Black Hat CISO Summit — August 2, 2016

Cybersecurity at the Speed of Business


At the Black Hat CISO Summit, leading cybersecurity experts and visionaries will offer executive-level insights into the security technologies, processes, resources, and skills needed to keep pace with the speed of business. As business leaders demand faster application development cycles, as customers and employees demand increasing flexibility with digital devices, and as threats become more sophisticated and ubiquitous, CISOs can’t miss a beat as they work in lockstep with both IT and the business to create a bulletproof enterprise defense. At the summit, we’ll also provide you with the Black Hat brand’s unique insight into the latest threats and threat actors waiting to pounce on your data.


07:00 – 16:00 CISO Summit VIP Registration, Acacia Ballroom, Four Seasons
07:30 – 08:45 Breakfast
08:45 – 09:00 Welcome
  • Jeff Moss, Founder, Black Hat, DEF CON
  • Brian Gillooly, Co-Host, Black Hat CISO Summit
09:00 – 09:45 Keynote: Cybersecurity at the Speed of Business
  • Jeremiah Grossman, Cybersecurity Expert
09:45 – 10:15 CISO Hot Seat: Adapt Security Measures to New Business Technology Initiatives – IoT, Cloud, and DevOps
  • Alex Stamos, CISO, Facebook - Cloud
  • Richard Rushing, CISO, Motorola - DevOps
  • Ron Green, CISO, MasterCard - IoT
10:15 – 10:45 CISO Panel: Huddle on IoT, Cloud, and DevOps Security
  • Alex Stamos, CISO, Facebook - Cloud
  • Richard Rushing, CISO, Motorola - DevOps
  • Ron Green, CISO, MasterCard - IoT
  • Timothy Wilson, Editor in Chief, Dark Reading
10:45 – 11:15 Networking Break
11:15 – 12:00 Workshop: How to Make the Most of Your Time with the Board
  • Venky Anant, Associate Partner, McKinsey & Company
  • Tucker Bailey, Partner, McKinsey & Company
12:00 – 13:15 Lunch
13:15 – 13:45 Detect Threats – and Impacts – More Quickly: The Current Threat Landscape
  • Dmitri Alperovitch, Co-Founder and CTO, CrowdStrike
  • Kelly Jackson Higgins, Executive Editor, Dark Reading
13:45 – 14:15 Roundtable: Enhance Your Incident Response - Three Rules for Dealing with a Ransomware Attack
  • John Pironti, President, IP Architects
14:15 – 14:45 Cybersecurity Insurance: A Shortcut to Risk Management?
  • Mark Weatherford, Senior VP and Chief Cybersecurity Strategist, vArmour
  • Scott Kannry, Chief Executive Officer, Axio Global, LLC
14:45 – 15:15 Networking Break
15:15 – 15:45 Interactive Panel: Accelerating Security Through Effective Information Sharing
  • Alain Desausoi, CISO, SWIFT
  • Brian A. Engle, Executive Director, Retail Cyber Intelligence Sharing Center
  • Paul Kurtz, Co-Founder and CEO, TruSTAR
  • Timothy Wilson, Editor in Chief, Dark Reading
15:45 – 16:30 CISO Panel: How to Survive When Your World’s On Fire: Dynamic Security Planning
  • Adam Ely, Chief of Security for Global Commerce, WalMart
  • Fred Kwong, CISO, Delta Dental
  • Mark Lohman, Senior Director, Information Security, W.W. Grainger
  • Kelly Jackson Higgins, Executive Editor, Dark Reading
16:30 – 16:55 Black Hat USA Briefings Preview
  • Stefano Zanero, Associate Professor, Computer Engineering Department, Politecnico di Milano University
16:55 – 17:00 Closing Remarks
17:00 – 18:00 Reception

Premium Sponsors

Cylance® is revolutionizing cybersecurity with products and services that proactively prevent execution of advanced persistent threats and malware, enabling a level of security that far exceeds the effectiveness of current industry solutions deployed throughout enterprises, government and institutions worldwide. Cylance’s award-winning product, CylancePROTECT™, stops what others don’t, without requiring a cloud connection or frequent updates, all while using a fraction of the system resources associated with antivirus and endpoint security software. Complementing CylancePROTECT are professional services that provide pre-attack penetration and vulnerability testing, compromise assessments and post-attack incident response. Cylance specializes in securing critical infrastructure and key resources for education, energy, financial services, government, healthcare, heavy industry, oil and gas, retail, technology, and other industries. Visit cylance.com or call 877-973-3336 for more information.

Stuart McClure, CEO

Stuart leads Cylance as its CEO and visionary for a new approach to threat detection, protection and response. His leadership sets the strategic direction, operational execution, and fiscal investments of the company. Stuart is one of the leading experts and practical thinkers in the computer security industry today. With a highly regarded 25-year history in the security industry, Stuart has led some of the most notable companies in the space.

Prior to Cylance, Stuart was EVP, Global CTO and General Manager of the Security Management Business Unit for McAfee/Intel where he was responsible for a $3 billion consumer and corporate security products business. Before McAfee, Stuart helped formalize the cyber security program at Kaiser Permanente, a $34 billion healthcare company. Stuart is the founding creator and lead-author of the most successful security book series of all time: Hacking Exposed. This book is now on version 7. He is widely recognized for his extensive and in-depth knowledge of security, and is one of the industry's leading authorities in information security today.

Malcolm Harkins, Global Chief Information Security Officer (CISO)

Malcolm Harkins is the Global Chief Information Security Officer (CISO) at Cylance Corporation. In this role he is responsible for all aspects of information risk and security, security and privacy policy, peer outreach activities to drive improvement across the world in the understanding of cyber risks and best practices to manage and mitigate those risks.

Previously Malcolm was Vice President and Chief Security and Privacy Officer (CSPO) at Intel Corporation.

In 2010, he received the excellence in the field of security award at the RSA conference. He was recognized by Computerworld magazine as one of the top 100 Information Technology Leaders for 2012. ISC2 recognized Malcolm in 2012 with the Information Security Leadership Award. In September of 2013 Malcolm was recognized as one of the top 10 breakaway security leaders at the Global CISO Executive Summit. In November of 2015 he received the Security Advisor Alliance Excellence in Innovation Award. Malcolm is a sought after speaker for industry events, author of many white papers, and published his first book: Managing Risk and Information Security, Protect to Enable.

Jon Miller, Vice President of Strategy

Jon Miller is Vice President of Strategy for Cylance, a maker of next-generation antivirus software and provider of breach incident response and other consulting services. He leads Cylance through insight and direction around technology, partnerships, and research and market opportunities. He was previously a vice president with Accuvant, where he built and led threat research and customer engagement services. Prior to that, he spent five years on the X-Force professional services team of Internet Security Systems. Miller is a well-known hacking expert who gave his first public talk at DEF CON at age 20. Jon has also delivered dozens of public talks at other security and technology conferences including Black Hat, IEEE and ToorCon. He has been featured in publications including Forbes, Huffington Post and Rolling Stone, and has appeared on “60 Minutes” and Fox News.

Ryan Permeh, CTO

Ryan is THE brain behind the mathematical architecture and new approach to security. He leads the research and threat intelligence teams digging into the hacker mindset to uncover emerging attack and defense methods. Prior to co-founding Cylance®, Ryan was the Chief Scientist at McAfee. He worked with the Office of the CTO to envision how to protect against the threats of today and tomorrow. In addition he led innovation efforts through advanced technology exchange with Intel.  Along with Stuart McClure, Ryan built TRACE, McAfee's elite security research team.

Ryan has over 15 years of experience in vulnerability research, reverse engineering, and exploitation. Ryan frequently speaks at well-known security and technology conferences on advanced security topics, published many blogs and articles and contributed to a litany of books on the subject.

Corey White, Vice President of Professional Services

Corey White is the Vice President of Professional Services at Cylance, Inc. Prior to joining Cylance, Corey served as Director of Consulting for Foundstone and McAfee/Intel Professional Services where he was responsible for all aspects of the business for the Southwest Region.

Corey is a proven security industry veteran backed by more than twenty years of success managing security practices, consulting teams, delivering on strategic projects as well as tactical assessments, penetration tests and incident response engagements. His work encompasses virtually every industry sector, including defense, technology, government, critical infrastructure, automotive, finance, healthcare and manufacturing. Corey has a deep technical background, which has allowed him to deliver and oversee technical assessments, incident response engagements, strategic planning and risk assessments.

Corey has a degree in Computer Information Systems from the University of Louisiana at Monroe, and is a Certified Information System Security Professional (CISSP).

Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 8,800 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100. The Qualys Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, BT, Cognizant Technology Solutions, Dell SecureWorks, Fujitsu, HCL Comnet, Infosys, NTT, Optiv, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA). For more information, please visit qualys.com.

Philippe Courtot, Chairman and CEO

Demonstrating a unique mix of technical vision, marketing and business acumen, Philippe Courtot has repeatedly built innovative companies into industry leaders. As Qualys CEO, Philippe has worked with thousands of companies to improve their IT security and compliance postures.

He received the SC Magazine Editor's Award in 2004 for bringing on demand technology to the network security industry and for co-founding the CSO Interchange industry forum. SC Magazine Awards Europe named him 2011’s CEO of the Year. He is a StopBadware.org board member and in 2012 he launched the Trustworthy Internet Movement, a vendor-neutral nonprofit focused on Internet security, privacy and reliability problems.

Philippe was Chairman and CEO of electronic payment start-up Signio, which he repositioned to become a significant e-commerce player and which was acquired by VeriSign for more than $1 billion. As Verity’s President and CEO, he turned the company into a leader in enterprise knowledge retrieval.

Sumedh Thakar, Chief Product Officer

As Chief Product Officer, Sumedh oversees worldwide engineering, development and product management for Qualys’ software-as-a-service (SaaS) platform and integrated suite of security and compliance applications. A core systems and database engineer, Sumedh started at Qualys in 2003, architecting and delivering Qualys' PCI compliance platform to meet the Payment Card Industry (PCI) Data Security Standard (DSS) requirements. Today, more than 69 percent of ASVs and 50 percent of QSAs worldwide use Qualys PCI to perform PCI DSS certification.

Sumedh is active in the PCI and security community working closely with the PCI Council on the development of PCI DSS. He co-authored "PCI Compliance for Dummies," a guide designed to educate merchant organizations about PCI.

A longtime advocate of cloud computing, Sumedh previously worked at Intacct, a SaaS provider of financial and accounting applications. At Northwest Airlines, he developed complex algorithms for yield and revenue management for their backend reservation system.

Amer Deeba, Chief Commercial Officer

Responsible for all aspects of marketing, strategic alliances and global accounts, Amer has a proven track record of driving company growth in fast-moving technology fields. Amer previously served as the Chief Marketing Officer for Qualys for thirteen years and led the corporate and product marketing functions. Before joining Qualys, Amer served as the General Manager for the Payment Services Division at VeriSign where he contributed to establishing VeriSign as a leader in online payments processing 40% of all credit card transactions across the Internet. Amer came to VeriSign through its acquisition of online payments pioneer Signio, where he was Director of Product Marketing. Amer’s other experiences include five years at Adobe where he led the development of Web-enabling PDF and a variety of technical and management positions at Verity and Amdahl. Amer holds Master’s and Bachelor’s degrees in Electrical Engineering and Computer Science.

Foundation Sponsors

FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 4,400 customers across 67 countries, including more than 680 of the Forbes Global 2000. For more information, visit fireeye.com.

Grady Summers, Senior Vice President and Chief Technology Officer

As Senior Vice President and Chief Technology Officer for FireEye, Grady Summers oversees a global CTO team that supports R&D and product engineering efforts and works with customers worldwide to address today’s evolving threat landscape.

Grady has over 15 years of experience in information security both as a CISO and consultant to many Fortune 500 companies. He joined FireEye through its acquisition of Mandiant in 2014. At Mandiant, Grady led the company’s strategic consulting and customer success divisions. Prior to Mandiant, Grady was a partner at Ernst & Young, responsible for the firm's information security program management practice. Before E&Y, Grady was the Chief Information Security Officer (CISO) at General Electric, overseeing a large global information security organization.

Jason Martin, Senior Vice President of Global Engineering and Security Products

As Senior Vice President of Global Engineering and Security Products, Jason oversees the teams responsible for developing FireEye cloud, network and endpoint products and evolving the company’s technology platform. Jason, who joined FireEye in 2013, previously led the company’s Global Cloud Services and Operations organization. Prior to FireEye, he was president and CEO of SecureDNA, which provided innovative security products and solutions to enterprises and government agencies throughout the US and Asia. Jason also served as chairman of Authy.com and currently sits on the advisory board for OneMedNet. A graduate of the University of Hawaii at Hilo, Jason has also co-authored several books on security technology. He is co-founder of the ShakaCon security conference, which is focused on increasing knowledge sharing and security community contribution and collaboration.

Stroz Friedberg is a specialized risk management firm built to help clients solve the complex challenges prevalent in today’s digital, connected and regulated business world. strozfriedberg.com.

Rocco Grillo, Cyber Resilience Leader

Rocco Grillo is Stroz Friedberg’s Cyber Resilience Leader and a member of the firm’s executive management team. His cyber resilience team includes the company’s incident responders and security scientists who deliver the firm’s proactive and reactive cybersecurity capabilities. Previously, Mr. Grillo led Protiviti’s Global Incident Response and Forensics Investigations Practice, where his team of incident responders and forensic examiners successfully triaged some of the largest data breaches recorded in the last decade. Earlier in his career, Mr. Grillo helped develop RedSiren Technologies, a leading MSSP and full services security firm that evolved out of Carnegie Mellon, and held management positions with Lucent Technologies and Bell Atlantic. Mr Grillo is a CISSP, CRMA, PCI-QSA, and Certified Third Party Risk Assessor. He is an affiliate board advisor for FS-ISAC and NH-ISAC, a member of the Shared Assessments Program Steering Committee board, the CLM Cyber Liability Council, and has also served on the board of directors of the NY Metro ISSA Chapter, the IT Policy Compliance Group, and the (i-4) International Information Integrity Institute Research Steering Committee.

Bret A. Padres, Managing Director, Cyber Resilience

Bret A. Padres is a Managing Director of Stroz Friedberg’s Cyber Resilience business with over 22 years of experience in the fields of information security, digital forensics, law enforcement, electronic discovery, and counterintelligence. Mr. Padres has led incident response teams to investigate significant hacking incidents occurring in private corporate networks and at government agencies. Additionally, he has designed and implemented digital forensic tools and practices for IR and computer analysis, for use in both civil and criminal matters.

Prior to joining Stroz Friedberg, Mr. Padres was Director of Incident Response and Director of Cyber Operations at other private consulting firms. He also served as the Chief of Research and Development, Computer Crimes Unit, for the U.S. Postal Service Office of the Inspector General, as well as a Special Agent in the US Air Force Office of Special Investigations where he was the lead agent on several national and international computer intrusion investigations.

Event Sponsors

Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Combining unmatched experience and specialized skills across more than 40 industries and all business functions—underpinned by the world’s largest delivery network—Accenture works at the intersection of business and technology to help clients improve their performance and create sustainable value for their stakeholders. With more than 373,000 people serving clients in more than 120 countries, Accenture drives innovation to improve the way the world works and lives. Visit us at accenture.com.

Contrast Security is the world’s only application security software to quickly and accurately stop hackers from stealing data via web applications. Unlike legacy security products that do not defend applications, Contrast employs patented, deep security instrumentation throughout the application lifecycle to provide visibility, strengthen before deployment and protect in production.

CrowdStrike is the leader in next-generation endpoint protection, threat intelligence and response services. CrowdStrike’s core technology, the Falcon platform, stops breaches by preventing and responding to all types of attacks – both malware and malware-free. CrowdStrike has revolutionized endpoint protection by combining three crucial elements: next-generation AV, endpoint detection and response (EDR), and a 24/7 managed hunting service — all powered by intelligence and uniquely delivered via the cloud in a single integrated solution.

CyberArk is the only security company that proactively stops the most advanced cyber threats – those that exploit insider privileges to attack the heart of the enterprise. The company has pioneered a new category of targeted security solutions to lock down privileged accounts and protect against cyber threats before attacks can escalate and do irreparable business damage. CyberArk is trusted by the world’s leading companies – including more than 40 of the Fortune 100 – to protect their highest value information assets, infrastructure and applications, while ensuring tight regulatory compliance and audit requirements.

Veracode, the leading pure-play application security vendor in the Gartner Magic Quadrant, delivers the application security solutions and services today’s software-driven world requires. Veracode’s unified platform assesses and improves the security of applications from their inception through production so that businesses can confidently innovate with the web and mobile applications they build, buy and deploy as well as the components they integrate into their environments.

Breakfast Sponsor

Cybereason was founded in 2012 by a team of ex-military cybersecurity experts to revolutionize detection and response to cyber attacks. The Cybereason Malop Hunting Engine identifies signature and non-signature based attacks using big data, behavioral analytics, and machine learning. The Incident Response console provides security teams with an at-your-fingertip view of the complete attack story, including the attack’s timeline, root cause, adversarial activity and tools, inbound and outbound communication used by the hackers, as well as affected endpoints and users. This eliminates the need for manual investigation and radically reduces response time for security teams. The platform is available as an on premise solution or a cloud-based service. Cybereason is privately held and headquartered in Boston, MA with offices in Tel Aviv, Israel.

Break Sponsor

Symantec Corporation (NASDAQ: SYMC) is an information protection expert that helps people, businesses and governments seeking the freedom to unlock the opportunities technology brings -- anytime, anywhere. Founded in April 1982, Symantec, a Fortune 500 company, operating one of the largest global data-intelligence networks, has provided leading security, backup and availability solutions for where vital information is stored, accessed and shared. The company's more than 20,000 employees reside in more than 50 countries. Ninety-nine percent of Fortune 500 companies are Symantec customers. In fiscal 2014, it recorded revenues of $6.7 billion. To learn more go to symantec.com or connect with Symantec at: symantec.com/social/.