Register Today >>

Unlimited threats, limited seats.

SC Media's 12th annual security conference
is back in New York, May 31, 2018

Partner with us >>

Can't-miss keynotes!

GREG TOUHILL

Brigadier general, USAF (ret.) president
Cyxtera Federal Group

CHRISTOPHER PAINTER

former sr. director cybersecurity
White House, national security staff

Everything from government-mandated cybersecurity policy to intelligence

Earn 9 CPE

to maintain your certification while expanding your knowledge base and skill set

Response times matter -
register now

PETER CHRONIS

SVP, CISO,
Turner

TONY SAGER

SVP, chief evangelist
Center for
Internet Security

DEVON BRYAN

executive VP & CISO
Federal Reserve System

STEVE BONGARDT

president
The Gyges Group

Don't miss this opportunity to network and collaborate with the best in the business.

We know your C-suite worries
about nation-state cyberattacks.

March on over to RiskSec
to strengthen your
cybersecurity armory.

  Decrease Your Risk, Increase Your Security

A destination for information and security professionals providing analysis on all of the latest cybersecurity issues from highly respected thought leaders.


Welcome to the 2018 New York City RiskSec Conference. As SC Media approaches our 30th anniversary, we fully understand the avalanche of cybersecurity-related problems, responsibilities and aspirations you face. Like no other time before, data security is crucial to you and your corporate executives. With an avalanche of massive data breaches that compromised millions of users’ data and cost senior-level executives their jobs and the endless other types of attacks that leveraged both new and traditional techniques, 2017 seemed yet another banner year for the infosec industry. We expect this year will be just as active as our attendees will face the challenge of both the criminal element and nation states stepping up their aggressive activities. On top of these, insider threats, supply chain vulnerabilities, regulatory demands and increasing dependence on IoT, AI, cloud apps, mobile devices and still other technologies will continue to convolute your tactical and strategic cybersecurity aims. 

This conference will bring you insights from thought leaders across a variety of industries who will focus on the most significant issues that CISOs and other security professionals like you face every day. RiskSec comprises interactive learning sessions, keynotes and panel discussions, and features an area designated for technology companies to demo and share their latest products and services. 

All of us at SC Media look forward to welcoming you at our conference.

Illena Armstrong
VP, Editorial
features

The Features

30+ Industry leading Keynotes and Speakers

Interactive floor & demos from over 25 leading technology companies

Earn Up to 9 CPE to maintain your certification while expanding your knowledge base and/or skill set

Sharpen Risk Management Strategies

Network with senior cybersecurity leaders connected across all industry verticals

Unlimited snacks and beverages, lunch from an executive chef at our nourish bar

Corporate-meets-social in our new full service event venue designed around your attendee experience

Register now for this must attend event

View Our

Schedule

8:00 am
-
9:00 am

Registration and Breakfast

Registration and Breakfast

Threat, Intelligence, Metrics and Cyber/Intellectual property Insurance - How to remove the ambiguity

The second rising of cyber insurance is here, however the guesswork involved in what is covered and setting premiums remain. The only solution is metrics which are achievable through threat detection and intelligence available today. How do we get there and how will Intellectual Property Insurance fit into the picture?

- Tony Parillo, Partner, Fortium Partners

9:00 am
-
9:30 am

Keynote

Policy, Intelligence and the Future

Discussed will be everything from government mandated cybersecurity policy to intelligence regarding such issues as cyber related voter fraud and what the future holds for us.

- Christopher Painter, Coordinator for Cyber Issues

- Gregory J. Touhill, Brigadier General, USAF (ret), President, Cyxtera Federal Group

Keynote

Policy, Intelligence and the Future

Discussed will be everything from government mandated cybersecurity policy to intelligence regarding such issues as cyber related voter fraud and what the future holds for us.

- Christopher Painter, Coordinator for Cyber Issues

- Gregory J. Touhill, Brigadier General, USAF (ret), President, Cyxtera Federal Group

9:35 am
-
10:05 am

Management / Tech Track

Management / Tech Track

Threat, Intelligence, Metrics and Cyber/Intellectual property Insurance - How to remove the ambiguity

The second rising of cyber insurance is here, however the guesswork involved in what is covered and setting premiums remain. The only solution is metrics which are achievable through threat detection and intelligence available today. How do we get there and how will Intellectual Property Insurance fit into the picture?

- Tony Parillo, Partner, Fortium Partners

9:36 am
-
10:05 am

Management Track

Cyber/Intellectual Property Insurance - How to remove the ambiguity

The second rising of cyber insurance is here, however the guesswork involved in what is covered and setting premiums remain. The only solution is metrics which are achievable through threat detection and intelligence available today. How do we get there and how will Intellectual Property Insurance fit into the picture?

- Tony Parillo, Partner, Fortium Partners

- James C. Trainor, Senior Vice President, Aon Risk Solutions

Management Track

Cyber/Intellectual Property Insurance - How to remove the ambiguity

The second rising of cyber insurance is here, however the guesswork involved in what is covered and setting premiums remain. The only solution is metrics which are achievable through threat detection and intelligence available today. How do we get there and how will Intellectual Property Insurance fit into the picture?

- Tony Parillo, Partner, Fortium Partners

- James C. Trainor, Senior Vice President, Aon Risk Solutions

9:37 am
-
10:05 am

Tech Track

The Cyber Threat Intelligence (CTI) Balancing Act

Over the last 15 years CTI has not only improved but has also been refined. Gone are the days where the most intelligence wins - it’s about the most relevant intelligence so it doesn’t take an army of professionals to analyze it and too late find out your organization is already pwned. Learn how to maximize the right intelligence in a form digestible and actionable by the resources you have.

- Tammy Moskites, Managing Director, Sr. Security Executive, Accenture

Tech Track

The Cyber Threat Intelligence (CTI) Balancing Act

Over the last 15 years CTI has not only improved but has also been refined. Gone are the days where the most intelligence wins - it’s about the most relevant intelligence so it doesn’t take an army of professionals to analyze it and too late find out your organization is already pwned. Learn how to maximize the right intelligence in a form digestible and actionable by the resources you have.

- Tammy Moskites, Managing Director, Sr. Security Executive, Accenture

10:10 am
-
10:40 am

Platinum Sponsor Sessions 1, 2, 3, 4

Platinum Sponsor Sessions 1, 2, 3, 4

Threat, Intelligence, Metrics and Cyber/Intellectual property Insurance - How to remove the ambiguity

The second rising of cyber insurance is here, however the guesswork involved in what is covered and setting premiums remain. The only solution is metrics which are achievable through threat detection and intelligence available today. How do we get there and how will Intellectual Property Insurance fit into the picture?

- Tony Parillo, Partner, Fortium Partners

10:45 am
-
11:15 am

Networking and Expo Floor

Networking and Expo Floor

Threat, Intelligence, Metrics and Cyber/Intellectual property Insurance - How to remove the ambiguity

The second rising of cyber insurance is here, however the guesswork involved in what is covered and setting premiums remain. The only solution is metrics which are achievable through threat detection and intelligence available today. How do we get there and how will Intellectual Property Insurance fit into the picture?

- Tony Parillo, Partner, Fortium Partners

11:20 am
-
11:50 am

Platinum Sponsor Session 5, 6, 7, 8

Platinum Sponsor Session 5, 6, 7, 8

Threat, Intelligence, Metrics and Cyber/Intellectual property Insurance - How to remove the ambiguity

The second rising of cyber insurance is here, however the guesswork involved in what is covered and setting premiums remain. The only solution is metrics which are achievable through threat detection and intelligence available today. How do we get there and how will Intellectual Property Insurance fit into the picture?

- Tony Parillo, Partner, Fortium Partners

11:55 am
-
12:25 pm

Plenary Panel

Lessons Learned from over a Year of Targeted Ransomware Attacks

Discussed will be 3 pieces of the puzzle the industry can all learn from - human behavior, law enforcement and technology. How do we all help each other?

- Steve Bongardt, President, The Gyges Group

- Carolyn Schreiber, CISO, Ahold Delhaize

Plenary Panel

Lessons Learned from over a Year of Targeted Ransomware Attacks

Discussed will be 3 pieces of the puzzle the industry can all learn from - human behavior, law enforcement and technology. How do we all help each other?

- Steve Bongardt, President, The Gyges Group

- Carolyn Schreiber, CISO, Ahold Delhaize

12:30 pm
-
1:00 pm

Gold Sponsor Session 1, 2, 3, 4

Gold Sponsor Session 1, 2, 3, 4

Threat, Intelligence, Metrics and Cyber/Intellectual property Insurance - How to remove the ambiguity

The second rising of cyber insurance is here, however the guesswork involved in what is covered and setting premiums remain. The only solution is metrics which are achievable through threat detection and intelligence available today. How do we get there and how will Intellectual Property Insurance fit into the picture?

- Tony Parillo, Partner, Fortium Partners

1:05 pm
-
2:05 pm

Networking Lunch and Expo Floor

Networking Lunch and Expo Floor

Threat, Intelligence, Metrics and Cyber/Intellectual property Insurance - How to remove the ambiguity

The second rising of cyber insurance is here, however the guesswork involved in what is covered and setting premiums remain. The only solution is metrics which are achievable through threat detection and intelligence available today. How do we get there and how will Intellectual Property Insurance fit into the picture?

- Tony Parillo, Partner, Fortium Partners

2:10 pm
-
2:40 pm

Management / Tech Track

Management / Tech Track

Threat, Intelligence, Metrics and Cyber/Intellectual property Insurance - How to remove the ambiguity

The second rising of cyber insurance is here, however the guesswork involved in what is covered and setting premiums remain. The only solution is metrics which are achievable through threat detection and intelligence available today. How do we get there and how will Intellectual Property Insurance fit into the picture?

- Tony Parillo, Partner, Fortium Partners

2:11 pm
-
2:40 pm

Management Track

Disaster Planning Cyber Security Style

From the ever present insider threat to the all too familiar ransomware attack - your organization will get hit if it hasn’t already. Learn how to plan for the worst even if you’d also like to hope for the best.

- Cedric Leighton, Colonel USAF (Ret), Chairman, Cedric Leighton Associates

- Devon Bryan, Executive VP & CISO, The Federal Reserve System

Management Track

Disaster Planning Cyber Security Style

From the ever present insider threat to the all too familiar ransomware attack - your organization will get hit if it hasn’t already. Learn how to plan for the worst even if you’d also like to hope for the best.

- Cedric Leighton, Colonel USAF (Ret), Chairman, Cedric Leighton Associates

- Devon Bryan, Executive VP & CISO, The Federal Reserve System

2:12 pm
-
2:40 pm

Tech Track

Controls, Benchmarks and Tools - Best Practices in Building and Maintaining Robust Technical Security

Hear from the Center for Internet Security (CIS) and those that have successfully implemented such controls as they use the many tools available to remove ’security by obscurity’ from our vernacular completely. You bought the tool, you think you bought the service - but the gotcha may be in the fine print.

- Tony Sager, Senior VP & Chief Evangelist, Center for Internet Security

- Karen Gispanski, VP Global Cyber Security Operations, Neilsen

Tech Track

Controls, Benchmarks and Tools - Best Practices in Building and Maintaining Robust Technical Security

Hear from the Center for Internet Security (CIS) and those that have successfully implemented such controls as they use the many tools available to remove ’security by obscurity’ from our vernacular completely. You bought the tool, you think you bought the service - but the gotcha may be in the fine print.

- Tony Sager, Senior VP & Chief Evangelist, Center for Internet Security

- Karen Gispanski, VP Global Cyber Security Operations, Neilsen

2:45 pm
-
3:15 pm

Gold Sponsor Session 5, 6, 7, 8

Gold Sponsor Session 5, 6, 7, 8

Threat, Intelligence, Metrics and Cyber/Intellectual property Insurance - How to remove the ambiguity

The second rising of cyber insurance is here, however the guesswork involved in what is covered and setting premiums remain. The only solution is metrics which are achievable through threat detection and intelligence available today. How do we get there and how will Intellectual Property Insurance fit into the picture?

- Tony Parillo, Partner, Fortium Partners

3:20 pm
-
3:50 pm

Networking and Expo Floor

Networking and Expo Floor

Threat, Intelligence, Metrics and Cyber/Intellectual property Insurance - How to remove the ambiguity

The second rising of cyber insurance is here, however the guesswork involved in what is covered and setting premiums remain. The only solution is metrics which are achievable through threat detection and intelligence available today. How do we get there and how will Intellectual Property Insurance fit into the picture?

- Tony Parillo, Partner, Fortium Partners

3:55 pm
-
4:25 pm

Management / Tech Track

Management / Tech Track

Threat, Intelligence, Metrics and Cyber/Intellectual property Insurance - How to remove the ambiguity

The second rising of cyber insurance is here, however the guesswork involved in what is covered and setting premiums remain. The only solution is metrics which are achievable through threat detection and intelligence available today. How do we get there and how will Intellectual Property Insurance fit into the picture?

- Tony Parillo, Partner, Fortium Partners

3:56 pm
-
4:25 pm

Management Track

Managing Expectations - A Lesson in Garnering Support from Senior Management

Whether poorly communicated from the CISO, from the media or even vendors - senior management, more often than not, are armed with alternative facts which can easily throw need and expectations of the security team out of alignment with the actual mission. How do you pro-actively work to stay ahead of, or away from this damaging trend?

- Pete Chronis, CISO, Turner

- John McCumber, Director of Cybersecurity Advocacy, (ISC)2, Inc.

Management Track

Managing Expectations - A Lesson in Garnering Support from Senior Management

Whether poorly communicated from the CISO, from the media or even vendors - senior management, more often than not, are armed with alternative facts which can easily throw need and expectations of the security team out of alignment with the actual mission. How do you pro-actively work to stay ahead of, or away from this damaging trend?

- Pete Chronis, CISO, Turner

- John McCumber, Director of Cybersecurity Advocacy, (ISC)2, Inc.

3:57 pm
-
4:25 pm

Tech Track

The State of the Patch

First - how is it we are still talking about patching as a security vulnerability? From there technically why is this STILL such an issue and more importantly what can be learned from those who have figured out how to get this right?

- Charles Kao, Cyber Security Advisor

Tech Track

The State of the Patch

First - how is it we are still talking about patching as a security vulnerability? From there technically why is this STILL such an issue and more importantly what can be learned from those who have figured out how to get this right?

- Charles Kao, Cyber Security Advisor

4:30 pm
-
5:15 pm

Plenary

Demo Mobile Attack Demo with CISO Panel and Law Enforcement

Plenary

Demo Mobile Attack Demo with CISO Panel and Law Enforcement

5:20 pm
-
5:30 pm

Conference Closing Remarks

Conference Closing Remarks

Threat, Intelligence, Metrics and Cyber/Intellectual property Insurance - How to remove the ambiguity

The second rising of cyber insurance is here, however the guesswork involved in what is covered and setting premiums remain. The only solution is metrics which are achievable through threat detection and intelligence available today. How do we get there and how will Intellectual Property Insurance fit into the picture?

- Tony Parillo, Partner, Fortium Partners

5:30 pm
-
6:20 pm

Sponsored Cocktails and Networking

Sponsored Cocktails and Networking

Threat, Intelligence, Metrics and Cyber/Intellectual property Insurance - How to remove the ambiguity

The second rising of cyber insurance is here, however the guesswork involved in what is covered and setting premiums remain. The only solution is metrics which are achievable through threat detection and intelligence available today. How do we get there and how will Intellectual Property Insurance fit into the picture?

- Tony Parillo, Partner, Fortium Partners

This year's

Speakers

speaker

Pete Chronis

SVP, Chief Information Security Officer at Turner

Pete’s team is responsible for the media conglomerate’s infosec operations, architecture, governance, compliance, and business continuity programs – all designed to protect the company and its global portfolio of more than 100 brands. He has also developed proprietary and commercial security technologies that, together, have prevented $100 million+ in fraud.

learn more
speaker

Gregory Touhill

President at Cyxtera Federal Group

One of the nation’s premier cybersecurity and IT senior executives, Greg was selected by President Obama to be the U.S. government’s first CISO. He also previously served as director of the National Cybersecurity and Communications Integration Center, where he led national programs to protect the U.S. and its critical infrastructure.

learn more
speaker

Karen Gispanski

VP, Global Cyber Security Operations at Nielsen

Karen is responsible for Nielsen's global cyber security operations, including Security Operations, Threat Intelligence, and Incident Response. Her strategic leadership experience ranges across multiple industries including managed security, financial, medical, manufacturing, and security consulting.

learn more
speaker

Christopher Painter

Former Sr. Director, Cybersecurity for White House, National Security Staff

A globally recognized expert on cybersecurity, cyber policy, and cyber diplomacy, Chris prosecuted of some of the most high-profile cybercrime cases in the U.S., before serving as senior official for the DOJ, FBI, National Security Council, State Department and White House.

learn more
speaker

Devon Bryan

Executive VP & CISO, Federal Reserve System

After serving as Deputy CISO for the IRS and Global CISO for ADP, Devon was appointed CISO of the Federal Reserve System where he ensures information security architecture, standards, policies and programs remain effective and efficient. His information security career began in the U.S. Air Force, where he served as a Captain and lead engineer working on systems and programs to protect the critical network and communications tools of the Air Combat Command.

learn more
speaker

Tim Callahan

SVP, Global Security & CISO at Aflac

Tim is responsible for directing Aflac’s global security strategy and leading the information security, business continuity and disaster recovery functions across the company to prioritize security initiatives and allocate resources based on appropriate risk assessments.

learn more
speaker

Tony Sager

SVP & Chief Evangelist, Center for Internet Security

Tony leads the development of the CIS Controls, a worldwide consensus project to find and support technical best practices in cybersecurity. He also serves as the director of the SANS Innovation Center. Before retiring from the NSA, Tony spearheaded the release of NSA security guidance to the public.

learn more
speaker

Carolyn Schreiber

CISO at Ahold Delhaize

Carolyn is leading the information security team for Ahold Delhaize globally, spanning 11 countries and 22 local brands including Food Lion, Stop & Shop, and Giant.

learn more
speaker

Steve Bongardt

President, The Gyges Group

A retired FBI agent, criminal profiler, digital forensic examiner, and SWAT operator and sniper, Steve is now the President of The Gyges Group, a cybersecurity and behavioral profiling consultation firm. His specialty is working with organizations' personnel, cybersecurity stack, and physical security apparatus to focus on their adversaries’ behavior and predatory pathway of attack.

learn more
speaker

Cedric Leighton

Colonel, USAF (Ret), Chairman, Cedric Leighton Associates

During his 26-year career as an intelligence officer in the US Air Force, Cedric witnessed the fall of the Berlin Wall, oversaw critical Special Operations missions, established key partnerships with nations in Southeast Asia and deployed five times to the Middle East. He served at every command echelon from small deployed elements to the Joint Staff at the Pentagon, where he was the Deputy Director for Warfighter Support and Integration in the Intelligence Directorate. He retired as a Colonel in 2010.

learn more
speaker

Charles Kao

SVP, Cyber Security at EthicalHat

Charles works closely with internal and external security experts and business partners to make sure security maturity governance are not only protecting company confidentiality, integrity, and availability but also demonstrate the business value and return of investment through security orchestration and workflow.

learn more
speaker

John McCumber

Director of Cybersecurity Advocacy, (ISC)2, Inc.

John represents (ISC)2’s 125,000+ members as their spokesperson for the profession of cybersecurity. His duties require him to work with legislators on Capitol Hill and provide strategic input to national and international committees on critical cybersecurity issues.

learn more
speaker

Tony Parrillo

Partner, Fortium Partners

Prior to joining Fortium, Tony spent 10 years managing a consulting practice focused on cyber security, IT risk management, and compliance, where he implemented federal IT security programs for the Department of Defense and other federal agencies, including the Navy, the U.S. Department of Agriculture and the General Services Administration.

learn more
speaker

James C. Trainor

Senior Vice President, Aon Risk Solutions

Mr. Trainor joined Aon in 2016 after a distinguished career at the Federal Bureau of Investigation, where he most recently led the Cyber Division at FBI Headquarters. He played a critical role in devising the FBI’s national strategy to combat cyber-crime and was the senior FBI executive responsible for all cyber investigations. During his three year tenure in the Cyber Division, Mr. Trainor led FBI Agents and Analysts in every major high-profile cyber investigation involving the FBI.

learn more
speaker

Mark Bilanski

Deputy Director, NYS Cyber Command Center, Cyber Incident Response Team

Mark Bilanski had been leading a Cyber Incident Response Team since 2007. The team specializes in digital forensics, malware reverse engineering, and post intrusion analysis, focusing on root cause and mitigation.

learn more
speaker

Johnny Griffin

Manager, Cyber Security Operations, NYS Cyber Command Center

Mr. Griffin has nearly two decades of experience in software development, digital forensics, cyber incident response and threat intelligence. He lives quietly in upstate NY with his lovely wife and two Bengal cats.

learn more
speaker

Tammy Moskites

Managing Dir., Sr. Security Executive at Accenture

As a career CISO wth 30 years of experience, Tammy has held many security and technology leadership roles including Venafi, Time Warner Cable and Home Depot. She has dedicated her career to guiding CISO’s worldwide to help defend organizations from cyber threats and attacks.

learn more

Full conference pass

$369

Industry-leading speakers, interactive demos,
and ability to earn 9 CPE.

register

All-inclusive access

Keynote and editorial sessions with industry-leading speakers

Demos from prominent tech companies

Interactive learning sessions

Key networking opportunities

Earn 9 CPE credits

Lunch from executive chef and unlimited snacks & beverages

Cocktail hour

Meet in person your favorite speakers

venue

Convene, 237 Park Avenue
NY, NY

address

Convene, 237 Park Avenue
New York, NY

RiskSec NY 2018

Decrease Your Risk, Increase Your Security  |  Presented by SC Media
register Today >>