CyberSecurity Badge
 

Your Risk of a Major Cybersecurity Breach in 2015 is Huge

You know the old joke, just because you’re paranoid doesn’t mean they’re NOT out to get you? In today’s security world, it’s not funny.

The reality has shifted – from occasional breaches to daily warfare that reaches deep into the fabric of our lives. The enormity of the threat is incalculable – no matter what size your company or what business sector you occupy.

 
 

What You'll Know

  • You can't build a security program to reflect your risk strategy -- if you don't have one
  • The critical nature of understanding espionage techniques for uncovering cyberthreats
  • The challenges of securing medical data due to the diversity of applications and medical devices
  • That quantifying "unknown" security problems is essential to protecting against malicious online activity

 

 

What You'll Learn

  • If your budget is keeping up with your security threat
  • What is the real threat in your business sector?
  • Do you need breach insurance?
  • Does your mobile strategy need revamping in the face of threats?
  • Advanced persistent threat tools will become the norm in 2015. How can you prepare?
  • How much information is safe to share?
  • As threats get worse, what happens to anonymity, freedom of speech, and privacy?
  • Is there really such a thing as secure architecture?
  • Why does the industry have so much trouble identifying bad guys?
  • Can the techniques that secure the space shuttle and nuclear weapons help you in your security planning?
  • How to apply cyber trade craft to uncover espionage threats

What You'll Experience

  • A wake-up call!
  • A dynamic day learning solutions that actually work for security threats
  • The newest best thinking from companies like Dow Jones, Home Depot, HP, NERC, Cedars-Sinai Medical Center, Booz Allen Hamilton, and more
  • An opportunity to dig deep in Q&A and collaboration
  • An up-close look at exciting new products in the field
  • An unmatched networking opportunity
  • A chance for interaction over lunch and cocktails

 

 

 

Oct. 27, 2015 - San Jose, California

Speakers


Justine Bone
Bone
Jim Anderson
Anderson
Chris Calvert
Calvert
Steven Bay
Bay
Josh Greenbaum
Greenbaum
Josh Jabs
Jabs

Justine Bone

Executive Director
Secured Worldwide

Justine Bone is an information security executive and technology expert with background in risk management, software security, information security governance, and identity management. She has spent 15 years working in the private sector for financial, news, and information security companies, plus several years serving the intelligence community. Justine is an Executive Director with Secured Worldwide, an NYC-based financial technology provider, where she helps drive the product roadmap and security strategy along with overall technology management and business development responsibilities. Previously Justine was Chief Information Security Officer at at Dow Jones, a News Corporation company and publisher of the Wall Street Journal, and Global Head of Risk Management at Bloomberg L.P. Her startup experience also includes several years as CEO of security research firm Immunity Inc. Justine began her private sector career as a vulnerability researcher with Internet Security Systems (now IBM) X-Force after training with the National Security Agency in Ft Meade, Maryland, and holding an analyst position with New Zealand’s Government Communications Security Bureau. She also has a background in the performing arts as an ex-dancer with the Royal New Zealand Ballet company.

Jim Anderson

President
BAE Systems America

Jim Anderson, president of the Americas of BAE Systems Applied Intelligence, brings over 25 years of experience of sales and consulting in the high-tech industry. He is an energetic leader who innovates on the edge. Anderson holds a bachelor of science in electrical engineering and computer science from Princeton University and an MBA from the Wharton School.

Chris Calvert, CISSP, CISM

Global Director, Solutions Innovation & Services Engineering
HP Enterprise Security Products

Chris leads the team that supports the HP Enterprise Security Products suite–ArcSight, Tipping Point, Fortify, and Atalla. Chris has over 24 years’ experience in information security. He brings extensive international experience in Europe and Asia. From 2007 to 2013, Chris was the CEO of Laconic Security, an ArcSight SIOC partner, where he personally led the design and build of many global multinational Security Operations Centers including; Walmart, Vodafone (Germany), Shell Oil (The Netherlands), Sony Network Entertainment, and Apple. Chris was previously director of professional services for Cybertrust, and manager of security intelligence and operations at IBM Global Services. Before joining IBM, Chris worked in the National Defense and Intelligence community in the field of Information Operations. He supported such agencies as the DOD Joint Staff, the Land Information Warfare Activity, and the Space Warfare Center. Chris served for 10 years in the US Army in Military Intelligence and Special Forces.

Steven Bay

Senior Lead Technologist
Booz Allen Hamilton

Steven Bay is a Senior Lead Technologist on Booz Allen Hamilton’s Commercial Cyber team where he is leading the development of Booz Allen’s commercial cyber efforts in the western U.S. Since joining the firm in 2007, Steve has been dedicated to cyber intelligence and was a key part in building Booz Allen’s cyber intelligence commercial capability. Steve designed and implemented cyber intelligence teams for multiple Fortune 100 companies, including a top-5 retailer, and has assessed and designed numerous other information security programs. Prior to his work on the commercial team, Steve was the firm’s site lead at NSA-Hawaii and before that led a cyber-analysis team supporting NSA in Maryland. He served six years in the U.S. Air Force as a Persian-Farsi Linguist and is currently an Intelligence Officer in the U.S. Navy Reserve. He holds an MA in International Relations and an MBA from Thunderbird School of Global Management.

Joshua Greenbaum

Principal
Enterprise Application Consulting

Joshua has over 30 years of experience in the industry as a computer programmer, systems analyst, author, consultant, and industry analyst. Josh regularly consults with leading public and private enterprise software, database, infrastructure, implementation, and hardware companies, and advises end users on technology infrastructure and applications selection, development, and implementation issues.

Josh Jabs

Vice President
Entrust Datacard

Josh Jabs was named Vice President upon the completion of the Entrust acquisition by Datacard Group in December of 2013. Josh joined the company in 2009 as VP Government Vertical Marketing, bringing significant experience in the government and security industries. Prior to joining Entrust Datacard, Josh directed investor engagements as an equity analyst in the Security and Financial Technology sectors at Roth Capital Partners and Piper Jaffray and held roles within the U.S. government in areas dealing with new technology investments and security research. He holds an MBA, master’s degree in electrical engineering, and received a bachelor in electrical engineering from the United States Air Force Academy.
Geoff Aranoff
Aranoff
Geethakumar
Geethakumar
Dr. Spencer Soohoo
Soohoo
Marcus H. Sachs
Sachs
David Thornbury
Thornbury
Frank Teruel
Teruel

Geoff Aranoff

Chief Information Security Officer
Broadcom Corporation

Mr. Geoff Aranoff serves as Broadcom Corporation’s Chief Information Security Officer (CISO). Mr. Aranoff is responsible for Broadcom’s enterprise security strategy including monitoring and control systems and risk management for intellectual property (IP) protection. Broadcom has more than 11,000 employees around the world and the number one IP portfolio among fabless semiconductor companies as ranked by IEEE. Mr. Aranoff leads an organization responsible for adopting and enforcing policies for internal and external risk management, IT security including network, application, endpoint, and storage security, and electronic discovery. Mr. Aranoff is also responsible for forensics for ongoing security investigations. Mr. Aranoff has been Broadcom’s CISO for more than 10 years during which time has also served as Broadcom’s Chief Privacy Officer (CPO). In this role he led the organization through a comprehensive Safe Harbor Certification program to ensure adherence to EU privacy directives. Mr. Aranoff joined Broadcom in 1999 from the entertainment industry where he worked for Warner Brothers and Disney in Windows based standards and support. Mr. Aranoff launched his career after serving for six years in the United States Marine Corp reserve.

Sarath Geethakumar

Sr. Director, Security Architecture & Engineering
Home Depot

Sarath Geethakumar, Head of Security Arch & Engineering at The Home Depot is an active researcher and security enthusiast.  Sarath focuses his research activities around mobile security, behavioral modeling and software defined perimeter. In addition to research, Sarath has also been a co-author for the book "Hacking Exposed Mobile" and an active member and contributor of OWASP web and mobile initiatives. Before joining The Home Depot he served as the Senior Director of Mobile & Product Security at Visa Inc. and as an Information Security Specialist and Red Team member at American Express. Sarath’s background also includes roles such as security specialist, security consultant, lead architect and software developer. Sarath has also provided consulting expertise to various financial institutions and Fortune 500 companies as part of his consulting career. He has played a key role in shaping the mobile security practices across various organizations and training security professionals on mobile security.

Dr. Spencer Soohoo

CSO/Director, Scientific Computing
Cedars-Sinai Medical Center

Dr. SooHoo has been with Cedars-Sinai for over 36 years, starting first as a biomedical engineer, then a research scientist in pulmonary medicine before moving into IT to manage a research computing facility at Cedars-Sinai before it was merged with the enterprise IT organization. His roles include managing data networking, security, servers, e-mail, storage, and a data center. Dr. SooHoo earned a BS in Electrical Engineering from the University of Rochester, a MS in Electrical Engineering from George Washington University, and MS and PhD degrees in Biomedical Engineering from the University of Southern California.

Marcus H. Sachs

Senior Vice President, Chief Security Officer
Verizon, North American Electric Reliability Corporation (NERC)

Marcus Sachs is NERC's Senior Vice President, and is active in several public/private partnership groups in Washington, including the Communications Sector Coordinating Council and the President’s National Security Telecommunications Advisory Committee. He holds degrees in civil engineering, computer science, and science and technology commercialization, and is pursuing a PhD in public policy.

David Thornbury

VP of Sales
Watchful Software

David is currently Vice President of Worldwide Sales for Watchful Software which is a data-centric security solution addressing the growing need to protect against the insider threat of malicious data theft or leaks, and accidental data loss or mistakes. His security software experience started in 2004 when he was the VP of International Sales for Voltage Security, an enterprise data protection security software company. Prior to joining Watchful Software, he was the Director of Alliances at Quintiq, a leading, global software company offering supply chain planning, scheduling and optimization from a single application capable of solving any type of planning puzzle. He is an accomplished leader with over 15 years in the information technology industry. David has diverse experience with a variety of information technology solutions. Prior to joining Quintiq, David was VP of Sales for Epilogue Systems which is focused on automating the creation of training, on-line help and support content for enterprise software applications like ERP, EHR, CRM, Business Intelligence, et al. Before then he was VP of Sales for Tealeaf, an e-commerce root cause analytics solution concentrating on Customer Experience Management. Preceding that, David was Senior Director of Sales at BEA Systems, an enterprise infrastructure software company with development, portal, middleware, integration and service-oriented architecture solutions. He also spent time with Cambridge Technology Partners which pioneered fixed time/fixed price consulting engagements and a rapid application development methodology. Additionally, he worked for Centura Software which offered database, computer programming language and application server tools. David’s leadership proficiencies include strategic solution selling and training, creative mentoring, organizational structuring, hiring, SFA management and optimization, marketing collateral development, demand generation, quota/compensation planning, go-to-market strategy development and proposal writing. His leadership approach includes the ability to match growth needs with operational enhancements. He has realized success closing direct business with some of the largest companies in the world. He also has extensive experience building worldwide channel models. He was graduated from Indiana University of Pennsylvania with a BS degree in Marketing/Communications.

Frank Teruel

Chief Financial Officer
ThreatMetrix

Frank Teruel is an experienced executive with significant domain knowledge in sales, finance, and operations. As chief operating officer at Lightpost Holdings, a global publishing, licensing, and media company, Mr. Teruel held global profit and loss responsibility and directed all group operating activities. Prior to joining Lightpost, Mr. Teruel served as chief financial officer and vice president of worldwide services and support for Vormetric, an enterprise data security and encryption company. Prior to joining Vormetric, he served as vice president of finance at Emagia Corporation, an enterprise software company focused on working capital optimization solutions. Prior to Emagia, he served as vice president of finance and chief financial officer at TelePost, Inc., an international provider of conferencing and collaborative solutions. Mr. Teruel has also served as managing director of Montgomery Financial Management where he was responsible for all aspects of the northern and southern California practices. He also brings experience from SyQuest, Inc (NASDAQ: SYQTQ) where he held senior financial and sales management positions and PricewaterhouseCoopers. Mr. Teruel is an adjunct professor at Santa Clara University’s Leavey School of Business and is a faculty member in the Business and Computer Information Systems department at De Anza College. He previously served as chairman of the Data Security Chapter of the International Association of Outsourcing Professionals, been an industry keynote speaker, contributed articles on data security, and served on a number of company and non-profit boards. He previously served as the president of the Thomas Kinkade Foundation and is the founder of Aqua Munda, an organization dedicated to clean water solutions for the developing world. Mr. Teruel holds a master of business administration from Liberty University, a Bachelor of Arts degree in business administration and is a CPA.

 

 

Agenda


Cybersecurity Badge

Morning Session: 9:00 a.m. – Noon

Geoff Aranoff

Chief Information Security Officer
Broadcom Corporation

Cybersecurity Strategies for Large Enterprises

Mr. Geoff Aranoff serves as Broadcom Corporation’s Chief Information Security Officer (CISO). Mr. Aranoff is responsible for Broadcom’s enterprise security strategy including monitoring and control systems and risk management for intellectual property (IP) protection. Broadcom has more than 11,000 employees around the world and the number one IP portfolio among fabless semiconductor companies as ranked by IEEE.
 

Sarath Geethakumar

Sr. Director, Security Architecture & Engineering
Home Depot

Securing Content in an Insecure World<

Learn how Sarath's research activities have been instrumental in uncovering numerous security weaknesses with mobile device management solutions and platform security capabilities that were disclosed to appropriate vendors.
 

Justine Bone

Executive Director
Secured Worldwide

The Future-State CISO

Technology evolves faster than Information Security best practices..New platforms, communication methods, and threats evolve faster than our ability to react. We aim to build dynamic security programs to reflect an organization's risk strategy - however the strategy is often non-existent. Justine will review traditional and emerging information security governance trends and discuss how that has affected the security industry's capabilities. She will shed light on the future of cyber security strategy and policy-making, and highlight what cyber security professionals need to focus on in order to better address the evolving needs of consumers, companies, and government services.

Chris Calvert, CISSP, CISM

Global Director, Solutions Innovation & Services Engineering
HP Enterprise Security Products

A Vision for the Future of Analytical Detection

Chris will delve into the modern day challenge of detecting bad guys and explain some of the reasons we as an industry find that so difficult. He will then present a vision and roadmap to leverage the capabilities of data science to detect advanced threats to the modern enterprise. Big Data is just a problem statement and a new set of plumbing tools but what we can do with that data using a scientific approach is much more interesting.
 

Lunch: Noon - 1:30 p.m.

Afternoon Session: 1:30 p.m. – 5:30 p.m.

Josh Greenbaum

Principal
Enterprise Applications Consulting

The Ever-Evolving Enterprise Threat Landscape (panel)

Panelists: Jim Anderson, BAE Systems America; David Thornbury, Watchful Software; Frank Teruel, ThreatMetrix; Josh Jabs, Entrust Datacard

Keeping track of the ever-evolving threat landscape is the first step in establishing a strategy to combat security threats.

Marcus H. Sachs

Senior Vice President, Chief Security Officer
Verizon, NERC

Managing the Security Unknowns

Donald Rumsfeld once said that there are things we know, and things we don't know; and there are things we don't know that we don't know. In this presentation we'll look at how to quantify "unknown" security problems, why they are important, and how they relate to protecting against online malicious activity. This presentation will describe a model of risk management based on knowns vs unknowns and show how it can apply to different risk management processes.

 

Dr. Spencer Soohoo

CSO/Director, Scientific Computing
Cedars-Sinai Medical Center

The Evolution of Healthcare Cybersecurity

Healthcare cybersecurity has historically lagged cybersecurity in other business sectors. But high-profile breaches have broadened the focus beyond HIPAA security and privacy compliance, and now, senior healthcare leaders are scrambling to catch up in terms of cybersecurity initiatives and spending. No longer are the CSO’s concerns viewed as theoretical. However, securing healthcare information is challenging because of the diversity of applications and medical devices where security has been an afterthought, a weak security culture, and the need to quickly access or share information for safe, effective patient care. This presentation will illustrate some of the challenges and lessons learned.

Steven Bay

Senior Lead Technologist
Booz Allen Hamilton

Cyber Tradecraft or Espionage

Join a discussion of the journey of cyber intelligence from a military intelligence perspective and its application to commercial markets. Learn through vivid examples about cyber threats and impacts. Minimize your cyber risks by applying the cyber tradecraft and understand the criticality of espionage techniques for uncovering cyber threats 
 

 

 

Sponsorships

 

Current Sponsors


        Entrust Datacard      Watchful Software            Secure Auth LogoHPBAE SystemsBitglass logo


     Illumio LogoAT&T ThreatMetrix         LogRhythm

                                                                                        

 

Attendee Industries
Attendee Industries

Reach the Decision-makers in Cybersecurity – Present and Future

Cybersecurity is one of the Fastest-growing Markets in the World! Only IEEE Computer Society Attracts the C-Levels, the Top Techs, and the Hands-on Specifiers Who Are Driving This Rapidly Evolving Issue.

When you sponsor Rock Stars of Cybersecurity, you reach a unique audience – a level of decision-makers who don’t attend other symposia.

With an agenda aimed at real-world, business-critical decisions, and a lineup of experts unequaled at other cybersecurity events, Rock Stars of Cybersecurity is an obvious investment for any organization interested in influencing the future of cybersecurity technology.

  • Meet this influential group of users and potential users face-to-face
  • Enjoy the highly personal nature of the event to network and enhance your brand
  • Generate leads in a group where every attendee is a prospect
  • Share lunch and cocktails with people you want and need to know
  • Stimulate discussions resulting from the engaging, leading-edge presentations
  • Showcase your products and services in a dynamic, engaged environment

Sponsors at Rock Stars of Cybersecurity are integral parts of both the content and success of the event. Take advantage of these unique sponsorship opportunities –

Platinum Sponsor  

Gold Sponsor

Silver Sponsor

Panel Speaker Slot

Registration Sponsor

Luncheon Sponsor

Cocktail Reception Sponsor

Lunch Roundtable Sponsor – Bring a current customer and share your company’s technology story with a captive audience during lunch.

Table Top

Official Program Advertising

Conference Bag Insert

Sponsorship Contact

For more information and to secure your Cybersecurity Rock Stars sponsorship and/or exhibit space, please contact:
Sandy Brown
sbrown@computer.org
714-816-2144

 

Venue


 

 

Hotel and Transportation

Fairmont Hotel

Located near Silicon Valley, the 20-story, two tower Fairmont San Jose caters to discerning and well-traveled business professionals. The hotel is conveniently located a short distance from San Jose International Airport. Half Price 'Green' Parking at Fairmonts in California provides overnight guests who drive hybrid vehicles reduced parking charges. 
 
Register by October 2, 2015 at 5:00 p.m. PST HERE to receive a discount rate.
 
 
170 South Market Street 
San Jose 
California, United States 
95113 
 
 
TEL + 1 408 998 1900 
FAX + 408 287 1648 
 

 

Attend the Rock Stars of Cybersecurity Conference

The Rock Stars of Cybersecurity Conference will be held on October 27, 2015 at the Fourth Street Summit Center. The Fourth Street Summit Center is located three blocks from the Fairmont San Jose and offers spectacular views of Silicon Valley. 

Maps & Directions
Fourth Street Summit Center (4th Street and San Fernando) is located atop the Fourth Street Garage seven-story parking structure using the North Tower Elevators.

Parking Location: Fourth Street Parking Garage - Open 24 hours 743 parking spaces
Parking Entrance: 44 S. Fourth St., at San Fernando Street
http://www.fairmont.com/san-jose/map/map-and-directions/

 

88 South 4th Street
San Jose CA 95192

TEL + 408 998 1900 
FAX + 408 287 1648

International Numbers
http://www.fairmont.com/contact-us/morenumbers/

 

 

 

Presentations


Presentations

Geoff Aranoff

Chief Information Security Officer
Broadcom Corporation

Cybersecurity Strategies for Large Enterprises

 
 

Sarath Geethakumar

Sr. Director, Security Architecture & Engineering
Home Depot

Securing Content in an Insecure World<

 

Justine Bone

Executive Director
Secured Worldwide

The Future-State CISO

Q&A Session; No Presentation

 

 

Chris Calvert, CISSP, CISM

Global Director, Solutions Innovation & Services Engineering
HP Enterprise Security Products

A Vision for the Future of Analytical Detection

 

 

Marcus H. Sachs

Senior Vice President, Chief Security Officer
Verizon, NERC

Managing the Security Unknowns

 
 

Dr. Spencer Soohoo

CSO/Director, Scientific Computing
Cedars-Sinai Medical Center

The Evolution of Healthcare Cybersecurity

 

 

Steven Bay

Senior Lead Technologist
Booz Allen Hamilton

Cyber Tradecraft or Espionage

 

 

Computing Now