Professional Documents
Culture Documents
40 Senior Executives discussing their current cloud security strategies and initiatives
A Tailored Agenda that Meets Your Needs: Select the presentations, interactive Think Tank
discussions and one-to-one meetings you want to attend
An exclusive invitation-only event in a captive and closed door environment
Pioneering case studies from the leaders in cloud computing and security across the US
“One of the most informative and focused events I’ve attended. This was my first ‘Exchange’ and I came with a list of questions that got
answered and walked away with a whole lot more. Fabulous!”
Sr. Director, IT, Amtrak
KEYNOTE PRESENTATION:
Setting the Stage: The Current Trends and Challenges Surrounding Cloud & Security – Tackling the Issues
Nick Savage, Acting ASAC, Federal Bureau of Investigation
What are the current challenges when it comes to cloud security? What are the biggest concerns around security? What
strategies are being used to successfully run a secure enterprise? How can departments work across the enterprise to remain
9:00 – 9:45 secure amongst many different silos and an increasingly mobile workforce? And, what are the legal challenges when it comes
to mobile cloud and security?
Find out the answers to these pressing questions and more from our keynote speaker. We will look at what has been pushing
the cloud movement, what to consider and what security concerns continue to be front-and-center for enterprises in the new
mobile world.
CASE STUDY: Is Cloud Always the Answer? Assessing a Hybrid Approach to Cloud
Jim Degliumberto, CIO, Southeastrans
9:45 – 10:15 Why should enterprises consider a hybrid approach and are there specific use cases that make it necessary?
How can a hybrid model ensure rapid integration across cloud and on-premise deployments?
How can enterprises visualize data connections to understand complex relationships through a hybrid approach?
SPONSORED CASE STUDY: Ensuring Success: Developing a Fast, Flexible, Easy-to-Manage Hybrid Cloud Environment
Amy Machi, Director Of Offer Development & Alliance Management, AT&T Cloud Networking Services
10:15 – 10:45 Building a hybrid infrastructure that provides the flexibility, scalability and cost-efficiency you need
Empowering your mobile workforce with anytime, anywhere access to vital information and services
Ensuring you have complete control of a highly secure optimized, hybrid cloud infrastructure
EXECUTIVE PANEL DISCUSSION: Journeying Into the Cloud: Step-by-Step to Cloud Migration
Panelists Include:
Jim Degliumberto, CIO, Southeastrans
Frank Martinez CISSP, IT Security Analyst, Miami Dade College
Raquel Brown, Managing Director, Information Services & Technology, Trimont Real Estate Advisors
Moderated by:
Shawn Wiora, CIO and CISO, Creative Solutions in Healthcare
12:00 – 12:40 Hear from these end-users how they effectively and securely migrated to the cloud and learn how they addressed:
CASE STUDY: Building Strong Foundations: Establishing a Robust Risk and Security Management Program
Michael D. Molinaro, CISO and Vice President, BioReference Laboratories Inc.
Increasing investments in cloud infrastructure while ensuring a similar level of security controls and functionality to
what’s available in legacy IT infrastructures
Training your existing IT staff so they are equipped and prepared for all things cloud
1:25 – 2:05 Determining where additional security software is required across the enterprise to better protect data and applications
Deploying security software in the right places and at the right time to drive ROI and increase productivity
Securing purpose-built cloud computing security platforms that are still able to work in and across any infrastructure
and provide visibility, automated compliance, rapid deployments and micro-segmentation
Determining whether to partner with a managed security provider to enhance your cloud security – what are the pros
and cons? What are the right SLAs?
EXECUTIVE PANEL DISCUSSION: Handling the Triple Threat: Securing and Aligning People, Process, and Technology
Panelists Include:
Michael D. Molinaro, CISO and Vice President, BioReference Laboratories Inc.
Arturo Garcia Hernandez, CISO, Bank of Mexico
Brian Heemsoth, Director Software and Mobile Security, Aetna
Moderated by:
3:20 – 4:00 Eugene Signorini, Senior Analyst & Practice Lead, (IoT), Enterprise Strategy Group
Do you have the right people, process, and technology in your security roadmap?
How can you develop a security strategy that incorporates prevention, detection and incident response management?
How do you ensure that you have the right people in place to handle security threats and breaches?
How do you develop a solid process for security breaches? What technology and plans do you need to have in place?
How do you manage the skills gap internally? How do you get the right people in place, with the right skills?
How can you exploit the data from apps and mobile to drive improvements in ROI, user experience, new products and
services?
How can you integrate and align cloud adoption with your wider business strategy?
6:20 – 6:50
How can you remain consistently secure in an era of constant digital transformation and business change?
Led by: Kevin Baradet, CTO & Facilities Director, Johnson School – Cornell University
DISCUSSION THREE – IoT and Big Data
How can you maximize the knowledge gained through IoT utilizing Big Data and analytics?
Led by: Eugene Signorini, Senior Analyst & Practice Lead, (IoT), Enterprise Strategy Group
6:55 – 7:50 Join us for drinks and networking and continue the debate and discussion with your peers to dive deeper into the topics
discussed during the first day of the Exchange.
DISCUSSION FOCUS: Public vs. Private Cloud – Assessing the Risks and Benefits
How does it work? The early morning breakfast briefing will kick start the day with
opportunities for learning, sharing of ideas, lively debate and networking. Breakfast is
DAY TWO REGISTRATION & served at 8:00 a.m. and tables will be designated by industry. (Financial Services,
BREAKFAST Healthcare, CG and Retail, and more)
7:45 – 8:30
Evaluating cost implications
Determining scalability factors
Security risks and considerations
Management and maintenance factors
Prioritizing business needs
8:30 – 8:40
CHAIR’S OPENING ADDRESS
Led by: Eugene Signorini, Senior Analyst & Practice Lead, (IoT), Enterprise Strategy Group
Today's technology leaders are challenged on many fronts: Cyber security, innovation, shadow IT, budgets – you name it! Join
us as globally-recognized CIO Shawn Wiora shares his inspirational messages around driving IT innovation while maintaining the
8:40 – 9:20
highest possible security posture.
Shawn Wiora, as CIO and CISO at Creative Solutions in Healthcare is highly cited in U.S. and global media. Shawn has brought
significant innovation and digital disruption to his company and to the healthcare industry at large. Overseeing all digital
strategies and cyber-security initiatives for his company, he has driven it to be the first healthcare entity operating 100% in the
cloud.
SPONSORED CASE STUDY PRESENTATION: Establishing How to Successfully Secure and Mobilize Enterprise-Wide Resources
Brian Heemsoth, Director Software and Mobile Security, Aetna & Sponsored by Skycure
Identifying and managing the security risks associated with cellular and Wi-Fi networks
o What are the associated threats to your business?
Assessing the rise of mobile malware: What are the subsequent challenges?
9:20 – 10:00
Securing enterprise data on mobile devices through the implementation of robust protection strategies
o What are the necessary steps for protecting both BYOD and corporate-owned mobile devices?
o How can you keep up with the increasing threat to the integrity of these devices?
Determining how to integrate security tools and MDM platforms to provide a secure mobile computing experience
across the enterprise
Networking
10:05 – 10:35 One-to-One Business Meetings
Coffee
Break
10:40 – 11:10 One-to-One Business Meetings
ANALYST SESSION: Building an Effective and Secure Unified Endpoint Management Strategy
Eric Klein, Director Mobile & Wireless, VDC Research Group
Understanding how the proliferation of devices is driving the need to reshape your traditional approach to endpoint
management
11:45 – 12:15 Catering for any time, any where access to resources, on any device
Securing corporate data and maintaining compliance across a growing raft of devices
Moving from theoretical MDM to MDM in motion and monitoring and securing your mobile workforce
From Wearables to Sensors: Managing security in a growing IoT landscape and incorporating this into your UEM
strategic planning
Identifying the strengths of each generation and using them to your best advantage
Encouraging a culture of innovation while fully assessing the risks associated with new ideas
12:15 – 12:45 Mitigating conflict between different generations in order to work together so everyone contributes to the success of
your enterprise
Understating and accepting different roles and encouraging different generations to operate at their own best level
Identifying and managing security fears that come with a growing generation Z workforce
Coping with an increasingly connected digitally savvy workforce and securing the plethora of devices they are using
across your enterprise
Networking
12:45 – 1:15 One-to-One Business Meetings Coffee
Break
Examining how to incorporate new technology into your security strategy while enhancing the user experience
3:10 – 3:40 Combating the critics! Showcasing the benefits and rewards for customers using a cloud-based company
Quickly initiating and executing innovative projects for your customers in the cloud
Ensuring all customer data is fully protected by enterprise-wide security controls
Coping with unpredictable customer demands and maintaining the level of trust in your services
CASE STUDY PRESENTATION: Maintaining Control Over Your Mobility Devices Without Compromising Security
Glenn Foster, CISO, Michelin and Seth Pack, Global Services, Michelin
3:40 – 4:10 Satisfying employee demand for access to they systems they need in a secure and user-centric way
Understanding identity management and how it impacts your mobile access strategy
Approaching security for mobile devices from a fresh perspective
Successfully enabling BYOD within your enterprise
CLOSING KEYNOTE: Securing the Future: What’s Next on the Cloud Agenda?
Arturo Garcia Hernandez, CISO, Bank of Mexico
4:50 – 4:55 CLOSING REMARKS AND END OF MOBILE CLOUD COMPUTING AND SECURITY EXCHANGE