AGENDA-AT-A-GLANCE. Wednesday, October 28 Thursday, October 29 7:00 8:00 am Networking Breakfast 7:00 8:00 am Networking Breakfast

Size: px
Start display at page:

Download "AGENDA-AT-A-GLANCE. Wednesday, October 28 Thursday, October 29 7:00 8:00 am Networking Breakfast 7:00 8:00 am Networking Breakfast"

Transcription

1 AGENDA-AT-A-GLANCE Wednesday, October 28 Thursday, October 29 7:00 8:00 am Networking Breakfast 7:00 8:00 am Networking Breakfast 8:00 8:15 am Welcome and Program Overview 8:00 8:10 am Track 1: Global Security Risk Management Alliance Forum 8:15 8:55 am The State of the Electronic 8:10 am 12:00 pm Cyber Security for Physical Physical Security Industry Security Pros 9:00 9:45 am Megatrends: Powered by GSRMA Creating Big Challenges and Greater Opportunities 8:00 8:10 am Track 2: Welcome and Overview of Day 2 8:10 9:00 am Market Trends by the Numbers Seeing Around the Corner: Industry Trends and Evolution 9:45 10:15 am Networking Break 9:00 9:30 am A Look into the Video Surveillance Market 10:15 11:05 am Re-thinking Strategic Priorities: 9:30 10:00 am A Look into the Access Control How Megatrends Will Affect Your Business / Identity Management Market 11:05 11:30 am Networking Break 10:00 10:30 am Networking Break 11:30 am 12:30 pm Safeguarding Corporate Assets Against Cyber Threats: The Executive s Role 10:30 11:45 am Investing Insight: Voices from Wall Street and Private Equity 12:30 1:45 pm Networking Luncheon 11:45 am 12:00 pm Closing Remarks Track 1: Commercial Market Track 2: Residential / Consumer Market 12:00 1:00 pm Networking Luncheon 1:45 2:35 pm Battles, Breaches and Barriers: Inside the Life of a Security Practitioner New Faces, New Places: Evolution in the Residential and Consumer Markets 2:35 3:45 pm Examining Successful and Profitable Relationships between Practitioners and Their Partners 3:45 4:00 pm Networking Break 4:00 5:00 pm Leadership in a Changing Risk Environment 5:00 7:00 pm Networking Reception Follow the Money: RMR, Valuations & Lending Market Leaders Perspective: How Established Companies Stay Nimble and Relevant

2 Millennium Broadway Hotel 145 W 44th St. New York, N.Y Wednesday, October 28 9:00 9:45 am Megatrends: Creating Big Challenges and Greater Opportunities Five megatrend technologies are inevitably pushing their way into today s electronic security landscape. Join Steve Van Till, President and CEO of Brivo Systems, as he outlines how these megatrends are transforming the physical security industry much faster and more deeply than in any previous era, with profound implications for market dynamics, channel structure and the knowledge base required for practitioners. Additionally, ASSA ABLOY will discuss how companies can evaluate trends and technologies impacting the access control side of the industry and offer insights on how meet market challenges and maintain innovative prowess. Presenters: Steven Van Till President & CEO Brivo Systems, LLC Thanasis Molokotos President & CEO ASSA ABLOY Americas Division 10:15 11:05 am Re-thinking Strategic Priorities: How Megatrends Will Affect Your Business Hudson Theatre In this rapid-fire Q&A session, leading practitioners, integrators and manufacturers discuss the long- and short-term implications of megatrends on their companies, how the collisions between them are reshaping their business strategy and tactics, and how they are preparing for the inevitable interactions between these forces to stay ahead of the competition. Moderator: TBD Presenters: Practitioners Mike Rodriguez Director of Security U.S. Open Tennis

3 Jeff Spivey, CRISC, CPP, PSP Founder Security Risk Management, Inc. Integrators Dan Mocer Executive Chairman and Co-Founder Convergint Technologies Integrator #2 TBD Manufacturers Ronald Virden President and General Manager at Lenel, Supra and Onity UTC Building and Industrial Systems Mike O Neal President Nortec Security & Control LLC 11:30 am 12:30 pm Safeguarding Corporate Assets against Cyber Threats: The Executive s Role A 2015 IBM-sponsored study pegged the average cost of a data breach at $3.8 million and malicious attacks as the No. 1 cause of breaches. Legal liability, damage to the company brand, lost business and the costs of remediating the consequences of cyber breaches have elevated cyber threats from a pure technology issue to a larger business risk, garnering the attention of top executives. Learn how executives are proactively addressing cyber threats to minimize loss and ensure business continuity. Moderator: Ken Mills Senior Manager, Global Business Development EMC Presenters: Chris Peckham Senior Vice President, Chief Technology Officer and Special Projects Kratos Public Safety & Security Solutions, Inc. Adam C. Firestone President & General Manager KGSS, Inc. Stephen Scharf Chief Security Officer Depository Trust & Clearing Corporation

4 Brian J. Allen Chief Security Officer Time Warner Cable 1:45 2:35 pm Battles, Breaches and Barriers: Inside the Life of a Security Practitioner With more than 30 years of security management experience in diverse industries, Bonnie Michelman knows about the day-to-day challenges of leading a security operation, from the tactical to the strategic. In this session, she talks candidly about the life and mindset of the security practitioner, from decision making and planning, to how investments and tactical decisions are made and alliances formed. Emphasis will be placed on understanding the practitioners strategy, needs and objectives so that you can position yourself to be a good business partner and asset to their strategic planning. Presenter: Bonnie S. Michelman, CPP, CHPA Director of Police, Security and Outside Services Massachusetts General Hospital 2:35 3:45 pm Examining Successful and Profitable Relationships between Practitioners and Their Partners Security s only role is enabling the business. This concept is at the core of the practitioner s understanding of his/her role. Thus, the right security solution depends on a thorough understanding of the client s needs and business objectives, and the right partner is the one that provides the security tools and expertise that match up with needs. How do you measure up? In this session, manufacturers, integrators and practitioners candidly discuss the factors against which good performance is measured; how to align solutions, services and expertise with customer requirements; and how to deliver exceptional value to your customer. Moderator Raymond Dean Senior Vice President Access Systems Integration Practitioners John Turey Senior Director, Enterprise Risk Management & Global Security TE Connectivity

5 Practitioner #2 TBD Integrators Rich Cillessen Vice President, Sales Siemens Hank Monaco Vice President, Marketing Tyco Integrated Security Manufacturers Tom Cook Vice President, Sales Samsung Anshu Mehrotra Vice President & General Manager, Mechanical Business Allegion, PLC 4:00 5:00 pm Leadership in a Changing Risk Environment The security risk environment is changing at a rapid pace, incorporating threats to the Internet of Things. Are you ready for the future? Just how well is the industry prepared to deal with new technological threats, changing workforce skillsets and needed cooperation within the security industry verticals? Are you sufficiently future focused and positioned to take advantage of or create new opportunities within the changing environment? The traditional models of security have been outpaced by change and inhibit industry growth. Join leading global security practitioners reshaping the role of security within their organizations as they debate what and who will influence the opportunities and challenges ahead. Add your opinions to theirs on how the boundaries of security are being redrawn to create new value and redefine the security industry. Moderator Ray O Hara Executive Vice President AS Solution Presenters Brian Allen Chief Security Officer Time Warner Cable

6 Vish Ganpati Principal Ayer Inc. Tim Williams Chief Security Officer and Director, Information Risk and Enterprise Security Caterpillar, Inc. Thursday, October 29 8:00 am 12:00 pm Cyber Security for Physical Security Pros Brought to you by the Global Security Risk Management Alliance (GSRMA), this unique half-day forum provides a plain English translation of IT security concepts and actions so any Physical Security leader can effectively engage in a discussion of cybersecurity. Buzzwords will be explained and techno-babble demystified, enabling security practitioners to make better business decisions related to technology infrastructure, applications, cloud computing, mobile, big data and social media; explore the benefits of gray hat technologies, such as TOR; and discuss the dark side of attackers, their motives and methods. The forum starts with a foundational explanation of how IT systems work in simple understandable terms and builds on that so attendees can go back to their organizations and start asking smart questions. Participants will be amazed how much their existing security expertise directly relates to the cyber security world. Attendees will receive a set of checklists to use as a reminder of lessons learned. The GSRMA was founded in 2015 to provide a new platform Enterprise Security Risk Management that is focused on the holistic management of both traditional and logical/ cyber security through the use of risk principles. The global enterprise will find this central thesis useful in developing a unified security framework for the governance and management of security-related risk. The GSRMA forum is open to all SNG attendees. Presenter: Dave Cullinane Founder TruSTAR Technology, LLC

Cyber Security 2018: Building Resilience Now and For the Future Mar 1 2, 2018 Ottawa

Cyber Security 2018: Building Resilience Now and For the Future Mar 1 2, 2018 Ottawa Agenda and Speakers Cyber Security 2018: Building Resilience Now and For the Future Mar 1 2, 2018 Ottawa Thursday, March 01, 2018 7:30 am Registration and Continental Breakfast 8:00 am Opening Remarks

More information

Moving Your Business Forward

Moving Your Business Forward Moving Your Business Forward D.C. METRO AREA JUNE 3 The Ritz-Carlton Tysons Corner NEW YORK CITY SEPTEMBER 18 Millennium Broadway Hotel BOSTON OCTOBER 9 Boston Marriott Cambridge OFFICIAL MEDIA PARTNER

More information

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016 Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda 21-22 September 2016 DAY 1: Cyber Intelligence Strategic and Operational Overview 8:30 AM - Coffee Reception

More information

Leading the Digital Transformation from the Centre of Government

Leading the Digital Transformation from the Centre of Government 37th Meeting of Senior Officials from Centres of Government Leading the Digital Transformation from the Centre of Government Dublin, Ireland, 8-9 November 2018 Agenda 2 GOV/PGC/MPM/A(2018)1/REV1 19.00

More information

Lenovo Wants to Tell You Why They Think Different is Better Sammy Kinlaw, Vice President, U.S. SMB and Channel Sales, Lenovo

Lenovo Wants to Tell You Why They Think Different is Better Sammy Kinlaw, Vice President, U.S. SMB and Channel Sales, Lenovo Wednesday, October 4 12:00 PM 9:00 PM SYNNEX Inspire Conference Registration Desk Open Hyatt Regency, Teal Ballroom Foyer, 2 nd Floor 5:00 PM 6:00 PM Varnex: Member-Only Meeting Hyatt Regency, NOMA ThinkTank,

More information

Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB

Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB 2 OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB In today s digital world, safeguarding data, intellectual property, financial

More information

Facing Up to the Challenges

Facing Up to the Challenges Information Security, Data Breaches and Protecting Cardholder Information: Facing Up to the Challenges SEPTEMBER 13-14, 2006 Account Number PIN Number Social Security Number Social Security Number Information

More information

Dynamic Transformation of the Energy Industry JUNE 25-27, 2019 COEUR D ALENE, IDAHO REGISTRATION

Dynamic Transformation of the Energy Industry JUNE 25-27, 2019 COEUR D ALENE, IDAHO REGISTRATION 9 th ANNUAL A select group of C-suite panelists and key stakeholders will engage participants in dynamic discussion and debate about the transformational change taking place in today s energy industry.

More information

GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES

GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES INSIGHTS FROM PUBLIC SECTOR IT LEADERS DISCOVER NEW POSSIBILITIES. New network technology is breaking down barriers in government offices, allowing for

More information

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better

More information

The Fine Art of Creating A Transformational Cyber Security Strategy

The Fine Art of Creating A Transformational Cyber Security Strategy SESSION ID: CXO-R11 The Fine Art of Creating A Transformational Cyber Security Strategy Jinan Budge Principal Security & Risk Analyst Forrester Research Andrew Rose Chief Security Officer Vocalink, A Mastercard

More information

Brian S. Dennis Director Cyber Security Center for Small Business Kansas Small Business Development Center

Brian S. Dennis Director Cyber Security Center for Small Business Kansas Small Business Development Center Brian S. Dennis Director Cyber Security Center for Small Business Kansas Small Business Development Center What to expect from today: The ugly truth about planning Why you need a plan that works Where

More information

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015 www.pwc.com RIMS Perk Session 2015 - Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015 Los Angeles RIMS Agenda Introductions What is Cybersecurity? Crown jewels The bad

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

2016 SPONSORSHIP OPPORTUNITIES

2016 SPONSORSHIP OPPORTUNITIES 14 TH ANNUAL ARCHITECTING ENTERPRISE TRANSFORMATION SEPTEMBER 21, 2016 RENAISSANCE WASHINGTON DC DOWNTOWN HOTEL 2016 SPONSORSHIP OPPORTUNITIES One-On-One Access to Government s Enterprise Architects EDUCATION

More information

Angela McKay Director, Government Security Policy and Strategy Microsoft

Angela McKay Director, Government Security Policy and Strategy Microsoft Angela McKay Director, Government Security Policy and Strategy Microsoft Demographic Trends: Internet Users in 2005.ru.ca.is.uk.nl.be.no.de.pl.ua.us.fr.es.ch.it.eg.il.sa.jo.tr.qa.ae.kz.cn.tw.kr.jp.mx.co.br.pk.th.ph.ng.in.sg.my.ar.id.au

More information

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015 ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO 27001 FRAMEWORK AUGUST 19, 2015 Agenda Coalfire Overview Threat Landscape What is ISO Why ISO ISO Cycle Q&A 2 Presenters

More information

Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m.

Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m. Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m. The cyber threats are no longer a question of if, but when, a breach will occur. It is important

More information

9 TH SOUTHERN INDIA INFORMATION TECHNOLOGY FAIR (SIITF) THEME : EMERGING TECHNOLOGIES TO CREATE NEWER MARKETS

9 TH SOUTHERN INDIA INFORMATION TECHNOLOGY FAIR (SIITF) THEME : EMERGING TECHNOLOGIES TO CREATE NEWER MARKETS 9 TH SOUTHERN INDIA INFORMATION TECHNOLOGY FAIR (SIITF) THEME : EMERGING TECHNOLOGIES TO CREATE NEWER MARKETS INTRODUCTION Today s business environment is global and highly-interconnected, increasing an

More information

2018 MANAGED SECURITY SERVICE PROVIDER (MSSP): BENCHMARK SURVEY Insights That Inform Decision-Making for Retail Industry Outsourcing

2018 MANAGED SECURITY SERVICE PROVIDER (MSSP): BENCHMARK SURVEY Insights That Inform Decision-Making for Retail Industry Outsourcing 2018 MANAGED SECURITY SERVICE PROVIDER (MSSP): BENCHMARK SURVEY Insights That Inform Decision-Making for Retail Industry Outsourcing Powered by the Retail ISAC, A Division of the R-CISC Overview Last October,

More information

Wednesday, March 6, 2019

Wednesday, March 6, 2019 Wednesday, March 6, 2019 7:00 AM REGISTRATION AND BREAKFAST FOR ALL ATTENDEES 8:00 AM CALL TO ORDER, OPENING REMARKS & INTRODUCTIONS 8:30 AM WELCOME MESSAGE & HOST UTILITY HIGHLIGHT 9:30 AM BREAK 9:45

More information

INTELLIGENCE DRIVEN GRC FOR SECURITY

INTELLIGENCE DRIVEN GRC FOR SECURITY INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to

More information

A Controls Factory Approach To Operationalizing a Cyber Security Program Based on the NIST Cybersecurity Framework

A Controls Factory Approach To Operationalizing a Cyber Security Program Based on the NIST Cybersecurity Framework A Controls Factory Approach To Operationalizing a Cyber Security Program Based on the NIST Cybersecurity Framework Prepared by: Larry Wilson lwilson@umassp.edu Chief Information Security Officer University

More information

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. It is crucial that small financial firms take proper cybersecurity measures to protect their customers and their firm. During

More information

Leveraging Existing Customers to Find New Revenue Streams

Leveraging Existing Customers to Find New Revenue Streams ChannelCon.org Leveraging Existing Customers to Find New Revenue Streams Session Expediter Colleen Howley Vice President, Business Development Marathon Deployment Presenters Mark DiGregorio Tolt Solutions

More information

Wednesday, October 3, 2018

Wednesday, October 3, 2018 Region 3 Fall Meeting DoubleTree by Hilton Williamsburg, VA October 3-5, 2018 Wednesday, October 3, 2018 Preliminary Agenda 7:00 AM REGISTRATION AND BREAKFAST FOR ALL ATTENDEES 8:00 AM CALL TO ORDER, OPENING

More information

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE Association of Corporate Counsel NYC Chapter 11/1 NYC BDO USA, LLP, a Delaware limited liability partnership,

More information

2018 Trends in Hosting & Cloud Managed Services

2018 Trends in Hosting & Cloud Managed Services PREVIEW 2018 Trends in Hosting & Cloud Managed Services DEC 2017 Rory Duncan, Research Director, Managed Services & Hosting Penny Jones, Principal Analyst - MTDC & Managed Services Aaron Sherrill, Senior

More information

National Cyber Security and Cyber Terrorism Summit

National Cyber Security and Cyber Terrorism Summit Ottawa Ontario November 12-13 2014 National Cyber Security and Cyber Terrorism Summit SUPPORTERS Developing a Roadmap to Address the Pervasive Growth of Cyber Crime SUPPORTER RATE CARD Background The growing

More information

FUNDAMENTALS OF CYBER SECURITY FOR UTILITIES

FUNDAMENTALS OF CYBER SECURITY FOR UTILITIES COURSE FUNDAMENTALS OF CYBER SECURITY FOR UTILITIES February 21-22, 2018 Millennium Knickerbocker Hotel Chicago, IL RELATED EVENT: FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS February 22-23, 2018

More information

Security Program Design:

Security Program Design: Security Program Design: A Critical Infrastructure Protection Model Experience, Dedication, and Leadership July 17-18, 2013 Toronto, Ontario CAN in Security EDUCATION Earn up to 16 CPEs Are you confident

More information

Global Security Operation Center GSOC

Global Security Operation Center GSOC Global Security Operation Center GSOC Best of Breed Opinion Basic requirements for a best in class Global Security Operation Center. CONSULTING AND INVESTIGATIONS DIVISION The Consulting and Investigations

More information

BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE

BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE 31st Annual SoCal ISSA Security Symposium Wendy T. Wu Vice President Agenda + CISO: Then and Now + Who are the Stakeholders and What Do They Care About?

More information

Public Sector Cyber Security Series

Public Sector Cyber Security Series 2018 Staying ahead of evolving threats Public Sector Cyber Security Series program Sydney 10 th September Melbourne 11 th September Canberra 12 th September Brisbane 19 th September Wellington 20 th September

More information

Cybersecurity. Securely enabling transformation and change

Cybersecurity. Securely enabling transformation and change Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why

More information

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive

More information

Cyber Security Congress 2017

Cyber Security Congress 2017 Cyber Security Congress 2017 A rich agenda covering both technical and management matters with targeted presentations and hands on workshops. Day 1 Conference Morning Session 8.30 9.00 Registration & Coffee

More information

UTC Region 3 Fall Meeting

UTC Region 3 Fall Meeting UTC Region 3 Fall Meeting Thank You to Our Sponsors a Hytera company DoubleTree by Hilton October 3-5 Williamsburg,VA Region 3 Fall Meeting DoubleTree by Hilton Williamsburg, VA October 3-5, 2018 HOST

More information

Red Hat Investor Open House

Red Hat Investor Open House Red Hat Investor Open House April 11, 2006 AGENDA 7:30 Welcome & Introduction Dion Cornett & Matthew Szulik 8:15 JBoss Welcome Marc Fleury 9:00 Product Roadmap Tim Yeaton 9:20 Red Hat Brand Chris Grams

More information

CYXTERACON Prospectus APRIL 29 30, 2019 MIAMI, FLORIDA

CYXTERACON Prospectus APRIL 29 30, 2019 MIAMI, FLORIDA 2019 Prospectus APRIL 29 30, 2019 MIAMI, FLORIDA ACON Infrastructure Cybersecurity Channel Partners CyxteraCon provides a unique opportunity for our users, partners and customers to network while meeting

More information

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016

More information

Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach

Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach White Paper Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach Sponsored by: Red Hat Tim Grieser January 2018 IN THIS WHITE PAPER This IDC White Paper discusses

More information

San Francisco November 3rd IT ROADMAP Coming to you

San Francisco November 3rd IT ROADMAP Coming to you moscone west convention center IT ROADMAP 2010 returns TO SAN FRANCISCO! The annual, one-day conference & expo that costs nothing to attend. That s close to home, brings out IT s best and brightest and

More information

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES Introductions Agenda Overall data risk and benefit landscape / shifting risk and opportunity landscape and market expectations Looking at data

More information

Dell helps you simplify IT

Dell helps you simplify IT Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending

More information

Public Sector Cyber Security Series

Public Sector Cyber Security Series 2018 Staying ahead of evolving threats Public Sector Cyber Security Series program Sydney 10 th September Melbourne 11 th September Canberra 12 th September Brisbane 19 th September Wellington 20 th September

More information

The Widening Talent Gap: The greatest security challenge of our time

The Widening Talent Gap: The greatest security challenge of our time INFORMATION SECURITY The Widening Talent Gap: The greatest security challenge of our time Presented by: Experis Information Security Practice Thursday, April 14, 2016 General Information Share the webinar

More information

Solutions for a Changing World

Solutions for a Changing World Solutions for a Changing World AEIC s 131 st Annual Meeting October 14 16, 2015 The Greenbrier, White Sulphur Springs, WV Itinerary and Business Agenda AEIC 2015 Annual Meeting Itinerary and Business Agenda

More information

Electric Lightwave FAQ

Electric Lightwave FAQ Electric Lightwave FAQ CORPORATE STRUCTURE Q: Why is the Company making these changes? How will these changes impact the corporate structure? Over the past 18 months, Electric Lightwave has built a strong

More information

Cyber Security: Exploring the Human Element

Cyber Security: Exploring the Human Element Cyber Security: Exploring the Human Element Summary of Proceedings Cyber Security: Exploring the Human Element Institute of Homeland Security Solutions March 8, 2011 National Press Club Introduction A

More information

Netwrix Virtual. Customer Summit 2016

Netwrix Virtual. Customer Summit 2016 Netwrix Virtual Customer Summit 2016 Welcome Michael Fimin Chief Executive Officer Phone: 1.949.407.5125 x1057 Email: Michael.Fimin@netwrix.com linkedin.com/in/michaelfimin Agenda Michael Fimin Chief Executive

More information

Chief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m.

Chief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m. Chief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m. Increased use of technologies such as mobile devices, social media and cloud computing has increased

More information

G7 Bar Associations and Councils

G7 Bar Associations and Councils COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat

More information

The Black Box Institute

The Black Box Institute The Black Box Institute Enterprise Mobility Management Nov 15, 2016 The Black Box Institute 2016 Our speakers today Maneesh Mehta Malcolm Campbell Co-founder, The Black Box Institute Clients include: Nortel,

More information

What Does the Future Look Like for Business Continuity Professionals?

What Does the Future Look Like for Business Continuity Professionals? What Does the Future Look Like for Business Continuity Professionals? October 26, 2016 Brian Zawada, FBCI President, US Chapter of the Business Continuity Institute Agenda and Objectives Change Standards

More information

Experience Security, Risk, and Governance

Experience Security, Risk, and Governance Experience Security, Risk, and Governance Agenda and recommended event path 26 28 March Vienna, Austria Contents 3 Welcome 4 Overview 5 Evening Programs 6 Sessions at-a-glance 11 Digital Transformation

More information

Security Force Management:

Security Force Management: Security Force Management: Functional Management in Today s Competitive Environment Experience, Dedication, and Leadership June 3-4, 2013 Indianapolis, Indiana in Security EDUCATION Earn up to 19 CPEs

More information

AUSTRALIAN TBM SUMMIT 2015 TBM COUNCIL SYDNEY SHERATON ON THE PARK AUGUST 13, 2015

AUSTRALIAN TBM SUMMIT 2015 TBM COUNCIL SYDNEY SHERATON ON THE PARK AUGUST 13, 2015 AUSTRALIAN TBM SUMMIT 2015 TBM COUNCIL SYDNEY SHERATON ON THE PARK AUGUST 13, 2015 TBM COUNCIL OVERVIEW From Facebook to Goldman Sachs and Microsoft to Xerox, the world s most forward-thinking companies

More information

Management Direction Briefing October 29, 2015 Fujitsu Limited

Management Direction Briefing October 29, 2015 Fujitsu Limited Management Direction Briefing October 29, 2015 Fujitsu Limited Copyright 2015 FUJITSU LIMITED Market Trend: Accelerating Digitalization Expectations for the delivery of higher-value ICT services Manufacturing

More information

Better Operational Agility. For more flexible, resilient and secure communications. Vodafone Power to you

Better Operational Agility. For more flexible, resilient and secure communications. Vodafone Power to you Better Operational Agility For more flexible, resilient and secure communications Vodafone Power to you 02 We gained the best value for our money from Vodafone. We reduced management time despite increasing

More information

Managing Cyber Risk. Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust

Managing Cyber Risk. Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust Managing Cyber Risk Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust Adam Thomas Principal Cyber Risk Services Deloitte & Touche LLP Give Us Your Feedback for this Session!

More information

FUNDAMENTALS OF CYBER SECURITY FOR UTILITIES

FUNDAMENTALS OF CYBER SECURITY FOR UTILITIES COURSE FUNDAMENTALS OF CYBER SECURITY FOR UTILITIES November 13-14, 2018 EUCI Conference Center Denver, CO Furthered my learning regarding cyber security initiatives. Director, CPS Energy RELATED EVENT:

More information

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved. FTA 2017 SEATTLE Cybersecurity and the State Tax Threat Environment 1 Agenda Cybersecurity Trends By the Numbers Attack Trends Defensive Trends State and Local Intelligence What Can You Do? 2 2016: Who

More information

Sales Presentation Case 2018 Dell EMC

Sales Presentation Case 2018 Dell EMC Sales Presentation Case 2018 Dell EMC Introduction: As a member of the Dell Technologies unique family of businesses, Dell EMC serves a key role in providing the essential infrastructure for organizations

More information

2nd National MBE Manufacturers Summit 2017

2nd National MBE Manufacturers Summit 2017 Global Manufacturing Community 2nd National MBE Manufacturers Summit 2017 August 15-16, 2017 Corporate Sponsorship Global Manufacturing Community Providing Opportunities for MBE Manufacturers Nationally

More information

4A Healthcare Data Security & Privacy

4A Healthcare Data Security & Privacy 4A Healthcare Data Security & Privacy Symposium 2015 Banner Program Leaders Ben Goodman Developed in collaboration with Lisa Clark Conference Mission Health and medical regulators are promising audits

More information

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016 Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the

More information

M&A Cyber Security Due Diligence

M&A Cyber Security Due Diligence M&A Cyber Security Due Diligence Prepared by: Robert Horton, Ollie Whitehouse & Sherief Hammad Contents Page 1 Introduction 3 2 Technical due diligence goals 3 3 Enabling the business through cyber security

More information

Cyber Security and Cyber Fraud

Cyber Security and Cyber Fraud Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa

More information

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY Benchmark research sponsored by Raytheon. Independently conducted by Ponemon Institute LLC. February 2018 2018 Study on

More information

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination

More information

The value of visibility. Cybersecurity risk management examination

The value of visibility. Cybersecurity risk management examination The value of visibility Cybersecurity risk management examination Welcome to the "new normal" Cyberattacks are inevitable. In fact, it s no longer a question of if a breach will occur but when. Cybercriminals

More information

CSA Government Cybersecurity Forum

CSA Government Cybersecurity Forum Post Event Report CSA Government Cybersecurity Forum 12 October 2016 Suntec Convention & Exhibition Centre in Singapore CSA Government Cybersecurity Forum The Cloud Security Alliance (CSA) had successfully

More information

Data Management and Security in the GDPR Era

Data Management and Security in the GDPR Era Data Management and Security in the GDPR Era Franck Hourdin; Vice President, EMEA Security Russ Lowenthal; Director, Database Security Product Management Mike Turner; Chief Operating Officer, Capgemini

More information

SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG

SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG THE WORLD S LEADING CYBERSECURITY AND IT SECURITY PROFESSIONAL ORGANIZATION How to face the immense

More information

Cyber Security. It s not just about technology. May 2017

Cyber Security. It s not just about technology. May 2017 Cyber Security It s not just about technology May 2017 Introduction The Internet has opened a new frontier in warfare: everything is networked and anything networked can be hacked. - World Economic Forum

More information

A new approach to Cyber Security

A new approach to Cyber Security A new approach to Cyber Security Feel Free kpmg.ch We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward.

More information

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation IBM X-Force 2012 & CISO Survey Cyber Security Threat Landscape 1 2012 IBM Corporation IBM X-Force 2011 Trend and Risk Report Highlights The mission of the IBM X-Force research and development team is to:

More information

The Impact of Privacy on HP s Customer Relationship Management Solution

The Impact of Privacy on HP s Customer Relationship Management Solution The Impact of Privacy on HP s Customer Relationship Management Solution Mike Overly Vice President, Marketing hp 2003 Hewlett-Packard Development Company, L.P. The information contained herein is subject

More information

How Secure is Blockchain? June 6 th, 2017

How Secure is Blockchain? June 6 th, 2017 How Secure is Blockchain? June 6 th, 2017 Before we get started... This is a 60 minute webcast For better viewing experience, close all other applications For better sound quality, please use headphones

More information

Integrating Cyber Security with Business Continuity Management to Build the Resilient Enterprise

Integrating Cyber Security with Business Continuity Management to Build the Resilient Enterprise February 11 14, 2018 Gaylord Opryland Resort and Convention Center, Nashville #DRI2018 Integrating Cyber Security with Business Continuity Management to Build the Resilient Enterprise Tejas Katwala CEO

More information

How to be cyber secure A practical guide for Australia s mid-size business

How to be cyber secure A practical guide for Australia s mid-size business How to be cyber secure A practical guide for Australia s mid-size business Introduction The digital age has bred opportunity for mid-size business. From ecommerce to social media, agile organisations have

More information

Welcome to the Second Annual Intelligence & National Security Forum

Welcome to the Second Annual Intelligence & National Security Forum Welcome to the Second Annual Intelligence & National Security Forum Today s Agenda 0800 0900 Registration and Light Breakfast 0900 0910 Opening Remarks Mr. Paul J. Geraci, Senior Director Intelligence

More information

STANDARD INFORMATION SHARING FORMATS. Will Semple Head of Threat and Vulnerability Management New York Stock Exchange

STANDARD INFORMATION SHARING FORMATS. Will Semple Head of Threat and Vulnerability Management New York Stock Exchange STANDARD INFORMATION SHARING FORMATS Will Semple Head of Threat and Vulnerability Management New York Stock Exchange AGENDA Information Sharing from the Practitioner s view Changing the focus from Risk

More information

Wednesday, September 5, 2018

Wednesday, September 5, 2018 UTC Regions 1 & 2 Combined Meeting The Essex, Vermont s Culinary Resort & Spa September 5-7, 2018 Burlington, VT Premier Sponsors Gold Sponsors Wednesday, September 5, 2018 11:00 AM 5:00 PM Meeting Registration

More information

APJ Cisco Partner Executive Exchange

APJ Cisco Partner Executive Exchange APJ Cisco Partner Executive Exchange May 14-17, 2017 Perth, Australia Agenda Sunday, May 14, 2017 9:00 am 5:00 pm Arrivals & Registration Crown Ballroom 3 Foyer, Lobby Level 7:00 pm 9:00 pm Welcome Reception

More information

Government Contracting. Tech-Savvy World. in a. October InterContinental Miami. Miami, Florida

Government Contracting. Tech-Savvy World. in a. October InterContinental Miami. Miami, Florida Government Contracting in a Tech-Savvy World October 30-31 2014 InterContinental Miami Miami, Florida 2014 Fall Program Government Contracting in a Tech-Savvy World October 30-31, 2014 InterContinental

More information

38th Annual Columbus Chapter Annual Seminar and Exhibits

38th Annual Columbus Chapter Annual Seminar and Exhibits EDUCATION TECHNOLOGY EXHIBITS NETWORKING Hosted by the Columbus Chapter ASIS this one day event is the areas largest seminar with quality educational sessions and exhibit hall with more that 50 providers

More information

BRING EXPERT TRAINING TO YOUR WORKPLACE.

BRING EXPERT TRAINING TO YOUR WORKPLACE. BRING EXPERT TRAINING TO YOUR WORKPLACE. ISACA s globally respected training and certification programs inspire confidence that enables innovation in the workplace. ISACA s On-Site Training brings a unique

More information

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager, Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager, Deloitte & Touche LLP 1 Speaker Introduction Sanjeev

More information

Leasing Life Conference & Awards 30 th November 2017 Hotel Krasnapolsky Amsterdam, Netherlands

Leasing Life Conference & Awards 30 th November 2017 Hotel Krasnapolsky Amsterdam, Netherlands Leasing Life Conference & Awards 30 th November 2017 Hotel Krasnapolsky Amsterdam, Netherlands Leasing Life s conference provides the ideal setting for the industry to come together to discuss its progress

More information

ISACA CyberSecurity All Day Event. October 17, 2014

ISACA CyberSecurity All Day Event. October 17, 2014 ISACA CyberSecurity All Day Event October 17, 2014 7:30 AM 8:00 AM 8:00 AM 8:15 AM Agenda Registration, Hot Breakfast Buffet and Networking Introductions 8:15 AM 10:00 AM Session 1 Preparing for Cybergeddon:

More information

Designing and Building a Cybersecurity Program

Designing and Building a Cybersecurity Program Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework (CSF) Larry Wilson lwilson@umassp.edu ISACA Breakfast Meeting January, 2016 Designing & Building a Cybersecurity

More information

Les joies et les peines de la transformation numérique

Les joies et les peines de la transformation numérique Les joies et les peines de la transformation numérique Georges Ataya CISA, CGEIT, CISA, CISSP, MSCS, PBA Professor, Solvay Brussels School of Economics and Management Academic Director, IT Management Education

More information

Delivering for Customers

Delivering for Customers Welcome Delivering for Customers While our name may have changed, the company and contracts providing the same high quality services you have come to depend upon us for has not. But now our service comes

More information

RCISC_11014 Prospect Brochure_V3.indd 1

RCISC_11014 Prospect Brochure_V3.indd 1 RCISC_11014 Prospect Brochure_V3.indd 1 4/26/18 2:38 PM RICK RAMPOLLA ITDM Security Operations, Publix Super Markets Inc. Intelligence shared through the R-CISC has played a key role in our efforts to

More information

How to Prepare a Response to Cyber Attack for a Multinational Company.

How to Prepare a Response to Cyber Attack for a Multinational Company. You Have Been Breached! How to Prepare a Response to Cyber Attack for a Multinational Company. Chayan Chakravarti, MBA, CISM, PMP Patrick Enyart, CISA, CISM, CRISC Presenters Chayan Chakravarti Manager,

More information

How Your Organization Can Drive Success in the Age of Digital Disruption

How Your Organization Can Drive Success in the Age of Digital Disruption How Your Organization Can Drive Success in the Age of Digital Disruption Produced by How Your Organization Can Drive Success in the Age of Digital Disruption Digital success isn t just about technology,

More information

Creating Value from Technology. September 2015

Creating Value from Technology. September 2015 Creating Value from Technology September 2015 Disclaimer 1 Vision Tern acts as a transformational catalyst which applies its expertise and network to create above average returns for its shareholders through

More information

A Controls Factory Approach To Building a Cyber Security Program Based on the NIST Cybersecurity Framework (NCSF)

A Controls Factory Approach To Building a Cyber Security Program Based on the NIST Cybersecurity Framework (NCSF) A Controls Factory Approach To Building a Cyber Security Program Based on the NIST Cybersecurity Framework (NCSF) Prepared by: Larry Wilson lwilson@umassp.edu Chief Information Security Officer University

More information