You are on page 1of 7

October 11-12, 2016, Miami, FL

Develop a Scalable and Secure Cloud Computing Roadmap

 40 Senior Executives discussing their current cloud security strategies and initiatives
 A Tailored Agenda that Meets Your Needs: Select the presentations, interactive Think Tank
discussions and one-to-one meetings you want to attend
 An exclusive invitation-only event in a captive and closed door environment
 Pioneering case studies from the leaders in cloud computing and security across the US

2016 Early Confirmed Speakers Include:


Nick Savage Brian Heemsoth Glenn Foster
Acting ASAC Director, CISO
Federal Bureau of Investigation Software & Mobile Security Seth Pack
Aetna Global Services Manager
Michelin

Kevin Baradet Arturo Garcia Hernandez Michael D. Molinaro


CTO & Facilities Director CISO CISO and Vice President
Johnson School – Cornell University Bank of Mexico BioReference Laboratories Inc.

Jim Degliumberto Brad Shafton Eric Klein


CIO Director User Services Director Mobile & Wireless
Southeastrans Hologic VDC Research Group

Eugene Signori Amy Machi Shawn Wiora


Senior Analyst Director Offer Development & Alliance Management CIO and CISO
ESG AT&T & Jesse Smith Creative Solutions in Healthcare
Senior Application Manager, Security Practice
AT&T

Frank Martinez CISSP Jeannie Hill Craig Jett


IT Security Analyst VP HR Group Consulting Service VP Security Portfolio
Miami Dade College AARP & Aliza Bailey Dimension Data
Information Security Advisor
AARP
"The range of people you meet and network is matchless. This was an invaluable event with a lot of insight into other industries and key
takeaways."
Global Head of User Experience & Design, LateRooms.com

“One of the most informative and focused events I’ve attended. This was my first ‘Exchange’ and I came with a list of questions that got
answered and walked away with a whole lot more. Fabulous!”
Sr. Director, IT, Amtrak

DAY ONE – OCTOBER 11th 2016

8:00-8:45 REGISTRATION & NETWORKING BREAKFAST

EVENT WELCOME FROM THE ENTERPRISE MOBILITY EXCHANGE


8:45-8:50
Dorene Rettas, Head of US, Enterprise Mobility Exchange

CHAIR’S OPENING ADDRESS


8:50 – 9:00
Led by: Eugene Signorini, Senior Analyst & Practice Lead, (IoT), Enterprise Strategy Group

KEYNOTE PRESENTATION:
Setting the Stage: The Current Trends and Challenges Surrounding Cloud & Security – Tackling the Issues
Nick Savage, Acting ASAC, Federal Bureau of Investigation

What are the current challenges when it comes to cloud security? What are the biggest concerns around security? What
strategies are being used to successfully run a secure enterprise? How can departments work across the enterprise to remain
9:00 – 9:45 secure amongst many different silos and an increasingly mobile workforce? And, what are the legal challenges when it comes
to mobile cloud and security?

Find out the answers to these pressing questions and more from our keynote speaker. We will look at what has been pushing
the cloud movement, what to consider and what security concerns continue to be front-and-center for enterprises in the new
mobile world.

CASE STUDY: Is Cloud Always the Answer? Assessing a Hybrid Approach to Cloud
Jim Degliumberto, CIO, Southeastrans

9:45 – 10:15  Why should enterprises consider a hybrid approach and are there specific use cases that make it necessary?
 How can a hybrid model ensure rapid integration across cloud and on-premise deployments?
 How can enterprises visualize data connections to understand complex relationships through a hybrid approach?

SPONSORED CASE STUDY: Ensuring Success: Developing a Fast, Flexible, Easy-to-Manage Hybrid Cloud Environment
Amy Machi, Director Of Offer Development & Alliance Management, AT&T Cloud Networking Services

10:15 – 10:45  Building a hybrid infrastructure that provides the flexibility, scalability and cost-efficiency you need
 Empowering your mobile workforce with anytime, anywhere access to vital information and services
 Ensuring you have complete control of a highly secure optimized, hybrid cloud infrastructure

10:50 – 11-20 One-to-One Business Meetings

Think Tank One


Networking
Data Governance and Security Coffee
Nick Savage, Acting ASAC, Federal Bureau of Break
11:25 – 11:55 One-to-One Business Meetings Investigation
 Developing centralized control and enforcement
of data security policies
 Implementing an information governance
program and developing a benchmark for your
information governance standards
 Controlling the leakage of confidential corporate
information from unsecure cloud services
 Determining who, and under which
circumstances, can gain legal permission to
access data stored on the cloud
 Managing data classification and encryption in
order to improve access security

EXECUTIVE PANEL DISCUSSION: Journeying Into the Cloud: Step-by-Step to Cloud Migration

Panelists Include:
Jim Degliumberto, CIO, Southeastrans
Frank Martinez CISSP, IT Security Analyst, Miami Dade College
Raquel Brown, Managing Director, Information Services & Technology, Trimont Real Estate Advisors
Moderated by:
Shawn Wiora, CIO and CISO, Creative Solutions in Healthcare

12:00 – 12:40 Hear from these end-users how they effectively and securely migrated to the cloud and learn how they addressed:

 How to get management buy-in


 The business risks and knowing the right questions to ask when it comes to contracting your cloud services
 How to secure cloud infrastructure from the beginning of the cloud journey
 Effectively migrating legacy systems onto the cloud
 Managing network and threat intelligence across the entire enterprise during and after migration to the cloud
 Planning for the future by designing flexibility and scalability into your cloud architecture – building in agility from
inception

12:40 – 1:25 NETWORKING LUNCH

CASE STUDY: Building Strong Foundations: Establishing a Robust Risk and Security Management Program
Michael D. Molinaro, CISO and Vice President, BioReference Laboratories Inc.

 Increasing investments in cloud infrastructure while ensuring a similar level of security controls and functionality to
what’s available in legacy IT infrastructures
 Training your existing IT staff so they are equipped and prepared for all things cloud
1:25 – 2:05  Determining where additional security software is required across the enterprise to better protect data and applications
 Deploying security software in the right places and at the right time to drive ROI and increase productivity
 Securing purpose-built cloud computing security platforms that are still able to work in and across any infrastructure
and provide visibility, automated compliance, rapid deployments and micro-segmentation
 Determining whether to partner with a managed security provider to enhance your cloud security – what are the pros
and cons? What are the right SLAs?

2:10 – 2:40 One-to-One Business Meetings


Networking
Coffee
Break
2:45 – 3:15 One-to-One Business Meetings

EXECUTIVE PANEL DISCUSSION: Handling the Triple Threat: Securing and Aligning People, Process, and Technology

Panelists Include:
Michael D. Molinaro, CISO and Vice President, BioReference Laboratories Inc.
Arturo Garcia Hernandez, CISO, Bank of Mexico
Brian Heemsoth, Director Software and Mobile Security, Aetna
Moderated by:
3:20 – 4:00 Eugene Signorini, Senior Analyst & Practice Lead, (IoT), Enterprise Strategy Group

 Do you have the right people, process, and technology in your security roadmap?
 How can you develop a security strategy that incorporates prevention, detection and incident response management?
 How do you ensure that you have the right people in place to handle security threats and breaches?
 How do you develop a solid process for security breaches? What technology and plans do you need to have in place?
 How do you manage the skills gap internally? How do you get the right people in place, with the right skills?
 How can you exploit the data from apps and mobile to drive improvements in ROI, user experience, new products and
services?

SPONSORED CASE STUDY PRESENTATION:


How a Global Manufacturer Adopted an IT Outsourcing Strategy for Mobility and Security After a Corporate Divestiture
Craig Jett, VP Security Portfolio, Dimension Data

 The Client’s Challenges:


o This global manufacturer was spun-off from larger parent leaving them with antiquated IT infrastructure
o The organization needed an outside firm to architect, build, as well as own, a global IT infrastructure to support
the client’s 3500 users across 13 countries and provide end-to-end security
o The client needed to support the mobility requirements of users across diverse working environments and
demands of an “always connected” landscape
4:00 – 4:30
 Solution:
o A fully outsourced solution across security services, private cloud, service desk, infrastructure application
support, managed infrastructure services, end user computing support, network tower services, datacenter
services, mobility, communications services, site services and videoconferencing.
o Security solutions including end-point security, anti-virus, next gen firewalls, IPS, and more
o Leveraging SaaS offerings as much as possible for better performance, scalability and consumption cost models
 ROI:
o Reduced costs, but most importantly, flexibility of monthly opex consumption model
o Better performance of applications, as well as increased mobility

4:35-5:05 One-to-One Business Meetings

Think Tank Two

Cloud Data Storage and Migration

 Ensuring control and visibility, with consistent


security policies applied, no matter where
your data is stored
 Preparing for the shift in risk and
Networking
5:10 – 5:40 One-to-One Business Meetings responsibility as cloud platform providers
become data controllers
Coffee
 Ensuring visibility of data storage and Break
movement and achieving data transparency
throughout the cloud estate
 Enabling the secure sharing of data across
your enterprise
 Classifying your data for ease of security
management

5:45 – 6:15 One-to-One Business Meetings

STRATEGY ROUNDTABLE DISCUSSION SESSIONS

DISCUSSION ONE – CLOUD BUSINESS STRATEGY

How can you integrate and align cloud adoption with your wider business strategy?
6:20 – 6:50

DISCUSSION TWO – THE DIGITAL REVOLUTION

How can you remain consistently secure in an era of constant digital transformation and business change?
Led by: Kevin Baradet, CTO & Facilities Director, Johnson School – Cornell University
DISCUSSION THREE – IoT and Big Data

How can you maximize the knowledge gained through IoT utilizing Big Data and analytics?

Led by: Eugene Signorini, Senior Analyst & Practice Lead, (IoT), Enterprise Strategy Group

NETWORKING DRINKS RECEPTION

6:55 – 7:50 Join us for drinks and networking and continue the debate and discussion with your peers to dive deeper into the topics
discussed during the first day of the Exchange.

DAY TWO – OCTOBER 12th 2016

INDUSTRY BREAKOUT BREAKFAST ROUNDTABLE DISCUSSIONS

DISCUSSION FOCUS: Public vs. Private Cloud – Assessing the Risks and Benefits

How does it work? The early morning breakfast briefing will kick start the day with
opportunities for learning, sharing of ideas, lively debate and networking. Breakfast is
DAY TWO REGISTRATION & served at 8:00 a.m. and tables will be designated by industry. (Financial Services,
BREAKFAST Healthcare, CG and Retail, and more)
7:45 – 8:30
 Evaluating cost implications
 Determining scalability factors
 Security risks and considerations
 Management and maintenance factors
 Prioritizing business needs

8:30 – 8:40
CHAIR’S OPENING ADDRESS
Led by: Eugene Signorini, Senior Analyst & Practice Lead, (IoT), Enterprise Strategy Group

DAY TWO KEYNOTE PRESENTATION: 100% in the Cloud!


Shawn Wiora, CIO and CISO, Creative Solutions in Healthcare

Today's technology leaders are challenged on many fronts: Cyber security, innovation, shadow IT, budgets – you name it! Join
us as globally-recognized CIO Shawn Wiora shares his inspirational messages around driving IT innovation while maintaining the
8:40 – 9:20
highest possible security posture.

Shawn Wiora, as CIO and CISO at Creative Solutions in Healthcare is highly cited in U.S. and global media. Shawn has brought
significant innovation and digital disruption to his company and to the healthcare industry at large. Overseeing all digital
strategies and cyber-security initiatives for his company, he has driven it to be the first healthcare entity operating 100% in the
cloud.

SPONSORED CASE STUDY PRESENTATION: Establishing How to Successfully Secure and Mobilize Enterprise-Wide Resources
Brian Heemsoth, Director Software and Mobile Security, Aetna & Sponsored by Skycure

 Identifying and managing the security risks associated with cellular and Wi-Fi networks
o What are the associated threats to your business?
 Assessing the rise of mobile malware: What are the subsequent challenges?
9:20 – 10:00
 Securing enterprise data on mobile devices through the implementation of robust protection strategies
o What are the necessary steps for protecting both BYOD and corporate-owned mobile devices?
o How can you keep up with the increasing threat to the integrity of these devices?
 Determining how to integrate security tools and MDM platforms to provide a secure mobile computing experience
across the enterprise

Networking
10:05 – 10:35 One-to-One Business Meetings
Coffee
Break
10:40 – 11:10 One-to-One Business Meetings

CASE SUDY PRESENTATION: Mobility Management and Security


Jesse Smith, Senior Application Manager, Security Practice, AT&T

- Demystifying management complexity


- Centralizing the management of security, access, policies, content distribution and application and device provisioning
11:15 – 11:45
to regain control of mobility in an ear of BYOD
- Accommodating a growing range of devices, operating systems and mobile carriers whilst balancing tight security with
the need for constant access
- Addressing the complexity and security challenges with enterprise mobility management tools

ANALYST SESSION: Building an Effective and Secure Unified Endpoint Management Strategy
Eric Klein, Director Mobile & Wireless, VDC Research Group

 Understanding how the proliferation of devices is driving the need to reshape your traditional approach to endpoint
management
11:45 – 12:15  Catering for any time, any where access to resources, on any device
 Securing corporate data and maintaining compliance across a growing raft of devices
 Moving from theoretical MDM to MDM in motion and monitoring and securing your mobile workforce
 From Wearables to Sensors: Managing security in a growing IoT landscape and incorporating this into your UEM
strategic planning

PRESENTATION: Managing a Multigenerational Workforce: Privacy and Security Fears


Jeannie Hill, VP HR Group Consulting Service, & Aliza Bailey, Information Security Advisory, AARP

 Identifying the strengths of each generation and using them to your best advantage
 Encouraging a culture of innovation while fully assessing the risks associated with new ideas
12:15 – 12:45  Mitigating conflict between different generations in order to work together so everyone contributes to the success of
your enterprise
 Understating and accepting different roles and encouraging different generations to operate at their own best level
 Identifying and managing security fears that come with a growing generation Z workforce
 Coping with an increasingly connected digitally savvy workforce and securing the plethora of devices they are using
 across your enterprise

Networking
12:45 – 1:15 One-to-One Business Meetings Coffee
Break

1:00 – 2:00 NETWORKING LUNCH

Think Tank Three

Developing a Robust Cloud Checklist


Eric Klein, Director Mobile & Wireless, VDC Research
Group

 Starting your cloud migration planning early and


identifying the minimum standards for your cloud
2:00 – 2:30 One-to-One Business Meetings model
 Identifying the vulnerabilities in your cloud
Networking
environment
Coffee
 Ensuring all involved parties understand and buy in
to all your security requirements
Break
 Enabling compliance monitoring from the start
 Protecting your Data: In motion, in process and in
rest

2:35 – 3:05 One-to-One Business Meetings


CASE STUDY PRESENTATION: User Experience vs. Security: Achieving the Best of Both Worlds
Brad Shafton, Director User Experience, Hologic

 Examining how to incorporate new technology into your security strategy while enhancing the user experience
3:10 – 3:40  Combating the critics! Showcasing the benefits and rewards for customers using a cloud-based company
 Quickly initiating and executing innovative projects for your customers in the cloud
 Ensuring all customer data is fully protected by enterprise-wide security controls
 Coping with unpredictable customer demands and maintaining the level of trust in your services

CASE STUDY PRESENTATION: Maintaining Control Over Your Mobility Devices Without Compromising Security
Glenn Foster, CISO, Michelin and Seth Pack, Global Services, Michelin

3:40 – 4:10  Satisfying employee demand for access to they systems they need in a secure and user-centric way
 Understanding identity management and how it impacts your mobile access strategy
 Approaching security for mobile devices from a fresh perspective
 Successfully enabling BYOD within your enterprise

CLOSING KEYNOTE: Securing the Future: What’s Next on the Cloud Agenda?
Arturo Garcia Hernandez, CISO, Bank of Mexico

 What are the biggest threats on the cloud horizon?


 When it comes to device security, what is going to be the biggest security challenge for enterprises over the coming 12-
4:10 – 4:50 18 months?
 How will biometrics support the security of IoT and identity management across the corporate landscape?
 What are the most likely regulations to come into play that will affect enterprise mobility and cloud security in both the
near- and long-term?
 In a world of growing cyber crime, how can you continue to remain secure up and down the entire technology stack?

4:50 – 4:55 CLOSING REMARKS AND END OF MOBILE CLOUD COMPUTING AND SECURITY EXCHANGE

You might also like