Rock Stars of

Cybersecurity Technologies

September 26, 2017 | Denver CO

RS Cybersecurity Technologies Badge

Rock Stars of Cybersecurity Technologies

Every industry from tech companies to government agencies, healthcare providers, and retailers are desperate to better protect customer data and intellectual property from cyber-criminals.  While there is no magical solution that works for everyone, at Rock Stars of Cybersecurity Technologies, you’ll hear six top cybersecurity executives share the most significant ways you can predict breaches as well as improve detection and response times.

 

September 26, 2017 | Denver, CO

 

Why Attend?

Cybersecurity leaders share their successes and failures.

  • Ransomware: Understand how to respond to these threats. Better yet, you’ll hear about the best ways to predict them.
  • Extortapalooza: Extortion attacks aren’t new. Hear the new ways to avoid them.
  • Prediction is emerging as the new Holy Grail of cybersecurity. Prevention is passé, and even detection technologies will be supplanted by prediction, with machine learning becoming a key tool to help organizations anticipate where hackers will strike.

 

Speakers

Paul Edlund Abstract and Bio

Paul Edlund: What is Microsoft Doing in Security?

You could read the title of this session in many ways.  You could read it like “Microsoft is in the security business?” or perhaps “How is Microsoft affecting the security of my company if I use other stuff?” or even “What is Microsoft DOING to secure my business?”Click here to Read More

 

Paul is a passionate learner and someone who thrives in places where people are looking for ways to solve their toughest technology problems. He spends a lot of time figuring out ways to define complex technologies in plain English. As the CTO for Microsoft in the Midwest District, Paul has a desire to help customers navigate the complexity of their own industries while leveraging Microsoft's tools, methodologies, and resources to solve their toughest problems.Click here to Read More

 

Sumit Sehgal Abstract and Bio

Sumit Sehgal: Evidence-Based Security - Reality or Fantasy...

2016 was a year of fundamental shifts in cybercrime. We saw whole industries fall to ransomware, and in particular, healthcare. IoT exposes vulnerabilities that can literally threaten lives in a healthcare ecosystem.

This session, presented by a leading cybersecurity healthcare strategist, offers practical, actionable advice on how to build a security program that goes past just data protection and regulatory compliance. Click here to Read More

Sumit Sehgal is the Chief Healthcare Technical Strategist for McAfee. His primary focus is on identifying needs specific to the healthcare industry from a products and practices perspective. Sehgal leverages his extensive experience in Health IT to identify priorities that are key in helping McAfee roadmap the next generation of solutions in this space.Click here to Read More

Dr Scott Zoldi Abstract and Bio

Dr. Scott Zoldi: Analytics Tackles Cyber Security

Artificial intelligence and machine learning technologies are commonplace today to detect financial crime.  Credit risk scorecards have long been used to empirically quantify and operationalize risk appetite.  We will contrast state of art in financial spheres to Cyber Security today and review leading artificial intelligence technologies such as self-calibrating models, collaborative profiles, and anomaly detection techniques in the fight against cyber threat and use in cyber risk prediction.

Scott Zoldi is Chief Analytics Officer at FICO responsible for the analytic development of FICO’s product and technology solutions, including the FICO™ Falcon® Fraud Manager product which protects about two-thirds of the world’s payment card transactions from fraud. While at FICO, Scott has been responsible for authoring 79 analytic patents with 38 patents granted and 41 in process. Scott is actively involved in the development of new analytic products utilizing Artificial Intelligence and Machine Learning technologies.  Scott is most recently focused on the applications of streaming self-learning analytics for real-time detection of Cyber Security attack.

Gary Hayslip

Gary Hayslip
Vice President & CISO,
Webroot Inc.

Gary Hayslip Abstract and Bio

Gary Hayslip: Cyber, an evolving ecosystem: Learn how cyber designs of Smart Cities can protect your company’s data and the accompanying risk exposure.

Key insights from today’s smart, big cities can be applied to companies and corporations.  A revolution in technology is underway. Larger municipalities across the globe are taking the International Organization for Standardization (ISO) 37150/51 Smart Community frameworks to heart and are looking to a future in which they must manage the massive data generated by public services.Click here to Read More

As Chief Information Security Officer (CISO) for the City of San Diego, Gary advises the City of San Diego’s executive leadership consisting of Mayoral, City Council, and 40+ city departments and agencies on protecting city government information resources. Gary oversees citywide cyber security strategy and the enterprise cyber security program, cyber operations, compliance and risk assessment services. His mission includes creating a “risk aware” culture that places a high value on securing city information resources and protecting personal information entrusted to the City of San Diego. Click here to Read More

Andy Ellis Abstract and Bio

Andy Ellis: Tackling the Impending Complexity Apocalypse

The course of human evolution is one where certain risk management behaviors have helped us thrive (and dominate the planet).  The advent of increasingly complex systems, social networks, and real-time communications have combined to create an environment where humanity’s optimized behaviors may lead to questionable, and dangerous, decision-making.  How did we get here - and how can we blunt the effects of this perfect storm?

Bio: Andy Ellis is Akamai's Chief Security Officer, governing the safety, resilience, and compliance of its planetary-scale network. He is the designer of several critical Akamai technologies, including its secure TLS acceleration network and many of the core components of the company’s web security solutions.Click here to Read More

Daneen DeFiore Abstract and Bio

Daneen DeFiore: NextGen Risk: Information Security in a Digital World

As companies embrace digital solutions and next generation IT, it's up to us as Information Security professionals to understand and manage the associated risk.  It's no longer just about risk avoidance and mitigation, but rather acknowledging how to unlock the value of new tools, processes, and approaches through effective risk management that maximizes return on investment. Join as Deneen describes her company’s views concerning Next Generation IT threat management on their IT transformation journey.

 

Cindy Cullen Abstract and Bio

Cindy Cullen: CyberSecurity and the Digital Revolution

The digital revolution is happening around us. Transformations include:

  • Technology – Cloud, IoT, SAAS, smart devices
  • Business – Netflix, Uber, Amazon, PayPal, GE, Walt Disney Company
  • Social – housing, marriage, purchases, ownership
  • Governance – privacy, compliance, financial services
  • Cybercriminals/nation-state hackers/hacktivists – ransomware, social engineering, exploiting known vulnerabilities

Cybersecurity is a major initiative of every government, company, and society. Governance, risk, compliance, security frameworks, strategies, services, products/tools … are all undergoing major shifts to transformation to meet the challenges of the digital revolution.
This talk will address how cybersecurity is transforming to meet the challenges of the digital revolution.

Bio: Ms. Cullen has 15+ years experience leading cybersecurity and information risk programs. Cindy is President of the NJ Chapter of (ISC)2, is an experienced vCISO, was Chief Cyber Security Strategist at HPE driving strategic initiatives and providing thought leadership and insight regarding the ever-changing global threat landscape.  Additionally, she was an ICIT Fellow advising Congress and staff on cybersecurity issues, was CISO at Telcordia/Bellcore, VP – Information Security Officer at Citi, CTO at SAFE BioPharma and designed an S-SDLC process for Bristol-Myers Squibb. Cindy is an in-demand speaker with experience at national & international venues (i.e. NIST, OWASP, RSA, …).

Coffee and Tea: 8:00 a.m. - 9:00 a.m.

Morning Session: 9:00 a.m. – 12:10 p.m.

Paul Edlund
Chief Technologist, Core Technologies, Microsft

What Is Microsoft Doing in Security?

You could read the title of this session in many ways.  You could read it like “Microsoft is in the security business?” or perhaps “How is Microsoft affecting the security of my company if I use other stuff?” or even “What is Microsoft DOING to secure my business?” Either way, there will be something in this session for everyone as Microsoft discusses how they leverage hyperscale data to help companies become more secure… even if you’re not a Microsoft customer.  We will discuss the types of things we see, how we mitigate against threats, and how we leverage Artificial Intelligence and Machine Learning to stop bad things on the Internet.  We might even discuss the future and what Microsoft thinks about some of the bigger risks coming in the next few years.


Gary Hayslip
Vice President & CISO, Webroot Inc.

Cyber, an evolving ecosystem: Learn how cyber designs of Smart Cities can protect your company’s data and the accompanying risk exposure.

Key insights from today’s smart, big cities can be applied to companies and corporations.  A revolution in technology is underway. Larger municipalities across the globe are taking the International Organization for Standardization (ISO) 37150/51 Smart Community frameworks to heart and are looking to a future in which they must manage the massive data generated by public services.

This rapid urban growth and rise of mega-cities will require municipalities to design and implement an intelligent infrastructure that will provide essential services to their residents. Similar to the challenges of a growing company, this future infrastructure will be connected to networks that may not be prepared to handle such enormous amounts of data and the accompanying risk exposure, thereby compromising public services and public safety, especially during major emergencies and disasters. This presentation will explain how the City of San Diego, from a cybersecurity perspective, is currently managing and preparing for such challenges to safeguard the residents and communities of this Smart City.

 


30 Minute Break


Cindy Cullen
Virtual CISO

CyberSecurity and The Digital Revolution

The digital revolution is happening around us. Transformations include:

  • Technology – Cloud, IoT, SAAS, smart devices
  • Business – Netflix, Uber, Amazon, PayPal, GE, Walt Disney Company
  • Social – housing, marriage, purchases, ownership
  • Governance – privacy, compliance, financial services
  • Cybercriminals/nation-state hackers/hacktivists – ransomware, social engineering, exploiting known vulnerabilities

Cybersecurity is a major initiative of every government, company, and society. Governance, risk, compliance, security frameworks, strategies, services, products/tools … are all undergoing major shifts to transformation to meet the challenges of the digital revolution.

This talk will address how cyber security is transforming to meet the challenges of the digital revolution.


Andy Ellis
Chief Security Officer, Akamai

Tackling the Impending Complexity Apocalypse

The course of human evolution is one where certain risk management behaviors have helped us thrive (and dominate the planet).  The advent of increasingly complex systems, social networks, and real-time communications have combined to create an environment where humanity’s optimized behaviors may lead to questionable, and dangerous, decision-making.  How did we get here - and how can we blunt the effects of this perfect storm?


Lunch: 12:10 p.m. - 1:30 p.m.


Afternoon Session: 1:30 p.m. – 5:00 p.m.

Panel Discussion 1:30 p.m. - 2:30 p.m.
Joshua Greenbaum (moderator)

Principal, Enterprise Applications Consulting

 


30 Minute Break


Daneen DeFiore
SVP, Global CISO - GE Aviation & CTO Technology Compliance & Security, GE Digital

NextGen Risk: Information Security in a Digital World

As companies embrace digital solutions and next generation IT, it's up to us as Information Security professionals to understand and manage the associated risk.  It's no longer just about risk avoidance and mitigation, but rather acknowledging how to unlock the value of new tools, processes, and approaches through effective risk management that maximizes return on investment. Join as Deneen describes her company’s views concerning Next Generation IT threat management on their IT transformation journey.

 

Scott Zoldi
Chief Analytics Officer, FICO

Analytics Tackles Cyber Security

Artificial intelligence and machine learning technologies are commonplace today to detect financial crime.  Credit risk scorecards have long been used to empirically quantify and operationalize risk appetite.  We will contrast state of art in financial spheres to Cyber Security today and review leading artificial intelligence technologies such as self-calibrating models, collaborative profiles, and anomaly detection techniques in the fight against cyber threat and use in cyber risk prediction.

 


 

 Reception 5:00 p.m.– 6:30 p.m.

Venue

The History Colorado Center

Rock Stars of Cybersecurity Technologies will be held at The History Colorado Center.

The History Colorado Center is a vibrant place where people experience the past from entirely new perspectives. Located at 12th and Broadway in Denver’s Golden Triangle Museum District, this award-winning building was designed and constructed by an all-Colorado team: Tryba Architects, Trammell Crow Company, and Hensel Phelps Construction Company.
 
The History Colorado Center is a dynamic tourist destination, a hub for learning, a thought-provoking center for civic conversation, and an environment that encourages an inspirational journey into the future by understanding the past. History Colorado is a Smithsonian Affiliate, and Smithsonian Affiliations Director Harold Closter described the History Colorado Center as “the first great history museum of the twenty-first century.” The building houses core and traveling exhibitions, education/public programs, the Office of Archaeology and Historic Preservation, the State Historical Fund, the Stephen H. Hart Research Library, and other History Colorado functions.

Attend the Rock Stars of Cybersecurity Technologies Event

The Rock Stars of Cybersecurity Technologies event will be held on September 26, 2017.

 

 

Address:
History Colorado Museum
1200 Broadway
Denver, CO 80203

 
 
Directions
 
From the South
Drive north on I-25 to the Lincoln-Broadway exit (207). Go north on Lincoln and turn left at 12th Avenue.
 
From the North
Drive south on I-25 to the Colfax Avenue exit. Turn left at Colfax and head east .5 miles to Broadway. Turn right on Broadway and head south .3 miles to 12th Avenue.
 
From the West
Drive east on I-70 to the US-6 East/West 6th Avenue exit (261). After several miles, US-6 becomes a one-way street. Turn left onto Lincoln Street. Head north .7 miles to 12th Avenue and turn left.
 
From the East
Drive west on I-70 to I-25. Take I-25 south to the Colfax Avenue exit. Turn left at Colfax and head east half a mile to Broadway. Turn right on Broadway and head south .3 miles to 12th Avenue.
 
Mass Transit
The History Colorado Center is easily accessible by light rail and bus. Visit the RTD website to plan your trip.
 
Parking
 
Visitors have several parking options. The Civic Center Cultural Complex Garage is located directly across the street from the History Colorado Center at 12th Avenue and Broadway. Enter on 12th Avenue, just west of Broadway. Parking rates are posted inside the entrance. Electric vehicle charging stations are available on 3rd floor. Charging at these stations is currently free with paid admission to the garage. If you have questions please contact the Parking Manager at 303-607-9093.
 
Metered spaces are located along Lincoln, 12th Avenue, and the west side of Broadway. Surface lots are also available nearby.
 
Handicap Parking
 
Designated accessible parking is available in the Civic Center Cultural Complex Garage (enter on 12th Avenue, just west of Broadway). A reserved handicap loading area is located on the south side of the History Colorado Center along 12th Avenue. Handicap parking is available on evenings and weekends at the public garage at 1255 Lincoln (enter on Broadway just north of the main museum entrance).

Why should you sponsor this event?

  • Meet this influential group of users and potential users face-to-face
  • Enjoy the highly personal nature of the event to network and enhance your brand
  • Generate leads in a group where every attendee is a prospect
  • Share lunch and cocktails with people you want and need to know
  • Stimulate discussions resulting from the engaging, leading-edge presentations
  • Showcase your products and services in a dynamic, engaged environment

Take advantage of these unique sponsorship opportunities today!