SlideShare una empresa de Scribd logo
1 de 12
Descargar para leer sin conexión
WATERGATE
WATERGATE HOTEL
JUNE 25-27, 2019 ◆ WASHINGTON, DC
Great Speakers. Great Locations. Great Experience.
For more information, please
email Chris@thinkbigexit.com
Join us in 2019!
A NEW VENTURE CAPITAL FUND, WITH A TWIST.
www.thinkbigexit.com
Pg. 1
Agenda
Tuesday - June 25, 2019
4:00-5:00PM - Exhibit Hall
Exhibit Set-up Opportunity #1
3:00-6:00PM - The Watergate Hotel
Check into the Hotel
6:00-9:00PM - TBD
Pirvate Dinner Events
Wednesday - June 26, 2019
7:45-8:30AM - Exhibit Hall
Registration and Exhibit Set-up - Opportunity #2
7:45-8:30AM - Exhibit Hall
Continental Breakfast
8:30-9:20AM - Moretti Ballroom C/D
Welcome Remarks and Keynote Address
Wednesday Keynote Address
8:30-9:20AM - Moretti Ballroom C/D
Nemi George - From The War Room to the Board Room...Elevating
the Role of Information Security
The average cost of a data breach globally increased by ~6.4% in 2018
from 2017. This number is bound to increase taking into consideration
the amount of regulatory oversight across USA and Europe with CCPA
and GDPR coming into effect. As a result, Information Security and
Compliance can no longer be left to technology professionals in I.T.
looking to proffer often tactical short term - point solutions but rather
has to be elevated to the board room so the overall business risk and
impact is understood, and long term strategic solutions can be focused
on.
9:20-9:40AM - Exhibit Hall
20-Minute Exhibit Hall Break (Visit w/Sponsors/Technology Demos)
50-Minute Concurrent Panel Discussions
9:40-10:30AM - Moretti Ballroom C/D
Managing Risk with Cyber Readiness Models
You’ve been as proactive as possible, but how can you be aggressively
REACTIVE when (not if) you are breached? Join our panelists as they
discuss how threats have evolved over the last two decades, while
defenses have not kept pace with these threats. The panelists will also
discuss whether all parts are equal in Perimeter, Alarm, and Response
investments, why we are seeing gaps in organizations’ cyber readiness
models, and why combining overlapping technologies produces an
effect that exceeds the sum of their parts by means of a “belt and
suspenders approach” to fill your Cyber Readiness gaps.
Sponsor: CyFIR
Moderator: Ben Cotton, Founder at CyFIR
Panelist: Chris Konrad, Global Security Director at WTT
Panelist: Brian Herr, CISO at CyFIR
Panelist: Mark Phinick, VP at BigFix HCL
Panelist: Jeff Tutton, President Global Cybersecurity DFIR and
Remediation at IntersecWorld
Panelist: Brett Conlon, CISO at Edelman Financial Services
9:40-10:30AM - Moretti Ballroom E/F
Balancing Innovation, Data Privacy Compliance and Ethics
Please join us for a lively discussion about the role compliance plays in
Innovation. Does the need to comply with new regulations like GDPR
and other data privacy laws cause business and technology to choose
between technological innovation and customer experience like
personalization, or to find even better ways, more innovative ways to
achieve business goals while protecting customers’ privacy?
Pg. 2
Sponsor: JEM
Moderator: Jen McClure, CEO at JEM
Panelist: Harry Broadman, Partner and Practice Chair at Berkeley
Research Group LLC and Johns Hopkins University Faculty
Panelist: Genevieve Grabman, Author, The Technology Takers
Panelist: Mike Tibodeau, Operations Manager, Data Protection &
Privacy at Cisco
Panelist: Mark Potter, CISO at NewWave Telecom & Technologies, Inc.
Panelist: Jamie Danker, Director of Privacy at Easy Dynamics Corp
10:30-10:50AM - Exhibit Hall
20-Minute Exhibit Hall Break (Visit w/Sponsors/Technology Demos)
50-Minute Concurrent Panel Discussions
10:50-11:40AM - Moretti Ballroom C/D
Responding to the Insider Threat
Insider threat is a growing source of risk for many companies, ranging
from the mid-market to the Fortune 10. This panel will cover different
themes around insider threat, including the different types of insiders
(witting and unwitting) as well as things an organization can do to
mitigate damage to brand and reputational value when an insider
threat has been discovered.
Sponsor: Nisos
Moderator: Sean Weppner, Chief Strategy Officer at Nisos
Panelist: Frank Mendoza, Senior Cybersecurity Engineer at APR Energy
Panelist: Kwabena Appenteng, Shareholder at Littler
Panelist: Lee Bailey, CISO at ABC Fine Wine & Spirits
Panelist: Chuck Brooks, Principal Market Growth Strategist -- Cyberse-
curity and Emerging Technologies at General Dynamics Mission
Systems
Panelist: Aaron Tantleff, Partner at Foley & Lardner LLP
10:50-11:40AM - Moretti Ballroom E/F
Risk Assessments, Vulnerability Assessments and Cybersecurity
Insurance - The Holy Grail of Cyber Risk
Risk and Vulnerability Assessment are invaluable to companies in
understanding the risks associated with their informational “Crown
Jewel” and the vulnerabilities associated with their network assets and
defenses. What remains after controls is residual cyber risk which must
be assumed by a company, or transferred to a cyber insurance carrier
for a fair premium. This panel discuss cyber and network risk concepts
and explores the great utility of a cybersecurity insurance program.
Sponsor: Greenberg Traurig, LLP
Moderator: Paul Ferrillo, Shareholder at Greenberg Traurig, LLP
Panelist: Andrew Maychruk, Executive Vice President and Chief
Technology Officer at Old Second Bank
Panelist: Judy Selby, Partner at Clearview Privacy Consulting
Panelist: Tony Dolce, Vice President, Cyber Lead, North American
Financial Lines Claims at Chubb
Panelist: Josh MacDonald, Assistant Vice President at Cyber/E&O
Underwriting
Panelist: Stephen Fridakis, CISO at HBO
11:40-12:50PM - Exhibit Hall
Lunch (Visit w/Speakers, Attendees, and Sponsors)
50-Minute Concurrent Panel Discussions
12:50-1:40PM - Moretti Ballroom C/D
Cyber Threat Hunting to Achieve Network Resilience Across Your
Cyber Terrain
Wayne Lloyd, RedSeal Federal CTO, along with key industry panelists
discuss their real-world experience using Cyber Threat Hunting to
achieve successful real-world business outcomes by:
▶ Easily identifying devices on the network posing the most risk to
enterprise
▶ Identifying devices across the enterprise that have network access
and exploit exploitable vulnerabilities
▶ Quickly visualizing where aggressors can pivot following system
compromise
Sponsor: RedSeal
Moderator: Wayne Lloyd, Federal CTO & Technical Director at RedSeal
Pg. 3
Panelist: Nikola Zlatarev, Vice President, Chief Information Security
Officer at Castleton Commodities International, LLC
Panelist: Andrew Maychruk, Executive Vice President and Chief
Technology Officer at Old Second Bank
Panelist: Frank Mendoza, Senior Cybersecurity Engineer at APR Energy
Panelist: Stephen Fridakis, CISO at HBO
Panelist: John Cavanaugh, CTO - Security Practice Lead at
NetCraftsmen
12:50-1:40PM - Moretti Ballroom E/F
Adapting to Fight Back: How Cyber AI Neutralizes
Never-Before-Seen Threats
In a world that is increasingly digital, cyber-attack has become the
most significant risk confronting today’s businesses, smart cities, and
critical infrastructure. Online crime cost the world more than half a
trillion dollars last year, while recent attacks have managed to influence
the U.S. presidential election and disrupt the Ukrainian power supply.
This troubling state of affairs is the product of several fundamental
weaknesses with the traditional approach to cyber defense, which
relies on predefining what threats look like at a time when criminals
launch never-before-seen attacks on a daily basis. Moreover, these
attacks increasingly strike at machine-speed, preventing security
professionals from responding before their damage is done.
As a fundamentally unique approach to security, cyber AI systems need
not predict tomorrow’s attacks based on yesterday’s threats. Powered
by recent advances in artificial intelligence, the latest cyber AI security
systems instead continuously refine their defenses by learning ‘on the
job’ to differentiate between normal and abnormal behaviour in an
enterprise, enabling them to flag even subtly malicious activity. Thus,
whereas traditional cyber security technologies are blind to unknown
threats, self-learning cyber AI systems detect such novel attacks by
spontaneously drawing connections that human programmers can’t
see. And as ready-to-deploy exploit kits and advanced malware
packages spawn new cyber-threats around the world, the challenge of
securing the digital realm can only be met with AI security systems that
can learn, evolve, and fight back.
In this session, you will learn:
▶ Where cyber-criminals have found weaknesses in legacy approaches
to security
▶ Why only self-learning AI can detect and stop never-before-seen
attacks
▶ How to protect your network from machine-speed attacks
▶ What gaining 100% network visibility of your entire digital estate —
including cloud environments and IoT devices — can reveal the latent
vulnerabilities that advanced attackers are targeting today
Sponsor: Darktrace
Moderator: Rebekah Ent
1:40-2:00PM - Exhibit Hall
20-Minute Exhibit Hall Break (Visit w/Sponsors/Technology Demos)
50-Minute Concurrent Panel Discussions
2:00-2:50PM - Moretti Ballroom C/D
Cyber Security Policies and Procedures: What is “Reasonable” in
Today’s Landscape?
Most states now mandate the implementation of “reasonable” data
security systems, but only one – California – has issued any guidance on
what “reasonable” means within that context. Join us in a review and
analysis of the CA AG advisory opinion that identified the CIS Critical
Security Controls as providing the benchmark for reasonableness in the
context of data security implementation/protocols. See https://www.cis-
ecurity.org/controls/. We will dissect the CIS standards (all 20 of them)
from the perspective of small, medium and large organizations, and
discuss what “reasonable” means in those varying circumstances.
Sponsor: Drinker Biddle & Reath LLP
Moderator: Kenneth Dort, Parter at Drinker Biddle & Reath LLP
Panelist: Dana Bessey, Sr. Information Security Compliance Analyst at
Kelley Drye & Warren LLP
Pg. 4
Panelist: Gary Patterson, Senior Director of Security Architecture at
Home Partners of America
Panelist: Mitze Amoroso, Senior Vice President, Chief Information
Officer at ArchCare
Panelist: Cory Missimore, Manager at Baker Tilly Virchow Krause, LLP
2:00-2:50PM - Moretti Ballroom E/F
Incident Response and Crisis Communications - What happened,
happened already. Its what do and say about it that impacts the
reputation and value of a company.
The incident response business is booming today, with the costs of a
cyber breach having never been higher. Conversely corporate
reputations of those suffering a breach or attack have never been
lower, with the exception of a few companies that have done well
following the breach. What is the difference? Good crisis
communications.
Sponsor: FTI Consulting
Moderator: Jordan Kelly, Senior Managing Director at FTI Consulting
Panelist: Paul Ferrillo, Shareholder at Greenberg Traurig, LLP
Panelist: Anthony Ferrante, Global Head of Cybersecurity & Senior
Managing Director at FTI Consulting
Panelist: Brian Kennedy, Senior Managing Director & Head of the
Americas at FTI Consulting
Panelist: Richard Levick, Founder & CEO at LEVICK
2:50-3:10PM - Exhibit Hall
20-Minute Exhibit Hall Break (Visit w/Sponsors/Technology Demos)
50-Minute Concurrent Panel Discussions
3:10-4:00PM - Moretti Ballroom C/D
Consumer Privacy - Survival in the Electronic Marketplace
Finding common ground in preserving consumer privacy while
supporting internet marketers in selling good and services.
Consumers in today’s web-based marketplace want the “freedom to
consume”. Marketers of products and services want the “freedom to
sell”. Both want to maximize the power of the internet, but one wants
to protect personal information while the other wants to access it. Their
goals seem at odds with one another in terms of personal data
ownership, privacy, and utilization for business success. Is there
common ground where each can function successfully and in an
ethical manner? We will discuss the challenges for consumers in
protecting their personal data, and for marketers in being able to utilize
the power of collected customer data.
Sponsor: GreenLight Discovery
Moderator: Aaron Taylor, Owner & Executive Officer at GreenLight
Discovery
Panelist: Kamran Salour, Attorney at Callahan & Blaine
Panelist: Hector Del Castillo, Chief Product Officer at BoldPM
Panelist: Richard Young, CIO at USDA/FAS
Panelist: Beth Burgin Waller, Principal at Woods Rogers PLC
Panelist: Mathew Ellis, Founder at Matthew Ellis LLC
3:10-4:00PM - Moretti Ballroom E/F
Security and Privacy - Why are we so bad at it?
Global spending on cybersecurity will surpass $124 billion in 2019, while
damages caused from cybercrime is projected to cost over $6 trillion
globally by 2021.
Despite the latest advancements and innovations in the cybersecurity
industry and our collective efforts, we are facing more breaches than
ever before, with more people’s data compromised, and the cost of
data breaches increasing at an alarming rate.
This panel will discuss some of the reasons of why we are so bad at
cybersecurity and privacy, why our efforts aren't working, and what can
we do to change it.
Sponsor: Berkeley Research Group LLC
Moderator: Amit Garg, Director at Berkeley Research Group LLC
Panelist: Charlie Germano, Senior Director, IT Security and Operations
at Save the Children US
Panelist: Azunna Anyanwu, Director of Information Technology at
Aronson LLC
Panelist: Nnake Nweke, Chief Risk Officer at United States Agency for
Global Media
Please email Chris@thinkbigexit.com
Would you like to speak at an IG3?
event next year in 2020?
Let us know.
Pg. 6
Thursday - June 27, 2019
8:15-9:00AM - Exhibit Hall
Registration
8:15-9:00AM - Exhibit Hall
Continental Breakfast
50-Minute Concurrent Panel Discussions
9:00-9:50AM - Moretti Ballroom C/D
Grappling with International Data Protection Regulations in U.S.
Litigation and Government Investigations
This panel will discuss the conflict between various privacy regulations
(e.g. GDPR) and the demands of the U.S. litigation and government
investigations. How can the two be reconciled?
Sponsor: Axinn, Veltrop & Harkrider LLP
Moderator: Brooke Oppenheimer, eDiscovery Attorney at Axinn,
Veltrop & HarkRider LLP
Panelist: Paul Simonoff, Lead Associate, Privacy and Incident Response
at Booz | Allen | Hamilton
Panelist: Thomas Rohback, Partner at Axinn, Veltrop & HarkRider LLP
Panelist: Allison Bender, Of Counsel, Privacy and Data Protection at
Wilson Sonsini Goodrich & Rosati
9:00-9:50AM - Moretti Ballroom E/F
The Meaning of “Consent” in Data Privacy: Tracking a Moving Target
Europe introduced the requirement of acquiring consent for the use of
people’s personal information. The concept has gone viral across the
globe, and many companies are finding it difficult to comply. This
panel will consider the varying requirements in jurisdictions around the
world and, now, in California.
Sponsor: NAFS Consulting
Moderator: Sanaz Jaraiedi, CEO and Founder at NAFS, LLC
Panelist: Jason Scheiderer, Partner at Dentons
Panelist: Julia Jacobson, Partner at K&L Gates LLP
Panelist: Ambler Jackson
9:50-10:30AM - Exhibit Hall
Exhibit Teardown
See you next year!
Exhibitors:
Exhibit #1 - RedSeal
Exhibit #2 - Acalvio
Exhibit #3 - Darktrace
Exhibit #4 - Infogressive
Exhibit #5 - Illumio
Panelist: Cory Rutten, Security Account Manager at Infogressive
Panelist: Michael Irwin, Director, Technology Operations and Cyberse-
curity at Politico
4:00-5:00PM - Exhibit Hall
Closing Cocktail Reception and Prize Drawing
6:00-9:00PM - TBD
Private Dinner Events
Sponsor Descriptions
RedSeal
RedSeal is the essential network modeling and risk scoring platform
that puts decision-making power right in your hands.
JEM
JEM provides valuable insights, information and expertise to accelerate
business in the digital age through consulting and advisory services,
research and publications.
Tempered Networks
Tempered Networks was founded to solve the pervasive problem of
TCP/IP and the security vulnerabilities imbued within it. Our innovative
approach of using Host Identity Protocol creates a Zero Trust Network
within minutes, without a change to the existing infrastructure. A
powerful but simple point-and-click management interface enables
customers to deploy and manage extensive environments at a fraction
of the cost, and time to traditional methods.
CyFIR
CyFIR was built on two key principles – see more to know more, and
then respond instantly. We give organizations the power to digitally
investigate and triage thousands of endpoints on demand, minimizing
business risk and operational cost. To effectively manage the myriad of
today’s cyber perils, you need CyFIR™ – we Think Forensics First™.
Nisos
We are a team of operational experts with a depth of experience
ranging between the public and private sectors. Since forming Nisos in
2015, we have grown into an enterprise of over 50 full-time operators in
Alexandria, VA(HQ); New York, NY; Atlanta, GA; and San Francisco & Los
Angeles CA.
Our mission: to defend society from active and persistent threat.
Over the last decade, we observed threat actors shift their focus from
government to commercial targets, and yet saw little indication that
the private sector was prepared to handle these threats. Moreover, we
believe the low signal-to-noise ratio in the product and services market
Pg. 9
does a disservice to the global community.
We are dedicated to cutting through the noise to provide genuine
security to our clients and answers to their intractable problems.
Acalvio
Acalvio provides Advanced Threat Defense (ATD) solutions to detect,
engage and respond to malicious activity inside the perimeter. The
solutions are anchored on patented innovations in Deception and Data
Science. This enables a DevOps approach to ATD, enabling ease of
deployment, monitoring and management. Acalvio enriches its threat
intelligence by data obtained from internal and partner ecosystems,
enabling customers to benefit from defense in depth, reduce false
positives, and derive actionable intelligence for remediation.
Darktrace
Darktrace’s pioneering technology, the Enterprise Immune System,
applies AI to the cyber defense challenge for the first time, and has
proven itself successful in detecting cyber-threats that existing, legacy
systems cannot.
It quickly became clear that the technology was powerful enough to
identify a diverse range of threats at their earliest stages – including
insider attacks, latent vulnerabilities, cloud-based threats and even
state-sponsored espionage.
Infogressive
We're a Managed Security Services Provider (MSSP) that takes pride in
securing organizations of all sizes by combining the best technology
available with passionate cybersecurity experts. We know the ins and
outs of what your network needs to stay secure from the bad guys
which is proven by our history of zero data breaches since 2006.
Illumino
Illumio has developed adaptive micro-segmentation technology that
prevents the spread of breaches inside any data center and cloud.
Pg. 12
Thank You Sponsors!
2019 IG3 Mid-Atlantic Conference Agenda

Más contenido relacionado

Más de Hector Del Castillo, CPM, CPMM

How to Land Your Next PM Dream Job in 90 Days | Great IT Professional | May 2...
How to Land Your Next PM Dream Job in 90 Days | Great IT Professional | May 2...How to Land Your Next PM Dream Job in 90 Days | Great IT Professional | May 2...
How to Land Your Next PM Dream Job in 90 Days | Great IT Professional | May 2...Hector Del Castillo, CPM, CPMM
 
Emotional Agility for Leaders | Great IT Professional | May 17, 2023
Emotional Agility for Leaders | Great IT Professional | May 17, 2023Emotional Agility for Leaders | Great IT Professional | May 17, 2023
Emotional Agility for Leaders | Great IT Professional | May 17, 2023Hector Del Castillo, CPM, CPMM
 
Project Management Trends in a Hybrid World | Great IT Professional | May 2,...
Project Management Trends in a Hybrid World  | Great IT Professional | May 2,...Project Management Trends in a Hybrid World  | Great IT Professional | May 2,...
Project Management Trends in a Hybrid World | Great IT Professional | May 2,...Hector Del Castillo, CPM, CPMM
 
How to Land Your Next PM Dream Job Quickly | PMI Silver Spring Chapter | Apri...
How to Land Your Next PM Dream Job Quickly | PMI Silver Spring Chapter | Apri...How to Land Your Next PM Dream Job Quickly | PMI Silver Spring Chapter | Apri...
How to Land Your Next PM Dream Job Quickly | PMI Silver Spring Chapter | Apri...Hector Del Castillo, CPM, CPMM
 
Your First 90 Days in a New Leadership Role | Great IT Professional | Februar...
Your First 90 Days in a New Leadership Role | Great IT Professional | Februar...Your First 90 Days in a New Leadership Role | Great IT Professional | Februar...
Your First 90 Days in a New Leadership Role | Great IT Professional | Februar...Hector Del Castillo, CPM, CPMM
 
How To Land Your Next Product Dream Job in 90 Days | ProductCamp DC
How To Land Your Next Product Dream Job in 90 Days  | ProductCamp DCHow To Land Your Next Product Dream Job in 90 Days  | ProductCamp DC
How To Land Your Next Product Dream Job in 90 Days | ProductCamp DCHector Del Castillo, CPM, CPMM
 
Looking Back, Looking Ahead | December 2022 ProductCamp DC
Looking Back, Looking Ahead | December 2022 ProductCamp DCLooking Back, Looking Ahead | December 2022 ProductCamp DC
Looking Back, Looking Ahead | December 2022 ProductCamp DCHector Del Castillo, CPM, CPMM
 
Future of Product Management 2023 | Product Summit Online™
Future of Product Management 2023 | Product Summit Online™Future of Product Management 2023 | Product Summit Online™
Future of Product Management 2023 | Product Summit Online™Hector Del Castillo, CPM, CPMM
 
Your First 90 Days in a New Product Role | Product Summit Online™
Your First 90 Days in a New Product Role | Product Summit Online™Your First 90 Days in a New Product Role | Product Summit Online™
Your First 90 Days in a New Product Role | Product Summit Online™Hector Del Castillo, CPM, CPMM
 
A Product Manager's First 100 Days | May 2022 ProductCamp DC
A Product Manager's First 100 Days | May 2022 ProductCamp DCA Product Manager's First 100 Days | May 2022 ProductCamp DC
A Product Manager's First 100 Days | May 2022 ProductCamp DCHector Del Castillo, CPM, CPMM
 
Product Management Tools You'll Actually Use | April 2022 ProductCamp DC
Product Management Tools You'll Actually Use | April 2022 ProductCamp DCProduct Management Tools You'll Actually Use | April 2022 ProductCamp DC
Product Management Tools You'll Actually Use | April 2022 ProductCamp DCHector Del Castillo, CPM, CPMM
 
Conducting Better Product Discovery - 2022 Pittsburgh ProductCamp
Conducting Better Product Discovery - 2022 Pittsburgh ProductCampConducting Better Product Discovery - 2022 Pittsburgh ProductCamp
Conducting Better Product Discovery - 2022 Pittsburgh ProductCampHector Del Castillo, CPM, CPMM
 
Conducting Better Product Discovery | BoldPM Insights | Great IT Professional
Conducting Better Product Discovery | BoldPM Insights | Great IT ProfessionalConducting Better Product Discovery | BoldPM Insights | Great IT Professional
Conducting Better Product Discovery | BoldPM Insights | Great IT ProfessionalHector Del Castillo, CPM, CPMM
 
Increasing Employee Satisfaction For Greater Growth | Byond Growth Live
Increasing Employee Satisfaction For Greater Growth | Byond Growth Live Increasing Employee Satisfaction For Greater Growth | Byond Growth Live
Increasing Employee Satisfaction For Greater Growth | Byond Growth Live Hector Del Castillo, CPM, CPMM
 
Business Ideation Made Simple | BoldPM Insights | ProductCamp DC
Business Ideation Made Simple | BoldPM Insights | ProductCamp DCBusiness Ideation Made Simple | BoldPM Insights | ProductCamp DC
Business Ideation Made Simple | BoldPM Insights | ProductCamp DCHector Del Castillo, CPM, CPMM
 

Más de Hector Del Castillo, CPM, CPMM (20)

Product Management Fundamentals
Product Management FundamentalsProduct Management Fundamentals
Product Management Fundamentals
 
How to Land Your Next PM Dream Job in 90 Days | Great IT Professional | May 2...
How to Land Your Next PM Dream Job in 90 Days | Great IT Professional | May 2...How to Land Your Next PM Dream Job in 90 Days | Great IT Professional | May 2...
How to Land Your Next PM Dream Job in 90 Days | Great IT Professional | May 2...
 
Emotional Agility for Leaders | Great IT Professional | May 17, 2023
Emotional Agility for Leaders | Great IT Professional | May 17, 2023Emotional Agility for Leaders | Great IT Professional | May 17, 2023
Emotional Agility for Leaders | Great IT Professional | May 17, 2023
 
Project Management Trends in a Hybrid World | Great IT Professional | May 2,...
Project Management Trends in a Hybrid World  | Great IT Professional | May 2,...Project Management Trends in a Hybrid World  | Great IT Professional | May 2,...
Project Management Trends in a Hybrid World | Great IT Professional | May 2,...
 
How to Land Your Next PM Dream Job Quickly | PMI Silver Spring Chapter | Apri...
How to Land Your Next PM Dream Job Quickly | PMI Silver Spring Chapter | Apri...How to Land Your Next PM Dream Job Quickly | PMI Silver Spring Chapter | Apri...
How to Land Your Next PM Dream Job Quickly | PMI Silver Spring Chapter | Apri...
 
Your First 90 Days in a New Leadership Role | Great IT Professional | Februar...
Your First 90 Days in a New Leadership Role | Great IT Professional | Februar...Your First 90 Days in a New Leadership Role | Great IT Professional | Februar...
Your First 90 Days in a New Leadership Role | Great IT Professional | Februar...
 
How To Land Your Next Product Dream Job in 90 Days | ProductCamp DC
How To Land Your Next Product Dream Job in 90 Days  | ProductCamp DCHow To Land Your Next Product Dream Job in 90 Days  | ProductCamp DC
How To Land Your Next Product Dream Job in 90 Days | ProductCamp DC
 
Looking Back, Looking Ahead | December 2022 ProductCamp DC
Looking Back, Looking Ahead | December 2022 ProductCamp DCLooking Back, Looking Ahead | December 2022 ProductCamp DC
Looking Back, Looking Ahead | December 2022 ProductCamp DC
 
Future of Product Management 2023 | Product Summit Online™
Future of Product Management 2023 | Product Summit Online™Future of Product Management 2023 | Product Summit Online™
Future of Product Management 2023 | Product Summit Online™
 
Your First 90 Days in a New Product Role | Product Summit Online™
Your First 90 Days in a New Product Role | Product Summit Online™Your First 90 Days in a New Product Role | Product Summit Online™
Your First 90 Days in a New Product Role | Product Summit Online™
 
PM vs. PM | PMISSC 2022 Symposium
PM vs. PM | PMISSC 2022 SymposiumPM vs. PM | PMISSC 2022 Symposium
PM vs. PM | PMISSC 2022 Symposium
 
A Product Manager's First 100 Days | May 2022 ProductCamp DC
A Product Manager's First 100 Days | May 2022 ProductCamp DCA Product Manager's First 100 Days | May 2022 ProductCamp DC
A Product Manager's First 100 Days | May 2022 ProductCamp DC
 
PM vs. PM | Great IT Professional | April 28, 2022
PM vs. PM | Great IT Professional | April 28, 2022PM vs. PM | Great IT Professional | April 28, 2022
PM vs. PM | Great IT Professional | April 28, 2022
 
Conducting Better Product Discovery | Product Coffee
Conducting Better Product Discovery | Product CoffeeConducting Better Product Discovery | Product Coffee
Conducting Better Product Discovery | Product Coffee
 
Product Management Tools You'll Actually Use | April 2022 ProductCamp DC
Product Management Tools You'll Actually Use | April 2022 ProductCamp DCProduct Management Tools You'll Actually Use | April 2022 ProductCamp DC
Product Management Tools You'll Actually Use | April 2022 ProductCamp DC
 
Conducting Better Product Discovery - 2022 Pittsburgh ProductCamp
Conducting Better Product Discovery - 2022 Pittsburgh ProductCampConducting Better Product Discovery - 2022 Pittsburgh ProductCamp
Conducting Better Product Discovery - 2022 Pittsburgh ProductCamp
 
Conducting Better Product Discovery | BoldPM Insights | Great IT Professional
Conducting Better Product Discovery | BoldPM Insights | Great IT ProfessionalConducting Better Product Discovery | BoldPM Insights | Great IT Professional
Conducting Better Product Discovery | BoldPM Insights | Great IT Professional
 
Create Your Value Proposition Map | ProductCamp DC
Create Your Value Proposition Map  | ProductCamp DCCreate Your Value Proposition Map  | ProductCamp DC
Create Your Value Proposition Map | ProductCamp DC
 
Increasing Employee Satisfaction For Greater Growth | Byond Growth Live
Increasing Employee Satisfaction For Greater Growth | Byond Growth Live Increasing Employee Satisfaction For Greater Growth | Byond Growth Live
Increasing Employee Satisfaction For Greater Growth | Byond Growth Live
 
Business Ideation Made Simple | BoldPM Insights | ProductCamp DC
Business Ideation Made Simple | BoldPM Insights | ProductCamp DCBusiness Ideation Made Simple | BoldPM Insights | ProductCamp DC
Business Ideation Made Simple | BoldPM Insights | ProductCamp DC
 

Último

The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 

Último (20)

The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 

2019 IG3 Mid-Atlantic Conference Agenda

  • 1. WATERGATE WATERGATE HOTEL JUNE 25-27, 2019 ◆ WASHINGTON, DC
  • 2. Great Speakers. Great Locations. Great Experience. For more information, please email Chris@thinkbigexit.com Join us in 2019!
  • 3. A NEW VENTURE CAPITAL FUND, WITH A TWIST. www.thinkbigexit.com
  • 4. Pg. 1 Agenda Tuesday - June 25, 2019 4:00-5:00PM - Exhibit Hall Exhibit Set-up Opportunity #1 3:00-6:00PM - The Watergate Hotel Check into the Hotel 6:00-9:00PM - TBD Pirvate Dinner Events Wednesday - June 26, 2019 7:45-8:30AM - Exhibit Hall Registration and Exhibit Set-up - Opportunity #2 7:45-8:30AM - Exhibit Hall Continental Breakfast 8:30-9:20AM - Moretti Ballroom C/D Welcome Remarks and Keynote Address Wednesday Keynote Address 8:30-9:20AM - Moretti Ballroom C/D Nemi George - From The War Room to the Board Room...Elevating the Role of Information Security The average cost of a data breach globally increased by ~6.4% in 2018 from 2017. This number is bound to increase taking into consideration the amount of regulatory oversight across USA and Europe with CCPA and GDPR coming into effect. As a result, Information Security and Compliance can no longer be left to technology professionals in I.T. looking to proffer often tactical short term - point solutions but rather has to be elevated to the board room so the overall business risk and impact is understood, and long term strategic solutions can be focused on. 9:20-9:40AM - Exhibit Hall 20-Minute Exhibit Hall Break (Visit w/Sponsors/Technology Demos) 50-Minute Concurrent Panel Discussions 9:40-10:30AM - Moretti Ballroom C/D Managing Risk with Cyber Readiness Models You’ve been as proactive as possible, but how can you be aggressively REACTIVE when (not if) you are breached? Join our panelists as they discuss how threats have evolved over the last two decades, while defenses have not kept pace with these threats. The panelists will also discuss whether all parts are equal in Perimeter, Alarm, and Response investments, why we are seeing gaps in organizations’ cyber readiness models, and why combining overlapping technologies produces an effect that exceeds the sum of their parts by means of a “belt and suspenders approach” to fill your Cyber Readiness gaps. Sponsor: CyFIR Moderator: Ben Cotton, Founder at CyFIR Panelist: Chris Konrad, Global Security Director at WTT Panelist: Brian Herr, CISO at CyFIR Panelist: Mark Phinick, VP at BigFix HCL Panelist: Jeff Tutton, President Global Cybersecurity DFIR and Remediation at IntersecWorld Panelist: Brett Conlon, CISO at Edelman Financial Services 9:40-10:30AM - Moretti Ballroom E/F Balancing Innovation, Data Privacy Compliance and Ethics Please join us for a lively discussion about the role compliance plays in Innovation. Does the need to comply with new regulations like GDPR and other data privacy laws cause business and technology to choose between technological innovation and customer experience like personalization, or to find even better ways, more innovative ways to achieve business goals while protecting customers’ privacy?
  • 5. Pg. 2 Sponsor: JEM Moderator: Jen McClure, CEO at JEM Panelist: Harry Broadman, Partner and Practice Chair at Berkeley Research Group LLC and Johns Hopkins University Faculty Panelist: Genevieve Grabman, Author, The Technology Takers Panelist: Mike Tibodeau, Operations Manager, Data Protection & Privacy at Cisco Panelist: Mark Potter, CISO at NewWave Telecom & Technologies, Inc. Panelist: Jamie Danker, Director of Privacy at Easy Dynamics Corp 10:30-10:50AM - Exhibit Hall 20-Minute Exhibit Hall Break (Visit w/Sponsors/Technology Demos) 50-Minute Concurrent Panel Discussions 10:50-11:40AM - Moretti Ballroom C/D Responding to the Insider Threat Insider threat is a growing source of risk for many companies, ranging from the mid-market to the Fortune 10. This panel will cover different themes around insider threat, including the different types of insiders (witting and unwitting) as well as things an organization can do to mitigate damage to brand and reputational value when an insider threat has been discovered. Sponsor: Nisos Moderator: Sean Weppner, Chief Strategy Officer at Nisos Panelist: Frank Mendoza, Senior Cybersecurity Engineer at APR Energy Panelist: Kwabena Appenteng, Shareholder at Littler Panelist: Lee Bailey, CISO at ABC Fine Wine & Spirits Panelist: Chuck Brooks, Principal Market Growth Strategist -- Cyberse- curity and Emerging Technologies at General Dynamics Mission Systems Panelist: Aaron Tantleff, Partner at Foley & Lardner LLP 10:50-11:40AM - Moretti Ballroom E/F Risk Assessments, Vulnerability Assessments and Cybersecurity Insurance - The Holy Grail of Cyber Risk Risk and Vulnerability Assessment are invaluable to companies in understanding the risks associated with their informational “Crown Jewel” and the vulnerabilities associated with their network assets and defenses. What remains after controls is residual cyber risk which must be assumed by a company, or transferred to a cyber insurance carrier for a fair premium. This panel discuss cyber and network risk concepts and explores the great utility of a cybersecurity insurance program. Sponsor: Greenberg Traurig, LLP Moderator: Paul Ferrillo, Shareholder at Greenberg Traurig, LLP Panelist: Andrew Maychruk, Executive Vice President and Chief Technology Officer at Old Second Bank Panelist: Judy Selby, Partner at Clearview Privacy Consulting Panelist: Tony Dolce, Vice President, Cyber Lead, North American Financial Lines Claims at Chubb Panelist: Josh MacDonald, Assistant Vice President at Cyber/E&O Underwriting Panelist: Stephen Fridakis, CISO at HBO 11:40-12:50PM - Exhibit Hall Lunch (Visit w/Speakers, Attendees, and Sponsors) 50-Minute Concurrent Panel Discussions 12:50-1:40PM - Moretti Ballroom C/D Cyber Threat Hunting to Achieve Network Resilience Across Your Cyber Terrain Wayne Lloyd, RedSeal Federal CTO, along with key industry panelists discuss their real-world experience using Cyber Threat Hunting to achieve successful real-world business outcomes by: ▶ Easily identifying devices on the network posing the most risk to enterprise ▶ Identifying devices across the enterprise that have network access and exploit exploitable vulnerabilities ▶ Quickly visualizing where aggressors can pivot following system compromise Sponsor: RedSeal Moderator: Wayne Lloyd, Federal CTO & Technical Director at RedSeal
  • 6. Pg. 3 Panelist: Nikola Zlatarev, Vice President, Chief Information Security Officer at Castleton Commodities International, LLC Panelist: Andrew Maychruk, Executive Vice President and Chief Technology Officer at Old Second Bank Panelist: Frank Mendoza, Senior Cybersecurity Engineer at APR Energy Panelist: Stephen Fridakis, CISO at HBO Panelist: John Cavanaugh, CTO - Security Practice Lead at NetCraftsmen 12:50-1:40PM - Moretti Ballroom E/F Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks on a daily basis. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done. As a fundamentally unique approach to security, cyber AI systems need not predict tomorrow’s attacks based on yesterday’s threats. Powered by recent advances in artificial intelligence, the latest cyber AI security systems instead continuously refine their defenses by learning ‘on the job’ to differentiate between normal and abnormal behaviour in an enterprise, enabling them to flag even subtly malicious activity. Thus, whereas traditional cyber security technologies are blind to unknown threats, self-learning cyber AI systems detect such novel attacks by spontaneously drawing connections that human programmers can’t see. And as ready-to-deploy exploit kits and advanced malware packages spawn new cyber-threats around the world, the challenge of securing the digital realm can only be met with AI security systems that can learn, evolve, and fight back. In this session, you will learn: ▶ Where cyber-criminals have found weaknesses in legacy approaches to security ▶ Why only self-learning AI can detect and stop never-before-seen attacks ▶ How to protect your network from machine-speed attacks ▶ What gaining 100% network visibility of your entire digital estate — including cloud environments and IoT devices — can reveal the latent vulnerabilities that advanced attackers are targeting today Sponsor: Darktrace Moderator: Rebekah Ent 1:40-2:00PM - Exhibit Hall 20-Minute Exhibit Hall Break (Visit w/Sponsors/Technology Demos) 50-Minute Concurrent Panel Discussions 2:00-2:50PM - Moretti Ballroom C/D Cyber Security Policies and Procedures: What is “Reasonable” in Today’s Landscape? Most states now mandate the implementation of “reasonable” data security systems, but only one – California – has issued any guidance on what “reasonable” means within that context. Join us in a review and analysis of the CA AG advisory opinion that identified the CIS Critical Security Controls as providing the benchmark for reasonableness in the context of data security implementation/protocols. See https://www.cis- ecurity.org/controls/. We will dissect the CIS standards (all 20 of them) from the perspective of small, medium and large organizations, and discuss what “reasonable” means in those varying circumstances. Sponsor: Drinker Biddle & Reath LLP Moderator: Kenneth Dort, Parter at Drinker Biddle & Reath LLP Panelist: Dana Bessey, Sr. Information Security Compliance Analyst at Kelley Drye & Warren LLP
  • 7. Pg. 4 Panelist: Gary Patterson, Senior Director of Security Architecture at Home Partners of America Panelist: Mitze Amoroso, Senior Vice President, Chief Information Officer at ArchCare Panelist: Cory Missimore, Manager at Baker Tilly Virchow Krause, LLP 2:00-2:50PM - Moretti Ballroom E/F Incident Response and Crisis Communications - What happened, happened already. Its what do and say about it that impacts the reputation and value of a company. The incident response business is booming today, with the costs of a cyber breach having never been higher. Conversely corporate reputations of those suffering a breach or attack have never been lower, with the exception of a few companies that have done well following the breach. What is the difference? Good crisis communications. Sponsor: FTI Consulting Moderator: Jordan Kelly, Senior Managing Director at FTI Consulting Panelist: Paul Ferrillo, Shareholder at Greenberg Traurig, LLP Panelist: Anthony Ferrante, Global Head of Cybersecurity & Senior Managing Director at FTI Consulting Panelist: Brian Kennedy, Senior Managing Director & Head of the Americas at FTI Consulting Panelist: Richard Levick, Founder & CEO at LEVICK 2:50-3:10PM - Exhibit Hall 20-Minute Exhibit Hall Break (Visit w/Sponsors/Technology Demos) 50-Minute Concurrent Panel Discussions 3:10-4:00PM - Moretti Ballroom C/D Consumer Privacy - Survival in the Electronic Marketplace Finding common ground in preserving consumer privacy while supporting internet marketers in selling good and services. Consumers in today’s web-based marketplace want the “freedom to consume”. Marketers of products and services want the “freedom to sell”. Both want to maximize the power of the internet, but one wants to protect personal information while the other wants to access it. Their goals seem at odds with one another in terms of personal data ownership, privacy, and utilization for business success. Is there common ground where each can function successfully and in an ethical manner? We will discuss the challenges for consumers in protecting their personal data, and for marketers in being able to utilize the power of collected customer data. Sponsor: GreenLight Discovery Moderator: Aaron Taylor, Owner & Executive Officer at GreenLight Discovery Panelist: Kamran Salour, Attorney at Callahan & Blaine Panelist: Hector Del Castillo, Chief Product Officer at BoldPM Panelist: Richard Young, CIO at USDA/FAS Panelist: Beth Burgin Waller, Principal at Woods Rogers PLC Panelist: Mathew Ellis, Founder at Matthew Ellis LLC 3:10-4:00PM - Moretti Ballroom E/F Security and Privacy - Why are we so bad at it? Global spending on cybersecurity will surpass $124 billion in 2019, while damages caused from cybercrime is projected to cost over $6 trillion globally by 2021. Despite the latest advancements and innovations in the cybersecurity industry and our collective efforts, we are facing more breaches than ever before, with more people’s data compromised, and the cost of data breaches increasing at an alarming rate. This panel will discuss some of the reasons of why we are so bad at cybersecurity and privacy, why our efforts aren't working, and what can we do to change it. Sponsor: Berkeley Research Group LLC Moderator: Amit Garg, Director at Berkeley Research Group LLC Panelist: Charlie Germano, Senior Director, IT Security and Operations at Save the Children US Panelist: Azunna Anyanwu, Director of Information Technology at Aronson LLC Panelist: Nnake Nweke, Chief Risk Officer at United States Agency for Global Media
  • 8. Please email Chris@thinkbigexit.com Would you like to speak at an IG3? event next year in 2020? Let us know.
  • 9. Pg. 6 Thursday - June 27, 2019 8:15-9:00AM - Exhibit Hall Registration 8:15-9:00AM - Exhibit Hall Continental Breakfast 50-Minute Concurrent Panel Discussions 9:00-9:50AM - Moretti Ballroom C/D Grappling with International Data Protection Regulations in U.S. Litigation and Government Investigations This panel will discuss the conflict between various privacy regulations (e.g. GDPR) and the demands of the U.S. litigation and government investigations. How can the two be reconciled? Sponsor: Axinn, Veltrop & Harkrider LLP Moderator: Brooke Oppenheimer, eDiscovery Attorney at Axinn, Veltrop & HarkRider LLP Panelist: Paul Simonoff, Lead Associate, Privacy and Incident Response at Booz | Allen | Hamilton Panelist: Thomas Rohback, Partner at Axinn, Veltrop & HarkRider LLP Panelist: Allison Bender, Of Counsel, Privacy and Data Protection at Wilson Sonsini Goodrich & Rosati 9:00-9:50AM - Moretti Ballroom E/F The Meaning of “Consent” in Data Privacy: Tracking a Moving Target Europe introduced the requirement of acquiring consent for the use of people’s personal information. The concept has gone viral across the globe, and many companies are finding it difficult to comply. This panel will consider the varying requirements in jurisdictions around the world and, now, in California. Sponsor: NAFS Consulting Moderator: Sanaz Jaraiedi, CEO and Founder at NAFS, LLC Panelist: Jason Scheiderer, Partner at Dentons Panelist: Julia Jacobson, Partner at K&L Gates LLP Panelist: Ambler Jackson 9:50-10:30AM - Exhibit Hall Exhibit Teardown See you next year! Exhibitors: Exhibit #1 - RedSeal Exhibit #2 - Acalvio Exhibit #3 - Darktrace Exhibit #4 - Infogressive Exhibit #5 - Illumio Panelist: Cory Rutten, Security Account Manager at Infogressive Panelist: Michael Irwin, Director, Technology Operations and Cyberse- curity at Politico 4:00-5:00PM - Exhibit Hall Closing Cocktail Reception and Prize Drawing 6:00-9:00PM - TBD Private Dinner Events
  • 10. Sponsor Descriptions RedSeal RedSeal is the essential network modeling and risk scoring platform that puts decision-making power right in your hands. JEM JEM provides valuable insights, information and expertise to accelerate business in the digital age through consulting and advisory services, research and publications. Tempered Networks Tempered Networks was founded to solve the pervasive problem of TCP/IP and the security vulnerabilities imbued within it. Our innovative approach of using Host Identity Protocol creates a Zero Trust Network within minutes, without a change to the existing infrastructure. A powerful but simple point-and-click management interface enables customers to deploy and manage extensive environments at a fraction of the cost, and time to traditional methods. CyFIR CyFIR was built on two key principles – see more to know more, and then respond instantly. We give organizations the power to digitally investigate and triage thousands of endpoints on demand, minimizing business risk and operational cost. To effectively manage the myriad of today’s cyber perils, you need CyFIR™ – we Think Forensics First™. Nisos We are a team of operational experts with a depth of experience ranging between the public and private sectors. Since forming Nisos in 2015, we have grown into an enterprise of over 50 full-time operators in Alexandria, VA(HQ); New York, NY; Atlanta, GA; and San Francisco & Los Angeles CA. Our mission: to defend society from active and persistent threat. Over the last decade, we observed threat actors shift their focus from government to commercial targets, and yet saw little indication that the private sector was prepared to handle these threats. Moreover, we believe the low signal-to-noise ratio in the product and services market Pg. 9 does a disservice to the global community. We are dedicated to cutting through the noise to provide genuine security to our clients and answers to their intractable problems. Acalvio Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter. The solutions are anchored on patented innovations in Deception and Data Science. This enables a DevOps approach to ATD, enabling ease of deployment, monitoring and management. Acalvio enriches its threat intelligence by data obtained from internal and partner ecosystems, enabling customers to benefit from defense in depth, reduce false positives, and derive actionable intelligence for remediation. Darktrace Darktrace’s pioneering technology, the Enterprise Immune System, applies AI to the cyber defense challenge for the first time, and has proven itself successful in detecting cyber-threats that existing, legacy systems cannot. It quickly became clear that the technology was powerful enough to identify a diverse range of threats at their earliest stages – including insider attacks, latent vulnerabilities, cloud-based threats and even state-sponsored espionage. Infogressive We're a Managed Security Services Provider (MSSP) that takes pride in securing organizations of all sizes by combining the best technology available with passionate cybersecurity experts. We know the ins and outs of what your network needs to stay secure from the bad guys which is proven by our history of zero data breaches since 2006. Illumino Illumio has developed adaptive micro-segmentation technology that prevents the spread of breaches inside any data center and cloud.
  • 11. Pg. 12 Thank You Sponsors!