Synthesizing the Top Security Compliance Standards For Efficiency
Prasant Vadlamudi, Director, Technology GRC, Adobe
Founded in 1982 and now employing more than 19,000 worldwide, Adobe provides tools to design and deliver digital experiences to a spectrum of producers ranging from emerging artists to global brands. In the process of analyzing the top industry security compliance standards, certifications and regulations like SOC2, ISO27001, PCI DSS, HIPAA – all of which represent more than a thousand different controls – Adobe synthesized and boiled them down to about 200 controls Adobe calls the Common Controls Framework (CCF). Join us for this session to learn how CCF’s comprehensive set of security activities and compliance controls enables Adobe’s engineering, product operations, infrastructure and applications teams to achieve improved compliance with security certifications, standards and regulations.
Creating a Comprehensive and Global Third Party Risk Program
Phani Dasari, VP, Global Third Party Risk Management, ADP
Founded nearly 70 years ago, ADP is a comprehensive global provider of cloud-based human capital management (HCM) solutions that unite HR, payroll, talent, time, tax and benefits administration, as well as business outsourcing services, analytics and compliance expertise. ADP’s enterprise risk organization identified third-party risk as a critical potential risk requiring all relevant organizations across ADP to focus on identifying and reducing third-party risk. To meet this objective, ADP has advanced its third-party assurance efforts from localized in the organization to a connected global program with end-to-end automation, allowing enhanced tracking of all vendor engagements and proactive identification of risks related to third-party engagements. Join us for this session to learn how ADP now leverages a combination of business engagement, synergies between the global security organization and procurement and contract management organizations to implement standards, governance, processes and tools.
Stopping Critical Infrastructure Cyber Attacks Before They Start
David Badanes, Director, Digital Group, The AES Corporation
The AES Corporation is a Fortune 500 global power company that provides affordable, sustainable energy in 15 countries through a diverse portfolio of distribution businesses, thermal and renewable generation facilities. As a part of the world’s critical infrastructure – and one that is highly targeted for attacks by numerous adversaries – AES believes the best way to protect the world’s electricity consumers is to empower the personnel of AES to stop attacks before they start. Growing cyber threat awareness among the global employee base of AES required a fundamental shift away from cybersecurity as simply a compliance function. Paired with our cybersecurity operations center, we work to educate, train and inform our global workforce of the importance of cybersecurity hygiene and the impact of a successful attack. Join us for this session to learn how AES has focuses on building a strong program of cybersecurity awareness — benchmarked against the Security Awareness Maturity Model designed by the SANS Institute — and put into place an employee awareness program that achieves, and exceeds, that goal.
Predicting and Preventing Fraudulent Activity
Matthew Harper, Director, Cyber Crime Prevention, Aflac
Founded in 1955, today’s Aflac is a Fortune 500 company providing financial protection to more than 50 million people worldwide. Using Account Take Over (ATO) and other techniques, criminals are taking advantage of Aflac’s transition from a legacy serving model to a digital-first environment. To protect Aflac policyholder data while enabling digital transformation, Aflac has chosen to leverage in-place security technology and real-time channel/servicing data – including from call centers, online, claims, and client master data — to create a flexible analytics platform that can flag suspect activity in real-time — and alert business partners in fraud, claims operations, and security to take corrective action. Join us for this session to learn how Aflac now investigates fraudulent claims more efficiently, and can predict and prevent fraudulent activity before a loss incurs.
Balancing Security and Privacy with AI
Dhananjay (DJ) Sampath, CEO & Co-founder, Armorblox
While technological innovations bring new options for better security, organizations must continuously evaluate how they impact privacy. For example, cheaper and better cameras can provide better surveillance, but at the risk of invading privacy. When securing IT, the same balance of security and privacy is at work. While today’s top threat vector is email security, and while organizations need better ways to monitor communications for security, no individual wants the organization reading their emails, documents and social tools. That said, AI now enables machines to automatically analyze communications and flag issues for security, without violating privacy. Join us for this session where we’ll describe how new techniques that leverage deep learning and natural language understanding (NLU) can deliver better security without sacrificing privacy.
Deception Technology: A Look Under the Hood
Carolyn Crandall, Chief Deception Officer & CMO, Attivo Networks
Deception technology is experiencing rapid adoption for in-network threat detection, but its value in identifying, investigating, and responding to attacks isn’t well known. What’s deception’s role as a best practice? How can it help collect forensics for faster investigation and actionable, automated information sharing and response? Join us for this session for answers to these questions and more. We’ll explore how deception technology reduces risk by fitting within standard security frameworks — 32 subcategories within NIST 800-61 rev 2, ISO 27000 family — to reduce dwell time, accelerate response, and build an active defense.
Securing Sensitive and Encrypted Data and Transactions
Bobby Julka, SVP, Access and Identity Engineering, Bank of America
With more than 36 million active digital banking users, Bank of America is one of the world’s leading financial institutions, serving individual consumers, small and middle-market businesses and large corporations with a full range of banking, investing, asset management and other financial and risk management products and services. At Bank of America, data encryption is a vital part of securing sensitive information, and in their large-scale encryption systems, one of the biggest engineering challenges is generating and managing encryption keys. Hardware Security Modules (HSMs) are used by financial services and other firms seeking high assurance to secure sensitive, encrypted data and transactions, but typically require custom setup, hardware, and integration. Join us for this session to understand how Bank of America leverages HSMs for a six-figure cost saving per application, and can reduce a six-month or more project coding effort to just a few weeks.
Reducing the Risk of Known Vulnerabilities
Jason Cathey, CISO, Bank OZK
Founded in 1903 as a small community bank, Bank OZK has grown to more than 250 offices in ten states. Shortly after implementing a newly established vulnerability management standard that includes time to remediation and vulnerability scan schedules, the bank realized its patch program, standard configurations and software life cycle management wasn’t as effective as they believed. Join us for this session to learn how they reduced the risk of known vulnerabilities by targeting remediation efforts based on asset criticality and severity of vulnerability.
The Importance of Ratings in the Broader Cybersecurity Dilemma
David Hawkins, Principal Engineer, BitSight Technologies
Starting in the middle of the last century, the U.S. Air Force experienced a sudden and embarrassing realization of where their fighter aircraft ranked in ability. This observation led to changes in the U.S. Airforce’s approach to fighter design and engineering — a transformation with interesting correlations to today’s broader cybersecurity dilemma. Join us for this session to understand how today’s cybersecurity reality is suffering similar challenges as the U.S. Air Force during the 1950s through the 1980s, how ratings have evolved and been used in a variety of markets, and the evolutionary realities related to today’s risk, ratings, and procurement process in the United States.
Optimizing Third-Party Risk Management with Automation
Siobhan Hunter, Director, IT Governance, Risk and Compliance, Blue Cross NC
Since 1933, Blue Cross and Blue Shield of North Carolina (Blue Cross NC) has offered its customers high quality health insurance at a competitive price – and today is a fully taxed, not-for-profit North Carolina company employing more than 4,700 North Carolinians and serving more than 3.89 million customers. Like many companies operating in a highly regulated industry and relying upon multiple third party relationships, Blue Cross NC’s third-party risk management process was highly manual, inefficient, carried a substantial administrative overhead, and often failed to deliver timely results for our internal business stakeholders. To modernize, Blue Cross NC redesigned the program by integrating their managed service provider’s offerings with Blue Cross NC’s governance, risk and compliance platform. Join us for this session to learn how their innovative approach automates much of their third-party risk management process, enabling the organization to succeed in managing security due diligence and governance comprehensively and efficiently.
Mitigating Risk with Ongoing Cybersecurity Risk Assessment
Scott Moser, CISO, Caesars Entertainment
Since its beginning in Reno, Nevada, in 1937, Caesars Entertainment has grown through development of new resorts, expansions and acquisitions, and today is the world’s most diversified casino-entertainment provider and the most geographically diverse U.S. casino-entertainment company. To better manage cybersecurity risk, Caesars Entertainment conducted an enterprise cybersecurity risk assessment to identify, analyze, prioritize, and recommend actions to mitigate risk below business tolerance levels. Innovative areas of the project included the risk scoring system used to measure risk, the pairing of risks against an assessment of National Institute of Standards and Technology (NIST) Cybersecurity Framework security controls, and the engagement of business leaders. Join us for this session to learn the benefits of this program and how the CISO and CIO use it to provide cybersecurity reports to the board of directors’ audit committee and address risk mitigation.
Protecting Devices in Remote Parts of the World
Joel Urbanowicz, Director, Information Security and ICT Operations, Catholic Relief Services
Catholic Relief Services (CRS) was founded in 1943 by the Catholic Bishops of the United States to serve World War II survivors in Europe, and today reaches more than 130 million people in more than 100 countries on five continents. Due to environmental circumstances – like internet connectivity, volatile political situations, and diversity in patch management styles of ICT professionals located around the world – unmet patch management was creating security exposure. Moreover, many of these countries — Ethiopia, DR Congo, Central African Republic and Sudan among others – don’t have adequate terrestrial network infrastructure, necessitating the use of very expensive and heavily constrained satellite network services. All of this introduced significant challenges for end user device management since visibility into what was happening in field offices was often difficult, and bandwidth so constrained as to make Windows patching nearly impossible. Join us for this session to learn how the CRS environment is now better protected, patch management is properly organized and users have streamlined experience regardless of their remote location in the world.
How to Put the Sec in DevOps
Matt Rose, Global Director Application Security Strategy, Checkmarx Inc.
Many organizations are adopting security in their DevOps processes, but what do they need to consider when introducing application security to their DevOps? What obstacles can be expected and how are organizations successfully overcoming them? And what functionality is critical to enabling real automation of an AppSec program? Join us for this session as we explore the benefits of adding security to DevOps automation.
Improving Vulnerability Management for the Fifth Largest City in the United States
Todd Therrien, Interim CISO, City of Phoenix
The City of Phoenix is a municipality that serves the 5th largest city in the U.S. with a population of more than 1.4 million. As the city experienced rapid growth in the last decade, it was determined that the vulnerability management of the municipality’s security and networks was too disjointed, decentralized and ad hoc at best – and management had very little insight into issues, workloads or bottlenecks preventing vulnerabilities from being remediated. With effective management in mind, the city of Phoenix’s Information Technology Services team focused on consolidating and centralizing its network vulnerability management by incorporating cloud-based technology, utilizing specialized software and workflow to help eliminate detected risks, adopt, new standards and change existing business and legal contract practices. Join us for this session to learn how the team can now better monitor current vulnerabilities, remediated items, response time and persistent items.
Why It’s Time to Rethink DLP
Vijay Ramanathan, Product Management SVP, Code42
Legacy Data Loss Prevention has failed the security field, and it’s promised has turned into an endless cycle of policy management, user blocking and blind spots, all while missing the top priority: protecting the user’s data. Join us for this session to understand why legacy DLP has pitfalls, hear interesting data about insider threats and leakage, and learn how and why organizations should be thinking about protecting their users over preventing users from doing their work.
Improving Threat Intelligence, Detection, and Response for Cloud Workloads
Dan Constantino, Director, Security Operations, Cox Automotive
With 40,000 auto dealer clients across five continents, Cox Automotive’s most notable family of brands within its 25 businesses includes Autotrader, Dealer.com, Dealertrack, KBB (Kelley Blue Book), Manheim, NextGear Capital, VinSolutions, vAuto, Xtime and Clutch Technologies. To better defend against cybersecurity threats impacting Cox Automotive, the organization set out to improve security capabilities with threat intelligence, detection, and response for cloud workloads. Join us for this session to hear how to elevate your Cloud Security Program and learn how automation has improved the efficiency, effectiveness, and speed of phishing incident remediation from 60 minutes to just 10. Dan will also cover how cloud alerting capabilities enables them to identify misuse of cloud resources (like cryptocurrency mining) before they incur a large cost from their cloud provider.
Adaptive Third Party Risk Assurance
Kay Naidu, Director Cyber Risk Assurance, Delta Dental of California
An estimated 60% of cyber data breaches originate at third parties according to a recent Ponemon report. As more risk-aware organizations have strengthened their cyber risk management, adversaries have shifted focus to business partner ecosystems that historically have weaker defenses. To better manage these challenges, Delta Dental of California has recently built an adaptable data-driven third party risk assurance capability.
Previously, the organization lacked visibility into business relationships with over 1000 third parties, many with access to personal information of 33 million consumers. This new capability provides a comprehensive understanding of our third party cyber security risk, which enables informed decision making, enhances customer trust, and protects the Delta Dental brand. It uses an innovative approach that tailors rigor and frequency of testing based on the impact and nature of each business relationship. Join us to learn how we identified needed third party capabilities triggered by the evolving cyber threat landscape and developed a self-modifying testing process that relies on threat intelligence to more efficiently use valuable talent.
Leveraging Machine Learning to Mitigate Phishing and Malware
Roberto Sponchioni, Manager, Threat Engineering and Detection, DocuSign
More than 450,000 customers and hundreds of millions of users in over 180 countries use DocuSign’s eSignature to automate how they prepare, sign, act on, and manage agreements. Offering a SaaS application that relies on email transmission, the organization understands that phishing is its biggest security threat and that automating URL classification is an effective weapon against cyber criminals as it provides a quick response that reduces the impact on the global cybersecurity ecosystem. To stay ahead of this threat, DocuSign’s detection and prevention technology, Pescatore, was created to be a real-time URL classifier that helps DocuSign’s Cybersecurity Center of Excellence leverage automation to mitigate phishing and malware attacks in a matter of minutes. Join us for this session to learn how Pescatore analyzes URLs within seconds using machine learning algorithms, static detections, and reputation systems with a high degree of reliability, to classify and immediately execute protection commands.
Modernizing the Workplace with Stress-Free Approaches
Alex Rountree, Principal Enterprise Architect, Dropbox
The fast-paced digital era promises greater workplace productivity and flexibility, yet many IT organizations can’t keep up with the demands to enable the benefits. But there are ways. Join us for this session as we focus on best practices for managing user demands, modern tools that employees are quick to adopt with greater satisfaction, and ways to make it all happen with less stress on the IT team.
Securing Endpoints with Analytics and a Proven Framework
Michael Howard, Head of Security Practice, HP, Inc.
As the number of connected devices continues to increase, so does the number of potential vulnerabilities. By 2020, there will be 2.8 billion connected devices, all of which could create security blind spots for organizations. How can security professionals expand their security measures to protect this ever-expanding attack surface? Join us for this session where we’ll draw on real-world examples to explain how to understand and defend against the next wave of hackers, use data analytics and a proven framework to secure endpoint devices, and identify existing gaps in endpoint security.
Creating a Human Firewall with a $100 Million Security ROI
Florian Haacke, CSO, Innogy SE
Serving 23 million customers in Europe, innogy SE generates energy from renewable sources and offers innovative energy services across storage technologies, electromobility and energy efficiency. Based on the organization’s vision “to bring security into everyone’s mind”, they initiated a cyber security awareness campaign called “Human Firewall” to improve knowledge, awareness and motivation for all employees, enhance protection against cyber-attacks, and to support legally required IT and security certifications of critical infrastructure. Join us for this session to learn how they’ve exceeded their campaign goal by establishing a vibrant cyber security culture at hundreds of sites in 16 countries, and a return-on-security-investment of approximately $100 million.
Stealing Rembrandts: The True Story of International Art Theft
Anthony Amore, Director of Security and Chief Investigator, Isabella Stewart Gardner Museum
Art theft is a multi-billion dollar per year illicit industry, and the world’s most significant heists share one thing in common: the priceless works of Rembrandt. The great Dutch Master’s paintings are known for their value by everyone, from high school dropouts to museum curators. While Hollywood has portrayed the theft of high-value paintings as the work of dashing, likeable thieves working to steal art for evil, reclusive geniuses, in fact that’s nothing like the reality of art theft. Instead, it’s much more interesting. Join us for this special keynote session as Anthony Amore takes us behind the scenes of the most notorious of these heists, telling the true story of art crime from the conception of the crime to the recovery of the art.
Reducing Massive Costs of Ransomware with Comprehensive Security Awareness
Earl Duby, CISO, Lear Corporation and Brian Roberts, Global Communications and Information Security Awareness Lead, Lear Corporation
Ranked 148 on the Fortune 500, Lear Corporation is a leading supplier of automotive seating and electrical and employs 169,000 people in 39 countries. Faced with substantial financial and human hour costs related to business email compromises and ransomware, Lear knew it needed to devise a cost-effective means to improve security and defense against increasingly sophisticated, well-funded adversaries – so the decision was made to devise a global security awareness program. Join us for this session to learn how their custom, comprehensive global communications strategy was developed in-house and reduces cyber risk and increases incident self-reporting using gamification, contests, articles, podcasts, videos, posters, social media, self-phishing, tangible products, onsite events and activities, and more.
Creating a Best-In-Class Privacy Program
Gregory Anderson, Data Protection Officer, Lexmark International
Founded in 1991 and serving organizations in more than 170 countries, Lexmark is a global leader in imaging and output technology solutions and managed print services. Mandated by the CIO and managed by the CISO, Lexmark set out to create a best-in-class privacy program to bring structure to existing ad hoc processes — and affect culture change and raise awareness across 10,000 employees in more than 50 countries. Under a newly appointed Data Protection Officer, the Privacy@Lexmark project launched an innovative awareness and training campaign embraced across the enterprise. Join us for this session to learn how it created meaningful results without requiring significant investment or impacting to day-to-day operations.
Securing Critical Infrastructure Across the Maritime and Port Community
Christy Coffey, VP, Member Services, The Maritime & Port Security ISAO, Inc.
Led by maritime and port stakeholders, the Maritime & Port Security ISAO (MPS-ISAO), working in collaboration with the U.S. Department of Homeland Security and the United States Coast Guard, is recognized nationally and internationally as the Information Sharing and Analysis Organization (ISAO) for maritime and port critical infrastructure. In 2016, the MPS-ISAO operationalized, establishing headquarters at the International Association of Certified ISAOs, IACI-CERT, Global Situational Awareness Center, NASA/Kennedy Space Center to support the Maritime and Port critical infrastructure nationally and internationally, and to establish a national ISAO model of sector and cross-sector cooperation and coordination in collaboration with government. The MPS-ISAO, led by the private-sector immediately began to bring together the maritime and port community to advance sector cybersecurity leadership through critical insight and thought exchange in support of the MPS-ISAO’s mission – all of which led to the establishment of the MPS-ISAO Advisory Board. Join this session to learn about how the MPS-ISAO has implemented a collaborative, community-based approach to bring cybersecurity resilience to the Maritime Industry. Case studies will be discussed.
Transforming Cybersecurity and Enabling Digital Transformation
When a long-established, legacy company takes on a significant transformation, innovation must permeate everything it does—including cybersecurity. As Northwestern Mutual, a leader in the financial services industry for more than 160 years, has moved on the path to transformation, its digital platform has required an innovative approach to security to match the digital innovation taking place elsewhere in the organization. To create a seamless digital experience for its clients and financial representatives, the company had to step away from piecemeal security practices and implement a new security platform designed to integrate smoothly with the rest of their digital platform. In this session, you will see how their solution, an Enterprise Cyberfusion Platform, allowed them to move beyond past siloed efforts and embrace a more holistic approach to cybersecurity. This has streamlined the number and variety of tools they use to protect vital data, systems, and applications as they provide financial security for their 4.5 million clients.
Reducing Risk with Just In Time Awareness Training
Seth Fogie, Director, Information Security, Penn Medicine
Penn Medicine is one of the world’s leading academic medical centers, dedicated to the related missions of medical education, biomedical research, and excellence in patient care – and consists of the Raymond and Ruth Perelman School of Medicine at the University of Pennsylvania (founded in 1765 as the nation’s first medical school) and the University of Pennsylvania Health System. As a leading academic medical center in the United States, Penn Medicine must maintain a secure technology environment ensuring the privacy and secure data of patients and colleagues. To further their vigilance, they created a platform to deliver just in time awareness (JITA) security education to reduce internal employee Internet technology security risk. Join us for this session to learn how they’ve reduced security risk with awareness training by targeting the dangers of an employee’s potential behavior before using web technology.
Evolving the Security Strategy for Growth
Eric Schlesinger, Global Director and CISO, Polaris Alpha
With research, exploration and problem solving, Polaris Alpha provides engineering and tools designed to protect the warfighter and allied communities. Continued escalation of cyber-attacks against the organization — along with fevered adoption of new technologies, heightened regulatory scrutiny, and a hyper-connected business environment — meant they needed to change their existing security strategy from just simply implementing tools to incorporating a much broader set of activities. At the same time, the organization was growing quickly and dramatically. Join us for this session to learn how they evolved their culture, frameworks and processes to deliver a robust set of services through governance, risk management, compliance and user education, to now have an improved focus on attack and exposure prevention, breach detection and incident response with continuous monitoring and data analytics.
Securing Your Last Line of Defense: A People-Centric Approach to Security Awareness Training
Dale Zabriskie, Evangelist, Security Awareness Training, Proofpoint
The roadmap of your IT environment is full of twists, turns, roadblocks, and potholes. Those with access are navigating a perilous journey — often without explicit security awareness training to help identify warning signs along the way. With the vast majority of breaches targeting people rather than systems, it’s a sobering fact that — according to Proofpoint’s research — close to 40% of users can’t even define what “phishing” is. If not properly trained to spot phishing attempts, users become your greatest risk, clicking on malicious links that enable malware or expose confidential information. Join us for this session as we discuss best practices for adopting a people-centered, risk reduction approach to security awareness training that can transform your users from risky into ready navigators.
Creating Cybersecurity Visibility Across Business Areas and IT
Greg Murray, CISO, Rogers Communications
Employing 26,000 people in Canada, Rogers Media is a $14 billion diverse media and content company engaging more than 30 million Canadians every week across radio and local TV stations, conventional and specialty TV stations, magazines, podcasts and more. Rogers recognized that cyber security was not visible to most business areas and information technology units within the organization, so it embarked on creating cross-functional alignment, reducing process and security requirement complexity, and providing immediate value to reduce security risk within Rogers. Today, CyberSTARR is Roger’s comprehensive cyber risk toolkit designed to embed security safeguards into Rogers’ businesses. Join us for this session to learn how this holistic approach to cyber security is designed to protect information assets.
Cyber Resiliency: How to Focus Holistically, and Well Beyond Data Protection
Sean Curran, Senior Director, Security and Infrastructure, West Monroe Partners
Key trends are conspiring to create unprecedented threat exposure for today’s businesses across: the interdependence of actors in the digital ecosystem; growth to an estimated 8.4 billion IoT devices; and siloed, understaffed, and under-budgeted IT and security departments. All of this helps explain why a recent survey ranks cybersecurity as today’s top business concern — even ahead of recession worries. Despite heightened security awareness in the C-suite, many executives remain unprepared to protect their businesses by focusing narrowly on just data protection. Join us for this session where we’ll show the benefits of focusing holistically on overall resiliency, how that enables more awareness of potential threats and risks, and how to create a more resilient business model going forward.