CISO New Jersey Summit | October 10, 2017 | Hilton Meadowlands - East Rutherford, NJ, USA

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Tuesday, October 10, 2017 - CISO New Jersey Summit

7:00 am - 7:55 am

Registration and Networking Breakfast

 

8:00 am - 8:10 am

Welcome Address and Opening Remarks

 

8:10 am - 8:40 am

Keynote Presentation

Addressing Privacy on a Global Scale

Of all the risk management issues that present themselves to the modern-day CISO, perhaps the most difficult to address is that of privacy. In and of itself, privacy is no different a challenge than protecting any other sensitive information, however the multi-jurisdictional impacts of the issue due to wildly differing laws between the US and European countries (as well as Canada, another country with strong privacy laws) make this an issue that is often times overwhelming to address. CISOs must work diligently to ensure that their privacy efforts conform with the standards of any jurisdiction with which they might work, where their data might be held and this is an almost overwhelming task.

Takeaways:

  • Privacy is one of the most challenging issues for any business and CISO to address
  • The difference in regulations between and among European countries (both those in and out of the EU itself) and North American ones means traversing a fraught landscape
  • A strong approach to privacy that addresses global differences is essential to being a stable and viable global business

Presented by:

Roland Cloutier, CISO, ADP View details

 
 
 

8:45 am - 9:15 am

Keynote Presentation

TBC


Sponsored by:

IBM View details

 
 
 

9:20 am - 9:45 am

Executive Exchange

 

Share:

Thought Leadership

Become a Change Agent for Business Transformation

Today's modern CIO is embarking on a digital transformation journey exploring radical hybrid IT strategies and leveraging new technologies like Cloud, Social, Mobile and Big Data. However, with 'keeping the lights on' legacy IT components costing nearly 90% of a typical IT budget, how can IT make powerful advancements and lead business change? 

Join this interactive session to learn how award-winning CIOs are successfully tipping the balance by liberating people, time and money from costly ongoing maintenance of their ERP systems including SAP and Oracle, to invest in strategic initiatives that create real-world competitive advantage.

Sponsored by: Rimini Street

 

9:50 am - 10:15 am

Executive Exchange

 

Thought Leadership

Identity and the New Age of Enterprise Security

From a technology standpoint, as a society the world of business has gone through two distinct stages in the evolution of its information security focus. The first addressed network based protection and preventative controls such as firewalls and anti-malware. The second looked at data-centric and detective controls such as encryption and intrusion/extrusion monitoring. Since breaches continue to occur at a record pace, what is need new is clearly a new evolution, one that pushes towards individual focused security through granular user monitoring and management as provided by solutions such as Identity and Access Management. While IAM isn't a new technology field, it is one whose time has come and CISO need to begin investing in modern-day, light-weight, easy to implement IAM solutions now to stay ahead of the curve, and reduce enterprise threats.

Takeaways:

  • The breach onslaught demonstrates that existing security solutions are incapable of defending current threats
  • Enterprises need to begin looking at security from an activity perspective rather than an artifact perspective
  • IAM provides activity insight, and therefore threat awareness, no other platform can equal

Sponsored by:

Fortinet View details

 
 
 

10:20 am - 10:30 am

Morning Networking Coffee Break

 

10:35 am - 11:00 am

Executive Exchange

 

Think Tank

Evolving From Legacy To Achieve Digital Transformation

For most IT organizations, the way to get there is through a digital transformation framework, which produces a radically different and modern approach to technology and support that is based on a principle of business agility. It emphasizes moving quickly to adjust to the way the customer in the global techno-society wants to interact. 

Digital transformation requires a new business operating vision and a strategy on how to deliver that vision. includes technology infrastructure, tools, applications, communications, staff capabilities, staff competencies and more. The CIO has to work closely with corporate planning to define the type of support that will be needed and how the technology infrastructure and capability will evolve and to create a flexible investment plan that can be adjusted over time. Key elements must include the redesign of the technology infrastructure to reduce complexity and cost while increasing scalability, a rethinking of how business and IT work together, and an ability to quickly adopt and integrate new advanced technologies. 

Until recently, this goal has been almost impossible to achieve, because few companies have the ability to replace legacy infrastructure and applications. And it has been almost impossible to unlock legacy functionality and data for use with modern technology.

Think Tank

Building Dynamic Security Teams

There's no other way to say it than bluntly; Information Security is a white-hot field within Information Technology as a whole " over the last dozen years it has gone from after-thought, to scapegoat, to critical enterprise success factor. As a result, the need for capable and qualified Information Security specialists, whether front-line Analysts, mid-level Managers, or top level CISOs is at an all time high, but personnel and skills availability is sinking to an all-time (at least in terms of supply and demand ratio) low. There simply isn't enough expertise in existence to go around, or enough education occurring to create it. In this environment, senior Information Security leaders have to get creative in their pursuit of the people, performance, and passion necessary to address this capability shortfall. 

Takeaways:  

  • Learn how to build grass-roots programs that cultivate a farm full of potential security experts through internal and collaborative programs 
  • Find out how to leverage key organizational traits to generate buzz and interest where none existed before 
  • Understand the relevance of certs vs. experience and how to evaluate and validate the value of candidates

Presented by:

Ramin Safai, CTO & CISO, Jefferies Group LLC View details

 
 
 

11:05 am - 11:30 am

Executive Exchange

 

Share:

Thought Leadership

Built to Change and Built to Last: How to Balance Culture, Skills, and Tech with Customer Expectations in the Fast-Changing Digital World

Tech has changed the way experiences and products are consumed - which means businesses have to change the way they deliver. Companies that have been around for decades are disappearing overnight, and startups with completely disruptive business models are bought and sold at the drop of a hat. The market today is made up of large, established enterprises and new challengers entering the market with nothing to lose - and they each want what the other has: a solid customer base, revenue and profit versus innovation, disruption and new talent. Companies who come out on top will be able to connect people, processes and technology with customer needs to translate experiences into real business value. This means balancing established industry experience with the new culture, skills, and insights required to compete in today's business landscape. 

Key Takeaways: 

  • Embrace digital transformation, using technology to create an environment for incremental change while balancing innovation and governance at all levels of the organization. 
  • Create an agile business model that blends an organization's legacy approach with the expectations of the market and more importantly, customers, so that you're less likely to fall back on the excuse of "this is how we've always done it" when challenged. 
  • Build the right culture with people who are focused on continuous improvement, want to deliver amazing customer experiences, and wake up every day looking for ways to break down barriers between ideas and outcomes.

Sponsored by: CA Technologies

 

11:35 am - 12:00 pm

Executive Exchange

 

Thought Leadership

Strategic and Secure Mobility

Is mobility a cost? Or is it a key part of your strategy for business success? Many businesses are leveraging mobility to generate real and measurable returns and to increase their competitiveness. How? Join CDM Media and BlackBerry as we explore ways in which companies can strategically manage their mobility investments. 

In our session we'll look at security - again from a strategic viewpoint. Security covers a wide range of issues in the modern enterprise. While protection of data is at the forefront, security involves many other aspects and issues from secure collaboration to the security and protection of employees in an increasingly tumultuous world. We'll deal not only with securing mobility, but how the strategic use of mobility can make you more secure.

Sponsored by:

BlackBerry View details

 
 
 

12:05 pm - 12:30 pm

Executive Exchange

 

Think Tank

Artificial Intelligence and the Rise of Advanced Machine Learning

Often times the terms "Artificial Intelligence" and "Advanced Machine Learning" are thought of interchangeably and while there is a relationship between AI and AML, to say they are the same thing is an oversimplification and misclassification. Rather the one begets the other with AI being the basic principle upon which AML is developed. As AI begins to mature and migrate away from purely advanced mathematical operations into decision making paradigms, AML steps forward as the predictive ability of machines to process vast quantities of data for the purposes of making decisions in ways that first mimic, but ultimately surpass (in terms of speed at the very least) those of humans. As data and analytics becomes foundational to the way every business operates, AI and AML will become foundational capabilities. 

Takeaways:  

  • While initial focus of AML decision making will be focused on binary decision making (i.e. Yes/No) ongoing advancements will move things to the next level 
  • AI and AML are foundationally based on data and analytics -if these capabilities are not strong for you yet, investment is required 
  • The possibilities with AML are potentially boundless, with autonomous cars the most publicly visible at this point, from which every industry can benefit

Think Tank

The Blockchain & Enhanced Security

There is a definite need to rethink the future of identity management on the web. The ability to verify your identity is the lynchpin of financial transactions that happen online. In today's digital age, an individual's identity is not defined by a single attribute such as a name, address or user ID. Rather, it is a collection of attributes including, but not limited to, name, age, financial history, work history, address history and social history. However, remedies for the security risks that come with web commerce are imperfect at best. IF Blockchain is the answer? how are you going to take it from being seen by senior management, as a futuristic solution to the way your organization may survive competition in the next five years. 

Takeaways:

  • Growth of trusted Blockchain providers is growing exponentially
  • It's not just the financial industry this will affect Retail, Health Care...are going to be in for the pound as well as in for the bitcoin.
  • Uses for Blockchain from ecommerce to supply chain management

 

12:35 pm - 1:20 pm

Networking Luncheon

 

1:25 pm - 1:50 pm

Executive Exchange

 

Think Tank

Moving from Operations to Transformations

The accepted number for the amount of the IT budget that is tied up in operational spend, in paying to maintain technology that has already been purchased, is 80% leaving only 20% for the IT department to use to drive new projects. Because this level of funding is so low, as much as 70% of IT sponsored projects fail. Yet IT departments are being constantly pushed to be innovative, to find a way to embrace new technologies and leverage them to drive business change. How can you do that when your time, money, and effort goes to just keeping the lights on? Join us as we collectively explore this issue and examine some of the successful strategies that are being leveraged by top IT leaders. 

Takeaways:  

  • The pressure on CIO's to drive change has never been higher, but fortunately neither has the opportunity to do so 
  • Disruptive technologies don't just have the power to disrupt IT for the worse, they have the power to disrupt the business for the better 
  • Fortune favors the bold; now is the time to take a leap into new modes of business to break the operational spend stranglehold

Presented by: Lookman Fazal

Think Tank

GDPR is Coming - Is Your Cyber Security Program Prepared?

The EU's General Data Protection Regulation goes into effect in May 2017 and tightens privacy protections for EU residents by outlining new provisions and compliance requirements for -personal data-. The new regulation may have serious implications to an organization's Cyber Security program. This Think Tank will discuss general themes the CISO should consider as they prepare their organization to obtain GDPR compliance. 

Takeaways: 

  • Understand key components of GDPR and how they may impact your organization's Cyber Security program 
  • Highlight core Cyber Security practices that should be established and implemented to prepare for GDPR compliance  
  • Discuss ongoing efforts that may be needed to maintain compliance

Presented by:

Nashira Layade, CISO, Realogy Holding Corp. View details

 
 
 

1:55 pm - 2:20 pm

Executive Exchange

 

Share:

Thought Leadership

Comprehensive Visibility: Is it a Technical Challenge, or a Business Challenge?

In the constantly changing landscape of cyber risk, security and risk management teams (including executives and board members) are increasingly forced to take ownership of and accountability relating to digital risks. Yet, many lack the critical knowledge to make effective risk management decisions and incorporate them into their overall business strategy. This inevitably leads to security strategies which are ineffective and reactionary. This presentation will outline RSA's Business-Driven Security strategy, and will focus on the importance of comprehensive visibility (for both security and risk management teams).

Sponsored by:

RSA View details

 
 
 

2:25 pm - 2:50 pm

Executive Exchange

 

Share:

Executive Boardroom

The Year of Ransomware: Can Technology Alone Prevent Phishing Attacks and Breaches?

As ransomware and phishing attacks continue to grow in number and sophistication, organizations need to reconsider their current security strategy. Companies continue to invest billions of dollars in technology to shore up their defenses against these threats. But is that enough? Is complete reliance on technology the answer? Or should we focus on the human and human behavior?

Sponsored by:

PhishMe View details

 
 

Executive Boardroom

TBC

Sponsored by: CenturyLink

 

2:55 pm - 3:20 pm

Executive Exchange

 

Think Tank

The Evolution of the Private Cloud

Once upon a time applications ran directly on physical hardware. Then the boxes got bigger and more capable and multiple applications were run on the same hardware. There were some resource constraints, but things in general became more efficient. Time passed, things evolved and virtualization was introduced, allowing enterprises to run even more applications even more efficiently on the same hardware. And then the cloud came on the scene, extending the virtualization model to the point that it looked like something completely different, to the point that it became true utility computing. Cloud computing is not just virtualization on a bigger scale and as CIOs prepare their organizations to dive into private clouds at an increasing rate, it is very important to understand what they are and are not, and how they differ from their forbear computer models with which we are all familiar.  

Takeaways:  

  • Private clouds are big and becoming bigger, but calling something a private cloud and having it actually be one are different things 
  • While virtualization may be a core enabling technology of a private cloud, virtualizing an environment doesn't make it a cloud 
  • True private clouds have both pros and cons in relation to other compute models; they are not the be-all and end-all and careful consideration needs to be given before pushing ahead with private cloud deployment

Think Tank

The Three Amigos of Manufacturing and Retail

Be Secure - Take a measured, risk-based approach to what is secured and how to secure it. 
Be Vigilant - Monitor systems, applications, people, and the outside environment to detect incidents more effectively. Be Resilient - Be prepared for incidents and decrease their business impact by improving organizational preparedness to address cyber incidents before they escalate. 

Takeaways: 

  • Managing cyber risks as a team and strategies for deployment of enterprise and emerging technologies
  • Actively monitor the dynamic threat landscape 
  • Retain and use lessons learned

 

3:25 pm - 3:35 pm

Afternoon Networking Coffee Break

 

3:40 pm - 4:05 pm

Executive Exchange

 

Innovation Showcase

An exclusive opportunity to be exposed to the hottest new solutions providers in a quick-hit format designed to whet the appetite and spark immediate interest.

Sponsored by:

Arbor Networks View details

 
 
 

4:10 pm - 4:35 pm

Executive Exchange

 

Think Tank

Disrupting Markets with Disruptive Technologies

While the combination of Social, Mobile, Analytics, and Cloud have been present and disrupting IT departments and enterprises as a whole for over two years now, in many ways organizations have still not fully embraced them, have still not fully leveraged them. These new platforms allow organizations radically new ways to go to market, allowing for broad scale deployment of systems of engagement that create dynamic relationships with clients and prospects. Finding the resources, wherewithal, and ability to fully commit to these technologies and the capabilities they create has proven to be a struggle for many, but a struggle that can be overcome by leveraging the right partners that bring the right skills and experiences to bear. 

Takeaways:  

  • Social, Mobile, Analytics, and Cloud are all here to stay; each one adds value to enterprises but collectively that value increases exponentially 
  • The manner in which these technologies are implemented, operated, and utilized is different than the foregoing systems of record we are used to 
  • Unique skills and capabilities are required to leverage the power and value of these platforms, skills and capabilities that can be in short supply

Think Tank

Disaster Recovery and Preparing for the Inevitable

Like death and taxes, IT outages are an inevitability whether as the result of power loss, telecommunications outage, or any one of a myriad other potential technical and non-technical issues. In this environment, the savvy CIO knows that what matters most is preparation - being ready for that next outage with an IT infrastructure that is both resilient and flexible and Disaster Recovery procedures that allow for efficient and effective recovery, balancing Recovery Time and Recovery Point objectives with appropriate cost. Disasters happen but with proper planning they don't have to be disastrous to your business. 

Takeaways:  

  • In the event of a severe outage, businesses without a Disaster Recovery plan are at a significant disadvantage when it comes to recoverability and viability 
  • DR planning cannot be an 'at all costs' proposition and appropriate planning must take into account reasonable Recovery Time and Recovery Point objectives 
  • Catastrophic outages get the press but are the thin end of the wedge - minor service interruptions are far more common and must be planned for as well
 

4:40 pm - 5:20 pm

Executive Visions

Facilitating Technology-Enabled Business Transformation

The role of the modern IT Executive is more complex than it has ever been before, not just because the technology landscape has become more complex, but also because increasingly IT execs have had to become a business-focused executive, not just a technologist. Long have we talked about the CIO and CISO getting a seat at the table but modern businesses are now demanding that their technology impresario join them and leverage his deep and rich technical acumen to allow the organization as a whole to better position itself for market-place success. To be successful, CxOs need to invest in themselves, in their personnel, and in the right technologies to allow them to position the IT department to proactively address business needs as an innovator and driver, rather than order-taker and enabler.

Takeaways:

  • IT leadership can no longer be simply technology focused, but must instead take their visibility into business process and become business focused
  • A broader business-focus does not preclude maintaining technology excellence however and indeed may demand more of it than ever before
  • Success for CxOs will be measured not in how they can enable enterprise decisions, but in how they can drive growth

Panelists:

David Van Skiver, Director - Information Risk Management & Security, Merck View details

 
 
 

5:20 pm - 5:30 pm

Thank You Address and Closing Remarks

 

5:30 pm - 7:00 pm

Cocktail Reception