Join Hector Del Castillo, Chief Product Officer at Byond, at a panel discussion at the 2019 IG3 Mid-Atlantic Conference. This will be held June 25-27, 2019 at the Watergate Hotel in Washington, DC.
Wednesday, June 26, 2019 | 3:10 - 4:00 PM
This will be an engaging discussion of the challenges in protecting consumer personal data, and for marketers in being able to utilize the power of collected customer data.
Consumer Privacy - Survival in the Electronic Marketplace
Finding common ground in preserving consumer privacy while supporting internet marketers in selling good and services. Consumers in today’s web-based marketplace want the “freedom to consume”. Marketers of products and services want the “freedom to sell”. Both want to maximize the power of the internet, but one wants to protect personal information while the other wants to access it. Their goals seem at odds with one another in terms of personal data ownership, privacy, and utilization for business success. Is there common ground where each can function successfully and in an ethical manner? We will discuss the challenges for consumers in protecting their personal data, and for marketers in being able to utilize the power of collected customer data.
About 2019 IG3 Mid-Atlantic Conference
Join hundreds of practitioners from the public and private sector (Government, Enterprise and Mid-Market companies, SMBs, and law firms.) for the IG3 Mid-Atlantic Conference.
We will be discussing best practices and current trends in: (Track 1) Cybersecurity, Privacy & Data Protection, (Track 2) Legal Ops, eDiscovery & Records Management, and (Track 3) Audit, Risk & Compliance.
Follow this link to learn more or to register: bit.ly/2019ig3conf.
Follow this link to view or download the conference agenda: bit.ly/ig3dcagenda.
About Byond
A business strategy consulting firm who believes in making a massive positive impact within any organization. We assess and analyze a client's business health and strength. We provide actionable intelligence to business executives and owners who want to grow their companies fast to outperform their competition.
About Hector Del Castillo
Hector is a product executive with over 18 years of experience working for digital companies with world-class offerings. He substantially grows digital companies by designing and implementing a bold product strategy and helping them adopt leading methods and tools to achieve smarter outcomes resulting in over 26% increase in profitability.
If you are looking to grow your company fast, set up an appointment with Hector to identify your specific business situation and show you how we can help you.
Contact: hector@byondma.com Follow: @byondma Visit: www.byondma.com
2. Great Speakers. Great Locations. Great Experience.
For more information, please
email Chris@thinkbigexit.com
Join us in 2019!
3. A NEW VENTURE CAPITAL FUND, WITH A TWIST.
www.thinkbigexit.com
4. Pg. 1
Agenda
Tuesday - June 25, 2019
4:00-5:00PM - Exhibit Hall
Exhibit Set-up Opportunity #1
3:00-6:00PM - The Watergate Hotel
Check into the Hotel
6:00-9:00PM - TBD
Pirvate Dinner Events
Wednesday - June 26, 2019
7:45-8:30AM - Exhibit Hall
Registration and Exhibit Set-up - Opportunity #2
7:45-8:30AM - Exhibit Hall
Continental Breakfast
8:30-9:20AM - Moretti Ballroom C/D
Welcome Remarks and Keynote Address
Wednesday Keynote Address
8:30-9:20AM - Moretti Ballroom C/D
Nemi George - From The War Room to the Board Room...Elevating
the Role of Information Security
The average cost of a data breach globally increased by ~6.4% in 2018
from 2017. This number is bound to increase taking into consideration
the amount of regulatory oversight across USA and Europe with CCPA
and GDPR coming into effect. As a result, Information Security and
Compliance can no longer be left to technology professionals in I.T.
looking to proffer often tactical short term - point solutions but rather
has to be elevated to the board room so the overall business risk and
impact is understood, and long term strategic solutions can be focused
on.
9:20-9:40AM - Exhibit Hall
20-Minute Exhibit Hall Break (Visit w/Sponsors/Technology Demos)
50-Minute Concurrent Panel Discussions
9:40-10:30AM - Moretti Ballroom C/D
Managing Risk with Cyber Readiness Models
You’ve been as proactive as possible, but how can you be aggressively
REACTIVE when (not if) you are breached? Join our panelists as they
discuss how threats have evolved over the last two decades, while
defenses have not kept pace with these threats. The panelists will also
discuss whether all parts are equal in Perimeter, Alarm, and Response
investments, why we are seeing gaps in organizations’ cyber readiness
models, and why combining overlapping technologies produces an
effect that exceeds the sum of their parts by means of a “belt and
suspenders approach” to fill your Cyber Readiness gaps.
Sponsor: CyFIR
Moderator: Ben Cotton, Founder at CyFIR
Panelist: Chris Konrad, Global Security Director at WTT
Panelist: Brian Herr, CISO at CyFIR
Panelist: Mark Phinick, VP at BigFix HCL
Panelist: Jeff Tutton, President Global Cybersecurity DFIR and
Remediation at IntersecWorld
Panelist: Brett Conlon, CISO at Edelman Financial Services
9:40-10:30AM - Moretti Ballroom E/F
Balancing Innovation, Data Privacy Compliance and Ethics
Please join us for a lively discussion about the role compliance plays in
Innovation. Does the need to comply with new regulations like GDPR
and other data privacy laws cause business and technology to choose
between technological innovation and customer experience like
personalization, or to find even better ways, more innovative ways to
achieve business goals while protecting customers’ privacy?
5. Pg. 2
Sponsor: JEM
Moderator: Jen McClure, CEO at JEM
Panelist: Harry Broadman, Partner and Practice Chair at Berkeley
Research Group LLC and Johns Hopkins University Faculty
Panelist: Genevieve Grabman, Author, The Technology Takers
Panelist: Mike Tibodeau, Operations Manager, Data Protection &
Privacy at Cisco
Panelist: Mark Potter, CISO at NewWave Telecom & Technologies, Inc.
Panelist: Jamie Danker, Director of Privacy at Easy Dynamics Corp
10:30-10:50AM - Exhibit Hall
20-Minute Exhibit Hall Break (Visit w/Sponsors/Technology Demos)
50-Minute Concurrent Panel Discussions
10:50-11:40AM - Moretti Ballroom C/D
Responding to the Insider Threat
Insider threat is a growing source of risk for many companies, ranging
from the mid-market to the Fortune 10. This panel will cover different
themes around insider threat, including the different types of insiders
(witting and unwitting) as well as things an organization can do to
mitigate damage to brand and reputational value when an insider
threat has been discovered.
Sponsor: Nisos
Moderator: Sean Weppner, Chief Strategy Officer at Nisos
Panelist: Frank Mendoza, Senior Cybersecurity Engineer at APR Energy
Panelist: Kwabena Appenteng, Shareholder at Littler
Panelist: Lee Bailey, CISO at ABC Fine Wine & Spirits
Panelist: Chuck Brooks, Principal Market Growth Strategist -- Cyberse-
curity and Emerging Technologies at General Dynamics Mission
Systems
Panelist: Aaron Tantleff, Partner at Foley & Lardner LLP
10:50-11:40AM - Moretti Ballroom E/F
Risk Assessments, Vulnerability Assessments and Cybersecurity
Insurance - The Holy Grail of Cyber Risk
Risk and Vulnerability Assessment are invaluable to companies in
understanding the risks associated with their informational “Crown
Jewel” and the vulnerabilities associated with their network assets and
defenses. What remains after controls is residual cyber risk which must
be assumed by a company, or transferred to a cyber insurance carrier
for a fair premium. This panel discuss cyber and network risk concepts
and explores the great utility of a cybersecurity insurance program.
Sponsor: Greenberg Traurig, LLP
Moderator: Paul Ferrillo, Shareholder at Greenberg Traurig, LLP
Panelist: Andrew Maychruk, Executive Vice President and Chief
Technology Officer at Old Second Bank
Panelist: Judy Selby, Partner at Clearview Privacy Consulting
Panelist: Tony Dolce, Vice President, Cyber Lead, North American
Financial Lines Claims at Chubb
Panelist: Josh MacDonald, Assistant Vice President at Cyber/E&O
Underwriting
Panelist: Stephen Fridakis, CISO at HBO
11:40-12:50PM - Exhibit Hall
Lunch (Visit w/Speakers, Attendees, and Sponsors)
50-Minute Concurrent Panel Discussions
12:50-1:40PM - Moretti Ballroom C/D
Cyber Threat Hunting to Achieve Network Resilience Across Your
Cyber Terrain
Wayne Lloyd, RedSeal Federal CTO, along with key industry panelists
discuss their real-world experience using Cyber Threat Hunting to
achieve successful real-world business outcomes by:
▶ Easily identifying devices on the network posing the most risk to
enterprise
▶ Identifying devices across the enterprise that have network access
and exploit exploitable vulnerabilities
▶ Quickly visualizing where aggressors can pivot following system
compromise
Sponsor: RedSeal
Moderator: Wayne Lloyd, Federal CTO & Technical Director at RedSeal
6. Pg. 3
Panelist: Nikola Zlatarev, Vice President, Chief Information Security
Officer at Castleton Commodities International, LLC
Panelist: Andrew Maychruk, Executive Vice President and Chief
Technology Officer at Old Second Bank
Panelist: Frank Mendoza, Senior Cybersecurity Engineer at APR Energy
Panelist: Stephen Fridakis, CISO at HBO
Panelist: John Cavanaugh, CTO - Security Practice Lead at
NetCraftsmen
12:50-1:40PM - Moretti Ballroom E/F
Adapting to Fight Back: How Cyber AI Neutralizes
Never-Before-Seen Threats
In a world that is increasingly digital, cyber-attack has become the
most significant risk confronting today’s businesses, smart cities, and
critical infrastructure. Online crime cost the world more than half a
trillion dollars last year, while recent attacks have managed to influence
the U.S. presidential election and disrupt the Ukrainian power supply.
This troubling state of affairs is the product of several fundamental
weaknesses with the traditional approach to cyber defense, which
relies on predefining what threats look like at a time when criminals
launch never-before-seen attacks on a daily basis. Moreover, these
attacks increasingly strike at machine-speed, preventing security
professionals from responding before their damage is done.
As a fundamentally unique approach to security, cyber AI systems need
not predict tomorrow’s attacks based on yesterday’s threats. Powered
by recent advances in artificial intelligence, the latest cyber AI security
systems instead continuously refine their defenses by learning ‘on the
job’ to differentiate between normal and abnormal behaviour in an
enterprise, enabling them to flag even subtly malicious activity. Thus,
whereas traditional cyber security technologies are blind to unknown
threats, self-learning cyber AI systems detect such novel attacks by
spontaneously drawing connections that human programmers can’t
see. And as ready-to-deploy exploit kits and advanced malware
packages spawn new cyber-threats around the world, the challenge of
securing the digital realm can only be met with AI security systems that
can learn, evolve, and fight back.
In this session, you will learn:
▶ Where cyber-criminals have found weaknesses in legacy approaches
to security
▶ Why only self-learning AI can detect and stop never-before-seen
attacks
▶ How to protect your network from machine-speed attacks
▶ What gaining 100% network visibility of your entire digital estate —
including cloud environments and IoT devices — can reveal the latent
vulnerabilities that advanced attackers are targeting today
Sponsor: Darktrace
Moderator: Rebekah Ent
1:40-2:00PM - Exhibit Hall
20-Minute Exhibit Hall Break (Visit w/Sponsors/Technology Demos)
50-Minute Concurrent Panel Discussions
2:00-2:50PM - Moretti Ballroom C/D
Cyber Security Policies and Procedures: What is “Reasonable” in
Today’s Landscape?
Most states now mandate the implementation of “reasonable” data
security systems, but only one – California – has issued any guidance on
what “reasonable” means within that context. Join us in a review and
analysis of the CA AG advisory opinion that identified the CIS Critical
Security Controls as providing the benchmark for reasonableness in the
context of data security implementation/protocols. See https://www.cis-
ecurity.org/controls/. We will dissect the CIS standards (all 20 of them)
from the perspective of small, medium and large organizations, and
discuss what “reasonable” means in those varying circumstances.
Sponsor: Drinker Biddle & Reath LLP
Moderator: Kenneth Dort, Parter at Drinker Biddle & Reath LLP
Panelist: Dana Bessey, Sr. Information Security Compliance Analyst at
Kelley Drye & Warren LLP
7. Pg. 4
Panelist: Gary Patterson, Senior Director of Security Architecture at
Home Partners of America
Panelist: Mitze Amoroso, Senior Vice President, Chief Information
Officer at ArchCare
Panelist: Cory Missimore, Manager at Baker Tilly Virchow Krause, LLP
2:00-2:50PM - Moretti Ballroom E/F
Incident Response and Crisis Communications - What happened,
happened already. Its what do and say about it that impacts the
reputation and value of a company.
The incident response business is booming today, with the costs of a
cyber breach having never been higher. Conversely corporate
reputations of those suffering a breach or attack have never been
lower, with the exception of a few companies that have done well
following the breach. What is the difference? Good crisis
communications.
Sponsor: FTI Consulting
Moderator: Jordan Kelly, Senior Managing Director at FTI Consulting
Panelist: Paul Ferrillo, Shareholder at Greenberg Traurig, LLP
Panelist: Anthony Ferrante, Global Head of Cybersecurity & Senior
Managing Director at FTI Consulting
Panelist: Brian Kennedy, Senior Managing Director & Head of the
Americas at FTI Consulting
Panelist: Richard Levick, Founder & CEO at LEVICK
2:50-3:10PM - Exhibit Hall
20-Minute Exhibit Hall Break (Visit w/Sponsors/Technology Demos)
50-Minute Concurrent Panel Discussions
3:10-4:00PM - Moretti Ballroom C/D
Consumer Privacy - Survival in the Electronic Marketplace
Finding common ground in preserving consumer privacy while
supporting internet marketers in selling good and services.
Consumers in today’s web-based marketplace want the “freedom to
consume”. Marketers of products and services want the “freedom to
sell”. Both want to maximize the power of the internet, but one wants
to protect personal information while the other wants to access it. Their
goals seem at odds with one another in terms of personal data
ownership, privacy, and utilization for business success. Is there
common ground where each can function successfully and in an
ethical manner? We will discuss the challenges for consumers in
protecting their personal data, and for marketers in being able to utilize
the power of collected customer data.
Sponsor: GreenLight Discovery
Moderator: Aaron Taylor, Owner & Executive Officer at GreenLight
Discovery
Panelist: Kamran Salour, Attorney at Callahan & Blaine
Panelist: Hector Del Castillo, Chief Product Officer at BoldPM
Panelist: Richard Young, CIO at USDA/FAS
Panelist: Beth Burgin Waller, Principal at Woods Rogers PLC
Panelist: Mathew Ellis, Founder at Matthew Ellis LLC
3:10-4:00PM - Moretti Ballroom E/F
Security and Privacy - Why are we so bad at it?
Global spending on cybersecurity will surpass $124 billion in 2019, while
damages caused from cybercrime is projected to cost over $6 trillion
globally by 2021.
Despite the latest advancements and innovations in the cybersecurity
industry and our collective efforts, we are facing more breaches than
ever before, with more people’s data compromised, and the cost of
data breaches increasing at an alarming rate.
This panel will discuss some of the reasons of why we are so bad at
cybersecurity and privacy, why our efforts aren't working, and what can
we do to change it.
Sponsor: Berkeley Research Group LLC
Moderator: Amit Garg, Director at Berkeley Research Group LLC
Panelist: Charlie Germano, Senior Director, IT Security and Operations
at Save the Children US
Panelist: Azunna Anyanwu, Director of Information Technology at
Aronson LLC
Panelist: Nnake Nweke, Chief Risk Officer at United States Agency for
Global Media
9. Pg. 6
Thursday - June 27, 2019
8:15-9:00AM - Exhibit Hall
Registration
8:15-9:00AM - Exhibit Hall
Continental Breakfast
50-Minute Concurrent Panel Discussions
9:00-9:50AM - Moretti Ballroom C/D
Grappling with International Data Protection Regulations in U.S.
Litigation and Government Investigations
This panel will discuss the conflict between various privacy regulations
(e.g. GDPR) and the demands of the U.S. litigation and government
investigations. How can the two be reconciled?
Sponsor: Axinn, Veltrop & Harkrider LLP
Moderator: Brooke Oppenheimer, eDiscovery Attorney at Axinn,
Veltrop & HarkRider LLP
Panelist: Paul Simonoff, Lead Associate, Privacy and Incident Response
at Booz | Allen | Hamilton
Panelist: Thomas Rohback, Partner at Axinn, Veltrop & HarkRider LLP
Panelist: Allison Bender, Of Counsel, Privacy and Data Protection at
Wilson Sonsini Goodrich & Rosati
9:00-9:50AM - Moretti Ballroom E/F
The Meaning of “Consent” in Data Privacy: Tracking a Moving Target
Europe introduced the requirement of acquiring consent for the use of
people’s personal information. The concept has gone viral across the
globe, and many companies are finding it difficult to comply. This
panel will consider the varying requirements in jurisdictions around the
world and, now, in California.
Sponsor: NAFS Consulting
Moderator: Sanaz Jaraiedi, CEO and Founder at NAFS, LLC
Panelist: Jason Scheiderer, Partner at Dentons
Panelist: Julia Jacobson, Partner at K&L Gates LLP
Panelist: Ambler Jackson
9:50-10:30AM - Exhibit Hall
Exhibit Teardown
See you next year!
Exhibitors:
Exhibit #1 - RedSeal
Exhibit #2 - Acalvio
Exhibit #3 - Darktrace
Exhibit #4 - Infogressive
Exhibit #5 - Illumio
Panelist: Cory Rutten, Security Account Manager at Infogressive
Panelist: Michael Irwin, Director, Technology Operations and Cyberse-
curity at Politico
4:00-5:00PM - Exhibit Hall
Closing Cocktail Reception and Prize Drawing
6:00-9:00PM - TBD
Private Dinner Events
10. Sponsor Descriptions
RedSeal
RedSeal is the essential network modeling and risk scoring platform
that puts decision-making power right in your hands.
JEM
JEM provides valuable insights, information and expertise to accelerate
business in the digital age through consulting and advisory services,
research and publications.
Tempered Networks
Tempered Networks was founded to solve the pervasive problem of
TCP/IP and the security vulnerabilities imbued within it. Our innovative
approach of using Host Identity Protocol creates a Zero Trust Network
within minutes, without a change to the existing infrastructure. A
powerful but simple point-and-click management interface enables
customers to deploy and manage extensive environments at a fraction
of the cost, and time to traditional methods.
CyFIR
CyFIR was built on two key principles – see more to know more, and
then respond instantly. We give organizations the power to digitally
investigate and triage thousands of endpoints on demand, minimizing
business risk and operational cost. To effectively manage the myriad of
today’s cyber perils, you need CyFIR™ – we Think Forensics First™.
Nisos
We are a team of operational experts with a depth of experience
ranging between the public and private sectors. Since forming Nisos in
2015, we have grown into an enterprise of over 50 full-time operators in
Alexandria, VA(HQ); New York, NY; Atlanta, GA; and San Francisco & Los
Angeles CA.
Our mission: to defend society from active and persistent threat.
Over the last decade, we observed threat actors shift their focus from
government to commercial targets, and yet saw little indication that
the private sector was prepared to handle these threats. Moreover, we
believe the low signal-to-noise ratio in the product and services market
Pg. 9
does a disservice to the global community.
We are dedicated to cutting through the noise to provide genuine
security to our clients and answers to their intractable problems.
Acalvio
Acalvio provides Advanced Threat Defense (ATD) solutions to detect,
engage and respond to malicious activity inside the perimeter. The
solutions are anchored on patented innovations in Deception and Data
Science. This enables a DevOps approach to ATD, enabling ease of
deployment, monitoring and management. Acalvio enriches its threat
intelligence by data obtained from internal and partner ecosystems,
enabling customers to benefit from defense in depth, reduce false
positives, and derive actionable intelligence for remediation.
Darktrace
Darktrace’s pioneering technology, the Enterprise Immune System,
applies AI to the cyber defense challenge for the first time, and has
proven itself successful in detecting cyber-threats that existing, legacy
systems cannot.
It quickly became clear that the technology was powerful enough to
identify a diverse range of threats at their earliest stages – including
insider attacks, latent vulnerabilities, cloud-based threats and even
state-sponsored espionage.
Infogressive
We're a Managed Security Services Provider (MSSP) that takes pride in
securing organizations of all sizes by combining the best technology
available with passionate cybersecurity experts. We know the ins and
outs of what your network needs to stay secure from the bad guys
which is proven by our history of zero data breaches since 2006.
Illumino
Illumio has developed adaptive micro-segmentation technology that
prevents the spread of breaches inside any data center and cloud.