2015 CSO50 Security Confab + Awards
 

CSO50 Security Confab + Awards Agenda

Sessions at the CSO50 Security Confab + Awards are unlike anything you’ve seen before. Our program of fast-moving, rapid fire presentations delivered by leading security thought leaders demonstrate how forward-thinking organizations are embracing today’s challenges and preparing for the future.

Monday, February 23, 2015
1:30 pm - 6:00 pmRegistration
2:30 pm - 2:40 pmWelcome and Opening Remarks
Bob Bragdon, Publisher, CSO
2:40 pm - 2:58 pmAdapting Key Threat Management Concepts to a Specialized Environment
Ronald Mehring, CISO - Senior Director, Texas Health Resources
2:58 pm - 3:16 pmManaging Governance, Risk and Compliance Internationally, and Across Third Parties
Trina Ford, Director, Third Party Global Assurance, ADP
Daniel Sanchez, Compliance and Continuity Manager, ADP
3:16 pm - 3:36 pmQ&A Panel: Balancing Threat Management, Risk Assessment and Third Parties
Trina Ford, Director, Third Party Global Assurance, ADP
Ronald Mehring, CISO - Senior Director, Texas Health Resources
Moderator: Bob Bragdon, Publisher, CSO
3:36 pm - 3:54 pmTransforming the CSO Role to Business Enabler
Amrit Williams, CTO, CloudPassage
3:54 pm - 4:12 pmExploitation Trends: From Potential Risk to Actual Risk
Tim Rains, Chief Security Advisor, WW Cybersecurity & Data Protection, Microsoft
4:12 pm - 5:20 pmBuilding the Business Case for Better Security: A Moderated Workshop
Bob Bragdon, Publisher, CSO
5:20 pm - 5:50 pmReception sponsored by Skyhigh Networks

Tuesday, February 24, 2015
8:00 am - 7:00 pmRegistration
8:00 am - 9:00 amNetworking Breakfast
9:00 am - 9:05 amOpening Remarks
Bob Bragdon, Publisher, CSO
9:05 am - 9:35 amDetecting Advanced Cyber Threats with Big Data Visualization
Tom Baltis, Deputy Chief Information Security Officer, Blue Cross and Blue Shield of IL, TX, NM, OK, MT
Ray Biondo, Divisional Senior Vice President and CISO, Blue Cross and Blue Shield of IL, TX, NM, OK, MT
Brenda Callaway, Executive Director of Information Security, Blue Cross and Blue Shield of IL, TX, NM, OK, MT
Scott Davidson, Manager, Threat Response, Blue Cross and Blue Shield of IL, TX, NM, OK, MT
Damir Matanic, Senior Manager of IS Threat Response, Blue Cross and Blue Shield of IL, TX, NM, OK, MT
9:35 am - 9:53 amGetting the Most Out of Identity Governance and Administration
Rick Siebenaler, Principal, Cyber Risk Services, Deloitte
9:53 am - 10:11 amShifting the Security Paradigm at The Blackstone Group
Jay Leek, Chief Information Security Officer, Information Technology, The Blackstone Group
10:11 am - 10:29 amWhen Secure File Transfer is Mission Critical
Brian D. Joyce CISSP, GCIH, GCIP, Director, Information Technologies, Elliott Davis Decosimo
10:29 am - 10:59 amNetworking Break
10:59 am - 11:02 amCSO Compass Award Winner Recognition
11:02 am - 11:32 amBuilding Trust in the Cloud
Tim Rains, Chief Security Advisor, WW Cybersecurity & Data Protection, Microsoft
11:32 am - 11:50 amSecurity Information and Event Management with Strict Compliance
Scot Miller, Senior Director, Security Architecture, Health Management Systems
11:50 am - 12:08 pmMaking Dramatic Improvements with a Security Event Management Centre
Jamie Rees, Director of Information Assurance, CISS, Office of the CIO, Government of New Brunswick
12:08 pm - 12:30 pmQ&A Panel: Adopting a Proactive Threat Protection Posture
Scott Davidson, Manager, Threat Response, Blue Cross and Blue Shield of IL, TX, NM, OK, MT
Brian D. Joyce CISSP, GCIH, GCIP, Director, Information Technologies, Elliott Davis Decosimo
Jay Leek, Chief Information Security Officer, Information Technology, The Blackstone Group
Scot Miller, Senior Director, Security Architecture, Health Management Systems
Jamie Rees, Director of Information Assurance, CISS, Office of the CIO, Government of New Brunswick
Moderator: Joan Goodchild, Editor, CSO
12:30 pm - 12:48 pmHow Diageo Protects Their Most Sensitive Information: A Case Study
Stephane Charbonneau, Founder and Chief Technology Officer, TITUS
12:48 pm - 2:00 pmNetworking Lunch with Table Topic Discussions Hosted by Selected CSO50 Honorees
2:00 pm - 2:03 pmCSO Compass Award Winner Recognition
2:03 pm - 2:21 pmMeaningful Security: Battling Cyber Threats with Modern Technology
Greg Schwartzkopf, Director of Systems Engineering, Fortinet
2:21 pm - 2:39 pmMinimizing Risk When Critical Business Apps Face Windows XP End-of-Life
Kevin Carpenter, Associate Director, IT Security, Quintiles
Jerry Fink, Director, IT Security, Quintiles Transnational
2:39 pm - 2:57 pmProtecting Sensitive Data in Motion, at Rest, on Endpoints and in the Cloud
Kallol Ray, Director, National Governance Risk and Compliance, Comcast
2:57 pm - 3:15 pmAgile Security and Compliance at Texas.gov
Tim Virtue, CISO, Texas.gov
3:15 pm - 3:35 pmQ&A Panel: Modern Approaches for Securing Apps and Endpoints
Jerry Fink, Director, IT Security, Quintiles Transnational
Kallol Ray, Director, National Governance Risk and Compliance, Comcast
Tim Virtue, CISO, Texas.gov
Moderator: Joan Goodchild, Editor, CSO
3:35 pm - 3:53 pmA New Approach to Advanced Breach Detection
Steve Karkula, Sr. Director of Product Marketing, Hillstone Networks
3:53 pm - 4:23 pmNetworking Break
4:23 pm - 4:26 pmCSO Compass Award Winner Recognition
4:26 pm - 4:44 pmTake Back the Cloud
Shaun Marion, CISO, Honeywell
Rich Mason, VP & CSO, Honeywell
4:44 pm - 5:02 pmCollaborating While Protecting Intellectual Property and Network Security
Andrea Kirby, Director, Global Collaborations Services, Merck & Co., Inc.
5:02 pm - 5:20 pmProviding Holistic Security Across a Range of Legacy and Acquired Products
David Lenoe, Director of Product Security, Adobe
5:20 pm - 5:38 pmQ&A Panel: Adopting New Strategies for Cloud Security
David Lenoe, Director of Product Security, Adobe
Rich Mason, VP & CSO, Honeywell
John Tryon, Director – Compliance and Risk Management, Merck & Co., Inc.
Moderator: Joan Goodchild, Editor, CSO
5:38 pm - 5:56 pmA CSO's View on Mobile Security: An Executive Interview
Stan Black, CSO, Citrix
Bob Bragdon, Publisher, CSO
6:30 pm - 7:30 pmCSO50 Awards Cocktail and Networking Reception Sponsored by Dell Software(open to all qualified attendees)
7:30 pm - 9:30 pmCSO50 Awards Dinner and Ceremony (open to all qualified attendees)

Wednesday, February 25, 2015
8:00 am - 4:10 pmRegistration
8:00 am - 9:00 amNetworking Breakfast
9:00 am - 9:05 amOpening Remarks
Bob Bragdon, Publisher, CSO
9:05 am - 9:35 amGiving Privacy and Security Training the Hollywood Touch
Alisa Bergman, Chief Privacy Officer, Warner Bros. Entertainment Inc.
9:35 am - 9:53 amHow to Create the Defender’s Advantage
Peter Clay, Chief Information Security Officer, CSG Invotas
9:53 am - 10:11 amSecuring Our Premium VMs
Quinn Shamblin, Executive Director & Information Security Officer, Boston University
10:11 am - 10:29 amLocking Down 10,000 Shared Folders
Donna Fountain, Chief of Staff/Office of the CISO, Voya Financial
10:29 am - 10:59 amRefreshment and Networking Break
10:59 am - 11:29 amCompleting a Five-Year MARS-E Implementation Project in One Year
Douglas Hewes CISSP, CISA, CISM, CISO, South Carolina Health and Human Services
11:29 am - 11:47 amSecure Colorado: The State’s First Cyber Security Strategic Plan
Deborah Blyth, CISO, Colorado Governor's Office of Information Technology
11:47 am - 12:09 pmQ&A Panel: Building Security into IT Infrastructure
Deborah Blyth, CISO, Colorado Governor's Office of Information Technology
Douglas Hewes CISSP, CISA, CISM, CISO, South Carolina Health and Human Services
Jesus 'Laz' Montano, CISO, Voya Financial
Quinn Shamblin, Executive Director & Information Security Officer, Boston University
Moderator: Derek Hulitzky, VP, Content Development, CSO
12:09 pm - 12:27 pmThe Best Cyber Intelligence Money CAN'T Buy
Ken Bell, Director of Strategic Initiatives, CTO Council, Raytheon Cyber Products
12:27 pm - 12:45 pmThe Predictive Revolution
Rich Mason, VP & CSO, Honeywell
12:45 pm - 2:00 pmNetworking Lunch with Table Topic Discussions Hosted by Selected CSO50 Honorees
2:00 pm - 2:18 pmSecurity and Identity/Access Management (IAM): Like Chocolate and Peanut Butter
Jackson Shaw, Senior Director of Product Management, Dell Software
2:18 pm - 2:36 pmBridging the Divide Between Security and Operations Teams
Jonathan Trull, CISO, Qualys
2:36 pm - 2:54 pmPhishing for Clickers
Chris T. Pierson Ph.D., J.D., EVP, General Counsel and Chief Security Officer, Viewpost
2:54 pm - 3:12 pmSafely and Securely Unlocking Social Media
Todd Austin, Security Architect, Blue Cross Blue Shield of North Carolina
3:12 pm - 3:30 pmImproving Customer Financial Security with Transparency
Bob Thompson, SVP, Information Technology, TruStone Financial
3:30 pm - 3:48 pmCreating and Deploying a Successful Physical Security Campaign
Donna Fountain, Chief of Staff/Office of the CISO, Voya Financial
3:48 pm - 4:10 pmQ&A Panel: New Ways to Leverage Security Awareness
Todd Austin, Security Architect, Blue Cross Blue Shield of North Carolina
Jesus 'Laz' Montano, CISO, Voya Financial
Chris T. Pierson Ph.D., J.D., EVP, General Counsel and Chief Security Officer, Viewpost
Bob Thompson, SVP, Information Technology, TruStone Financial
Moderator: Derek Hulitzky, VP, Content Development, CSO
4:10 pmRecap, Takeaways and Closing Remarks
Bob Bragdon, Publisher, CSO