ISE® West Schedule of Events 2016

ISE® WEST PRIVATE WELCOME DINNER
Why Traditional Security Approaches Fail in Agile Infrastructure: And What to Do About It

July 20, 2016
5:30pm - 8:30pm
Morton’s The Steakhouse
400 Post St
San Francisco, CA 94102
Registration

Enterprises continue to invest heavily in virtualized and cloud-based infrastructures. The era of elastic IT resources is here and it’s automated, on-demand and self-provisioning. This movement has not been so easy for some as more traditional security tools don’t always function as intended in cloud computing models. Security and compliance teams are learning that force fitting old security approaches can result in increased threats, lots of manual effort and delays in responding to the business. What’s needed is a new approach that allows businesses the freedom to take full advantage of agile infrastructure, while at the same time delivering comprehensive protection of critical assets. Join our conversation to learn how to deliver a more agile, efficient and effective security strategy that will enable your enterprise to fully capitalize on the many benefits of dynamic infrastructure.

July 21, 2016

11:00am - 3:00pm: Registration

Location: Pre-function of Elizabethan Ballrooms C&D, 2nd floor

11:30 AM : ISE® Signature Luncheon *Invitation Only

Location: Elizabethan B, 2nd floor

Sponsored by

Saikat Maiti

Saikat Maiti
Chief Information Security Officer
Upstart Networks
ISE® West People's Choice Award Winner 2016
ISE® West Executive Award Finalist 2016
Biography

Heart attacks vs. Headaches: Balancing Security and Business
Security teams are tasked with keeping organizations safe from cyber-attacks. However, organizations are often forced to make a difficult choice between enabling security needs or maintaining business requirements. Security standards and best practices sadly, do not always mesh well with existing business continuity and productivity objectives. Is there a way we can achieve both goals? Join our conversation to learn more about common examples of organizations having to choose between security and performance; the impact of security on workforce productivity; and recommended approaches that have been proven to work.

1:00 PM : Welcoming Remarks and Introductions

Location: Elizabethan C&D, 2nd floor
Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

T.E.N.'s CEO & President will welcome guests, provide an overview of the program agenda and event purpose, and introduce the speakers and sponsors of the ISE® West Executive Forum and Awards 2016.

1:10 PM : Keynote Address

Location: Elizabethan C&D, 2nd floor
name

Gary Hayslip
Director of Information Security (CISO)
SoftBank Group
ISE® West Executive of the Year Award Winner 2015
ISE® North America People's Choice Award Winner 2015

Biography

Cyber, an Evolving Ecosystem: How Cyber is Laying the Groundwork for Tomorrows Smart Cities
In today’s cities, a revolution in technology is underway. Municipalities across the globe are taking the ISO 37150/51 Frameworks to heart and are looking toward a future where they will have to provide services to populations three to five times larger than today. This rise of mega cities will require municipalities to work decades in advance on planning how to deploy technology-intelligent infrastructure that will provide critical services to their citizens. This future infrastructure will be connected to municipal networks that may not be prepared for the enormous amounts of data and risk exposure they will generate. Join our conversation to learn how the City of San Diego is laying the groundwork, from a cybersecurity perspective, on how to manage this risk and lay a foundation to build on for our citizens’ future as a smart city.

1:45 PM : Interactive Executive Roundtables

Location: Elizabethan C&D, 2nd floor

The Interactive Executive Roundtables brings together ISE® Nominees, industry leaders, invited guests, and sponsor delegates to meet each other and join in interactive discussions on key industry issues as well as share best practices.  The interactive roundtable discussions are hosted by our distinguished ISE® Alumni who are leading CISOs and Information Security Executives.

Michael Antico
Americas CISO
BNP Paribas
Biography

invincea

Is Endpoint Prevention Really Dead?
The failure of anti-virus solutions and network appliances to effectively prevent attacks on networks gave rise to the era of endpoint detection and response. Bolstered by the popular phrase “prevention is dead,” new forms of security such as Endpoint Detection and Response (EDR) have been birthed based on this motto. However, many attacks on the endpoint are completely avoidable with the right strategy and tools in place. Knowing that, why have some abandoned the notion of being able to successfully prevent attacks on the endpoint? Is the era of endpoint prevention and security really over?

Al Ghous

Al Ghous
Chief Information Security Officer
Envision Digital

No Longer Left to Their Own Devices: Hacking Concerns with the Internet of Things
For many, the term “Internet of Things” has been little more than a buzzword tossed around over the last few years. However, as more devices gain the ability to connect, communicate with, and remotely manage an incalculable number of networked, automated devices via the Internet, the IoT is finally becoming a reality. Whether it’s a number of automated network devices on a factory floor, a remotely managed series of equipment in a hospital, or even just a collection of highly interconnected devices in a residential home, the elements that make up the IoT are becoming more pervasive by the day, and with them come critical security concerns. Join this conversation to discuss major security concerns with the IoT like ubiquitous data collection, consumer data privacy, and new avenues of attack.

Carolyn Taisey Lear

Carolyn Taisey Lear
Information Security, Compliance, and Risk Management Programs
The Climate Corporation
Biography

Protecting Data: Keeping the Keys to the Kingdom Out of the Hands of Hackers
Breaches invariably involve data loss (for example: Anthem, JPMC, and Target), so finding the best practices to prevent them should be an essential part of your organization. Protection of data can be done at multiple network levels and can involve encryption, masking, or tokenization. The many options for data security offer a variety of security advantages, but they each have their own flaws to take into consideration. These include issues like malicious insiders abusing encryption keys, malware-based bypasses, and overall costs. Join our conversation to learn what kinds of secure data solutions are best for your business requirements; why and when to use each solution; and how you can combine solutions to minimize risk.

Kannan Perumal

Kannan Perumal
CISO
Applied Materials
Biography

Businesses Without Borders: International Information Exchange in a Cloud-Based World
Cloud computing has allowed numerous organizations to share and collaborate with their peers with greater speed and flexibility than ever before. However, there are a number security concerns in this new world of businesses without borders. Areas such as data security, privacy, access rights management, and international security rules and regulations all serve as major hurdles that organizations across all verticals have to tackle in their own way. Maintaining trust among cloud-based enterprises and their partners is essential, but what else is needed to continually ensure that a cloud-based, information-sharing structure can succeed while remaining secure? Join our conversation to discuss security’s role in the new global marketplace and share strategies for securing sensitive information in a cloud-based world.

3:00pm - 8:00pm : Registration

Location: Pre-function of Victor’s Palace, top floor

2:45 PM : Break

2:55 PM : Nominee Showcase Presentation #1

Location: Elizabethan C&D, 2nd floor
Informatica
Bill Burns

Bill Burns
Chief Trust Officer and VP, Cloud Business Transformation
Informatica
Biography

Reshaping the Cloud Through Singular Management
The Informatica Cloud Hosting Service was developed as a singularly managed cloud platform to support Informatica in their mission to expand service offerings of best-in-class data management software to a public cloud / PaaS model. Through singular management, the team has been able to keep cost to a minimum and maximize the functional releases to customers leveraging products hosted on ICHS. The project has resulted in operational cost savings through consolidation and more efficient team alignment through the introduction of a DevOps model. This has allowed Informatica to offer these solutions in support of clients who wish to reduce their own internal IT hosting footprint. Join our conversation to learn how the Informatica team was able to enable their customers to achieve faster and more substantial ROI from their use of Informatica hosted products by shortening implementation timeframes and providing faster access to feature releases.

3:15 PM: CISO Deep Dive: Executive Leadership

Location: Elizabethan C&D, 2nd floor

An industry cross section of ISE Alumni and leading security executives explore today’s hottest security trends and issues and the key challenges they are facing now and in the future.

Moderator

Pete Lindstrom

Pete Lindstrom
VP, Security Strategies
IDC
Biography

Panelists

Selim Aissi
Chief Information Security Officer
Blackhawk Network
ISE® West Executive Award Finalist 2015
ISE® North America Executive Award Finalist 2015 - Commercial Category

Thomas Borton

Thomas Borton
Chief Information Security Officer
San Francisco International Airport
Biography

Kim Green Kim Green
Chief Information Security Officer
Zephyr Health
Biography
Kathie Miley

Kathie Miley
Executive Vice President of Worldwide Sales
Invincea
Biography

David Tsao

David Tsao
Global Information Security Officer (CISO)
Veeva Systems
Biography

4:00 PM : Nominee Showcase Presentation #2

Location: Elizabethan C&D, 2nd floor
Pritesh Parekh

Pritesh Parekh
VP & Chief Security Officer
Zuora
San Francisco, CA
ISE® West Executive Award Finalist 2016
ISE® North America Executive: Commercial Award Finalist 2016
ISE® West Executive Award Finalist 2017
ISE® North America Executive: Financial Award Winner 2017

Biography

Building Security Through Trust and Visibility Across the Enterprise
Zuora's Security team has built strong trust across their organization. All functions (engineering, technical operations, sales, legal, product, finance, HR and others) integrate with security as part of their routine process. The company’s cloud-based solution stores and processes millions of cardholder data, personal identifiable information (PII), financial information and processes millions of payment transactions. Zuora’s VP & Chief Security Officer, Pritesh Parekh, is responsible for protecting the most critical of Zuora’s assets and information, sensitive customer data and ensure its security, integrity and confidentiality. Pritesh has built a security program that includes people, process and technology across the entire organization. Join our conversation to learn how Pritesh has provided Zuora with a clear security vision, mission and strategy and developed strong partnership with other parts of the organization to get buy-in and create a well-rounded risk-based security program.

4:20 PM : Nominee Showcase Presentation #3

Location: Elizabethan C&D, 2nd floor
Jason Lish

Jason Lish
Executive Vice President and Chief Security Officer
Alight Solutions
ISE® West Executive of the Year Award Winner 2016
ISE® North America Executive Award Finalist 2016 - Financial Category
ISE® Central Executive Award Finalist 2018

Biography

Realigning the Core: Creating Security Consciousness throughout Your Organization
In 2011, Jason Lish took the helm of an organization that was understaffed, misaligned and weak in business partnerships and security tool / program effectiveness. Security was largely seen as a bolt-on necessity and implementation was ad-hoc and happenstance. Through his leadership, Jason re-built the organization from the ground up by hiring a leadership team that is second-to-none, building trust with both business and technology leadership teams, and re-focused the security mission to be at the very core of Charles Schwab values. Join our conversation to learn how Jason has created an atmosphere of security consciousness throughout the Firm, and made security a cultural cornerstone for every employee, all while addressing regulatory and customer demand for a mature security program.

4:45 PM: Late Afternoon Break

5:00 PM : VIP Reception (invitation only)

Location: Elizabethan A & B, 2nd floor

6:00 PM : Sponsor Pavilion and Dinner Buffet

Location: Victor's Palace, top floor

7:30 PM : ISE® West Awards Gala

Location: Alexandra Ballroom, top floor

9:00 PM : Champagne and Dessert Reception

Location: Alexandra Ballroom, top floor