Gartner Security & Risk Management Summit 2015

Size: px
Start display at page:

Download "Gartner Security & Risk Management Summit 2015"

Transcription

1 Gartner Security & Risk Management Summit 2015 June 8 11 I National Harbor, MD gartner.com/us/securityrisk From learning how to re-evaluate and update your security and risk strategies and investments to meeting the evolving needs of the digital organization, Gartner Security & Risk Management Summit 2015 will cover the full spectrum of IT security, risk, BCM, the CISO and the business of IT security. 1 are the leadership skills needed to be an effective CISO today? A1. The New CISO s Crucial First 100 Days Tom Scholtz A2. Protecting Your House on the Prairie: Security Strategy for the Smaller Enterprise Rob McMillan, Tom Scholtz A3. The Path to High-Impact Security Awareness Andrew Walls A4. Business, Not Bytes A Practical View of Security Metrics Rob McMillan, Jeffrey Wheatman A7. The Nexus Is the Matrix: Everything I Need to Know About Digital Business I Learned From William Gibson Jay Heiser, Andrew Walls A8. Be Agile Not Fragile: Use Threat Intelligence Services to Defend Yourself Rob McMillan A9. General Session/CISO Circle: Pulling Back the Wizard s Curtain LabMD s CEO Michael J. Daugherty Reveals the FTC s Data Security Investigation Secrets, Tricks and Tactics Michael J. Daugherty, CEO, LabMD A11. Why Your Policy Is Broken and How You Can Fix It Rob McMillan A12. The Legality and Ethics of IoT and Employee Monitoring Avivah Litan, Andrew Walls A13. People-Centric Security: Experiences and Lessons Learned Tom Scholtz A16. Chief Data Officers and Chief Information Security Officers: Friends or Foes? Debra Logan CC1. The CISO Survey 2015 Executive Highlights F. Christian Byrnes (CISO Circle Only) CC2. CISO Circle Lunch F. Christian Byrnes CC3. Power Breakfast: Eccentric Leadership (CISO Circle Only) Tina Nunno CC4. CISO Circle Lunch: Strategic Thinking for CxOs F. Christian Byrnes, Tina Nunno CC5. Power Breakfast: A Staff Development Model for Security F. Christian Byrnes CC6. CISO Circle Lunch: People-Centric Intelligence Ash Ahuja; F. Christian Byrnes; Bob Jamieson, UL CC7. CISO Circle Breakfast: I Hacked Your Breakfast Ash Ahuja, Perry Carpenter 2 How do you transform security programs to deal with the challenges of digital business? B3. Your Network Security 2020: A Look Back Adam Hils, Greg Young B4. Managed Services for the Five Styles of Advanced Threat Defense Kelly M. Kavanagh B5. Technology Is Driving the Third Wave of Threat Intelligence in Enterprises? Craig Lawson B6. The Cyber Kill Chain Craig Lawson B7. Astounding Science Fiction and/or Internet of Things Security Scenarios John Girard, Greg Young B8. Mind the SaaS Security Gaps Craig Lawson B10. Pushing the Boundaries of SIEM Kelly M. Kavanagh B12. Lessons Learned on Advanced Threat Defense Strategies and Tools Lawrence Orans B14. Data Masking: Protecting Data Against Insiders Joseph Feiman B15. Overcoming Five Key Obstacles to Success in Content-Aware DLP Deployments Brian Reed C2. Case Study: Top Threats, Vulnerabilities and Hiring Challenges Is a CISO to Do? Mark Eggleston, CISSP, GSEC, CHPS, Director, Security & Business Continuity, Health Partners Plans; Adam Hils 1

2 C3. Network Security Guide to BYOD 2015 Update Claudio Neiva, Lawrence Orans C4. Who Needs a VPN? John Girard C5. Signature Series: Gartner s Adaptive Security Architecture New Approaches for Advanced and Insider Threats Neil MacDonald C6. DDoS Attacks Are Here to Stay Now? Lawrence Orans C7. The Canary in the Digital Age, Detecting the Persistent Attacker Before It Is Too Late Peter Firstbrook C8. Secure Use of AWS and Azure: Comparison and Best Practices Neil MacDonald C9. Securing the Next-Generation Data Center With Software-Defined Security Neil MacDonald C10. Defending Endpoints From the Persistent Attack Peter Firstbrook C11. Network Segmentation Best Practices Greg Young C16. Reduce the Risks and Implement Data Access Controls Now! Brian Lowans C15. Challenging Decisions: Third-Party Security Assurance Landscape D1. Network Security: How Much Is Enough? Brian Lowans D2. Signature Series: The Next Three Years in Threats Greg Young D7. Operational Technology Security Is Not Just for Industries Anymore Earl Perkins D11. SIEM for Hybrid Technology and Service Deployment Claudio Neiva D13. Case Study: Play How You Practice Securing Applications Across Development and Operations by Unifying IAST and RASP Brian Chess, SVP, NetSuite 3 are some of the practical methods to apply Gartner s three dimensions of risk management? F1./G1. General Session: Digital Business and Your New Relationship With Risk Paul E. Proctor F2. Magic Quadrant for Operational Risk Management John A. Wheeler F3. Changing Your Security Culture: Why Change Is Hard and to Do About It Debra Logan F4. Career Path: Digital Risk Officer Paul E. Proctor F8. Use a Vendor Risk Management Framework to Mitigate Regulatory, Compliance, Security and Performance Issues Christopher Ambrose F5. Building Advanced KRIs: Risk Metrics That Influence Business Decisions Paul E. Proctor F6. Eight New Trends Disrupt the E-Discovery Status Quo Jie Zhang F9. Crossfire: Quantitative vs. Qualitative Risk Assessment Perry Carpenter, Paul E. Proctor F12. One Simple Way to Get Your CEO to Embrace Risk Management John A. Wheeler F13. Vendor Intelligence Using Data Analytics to Monitor and Mitigate Vendor Risk Christopher Ambrose F14. Cyberinsurance: To Buy or Not to Buy? Juergen Weiss F15. Software Asset Management The Essentials Victoria Barber F16. GRC: Works, Doesn t Paul E. Proctor G5. Ten Critical Elements for Successful Risk Management Programs John A. Wheeler G6. Four Rules That Define the Boundaries of the Internal Auditor s Role in Risk Management G7. s New and Hot in GRC? John A. Wheeler G8. Software Licensing Is a Risk. Is Your Organization Managing It? Victoria Barber G9. Signature Series: Top Trends in Corporate Compliance and Oversight Jeffrey Wheatman G13. E-Discovery Magic Quadrant Jie Zhang G12. How to Present Risk to Board-Level Management: Key Take-Aways From Visa Jeremiah Kung, Visa; G2. How to Know If Your Vendor Is in Trouble Christopher Ambrose G14. Privacy and the Internet of Things: Risks, Benefits and How to Avoid Crossing the Creepy Line Carsten Casper G16. Using Storytelling to Get Your Risk Management Message Heard Jeffrey Wheatman 2

3 4 are the benefits of cloud computing, and how do you prepare for the costs of mitigating the risks associated with it? AURS5. Comparing Best Practices for Cloud Risk Management Jay Heiser AURS6. Secure Use of Public Cloud Neil MacDonald C1. Signature Series: The Cloud Security Scenario Jay Heiser C8. Secure Use of AWS and Azure: Comparison and Best Practices Neil MacDonald E1. Art of Cloud Security: AWS Edition Erik T. Heidt E2. Designing the Modern Application Security Perimeter With Mobile and Cloud in Mind Ramon Krikken E4. Assessing Cloud Service Providers: Getting Beyond the Checklists Erik T. Heidt E7. Securing Sensitive SaaS Using Cloud Access Security Brokers Ramon Krikken E12. Art of IaaS Cloud Encryption Erik T. Heidt J5. Security in the Cloud: Consider Different Risks and Opportunities Ruggero Contu 5 How do IT organizations adapt to the rapidly changing environment and implement new policies and new technologies to mitigate the risks of the mobile workplace? AURS21. Securing Mobile Payments and Mobile Wallets Dionisio Zumerle AURS25. Is Your EMM/MDM Meeting Your Requirements? Rob Smith AURS29. Mobile Security and BYOD in the Enterprise Dionisio Zumerle B9. Signature Series: Mobile Security Threats and Trends in 2015 John Girard, Dionisio Zumerle B12. Lessons Learned on Advanced Threat Defense Strategies and Tools Lawrence Orans B13. Mobile Application Security Testing Joseph Feiman C3. Network Security Guide to BYOD 2015 Update Lawrence Orans D15. How to Build a Globally Legal and Successful BYOD Program John Girard E9. Mobile Device Security: A Comparison of Platforms Patrick Hevesi J12. Enterprise Mobility Management Magic Quadrant and Critical Capabilities Review Rob Smith 6 are the current best practices, latest issues and trends for IAM? B11. Seven Supporting Services That Application Owners Will Demand From the IAM Team Neil Wynne D5. Titanic or Train Wreck? Ten Signs That Your IAM Program Is About to Go Off Track Brian Iverson D6. Your Cloud Service Adoption Strategy Must Include Data Protection Brian Lowans D8. Future-Proofing IAM Ant Allan D9. Grab the Low-Hanging Fruit to Simplify Your IAM Program Neil Wynne D10. Successfully Selecting an IAM Vendor Neil Wynne D16. Designing the Right Privileged Account Management Solution Anmol Singh E11. Crossfire: Debating Pervasive Data-at-Rest Encryption Great Security or Grand Illusion? Erik T. Heidt J3. User Authentication Vendors Are Not the Only User Authentication Vendors Ant Allan W2. Workshop: The Gartner ITScore Maturity Model for IAM Brian Iverson, Neil Wynne 7 How do you separate hype from reality on cybersecurity? are the best practices to protect your organization in a rapidly changing threat environment? A5. Top Trends and Take-Aways for Cybersecurity Earl Perkins AURS18. Cyberinsurance: Best Practices and Lessons Learned Juergen Weiss B1. How the Internet of Things Will Change Cybersecurity Forever Earl Perkins B6. The Cyber Kill Chain Craig Lawson C14. Cybersecurity, Critical Infrastructure and Risk Adam Hils; Samuel Sanders Visner, SVP and General Manager, F14. Cyberinsurance: To Buy or Not to Buy? Juergen Weiss 3

4 H1. Information Security Is a Business Continuity Issue: Are You Ready? Dr. Nader Mehravari, Carnegie Mellon University; IND1. Healthcare Breakfast: Cybersecurity Incidents and Response Management for Healthcare Organizations Kimberly Elizabeth Pagani, Belinda Wilson, Mary E. Wujek K3. Keynote: Cybersecurity Scenario 2020 The Impact of Digital Business on Security F. Christian Byrnes K4. Keynote: U.S. Intelligence, Defense and Cybersecurity Strategies Leon Panetta, U.S. Secretary of Defense ( ), Director, Central Intelligence Agency ( ), Chief of Staff to President Bill Clinton ( ), and Co-founder, Panetta Institute for Public Policy K5. Guest Keynote: Inkjet Business Model Considered Harmful Cory Doctorow, Journalist, Science Fiction Author, Activist and Blogger WC15. Water Cooler Session: Q&A With Samuel Visner on Cybersecurity, Critical Infrastructure and Risk Adam Hils; Samuel Sanders Visner, SVP and General Manager, Cybersecurity, ICF International 8 skills and knowledge do I need to advance my capabilities as a security and risk manager? AURS2. Presenting to the Board and Executive Committees Perry Carpenter AURS24. The Expanding Role of the Security Professional in the Enterprise Earl Perkins CC1. The CISO Survey 2015 Executive Highlights F. Christian Byrnes (CISO Circle Only) CC3. Power Breakfast: Eccentric Leadership Tina Nunno (CISO Circle Only) CC4. CISO Circle Lunch: Strategic Thinking for CxOs F. Christian Byrnes, Tina Nunno CC5. Power Breakfast: A Staff Development Model for Security F. Christian Byrnes CC6. CISO Circle Lunch: People-Centric Intelligence Ash Ahuja; F. Christian Byrnes; Bob Jamieson, UL CC7. CISO Circle Breakfast: I Hacked Your Breakfast Ash Ahuja, Perry Carpenter D3. General Session: Overcoming Political Land Mines to Accelerate Change Tina Nunno E11. Crossfire: Debating Pervasive Data-at-Rest Encryption Great Security or Grand Illusion? Erik T. Heidt, Ramon Krikken F1./G1. General Session: Digital Business and Your New Relationship With Risk Paul E. Proctor F3. Changing Your Security Culture: Why Change Is Hard and to Do About It Debra Logan F4. Career Path: Digital Risk Officer Paul E. Proctor F5. Building Advanced KRIs: Risk Metrics That Influence Business Decisions Paul E. Proctor F11./G11. General Session: Trust in the New World PayPal s Approach to Risk and the Evolving Role of the CRO Tomer Barel, CRO, PayPal; Avivah Litan F12. One Simple Way to Get Your CEO to Embrace Risk Management John A. Wheeler G4. Women in Security and Risk Management Victoria Barber, Avivah Litan, Debra Logan, Tina Nunno,, K1. Opening Keynote: Manage Risk and Deliver Security in a Digital World Ant Allan, Peter Firstbrook, Avivah Litan K3. Keynote: Cybersecurity Scenario 2020 The Impact of Digital Business on Security F. Christian Byrnes K4. Keynote: U.S. Intelligence, Defense and Cybersecurity Strategies Leon Panetta, U.S. Secretary of Defense ( ), Director, Central Intelligence Agency ( ), Chief of Staff to President Bill Clinton ( ), and Co-founder, Panetta Institute for Public Policy K5. Guest Keynote: Inkjet Business Model Considered Harmful Cory Doctorow, Journalist, Science Fiction Author, Activist and Blogger K6. Closing Keynote: The Great Race to Digital Moments Chris Howard W3. Workshop: Make the Business Case and Obtain BCM Program Executive Sponsorship Belinda Wilson, 9 Why do organizations need to anticipate the unexpected, and work to enable a discipline of risk management and business disruption response and recovery in the corporate culture, toward the goal of business resilience? H1. Information Security Is a Business Continuity Issue: Are You Ready? Dr. Nader Mehravari, Carnegie Mellon University; H2. The Availability Implications for Digital Business H3. The BIA is Complete Now? Yannick Bergeron, Belinda Wilson H4. Case Study: Best Practices for Globally Managing Business Continuity A Reed Elsevier Case Study Alice Kaltenmark, MBCP, MBCI, Director, Global IT Service Continuity Management, Reed Elsevier Technology Services; John P. Morency 4

5 H7. Supplier Contingency Planning Christopher Ambrose H8. Makes Organizations Resilient and Why You Should Care Lynnda Nelson, President, ICOR; H9. Qualcomm Case Study: Activations Have We Learned? Suzanna Hall, Senior Manager, Business Continuity, Qualcomm; Katie Wiest, Director Operations, Qualcomm; Belinda Wilson H10. Enhance Your Reputation Through Crisis Communications and Emergency Notifications Richard Bieber, Ultimate Software; John Trusty Hicks, Program Manager, Asset Protection Solutions, Walgreens; H11. Using the BCI s Good Practice Guidelines for Program Development and Maturation Belinda Wilson; Brian Zawada, FBCI, MBCP, President, The Business Continuity Institute H12. Why Crisis Management Is the Heart of BCM Software H16. Justifying and Implementing IT Service Continuity John P. Morency 10 are the top trends, market outlooks and emerging approaches that provide the greatest opportunity for vendors to expand their offerings or customer reach? J1. Top Market Trends in the Endpoint Detection and Response Market Lawrence Pingree J2. The Impact of Data Center Transformation on Security Eric Ahlm J3. User Authentication Vendors Are Not the Only User Authentication Vendors Ant Allan J4. Future of Endpoint Management Rob Smith J5. Security in the Cloud: Consider Different Risks and Opportunities Ruggero Contu J6. To the Point: Enterprise Network Firewalls Magic Quadrant Adam Hils J7. Security Incident Response in the Age of the APT Anton Chuvakin J8. The Three-Year Outlook for Advanced Threat Solutions Eric Ahlm J10. Are UTM and NGFW Firewalls Really Just the Same? Eric Ahlm, Sid Deshpande, Adam Hils J11. Crisis of Trust: The Supply Chain Is Doomed Jay Heiser, Neil MacDonald J12. Enterprise Mobility Management Magic Quadrant and Critical Capabilities Review Rob Smith J13. Discussion of Network Forensics Challenges and Provider Solutions Sid Deshpande, Lawrence Pingree J14. CASBs: The Fastest Maturing Emerging Market in Security Eric Ahlm, Sid Deshpande J15. Signature Series: Information Security Buying Behaviors and Budget Trends 2015 Lawrence Pingree 11 are the insights into the architecture and use of security technologies to manage risk appropriately? E1. Art of Cloud Security: AWS Edition Erik T. Heidt E2. Designing the Modern Application Security Perimeter With Mobile and Cloud in Mind Ramon Krikken E3. How to Collect, Refine and Use Threat Intelligence Anton Chuvakin E4. Assessing Cloud Service Providers: Getting Beyond the Checklists Erik T. Heidt E5. How to Use Attack Chain Model to Plan Security Monitoring Anton Chuvakin, Ramon Krikken E7. Securing Sensitive SaaS Using Cloud Access Security Brokers Ramon Krikken E8. How to Build a Hybrid DDoS Defense Architecture Patrick Hevesi E11. Crossfire: Debating Pervasive Data-at-Rest Encryption Great Security or Grand Illusion? Erik T. Heidt, Ramon Krikken E9. Mobile Device Security: A Comparison of Platforms Patrick Hevesi E12. Art of IaaS Cloud Encryption Erik T. Heidt E13. Insider Threat: NOT an IT Problem? Anton Chuvakin; Erik T. Heidt; Moderator: Patrick Hevesi E16. SIEM Architecture and Operational Processes Anton Chuvakin 5

6 12 are the security and risk management practices and solutions that fit with the drivers unique to SMB organizations? A2. Protecting Your House on the Prairie: Security Strategy for the Smaller Enterprise Rob McMillan, Tom Scholtz B4. Managed Services for the Five Styles of Advanced Threat Defense Kelly M. Kavanagh B8. Mind the SaaS Security Gaps Craig Lawson B9. Signature Series: Mobile Security Threats and Trends in 2015 John Girard, Dionisio Zumerle C3. Network Security Guide to BYOD 2015 Update Claudio Neiva, Lawrence Orans C6. DDoS Attacks Are Here to Stay: Now? Lawrence Orans C10. Defending Endpoints From the Persistent Attack Peter Firstbrook D1. Network Security: How Much Is Enough? Brian Lowans D6. Your Cloud Service Adoption Strategy Must Include Data Protection Brian Lowans D9. Grab the Low-Hanging Fruit to Simplify Your IAM Program Neil Wynne D10. Successfully Selecting an IAM Vendor Neil Wynne G5. Ten Critical Elements for Successful Risk Management Programs John A. Wheeler J5. Security in the Cloud: Consider Different Risks and Opportunities Ruggero Contu J15. Signature Series: Information Security Buying Behaviors and Budget Trends 2015 Lawrence Pingree WC7./WC9./WC14. Water Cooler Session: Insights and Advice for Midmarket Security Leaders James A. Browning, Mike Cisek, Adam Hils, Kelly M. Kavanagh 13 are some of the top security and risk management issues facing financial services? AURS18. Cyberinsurance: Best Practices and Lessons Learned Juergen Weiss AURS27. Digital Creepiness in Financial Services: Risk Professionals Should Prepare For Juergen Weiss B2. The Dark Side of Payment Card Security Avivah Litan B9. Signature Series: Mobile Security Threats and Trends in 2015 John Girard, Dionisio Zumerle C1. Signature Series: The Cloud Security Scenario Jay Heiser C8. Secure Use of AWS and Azure: Comparison and Best Practices Neil MacDonald C14. Case Study: Cybersecurity, Critical Infrastructure and Risk Adam Hils; Samuel Sanders Visner, SVP and General Manager, D5. Titanic or Train Wreck? Ten Signs That Your IAM Program Is About to Go Off Track Brian Iverson D6. Your Cloud Service Adoption Strategy Must Include Data Protection Brian Lowans D8. Future-Proofing IAM Ant Allan D9. Grab the Low-Hanging Fruit to Simplify Your IAM Program Neil Wynne D10. Successfully Selecting an IAM Vendor Neil Wynne D16. Designing the Right Privileged Account Management Solution Anmol Singh E1. Art of Cloud Security: AWS Edition Erik T. Heidt E2. Designing the Modern Application Security Perimeter With Mobile and Cloud in Mind Ramon Krikken E7. Securing Sensitive SaaS Using Cloud Access Security Brokers Ramon Krikken E9. Mobile Device Security: A Comparison of Platforms Patrick Hevesi F11./G11. Trust in the New World: PayPal s Approach to Risk and the Evolving Role of the CRO Tomer Barel, CRO, PayPal; Avivah Litan F14. Cyberinsurance: To Buy or Not to Buy Juergen Weiss G3. Digital Creepiness in Financial Services Risk Professionals Should Prepare For Juergen Weiss G12. How to Present Risk to Board-Level Management: Key Take-Aways From Visa Jeremiah Kung, Visa; 6

7 G14. Privacy and the Internet of Things: Risks, Benefits and How to Avoid Crossing the Creepy Line Carsten Casper IND2. Financial Services Breakfast: Why Defining Right Security Controls the Right Way Matters Homan Farahmand IND5. Financial Services Breakfast: Sharing Best Practices in Cyberinsurance Juergen Weiss J3. User Authentication Vendors Are Not the Only User Authentication Vendors Ant Allan W2. Workshop: The Gartner ITScore Maturity Model for IAM Brian Iverson, Neil Wynne 14 are some of the top security and risk management issues facing education institutions? A5. Top Trends and Take-Aways for Cybersecurity Earl Perkins AURS3. Handling Encrypted Traffic and Other Security Gaps Jeremy D Hoinne B1. How the Internet of Things Will Change Cybersecurity Forever Earl Perkins B9. Signature Series: Mobile Security Threats and Trends in 2015 Dionisio Zumerle C14. Case Study: Cybersecurity, Critical Infrastructure, and Risk Adam Hils; Samuel Sanders Visner, SVP and General Manager, D5. Titanic or Train Wreck? Ten Signs That Your IAM Program Is About to Go Off Track Brian Iverson D6. Your Cloud Service Adoption Strategy Must Include Data Protection Brian Lowans D8. Future-Proofing IAM Ant Allan D9. Grab the Low-Hanging Fruit to Simplify Your IAM Program Neil Wynne D10. Successfully Selecting an IAM Vendor Neil Wynne D16. Designing the Right Privileged Account Management Solution Anmol Singh E9. Mobile Device Security: A Comparison of Platforms Patrick Hevesi G14. Privacy and the Internet of Things: Risks, Benefits and How to Avoid Crossing the Creepy Line Carsten Casper IND6. Education Breakfast: Maintaining Privacy and Security as Education Technology Proliferates David Irwin, Steven L. Kaplan J3. User Authentication Vendors Are Not the Only User Authentication Vendors Ant Allan W2. Workshop: The Gartner ITScore Maturity Model for IAM Brian Iverson, Neil Wynne 15 are some of the top security and risk management issues facing healthcare organizations? A9. General Session: Pulling Back the Wizard s Curtain LabMD s CEO Michael J. Daugherty Reveals the FTC s Data Security Investigation Secrets, Tricks and Tactics Michael J. Daugherty B1. How the Internet of Things Will Change Cybersecurity Forever Earl Perkins B6. The Cyber Kill Chain Craig Lawson B9. Signature Series: Mobile Security Threats and Trends in 2015 John Girard, Dionisio Zumerle C2. Case Study: Top Threats, Vulnerabilities and Hiring Challenges Is a CISO to Do? Mark Eggleston, CISSP, GSEC, CHPS, Director, Security & Business Continuity, Health Partners Plans; Adam Hils C14. Case Study: Cybersecurity, Critical Infrastructure and Risk Adam Hils; Samuel Sanders Visner, SVP and General Manager, E6. Case Study: Mayo Clinic Eric Maiwald; Kevin McDonald, Director, Clinical Information Security, Mayo Clinic E9. Mobile Device Security: A Comparison of Platforms Patrick Hevesi F14. Cyberinsurance: To Buy or Not to Buy? Juergen Weiss G14. Privacy and the Internet of Things: Risks, Benefits and How to Avoid Crossing the Creepy Line Carsten Casper H1. Information Security Is a Business Continuity Issue: Are You Ready? Dr. Nader Mehravari, Carnegie Mellon University; 7

8 IND1. Healthcare Breakfast: Cybersecurity Incidents and Response Management for Healthcare Organizations Kimberly Elizabeth Pagani, Belinda Wilson, Mary E. Wujek IND4. Healthcare Breakfast: Technical Gaps in Medical Device Security Kevin McDonald, Mayo Clinic; Earl Perkins IND7. Healthcare Breakfast: The Tug of War Between Protection and Transparency of Patient Data Mark E. Gilbert, Kevin K. Kampman IND8. Financial Services Breakfast: Risk Management Challenges in Financial Services Juergen Weiss IND10. Healthcare Breakfast: How Much Should Healthcare Organizations Be Investing in Information Security? Tom McClure, Steve Ying WC3. Water Cooler Session: Follow-Up to Mark Eggleston s Case Study (C2) 16 are some of the top security and risk management issues facing government agencies? F14. Cyberinsurance: To Buy or Not to Buy Juergen Weiss H1. Information Security Is a Business Continuity Issue: Are You Ready? Dr. Nader Mehravari, Carnegie Mellon University; IND3./IND9. Government Breakfast Katell Thielemann J5. Security in the Cloud: Consider Different Risks and Opportunities Ruggero Contu K3. Keynote: Cybersecurity Scenario 2020 The Impact of Digital Business on Security F. Christian Byrnes K4. Keynote: U.S. Intelligence, Defense and Cybersecurity Strategies Leon Panetta, U.S. Secretary of Defense ( ), Director, Central Intelligence Agency ( ), Chief of Staff to President Bill Clinton ( ), and Co-founder, Panetta Institute for Public Policy K6. Closing Keynote: The Great Race to Digital Moments Chris Howard A5. Top Trends and Take-Aways for Cybersecurity Earl Perkins B1. How the Internet of Things Will Change Cybersecurity Forever Earl Perkins B6. The Cyber Kill Chain Craig Lawson B7. Astounding Science Fiction and/or Internet of Things Security Scenarios John Girard, Greg Young C1. Signature Series: The Cloud Security Scenario Jay Heiser C6. DDoS Attacks Are Here to Stay Now? Lawrence Orans C8. Secure Use of AWS and Azure: Comparison and Best Practices Neil MacDonald C11. Network Segmentation Best Practices Greg Young C14. Case Study: Cybersecurity, Critical Infrastructure and Risk Adam Hils; Samuel Sanders Visner, SVP and General Manager, D2. Signature Series: The Next Three Years in Threats Greg Young E1. Art of Cloud Security: AWS Edition Erik T. Heidt E2. Designing the Modern Application Security Perimeter With Mobile and Cloud in Mind Ramon Krikken E7. Securing Sensitive SaaS Using Cloud Access Security Brokers Ramon Krikken 8

Gartner Security & Risk Management Summit 2015

Gartner Security & Risk Management Summit 2015 EARLY-BIRD Discount Save 325 by 17 July Gartner Security & Risk Management Summit 2015 14 15 September London, UK gartnerevent.com/eu/security The World s Most Important Gathering for Security and Risk

More information

Gartner Security & Risk Management Summit 2015

Gartner Security & Risk Management Summit 2015 EARLY-BIRD Discount Save $300 by 4 September Gartner Security & Risk Management 2015 2 3 November Raffles Hotel, Dubai, UAE gartner.com/me/security Manage Risk and Deliver Security in a Digital World Hot

More information

Gartner Security & Risk Management Summit 2015

Gartner Security & Risk Management Summit 2015 EARLY-BIRD Discount Save 325 by 17 July Gartner Security & Risk Management Summit 2015 14 15 September London, UK gartner.com/eu/security The World s Most Important Gathering for Security and Risk Executives

More information

Gartner Security & Risk Management Summit 2015

Gartner Security & Risk Management Summit 2015 EARLY-BIRD Discount Save $400 by 26 June Gartner Security & Risk Management Summit 2015 24 25 August Hilton Sydney gartner.com/ap/security Manage Risk and Deliver Security in a Digital World Hot topics

More information

Gartner Security & Risk Management Summit 2014

Gartner Security & Risk Management Summit 2014 Gartner Security & Risk Management Summit 2014 25 26 August Hilton Sydney, Australia gartner.com/ap/security Smart Risk Balancing Security and Opportunity Hot Topics People-Centric Security Governance

More information

Gartner Security & Risk. Management. Summit 2012. Visit gartner.com/us/securityrisk or call 1 866 405 2511 to register

Gartner Security & Risk. Management. Summit 2012. Visit gartner.com/us/securityrisk or call 1 866 405 2511 to register Visit gartner.com/us/securityrisk or call 1 866 405 2511 to register FIVE COMPLETE PROGRAMS CISO Program IT Security Business Continuity Management Risk Management and Compliance New! The Business of IT

More information

Gartner Security & Risk. Management Summit 2015. Trip Report. Overview. Manage Risk and Deliver Security in a Digital World.

Gartner Security & Risk. Management Summit 2015. Trip Report. Overview. Manage Risk and Deliver Security in a Digital World. Gartner Security & Risk Management Summit 2015 June 8 11 National Harbor, MD gartner.com/us/securityrisk Manage Risk and Deliver Security in a Digital World Trip Report Gartner Security & Risk Management

More information

Gartner Security & Risk Management Summit 2015

Gartner Security & Risk Management Summit 2015 EARLY-BIRD DISCOUNT Save 6,500 by 3 July Gartner Security & Risk Management 2015 1 2 September Mumbai, India gartner.com/in/security Manage Risk and Deliver Security in a Digital World Hot topics Cybersecurity

More information

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab: While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab: A copy of today s presentation and our Upcoming webinars Information on how to dial in if

More information

FROM PRODUCT TO PLATFORM

FROM PRODUCT TO PLATFORM FROM PRODUCT TO PLATFORM DATA EQUIPMENT 2016 Mikkel Bossen Agenda Today s Challenges Data Growth, SSL encryption, Application Growth & SaaS What s hiding in under the surface? Legacy Security is that really

More information

Address C-level Cybersecurity issues to enable and secure Digital transformation

Address C-level Cybersecurity issues to enable and secure Digital transformation Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,

More information

Gartner Magic Quadrant Sources and Disclaimer

Gartner Magic Quadrant Sources and Disclaimer Gartner Magic Quadrant Sources and Disclaimer 1. Gartner Magic Quadrant for Network Access Control; by Lawrence Orans, John Pescatore, Mark Nicolett; March 27, 2009 2. Gartner Magic Quadrant for Endpoint

More information

Gartner Identity & Access Management Summit 2015

Gartner Identity & Access Management Summit 2015 EARLY-BIRD Discount Save 300 by 16 January 2015 Gartner Identity & Access Management Summit 2015 16 17 March London, UK gartnerevent.com/eu/iam Successful IAM Simple, Business Driven and Secure Key benefits

More information

Gartner Information Security Summit 2009

Gartner Information Security Summit 2009 Gartner Information Security Summit 2009 June 28 July 1, 2009 Washington, D.C. Evolve your role. Optimize value. Protect the business. EARN CPE Credits! See Page 7 for details. Conference Co-Chairs Vic

More information

Workshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business

Workshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business Workshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business Earl Perkins Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced

More information

Phone: +44 20 8123 2220 Fax: +44 207 900 3970 [email protected] https://marketpublishers.com

Phone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and Security

More information

Gartner IT Infrastructure & Operations Management Summit 2013

Gartner IT Infrastructure & Operations Management Summit 2013 Management Summit 0 June 8 0 Orlando, FL gartner.com/us/iom Delivering on your top priorities Gartner IT Infrastructure & Operations Management Summit 0 arms you with the strategies, techniques and best

More information

Delivering Control with Context Across the Extended Network

Delivering Control with Context Across the Extended Network Delivering Control with Context Across the Extended Network Agenda Current Challenges Cisco ISE Overview Introducing Cisco pxgrid Customer Success Stories Only Cisco ISE Delivers 2013-2014 Cisco and/or

More information

Understanding the Security Vendor Landscape Using the Cyber Defense Matrix

Understanding the Security Vendor Landscape Using the Cyber Defense Matrix SESSION ID: PDIL-W02F Understanding the Security Vendor Landscape Using the Cyber Defense Matrix Sounil Yu [email protected] @sounilyu Disclaimers The views, opinions, and positions expressed in this presentation

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

Cybersecurity Strategic Consulting

Cybersecurity Strategic Consulting Home Overview Challenges Global Resource Growth Impacting Industries Why Capgemini Capgemini & Sogeti Cybersecurity Strategic Consulting Enabling business ambitions, resilience and cost efficiency with

More information

o Cost containment through effective and SAP IT Procurement & negotiation strategies to help them achieve best-inclass, purchasing Asset Management

o Cost containment through effective and SAP IT Procurement & negotiation strategies to help them achieve best-inclass, purchasing Asset Management Alexa Bona s research currently focuses on IT management. As part of the IT Procurement and Asset o Workshop: Six Steps to Preparing and Negotiating Software Contracts o Negotiating effective sustainable

More information

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

The Changing IT Risk Landscape Understanding and managing existing and emerging risks The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015

More information

Logging In: Auditing Cybersecurity in an Unsecure World

Logging In: Auditing Cybersecurity in an Unsecure World About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that

More information

Gartner Identity & Access Management Summit 2013

Gartner Identity & Access Management Summit 2013 Gartner Identity & Access Management Summit 2013 November 18 20 Los Angeles, CA gartner.com/us/iam HOT TOPICS IAM SUPPORTING MOBILE, SOCIAL, CLOUD AND INFORMATION INITIATIVES IAM BEST PRACTICES FOR DEPLOYMENT

More information

www.pwc.co.uk Cyber security Building confidence in your digital future

www.pwc.co.uk Cyber security Building confidence in your digital future www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in

More information

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council Rethinking Information Security for Advanced Threats CEB Information Risk Leadership Council Advanced threats differ from conventional security threats along many dimensions, making them much more difficult

More information

The Benefits of an Integrated Approach to Security in the Cloud

The Benefits of an Integrated Approach to Security in the Cloud The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The

More information

The Cyber Threat Landscape

The Cyber Threat Landscape The Cyber Threat Landscape Oliver Rochford Research Director Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without

More information

Cybersecurity The role of Internal Audit

Cybersecurity The role of Internal Audit Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government

More information

Westcon Presentation on Security Innovation, Opportunity, and Compromise

Westcon Presentation on Security Innovation, Opportunity, and Compromise Westcon Presentation on Security Innovation, Opportunity, and Compromise Christian A. Christiansen Program Vice President IDC Security Products & Services What s Happening with Threats? 1.5B 80% 33% $1.3M

More information

RETHINKING CYBER SECURITY Changing the Business Conversation

RETHINKING CYBER SECURITY Changing the Business Conversation RETHINKING CYBER SECURITY Changing the Business Conversation October 2015 Introduction: Diane Smith Michigan Delegate Higher Education Conference Speaker Board Member 2 1 1. Historical Review Agenda 2.

More information

Cyber Security Market by Solution - Global Forecast to 2020

Cyber Security Market by Solution - Global Forecast to 2020 Brochure More information from http://www.researchandmarkets.com/reports/3287011/ Cyber Security Market by Solution - Global Forecast to 2020 Description: 'Cyber Security Market by Solution (IAM, Encryption,

More information

Cybersecurity: Mission integration to protect your assets

Cybersecurity: Mission integration to protect your assets Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions

More information

Accelerating Enterprise Growth by Leveraging Strategic Solutions. Eva Chen CEO and Co-Founder

Accelerating Enterprise Growth by Leveraging Strategic Solutions. Eva Chen CEO and Co-Founder Accelerating Enterprise Growth by Leveraging Strategic Solutions Eva Chen CEO and Co-Founder OUR CONSISTENT VISION: A world safe for exchanging digital information OUR CORE COMPETENCE: Innovating to staying

More information

Big Data, Big Risk, Big Rewards. Hussein Syed

Big Data, Big Risk, Big Rewards. Hussein Syed Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data

More information

Keynote: Gartner Magic Quadrants and MarketScopes. Ant Allan Felix Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson

Keynote: Gartner Magic Quadrants and MarketScopes. Ant Allan Felix Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson Keynote: Gartner Magic Quadrants and MarketScopes Ant Allan Feli Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson IAM Technologies by Primary Function Administration Intelligence Authentication Authorization

More information

IBM Security Strategy

IBM Security Strategy IBM Security Strategy Intelligence, Integration and Expertise Kate Scarcella CISSP Security Tiger Team Executive M.S. Information Security IBM Security Systems IBM Security: Delivering intelligence, integration

More information

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA Leading The World Into Connected Security Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA History of Defining Largest Dedicated Delivering a Next Generation Architecture

More information

Key Issues for Identity and Access Management, 2008

Key Issues for Identity and Access Management, 2008 Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research

More information

The Case For A Cloud Access Security Broker

The Case For A Cloud Access Security Broker The Case For A Cloud Access Security Broker 1 Executive summary The SaaS era is here. According to Gartner, SaaS and cloud-based business application services revenue will grow from $13.5 billion in 2011

More information

C21 Introduction to User Access

C21 Introduction to User Access C21 Introduction to User Access Management Introduction to User Access Management What we'll cover today What is it? Why do I care? Current trends in Identity & Access Management How do I audit it? What

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

CYBERSECURITY: ISSUES AND ISACA S RESPONSE CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures Mobile devices Social media Cloud services

More information

Changing the Enterprise Security Landscape

Changing the Enterprise Security Landscape Changing the Enterprise Security Landscape Petr Hněvkovský Presales Consultant, ArcSight EMEA HP Enterprise Security Products 2012 Hewlett-Packard Development Company, L.P. The information contained herein

More information

Defending Against Cyber Security Threats to the Payment and Banking Systems

Defending Against Cyber Security Threats to the Payment and Banking Systems NYU Leonard N. Stern School of Business Master of Science Risk Management RISK MANAGEMENT SYMPOSIUM 2015 Defending Against Cyber Security Threats to the Payment and Banking Systems Andrew Koh Class of

More information

Protecting against cyber threats and security breaches

Protecting against cyber threats and security breaches Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez [email protected] IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So

More information

Reinventing Network Security Vectra s cyber-security thinking machine delivers a new experience in network security

Reinventing Network Security Vectra s cyber-security thinking machine delivers a new experience in network security White Paper Reinventing Network Security Executive Overview Organizations are under constant attack from high-volume opportunistic threats and the less-frequent, but highly targeted attacks. Damage ranges

More information

Developing National Frameworks & Engaging the Private Sector

Developing National Frameworks & Engaging the Private Sector www.pwc.com Developing National Frameworks & Engaging the Private Sector Focus on Information/Cyber Security Risk Management American Red Cross Disaster Preparedness Summit Chicago, IL September 19, 2012

More information

Network Security Redefined. Vectra s cybersecurity thinking machine detects and anticipates attacks in real time

Network Security Redefined. Vectra s cybersecurity thinking machine detects and anticipates attacks in real time Network Security Redefined Vectra s cybersecurity thinking machine detects and anticipates attacks in real time Table of Contents Executive Overview 3 Relying on Prevention is Not Enough 4 Four Reasons

More information

The Business Continuity Maturity Continuum

The Business Continuity Maturity Continuum The Business Continuity Maturity Continuum Nick Benvenuto & Brian Zawada Protiviti Inc. 2004 Protiviti Inc. EOE Agenda Terminology Risk Management Infrastructure Discussion A Proposed Continuity Maturity

More information

RSA Archer Risk Intelligence

RSA Archer Risk Intelligence RSA Archer Risk Intelligence Harnessing Risk to Exploit Opportunity June 4, 2014 Steve Schlarman GRC Strategist 1 Risk and Compliance Where is it today? 2 Governance, Risk, & Compliance Today 3 4 A New

More information

Gartner Security & Risk Management Summit 2012

Gartner Security & Risk Management Summit 2012 Gartner Security & Risk Management Summit 2012 16 17 July 2012 Sydney, Australia gartner.com/ap/security Trip Report Strategic Roadmaps to Secure the Enterprise and Manage Risk Overview INTRODUCTION The

More information

Gartner Security & Risk Management Summit 2013

Gartner Security & Risk Management Summit 2013 Gartner Security & Risk Management Summit 2013 19 20 August Sydney, Australia gartner.com/ap/security THREE COMPLETE PROGRAMS Chief Information Security (CISO) Program Risk Management and Compliance Program

More information

Tuesday, August 19th Prevent, Detect, Respond: A Framework for Effective Cyber Defense Dr. Eric Cole, Fellow, SANS Institute

Tuesday, August 19th Prevent, Detect, Respond: A Framework for Effective Cyber Defense Dr. Eric Cole, Fellow, SANS Institute Tuesday, August 19 th 9:00-9:45 am Keynote Address Prevent, Detect, Respond: A Framework for Effective Cyber Defense Security is now a mainstay of boardroom discussions. However, many organizations remain

More information

www.pwc.nl/cybersecurity Cyber security Building confidence in your digital future

www.pwc.nl/cybersecurity Cyber security Building confidence in your digital future www.pwc.nl/cybersecurity Cyber security Building confidence in your digital future 2015 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence

More information

NCTA Cloud Architecture

NCTA Cloud Architecture NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,

More information

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 BILL S BIO Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. Vice President Controls

More information

How to ensure control and security when moving to SaaS/cloud applications

How to ensure control and security when moving to SaaS/cloud applications How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk

More information

The Evolution of Application Monitoring

The Evolution of Application Monitoring The Evolution of Application Monitoring Narayan Makaram, CISSP, Director, Solutions Marketing, HP Enterprise Security Business Unit, May 18 th, 2012 Rise of the cyber threat Enterprises and Governments

More information

Analyst Biography Symposium Presentations Example Issues He Can Assist With

Analyst Biography Symposium Presentations Example Issues He Can Assist With Neil Chandler BI & Analytics Neil focuses on business intelligence, analytics and performance management. This includes writing about and advising organisations about market trends, vendors, service providers

More information

Critical Controls for Cyber Security. www.infogistic.com

Critical Controls for Cyber Security. www.infogistic.com Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability

More information

SECURITY RISK MANAGEMENT

SECURITY RISK MANAGEMENT SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W

More information

Into the cybersecurity breach

Into the cybersecurity breach Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing

More information

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave

More information

Cyber crime risk management protecting your business 4 November 2015

Cyber crime risk management protecting your business 4 November 2015 Cyber crime risk management protecting your business 4 November 2015 Programme genda (updated 26 Oct) 7.15 am 8.25 am Registration Networking breakfast sponsored by 8.25 am 8.30 am Welcome remarks by MC

More information

Cloud Computing. Key Initiative Overview

Cloud Computing. Key Initiative Overview David W. Cearley Research Vice President and Gartner Fellow This overview provides a high-level description of the Cloud Computing Key Initiative. IT leaders can use this guide to understand what they

More information

Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization

Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization Neil MacDonald VP and Gartner Fellow Gartner Information Security, Privacy and Risk Research Twitter @nmacdona

More information

Metrics that Matter Security Risk Analytics

Metrics that Matter Security Risk Analytics Metrics that Matter Security Risk Analytics Rich Skinner, CISSP Director Security Risk Analytics & Big Data Brinqa [email protected] April 1 st, 2014. Agenda Challenges in Enterprise Security, Risk

More information

North Texas ISSA CISO Roundtable

North Texas ISSA CISO Roundtable North Texas ISSA CISO Roundtable Roundtable Topic Threat Against Our Well Being The Most Effective Methods in Combating and Responding to the Cyber Attack Event Sponsor Moderator and Panelists David Stanton

More information

Intelligence Driven Security

Intelligence Driven Security Intelligence Driven Security RSA Advanced Cyber Defense Workshop Shane Harsch Senior Solutions Principal, RSA 1 Agenda Approach & Activities Operations Intelligence Infrastructure Reporting & Top Findings

More information

CYBER SECURITY INFORMATION SHARING & COLLABORATION

CYBER SECURITY INFORMATION SHARING & COLLABORATION Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers

More information

CYBER SECURITY, A GROWING CIO PRIORITY

CYBER SECURITY, A GROWING CIO PRIORITY www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------

More information

Recognition of Websense Leadership. Industry Analysts Validate Websense Market and Technological Leadership

Recognition of Websense Leadership. Industry Analysts Validate Websense Market and Technological Leadership Recognition of Websense Leadership Industry Analysts Validate Websense Market and Technological Leadership Analysts Recognize Websense 2011 Secure Web Gateway MQ: Leaders Quadrant 2011 Content-Aware Data

More information

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,

More information

Business Continuity for Cyber Threat

Business Continuity for Cyber Threat Business Continuity for Cyber Threat April 1, 2014 Workshop Session #3 3:00 5:30 PM Susan Rogers, MBCP, MBCI Cyberwise CP S2 What happens when a computer program can activate physical machinery? Between

More information

Security and Privacy

Security and Privacy Security and Privacy Matthew McCormack, CISSP, CSSLP CTO, Global Public Sector, RSA The Security Division of EMC 1 BILLIONS OF USERS MILLIONS/BILLIONS OF APPS 2010 Cloud Big Data Social Mobile Devices

More information

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime? Cyber Warfare David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Cyber crime is the fastest growing economic crime up more than 2300% since 2009 1 in 10 companies

More information

Smart Security. Smart Compliance.

Smart Security. Smart Compliance. Smart Security. Smart Compliance. SRM are dedicated to helping our clients stay safe in the information environment. With a wide range of knowledge and practical experience, our consultants are ready to

More information