Agenda
Innovations in the Field
Through case studies, industry peers will explore a new value proposition that is evolving for the industry that impacts how you design, manage, measure and invest in your security program.
“The Art Between Operational Transparency and End-to-End Metrics” Dave Martin, Vice President, Global Threat & Incident Management, ADP
“Communicating the Value of Security to The Board & C-Suite” Joel Fulton, PhD, CSO, Splunk
“Reimagining Physical Security – An Extreme Makeover” Bob Casey, CSO, Eli Lilly & Co
“Aligning Security with the Business and Enterprise Risk” John Goldener, Sr. Manager, Enterprise Risk Management, TE Connectivity
A Conversation Examining the Impact of Economic Espionage and Cyber Attacks on American Business
An off-the-record discussion with the Director of National Counterintelligence and Security Center, William Evanina, on the current and future risk environment.
Transnational, Organized Crime and Gang Based Criminality: An Exponential Threat
John Lombardi, National Intelligence Manager for Transnational Crime, Office of the Director of National Intelligence (ODNI)
Pablo Pelaez, Europol Senior Representative to the United States
Pedro Rodrigues, Europol Representative to the United States
The Opportunities and Risks of Deploying Emerging Technology: Building the Platform for Innovation
Claude Yusti, Partner, Public Sector Watson AI and Data Platform, IBM Global Business Services
Jim Hoffpauir, President, Zenitel USA Building Security and Safety
Tim Palmquist, Vice President Americas, Milestone Systems
Jeff Stanek, President, LenelS2
Ed Bacco, Chief Security Officer, ASG | ADT
We review the constraints and hidden costs from a CSO perspective and begin to shape an executive response to the threat and opportunity of the Uberization of Security.
Lessons Learned
Steven Harrold, Division Vice President Global Security, Corning
Carol Haave, Chief Security Officer, Live Nation Entertainment, Inc.
David McGowan, Vice President Global Protection Services, Tiffany & Co.
John McClurg, Vice President and Ambassador-at-Large, Cylance
A candid discussion by senior executives: the good, the bad and the ugly.
The Art between Operational Transparency and End-to-End Metrics
Dave Martin, Vice President, Global Threat & Incident Management, ADP
This case study focuses on the development of a self-service reporting platform to provide a comprehensive operational view of the security portfolio of services and an understanding of the risk posture from the business point of view. Dave Martin includes information and guidance on how to identify, correlate and visualize reliable data and information needed for decision makers to understand risk, determine the value of their security investments, and make it consumable by allowing users to navigate it visually and explore relationships.
Communicating the Value of Security to The Board & C-Suite
Joel Fulton, PhD, CISO, Splunk
Providing Board members and the C-Suite with a real world picture of security related issues and valid threats, along with rational solutions to mitigate is critical to the success of the security function. Providing factual data on the value add security provides and the solutions security recommends to counter risk further solidifies the important role security plays within the enterprise. Joel Fulton will provide insights into how to best position security in the minds of the Board and the C-Suite.
Reimagining Physical Security – An Extreme Makeover
Bob Casey, CSO Eli Lilly & Co
Enterprises have evolved, threats have morphed and new risks emerge every day. Security philosophies and methodologies must be transformed to become more agile, flexible and predictive in order to address these ever changing conditions. Bob Casey will share the process he went through to transform his physical security program.
Aligning Security with the Business and Enterprise Risk
John Goldener, Sr. Manager, Enterprise Risk Management, TE Connectivity
Security functions either thrive or join the endangered species list… Security functions can thrive, but only if they are properly aligning the security function to the goals, objectives and needs of the business. John Goldener will take you on the journey he embarked upon to effectively align security with the business.