SecurIT Conference Dallas
 
Thursday, September 13, 2018
8:00 am - 9:00 amRegistration and Networking Breakfast
9:00 am - 9:10 amWelcome and Opening Remarks
Bob Bragdon, Publisher, CSO
9:10 am - 9:55 amManaging Risk Across the Partner Ecosystem
Boulton Fernando, CISO, Toyota Financial Services

Every organization operates with an ecosystem of business partners, and the larger the organization, the more vast the ecosystem, from contractors to supply chain and technology partners.  How can you ensure that every organization with which you do business complies with your policies?  What measures should you put in place to penalize non-compliance?  And what plans should you have in place if -- or when -- a provider fails or is breached?

9:55 am - 10:15 amThink Your Network is Safe? Check All of Your Endpoints.
Ron Chestang, Senior Print Security Consultant, HP Inc.
While you invest time, resources and millions of dollars in protecting endpoints and network perimeter, are you addressing one of the largest footprints on your network? While printers and other endpoints may not be front-of-mind as primary security threats, this infrastructure may be allowing hackers and malware to take the easy route to your network and data. Join us for this session where we’ll share examples of breaches and how some of the most secure organizations are still lagging in overall security for critical endpoints like printers. We’ll also share best practices on how to most-effectively secure these critical endpoints.

View Presentation
10:15 am - 10:45 amRefreshment & Networking Break
10:45 am - 11:30 amManaging Security and Risk for Transformational IT
Greg Belanger, VP, Cyber Defense, CBRE
James Clent, CIO, Remington Hotels
Boulton Fernando, CISO, Toyota Financial Services
Bob Bragdon, Publisher, CSO

As organizations continue to transform their businesses with technology, they’re faced with the challenge of managing innovation, speed and security all at the same time. What strategies are organizations finding successful as they navigate in this new world? What lessons have they learned? Join us for this session to discover new ways to survive and thrive in this new era of transformation.

11:30 am - 12:00 pmPublisher’s Panel: Securing the Evolving IT Environment
Gabe Deale, VP, Sales Engineering, Cylance
Evan Glaser, Cyber Security Account Executive , Darktrace
David Gurley, Regional Systems Engineer, Illumio
Mustafa Rassiwala, Sr. Director, Products, Lastline
Bob Bragdon, Publisher, CSO

In this fast-paced session, industry expert panelists will weigh in with their views on the latest security news and how it is affecting customers in this new era of threats. Citing specifics from their customer engagements, the panel will talk about the problems their customers are facing and how they are addressing them. They will also share their thoughts on enterprise security in the future when IT environments are rife with IoT, AI, augmented reality, and of course, even more data.

12:00 pm - 1:15 pmLuncheon with Table Discussions

  • Workspace Security, hosted by Citrix 
  • Effective Risk Mitigation, hosted by Cylance 
  • Machine Learning for Cyber Defense, hosted by Darktrace 
  • Compliance Without Data Compromise, hosted by Delphix 
  • Print Security Solutions, hosted by HP Inc. 
  • Stop Cyber Threats with Adaptive Micro-Segmentation, hosted by Illumio
  • AI-Driven Network Security, hosted by Lastline
  • API & Microservice Security, hosted by Rogue Wave


  • 1:15 pm - 2:00 pmSame Threat, Different Day: Minimizing Insider Threats and Risks
    Michael Theis, Assistant Director for Research, National Insider Threat Center, at the CERT Division, Carnegie Mellon University

    Whether they’re innocent errors made by well-meaning employees or malicious attempts by insiders to steal assets or interrupt business operations, the insider threat is evergreen.  And just as the threat is evergreen, so is the opportunity since insiders are enabled and emboldened by the digitized enterprise.  What approaches does the National Insider Threat Center recommend to curb the threat in this environment?  What new tactics are malicious insiders using?  We’ll dissect our corpus of over 2,000 incidents attributable to insiders and prescribe a course of action any organization can take to mitigate the insider threat.

    View Presentation

    2:00 pm - 2:20 pmSecuring the Future of Work: Key Questions Every Organization Should Consider
    Kurt Roemer, Chief Security Strategist, Citrix
    How is our notion of work and collaboration changing, and how is this challenging our security? Why are clouds, mobile and IoT not the enemies of security -- and can actually help manage highly distributed security events? How are our notions of security and privacy transforming, and how can highly-automated analytics play a key role? Join us for this session as we answer these questions and more.

    View Presentation
    2:20 pm - 2:40 pmRefreshment and Networking Break
    2:40 pm - 3:15 pmDelivering More Security with Less Resources
    Danny Miller, CISO, Texas A&M University System
    Scot Miller, SVP, CISO, Mr. Cooper
    Bob Bragdon, Publisher, CSO

    The evergreen challenge for CISOs has been how to address increasingly sophisticated threats with less and less resources. All of this requires leveraging modern and agile strategies with innovation and smart alignment of resources. Join us for this session as we explore new approaches.

    3:15 pm - 4:00 pmGDPR and Beyond: Addressing the Teeth that Really Matter
    Edward Block, Former CISO, State of Texas; Senior Attorney, Foley & Lardner LLP

    GDPR along with new regulations in various states are adding more complexity to already stretched security and risk resources. How are organizations coping? Are there some productive ways to leverage these new regulations to find efficiencies? Join us for this session to understand new ways forward in this environment.

    View Presentation

    4:00 pm - 4:05 pmClosing Remarks
    Bob Bragdon, Publisher, CSO
    4:05 pm - 5:00 pmNetworking Cocktail Reception