Agenda


 

Innovations in the Field

Through case studies, industry peers will explore a new value proposition that is evolving for the industry that impacts how you design, manage, measure and invest in your security program.

  • “The Art Between Operational Transparency and End-to-End Metrics” Dave Martin, Vice President, Global Threat & Incident Management, ADP

  • “Communicating the Value of Security to The Board & C-Suite” Joel Fulton, PhD, CSO, Splunk

  • “Reimagining Physical Security – An Extreme Makeover” Bob Casey, CSO, Eli Lilly & Co

  • Aligning Security with the Business and Enterprise Risk” John Goldener, Sr. Manager, Enterprise Risk Management, TE Connectivity


A Conversation Examining the Impact of Economic Espionage and Cyber Attacks on American Business

 

An off-the-record discussion with the Director of National Counterintelligence and Security Center, William Evanina, on the current and future risk environment.


Transnational, Organized Crime and Gang Based Criminality: An Exponential Threat

John Lombardi, National Intelligence Manager for Transnational Crime, Office of the Director of National Intelligence (ODNI)

Pablo Pelaez, Europol Senior Representative to the United States

Pedro Rodrigues, Europol Representative to the United States


 

The Opportunities and Risks of Deploying Emerging Technology: Building the Platform for Innovation

Claude Yusti, Partner, Public Sector Watson AI and Data Platform, IBM Global Business Services

Jim Hoffpauir, President, Zenitel USA Building Security and Safety

Tim Palmquist, Vice President Americas, Milestone Systems

Jeff Stanek, President, LenelS2

Ed Bacco, Chief Security Officer, ASG | ADT

We review the constraints and hidden costs from a CSO perspective and begin to shape an executive response to the threat and opportunity of the Uberization of Security.


 

Lessons Learned

Steven Harrold, Division Vice President Global Security, Corning

Carol Haave, Chief Security Officer, Live Nation Entertainment, Inc. 

David McGowan, Vice President Global Protection Services, Tiffany & Co.

John McClurg, Vice President and Ambassador-at-Large, Cylance

A candid discussion by senior executives: the good, the bad and the ugly.


 

The Art between Operational Transparency and End-to-End Metrics

Dave Martin, Vice President, Global Threat & Incident Management, ADP

This case study focuses on the development of a self-service reporting platform to provide a comprehensive operational view of the security portfolio of services and an understanding of the risk posture from the business point of view. Dave Martin includes information and guidance on how to identify, correlate and visualize reliable data and information needed for decision makers to understand risk, determine the value of their security investments, and make it consumable by allowing users to navigate it visually and explore relationships.


 

Communicating the Value of Security to The Board & C-Suite

Joel Fulton, PhD, CISO, Splunk

Providing Board members and the C-Suite with a real world picture of security related issues and valid threats, along with rational solutions to mitigate is critical to the success of the security function. Providing factual data on the value add security provides and the solutions security recommends to counter risk further solidifies the important role security plays within the enterprise. Joel Fulton will provide insights into how to best position security in the minds of the Board and the C-Suite.


Reimagining Physical Security – An Extreme Makeover

Bob Casey, CSO Eli Lilly & Co

Enterprises have evolved, threats have morphed and new risks emerge every day. Security philosophies and methodologies must be transformed to become more agile, flexible and predictive in order to address these ever changing conditions. Bob Casey will share the process he went through to transform his physical security program.


Aligning Security with the Business and Enterprise Risk

 

John Goldener, Sr. Manager, Enterprise Risk Management, TE Connectivity

Security functions either thrive or join the endangered species list… Security functions can thrive, but only if they are properly aligning the security function to the goals, objectives and needs of the business. John Goldener will take you on the journey he embarked upon to effectively align security with the business.