ISE® West Schedule of Events 2018

ISE® WEST PRIVATE WELCOME DINNER
Answering the "Are We Okay?" Question: Simplifying for Certainty About Advanced Threats

August 15, 2018
5:30pm - 8:30pm
Harris’ The San Francisco Steakhouse
2100 Van Ness Avenue
San Francisco, CA 94109
Chuck Markarian

Chuck Markarian
Chief Information Security Officer
PACCAR
Biography

With every new breach, board members and leadership teams want to know if their business is protected and ask information security leaders the ever-familiar question - “Are we ok?”. Definitive answers are difficult to provide. Enterprises have implemented endpoint security programs that are complex, unable to keep up with the pace at which attackers are developing never-before-seen techniques. The threats vs. protections arms race has resulted in multiple niche products on endpoints, making the endpoint environment complex, and exposure difficult to assess. It is crucial for enterprise security leaders and their teams to implement an endpoint strategy that addresses the scope of these new attack techniques and tactics while reducing the complexity and increasing the performance of the endpoint environment.

Join our conversation as we discuss how enterprise security leaders can get to certainty with an endpoint security program that stops never-before-seen attacker techniques while reducing complexity and cost.

August 16, 2018

11:00 AM - 3:00 PM: Registration

Location: Pre-function of Elizabethan Ballrooms C&D, 2nd floor

11:15 AM: ISE® Signature Luncheon *Invitation Only

Location: Elizabethan B, 2nd floor

Sponsored by:

Maximizing the Potential of Man and Machine

Saikat Maiti

Saikat Maiti
Chief Information Security Officer
Upstart Networks
ISE® West People's Choice Award Winner 2016
ISE® West Executive Award Finalist 2016
Biography

There’s a lot of buzz in the cybersecurity industry around artificial intelligence, automation, and orchestration. Some view them as the Next Great Hope, while others would replace that last word with “Hype.” Despite what you might hear from some optimistic vendors, AI and automation aren’t the perfect panacea for all your cybersecurity challenges. For example, automation might not be possible for highly dynamic and investigative activities like hunting and forensics but can work wonders for analyzing and identifying patterns across volumes of security data. Join our conversation as we discuss how you can leverage the automation and orchestration boom to your advantage, to build solid SOC solutions that incorporate the best of manual and automated processes.

12:50 PM: Welcoming Remarks and Introductions

Location: Elizabethan C&D, 2nd floor
Marci McCarthy

Marci McCarthy
CEO and President
T.E.N.
Biography

T.E.N.'s CEO & President will welcome guests, provide an overview of the program agenda and event purpose, and introduce the speakers and sponsors of the ISE® West Executive Forum and Awards 2018.

1:00 PM: Keynote Address

Location: Elizabethan C&D, 2nd floor

Building an Enterprise Security Program

Pritesh Parekh

Pritesh Parekh
VP & Chief Security Officer
Zuora
San Francisco, CA
ISE® West Executive Award Finalist 2016
ISE® North America Executive: Commercial Award Finalist 2016
ISE® West Executive Award Finalist 2017
ISE® North America Executive: Financial Award Winner 2017

Biography

1:35 PM: Interactive Executive Roundtables

Location: Elizabethan C&D, 2nd floor

The Interactive Executive Roundtables brings together ISE® Nominees, industry leaders, invited guests, and sponsor delegates to meet each other and join in interactive discussions on key industry issues as well as share best practices.  The interactive roundtable discussions are hosted by our distinguished ISE® Alumni who are leading CISOs and Information Security Executives.

Rebalancing the SOC

Sponsored by:
Singer_Steven

Steven Singer
Director of Information Security
LegalZoom
Biography

Central to safeguarding against cyber threats is a corporation's SOC. Security operations require constant innovation to keep up with the businesses they protect and to mitigate potential damage from the threats against them, especially because skilled SOC analysts are so hard to find and retain. The exponential growth in security-relevant data coupled with the ongoing challenge of finding training and retaining skilled security analysts to monitor and respond to that data creates a critical and vexing problem for security organizations. However, by marrying the benefits of skilled analysts with automation, orchestration and AI, your organization can create a much more hospitable, efficient, and effective SOC. With revolutionary technologies advancing security operations, like AI-based expert systems, an autonomous analyst is no longer a concept, but a reality.

Security That Works Outside the Perimeter

Sponsored by:
Kornberg_Avram

Avram Kornberg
Security and Technology Executive & Founder
Stratecution Consulting, LLC.
Biography

The days of working within four office walls are long-gone. In fact, 43% of Americans work remotely at least some of the time. Your team works from their desks, but also from home, from the airport, from the coffee shop around the corner—the list goes on. Your employees are using modern cloud applications that allow them to work from anywhere, but is your security solution keeping up with this new perimeter? It’s important to balance security and end user flexibility to meet compliance requirements for your organization. Furthermore, end users aren’t just your employees any more. Customers, partners, and suppliers are all demanding access on-the-go and on multiple devices. Join our conversation as we discuss the challenges of securing your organization in a perimeterless world and how we can create a seamless end user experience and secure data all while meeting enterprise compliance requirements.

The Increasing Impact of Insider Threats

John Abel

John Abel
Senior Director of Security
Credit Karma

Insider threats continue to be one of the top cyber security threats and have proven that they are a force to be reckoned with. According to a 2017 Insider Threat Report, 53% of companies estimate remediation costs of $100,000 and more, with 12% estimating a cost of more than $1 million. The same report suggests that 74% of companies feel that they are vulnerable to insider threats, with 7% reporting extreme vulnerability. Every company will face an insider-related breach sooner or later regardless of whether it will be caused by a malicious action or an honest mistake. As costs related to insider threats continue to grow, what can Information Security Executives and their security teams do to combat this all too familiar foe?

Gone Phishing: Securing the Enterprise from Social Engineering Attacks

Selim Aissi
Chief Information Security Officer
Blackhawk Network
ISE® West Executive Award Finalist 2015
ISE® North America Executive Award Finalist 2015 - Commercial Category

Social media, a digital medium that is rooted in sharing personal and professional data, continues to be a favorite target for cyber-criminals because it offers a virtual treasure trove of readily accessible information. The very nature of how information is shared via social media goes against many longstanding core information security principals. Businesses of all shapes and sizes can be targets of social media engineering and phishing attacks. While phishing itself is an incredibly well-known attack technique, it still continues to be a major security issues for many organizations. Symantec’s 2017 Internet Security Threat Report found that Business Email Compromise (BEC) scams, relying on spear-phishing emails, targeted over 400 businesses every day, draining $3 billion over the last three years. While it’s critical for security teams to keep up to date on current social engineering and phishing attacks, what else needs to be done to ensure the enterprise at large is aware of the dangers and pitfalls of these kinds of attacks?

2:35 PM: Afternoon Break

2:45 PM: ISE® West Nominee Showcase Presentation #1

Location: Elizabethan C&D, 2nd floor

Shifting Security LEFT

Sudharma Thikkavarapu

Sudharma Thikkavarapu
Head of Cybersecurity Transformation (Sr. Manager)
T-Mobile
Biography

T-Mobile felt it was crucial to create a behavioral change across their organization in order to make security an integral part of everyone’s DNA. The T-Mobile technology and engineering teams were developing and deploying solutions to support UnCarrier activities at accelerated speeds, and their security organization was not able to scale to support the demand for application security assessments. For example, the time taken to complete one single application security assessment was approximately seven working days, which was unreasonable and slowing their business. Join our conversation to learn how the T-Mobile team took this as a problem statement and reengineered all their processes and solutions to bring down service level agreements (SLA) from 7 working days to less than 30 minutes.

3:00 - 8:00 PM: Registration

Location: Pre-function of Elizabethan Ballrooms C&D, 2nd floor

3:05 PM: ISE® West Exabyte Sponsor Showcase Presentation

Location: Elizabethan C&D, 2nd floor

Probability in Security: An Automat-able Approach to Security Monitoring

John Abel

Chris Calvert
Co-Founder & VP Product Strategy
Respond Software
Biography

3:25 PM: Information Security Executive® Deep Dive Panel

Location: Elizabethan C&D, 2nd floor

An industry cross section of ISE Alumni and leading security executives explore today’s hottest security trends and issues and the key challenges they are facing now and in the future.

Moderator

Jeff Trudeau

Jeff Trudeau
Chief Information Security Officer (CISO)
Chime
ISE® North America Health Care Executive Award Winner 2013
ISE® West Executive Award Finalist 2019

Panelists

John Abel

Chris Calvert
Co-Founder & VP Product Strategy
Respond Software
Biography

Jim Covington

Jim Covington
Division CISO
Pacific Life Insurance Company
Biography

Bernie Cowens

Bernie Cowens
Executive Vice President, Chief Information Security Officer
Utility Technology Solutions
Biography

John Kirkwood

John Kirkwood
VP IT, Chief Information Risk and Security Officer
Albertsons Companies
ISE® West Executive Award Finalist 2018
ISE® West Executive Award Finalist 2019
ISE® North America Executive: Commercial Award Finalist 2019

Biography

4:10 PM: ISE® West Nominee Showcase Presentation #2

Location: Elizabethan C&D, 2nd floor

Kaiser Permanente’s Vendor Risk Management Program

Michelle Nix

Michelle Nix
VP of Technology Risk Management
Kaiser Permanente
Biography

Sankhye_Chetana

Chetana Sankhye
Senior Director, Technology Risk Management
Kaiser Permanente
Biography

Kaiser Permanente’s Vendor Risk Management Program (VRM) established the capabilities necessary to effectively manage and monitor vendor control risks across the enterprise through a series of actions. First was the creation of an inventory of vendor risk information to understand the vendor services through inherent risk assessments for tens of thousands of existing vendor engagements. Next was the completion of controls assessment for high-risk new and existing vendors, and management of risk remediation and acceptance from controls assessment efforts. Finally, the team implemented automation, reporting, and process improvements to scale efforts enterprise-wide. Join our discussion to learn how Kaiser Permanent’s VRM Program provided them with an increased level of understanding of its vendor population and the underlying privacy and security risks.

4:30 PM: ISE® West Nominee Showcase Presentation #3

Location: Elizabethan C&D, 2nd floor

The AEIRS Analytics Program

Backus_jon

Jon Backus
Product Manager
Aetna
Biography

The team at Aetna is using leading-edge technology that uses machine learning to provide early detection of anomalies in user behavior. The Aetna Entitlements, Identity, & Risk System (AEIRS), is a User and Entitlement Behavior Analytics (UEBA) program that evaluates millions of event records looking for anomalous or unusual behavior and alerts when detected. The analytics engine, AEIRS, determines and tracks normalized behavior for every Aetna user and then uses it to look for abnormal breaks from pattern, as well as rules-based criteria through behavior models. It also calculates a risk score for each individual user that has access to an Aetna system. The risk scores will change based on anomalous or unusual behavior detected by a model. Join our discussions as we learn how AEIRS’ models and risk scores have been used to influence response and automated control changes.

4:50 PM: Late Afternoon Break

5:00 PM: ISE® VIP Reception (invitation only)

Location: Elizabethan A & B, 2nd floor

ISE® Nominees, sponsors and special guests will have the opportunity to network in a private setting with beverages and appetizers.

6:00 PM: Sponsor Pavilion and Dinner Buffet

Location: California West, 2nd floor

Guests enjoy gourmet dinner while networking and meeting the sponsors. Honoring and celebrating the Award Nominees for 2018, this exciting occasion will bring together top security executives to recognize the individuals who have made significant and positive impact on their organizations through exemplary performance.

7:30 PM: Sponsor Tear Down

Location: California West, 2nd floor

7:45 PM: ISE® West Awards Gala

Location: Colonial Ballroom, Mezzanine Floor

Honoring and celebrating the ISE® West Award Nominees, this exciting occasion will bring together top security executives to recognize the individuals and the project teams who have made significant and positive impact on their organizations through exemplary performance. Don't miss the Passport for Prizes drawing and a chance to win outstanding gifts from our ISE® sponsors.

Marci McCarthy

Marci McCarthy
CEO and President
T.E.N.
Biography

Jeff Trudeau

Jeff Trudeau
Chief Information Security Officer (CISO)
Chime
ISE® North America Health Care Executive Award Winner 2013
ISE® West Executive Award Finalist 2019

9:00 PM: Champagne and Dessert Reception

Location: Colonial Ballroom, Mezzanine Floor

Enjoy champagne and dessert while celebrating the winners, nominees and project teams.