Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO)...

39
2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) WEDNESDAY, OCTOBER 21, 2015

Transcript of Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO)...

Page 1: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security

2015 Chief Information Security Officer (CISO) Leadership Forum(Dallas)

Wednesday, OctOber 21, 2015

Page 2: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security

administrative nOtes

securityPlease wear your name badge at all times during the meeting.Please do not leave your personal belongings unattended in the meeting rooms.Argyle Executive Forum will not be responsible for items left in the rooms.

mobile devicesPlease do not allow any mobile device to disrupt the meeting while in session.All devices should be on silent mode.

conversationPlease use areas outside of the ballroom to converse when the meeting is in session.

smokingPlease note that smoking is not permitted in the meeting venue.

The content of this program and the attendee list remain the sole property of Argyle Executive Forum and may not be rented, sold, or given to any outside party or used to market or promote any other meeting. Any such unauthorized distribution represents theft of property for which Argyle Executive Forum will pursue any and all appropriate legal remedies.

Speaker Materials are available upon request, pending availability.

Page 3: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security

The Security Intelligence Report (SIR) is an analysis of the current threat landscape based on data from over a billion systems worldwide and some of the Internet’s busiest online services to help you protect your organization, software, and people.

| Security Intelligence Report

Security Intelligence From Over a Billion Systems Worldwide

ONE SECURITY REPORT

View the Security Intelligence Report at www.microsoft.com/SIR

Page 4: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security

Take Data Management from tactical to strategic.

Data ManagementYour decisions are only as good as the data driving them. No matter how big and complex your data gets, you need it to create a unified view of your customers and products. SAS® helps you manage and govern all your data, in all forms, wherever it resides. Quicker analysis, improved quality, seamless integration and tighter security mean your data — and your decisions — can be trusted.

Read the papersas.com/datastrategy

SAS and all other SAS Institute Inc. product or service names are registered trademarks or trademarks of SAS Institute Inc. in the USA and other countries. ® indicates USA registration. Other brand and product names are trademarks of their respective companies. © 2014 SAS Institute Inc. All rights reserved. S117792US.0114

Page 5: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security
Page 6: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security
Page 7: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security
Page 8: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security

agenda

2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas)

Wednesday, October 21, 20158:00am – 5:10pm

8:00am – 9:00am

Breakfast

9:00am – 9:05am

Argyle Executive Forum Opening Remarks

9:05am – 9:40am

Ronald MehringChief Information Security OfficerTexas Health Resources

9:45am – 10:05am

Thought Leadership Presented by Microsoft

Perimeter security is gone; data is the new perimeter. In a world without borders where ubiquitous access to services and information is expected using devices beyond our control, where social networks create new threats to corporate reputation and big data provides new monetization opportunities as well as new risks to personal privacy, how can we keep our IT assets protected?

Roberto ArbeláezChief Security Advisor Microsoft

10:05am – 10:30am

Coffee Break

Page 9: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security

agenda

10:30am – 11:20am

Panel Discussion

“Balancing Act: Becoming More Transparent & Even More Secure”

• As data centers become more distributed and the traditional network perimeter dissolves, what can we use to protect enterprise data?

• Is identity and access management defining the new security perimeter? • How does your team build a road map to drive long-term business initiatives? • With so many organizations struggling to manage identities within applications, what are some best practices that you can share that helps your team lower costs and risks? • What are some of the other data management best practices that have helped you lead your team

to success?• What are the key benefits of SSO for an organization? Does it effectively cut costs? Improve

productivity? • Does identity management training equal security awareness when it comes to cloud and data?

Moderator:Teri PenningtonDeputy Chief Information Officer City of Austin

Panelists:James BeesonChief Information Security OfficerGE Capital Americas

Kevin HardcastleChief Information Security OfficerWashington University in St. Louis

Tony GouldingDirector, Technical Product ManagementCentrify

Ronald MehringChief Information Security OfficerTexas Health Resources

Page 10: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security

agenda

11:25am – 11:45am

Thought Leadership Presented by SAS

“Security Analytics: Gaining an Information Advantage Over Cyber Adversaries”

Analytics has significantly changed how many organizations conduct business—from developing customer relationships, to accelerating product development and detecting fraudulent transactions. Why has analytics not yet changed how organizations secure their businesses? This session will show how and why we are at a pivotal moment in the use of security analytics.

Franklin WitterPrincipal, SAS Cybersecurity SolutionsSAS

11:45am – 12:10pm

Coffee Break

Page 11: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security

agenda

12:10pm – 1:00pm

Panel Discussion

“The Perfect Security Storm: Managing Security and Expectations for Better Business”

Session topics include, but are not limited to:• How can organizations transform through making IT assets work more effectively? • What are some best practices when leveraging the new economics of IT?• How can organizations ensure that providers comply with the same security policies we expect

internally? • How have the cloud and applications transformed the way companies need to look at IT standards?• What are the real risks associated with multi-tenancy and how can organizations stay safe while

taking advantage of SAAS?• What major infrastructure changes have occurred in the past couple of years and what’s driving

these changes?• What are some best practices when communicating risk to the organization and users? • How has your team handled the combat between user-friendly and security? Has your team learned to say “no?”• What standards organizations can help companies ensure they remain secure while migrating

applications to the cloud?

Moderator:Andy UlrichHead of Security, North AmericaEricsson

Panelists:Jon AllenAssistant Vice President & Chief Information Security OfficerBaylor University

Michael BottsChief Information Security Officer, Director of Information SecuritySunPower Corporation

William FloydChief Information OfficerGold’s Gym

Willy LeichterGlobal Director, Cloud Security CipherCloud

Willis MartiChief Information Security OfficerTexas A&M University

Page 12: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security

agenda

1:00pm – 2:00pm

Lunch

2:00pm – 2:35pm

“Security Leadership: Finding Balance”

Andy Ulrich Head of Security, North AmericaEricsson

2:35pm – 2:50pm

Coffee Break

2:50pm – 3:30pm

Fireside Chat

Jon AllenAssistant Vice President & Chief Information Security OfficerBaylor University

Interviewed by:Kevin HardcastleChief Information Security OfficerWashington University in St. Louis

3:35pm – 4:05pm

Mike MorrisHead of IT SecurityTXU Energy

4:05pm – 4:10pm

Argyle Executive Forum Closing Remarks

Page 13: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security

agenda

4:10pm – 5:10pm

Closing Reception

__________________________________________________________________________________

*Please note, the agenda is subject to change.

The information, views, and opinions expressed by speakers and other participants at our conferences are those of the individual and do not necessarily reflect the views and opinions of Argyle Executive Forum.

Argyle Executive Forum, its directors and officers, do not guarantee that any information provided by a speaker or other participant is accurate or complete and Argyle Executive Forum does not endorse any opinions that may be presented.

Page 14: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security

are you ready for cloud communications?

If you need one communications platform for all of your international and domestic employees, you’re ready. If you need to track business communications activity, including phone and SMS text, you’re ready. If you need your mobile and remote employees to feel connected and empowered from their smartphone, you’re ready. If you simply want to find out what this cloud thing is all about, you’re ready.

And we’re ready for you. The ThinkingPhones platform is the most advanced, reliable, scalable, and secure cloud

solution available. We serve midsized and larger enterprise companies in any industry with our robust and integrated cloud communications platform that includes applications managing voice, mobility, video, analytics, presence, messaging, contact center, and conferencing functionality on smartphones, softphones and desktop devices.

The real question is - are you ready for endless possibilities in the cloud?

o u r p l a t f o r m

INGRATED Full PBX functionality in the palm of your hand. Voice, video, conferencing, IM/presence - all working together.

MOBILITYWe created a mobile client that has an intuitive, easy-to-use interface that fosters productivity and collaboration.

ANALYTICSWith our pre-built or custom reports and dashboards, you access actionable intelligence from across your organiza-tion to gain a competitive advantage.

FLEXIBLE APISOur open APIs readily integrate with the applications many enterprises already have in place (like Salesforce), enabling organizations to bring along applications specific to their business.

10 Wilson Road, Cambridge, MA 02131, United States Tel. 800.890.1553Barbara Strozzilaan 101, 1083 HN Amsterdam, The Netherlands Tel. +31 (0)20-241-0410

Vi s i t u s :W W W. T H I N K I N G P H O N E S . C O M

Page 15: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security

Put an end to app security finger pointing ...for good.

Stop Application Attacks & Vulnerabilities Instantly.Say goodbye to the blame game, forever.

Only Contrast gives you the actionable insights you need to secure apps—instantly.

� Installs and delivers results in minutes

� Provides accurate vulnerability assessments, instantly —no testing needed, no experts required

� Works the way you do— transparently— so not even your developers will know it’s there

Schedule a FREE Assessment Nowwww.contrastsecurity.com/assessment

The World’s Fastest Application Security

Page 16: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security

It’s not zero-day if we’ve seen it beforeOur Advanced Malware Protection and Detection (AMPD) service provides an elite layer of defense against emerging zero-day threats with network security for enterprise and midsize organizations.

Is your network security monitoring prepared for malware attacks?

24x7x365 network security monitoring

Proprietary CTUTM intelligence technology

Real-time and historical network visibility

Specific attack vector data

A fully managed security service

Advanced Malware Protection and Detection

© 2015 Dell SecureWorks, Inc.

Page 17: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security

Your Data is Showing... What’s your Plan?SafeNet and Gemalto have recently joined forces to combine SafeNet’s leading data protection products with Gemalto’s leading digital security services creating a worldwide leader in enterprise and banking security from core data protection to secure access at the edge of the network—we bring TRUST to everyday services by securing identities, data, and transactions.

With the ever growing likelihood that organizations will experience a data breach, we recommend putting a security strategy in place that accepts that a breach will occur.

Welcome to the new reality of data protection with Gemalto’s 3 steps to securing your sensitive data

With Gemalto’s encryption, security is attached to the data wherever it resides, and by managing the encryption keys, and controlling user access, you are able to maintain control of your data, prove compliance, and facilitate governance – even in a dense virtual or cloud environment.

If you want to learn to protect what matters where it matters at the edge AND at the core and restore TRUST to your customers, visit www.safenet-inc.com

Page 18: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security
Page 19: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security

partners

thought Leadership spotlight partners

Every decision, every business move, every successful customer interaction – they all come down to high-quality, well-integrated data. If you don’t have it, you don’t win. SAS® Data Management is an industry-leading solution built on a data quality platform that helps you improve, integrate and govern your data.

When it comes to master data management, data integration, data quality and data governance, SAS can help you transform your big data into even bigger opportunities.

No matter where your data is stored – from legacy systems to Oracle to Hadoop – SAS Data Management helps you access the data you need. All of our components – from data quality to data federation technol-ogy – are part of the same unified architecture. SAS Data Management also enables business users in your organization to update data, tweak processes and analyze results themselves, promoting collaboration and freeing you up for other projects. And at SAS, we’re masters at making sure data is prepped for analytics or operational use. So we promote data quality, transparency and accountability.

SAS is the leader in business analytics software and services, and the largest independent vendor in the business intelligence market. Through innovative solutions, SAS helps customers at more than 70,000 sites improve performance and deliver value by making better decisions faster. Since 1976 SAS has been giving customers around the world THE POWER TO KNOW®.

Learn more and discover our free white papers, webinars, demos, videos and more online at sas.com/data.

Founded in 1975, Microsoft (Nasdaq “MSFT”) is the worldwide leader in software, services, devices and solutions that help people and businesses realize their full potential.

Microsoft cybersecurity solutions help you protect your enterprise organization in today’s mobile-first, cloud-first world through comprehensive security and identity services, unparalleled direct access to product development teams, and highly skilled technical professionals who offer you a wealth of security and identity experience.

Page 20: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security

partners

panel partners

Centrify strengthens enterprise security by managing and securing user identities from cyber threats. As organizations expand IT resources and teams beyond their premises, identity is becoming the new security perimeter. With our platform of integrated software and cloud-based services, Centrify uniquely secures and unifies identity for both privileged and end users across today’s hybrid IT world of cloud, mobile and data center. The result is stronger security and compliance, improved business agility and enhanced user productivity through single sign-on. Over 5000 customers, including half of the Fortune 50 and over 80 federal agencies, leverage Centrify to secure their identity management. Learn more at www.centrify.com.

CipherCloud, the leader in cloud information protection, enables organizations to securely adopt cloud applications by overcoming data privacy, residency, security, and regulatory compliance risks. CipherCloud delivers an open platform with comprehensive security controls, including AES 256-bit encryption, tokeni-zation, cloud data loss prevention, cloud malware detection and activity monitoring. CipherCloud’s ground breaking technology protects sensitive information in real time, before it is sent to the cloud, while preserv-ing application usability and functionality.

CipherCloud has experienced exceptional growth and success with over 2 million business users, more than 250 million customer records, in over 10 industries, and with marquee customers around the globe.

The CipherCloud product portfolio protects popular cloud applications out-of-the-box such as Salesforce, Chatter, Box, Google Gmail, Microsoft Office 365, and Amazon Web Services. Additionally, CipherCloud for Any App and CipherCloud for Databases enable organizations to extend data protection to hundreds of third-party cloud and private cloud applications and databases.

CipherCloud, named as SC Magazine’s 2013 Best Product of the Year, is backed by premier venture capital firms Andreessen Horowitz, Index Ventures, and T-Venture, the venture capital arm of Deutsche Telekom. For more information, visit www.ciphercloud.com and follow us on Twitter @ciphercloud.

Page 21: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security

partners

breakout Lunch partner

senior supporter & networking partner

ThinkingPhones powers the communication services of today’s modern, mobile enterprises. Our mission is to provide applications that employees love and managers cannot live without. Since 2006, our plat-form has offered customers four primary solutions: unified communications (voice, video, conferencing, presence, and contact center); mobility; business analytics; and cloud integration APIs. Our mobile-first user experience is designed to delight today’s digitally empowered workforce, while our powerful suite of business analytics integrates with other cloud services to make our solution an indispensable tool for sales leaders and CIOs.

We built our own multi-tenant cloud platform from the ground up to be exceptionally agile, redundant, and secure without the restrictions of other UC services and the expense of on-premises offers. This enables our customers to deploy cloud communications quickly, easily, and cost effectively. Our scalable, flexible solution allows customers to seamlessly add users from all corners of the globe, making us the perfect fit for multi-location enterprises. Such adaptability, including a breadth of third-party application support, has been key to the platform’s adoption by more than 800 global organizations, as well as industry recognition ranging from our two-time designation as a Gartner UCaaS Magic Quadrant “Leader” to being named Frost & Sullivan’s “Company of the Year.”

ZixCorp is a leader in email data protection. Trusted by the nation’s most influential institutions in healthcare, finance and government, ZixCorp offers innovative email BYOD security, industry-leading email encryption and a unique email DLP solution. Our BYOD security solution ZixOne offers a new and different approach that never allows corporate email to reside on the device. With ZixOne, organizations control access to corporate email without jeopardizing data protection or productivity. If a mobile device is lost or stolen, ac-cess is simply disabled. Employees maintain control of their devices and their privacy, and employer liability risks are eliminated. Zix Email Encryption provides easy-to-use secure email to anyone, anywhere. ZixCorp provides the only transparent email encryption for both senders and recipients – enabling the exchange of encrypted email without any extra steps, passwords or additional set-up. Leveraging our leadership and expertise in email encryption, ZixDLP combines our proven policy and content scanning capabilities with an intuitive quarantine interface. By focusing on email, ZixDLP addresses business’s greatest data risk while decreasing cost, reducing the deployment timeline from months to hours and minimizing the impact on your team. For more information, visit zixcorp.com.

Page 22: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security

partners

senior supporter partners

Contrast Security delivers the world’s fastest application security software that eliminates the single greatest security risk to enterprises today. Industry research shows that application security flaws are the leading source of data breaches. Contrast can be deployed, automatically discover applications and identify vulnerabilities within seven minutes. Relying on sensors instead of expensive security experts, Contrast runs continuously and is ten times more accurate than the competition. Unlike tedious, painful and slow legacy approaches, Contrast analyzes a complete portfolio of running applications simultaneously in real time at any scale. As a result, organizations can act faster against threats and immediately reduce risk. More information on Contrast Security can be found at http://www.contrastsecurity.com.

Dell SecureWorks understands cyber security is a critical focus for organizations, and technology alone cannot address the risks posed by cyber threats. Recognized as an industry leader, we combine elite intelligence and trusted security expertise, helping organizations solve complex security challenges, strengthen their security postures and reduce risk in the face of a dynamic threat landscape. Intelligence practices developed by our security experts enable a security methodology, ensuring you see the threat, thwart cyber-attacks and recover faster from security breaches. For more information visit www.secureworks.com.

SafeNet and Gemalto have recently joined forces to combine SafeNet’s leading data protection products with Gemalto’s leading digital security services creating a worldwide leader in enterprise and banking security from core data protection to secure access at the edge of the network—we bring TRUST to everyday services by securing identities, data, and transactions.

Page 23: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security

partners

Infoblox delivers network control solutions, the fundamental technology that connects end users, devices, and networks. These solutions enable approximately 7,900 enterprises and service providers to transform, secure, and scale complex networks. Infoblox helps to take the burden of complex network control out of human hands, reduce costs, and increase security, accuracy, and uptime.

Our solutions automate network-control functions to reduce costs and maximize uptime, and they protect against the rising flood of malware and distributed-denial-of-service DDoS attacks.

From discovery, real-time configuration, change management, and compliance to DNS, DHCP, and IP address management (IPAM), our technology automates and simplifies complex processes. Our patented Infoblox Grid™ delivers high availability and provides an authoritative network database for real-time and historical reporting. And our purpose-built DNS security solutions defend against a wider range of threats than any other product available.

Infoblox is headquartered in Santa Clara, California, and has operations in over 25 countries.

senior supporter partners

Intralinks Holdings, Inc. (NYSE: IL) is a leading, global technology provider of enterprise collaboration solutions. Through innovative Software-as-a-Service solutions, Intralinks solutions are designed to enable the exchange, control, and management of information between organizations securely and compliantly when working beyond the firewall. More than 3.1 million professionals at 99% of the Fortune 1000 compa-nies have depended on Intralinks’ experience. With a track record of enabling high-stakes transactions and business collaborations valued at more than $23.5 trillion, Intralinks is a trusted provider of easy-to-use, enterprise strength, cloud-based collaboration solutions. For more information, visit www.Intralinks.com.

LogRhythm, the leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s patented and award-winning platform uniquely unifies next-generation SIEM, log management, network and endpoint forensics, and advanced security analytics. In addition to protecting customers from the risks associ-ated with cyber threats, LogRhythm provides unparalleled compliance automation and assurance, and enhanced IT intelligence.

Page 24: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security

partners

senior supporter partners

Varonis is the leading provider of software solutions for unstructured, human-generated enterprise data. Varonis provides an innovative software platform that allows enterprises to map, analyze, manage and migrate their unstructured data. Varonis specializes in human-generated data, a type of unstructured data that includes an enterprise’s spreadsheets, word processing documents, presentations, audio files, video files, emails, text messages and any other data created by employees. This data often contains an enterprise’s financial information, product plans, strategic initiatives, intellectual property and numerous other forms of vital information. IT and business personnel deploy Varonis software for a variety of use cases, including data governance, data security, archiving, file synchronization, enhanced mobile data ac-cessibility and information collaboration. As of June 30, 2015, Varonis had approximately 3,750 customers, spanning leading firms in the financial services, public, healthcare, industrial, energy & utilities, technology, consumer and retail, education and media & entertainment sectors.

Mimecast is a leader in enterprise cloud services for the protection and management of email and corporate data. The company’s email security, continuity and cloud archiving services are built on Mimecast’s world-leading secure cloud platform and optimized for Microsoft Exchange and Office 365. Mimecast Email Security protects against inbound and outbound email-borne threats like spear-phishing, advanced persistent threats and infrastructure attacks, deliberate and accidental data leaks. Mimecast’s Email Continuity service ensures employees can continue using their email during planned or unplanned email outages. Mimecast Cloud Archive unifies email, file and Instant Messaging data to give end-users fast access to their personal archive via PC, Mac and mobile apps. For IT teams, Mimecast gives them a single administration console that provides centralized management of security and content protection as well as retention policies to support compliance and eDiscovery requirements. Founded in 2003, the company has over 10,000 customers, and over 3 million users worldwide. Mimecast has offices in Europe, North America, Africa and Australia.

Veracode’s cloud-based service is a simpler and more scalable approach to reduce application-layer risk across your entire global software infrastructure -- including web, mobile and third-party applications -- without hiring more consultants or installing more servers and tools. With Veracode’s smart approach to application security, you can drive your innovations to market faster -- without sacrificing security in the process.

Page 25: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security

partners

senior supporter partners

Vormetric (@Vormetric) is the industry leader in data security solutions that protect data-at-rest across physical, big data and cloud environments. Vormetric helps over 1500 customers, including 17 of the Fortune 30, to meet compliance requirements and protect what matters – their sensitive data – from both internal and external threats. The company’s scalable Vormetric Data Security Platform protects any file, any database and any application’s data —anywhere it resides — with a high performance, market-leading solution set. For more information, please visit:www.vormetric.com.

Zimperium is the leader in enterprise mobile threat management. The Zimperium Mobile Threat Protection system delivers enterprise-grade security for Android and iOS devices against the next generation of mobile threats. Developed for mobile devices, Zimperium uses patented, behavioral analytics that continuously run on the device to protect enterprises against network- and host-based mobile threats wherever business takes them. Founded in 2010 by mobile security experts, Zimperium is backed by Sierra Ventures and Samsung. Headquartered in San Francisco, Zimperium manages its R&D center in Tel Aviv, Israel.

supporter partner

Nutanix delivers invisible infrastructure for next-generation enterprise computing, elevating IT to focus on the applications and services that power their business. The company’s software-driven Xtreme Computing Platform natively converges compute, virtualization and storage into a single solution to drive simplicity in the datacenter. Using Nutanix, customers benefit from predictable performance, linear scalability and cloud-like infrastructure consumption. Learn more at www.nutanix.com or follow up on Twitter @nutanix.

networking partner

Splunk Inc. (NASDAQ: SPLK) provides the leading software platform for real-time Operational Intelligence. Splunk® software and cloud services enable organizations to search, monitor, analyze and visualize machine-generated big data coming from websites, applications, servers, networks, sensors and mobile devices. More than 7,900 enterprises, government agencies, universities and service providers in 100 countries use Splunk software to deepen business and customer understanding, mitigate cybersecuri-ty risk, prevent fraud, improve service performance and reduce costs. Splunk products include Splunk® Enterprise, Splunk Cloud™, Splunk Storm®, Hunk™: Splunk Analytics for Hadoop and premium Splunk Apps. To learn more, please visit http://www.splunk.com/company.

Page 26: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security
Page 27: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security

THEY WILL GET IN

A 2014 LEADERSIEM Magic Quadrant

Compromised credentials? Systems hacked? Data breached? In today’s IT environment, it’s a

question of when, not if. LogRhythm’s Security Intelligence Platform unifies SIEM, log management,

file integrity monitoring, network forensics & host forensics to help you detect and respond to

breaches and the most sophisticated cyber threats – faster and with greater accuracy than ever.

Call 1-866-384-0713 to learn more or schedule a demo. Or visit www.LogRhythm.com

DETECT & RESPOND

Page 28: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security
Page 29: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security
Page 30: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security
Page 31: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security

UpcOming events

October 22, 20152015 Chief Marketing Officer Leadership Forum: Spotlight on B2B Marketing (Atlanta)atlanta, ga

Perspectives by:• Marc Helms, Vice President of Sales and Marketing, Mansfield Oil• Kathy Van Pelt, Vice President, Strategic Marketing, Randstad• Melissa Wall, Senior Vice President, Marketing, CNL Financial Group• David Johnson, Director Product Marketing, Oracle• Alexandra Gobbi, Senior Vice President, Corporate Marketing and Communications, EarthLink• David Craig, Senior Vice President, Wholesale Bank Marketing, SunTrust Bank• Ray Bouley, EVP, Senior Director, Marketing and Communications, Jones Lang LaSalle• Melissa Minihan, Vice President of Global Marketing, Consumer and Commercial Brands, INVISTA• Adam Needles, Chief Strategy Officer and Principal, Annuitas Group

October 27, 20152015 Chief Marketing Officer Leadership Forum (Philadelphia)philadelphia, pa

Perspectives by:• Marilyn Cox, Marketing Principal, Industry Practices, Oracle Marketing Cloud, Oracle• Amy Messano, Vice President of Marketing and Communications, Delphi Financial Group• Avi Patel, Chief Marketing Officer, Fulton Financial Corporation• Patrick McLean, SVP, Head of Brand & Product Marketing, TD Bank• Kira Sterling, Chief Marketing Officer, Toll Brothers• Jay Atcheson, VP Marketing & Communications, Element Financial Corporation• Edwin Bodensiek, Vice President, Branding Marketing and Public Relations, Select Medical Corporation• Donna MacFarland, Chief Marketing Officer, Retirement Plan Services, Lincoln National

October 29, 20152015 Human Capital Leadership Forum: Fall Event (San Francisco)san Francisco, ca

Perspectives by:• Keagan Kerr, Senior Vice President, Corporate Affairs and Human Resources, Coeur d’Alene Mines

Corporation• Betsy Sutter, Corporate Senior Vice President and Chief People Officer, VMware• Joe Wegener, Vice President Human Resources, Core-Mark Holding Company• Gunjan Aggarwal, Vice President & Head of Human Resources, North America, Ericsson• Paul Pastrone, VP, PPS Learning & Organization Development, HP• Trisha Stiles, SVP, Human Resources, CBS

Page 32: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security

UpcOming events

november 3, 20152015 Customer Care Leadership Forum (Atlanta)atlanta, ga

Perspectives by:• Jim Hightower, Vice President Customer Care, North America, U.S. Bank• Sher’ree Kellogg, Senior VP, Marketing Governance Citi Retail Services, Citibank• Tim Genovese, VP, Guest Experience & Brand Consistency, IHG InterContinental Hotels Group• Lorraine Avery, Senior Vice President and Director of Customer Service, Associated Banc-Corp• David Bradshaw, Vice President, Client Business Support, ING DIRECT Canada

november 4, 20152015 Customer Care Leadership Forum: Fall Event (New York)new york, ny

Perspectives by:• Steven Gargano, Head of Product Development and Customer Service, U.S. Bank• Diana Robino, Senior Vice President, Global New Product Development, MasterCard• Robert White, Head of Customer Service, Linde North America• Dana Tucker, Head, CAO, Customer Centricity Program Management, MetLife• Scott Landry, VP of Global Customer Support, Akamai• Jason Wesbecher, Chief Marketing Officer,EVP, Mattersight• Rosetta Lue, Chief Customer Service Officer & 311 Contact Center Operations Director, City of Philadelphia• Denise Palermo, Vice President, Customer Care, Excellus BlueCross BlueShield

november 5, 20152015 Chief Financial Officer Leadership Forum (New York)new york, ny

Perspectives by:• David Geithner, Chief Financial Officer, Conde Nast• Norma Corio, Chief Financial Officer, Global Business Travel, American Express• Roger Blanken, Vice President, Finance, International Flavors & Fragrances• Jan Dekempe, Chief Financial Officer, Region Americas, DB Schenker USA• Gary Crowe, Senior Vice President & Chief Financial Officer, Ricoh• Alan Gallo, Chief Financial Officer, Global Corporate Services and Enterprise Growth, American Express

november 10, 20152015 Chief Marketing Officer Leadership Forum: Fall Event (San Francisco)san Francisco, ca

Perspectives by:• Chris Lynch, Senior Director Product Marketing, Oracle• Michael Mendenhall, Chief Marketing and Communications Officer, Flextronics International• Penny Baldwin, Executive Vice President, Chief Marketing Officer, McAfee• Bill Myers, Vice President, Communications, Marketing & Corporate Social Responsibility, DaVita• Lisa Arthur, Chief Marketing Officer, Teradata Marketing Applications• Jeff Rohrs, Vice President, Marketing Insights, Salesforce

Page 33: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security

UpcOming events

november 10, 20152015 Delivering Next-Generation Digital Experiences (San Francisco)san Francisco, ca

Perspectives by:• Chris Preston, Senior Director, Digital Experience Strategies & Business Development, Oracle

november 18, 20152015 Chief Financial Officer Leadership Forum (Chicago)chicago, iL

Perspectives by:• Denise Dettingmeijer, Chief Financial Officer, US, Randstad• Mitch Helfand, Vice President Finance, Blue Cross & Blue Shield Association

november 18, 20152015 Human Capital Leadership Forum (Dallas)dallas, tX

Perspectives by:• Whitney Shelley, Vice President and Chief Human Resources Officer, Denbury Resources• Russell Goin, Vice President – International and Corporate Human Resources, Rent-A-Center• Sandi Knight, Senior Vice President, Human Resources, HealthMarkets• John Sigmon, Chief Human Resources Officer, AARP

november 19, 20152015 Chief Information Security Officer (CISO) Leadership Forum (Chicago)chicago, iL

Perspectives by:• James MacLennan, Chief Information Officer, IDEX Corp.• Richard Rushing, Chief Information Security Officer, Motorola Mobility• Derek Milroy, IS Security Architect, U.S. Cellular Corporation• Gray Mitchell, Chief Information Security Officer, TeamHealth• Ola James, Chief Information Security Officer, Zimmer Holdings• Steven McLean, Information Security Officer, Biomet• Aman Raheja, Deputy Chief Information Security Officer and Senior Director, Information Risk

Management, Express Scripts• Kevin Larson, Vice President and Chief Information Officer, AAR CORP

december 2, 20152015 Chief Information Officer Leadership Forum: Fall Event (Boston)boston, ma

Perspectives by:• Shuk Khader, Chief Information Security Officer, Keurig Green Mountain

Page 34: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security

UpcOming events

december 3, 20152015 Delivering Next-Generation Digital Experiences (Boston)boston, ma

Perspectives by:• Chris Preston, Senior Director, Digital Experience Strategies & Business Development, Oracle

december 9, 20152015 Chief Marketing Officer Leadership Forum (Dallas)dallas, tX

Perspectives by:• James Meredith, VP, Marketing & Communications, Cinemark• Jennifer Dominiquini, Chief Marketing Officer, BBVA• Lisa Arthur, Chief Marketing Officer, Teradata Marketing Applications• Cory Jones, VP, Marketing, Frontier Communications• Gary Griffin, Senior Vice President, Database Marketing, Bank of America

december 9, 20152015 Delivering Next-Generation Digital Experiences (Dallas)dallas, tX

Perspectives by:• Chris Preston, Senior Director, Digital Experience Strategies & Business Development, Oracle

december 10, 20152015 Chief Information Officer Leadership Forum (New York)new york, ny

Perspectives by:• Peter McCallum, Director of Datacenter Solution Architecture, FalconStor Software• Bill Murphy, Chief Technology Officer, The Blackstone Group• Rosalee Hermens, Senior Vice President and Chief Information Officer, True Value Company• Sanjeev Singh, Executive Vice President and Chief Information Officer, Follett Corporation

Page 35: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security
Page 36: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security
Page 37: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security
Page 38: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security
Page 39: Security Officer (CISO) - Argyle · 10/12/2015  · 2015 Chief Information Security Officer (CISO) Leadership Forum (Dallas) Wednesday, October 21, 2015 ... Chief Information Security

We ask that all speakers, members and sponsors

respect Argyle’s content neutrality guidelines.

We thank you for your continued support for this policy

as a way of protecting the high content standards and trust

that Argyle has established with its members.

• Argyle is proud and protective of our high standards in ensuring the value of all content presented at our events.

• Strict guidelines are in place to ensure that all content presented is balanced and vendor neutral.

• All topics that are covered at our member events are thought leadership-focused and in line with the expectations of our members.

• Argyle seeks to prevent overt sales pitches or unbalanced vendor references.

• Argyle provides all speakers with content presentation guidelines at the behest of our executive membership.

CONTENT NEUTRALITY POLICY