Day One Workshops

March 17, 2015

1:00 PM - 1:55 PM SESSION ONE
Track 1: The Next Generation Security Operations Center

As cyber threats continue to evolve, modern SOCs are finding an ever-increasing need to develop techniques and acquire technologies to stay ahead of their adversaries.  Current tools and techniques provide some protection but it is not enough.  This expert panel will discuss emerging techniques and technologies that will become requirements for the NextGen SOC. 

From rethinking the organization and staffing of a SOC to implementing smart investment in technology and its placement, the panel will provide an overview of the 10 Strategies of a World-Class Security Operations Center and deep technical insight into emerging technologies that will facilitate adoption of these strategies.  Drawing on decades of experience at the highest levels of cybersecurity operations, the audience will come away with a broad understanding of what it takes to build a NextGen SOC across sectors.
Moderator: Joseph Loomis, Founder & Chief Executive Officer, CyberSponse, Inc

Eduardo E. Cabrera,
Deputy Chief Information Security Officer, US Secret Service

Russell Murrell, Chief Information Security Officer, Dell Services

Jeff Schilling, Chief Security Officer, FireHost, Inc.; Colonel, US Army (ret)

Greg Touhill, Deputy Assistant Secretary for Cybersecurity and Communications, US Department of Homeland Security; Brigadier General, USAF (ret)

Carson Zimmerman, Principal Cybersecurity Engineer,The MITRE Corporation.; Author, Ten Strategies of a World Class Cybersecurity Operations Center
Track 2: Venture Capitalists Deep Dive Into Cyber

After a year where cyber breaches dominated headlines, venture capitalists are continuing to invest invest heavily in cyber security in 2015.  Cybersecurity is now a top Board/C-level priority. In an environment where threat actors are increasingly sophisticated and breaches drive significant financial/reputational damage, venture capitalists expect demand tailwinds for Cybersecurity solutions to strengthen.

VCs believe the following is true:

(1) Security is the top area for accelerating IT spend in 2015.

(2) The percentage of CIOs ramping Security spend is the highest than in recent years according to Goldman Sachs recent cybersecurity research of 2015.

Given this environment, where ARE VCs investing? What's hot/ what is not so hot? Why? The panel of esteemed VC investors will discuss these questions and many more.
Moderator: Hank Barry, Partner, Sidley Austin LLP
  • Alex Doll, Founder, Managing General Partner, Ten Eleven Ventures
  • Gilman Louie, General Partner, Alsop Louie
  • Ted Schlein , Managing Partner, Kleiner Perkins Caufield Byers
  • Mark Siegel, Managing Director,
    Menlo Ventures
  • Yanev Suissa, General Partner, SineWave Ventures
2:00 PM - 3:00 PM SESSION TWO
Track 1: How a Software Defined Perimeter Will Address Large Organizational Needs

Large organizations (100,000+ users) are highly vulnerable to cyber attack due to the need to connect vast numbers of devices to distributed applications. Unfortunately existing perimeter solutions do not scale well either on a security, cost or usability dimension. Software Defined Perimeter (SDP) is a new security model designed for large organizations. SDP is based on a simple process of 1/ identifying the device requesting access 2/ querying the identity system to determine what the user is allowed to access and 3/ connecting the user's device to approved applications with dynamically provisioned VPNs.   Conceptually SDP creates an Internet-scale need-to-know network. SDP's security model has been validated via public Hackathon's (attracting participants from 104 countries) to stop all forms of network attacks from DDoS, Man-in-the-Middle, Server/Query and Advanced Persistent Threat (APT).

The following session will provide an overview of the challenges faced by large organizations and then discusses how SDP solves them. The session will also include presentations by some of world's largest organizations on how SDP is being used as a scalable perimeter security solution.
Moderator: Robert Flores, Partner, Cognitio Corporation;
Former Chief Technology Officer, Central Intelligence Agency

Alan Boehme, Chief of Enterprise Architecture and Head of Emerging Technologies & IT Innovation, The Coca-Cola Corporation

Junaid Islam, Chief Technology Officer, Vidder

Tim Mather, Chief Security Officer, Cadence Design Systems

Jeff Schweitzer , Chief Innovation Architect - Product and New Business Innovation, Verizon

Hiroshi Sekine, Project Manager, Mazda North American Operations, R&D
Track 2: CISOs That Take Risks in Order to Manage Risk: Using Technology Innovation to Change the Game for Threat Actors
Abstract: This panel of CISOs committed to managing IT risk will provide several different examples of the use of innovative technology to change the game for serious threat actors forcing them to consider other enterprises as easier targets. In each case it involved the CISO taking on the risk of making the innovative technology work in an enterprise environment to significantly improve the risk management capability forcing the adversary to adjust or go elsewhere.
Moderator: Jim Routh, Chief Information Security Officer, Global Information Security, Aetna

Brad Arkin, Vice President & Chief Security Officer, Adobe

Jay Leek, Chief Information Security Officer, Blackstone
3:00 PM - 3:30 PM BREAK
3:30 PM - 4:25 PM SESSION 3
Track 1: Rapid Fire Format: Speed of Cyber Innovation and Adoption to Address Cybersecurity Needed Priorites for Today and Tomorrow
Abstract: Cyberspace is a dynamic environment and the challenges and threat vectors constantly change. While enterprises are more akin to establishing and following processes and operational maturity, addressing cyber threats need one to be agile and super responsive. Addressing cybersecurity requirement also calls for a balanced approach of adopting innovative technologies which not only fulfills today’s needs but can also work in harmony with the established technology & process ecosystem as the threat landscape changes. This calls for a discussion as to how we can include innovation and its adoption as a key item in enterprise cybersecurity strategy and identifying the needs proactively to serve the needs for today and tomorrow.
Moderator: Valmiki Mukherjee, Chief Architect, Enterprise Risk and Security Solutions, Cognizant, Chairman, Cloud Security Alliance North Texas

Greg Crabb, Inspector in Charge of Revenue, Product and Global Security,
US Postal Inspection Service

Indu Kodukula, Vice President of Cloud Security and Chief Information Security Officer, Intuit Inc

Manoj Leelanivas, President and Chief Executive Officer, Cyphort

Eduardo Perez, Senior Vice President, North America Risk Services,
Visa Inc.

Joseph Sullivan, Chief Security Officer, Facebook

Brett Wahlin, Vice President & Chief Information Security Officer,
Track 2: The Frontiers of Cyber Innovation
Abstract: With major new cyber breaches reported almost daily in the news,  75% of corporate CIO’s reporting cyber security as their #1 priority and Global 2000 Board Rooms scrambling to come to grips with the scale, scope and implications of cyber security threats, cyber security innovation is at the forefront of efforts to defend the global economy against the collective efforts of criminal elements, hacktivists and state actors to inflict damage on global IT networks at the speed of light.  Our panel of highly experienced practioners will look into their innovation crystal balls to identify the most promising areas for disruption innovation on The Frontiers of Cyber Innovation…
Moderator: Bob Ackerman, Managing Director & Founder, Allegis Capital

Sameer Bhalotra, Co-founder & Chief Executive Officer, StackRox

Ravi Devireddy, Founder & Chief Executive Officer, E8 Security

Oren Falkowitz, Founder & Chief Executive Officer, Area1 Security

John Jolly, Chief Revenue Officer, RedJack
4:30 PM - 5:30 PM SESSION FOUR
Track 1: The Next Security Frontier: Securing Inside the Perimeter
Abstract: Enterprises and government have invested billions of dollars in securing their perimeter, yet they still remain vulnerable.  A recent survey from the Ponemon institute indicate that 88% of people surveyed are scared of the insider threat, and over 70% of privileged users feel entitled to look at anything – and the costs associated with insider breaches are staggering as over $300B a year of damage is tied to internal user fraud.   Moreover, recent breaches seem to be rapidly changing the security and privacy paradigm as employees now are demanding that their internal communication and activity is secured so their sensitive data is not made public.  This panel will explore the future of insider security, and probe when we will see an insider security platform added to the security fabric of every company.
Moderator: Guy Filippelli, Chief Executive Officer, RedOwl Analytics

Brian Dōne, Chief Architect/Senior Strategist,
US Department of Homeland Security

Malcolm Harkins, Vice President, Chief Security and Privacy Officer,
Intel Corporation

Philip Quade, Special Assistant to the Director National Security Agency for Cyber; Chief of the NSA Cyber Task Force

Bob Stasio, Global Head of Threat Intelligence, Bloomberg, LP

Cornelius Tate, Vice President of Asset Protection, Sallie Mae Bank
Track 2: Partnering to Break into the Federal Marketplace
Abstract: In this panel we will hear from a number of established Systems Integrators who hold large Government-Wide Acquisition Contracts (GWAC) and have successfully partnered with small businesses to deliver innovative security products and services to federal customers.  Additionally, we'll hear from some of the entrepreneurial companies that have used these partnerships to access this marketplace.
Moderator: Lawrence C. Hale, Office of Strategic Programs,
Integrated Technology Services, Federal Acquisition Service,
US General Services Administration

Robert Pate, Principal Cyber Security Strategist, Leidos

Hemma Prafullchandra, Chief Technology Officer and
Senior Vice President of Products, HyTrust

Jeffrey Snyder, Vice President, Cyber Programs, Raytheon Company

Susan Wilson, Director, Business Development,
Northrop Grumman Cyber Division

Day Two Forum Agenda

March 18, 2015

7:30 AM – 8:30 AM Registration and Continental Breakfast
8:30 AM – 5:30 PM General Session
8:30 AM - 8:40 AM

Introductory Remarks by Forum Host

Rick Geritz, Chief Executive Officer & Founder, Life Journey,
Chairman, CyberMaryland
8:40 AM – 8:45 AM

Opening Remarks

Douglas Maughan, Division Director, Cyber Security Division,
Department of Homeland Security,
Science & Technology Directorate
8:45 AM – 8:55 AM

Welcome Remarks

Robert D. Rodriguez, Chairman & Founder, SINET
8:55 AM – 9:25 AM The Tenets and Characteristics of a High Functioning Cybersecurity Collaboration
Abstract: Through our work at NIST’s National Cybersecurity Center of Excellence we have identified 3 organizational characteristics and 5 operational tenets that drive the work we do.  The NCCoE is a collaborative home for innovation, bringing together scientists, engineers, and mathematicians from across government, industry, and academia, to build solutions that implement cyberscurity standards and best practices.  While the center is focused on technical development, these tenets and characteristics are broadly applicable to any cybersecurity partnership.
Moderator: Nathan Lesser, Deputy Director,
National Cybersecurity Center of Excellence (NCCoE),
National  Institute of Standards and Technology (NIST)
9:25 AM – 9:40 AM SINET Thinks Forward With Nick Shevelyov:
Technical Debt

Data Breaches make front page news on a regular basis. But how often is root-cause analysis and lessons learned applied? In this talk, Nick Shevelyov will share a perspective on how enterprise technical debt is contributing to breaches, and how organization might manage this growing risk.

Nick Shevelyov, Chief Security &
Chief Privacy Officer, Silicon Valley Bank (SVB)
9:40 AM – 9:55 AM SINET Thinks Forward With Elias Manousos:
The Ultimate Targeted Attack : Malvertisements

The Internet economy is at risk of the very thing that powers it:
Internet advertising. Global adversaries now infiltrate the ad
ecosystem on a daily basis, injecting malware into web and mobile
devices via Malvertisements. Ads are everywhere; everyone is affected. With so much at stake, it’s critical we detect and defend against this threat. In this session, we explore how these bad actors are able to break in and, once inside the ecosystem, have access to the most sophisticated user targeting system ever developed.

Elias Manousos, Co-Founder and Chief Executive Officer, RiskIQ
9:55 AM – 10:10 AM SINET Thinks Forward With Dr. Phyllis Schneck:
DHS Cyber Vision: Industry, Technology and Trust

The Department of Homeland Security is raising the national bar in Cybersecurity. By driving markets to build and provide stronger technologies and services, and fostering trust and partnership to improve information flow and speed of protection, DHS remains at the forefront of a rapidly evolving landscape of collaboration in Cybersecurity.  Dr. Schneck will outline her vision for DHS’s cyber future and how we use science, people and a whole-of-government effort to drive Cybersecurity as a key part of Homeland Security.

Dr. Phyllis Schneck, Deputy Under Secretary for Cybersecurity, National Protection and Programs Directorate,
US Department of Homeland Security
10:10 AM – 10:25 AM SINET Thinks Forward With Marc Goodman:
The Future of Crime and Security: Why Cyber Was
Only the Beginning

The future has already arrived—it’s just unevenly distributed. Though our security threats today seem daunting, we are at the earliest stages of our technological development. While much has been made of our growing levels of cyber risk, it is but the first stage in an onslaught of technological development that will leave our heads spinning. Big data, artificial intelligence, black box algorithms, synthetic biology, the Internet of Things, virtual reality, robotics, and even brain science will have profound impacts on our world—and they are all hackable. How then can we build this brave new world safely and securely? In this session, we discuss the challenges before us and consider how we might “survive progress” and thrive in our exponentially changing world.

Marc Goodman, Author, “Future Crimes“
Chair for Policy and Law,
Singularity University.
10:25 AM – 10:45 AM BREAK
10:45 AM – 11:25 AM The Internet of Things, Automation of a Cloud Discussion
Abstract: In this panel we will discuss how IOT fits into cyberspace as a whole and what its broader impacts may be with respect to security and manageability.  What work has been done to define security strategies and architecture?  How should we think about risk in the different spaces of the IOT such as sensors, transportation, and building automation.  What are the roles of government and industry in managing and securing the IOT.  
Moderator: Reynold Schweickhardt, Director of Technology Policy, Committee on House Administration

Peter Esser, General Representative, Washington Operations,
NXP Semiconductors USA, Inc.

Richard Hale, Deputy Chief Information Officer for Cybersecurity,
US Department of Defense

Tom Patterson, Vice President/General Manager,
Global Security Solutions, Unisys Corporation

Dr. Peter Sweatman, Director, University of Michigan
Transportation Research Institute and the
Mobility Transformation Center, University of Michigan
11:25 AM – 12:10 PM Rapid Fire Format: What Types of Attacks Do Cybersecurity SMEs See Trending Over The Next One to Three Years?
Abstract: Today’s cyberattacks come trivially to the even modestly equipped and educated attacker. Why is it so simple for them? And are there truly any new attacks? Or are there simply more adversaries, better funded, using the same old tricks to evade detection and defenses? This distinguished panel of cyberwar hardened security experts will explore this question and today’s current attacks, as well as postulate on how the attacks will evolve over the coming years. We will push the panel for specific techniques they will be using and the simple solutions to preventing them that require little more than common sense, not seven figure technology checks.
Moderator: John Petrik, Editor, the CyberWire, CyberPoint International

Robert Carey, Vice President Public Sector, CSC Global Security

Sam Glines, Co-Founder & Chief Executive Officer, Norse

George Kurtz, President & Chief Executive Officer,
Crowdstrike, Inc.

Stuart McClure, Chief Executive Officer & President, Cylance

Saryu Nayyar, Chief Executive Officer, GuruCul Solutions

Kevin Walker, Vice President,
Assistant Chief Information Security Officer, Walmart
12:10 PM – 1:25 PM

SINET Connects: Networking Luncheon

ITSEF is providing the opportunity for attendees to sit down in an informal and intimate (8 - 10 per table) setting with security leaders from private industry, Federal Government and venture capital. This optional Networking Luncheon is designed to promote awareness, education and learning opportunities on how solution providers can best shape their vision, roadmap and assess their current path to meet the market needs. 

TABLE #1: Information Sharing: From Policy to Reality
Hosted by Jennifer Byrne, Chief Security Officer, Worldwide Public Sector, Microsoft

TABLE #2: Back to the Basics: Improving the Who, What, Where, How and Why Through Actionable Threat Intelligence and Information Sharing
Hosted by, Eduardo E. Cabrera,
Deputy Chief Information Security Officer, US Secret Service

TABLE #3: Everyone Gets Breached Sooner or Later:  How Do You Detect the Attack and Minimize the Damage?
Hosted by Tony Cole, Vice President and
Global Government Chief Technology Officer, FireEye, Inc.

TABLE #4: Information Sharing is Not a Panacea
Hosted by Michael Coomes,Director, International Engagements and Internet Governance, DoD Chief Information Officer

TABLE #5: Cloud-Based Security Services: Which Ones Do You NOT Use and Why? What Will Your Future Choices Be?
Hosted by, Justin Dolly, Vice President, Chief Security & Privacy Officer, Jawbone

TABLE #6:Future of Data Centers
Hosted by Tim Dombrowski, Operating Partner,
Andreessen Horowitz

TABLE #7: Use of Models and Frameworks to Visually Represent Cybersecurity Maturity:  From the Ops Center to the Board Room
Hosted by Dennis P. Gilbert, Jr., Director of Information and Cyber Security, Corporate and Information Security Services, Exelon Corporation

TABLE #8: Disruptive SOC Technologies/Processes
Hosted by Paul Grabow, Chief Information Security Officer
Office of the Sergeant at Arms and Doorkeeper, United States Senate

TABLE #9: Challenges and Opportunities to Increase Private Sector Adoption of Innovative Privacy Technology
Hosted by Paul Grassi, Senior Standards and Technology Advisor, NSTIC, Information Technology Laboratory,
National Institute of Standards and Technology (NIST),
US Department of Commerce

TABLE #10: Connecting Cybersecurity Education, Threat Intelligence, and Incident Response
Hosted by Jeff Klaben, Chief Information Security Officer,
SRI International

TABLE #11: SBIR Direct to Phase 2
Hosted by Susan Nichols, Program Director, SBIR/STTR Program Manager, Small Business Programs Officer, The Defense Advanced Research Projects Agency (DARPA)

TABLE #12:The Need for New Industry Standards to Address Security and Availability of all Personal Data Across Industries
Hosted by Tom Pageler, Chief Information Security Officer, DocuSign

Table #13 IoT Security: The Good, the Bad, and The Ugly
Hosted by Billy Rios, Author, Speaker, and Serial Entrepreneur

TABLE #14 Governance: Balancing Strategy and Tactical Operations
Hosted by Jamey Sample, Former
Chief Information Security Officer, Pacific Gas & Electric Company

TABLE #15: Friction: The Enemy of Rapid Cybersecurity Response
and What to do About It

Hosted by Nick Shevelyov, Chief Security & Chief Privacy Officer,
Silicon Valley Bank (SVB)

TABLE #16: Till Death Do Us Part ...... The Marriage of Physical and Cyber Security
Hosted by Cornelius Tate, Vice President of Asset Protection,
Sallie Mae Bank

TABLE #17: Predictive Analytics: Realizing Security Value from Enterprise Big Data
Hosted by Kris Virtue, Director,
Global Information Security and Risk Management, Qualcomm

TABLE #18: 4 Cyber Security Shark Tank
Hosted by Robert Pate, Principal Cyber Security Strategist, Leidos

TABLE#19 Law Enforcement Engagement and Collaboration
Hosed by Dan Schott, Head of Global Fraud Investigations, Visa

Abstract: Innovators at this table will be given the opportunity to deliver their best two-minute elevator pitch on their Cybersecurity product or service they are providing into the marketplace.  Rob will provide feedback and counsel to these entrepreneurs on ways they may be able to advance their offerings, adjustments to their current roadmap as well as the opportunity to be invited into future customer meetings if they are a winner during their time in the Shark Tank.
1:25 PM – 5:30 PM General Session
1:25 PM – 2:05 PM How to Talk to Your Board About Maximizing the Value of Your Information Assets, While Managing Your Risks
Abstract: While boards have traditionally been focused on guiding their organizations to maximizing shareholder value, the strain of constant flow of data breaches is gaining great prominence in board level discussions. Ensuring their organizations leverage information assets to their maximum benefits while establishing sustainable approaches for managing risk and drastically reducing the likelihood of becoming the next breach headline, is the primary mandate for their CISOs. This panel session will discuss how today’s CISO requires comprehensive threat visibility across high-value assets and actionable intelligence for proactive decision making in order to approach the board with confidence.
Moderator: Feris Rifai, Co-Founder & Chief Executive Officer,
Bay Dynamics

Lamont Orange, Chief Information Security Officer,
Vista Consulting Group

Jim Routh, Chief Information Security Officer, Global Information Security, Aetna

Myrna Soto, Senior Vice President & Chief Infrastructure and Information Security Officer, Comcast
2:05 PM – 2:20 PM SINET Thinks Forward With Dr. Brian Pierce:
DARPA Investments in Cyber and Information Technologies for National Security

DARPA's mission is to make pioneering investments in breakthrough technologies for national security.  The results have included icons of modern society, such as the Internet and miniaturized, mobile global positioning systems, as well as game-changing military capabilities that encompass high performance sensors, precision weapons and stealth technologies. DARPA has demonstrated a unique ability to transform the world around us by changing our view of what is possible. The talk will provide insight into DARPA's  current investments in cyber and information technologies for national security.

Dr. Brian Pierce, Deputy Director,
Information Innovation Office (I2O),
Defense Advanced Research Projects Agency (DARPA)
2:20 PM – 2:35 PM SINET Thinks Forward With Enrique Salem:
Investing in Tomorrow's Security

The Federal Reserve Bank, Facebook, Home Depot, and Target have all succumbed to cyberattacks recently. The attacks get greater and more intense in scope every time. Investor interest in the cybersecurity market, at both the consumer and the corporate level, has also increased.

2014 saw a record level of investment funding and deals to the space with $1.71 billion invested in 240 deals to emerging cybersecurity companies according to CB Insights.

Where are top tier cyber investors looking for new technologies? What are the trends affecting their investments?

Enrique Salem, Bain Capital Ventures Managing Director will give his insights and predictions for the mobile, social and cloud markets. As a 27-year security veteran, and former CEO of Symantec,  Enrique will present his point of view on the approaches and technologies necessary to create tomorrow's secure future.

Enrique Salem, Managing Director, Bain Capital Ventures;
President Barack Obama’s Management Advisory Board
2:35 PM – 2:50 PM SINET Thinks Forward With Phil Zimmermann:
Digital Privacy: A Requirement To Do Business

In 1991, at the start of the Crypto Wars, the idea of digital privacy was radical.  Today it’s required to do business.  Without an expectation our data is secure, online banking cannot work and doctors cannot store medical records electronically.  Protecting the privacy of individuals is why I started PGP, and why Mike Janke and I started Silent Circle.  But at Silent Circle we’ve come to realize that protecting individuals at work may be the strongest form of corporate security possible.  That’s what we’re working on, and I’d be delighted to explore these themes further at the IT Security Entrepreneurs Forum.

Phil Zimmermann, President & Co-Founder, Silent Circle
2:50 PM – 3:05 PM SINET Thinks Forward With Peter Tseronis:
Technology Roadmap

From the lab researcher to the program manager, the plant operator to the power administrator, almost every employee at the Department of Energy (DOE) relies on IT to carry out their day-to-day duties. For example, researchers at DOE’s Oak Ridge National Laboratory are using wind-speed and location data to provide real-time and fully automated geospatial estimates of hurricane impacts on the national power grid. In another example, the Princeton Plasma Physics Laboratory has used 3D printing to design and build critical components for nuclear fusion facilities. At an enterprise level, advanced cybersecurity techniques for continuous monitoring of DOE networks ensure that the United States Nuclear stockpile is secured against foreign and domestic agents.

The DOE is unique in that many technologies in the market today were originally implemented for specific scientific and mission needs within the DOE before being transitioned to the marketplace. The Roadmap has the potential to coordinate the development of next-generation IT at the DOE, as well as accelerate the adoption of the DOE’s homegrown technology.

Peter Tseronis, Chief Technology Officer
US Department of Energy
3:05 PM – 3:25 PM BREAK
3:25 PM – 4:05 PM

Next Generation Security Solutions - Leveraging Machine Learning and Data Fusion Techniques

There are a number of new enterprise focused, VC backed cyber security companies who are leveraging the application of machine learning, data fusion and advanced analytics to detect cyber security breaches.   These solutions are surfacing new ways of detecting external and internal cyber threats to deliver unique and fast real-time results.  This panel will explore this new breed of next generation cyber security companies.   The panel will include a few of the companies targeting this architecture along with related industry experts.
Moderator: George Hoyem, Investment Partner, In-Q-Tel

Paul Grabow, Chief Information Security Officer
Office of the Sergeant at Arms and Doorkeeper,
United States Senate

Sriram Ramachandran, Co-Founder and Chief Executive Officer, Niara

Muddu Sudhakar, Founder & Chief Executive Officer, Caspida

Justin Wilder, Cyber Security Technical Lead, In-Q-Tel Inc.
4:05 PM - 4:45 PM Interview With Anne Neuberger: Unique Perspectives from a Public Sector Chief Risk Officer

Enterprise risk management is considered a best practice in many fields and amplifies an organization's ability to recognize, integrate, and assess the risk-reward value from multiple perspectives to make more informed, timely, and defensible decisions. The role of Chief Risk Officer is often established to guide the implementation and operation of an organization’s enterprise risk management. Peter LaMontagne will interview Anne Neuberger and Anne will share her perspectives on ERM programs (which are at various points of maturity) and lessons learned on building effective risk management.

Peter LaMontagne, Chief Executive Officer, Novetta Solutions

Special Guest:
Anne Neuberger
, Chief Risk Officer,
National Security Agency
4:45 PM – 5:15 PM Fireside Chat with Keith Krach,
Chairman and Chief Executive Officer of DocuSign and former Chairman and Chief Executive Officer, Ariba

With recent data breaches, emerging security threats, and a constantly evolving security and risk landscape, the importance of a CEO who understands, supports and advances security is paramount.  What can the CEO do to ensure they position security as a core element of the business and its market position? In this co-presentation from DocuSign’s CEO and CISO, hear the case for security requiring independence and trust — including an independent board of governors. Furthermore, explore how it must also integrate with other business functions to create value for the business, its customers and partners.

Tom Pageler, Chief Information Security Officer, DocuSign

Special Guest:
Keith Krach, Chairman and Chief Executive Officer, DocuSign and former Chairman and Chief Executive Officer, Ariba
5:15 PM – 5:30 PM

Closing Remarks

Robert D. Rodriguez, Chairman & Founder, SINET
5:30 PM - 7:30 PM SINET Connects: Networking Reception