create a seamless end user experience and secure data all while meeting enterprise compliance requirements.

The Increasing Impact of Insider Threats

John Abel

John Abel
Chief Information Security Officer
Sutter Health

Insider threats continue to be one of the top cyber security threats and have proven that they are a force to be reckoned with. According to a 2017 Insider Threat Report, 53% of companies estimate remediation costs of $100,000 and more, with 12% estimating a cost of more than $1 million. The same report suggests that 74% of companies feel that they are vulnerable to insider threats, with 7% reporting extreme vulnerability. Every company will face an insider-related breach sooner or later regardless of whether it will be caused by a malicious action or an honest mistake. As costs related to insider threats continue to grow, what can Information Security Executives and their security teams do to combat this all too familiar foe?

Gone Phishing: Securing the Enterprise from Social Engineering Attacks

Selim Aissi
Chief Security Officer
Ellie Mae
ISE® West Executive Award Finalist 2015
ISE® North America Executive Award Finalist 2015 - Commercial Category

Biography

Social media, a digital medium that is rooted in sharing personal and professional data, continues to be a favorite target for cyber-criminals because it offers a virtual treasure trove of readily accessible information. The very nature of how information is shared via social media goes against many longstanding core information security principals. Businesses of all shapes and sizes can be targets of social media engineering and phishing attacks. While phishing itself is an incredibly well-known attack technique, it still continues to be a major security issues for many organizations. Symantec’s 2017 Internet Security Threat Report found that Business Email Compromise (BEC) scams, relying on spear-phishing emails, targeted over 400 businesses every day, draining $3 billion over the last three years. While it’s critical for security teams to keep up to date on current social engineering and phishing attacks, what else needs to be done to ensure the enterprise at large is aware of the dangers and pitfalls of these kinds of attacks?

2:35 PM: Afternoon Break

2:45 PM: ISE® West Nominee Showcase Presentation #1

Location: Elizabethan C&D, 2nd floor

Shifting Security LEFT

Sudharma Thikkavarapu

Sudharma Thikkavarapu
Head of Cybersecurity Transformation (Sr. Manager)
T-Mobile
Biography

T-Mobile felt it was crucial to create a behavioral change across their organization in order to make security an integral part of everyone’s DNA. The T-Mobile technology and engineering teams were developing and deploying solutions to support UnCarrier activities at accelerated speeds, and their security organization was not able to scale to support the demand for application security assessments. For example, the time taken to complete one single application security assessment was approximately seven working days, which was unreasonable and slowing their business. Join our conversation to learn how the T-Mobile team took this as a problem statement and reengineered all their processes and solutions to bring down service level agreements (SLA) from 7 working days to less than 30 minutes.

3:00 - 8:00 PM: Registration

Location: Pre-function of Elizabethan Ballrooms C&D, 2nd floor

3:05 PM: ISE® West Exabyte Sponsor Showcase Presentation

Location: Elizabethan C&D, 2nd floor
John Abel

Chris Calvert
Co-Founder & VP Product Strategy
Respond Software

3:25 PM: Information Security Executive® Deep Dive Panel

Location: Elizabethan C&D, 2nd floor

An industry cross section of ISE Alumni and leading security executives explore today’s hottest security trends and issues and the key challenges they are facing now and in the future.

Panelists

Tom Borton

Tom Borton
CISO
San Francisco International Airport
Biography

John Abel

Chris Calvert
Co-Founder & VP Product Strategy
Respond Software

Jim Covington

Jim Covington
Global Cybersecurity Lead and Data Protection Officer
Qualcomm
Biography

Bernie Cowens

Bernie Cowens
Vice President, Chief Security Officer
PG&E
Biography

Maria Shaw

Maria Shaw
VP & CISO
Varian Medical Systems

4:10 PM: ISE® West Nominee Showcase Presentation #2

Location: Elizabethan C&D, 2nd floor

4:30 PM: ISE® West Nominee Showcase Presentation #3

Location: Elizabethan C&D, 2nd floor

4:50 PM: Late Afternoon Break

5:00 PM: ISE® VIP Reception (invitation only)

Location: Elizabethan A & B, 2nd floor

ISE® Nominees, sponsors and special guests will have the opportunity to network in a private setting with beverages and appetizers.

6:00 PM: Sponsor Pavilion and Dinner Buffet

Location: California West, 2nd floor

Guests enjoy gourmet dinner while networking and meeting the sponsors. Honoring and celebrating the Award Nominees for 2018, this exciting occasion will bring together top security executives to recognize the individuals who have made significant and positive impact on their organizations through exemplary performance.

7:30 PM: Sponsor Tear Down

Location: California West, 2nd floor

7:45 PM: ISE® West Awards Gala

Location: Colonial Ballroom, Mezzanine Floor

Honoring and celebrating the ISE® West Award Nominees, this exciting occasion will bring together top security executives to recognize the individuals and the project teams who have made significant and positive impact on their organizations through exemplary performance. Don't miss the Passport for Prizes drawing and a chance to win outstanding gifts from our ISE® sponsors.

Michael Dierickx

Michael Dierickx
Information Security Officer
Panasonic Avionics
Biography

Jeff Trudeau

Jeff Trudeau
Chief Security Officer
Credit Karma Inc.
ISE® North America Health Care Executive Award Winner 2013
Biography

9:00 PM: Champagne and Dessert Reception

Location: Colonial Ballroom, Mezzanine Floor

Enjoy champagne and dessert while celebrating the winners, nominees and project teams.