21938.002_cyber security exchange

8
Developed by DELEGATE BROCHURE www.cyber-securityexchange.com December 7-9, 2014 Amelia Island, FL IQPC Exchange @IQPCNAExchange #CyberExchange IQPC Exchange IQPC Exchange CONNECT WITH US!

Upload: bryan-stlaurent-c-suite-business-development

Post on 07-Aug-2015

25 views

Category:

Documents


0 download

TRANSCRIPT

Developed by DELEGATE BROCHURE

www.cyber-securityexchange.com

December 7-9, 2014 • Amelia Island, FL

IQPC Exchange@IQPCNAExchange

#CyberExchangeIQPC Exchange IQPC Exchange

CONNECT wITH Us!

www.cyber-securityexchange.com | 813-658-2510 | [email protected]

December 7-9, 2014 • #CyberExchange

Welcome to the Cyber Security Exchange

Time will tell whether a term like “post-Target” will actually be indicative of a major shift in attention to cyber security for all industries, and the necessary and consequent actions to make a difference. Early indications are that things are changing. As a result of that breach for example, the CIO was terminated and months later the CEO stepped down. This was a first.

CIsO’s and their companies are under major cyber security threats that are growing exponentially by the day. web Application attacks and Cyber Espionage are on the increase and the latter is now considered a greater national security threat than terrorism. Attacks are not just ‘drive by’ but are quite sophisticated and are developed, designed and executed by extremely motivated individuals (both internal and external) and organized crime. Cybercrime is already larger than the global illicit drug trade and much safer. Companies need to increase their enterprise visibility, monitor and control it with high quality and automated systems and be able to detect behavioral abnormalities in real time.

CIsO’s need dashboards to share both cyber security and other risk information in a business relevant way to the C-suite and BOD. All Executives need to be properly informed of the risks/consequences to their enterprises if cyber security needs are not met. This rollup reporting needs to be done with a P/L perspective in mind.

with all this in mind, our exclusive 3rd Annual Cyber Security Exchange has been designed with you – the Chief Information security Officer (CIO/CISO/CSO) – in mind. You will find this unique three day, executive forum full of relevant topics gleaned from extensive research, market intelligence and feedback from industry leaders, influencers and senior executives like you. Come prepared to be engaged on the critical topics around cybersecurity and infrastructure protection.

Contact us today to find how you might join this dynamic event. I look forward to hearing from you!

Jane Bell Conference Director Cyber security Exchange

Top Reasons to Attend

• Unique invitation-only event which will only include CIsOs, CsOs, sVPs, and VPs of Information security

• Unsurpassed formal and informal networking opportunities to share and exchange ideas and concepts.

• Benchmark your current strategies and initiatives with other leading companies in our exclusive Brainweave® discussions.

• Meet the leading solution providers relevant to your business needs in private, prescheduled, one-on-one meetings.

• A wide range of conference and discussion sessions led by peer level presenters sharing case studies, best practices, and unique updates that are most relevant to your current priorities.

• Maximize your time out of office by customizing your own itinerary. select the conference sessions, Brainweave® discussions, MasterClasses and business meetings that match your initiatives and current business needs, ensuring you have full control of your time at the Exchange.

www.cyber-securityexchange.com | 813-658-2510 | [email protected]

December 7-9, 2014 • #CyberExchange

• GrayHat;FriendorFoe?CanYouRelyonaHackertoSecureAgainstThreats?

• CyberSecurityandTheBottomLine

• ArchitectureoftheSecureEnterprise:RiskAssessment & Implementation

• BreachResponse:DevelopingYourEffectiveCommunications Strategy

• MakingCyberSecurityaC-suiteIssue

• ConductingEffectiveandEfficientEnterpriseForensicInvestigations

• InformationSecurityBlindness—WhatYouDon’tKnowWillHurtYou

• ArtificialIntelligence;AnArmyofAlgorithmstoProtectthe Fortress

KEYTOPICSTOBEADDRESSED

LeadingCaseStudiesandSessionsPresentedBy

I met new peers and gained valuable insight into IT security trends in a very focused and worthwhile event! - 2013 Delegate, John Deere“

GeorgeFinneyInformation Security Officer SouthernMethodistUniversity

Ron Ross,Fellow, Information Technology Laboratory, Computer security DivisionNationalInstituteofStandardsandTechnology

EdLoweryspecial Agent in Charge - Department of Homeland securityCriminal Investigations Division, USSecretService

RickVanLuvender Vice President Enterprise security Risk & ComplianceFirst Data

RichardMooreDeputy Chief Information Security Officer NYLife

MarcSokol Chief Security Officer and Headof Operational RiskGuardian Life

BobLudecke VP IT Risk ManagerFidelityInvestments

TheHonorableMichaelChertoffExecutive Chairman and Co-Founder, The Chertoff Group and Former secretary, U.S.DepartmentofHomelandSecurity

JoeBennettCIsOYPHoldings

DeborahKobza, CGEIT, JIEMExecutive Director, Founder & CEOTheNationalHealthISAC

Charles LeboVP Infrastructure & Information Security OfficerTenetHealthcare

AshKhanHead of Global Consumer InformationCitiBank

Jim NelmsCIsOMayoClinic

www.cyber-securityexchange.com | 813-658-2510 | [email protected]

December 7-9, 2014 • #CyberExchange

ConferenceSessions The highly crafted conference sessions reflect the strategic issues that senior technology and administration executives have identified as priorities during our lengthy research process. You will choose from a selection of plenary and concurrent sessions covering a myriad of issues that will create the foundation of your agenda. session formats include: co-presented case studies, panel discussions, case reviews, roundtable discussions and interactive debates.

MasterClassA MasterClass is an in-depth discussion led by a solution provider. The delivery format is flexible in that the solution provider may use a case study or present with a client to “bring the content to life”. we discourage heavy PowerPoint presentations as these take away from the level of interaction that is achieved with a case study or client.

BrainWeave® DiscussionsOur signature Brainweave® sessions encourage discussion, debate and learning in an unscripted and informal setting. You can choose to participate in these interactive roundtable style sessions on topics which are top of mind issues. You will be able to select from four possible BrainWeave® topics which will be incorporated into your personal itinerary. These sixty minute discussions will be moderated to ensure that the discussions stay on-course and deliver maximum benefit to you. Ask questions, share experiences and ideas and find the right answers to your immediate concerns.

One-on-OneBusinessMeetingsAn integral part of your agenda is the one-on-one business meetings with leading solution providers. when you register for the Cyber security Exchange, you will be asked to identify the solutions and services you are currently considering, so we can invite leading experts to the exchange who will fit your business needs. This unique aspect of the Cyber Security Exchange serves to simplify the process for sourcing new solutions, enable you to discover strategies that are working for others and offer you early previews of emerging technologies. Your selections are then incorporated into your customized agenda.

Prior to the exchange, you will be able to assess the solution providers who will be attending and select those who offer products and services that match your initiatives and priorities.

MOREVALUEFORYOURTIMEOUTOFTHEOFFICEThe Cyber Security Exchange offers a variety of unique learning styles and sessions, which you can select from to build a customized itinerary that reflects your current initiatives, priorities, and future strategic objectives.

www.cyber-securityexchange.com | 813-658-2510 | [email protected]

December 7-9, 2014 • #CyberExchange

WHOYOUWILLMEET:To ensure the Cyber security Exchange offers the highest degree of relevancy for attendees, only senior marketing executives responsible for providing strategic leadership and guidance in data security within their organizations are invited. This exclusive format allows you to connect with those peers whose insights you respect most – through exceptional networking, business meetings, and strategic information sessions.

Cyber Security Exchange Executivesinattendancewillinclude:• CISOs (Chief Information Security Officers)

• CSOs (Chief Security Officers)

• SVP/VP/Head of Data Security

• SVP/VP/Head of Information / Network Security

Fromthefollowingindustries:• Financial Services

• Hospitals and Healthcare

• Retail

• Utilities

• Homeland Security (Fed and State)

we qualify all attendees on job function, strategic responsibility, and budgeting authority to ensure you’re guaranteed to meet and engage with an elite group within the data security industry. Every attendee must answer ‘yes’ to the following criteria in order to gain an invitation:

• Is your company’s annual revenue $1 billion or above?

• Do you sit in the C-suite or report directly to the C-suite?

• Do you control where information security budget is spent?

• Do you manage corporate strategy at the regional, divisional or group level?

YOURREGISTRATIONINCLUDES:

• Access to the secure Exchange pre-event website to customize your schedule during the Exchange

• Selection of executive roundtables, keynote presentations and conference sessions

• Selection of one-to-one business meetings with service providers

• Breakfast, lunch and refreshments

• Gala Welcome Dinner on Day 1 and Networking Dinner on Day 2

• Personal copy of the event catalogue, including participant details and speaker documentation

• Exchange Operations Manager dedicated to pre-event, on-site and post-event assistance

WHOqUALIFIESTOATTEND?

Attendees at past Cyber Security Exchanges representedcompaniessuchas:

A great opportunity to hear and network with other ISOs from different industry sectors and the issues they are addressing. - 2013 Delegate, Citigroup

www.cyber-securityexchange.com | 813-658-2510 | [email protected]

December 7-9, 2014 • #CyberExchange

The Cyber security Exchange doesn’t just provide you with a once-a-year opportunity to meet with your peers. Through a range of online channels we’re delighted to be able to facilitate all year round learning and networking for the global marketing community. Stay connected through Twitter, YouTube, LinkedIn, Facebook, and our online resource library, to get the latest new, event updates, exclusive videos, whitepapers and more!

KEEPCONNECTEDWITHUS:

IQPC Exchange@IQPCNAExchange

CyberExchangeIQPC Exchange IQPC Exchange

SOLUTIONPROVIDERSsolution Providers are invited based on the requirements of attending delegates, and as such they will specialize in the following areas:

BYMARKETTYPE• Network Security• Endpoint Security• Application Security• Content Security

All IQPC Exchange venues are carefully selected to maximize the value of the exchange to our participants. we choose venues that encourage high-level thinking in a relaxed atmosphere to ensure you get the most out of your time away from the office. Details on hotel accomodations will follow soon.

(813) 658-2510

VENUEAMELIA ISLAND, FL

BYSOLUTION• Identity and Access Management (IAM)• Risk and Compliance Management• Encryption• Data Loss Prevention (DLP)• Unified Threat Management• Firewall• Antivirus and Antimalware• IDS/IPS• Security and Vulnerability Management• Disaster Recovery• DDos mitigation• Web Filtering

BYSERVICES• Consulting• Design and Integration• Threat and Risk Assessment• Managed Security Service (Application

security-As-A-service; Encryption-As-A-service)

• Training and Education• Legal (Legal Implications of IAM, BYOD, etc.,

as well as wilful Negligence)

REqUESTYOURINVITATIONTODAY!

[email protected]

www.cyber-securityexchange.com

Excellent seminar for IT Security collaboration and ideas!- 2013 Delegate, Ryder“

www.cyber-securityexchange.com | 813-658-2510 | [email protected]

December 7-9, 2014 • #CyberExchange

11:00 – 1:00 Registration

1:00 – 1: 15 sponsor Orientation | Delegate Orientation

1:15 – 1:45 ICE BREAKER

1:45 – 2:00 Chairperson’s Opening Remarks

2:00 – 2:30Keynote-TheBestDefenseisaGoodOffense Deborah Kobza, CGEIT, JIEM, Executive Director, Founder & CEO, The National Health ISAC

2:30 – 3:00 Panel:CyberSecurityandtheBottomLine;GainingConsumerConfidenceintheEraofError

3:00 – 3:30 Business Meetings

3:30 – 3:45 Networking Break

3:45 – 4:30

MasterClass A MasterClass B

Securing Your Assets; Data Management & Analytics Protection

Regimes & Policies ; Building Blocks of a Resilient Network

4:30 – 5:30

Brainweave A Brainweave BEnterprise Encryption Strategies for Cost Efficient Data Protection

Engineering secure social Networks

5:30 – 6:30 Business Meetings

6:30 – 7:00 Networking Drinks Reception

7:00 – 9:00 Networking Dinner

8:00 – 8:45 Networking Breakfast

8:45 – 9:00 Chairperson’s Recap

9:00 – 9:30Panel:ArchitectureoftheSecureEnterprise;RiskAssessment&ImplementationThe Chertoff Group

9:30 – 10:30

Innovative Roundtables Innovative Roundtables1) Application security for the Enterprise 2) Consulting and Information Assurance3) Identity and Access Management

4) Critical Infrastructure Protection and Information sharing5) Leveraging Big Data Analytics to Predict Performance and Drive 6) ROI Adapting to the Regulations Cyber security Framework

10:30 – 11:00 Business Meetings

11:00 – 11:15 Networking Break

11:15 – 12:15Brainweave C Brainweave D

security in the Age of Global Commerce Continuous Monitoring: an Enterprise Security Essential

AGENDA

AGENDA

sunday, December 7, 2014DAY ONE

DAY TWO Monday, December 8, 2014

www.cyber-securityexchange.com | 813-658-2510 | [email protected]

December 7-9, 2014 • #CyberExchange

AGENDA

12:15 – 12:45

Panel:“WhentheBreachHitstheFan”-IncidentResponsetoaCyberIncident;PreparingforandRespondingtoaBreach-Public/PrivatePartnerships

Moderator: Ron Greene, CISO, MasterCardPanelists: Ed Lowery, Special Agent in Charge - Department of Homeland Security, Criminal Investigations Division, US Secret ServiceRick Van Luvender, Vice President Enterprise Security Risk & Compliance, First DataRichard Moore, Deputy Chief Information Security Officer, NY LifeMarc Sokol, Chief Security Officer and Head of Operational Risk, Guardian Life

12:45 – 1:15 Business Meetings

1:15 – 2:15 Networking Lunch

2:15 – 2:45 Panel:IndustrialControlSystems;WhatYouDon’tKnowWillHurtYou

2:45 – 3:45

Brainweave E Brainweave FArtificial Intelligence: An Army of Algorithms to Protect the Fortress

Digital Forensics: Improving Outcomes through Investigation, Analysis, and Result Reporting

3:45 – 4:45 Business Meetings

4:45 – 5:00 Networking Break

5:00 – 5:30Keynote-MakingCybersecurityaC-SuitePriorityThe Honorable Michael Chertoff, Executive Chairman and Co-Founder, The Chertoff Group and Former Secretary, U.S. Department of Homeland Security

5:30 – 6:15

MasterClass C MasterClass DMigration to the Cloud; Navigating a Secure & Compliant Path

Mobile & BYOD Security: the Huge and Growing Threat

3:45 – 7:15 Business Meetings

7:15 – 7:45 Networking Reception

7:45 – 9:45 Networking Dinner

Tuesday, December 9, 2014

8:00 – 8:45 Networking Breakfast

8:45 – 9:00 Chairperson’s Recap

9:00 – 9:30 Panel:Governance:TheLiaisonBetweenInformationManagement&InformationSecurity

9:30 – 10:30 Business Meetings

10:30 – 10:45 Networking Break

10:45 – 11:15 Panel:GrayHats:FriendorFoe?CanYouRelyonaHackertoSecureAgainstThreats?

11:15 – 12:45 Business Meetings

12:45 End of Exchange and Boxed Lunch

AGENDA DAY TWO

DAY THREE

Monday, December 8, 2014