Black Hat CISO Summit

TUESDAY, JULY 25, 2017



In the past, IT security has been a reactive discipline: security teams built layered walls and then waited to respond. But today, as the IT environment becomes more complex and attackers become more sophisticated, it’s no longer enough to sit behind the wall and wait. Managing today’s risk means building a proactive defense – and advance planning in case that defense fails.

The 2017 Black Hat CISO Summit brings together IT security executives, industry experts, and security researchers to discuss these fundamental shifts in IT security strategy. Attendees will have the opportunity to learn from peers about new defense strategies such as threat hunting, deception, and mining the Dark Web. CISOs will discuss their proactive strategies to risk management and security operations, and threat experts will discuss the new wave of threat actors who are now targeting today’s enterprises. The discussion will include an in-depth look at how the geopolitical situation in cybersecurity is changing, and its potential impact on commercial organizations.


Monday, July 24
CISO Summit Welcome Reception | Aureole
Tuesday, July 25
07:30 – 15:00
CISO Summit VIP Registration | Four Seasons Ballroom Foyer, Four Seasons
07:30 – 08:55 Networking Breakfast
09:00 – 9:15 CISO Summit Welcome and Introductions
  • Steve Wylie, General Manager, Black Hat
  • Jeff Moss, Founder, Black Hat and DEF CON
09:15 –10:00 Keynote | Tomorrow's Computing Challenges
  • Michael Chertoff, Chairman and Co-Founder of the Chertoff Group; Former Secretary of Homeland Security; Co-Chair, Global Commission on the Stability of Cyberspace
10:00 – 10:50 Researcher Panel | Emerging Practices for Proactive Security + Discussion
  • Robert Hansen, CEO, OutsideIntel
  • Chris Wysopal, Veracode's CTO and Co-Founder
  • Kymberlee Price, Open Source Security Manager, Microsoft
10:50- 11:10 Networking Break
11:10– 11:50 The Future of Cybersecurity Policy in a Post-Trump America
  • Paul Rosen, Former Chief of Staff at the Department of Homeland Security; Partner, Crowell & Moring
  • Robby Mook, Senior Fellow at Harvard's Kennedy School of Government; CNN Contributor
  • Jason Healey, Senior Research Scholar, Columbia University
12:00– 13:25 Networking Lunch
13:40 – 14:10 The Russians are Coming! Or Are They?
  • Dmitri Alperovitch, Co-Founder and CTO, CrowdStrike
14:10 – 15:00 CISO Panel | Strategies for Getting Ahead of Security Challenges + Discussion
  • Ron Green, CISO, Mastercard
  • Samantha Davison, Security Engineer, Snap Inc.
  • Katherine Fithen, Chief Privacy Officer, The Coca-Cola Company
15:00 – 15:20 Networking Break
15:20– 15:50 Proactive Solutions to the IT Staffing Challenge
  • Roselle Safran, Former SOC Chief at the White House; President at Rosint Labs
15:50 – 16:30 IT Security: What to Expect in the Coming Year
  • Winn Schwartau, President & Founder, The Security Awareness Company
16:30 - 16:55 Black Hat USA Briefings Preview
  • Stefano Zanero, Associate Professor, Computer Engineering Department, Politecnico di Milano University; Black Hat Review Board
16:55-17:00 CISO Summit Closing Remarks
  • Timothy Wilson, Editor-in-Chief, Dark Reading
17:00– 18:00 Closing Networking Reception

*Admission to the Black Hat CISO Summit is not guaranteed; all applicants will be contacted within two business weeks after submitting. Please direct inquiries to cisosummit@blackhat.com.

Premium Sponsors

Cylance® is the first company to apply artificial intelligence and machine learning to cybersecurity, improving the way companies, governments, and end-users proactively solve the world's most difficult security problems. Cylance quickly and accurately identifies what is safe and what is a threat, not just what is in a blacklist or whitelist.

By coupling sophisticated technology with a unique understanding of an attacker's mentality, Cylance provides the products and services to be truly predictive and preventive against advanced threats.

Cylance's award-winning product, CylancePROTECT®, provides enterprise endpoint security without a cloud connection or frequent updates and uses a fraction of the system resources associated with legacy solutions.

Complementing CylancePROTECT, CylanceOPTICS™ is an AI driven endpoint detection and response (EDR) solution designed to extend prevention through root cause analysis, scalable threat hunting, and immediate response with consistent visibility into threats against endpoints.

Visit www.cylance.com or call +1-877-973-3336 for more information.

Daniel Doimo, President & Chief Operating Officer

As President and Chief Operating Officer, Daniel is responsible for directing the Cylance global business to achieve financial and strategic growth, and working closely with the CEO in formulating current and long-range strategies, objectives, and global policies while developing the company's leadership organization. Daniel is responsible for overseeing Cylance's business units and functional areas related to delivering products and services to market, including marketing, sales, and service support. Daniel assists the CEO in fundraising ventures, and participates in expansion activities as needed, including acquisitions, corporate alliances, etc.

Prior to joining Cylance, Daniel was Executive Vice President of Global Solutions and a member of the Executive Committee at Schneider Electric. Daniel has over 25 years of management experience in the power quality, protection, and conversion marketplace. He joined Schneider Electric via the acquisition of MGE UPS Systems in 2004.

Malcolm Harkins, Chief Security and Trust Officer

Malcolm is responsible for all aspects of information risk and security at Cylance® as well as public policy and customer outreach to help improve understanding of cyber risks. He spent 23 years with Intel, most recently as its first Chief Security and Privacy Officer.

Stuart McClure, Chief Executive Officer

Stuart leads Cylance® as its CEO for the first math based approach to threat detection, protection and response. Prior to Cylance, Stuart was EVP, Global CTO and General Manager at McAfee/Intel. Stuart is the creator and lead-author of the most successful security book of all time, Hacking Exposed. He is widely recognized for his extensive and in-depth knowledge of security, and is one of the industry's leading authorities in information security today.

Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 9,300 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100. The Qualys Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, BT, Cognizant Technology Solutions, Deutsche Telekom, Fujitsu, HCL Technologies, HP Enterprise, IBM, Infosys, NTT, Optiv, SecureWorks, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA). For more information, please visit www.qualys.com.

Philippe Courtot, Chairman and Chief Executive Officer

As CEO of Qualys, Philippe has worked with thousands of companies to improve their IT security and compliance postures. Philippe received the SC Magazine Editor's Award in 2004 for bringing on demand technology to the network security industry. He was also named the 2011 CEO of the Year by SC Magazine Awards Europe. He was previously Chairman and CEO of Signio until its acquisition by VeriSign.  He is also a member of the Board of Directors of StopBadware, a non-profit, anti-malware organization.

Sumedh Thakar, Chief Product Officer

As Chief Product Officer at Qualys, Sumedh oversees worldwide engineering, development and product management for the Qualys software-as-a-service (SaaS) platform and integrated suite of security and compliance applications. A core systems and database engineer, Sumedh started at Qualys in 2003, architecting and delivering Qualys' PCI compliance platform to meet the Payment Card Industry (PCI) Data Security Standard (DSS) requirements.

Mark Butler, Chief Information Security Officer

As Chief Information Security Officer for Qualys, Mark focuses on driving with Qualys customers how to improve security across current computing environments and build security into digital transformation initiatives. Previously CISO of Fiserv, and with over 24 years of experience leading enterprise security teams, Mark has built and developed effective information security programs for executive management, IT leadership and legal counsel. He holds active CISSP, PCI-ISA and CIPP-IT certifications.

Foundation Sponsors

FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber-attacks. FireEye has over 5,300 customers across 67 countries, including more than 825 of the Forbes Global 2000.

StrozFriedberg, an Aon company, is a specialized risk management firm built to help clients solve the complex challenges prevalent in today's digital, connected, and regulated business world. Our focus is on cybersecurity, with leading experts in digital forensics, incident response, and security science; investigation; eDiscovery; intellectual property; and due diligence. Stroz Friedberg works to maximize the health of an organization, ensuring its longevity, protection, and resilience. Founded in 2000 and acquired by Aon in 2016, Stroz Friedberg has thirteen offices across nine U.S. cities, London, Zurich, Dubai, and Hong Kong. Stroz Friedberg serves Fortune 100 companies, 80% of the AmLaw 100, and the Top 20 UK law firms. Learn more at https://www.strozfriedberg.com/.

Rocco Grillo, Executive Managing Director and Cyber Resilience Leader

Rocco Grillo is an Executive Managing Director serving on Stroz Friedberg's Executive Management team. In this role, Mr. Grillo is responsible for the oversight and supervision of the firm's global Cyber Resilience business, which includes teams that perform cybersecurity, incident response investigation, red team penetration testing and application security services. He serves as a trusted advisor to clients, including boards and executive management teams, on a broad range of cybersecurity and incident response investigations services across all industries.

Adam Bixby, Managing Director, Gotham Digital Science

Adam Bixby is a Managing Director with Gotham Digital Science (GDS), A Stroz Friedberg Company, a digital security firm that specializesin application and infrastructure security testing and Red Team engagements. Mr. Bixby has over 12 year's experience working in the security industry performing and managing application and infrastructure security testing and security code reviews. Prior to joining GDS, Mr. Bixby was a member of the United States Air Force as a Security Forces member.  During this time, he received his Master's of Science in Forensic Computer Investigations and a Graduate Certification in Information Protection and Security from the University of New Haven's School of Public Safety and Professional Studies.

Breakfast Sponsor

Cybereason was founded in 2012 by a team of ex-military cybersecurity experts to revolutionize detection and response to cyber attacks. The Cybereason Malop Hunting Engine identifies signature and non-signature based attacks using big data, behavioral analytics, and machine learning. The Incident Response console provides security teams with an at-your-fingertip view of the complete attack story, including the attack's timeline, root cause, adversarial activity and tools, inbound and outbound communication used by the hackers, as well as affected endpoints and users. This eliminates the need for manual investigation and radically reduces response time for security teams. The platform is available as an on premise solution or a cloud-based service. Cybereason is privately held and headquartered in Boston, MA with offices in Tel Aviv, Israel.

Rapid7 cybersecurity analytics software and services reduce threat exposure and detect compromise for 4,150 organizations, including 34% of the Fortune 1000. From the endpoint to cloud, we provide comprehensive real-time data collection, advanced correlation, and unique insight into attacker techniques to fix critical vulnerabilities, stop attacks, and advance security programs.

Welcome Reception Sponsor

Your enterprise needs to move faster, but lack of process and legacy tools hold you back. The ServiceNow System of ActionTM replaces unstructured work patterns of the past with intelligent workflows of the future. ServiceNow's Security solutions are part of the System of Action. ServiceNow Security Operations bring incident data from security tools into a structured enterprise security response engine. Workflows, automation, and a deep connection with IT help prioritize and resolve real threats fast. ServiceNow Governance, Risk, and Compliance (GRC) drives unified GRC programs. It transforms processes by continuously monitoring, prioritizing, and automatically responding to real risks in real-time. Learn more: www.servicenow.com/sec-ops

Networking Break Sponsors

Forcepoint is transforming cybersecurity by focusing on what matters most: understanding people's intent as they interact with critical data wherever it resides. Our uncompromising systems enable companies to empower employees with unobstructed access to confidential data while protecting intellectual property and simplifying compliance. Based in Austin, Texas, Forcepoint supports more than 20,000 organizations worldwide. For more about Forcepoint, visit www.Forcepoint.com and follow us on Twitter at @ForcepointSec.

Symantec Corporation (NASDAQ: SYMC), the world's leading cyber security company, helps organizations, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec's Norton and Life Lock product suites to protect their digital lives at home and across their devices. Symantec operates one of the world's largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visitwww.symantec.com or connect with us on Facebook, Twitter, and LinkedIn.

Event Sponsors

Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. With approximately 401,000 people serving clients in more than 120 countries, Accenture drives innovation to improve the way the world works and lives. Visit us at www.accenture.com.

CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR), and a 24/7 managed hunting service — all delivered via a single lightweight agent. The CrowdStrike Falcon™ platform, certified to replace legacy antivirus, has reinvented how endpoint security is delivered with its industry-leading, cloud native architecture.

CyberArk is the only security company that proactively stops the most advanced cyber threats – those that exploit insider privileges to attack the heart of the enterprise. The company has pioneered a new category of targeted security solutions to lock down privileged accounts and protect against cyber threats before attacks can escalate and cause irreparable business damage. CyberArk is trusted by the world's leading companies – including more than 45 of the Fortune 100 – to protect their highest value information assets, infrastructure and applications, while ensuring tight regulatory compliance and audit requirements.

Splunk Inc. (NASDAQ: SPLK) is the market leader in analyzing machine data to deliver Operational Intelligence for security, IT and the business. Splunk® software provides the enterprise machine data fabric that drives digital transformation. More than 13,000 enterprises, government agencies, universities and service providers in over 110 countries use Splunk solutions in the cloud and on-premises to deepen business and customer understanding, mitigate cybersecurity risk, prevent fraud, improve service performance and reduce costs. Splunk products include Splunk® Enterprise, Splunk Cloud™, Splunk® Light and premium solutions. Join millions of passionate users by trying Splunk software for free: www.splunk.com/free-trials.

Veracode, CA Technologies application security business, is a leader in helping organizations secure the software that powers their world. Veracode's SaaS platform and integrated solutions help security teams and software developers find and fix security-related defects at all points in the software development lifecycle, before they can be exploited by hackers. Veracode serves over a thousand customers across a wide range of industries, including nearly one-third of the Fortune 100. Learn more at www.veracode.com.

VIP Party Tequila and Cigar Sponsor - Open to All CISO Summit Attendees

Digital Guardian provides the industry's only threat aware data protection platform that is purpose built to stop data theft from insiders and outside adversaries. The Digital Guardian platform performs across the corporate network, traditional endpoints, mobile devices and cloud applications and is buttressed by a cloud-based, big data analytics engine, to make it easier to see and block all threats to sensitive information. For more than 10 years, it has enabled data-rich organizations to protect their most valuable assets with a choice of on premise, SaaS or managed service deployment. Digital Guardian's unique data awareness combined with behavioral threat detection and response, enables you to protect data without slowing the pace of your business. To learn more please visit: https://digitalguardian.com/