New York Seminar – Delivering Cybersecurity
Date: April 30, 2014 | 8:00am – 1:45pm
2013 can be remembered as the year that the Advanced Persistent Thread went mainstream: cybersecurity matters routinely make front pages in the major papers, and no longer just for a “shame on them” story about a major corporation being compromised. This new visibility puts cybersecurity efforts front and center on the corporate risk radar-screen – right about the same time your business sponsors are clamoring for more and more mobile access. There is no better time to be on top of the game than now. This WSTA seminar explores the evolving cybersecurity landscape – emerging threats, proactive and pre-emptive measures, solid security architectural options and enhanced fortification, enabling you to tailor your strategy to this ever evolving world.
8:00-8:30AM Registration and Breakfast (Breakfast sponsored by DB Networks, Inc.)
8:30-8:35AM WSTA Introductions – Thomas I. Piderit, Vice President, Federal Reserve Bank of New York and a WSTA Director
8:35-9:20AM Keynote: “Cybersecurity as a Business Enabler”
Bio | Abstract
The discipline of information security has fundamentally changed. Security teams no longer aim to build an impregnable stockade to protect vulnerable infrastructure and applications. Instead, they seek to embed threat resistance into every element of an organization’s infrastructure, applications, and operations.
By doing so, they’re transforming security from a barrier to a business enabler—because a resilient organization can resist threats and accelerate business activity.
What are the best practices and success factors of organizations that deliver cybersecurity as a business enabler? Attendees at this keynote session will discover:
• Organizational and operational best practices for balancing cyber-risk with business reward
• Which emerging technologies, tools, and products are critical for detecting and neutralizing new threats
• How to reduce the overhead of security processes to make business more agile
Johna Till Johnson is CEO and Founder of Nemertes Research, where she sets research direction and works with strategic clients. She has decades of experience in technology design, deployment, and operations. Under her leadership, Nemertes has emerged as a leading trusted advisor to Fortune-50 and other world-class organizations.
Ms. Johnson specializes in emerging technology, innovation, operational transformation, and security and risk management. She has worked with many Wall St and other financial organizations to craft technology and business strategies that balance the risks and benefits of emerging technology. Her experience with information security begins back in the 1980s, where she was an early adopter of the Internet (then Arpanet) as a graduate student in particle physics. Since then, she has worked with major organizations–including Fortune-50 enterprises and carriers–to craft and implement security strategies, protect strategic assets, manage risk, and enable business success.
Ms. Johnson draws upon diverse experience prior to founding Nemertes in 2002. She served as chief technology officer (CTO) at Greenwich Technology Partners, an infrastructure consulting and engineering firm; headed the Global Networking Strategies Service business unit of META Group; and oversaw the lab-testing program at Data Communications magazine. She also has designed and developed security, speech-synthesis, and free-space laser products at companies including Mosler Security Systems and Digitus Corp.
Ms. Johnson holds a bachelor of science degree in electrical engineering/computer science (BSEE/CS) from The Johns Hopkins University, has conducted graduate work in nuclear and particle physics at the University of Rochester, speaks three languages, and has published a science fiction novel. In her spare time, Ms. Johnson is an avid urban kayaker.
9:20-9:45AM Premier Sponsor: “Defending Together in 2014 & Beyond – Security Connected: Cyber Trends & Defending What’s Next”
Bio | Abstract
In this session, Intel Security’s McAfee North American VP/CTO will discuss the emerging threat landscape and how actors collaborate and coordinate to create threats across current/emerging attack surfaces. After the updated threat briefing, McAfee’s Connected Strategy will be discussed and how this can be applied to defend the enterprise and be extended to mitigate the risks associated with leveraging cloud computing, mobility, and the Internet of Things (IOT). The session will close with lessons learned on maximizing use of new technology for your business while managing risk.
Curt Aubley is the VP and CTO for the Americas at McAfee. In this role, Curt supports the North American and LTAM sales initiatives by aggressively demonstrating McAfee’s thought leadership in our most strategic opportunities.
Curt joined McAfee from Lockheed Martin where he served in several senior roles over twelve years. Most recently, Curt was VP and CTO for Lockheed Martin’s IS&GS NexGen Cyber and Innovation initiatives where he led the development of the SolaS Secure Cloud Computing Suite and StarVision APT Defender Suite. In this capacity Curt oversaw the technical strategy, partner management, R&D Global NexGen Innovation Centres, and technical operations of these programs which culminated in directly supporting nearly $9 Billion in revenue.
Prior to joining Lockheed, Curt worked most notably with AT&T and NCR/Teradata and served as Commander of the U.S. Army 10th Mountain / 11th Signal Brigade Data Defense Network Unit deployed in Somalia, Africa.
Over the course of his illustrious career, Curt has authored multiple books and articles on Information Technology and has served on the Technical Advisors Board for Intel and Microsoft. He is a renowned speaker and an industry expert on cyber security and cloud computing.
9:45-10:10AM “Large Scale Breaches: Lessons Learned”
Bio | Abstract
This presentation will compare two major credit card breaches that occurred 8 years apart. We will look at commonalities and differences between these breaches, focusing on the network security “lessons learned”.
The two breaches are eerily similar. In both cases the hackers were in the network for over a year before they were detected. Both breaches cost the victim companies well over $100M in investigative and legal costs, including fines by various regulatory organizations. Take away:
• Robust network security monitoring is critical to detect breaches quickly and minimize resulting costs
In his role as Chief Cyber Services Strategist for General Dynamics Fidelis Cybersecurity Systems, Jim Jaeger is responsible for developing and evolving the company’s cyber services strategy while synchronizing it with product strategy. Jim previously managed the Network Defense and Forensics business unit, including the Digital Forensics Lab. He has led cyber forensics investigations into some of the largest network breaches impacting our industry. Mr. Jaeger has also held a leadership role for a wide range of cyber programs including General Dynamics’ support for the DoD Cyber Crime Center (DC3), the Defense Computer Forensic Lab and the DefenseCyber Crime Institute.
Previously, he created General Dynamics’ information assurance and critical infrastructure protection group, which has developed a wide variety of Information Assurance tools, ranging from the Air Force’s intrusion detection infrastructure to the only network based multi-level security (MLS) system accredited by the National Security Agency at Protection Level 4 without waivers. He is a former Brigadier General in the United States Air Force and his military service includes stints as the Director of Intelligence (J2) for the U.S. Atlantic Command, Assistant Deputy Director of Operations at the National Security Agency, and Commander of the Air Force Technical Applications Center. In these capacities, Mr. Jaeger was responsible for the collection and reporting of intelligence to Theater Commanders and the National Command Authority.
He received his Bachelor of Science degree from the Air Force Academy and his Master’s degree in Management and Supervision from Central Michigan University. He also completed the Executive Development Program at the Whitmore Graduate School of Business of the University of New Hampshire.
10:10-10:35AM Break and Demo Area (Break sponsored by CyberArk)
10:35-11:00AM “Revolutionizing Advanced Threat Protection – A New, Modern Approach”
Bio | Abstract
Due to the inevitability of advanced targeted attacks that fly under the radar of traditional, preventative-based security technologies, there is a shift toward a more modern defense-in-depth strategy—one that provides the intelligence, context, and real-time situational awareness needed to block, detect and respond to today’s advanced cyber threats. This Advanced Threat Lifecycle Defense is the first to integrate a business process view that aligns with how your security team operationalizes new intelligence and technologies to fortify your security infrastructure against future attacks. Find out how this approach will empower your digital enterprise and organization, enabling you to adopt the best new technologies that drive your business.
As senior technology evangelist, Grant brings more than 30 years of experience in sales, marketing and management to Blue Coat. Prior to joining the company, Grant was head of market development and sales for Altor Networks, which was acquired by Juniper Networks. Before joining Altor Networks, he was vice president, enterprise sales for NeuStar. Earlier, he was president and CEO of MetaInfo and successfully sold the company to NeuStar. Grant was the worldwide senior product evangelist for CheckPoint, which he joined after the company acquired MetaInfo.
11:00-11:25AM “5G/SOC: Security Intelligence for Tomorrow’s Enterprise”
Bio | Abstract
In this session, we will explore the different generations of Security Operations Centers and how they have evolved to their current state. We will also look at what is required to keep up with our adversary. Additional topics covered include security intelligence, continuous monitoring, situational awareness, proactive and predictive analysis, and operations.
Chris leads the team charged with bringing cutting edge solutions to market. His team identifies advanced product applications both in the lab and in the field and then works to bring these innovations to the HP customer base. Chris’ team supports the HP Enterprise Security Products suite – ArcSight, Tipping Point and Fortify.
Chris has over 25 years’ experience in the field of information security. He brings extensive international experience in Europe and Asia and speaks Czech, Slovak and German. From 2007 to 2013, Chris was the CEO of Laconic Security, an ArcSight SIOC partner, where he personally led the design and build of many global multi-national Security Operations Centers including; Walmart, Vodafone (Germany), Shell Oil (The Netherlands), Sony Network Entertainment and Apple. Chris’ methodology for Security Operations is widely deployed across the 35+ SOCs built by the HP ArcSight SIOC team.
Prior to this, Chris was the Director of Professional Services for Cybertrust where he managed a $20M security consulting practice. Before Cybertrust, Chris was with IBM Global Services, where he worked as the Manager of Security Intelligence and Operations. Chris founded the group responsible for the application of Business Intelligence to the field of Information Security, including intelligence collection, data mining and analytical decision support.
Before joining IBM, Chris worked in the National Defense and Intelligence community in the field of Information Operations. He supported such agencies as the DOD Joint Staff, the Land Information Warfare Activity, the Space Warfare Center as well as other federal agencies. Chris served for 10 years in the U.S. Army in Military Intelligence and Special Forces.
11:25-11:50AM “Leverage The Cloud For Better Security”
Bio | Abstract
Security teams are always under pressure to keep pace, not only with the latest threats but all of the changes to the business. With more and more business moving workloads into the cloud, security teams face a choice; fall behind or embrace the change.
In this session we’ll examine how the functionality available in the cloud can be leveraged to enhance your security posture. We’ll see how automation can become a cornerstone of your security practice allowing security to help the business move faster instead of slowing it down.
Building on an extensive career developing security practices for large organizations and securing complex enterprise environments, Mark speaks regularly on the security challenges facing businesses today.
Focusing on helping businesses as they move from the data centre to hybrid environments to working fully in the cloud, he brings a wealth of practical experience to the table. An active member of the IEEE and ACM, Mark regularly works with clients, partners, and the community to conduct research and study the real world impact moving to the cloud has on a security practice. He can be reached online at http://markn.ca and @marknca.
11:50-12:30PM Luncheon and Demo Area Visit (Luncheon sponsorship available)
12:30-12:55PM “Detecting Emerging Cyber Threat in Real Time”
Bio | Abstract
In this new era of major data breaches and cyber-attack, it is clear that a radical new approach to cyber security is needed. This approach takes network vulnerability for granted, and is uniquely capable of detecting the human traces that make up an attack, meaning emerging threats can be spotted in real time. Based on revolutionary Bayesian mathematics, Behavioral Cyber Defense technology allows you to counter the most sophisticated attackers, both inside and outside the enterprise.
• Embrace Uncertainty
• Analyze Human Behavior As It Evolves
• Defend Against Most Sophisticated Attackers
Andrew France joined Darktrace as CEO in January 2014 following a distinguished, 30-year career at the UK Government’s signals intelligence agency, GCHQ. As GCHQ’s Deputy Director for Cyber Defence Operations, Andrew has been at the forefront of the national cyber defense strategy, responsible for both policy and operational delivery. He is a recognised global leader in his field, with extensive experience in delivering technical innovation in high-pressure and secure environments. Andrew is a registered Incorporated Engineer, an elected member of the Engineering Institution of Great Britain, and a member of the Institute of Engineering and Technology. He was awarded an OBE for Services to the Ministry of Defence in 2005.
12:55-1:20PM “Delivering cyber security – Using social proof to combat fraud, accept customers, reduce friction and aid compliance”
Bio | Abstract
Financial Institutions are under constant pressure to strike the right balance between mitigating fraud risk, growing revenues through new customer acquisition and reducing customer friction while remaining compliant. Walking this tight-rope isn’t easy; getting it wrong can result in increasing churn and losses, large fines and even cost to brand reputation. In this presentation we explore how using online and social data in particular helps address these challenges cost-effectively.
Sunil is a serial entrepreneur and Socure is his 5th startup. Sunil is a Solution Architect by profession and has spent over 20 years in the application security and governance, risk and compliance (GRC) markets with an IPO and several successful exit experiences under his belt. He has designed cost-effective solutions for over 200 of the global Fortune 500 enterprises in the Financial Services, Manufacturing, e-Commerce, Government, Healthcare, Education and Gaming verticals over his career thus far. His latest venture Socure, combines old and new world approaches and technologies together in a novel way to help large and small enterprises combat fraud, improve acceptance, reduce friction and become compliant. Sunil has a MSc. in MIS and a BSc. in Computer Science.
1:20-1:45PM “Bank Attacks: Is the Nightmare Over?”
Bio | Abstract
2013 was a nightmare for many US banks, as they were targeted with massive DDoS attacks by the QCF (Qassam Cyber Fighters) as part of their Operation Ababil attacks. Since last summer, however, things have been mostly quiet. Or have they? In this session, we will take a look back at the lessons learned from the Operation Ababil attacks, and present case studies on some of the new attacks observed since last summer. We will examine how the threats have evolved beyond DDoS, and why the financial sector must continue to evolve to address these risks.
Rich Bolstridge is the Chief Strategist, Financial Services at Akamai Technologies. In this role, Mr. Bolstridge is responsible for driving requirements and innovation, enabling Akamai to deliver solutions to the financial services industry. He is the primary interface with the financial services community, and evangelizes on behalf of the company with key influencers and industry analysts. Mr. Bolstridge has special interest in the intersection of mobile and financial services, including emerging security ramifications and impact on the user experience.
Prior to joining Akamai, Mr. Bolstridge was the Director of Architecture at Fidelity Investments, where he led the Competitive Technology Analysis group. While at Fidelity, he played the leading role in moving Fidelity.com from #11 to #1 on the Gomez and Keynote Brokerage Benchmarks. Mr. Bolstridge was also the Founder and President of Ovation Software Testing, a leading solution provider and reseller for Mercury Interactive.
Mr. Bolstridge has over 25 years of industry experience, and for the last 20 years, he has focused on technology solutions for the financial services industry.
1:45PM Seminar Concludes
Agenda, Speakers and Times Subject to Change
For information about joining the WSTA click here
- New York Seminar - Delivering Cybersecurity
- Product Options
# Option Price 1 WSTA Members (Complimentary Admission) $0.00 2 Non Members/Guests $895.00
- Shipping Rate:
The Yale Club of New York City
50 Vanderbilt Avenue
New York, NY