AGENDA-AT-A-GLANCE. Wednesday, October 28 Thursday, October 29 7:00 8:00 am Networking Breakfast 7:00 8:00 am Networking Breakfast
|
|
- Ethelbert Hamilton
- 6 years ago
- Views:
Transcription
1 AGENDA-AT-A-GLANCE Wednesday, October 28 Thursday, October 29 7:00 8:00 am Networking Breakfast 7:00 8:00 am Networking Breakfast 8:00 8:15 am Welcome and Program Overview 8:00 8:10 am Track 1: Global Security Risk Management Alliance Forum 8:15 8:55 am The State of the Electronic 8:10 am 12:00 pm Cyber Security for Physical Physical Security Industry Security Pros 9:00 9:45 am Megatrends: Powered by GSRMA Creating Big Challenges and Greater Opportunities 8:00 8:10 am Track 2: Welcome and Overview of Day 2 8:10 9:00 am Market Trends by the Numbers Seeing Around the Corner: Industry Trends and Evolution 9:45 10:15 am Networking Break 9:00 9:30 am A Look into the Video Surveillance Market 10:15 11:05 am Re-thinking Strategic Priorities: 9:30 10:00 am A Look into the Access Control How Megatrends Will Affect Your Business / Identity Management Market 11:05 11:30 am Networking Break 10:00 10:30 am Networking Break 11:30 am 12:30 pm Safeguarding Corporate Assets Against Cyber Threats: The Executive s Role 10:30 11:45 am Investing Insight: Voices from Wall Street and Private Equity 12:30 1:45 pm Networking Luncheon 11:45 am 12:00 pm Closing Remarks Track 1: Commercial Market Track 2: Residential / Consumer Market 12:00 1:00 pm Networking Luncheon 1:45 2:35 pm Battles, Breaches and Barriers: Inside the Life of a Security Practitioner New Faces, New Places: Evolution in the Residential and Consumer Markets 2:35 3:45 pm Examining Successful and Profitable Relationships between Practitioners and Their Partners 3:45 4:00 pm Networking Break 4:00 5:00 pm Leadership in a Changing Risk Environment 5:00 7:00 pm Networking Reception Follow the Money: RMR, Valuations & Lending Market Leaders Perspective: How Established Companies Stay Nimble and Relevant
2 Millennium Broadway Hotel 145 W 44th St. New York, N.Y Wednesday, October 28 9:00 9:45 am Megatrends: Creating Big Challenges and Greater Opportunities Five megatrend technologies are inevitably pushing their way into today s electronic security landscape. Join Steve Van Till, President and CEO of Brivo Systems, as he outlines how these megatrends are transforming the physical security industry much faster and more deeply than in any previous era, with profound implications for market dynamics, channel structure and the knowledge base required for practitioners. Additionally, ASSA ABLOY will discuss how companies can evaluate trends and technologies impacting the access control side of the industry and offer insights on how meet market challenges and maintain innovative prowess. Presenters: Steven Van Till President & CEO Brivo Systems, LLC Thanasis Molokotos President & CEO ASSA ABLOY Americas Division 10:15 11:05 am Re-thinking Strategic Priorities: How Megatrends Will Affect Your Business Hudson Theatre In this rapid-fire Q&A session, leading practitioners, integrators and manufacturers discuss the long- and short-term implications of megatrends on their companies, how the collisions between them are reshaping their business strategy and tactics, and how they are preparing for the inevitable interactions between these forces to stay ahead of the competition. Moderator: TBD Presenters: Practitioners Mike Rodriguez Director of Security U.S. Open Tennis
3 Jeff Spivey, CRISC, CPP, PSP Founder Security Risk Management, Inc. Integrators Dan Mocer Executive Chairman and Co-Founder Convergint Technologies Integrator #2 TBD Manufacturers Ronald Virden President and General Manager at Lenel, Supra and Onity UTC Building and Industrial Systems Mike O Neal President Nortec Security & Control LLC 11:30 am 12:30 pm Safeguarding Corporate Assets against Cyber Threats: The Executive s Role A 2015 IBM-sponsored study pegged the average cost of a data breach at $3.8 million and malicious attacks as the No. 1 cause of breaches. Legal liability, damage to the company brand, lost business and the costs of remediating the consequences of cyber breaches have elevated cyber threats from a pure technology issue to a larger business risk, garnering the attention of top executives. Learn how executives are proactively addressing cyber threats to minimize loss and ensure business continuity. Moderator: Ken Mills Senior Manager, Global Business Development EMC Presenters: Chris Peckham Senior Vice President, Chief Technology Officer and Special Projects Kratos Public Safety & Security Solutions, Inc. Adam C. Firestone President & General Manager KGSS, Inc. Stephen Scharf Chief Security Officer Depository Trust & Clearing Corporation
4 Brian J. Allen Chief Security Officer Time Warner Cable 1:45 2:35 pm Battles, Breaches and Barriers: Inside the Life of a Security Practitioner With more than 30 years of security management experience in diverse industries, Bonnie Michelman knows about the day-to-day challenges of leading a security operation, from the tactical to the strategic. In this session, she talks candidly about the life and mindset of the security practitioner, from decision making and planning, to how investments and tactical decisions are made and alliances formed. Emphasis will be placed on understanding the practitioners strategy, needs and objectives so that you can position yourself to be a good business partner and asset to their strategic planning. Presenter: Bonnie S. Michelman, CPP, CHPA Director of Police, Security and Outside Services Massachusetts General Hospital 2:35 3:45 pm Examining Successful and Profitable Relationships between Practitioners and Their Partners Security s only role is enabling the business. This concept is at the core of the practitioner s understanding of his/her role. Thus, the right security solution depends on a thorough understanding of the client s needs and business objectives, and the right partner is the one that provides the security tools and expertise that match up with needs. How do you measure up? In this session, manufacturers, integrators and practitioners candidly discuss the factors against which good performance is measured; how to align solutions, services and expertise with customer requirements; and how to deliver exceptional value to your customer. Moderator Raymond Dean Senior Vice President Access Systems Integration Practitioners John Turey Senior Director, Enterprise Risk Management & Global Security TE Connectivity
5 Practitioner #2 TBD Integrators Rich Cillessen Vice President, Sales Siemens Hank Monaco Vice President, Marketing Tyco Integrated Security Manufacturers Tom Cook Vice President, Sales Samsung Anshu Mehrotra Vice President & General Manager, Mechanical Business Allegion, PLC 4:00 5:00 pm Leadership in a Changing Risk Environment The security risk environment is changing at a rapid pace, incorporating threats to the Internet of Things. Are you ready for the future? Just how well is the industry prepared to deal with new technological threats, changing workforce skillsets and needed cooperation within the security industry verticals? Are you sufficiently future focused and positioned to take advantage of or create new opportunities within the changing environment? The traditional models of security have been outpaced by change and inhibit industry growth. Join leading global security practitioners reshaping the role of security within their organizations as they debate what and who will influence the opportunities and challenges ahead. Add your opinions to theirs on how the boundaries of security are being redrawn to create new value and redefine the security industry. Moderator Ray O Hara Executive Vice President AS Solution Presenters Brian Allen Chief Security Officer Time Warner Cable
6 Vish Ganpati Principal Ayer Inc. Tim Williams Chief Security Officer and Director, Information Risk and Enterprise Security Caterpillar, Inc. Thursday, October 29 8:00 am 12:00 pm Cyber Security for Physical Security Pros Brought to you by the Global Security Risk Management Alliance (GSRMA), this unique half-day forum provides a plain English translation of IT security concepts and actions so any Physical Security leader can effectively engage in a discussion of cybersecurity. Buzzwords will be explained and techno-babble demystified, enabling security practitioners to make better business decisions related to technology infrastructure, applications, cloud computing, mobile, big data and social media; explore the benefits of gray hat technologies, such as TOR; and discuss the dark side of attackers, their motives and methods. The forum starts with a foundational explanation of how IT systems work in simple understandable terms and builds on that so attendees can go back to their organizations and start asking smart questions. Participants will be amazed how much their existing security expertise directly relates to the cyber security world. Attendees will receive a set of checklists to use as a reminder of lessons learned. The GSRMA was founded in 2015 to provide a new platform Enterprise Security Risk Management that is focused on the holistic management of both traditional and logical/ cyber security through the use of risk principles. The global enterprise will find this central thesis useful in developing a unified security framework for the governance and management of security-related risk. The GSRMA forum is open to all SNG attendees. Presenter: Dave Cullinane Founder TruSTAR Technology, LLC
Cyber Security 2018: Building Resilience Now and For the Future Mar 1 2, 2018 Ottawa
Agenda and Speakers Cyber Security 2018: Building Resilience Now and For the Future Mar 1 2, 2018 Ottawa Thursday, March 01, 2018 7:30 am Registration and Continental Breakfast 8:00 am Opening Remarks
More informationMoving Your Business Forward
Moving Your Business Forward D.C. METRO AREA JUNE 3 The Ritz-Carlton Tysons Corner NEW YORK CITY SEPTEMBER 18 Millennium Broadway Hotel BOSTON OCTOBER 9 Boston Marriott Cambridge OFFICIAL MEDIA PARTNER
More informationCyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016
Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda 21-22 September 2016 DAY 1: Cyber Intelligence Strategic and Operational Overview 8:30 AM - Coffee Reception
More informationLeading the Digital Transformation from the Centre of Government
37th Meeting of Senior Officials from Centres of Government Leading the Digital Transformation from the Centre of Government Dublin, Ireland, 8-9 November 2018 Agenda 2 GOV/PGC/MPM/A(2018)1/REV1 19.00
More informationLenovo Wants to Tell You Why They Think Different is Better Sammy Kinlaw, Vice President, U.S. SMB and Channel Sales, Lenovo
Wednesday, October 4 12:00 PM 9:00 PM SYNNEX Inspire Conference Registration Desk Open Hyatt Regency, Teal Ballroom Foyer, 2 nd Floor 5:00 PM 6:00 PM Varnex: Member-Only Meeting Hyatt Regency, NOMA ThinkTank,
More informationAwareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB
Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB 2 OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB In today s digital world, safeguarding data, intellectual property, financial
More informationFacing Up to the Challenges
Information Security, Data Breaches and Protecting Cardholder Information: Facing Up to the Challenges SEPTEMBER 13-14, 2006 Account Number PIN Number Social Security Number Social Security Number Information
More informationDynamic Transformation of the Energy Industry JUNE 25-27, 2019 COEUR D ALENE, IDAHO REGISTRATION
9 th ANNUAL A select group of C-suite panelists and key stakeholders will engage participants in dynamic discussion and debate about the transformational change taking place in today s energy industry.
More informationGOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES
GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES INSIGHTS FROM PUBLIC SECTOR IT LEADERS DISCOVER NEW POSSIBILITIES. New network technology is breaking down barriers in government offices, allowing for
More informationMapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective
Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better
More informationThe Fine Art of Creating A Transformational Cyber Security Strategy
SESSION ID: CXO-R11 The Fine Art of Creating A Transformational Cyber Security Strategy Jinan Budge Principal Security & Risk Analyst Forrester Research Andrew Rose Chief Security Officer Vocalink, A Mastercard
More informationBrian S. Dennis Director Cyber Security Center for Small Business Kansas Small Business Development Center
Brian S. Dennis Director Cyber Security Center for Small Business Kansas Small Business Development Center What to expect from today: The ugly truth about planning Why you need a plan that works Where
More informationRIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015
www.pwc.com RIMS Perk Session 2015 - Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015 Los Angeles RIMS Agenda Introductions What is Cybersecurity? Crown jewels The bad
More informationCYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018
CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,
More information2016 SPONSORSHIP OPPORTUNITIES
14 TH ANNUAL ARCHITECTING ENTERPRISE TRANSFORMATION SEPTEMBER 21, 2016 RENAISSANCE WASHINGTON DC DOWNTOWN HOTEL 2016 SPONSORSHIP OPPORTUNITIES One-On-One Access to Government s Enterprise Architects EDUCATION
More informationAngela McKay Director, Government Security Policy and Strategy Microsoft
Angela McKay Director, Government Security Policy and Strategy Microsoft Demographic Trends: Internet Users in 2005.ru.ca.is.uk.nl.be.no.de.pl.ua.us.fr.es.ch.it.eg.il.sa.jo.tr.qa.ae.kz.cn.tw.kr.jp.mx.co.br.pk.th.ph.ng.in.sg.my.ar.id.au
More informationISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015
ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO 27001 FRAMEWORK AUGUST 19, 2015 Agenda Coalfire Overview Threat Landscape What is ISO Why ISO ISO Cycle Q&A 2 Presenters
More informationSteps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m.
Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m. The cyber threats are no longer a question of if, but when, a breach will occur. It is important
More information9 TH SOUTHERN INDIA INFORMATION TECHNOLOGY FAIR (SIITF) THEME : EMERGING TECHNOLOGIES TO CREATE NEWER MARKETS
9 TH SOUTHERN INDIA INFORMATION TECHNOLOGY FAIR (SIITF) THEME : EMERGING TECHNOLOGIES TO CREATE NEWER MARKETS INTRODUCTION Today s business environment is global and highly-interconnected, increasing an
More information2018 MANAGED SECURITY SERVICE PROVIDER (MSSP): BENCHMARK SURVEY Insights That Inform Decision-Making for Retail Industry Outsourcing
2018 MANAGED SECURITY SERVICE PROVIDER (MSSP): BENCHMARK SURVEY Insights That Inform Decision-Making for Retail Industry Outsourcing Powered by the Retail ISAC, A Division of the R-CISC Overview Last October,
More informationWednesday, March 6, 2019
Wednesday, March 6, 2019 7:00 AM REGISTRATION AND BREAKFAST FOR ALL ATTENDEES 8:00 AM CALL TO ORDER, OPENING REMARKS & INTRODUCTIONS 8:30 AM WELCOME MESSAGE & HOST UTILITY HIGHLIGHT 9:30 AM BREAK 9:45
More informationINTELLIGENCE DRIVEN GRC FOR SECURITY
INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to
More informationA Controls Factory Approach To Operationalizing a Cyber Security Program Based on the NIST Cybersecurity Framework
A Controls Factory Approach To Operationalizing a Cyber Security Program Based on the NIST Cybersecurity Framework Prepared by: Larry Wilson lwilson@umassp.edu Chief Information Security Officer University
More informationCybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.
Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. It is crucial that small financial firms take proper cybersecurity measures to protect their customers and their firm. During
More informationLeveraging Existing Customers to Find New Revenue Streams
ChannelCon.org Leveraging Existing Customers to Find New Revenue Streams Session Expediter Colleen Howley Vice President, Business Development Marathon Deployment Presenters Mark DiGregorio Tolt Solutions
More informationWednesday, October 3, 2018
Region 3 Fall Meeting DoubleTree by Hilton Williamsburg, VA October 3-5, 2018 Wednesday, October 3, 2018 Preliminary Agenda 7:00 AM REGISTRATION AND BREAKFAST FOR ALL ATTENDEES 8:00 AM CALL TO ORDER, OPENING
More informationTIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE
TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE Association of Corporate Counsel NYC Chapter 11/1 NYC BDO USA, LLP, a Delaware limited liability partnership,
More information2018 Trends in Hosting & Cloud Managed Services
PREVIEW 2018 Trends in Hosting & Cloud Managed Services DEC 2017 Rory Duncan, Research Director, Managed Services & Hosting Penny Jones, Principal Analyst - MTDC & Managed Services Aaron Sherrill, Senior
More informationNational Cyber Security and Cyber Terrorism Summit
Ottawa Ontario November 12-13 2014 National Cyber Security and Cyber Terrorism Summit SUPPORTERS Developing a Roadmap to Address the Pervasive Growth of Cyber Crime SUPPORTER RATE CARD Background The growing
More informationFUNDAMENTALS OF CYBER SECURITY FOR UTILITIES
COURSE FUNDAMENTALS OF CYBER SECURITY FOR UTILITIES February 21-22, 2018 Millennium Knickerbocker Hotel Chicago, IL RELATED EVENT: FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS February 22-23, 2018
More informationSecurity Program Design:
Security Program Design: A Critical Infrastructure Protection Model Experience, Dedication, and Leadership July 17-18, 2013 Toronto, Ontario CAN in Security EDUCATION Earn up to 16 CPEs Are you confident
More informationGlobal Security Operation Center GSOC
Global Security Operation Center GSOC Best of Breed Opinion Basic requirements for a best in class Global Security Operation Center. CONSULTING AND INVESTIGATIONS DIVISION The Consulting and Investigations
More informationBREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE
BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE 31st Annual SoCal ISSA Security Symposium Wendy T. Wu Vice President Agenda + CISO: Then and Now + Who are the Stakeholders and What Do They Care About?
More informationPublic Sector Cyber Security Series
2018 Staying ahead of evolving threats Public Sector Cyber Security Series program Sydney 10 th September Melbourne 11 th September Canberra 12 th September Brisbane 19 th September Wellington 20 th September
More informationCybersecurity. Securely enabling transformation and change
Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why
More informationOverview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive
More informationCyber Security Congress 2017
Cyber Security Congress 2017 A rich agenda covering both technical and management matters with targeted presentations and hands on workshops. Day 1 Conference Morning Session 8.30 9.00 Registration & Coffee
More informationUTC Region 3 Fall Meeting
UTC Region 3 Fall Meeting Thank You to Our Sponsors a Hytera company DoubleTree by Hilton October 3-5 Williamsburg,VA Region 3 Fall Meeting DoubleTree by Hilton Williamsburg, VA October 3-5, 2018 HOST
More informationRed Hat Investor Open House
Red Hat Investor Open House April 11, 2006 AGENDA 7:30 Welcome & Introduction Dion Cornett & Matthew Szulik 8:15 JBoss Welcome Marc Fleury 9:00 Product Roadmap Tim Yeaton 9:20 Red Hat Brand Chris Grams
More informationCYXTERACON Prospectus APRIL 29 30, 2019 MIAMI, FLORIDA
2019 Prospectus APRIL 29 30, 2019 MIAMI, FLORIDA ACON Infrastructure Cybersecurity Channel Partners CyxteraCon provides a unique opportunity for our users, partners and customers to network while meeting
More informationOperations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ
Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016
More informationOptimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach
White Paper Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach Sponsored by: Red Hat Tim Grieser January 2018 IN THIS WHITE PAPER This IDC White Paper discusses
More informationSan Francisco November 3rd IT ROADMAP Coming to you
moscone west convention center IT ROADMAP 2010 returns TO SAN FRANCISCO! The annual, one-day conference & expo that costs nothing to attend. That s close to home, brings out IT s best and brightest and
More informationIMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES
IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES Introductions Agenda Overall data risk and benefit landscape / shifting risk and opportunity landscape and market expectations Looking at data
More informationDell helps you simplify IT
Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending
More informationPublic Sector Cyber Security Series
2018 Staying ahead of evolving threats Public Sector Cyber Security Series program Sydney 10 th September Melbourne 11 th September Canberra 12 th September Brisbane 19 th September Wellington 20 th September
More informationThe Widening Talent Gap: The greatest security challenge of our time
INFORMATION SECURITY The Widening Talent Gap: The greatest security challenge of our time Presented by: Experis Information Security Practice Thursday, April 14, 2016 General Information Share the webinar
More informationSolutions for a Changing World
Solutions for a Changing World AEIC s 131 st Annual Meeting October 14 16, 2015 The Greenbrier, White Sulphur Springs, WV Itinerary and Business Agenda AEIC 2015 Annual Meeting Itinerary and Business Agenda
More informationElectric Lightwave FAQ
Electric Lightwave FAQ CORPORATE STRUCTURE Q: Why is the Company making these changes? How will these changes impact the corporate structure? Over the past 18 months, Electric Lightwave has built a strong
More informationCyber Security: Exploring the Human Element
Cyber Security: Exploring the Human Element Summary of Proceedings Cyber Security: Exploring the Human Element Institute of Homeland Security Solutions March 8, 2011 National Press Club Introduction A
More informationNetwrix Virtual. Customer Summit 2016
Netwrix Virtual Customer Summit 2016 Welcome Michael Fimin Chief Executive Officer Phone: 1.949.407.5125 x1057 Email: Michael.Fimin@netwrix.com linkedin.com/in/michaelfimin Agenda Michael Fimin Chief Executive
More informationChief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m.
Chief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m. Increased use of technologies such as mobile devices, social media and cloud computing has increased
More informationG7 Bar Associations and Councils
COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat
More informationThe Black Box Institute
The Black Box Institute Enterprise Mobility Management Nov 15, 2016 The Black Box Institute 2016 Our speakers today Maneesh Mehta Malcolm Campbell Co-founder, The Black Box Institute Clients include: Nortel,
More informationWhat Does the Future Look Like for Business Continuity Professionals?
What Does the Future Look Like for Business Continuity Professionals? October 26, 2016 Brian Zawada, FBCI President, US Chapter of the Business Continuity Institute Agenda and Objectives Change Standards
More informationExperience Security, Risk, and Governance
Experience Security, Risk, and Governance Agenda and recommended event path 26 28 March Vienna, Austria Contents 3 Welcome 4 Overview 5 Evening Programs 6 Sessions at-a-glance 11 Digital Transformation
More informationSecurity Force Management:
Security Force Management: Functional Management in Today s Competitive Environment Experience, Dedication, and Leadership June 3-4, 2013 Indianapolis, Indiana in Security EDUCATION Earn up to 19 CPEs
More informationAUSTRALIAN TBM SUMMIT 2015 TBM COUNCIL SYDNEY SHERATON ON THE PARK AUGUST 13, 2015
AUSTRALIAN TBM SUMMIT 2015 TBM COUNCIL SYDNEY SHERATON ON THE PARK AUGUST 13, 2015 TBM COUNCIL OVERVIEW From Facebook to Goldman Sachs and Microsoft to Xerox, the world s most forward-thinking companies
More informationManagement Direction Briefing October 29, 2015 Fujitsu Limited
Management Direction Briefing October 29, 2015 Fujitsu Limited Copyright 2015 FUJITSU LIMITED Market Trend: Accelerating Digitalization Expectations for the delivery of higher-value ICT services Manufacturing
More informationBetter Operational Agility. For more flexible, resilient and secure communications. Vodafone Power to you
Better Operational Agility For more flexible, resilient and secure communications Vodafone Power to you 02 We gained the best value for our money from Vodafone. We reduced management time despite increasing
More informationManaging Cyber Risk. Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust
Managing Cyber Risk Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust Adam Thomas Principal Cyber Risk Services Deloitte & Touche LLP Give Us Your Feedback for this Session!
More informationFUNDAMENTALS OF CYBER SECURITY FOR UTILITIES
COURSE FUNDAMENTALS OF CYBER SECURITY FOR UTILITIES November 13-14, 2018 EUCI Conference Center Denver, CO Furthered my learning regarding cyber security initiatives. Director, CPS Energy RELATED EVENT:
More informationFTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.
FTA 2017 SEATTLE Cybersecurity and the State Tax Threat Environment 1 Agenda Cybersecurity Trends By the Numbers Attack Trends Defensive Trends State and Local Intelligence What Can You Do? 2 2016: Who
More informationSales Presentation Case 2018 Dell EMC
Sales Presentation Case 2018 Dell EMC Introduction: As a member of the Dell Technologies unique family of businesses, Dell EMC serves a key role in providing the essential infrastructure for organizations
More information2nd National MBE Manufacturers Summit 2017
Global Manufacturing Community 2nd National MBE Manufacturers Summit 2017 August 15-16, 2017 Corporate Sponsorship Global Manufacturing Community Providing Opportunities for MBE Manufacturers Nationally
More information4A Healthcare Data Security & Privacy
4A Healthcare Data Security & Privacy Symposium 2015 Banner Program Leaders Ben Goodman Developed in collaboration with Lisa Clark Conference Mission Health and medical regulators are promising audits
More informationBringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016
Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the
More informationM&A Cyber Security Due Diligence
M&A Cyber Security Due Diligence Prepared by: Robert Horton, Ollie Whitehouse & Sherief Hammad Contents Page 1 Introduction 3 2 Technical due diligence goals 3 3 Enabling the business through cyber security
More informationCyber Security and Cyber Fraud
Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa
More informationPONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY
PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY Benchmark research sponsored by Raytheon. Independently conducted by Ponemon Institute LLC. February 2018 2018 Study on
More informationDecember 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development
December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination
More informationThe value of visibility. Cybersecurity risk management examination
The value of visibility Cybersecurity risk management examination Welcome to the "new normal" Cyberattacks are inevitable. In fact, it s no longer a question of if a breach will occur but when. Cybercriminals
More informationCSA Government Cybersecurity Forum
Post Event Report CSA Government Cybersecurity Forum 12 October 2016 Suntec Convention & Exhibition Centre in Singapore CSA Government Cybersecurity Forum The Cloud Security Alliance (CSA) had successfully
More informationData Management and Security in the GDPR Era
Data Management and Security in the GDPR Era Franck Hourdin; Vice President, EMEA Security Russ Lowenthal; Director, Database Security Product Management Mike Turner; Chief Operating Officer, Capgemini
More informationSPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG
SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG THE WORLD S LEADING CYBERSECURITY AND IT SECURITY PROFESSIONAL ORGANIZATION How to face the immense
More informationCyber Security. It s not just about technology. May 2017
Cyber Security It s not just about technology May 2017 Introduction The Internet has opened a new frontier in warfare: everything is networked and anything networked can be hacked. - World Economic Forum
More informationA new approach to Cyber Security
A new approach to Cyber Security Feel Free kpmg.ch We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward.
More informationIBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation
IBM X-Force 2012 & CISO Survey Cyber Security Threat Landscape 1 2012 IBM Corporation IBM X-Force 2011 Trend and Risk Report Highlights The mission of the IBM X-Force research and development team is to:
More informationThe Impact of Privacy on HP s Customer Relationship Management Solution
The Impact of Privacy on HP s Customer Relationship Management Solution Mike Overly Vice President, Marketing hp 2003 Hewlett-Packard Development Company, L.P. The information contained herein is subject
More informationHow Secure is Blockchain? June 6 th, 2017
How Secure is Blockchain? June 6 th, 2017 Before we get started... This is a 60 minute webcast For better viewing experience, close all other applications For better sound quality, please use headphones
More informationIntegrating Cyber Security with Business Continuity Management to Build the Resilient Enterprise
February 11 14, 2018 Gaylord Opryland Resort and Convention Center, Nashville #DRI2018 Integrating Cyber Security with Business Continuity Management to Build the Resilient Enterprise Tejas Katwala CEO
More informationHow to be cyber secure A practical guide for Australia s mid-size business
How to be cyber secure A practical guide for Australia s mid-size business Introduction The digital age has bred opportunity for mid-size business. From ecommerce to social media, agile organisations have
More informationWelcome to the Second Annual Intelligence & National Security Forum
Welcome to the Second Annual Intelligence & National Security Forum Today s Agenda 0800 0900 Registration and Light Breakfast 0900 0910 Opening Remarks Mr. Paul J. Geraci, Senior Director Intelligence
More informationSTANDARD INFORMATION SHARING FORMATS. Will Semple Head of Threat and Vulnerability Management New York Stock Exchange
STANDARD INFORMATION SHARING FORMATS Will Semple Head of Threat and Vulnerability Management New York Stock Exchange AGENDA Information Sharing from the Practitioner s view Changing the focus from Risk
More informationWednesday, September 5, 2018
UTC Regions 1 & 2 Combined Meeting The Essex, Vermont s Culinary Resort & Spa September 5-7, 2018 Burlington, VT Premier Sponsors Gold Sponsors Wednesday, September 5, 2018 11:00 AM 5:00 PM Meeting Registration
More informationAPJ Cisco Partner Executive Exchange
APJ Cisco Partner Executive Exchange May 14-17, 2017 Perth, Australia Agenda Sunday, May 14, 2017 9:00 am 5:00 pm Arrivals & Registration Crown Ballroom 3 Foyer, Lobby Level 7:00 pm 9:00 pm Welcome Reception
More informationGovernment Contracting. Tech-Savvy World. in a. October InterContinental Miami. Miami, Florida
Government Contracting in a Tech-Savvy World October 30-31 2014 InterContinental Miami Miami, Florida 2014 Fall Program Government Contracting in a Tech-Savvy World October 30-31, 2014 InterContinental
More information38th Annual Columbus Chapter Annual Seminar and Exhibits
EDUCATION TECHNOLOGY EXHIBITS NETWORKING Hosted by the Columbus Chapter ASIS this one day event is the areas largest seminar with quality educational sessions and exhibit hall with more that 50 providers
More informationBRING EXPERT TRAINING TO YOUR WORKPLACE.
BRING EXPERT TRAINING TO YOUR WORKPLACE. ISACA s globally respected training and certification programs inspire confidence that enables innovation in the workplace. ISACA s On-Site Training brings a unique
More informationEngaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,
Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager, Deloitte & Touche LLP 1 Speaker Introduction Sanjeev
More informationLeasing Life Conference & Awards 30 th November 2017 Hotel Krasnapolsky Amsterdam, Netherlands
Leasing Life Conference & Awards 30 th November 2017 Hotel Krasnapolsky Amsterdam, Netherlands Leasing Life s conference provides the ideal setting for the industry to come together to discuss its progress
More informationISACA CyberSecurity All Day Event. October 17, 2014
ISACA CyberSecurity All Day Event October 17, 2014 7:30 AM 8:00 AM 8:00 AM 8:15 AM Agenda Registration, Hot Breakfast Buffet and Networking Introductions 8:15 AM 10:00 AM Session 1 Preparing for Cybergeddon:
More informationDesigning and Building a Cybersecurity Program
Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework (CSF) Larry Wilson lwilson@umassp.edu ISACA Breakfast Meeting January, 2016 Designing & Building a Cybersecurity
More informationLes joies et les peines de la transformation numérique
Les joies et les peines de la transformation numérique Georges Ataya CISA, CGEIT, CISA, CISSP, MSCS, PBA Professor, Solvay Brussels School of Economics and Management Academic Director, IT Management Education
More informationDelivering for Customers
Welcome Delivering for Customers While our name may have changed, the company and contracts providing the same high quality services you have come to depend upon us for has not. But now our service comes
More informationRCISC_11014 Prospect Brochure_V3.indd 1
RCISC_11014 Prospect Brochure_V3.indd 1 4/26/18 2:38 PM RICK RAMPOLLA ITDM Security Operations, Publix Super Markets Inc. Intelligence shared through the R-CISC has played a key role in our efforts to
More informationHow to Prepare a Response to Cyber Attack for a Multinational Company.
You Have Been Breached! How to Prepare a Response to Cyber Attack for a Multinational Company. Chayan Chakravarti, MBA, CISM, PMP Patrick Enyart, CISA, CISM, CRISC Presenters Chayan Chakravarti Manager,
More informationHow Your Organization Can Drive Success in the Age of Digital Disruption
How Your Organization Can Drive Success in the Age of Digital Disruption Produced by How Your Organization Can Drive Success in the Age of Digital Disruption Digital success isn t just about technology,
More informationCreating Value from Technology. September 2015
Creating Value from Technology September 2015 Disclaimer 1 Vision Tern acts as a transformational catalyst which applies its expertise and network to create above average returns for its shareholders through
More informationA Controls Factory Approach To Building a Cyber Security Program Based on the NIST Cybersecurity Framework (NCSF)
A Controls Factory Approach To Building a Cyber Security Program Based on the NIST Cybersecurity Framework (NCSF) Prepared by: Larry Wilson lwilson@umassp.edu Chief Information Security Officer University
More information