|8:00am - 7:00pm ||REGISTRATION OPEN |
|9:00am - 9:05am ||OPENING REMARKS |
|9:05am - 9:23am ||STONEWALLING RANSOMWARE BEFORE IT HITS PRODUCTION ASSETS |
With research, exploration, and problem solving, Polaris Alpha provides engineering and tools designed to protect the warfighter and allied communities. Like many organizations targeted by ransomware, Polaris Alpha knows it can face significant mitigation and recovery costs across not only data and productivity loss, but fixes and possible regulatory penalties. With that in mind, the organization began to apply the concept of honeypots to delay and detect a ransomware infection. Join us for this session to learn how their STONEWALL project uses deception technology to create a ransomware defendable network that chokes and slows down a threat, thereby allowing security teams to be alerted before the ransomware attacks production assets.
|9:23am - 9:41am ||FANNIE MAE’S JOURNEY TO DEVSECOPS |
Fannie Mae partners with lenders to create housing opportunities for families across the country — and helps make the 30-year fixed-rate mortgage and affordable rental housing possible for millions of Americans. To support this mission, Fannie Mae must support robust security practices throughout the organization. For years, Fannie Mae has aimed toward: 1) conducting cyber security assessments earlier in the development lifecycle; and 2) engaging business partners in the review and mitigation of cyber security risks. Through DevSecOps, Fannie Mae has now reached that goal — and stakeholders from development, operations, and cyber security now monitor, analyze, test, and proactively determine and fix vulnerabilities earlier in the development lifecycle. Join us for this session to see how DevSecOps has helped to dramatically increase code quality standards and reduce the vulnerabilities at Fannie Mae.
|9:41am - 9:59am ||FISSION AND FUSION WITH IDENTITY AND SECURITY: NEW OPPORTUNITIES FOR ADVANCED INCIDENT RESPONSE |
Infosec challenges continue to mount, yet most enterprises would admit they are overwhelmed. Big data, analytics and automation technologies are here, but progress is hampered by immature technology, staffing challenges and elusive confidence with operational patterns. Join us for this session where we’ll review data forking and combination strategies that — when applied to mature identity management and security technologies — address these challenges and provide a pathway to progress. We’ll cover how to exchange identity and security context to maximize situational awareness, leverage the precision of serialized identity, and tap the organizational hierarchy to verify business context and accelerate automation confidence.
Joe Gottlieb, Senior Vice President, Corporate Development, SailPoint
|9:59am - 10:17am ||ASSESSING AND IMPROVING PHYSICAL SECURITY FOR CRITICAL INFRASTRUCTURE |
The American Public Power Association (APPA) is the voice of not-for-profit, community-owned utilities that power 2,000 towns and cities nationwide. While many security guidelines are available from the North American Electric Reliability Corporation (NERC) and other critical infrastructure sectors, public power utilities need a physical security guideline more focused on their needs. That’s why the APPA created a comprehensive guideline designed to help the owners and operators of over 2,000 community-and state-owned electric utilities better ensure the safety and security of their company’s personnel, critical assets, and information. Join us for this session to learn how the APPA’s new guidebook of physical security measures and leading practices can help mitigate threats, vulnerabilities, and potential attacks – and ultimately contributes to a more resilient power grid.
Sam Rozenberg, Engineering Services Security Manager, American Public Power Association
|10:17am - 10:45am ||NETWORKING BREAK |
|10:45am - 11:15am ||RETHINKING CYBERSECURITY FOR THE DIGITAL TRANSFORMATION ERA |
The pace of technology change is challenging traditional cybersecurity strategies. Not long ago, clouds and mobility forced organizations to rethink their security and network architectures. And when most network traffic was destined for the data center, it made sense to backhaul all traffic over a hub-and-spoke network protected by a ‘castle-and-moat’ security model. But with today’s massive investments in SaaS applications, moving internal applications to private clouds for unfettered access requires a new approach. As the Internet becomes the corporate network, how do you adapt your security? And how can your moves to the cloud be made more secure? Join us for answers to these questions and more.
|11:15am - 11:33am ||THE ART OF CYBER DECEPTION |
Founded in 1978, The Home Depot is the world’s largest home improvement retailer operating more than 2,200 stores across North America. With the intent of “expecting the unexpected” the Home Depot’s security strategy leveraged cyber deception as an early breach and behavioral anomaly detection system. The advanced deception and early detection systems not only helped establish visibility into an entities’ networks to understand vulnerabilities but also became an integral part of The Home Depot’s M&A due diligence to ensure security and integrity of systems and networks interconnecting with the company network. Join us for this session to learn how their deception initiative reduced false alarms and solves the “needle in a haystack problem,” thereby allowing them to focus on what they need to know — including comprehensive forensics to remediate the threat.
|11:33am - 11:51am ||PROVIDING TRANSPARENCY TO CYBER-THREAT READINESS AND SITUATIONAL-RESPONSE STAKEHOLDERS |
With 39,000 employees, Xerox is an $11 billion technology company providing leading-edge document technology, services, software and supplies for graphic communication and office printing environments. Like most organizations, Xerox experiences increasing demand from concerned customers, executives, partners, and board members, to demonstrate cyber-threat awareness and ability to respond in real-time. To meet this challenge, they created the Xerox Enterprise Cyber Threat Management Portal — a custom-designed solution that provides intelligence-driven, cyber-threat readiness and situational-response task workflow management. Join us for this session to learn how this system responds in real time to disseminate bulletins from the CISO’s organization to a defense-in-depth matrix “playbook” of global IT and security operations teams and business focal points.
|11:51am - 12:16pm ||MODERNIZING CYBERSECURITY: A Q&A PANEL DISCUSSION |
Stephanie Derdouri, Director Vulnerability Management, Information Security, Fannie Mae
Sarath Geethakumar, Sr. Director, Information Security, The Home Depot
Sam Rozenberg, Engineering Services Security Manager, American Public Power Association
Del Russ, Director, Security Intelligence Center, Xerox
Eric Schlesinger, CISO, Polaris Alpha
Moderator: Derek Hulitzky, VP, Content Development and Strategy, IDG Communications
|12:16pm - 12:34pm ||THE WORLD OF MOBILE APPS: WHY MOBILE SECURITY IS NOW MISSION CRITICAL |
Not long ago, most information was stored on PCs or servers behind protected firewalls. Today, data has moved to the cloud and is accessed by mobile apps, therefore security in this new world must adapt to trusted access and mobile devices. Join us for this session as we dive into the state of mobile security and how organizations can enable cross-platform security protection without compromising productivity.
|12:34pm - 1:45pm ||NETWORKING LUNCH WITH TABLE TOPIC DISCUSSIONS |
- Rationalizing Core Security Services and Tools
Hosted by Albertsons Companies
- Maturity Assessment of Cybersecurity Risk and Controls
Hosted by Bank of the Ozarks
- The Cyber Security Skills Shortage with Operational Technology (OT)
Hosted by CLP Holdings Limited
- Cyber Threat Intelligence
Hosted by Ellie Mae
- Managing Risk
Hosted by Kimberly-Clark Corporation
- Creating Security for the Speed of Business
Hosted by Lennar
- Missouri’s Cybersecurity Awareness Program
Hosted by State of Missouri, Office of Administration
|1:45pm - 2:03pm ||ADOPTING MODERN PRACTICES FOR IMPROVED CLOUD SECURITY |
Cox Automotive is transforming the way the world buys, sells and owns cars with digital marketing, financial, retail and wholesale solutions across the global automotive ecosystem. As the company continues to move internally developed Internet-facing applications – like Autotrader.com and KBB.com — into cloud environments, it needed a better solution to manage how to implement, monitor, and audit controls across security, architecture, and operations — ultimately to meet its compliance, legal and regulatory requirements. Join us for this session to understand how their new cloud monitoring technologies not only discovered hundreds of sub-optimal configurations, privileged access, and vulnerabilities, but enabled fresh visibility to prioritize and remediate findings.
John Sewall, Director, Security Engineering, Cox Automotive
|2:03pm - 2:21pm ||THREE STRATEGIES TO PROTECT INTELLECTUAL PROPERTY |
Your business is built on intellectual property (IP). In fact, IP can constitute more than 80 percent of a particular company’s value. Losing this data – all created by users and stored on the endpoint – can result in lost productivity, threated competitive position, and ultimately, potential business collapse. Join us for this session as we discuss why the conventional approach to data security can fall short — and the steps you can take to identify and mitigate threats without impeding user productivity and business growth.
|2:21pm - 2:39pm ||LEVERAGING SECURITY INTELLIGENCE FOR IMPROVED SUPPLIER RISK MANAGEMENT |
The Allstate Corporation is the nation’s largest publicly held personal lines insurer, protecting 16 million households from uncertainties through auto, home, life and other insurance. As the threat landscape evolves, Allstate proactively rebuilt its supplier security risk management process to safeguard all customer, agent, and employee information. To improve their existing supplier security risk management function, the team rebuilt their procurement, privacy and information security process to incorporate industry best practices, frameworks and procedures. Join us to hear how this effort reduced their supplier risk while increasing their visibility into their supplier’s security posture.
|2:39pm - 2:57pm ||NEW RULES, BETTER TOOLS AND STRATEGIC PARTNERS: TECHNOLOGIES AND TOYS FOR THE INFOSEC BAT CAVE |
Albertsons Companies is the third largest food and drug retailer in the United States operating 20 store brands across 37 states and the District of Columbia. To maximize investments in security, the organization embarked on a journey to review the tools, technologies and strategic partners required to support existing and future requirements. This project became unique because it covered not only information security, but the need to protect regulatory and legal information in a highly complex environment. Join us for this session to learn how the project created cost savings while adjusting the organization’s predominately compliance-oriented framework to one that covers controls, capabilities and services mapped to tools and technologies across legacy, cloud and IoT.
Stanley “Stash” Jarocki, Director, Information Risk, Compliance and Federated Identity Access Management, Albertsons Companies
|2:57pm - 3:15pm ||AI for Cyber Defense: The Shift to Self-Learning, Self-Defending Networks |
The fight is no longer at the perimeter. In the new era of cyber-threats, machines fight machines on the battleground of corporate networks and no human security team can keep pace. From high-speed global ransomware attacks to sophisticated threats that disguise themselves on a network for months before taking action, these attacks call for a change in the way we protect our most critical assets. Self-learning, self-defending systems are now being deployed to secure complex enterprise networks across all environment types – ranging from physical, virtual, and cloud, all the way through to IoT and industrial control systems. Known as ‘immune system’ defense, this approach uncovers threats that have already penetrated the network border and then automatically fights back. Unlike legacy approaches that rely on rules or signatures, immune system security learns and responds autonomously, enables the security team to focus on high-value tasks, and can counter even fast-moving, automated attackers. Join us for this session as we explore: why legacy approaches, like rules and signatures, are proving inadequate in the face of the current threat landscape; how AI and machine learning can automate threat detection and response and, in the process, buy back time for security teams; and real-world examples of detected threats, from fast moving ransomware to hacked fish tanks.
|3:15pm - 3:40pm ||MINIMIZING CLOUD AND THIRD-PARTY RISKS: A Q&A PANEL DISCUSSION |
Stash Jarocki, Director, Information Risk and Identity Access Management, Albertsons Companies
Derek Morford, Business Information Security Officer, Allstate
John Sewall, Director, Information Security, Cox Automotive
Moderator: Bob Bragdon, SVP & Publisher, CSO
|3:40pm - 4:05pm ||NETWORKING BREAK |
|4:05pm - 4:23pm ||DECEPTION-BASED THREAT DETECTION: MYTHS AND REALITIES |
In today’s world where advanced threats and insiders demonstrate that they can evade security prevention systems, in-network threat visibility and detection are considered critical security infrastructure. That said, there are myths and realities about the effectiveness of deception for detecting advanced threats – and there are specific strategies for operational management efficiency and key use cases that are driving adoption. Join us for this session where you’ll hear about real-world deployment experiences, the value customers are realizing, and what pen test Red Teams are saying about deception-based threat detection.
|4:23pm - 4:41pm ||ASSESSING THE MATURITY OF CYBERSECURITY RISK AND CONTROLS |
Headquartered in Little Rock, Arkansas, Bank of the Ozarks conducts banking operations through 252 offices across 9 states and, based on asset size, has been recognized as a top performing bank in the United States for seven consecutive years. The bank nonetheless had no appropriate mechanism to assess their cyber risk posture, nor was there any appropriate mechanism to assess the efficacy of its cybersecurity controls. To address this head on, they set out to establish a repeatable method to assess 149 critical security sub-controls and to measure the inherent and residual risk to the organization. Join us for this session to learn how their new assessment procedures improved the maturity ratings of the vast majority of controls – and all within the risk appetite defined by the board of directors.
|4:41pm - 4:59pm ||CREATING A PROACTIVE, RISK-AWARE CULTURE ACROSS A GLOBAL ORGANIZATION |
With 42,000 employees worldwide, Kimberly-Clark sells leading brands in more than 175 countries. To better assess and control threats to Kimberly-Clark’s critical information systems and to reduce its risk profile, the organization implemented a corporate-wide risk management framework. Designed to develop a proactive, risk-aware culture, this new framework includes an automated tool to drive efficiency in managing risk, enhance risk communications and increase agility in risk response. Join us for this session to learn how this global effort aims to standardize risk management practices for consistent, risk-based decision-making at all levels within Kimberly-Clark.
Laura Jones, Risk Manager, Cybersecurity & Assurance, Kimberly-Clark Corporation
Tom Sullivan, Senior Manager, Cybersecurity Risk and Compliance, Kimberly-Clark Corporation
|4:59pm - 5:17pm ||BUILDING A RISK DASHBOARD FOR A HIGHLY-DECENTRALIZED ORGANIZATION |
Bridgewater Associates manages about $160 billion for approximately 350 of the largest and most sophisticated global institutional clients including public and corporate pension funds, university endowments, charitable foundations, supranational agencies, sovereign wealth funds, and central banks. Their entrepreneurial model means all business units — each facing unique challenges and risks as they pursue their mission– are fully empowered to manage their departments in a decentralized way. While this operating approach optimizes many aspects of their business, it also makes it uniquely difficult to know and understand their aggregate risks across the enterprise, and then make informed executive decisions based on those risks. Join us for this session to learn about the risk dashboard they developed that provides an interactive, single pane of glass showing real-time, multi-domain views into more than 500 different risk scenarios.
|5:17pm - 5:40pm ||RISK AND COMPLIANCE STRATEGIES: A Q&A PANEL DISCUSSION |
|5:40pm - 5:45pm ||CLOSING REMARKS |
|7:00pm - 7:30pm ||CSO50 AWARDS COCKTAIL RECEPTION |
|7:30pm - 9:30pm ||CSO50 AWARDS DINNER & CEREMONY |