ISE® Southeast Executive Forum and Awards 2015

Information Security Executive of the Year Awards

The ISE® Southeast Executive Forum and Awards 2015 was held on March 4, 2015 at the Westin Buckhead Atlanta in Atlanta, GA. The ISE® Southeast Award recognizes the information security executives and their teams who have demonstrated outstanding leadership in risk management, data asset protection, regulatory compliance, privacy, and network security.

The ISE® Southeast Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions.

ISE® Southeast Executive of the Year Award Winner 2015

Pete Chronis
Chief Security Officer
Atlanta, GA

ISE® Southeast Project Award Winner 2015

Jabil Security-as-a-Service Initiative
Executive Sponsor: John Graham, CISO, Jabil
Project Team: Erik Collasius, John Graham, Mike Theriault, Walther Ardon, Greg Fisher, Troy Riley and Gabriella Nelms.
Location: St. Petersburg, FL

Jabil’s global customer base is highly competitive regarding intellectual property, cutting edge innovation, and the secrecy surrounding new product launches. Losing this data would result in millions of dollars in contract fines, as well as, major loss of existing and future business. To minimize customer and Jabil risk, Jabil created and adopted a portfolio of security-as-a-service solutions in order to better protect and secure the company’s critical information. The security-as-a-service initiative spanned three areas: application access, data loss prevention and external threats. This project enables Jabil to close security gaps, have an accelerated rapid time to value, leverage its security technology and practices as a market differentiator and create a competitive business advantage in the marketplace.

ISE® Southeast People's Choice Award Winner 2015

Kevin Morrison

Kevin Morrison
Director of Global Security and Compliance (CISO)
The Results Companies
Kennesaw, GA

ISE® Southeast Executive Award Finalists 2015

Darrell Keeling

Darrell Keeling
Director Information Security & Quality
Louisville, KY

Tony Spurlin

Tony Spurlin
Chief Information Security Officer
Cox Automotive
Atlanta, GA
ISE® North America People's Choice Award Winner 2005

ISE® Southeast Project Award Finalists 2015

Card Data Protection Program
Executive Sponsor: Scott Frost, CISO, Belk
Project Team: Hans Broder, Dwayne Edwards, Tisa Mullis and Carley Nevills.
Location: Charlotte, NC

As the nation’s largest family-owned retailer, Belk took on the challenge to transform its security posture by introducing an extensive Card Data Protection Program. In less than six months, Belk stood up a new security team and successfully deployed several information security solutions to protect its card processing system, network perimeter and significantly enhance the store’s controlled environment. Belk successfully implemented these critical changes without experiencing a single store outage, and in the process, was capable of achieving PCI and SOX compliance. Additionally, the program established a detailed security awareness strategy across all 300 store locations emphasizing security as one of the businesses top priorities.

Implementation of Identity and Access Management at Brown-Forman
Executive Sponsor: Darrell Keeling, Director, IT Security & Quality, Brown-Forman
Project Team: Darrell Keeling, Todd Werner, Robin Nicholson, Kelly Lewis, Gloria Nusz, Jeff Brown, Clay Colwell, Rick Hopkins, Kathy Phillips and Jim Robinson.
Location: Louisville, KY

Brown-Forman launched the Identity Management project in order to support the company’s rapid global expansion into new countries and the need to provision entitlements and identities to new users. The goals of the project were to deliver efficiencies in security administration due to centralized identities and entitlements; obtain complete visibility into all active users within all systems, achieve improvements to security processes and controls through automated and uniform process repetition; reduce costs associated with processing entitlement requests; and significantly reduce SLAs due to self-service entitlement provisioning.