Monday, February 23, 2015 | |||||||
1:30 pm - 6:00 pm | Registration | ||||||
2:30 pm - 2:40 pm | Welcome and Opening Remarks Bob Bragdon, Publisher, CSO | ||||||
2:40 pm - 2:58 pm | Adapting Key Threat Management Concepts to a Specialized Environment Ronald Mehring, CISO - Senior Director, Texas Health Resources | ||||||
2:58 pm - 3:16 pm | Managing Governance, Risk and Compliance Internationally, and Across Third Parties Trina Ford, Director, Third Party Global Assurance, ADP Daniel Sanchez, Compliance and Continuity Manager, ADP | ||||||
3:16 pm - 3:36 pm | Q&A Panel: Balancing Threat Management, Risk Assessment and Third Parties Trina Ford, Director, Third Party Global Assurance, ADP Ronald Mehring, CISO - Senior Director, Texas Health Resources Moderator: Bob Bragdon, Publisher, CSO | ||||||
3:36 pm - 3:54 pm | Transforming the CSO Role to Business Enabler Amrit Williams, CTO, CloudPassage | ||||||
3:54 pm - 4:12 pm | Exploitation Trends: From Potential Risk to Actual Risk Tim Rains, Chief Security Advisor, WW Cybersecurity & Data Protection, Microsoft | ||||||
4:12 pm - 5:20 pm | Building the Business Case for Better Security: A Moderated Workshop Bob Bragdon, Publisher, CSO | ||||||
5:20 pm - 5:50 pm | Reception sponsored by Skyhigh Networks |
Tuesday, February 24, 2015 | ||||
8:00 am - 7:00 pm | Registration | |||
8:00 am - 9:00 am | Networking Breakfast | |||
9:00 am - 9:05 am | Opening Remarks Bob Bragdon, Publisher, CSO | |||
9:05 am - 9:35 am | Detecting Advanced Cyber Threats with Big Data Visualization Tom Baltis, Deputy Chief Information Security Officer, Blue Cross and Blue Shield of IL, TX, NM, OK, MT Ray Biondo, Divisional Senior Vice President and CISO, Blue Cross and Blue Shield of IL, TX, NM, OK, MT Brenda Callaway, Executive Director of Information Security, Blue Cross and Blue Shield of IL, TX, NM, OK, MT Scott Davidson, Manager, Threat Response, Blue Cross and Blue Shield of IL, TX, NM, OK, MT Damir Matanic, Senior Manager of IS Threat Response, Blue Cross and Blue Shield of IL, TX, NM, OK, MT | |||
9:35 am - 9:53 am | Getting the Most Out of Identity Governance and Administration Rick Siebenaler, Principal, Cyber Risk Services, Deloitte | |||
9:53 am - 10:11 am | Shifting the Security Paradigm at The Blackstone Group Jay Leek, Chief Information Security Officer, Information Technology, The Blackstone Group | |||
10:11 am - 10:29 am | When Secure File Transfer is Mission Critical Brian D. Joyce CISSP, GCIH, GCIP, Director, Information Technologies, Elliott Davis Decosimo | |||
10:29 am - 10:59 am | Networking Break | |||
10:59 am - 11:02 am | CSO Compass Award Winner Recognition | |||
11:02 am - 11:32 am | Building Trust in the Cloud Tim Rains, Chief Security Advisor, WW Cybersecurity & Data Protection, Microsoft | |||
11:32 am - 11:50 am | Security Information and Event Management with Strict Compliance Scot Miller, Senior Director, Security Architecture, Health Management Systems | |||
11:50 am - 12:08 pm | Making Dramatic Improvements with a Security Event Management Centre Jamie Rees, Director of Information Assurance, CISS, Office of the CIO, Government of New Brunswick | |||
12:08 pm - 12:30 pm | Q&A Panel: Adopting a Proactive Threat Protection Posture Scott Davidson, Manager, Threat Response, Blue Cross and Blue Shield of IL, TX, NM, OK, MT Brian D. Joyce CISSP, GCIH, GCIP, Director, Information Technologies, Elliott Davis Decosimo Jay Leek, Chief Information Security Officer, Information Technology, The Blackstone Group Scot Miller, Senior Director, Security Architecture, Health Management Systems Jamie Rees, Director of Information Assurance, CISS, Office of the CIO, Government of New Brunswick Moderator: Joan Goodchild, Editor, CSO | |||
12:30 pm - 12:48 pm | How Diageo Protects Their Most Sensitive Information: A Case Study Stephane Charbonneau, Founder and Chief Technology Officer, TITUS | |||
12:48 pm - 2:00 pm | Networking Lunch with Table Topic Discussions Hosted by Selected CSO50 Honorees | |||
2:00 pm - 2:03 pm | CSO Compass Award Winner Recognition | |||
2:03 pm - 2:21 pm | Meaningful Security: Battling Cyber Threats with Modern Technology Greg Schwartzkopf, Director of Systems Engineering, Fortinet | |||
2:21 pm - 2:39 pm | Minimizing Risk When Critical Business Apps Face Windows XP End-of-Life Kevin Carpenter, Associate Director, IT Security, Quintiles Jerry Fink, Director, IT Security, Quintiles Transnational | |||
2:39 pm - 2:57 pm | Protecting Sensitive Data in Motion, at Rest, on Endpoints and in the Cloud Kallol Ray, Director, National Governance Risk and Compliance, Comcast | |||
2:57 pm - 3:15 pm | Agile Security and Compliance at Texas.gov Tim Virtue, CISO, Texas.gov | |||
3:15 pm - 3:35 pm | Q&A Panel: Modern Approaches for Securing Apps and Endpoints Jerry Fink, Director, IT Security, Quintiles Transnational Kallol Ray, Director, National Governance Risk and Compliance, Comcast Tim Virtue, CISO, Texas.gov Moderator: Joan Goodchild, Editor, CSO | |||
3:35 pm - 3:53 pm | A New Approach to Advanced Breach Detection Steve Karkula, Sr. Director of Product Marketing, Hillstone Networks | |||
3:53 pm - 4:23 pm | Networking Break | |||
4:23 pm - 4:26 pm | CSO Compass Award Winner Recognition | |||
4:26 pm - 4:44 pm | Take Back the Cloud Shaun Marion, CISO, Honeywell Rich Mason, VP & CSO, Honeywell | |||
4:44 pm - 5:02 pm | Collaborating While Protecting Intellectual Property and Network Security Andrea Kirby, Director, Global Collaborations Services, Merck & Co., Inc. | |||
5:02 pm - 5:20 pm | Providing Holistic Security Across a Range of Legacy and Acquired Products David Lenoe, Director of Product Security, Adobe | |||
5:20 pm - 5:38 pm | Q&A Panel: Adopting New Strategies for Cloud Security David Lenoe, Director of Product Security, Adobe Rich Mason, VP & CSO, Honeywell John Tryon, Director – Compliance and Risk Management, Merck & Co., Inc. Moderator: Joan Goodchild, Editor, CSO | |||
5:38 pm - 5:56 pm | A CSO's View on Mobile Security: An Executive Interview Stan Black, CSO, Citrix Bob Bragdon, Publisher, CSO | |||
6:30 pm - 7:30 pm | CSO50 Awards Cocktail and Networking Reception Sponsored by Dell Software(open to all qualified attendees) | |||
7:30 pm - 9:30 pm | CSO50 Awards Dinner and Ceremony (open to all qualified attendees) |
Wednesday, February 25, 2015 | |||||||
8:00 am - 4:10 pm | Registration | ||||||
8:00 am - 9:00 am | Networking Breakfast | ||||||
9:00 am - 9:05 am | Opening Remarks Bob Bragdon, Publisher, CSO | ||||||
9:05 am - 9:35 am | Giving Privacy and Security Training the Hollywood Touch Alisa Bergman, Chief Privacy Officer, Warner Bros. Entertainment Inc. | ||||||
9:35 am - 9:53 am | How to Create the Defender’s Advantage Peter Clay, Chief Information Security Officer, CSG Invotas | ||||||
9:53 am - 10:11 am | Securing Our Premium VMs Quinn Shamblin, Executive Director & Information Security Officer, Boston University | ||||||
10:11 am - 10:29 am | Locking Down 10,000 Shared Folders Donna Fountain, Chief of Staff/Office of the CISO, Voya Financial | ||||||
10:29 am - 10:59 am | Refreshment and Networking Break | ||||||
10:59 am - 11:29 am | Completing a Five-Year MARS-E Implementation Project in One Year Douglas Hewes CISSP, CISA, CISM, CISO, South Carolina Health and Human Services | ||||||
11:29 am - 11:47 am | Secure Colorado: The State’s First Cyber Security Strategic Plan Deborah Blyth, CISO, Colorado Governor's Office of Information Technology | ||||||
11:47 am - 12:09 pm | Q&A Panel: Building Security into IT Infrastructure Deborah Blyth, CISO, Colorado Governor's Office of Information Technology Douglas Hewes CISSP, CISA, CISM, CISO, South Carolina Health and Human Services Jesus 'Laz' Montano, CISO, Voya Financial Quinn Shamblin, Executive Director & Information Security Officer, Boston University Moderator: Derek Hulitzky, VP, Content Development, CSO | ||||||
12:09 pm - 12:27 pm | The Best Cyber Intelligence Money CAN'T Buy Ken Bell, Director of Strategic Initiatives, CTO Council, Raytheon Cyber Products | ||||||
12:27 pm - 12:45 pm | The Predictive Revolution Rich Mason, VP & CSO, Honeywell | ||||||
12:45 pm - 2:00 pm | Networking Lunch with Table Topic Discussions Hosted by Selected CSO50 Honorees | ||||||
2:00 pm - 2:18 pm | Security and Identity/Access Management (IAM): Like Chocolate and Peanut Butter Jackson Shaw, Senior Director of Product Management, Dell Software | ||||||
2:18 pm - 2:36 pm | Bridging the Divide Between Security and Operations Teams Jonathan Trull, CISO, Qualys | ||||||
2:36 pm - 2:54 pm | Phishing for Clickers Chris T. Pierson Ph.D., J.D., EVP, General Counsel and Chief Security Officer, Viewpost | ||||||
2:54 pm - 3:12 pm | Safely and Securely Unlocking Social Media Todd Austin, Security Architect, Blue Cross Blue Shield of North Carolina | ||||||
3:12 pm - 3:30 pm | Improving Customer Financial Security with Transparency Bob Thompson, SVP, Information Technology, TruStone Financial | ||||||
3:30 pm - 3:48 pm | Creating and Deploying a Successful Physical Security Campaign Donna Fountain, Chief of Staff/Office of the CISO, Voya Financial | ||||||
3:48 pm - 4:10 pm | Q&A Panel: New Ways to Leverage Security Awareness Todd Austin, Security Architect, Blue Cross Blue Shield of North Carolina Jesus 'Laz' Montano, CISO, Voya Financial Chris T. Pierson Ph.D., J.D., EVP, General Counsel and Chief Security Officer, Viewpost Bob Thompson, SVP, Information Technology, TruStone Financial Moderator: Derek Hulitzky, VP, Content Development, CSO | ||||||
4:10 pm | Recap, Takeaways and Closing Remarks Bob Bragdon, Publisher, CSO |