A destination for information and security professionals providing analysis on all of the latest cybersecurity issues from highly respected thought leaders.
W elcome to RiskSec NY, SC Media’s new threat intelligence and risk management event for cybersecurity industry leaders. It comprises interactive learning sessions, keynote and panel discussions, and an expo hall. RiskSec was created to immerse attendees in highly personalized interactive exercises and discussions with senior thought-leaders in the cybersecurity industry.
You will share your perspectives with peers and discuss steps to tackle the cybersecurity issues proving most challenging to us all. RiskSec NY will enhance your knowledge set to bolster your organizations’ security controls, and build up your threat intelligence and risk management plans and best practices.
Mary N. Chaney, Esq., CISSP, has over 20 years of progressive experience within the fields of Information Security, Privacy and Risk Management.
After practicing law for several years in Washington, DC Ms. Chaney served her country as a Special Agent for the FBI in the Los Angeles Field Division. Ms. Chaney investigated cyber-crime and also served as the Information Systems Security Officer.
Lance James is an internationally renowned information security specialist. He has more than fifteen years of experience in programming, network security, digital forensics, malware research, cryptography design, cryptanalysis, counterintelligence, and protocol exploitation. He provides advisory services to a wide range of government agencies and Fortune 500 organizations including America’s top financial services institutions.
Vicky Ames has been working in IT for over 20 years, most of which has been focused exclusively on information security. She is currently a Director, iT Security, Security Risk Management at Marriott International focused on enhancing the organization. Prior to this she was leading the information security efforts at Emergent Bio Solutions, MedImmune and the National Institutes of Health. She is a published author and frequently requested speaker on IT security and it risk management topics.
Don Freese is the Director of the NCIJTF, one of the seven designated federal cyber centers. He’s responsible for leading 24 partner agencies and over 200 federal employees in partnership to accomplish the cyber investigative mission through coordinating, integrating, and sharing cyber threat data within the highest levels of government.
Henry Jiang is the chief information security officer (CISO) at Oppenheimer & Co., Inc., responsible for all aspects of firm’s cybersecurity program including governance, risk-management and security operations. Previously, he was the Executive Director of Global Network Infrastructure at Oppenheimer & Co., Inc. In that role, Mr. Jiang was responsible for the design and operation of firm’s data networks and provides integrated cybersecurity controls.
Mr. Jiang is a Certified Information Systems Security Professional (CISSP).
Daniel Hoffman is a former Intelligence Officer with 30 years of distinguished government service. He served tours of duty in the former Soviet Union, Europe, and war zones in both the Middle East and South Asia. He has broad substantive expertise on geopolitical and transnational issues including the Middle East, South Asia, Russia, counterterrorism, cyber, and counterintelligence.
Registration and breakfast
Opening Keynote - Interactive discussion
Donald Freese, Federal Bureau of Investigation
This fireside chat will help you understand nation-state adversaries and the evolution of risk management through strategic application of threat intelligence. You will learn disruption strategies regarding intrusions and attacks before they impact your business, as well as ways to develop action plans that create a stronger connection between your enterprise and the FBI.
Donald Freese, former director of the National Cyber Investigative Joint Task Force (NCIJTF), recently promoted to the FBI’s Information Technology Branch, Enterprise Services and Risk Management
The How-To’s of Information Sharing
In this session, you will hear specific recommendations on how to successfully share threat intelligence, ways to forge beneficial relationships with participating industry bodies, and key partnerships you should have in place that can be helpful to you and your organization.
Dax Streater, Manager at Cybersecurity Operations at LCRA
Calling All Guards
Organizations face real challenges regarding talent recruitment for their cybersecurity programs. Savvy pros are needed not only to implement the latest tools, but to make sense of the myriad streams of data being gathered and correlated to help thwart and address immediate attacks. Hear how successful organizations are addressing this issue and what you can do to find the talent you need.
Expo Floor Opens & Networking Break
4 track tech sessions
4 TRACK CYBER 360 CLINICS
The Cyber 360 clinics are four one-hour facilitated experiences designed to immerse attendees in interactive exercises and discussions giving them a 360-degree view of an issue. Attendees will work through key challenges where they will need to apply what they have learned.
Cyber 360 Clinic 1
Automating Threat Intelligence
Hear practical areas to consider when building and managing your threat intel strategy. Gain an understanding on how to ensure you have the right technologies and processes in place, what you should buy and the best options for your budget.
Cyber 360 Clinic 2
Ransom EVERY ware
Learn key methods for detection and remediation for ransomware through this hands-on workshop.
Mary Chaney, Senior Director of Corporate Information Security at Comcast Corporation, and Henry Jiang, CISO at Oppenheimer & Co
Cyber 360 Clinic 3
Managing the Mobile Threat
Gain a clearer perspective on ways to manage mobile threats and where technology and policy must intersect.
Cyber 360 Clinic 4
Indicators of Compromise
Learn how organizations can leverage data from within their organization’s infrastructure to build a stronger kill-chain model and to increase shared information through wider peer relationships while increasing threat indicator performance.
Networking Lunch and Expo Floor
Intelligent Connection Discussion Roundtables
Expo & Afternoon Break
Intelligent Connection Wrap Up
The Trump Effect on Information Security: Is Less Regulation What We Need?
The new administration is promising an environment of reduced regulation and oversight. That environment, while welcome by some, will increase the need for effective and clear communication between your partners and regulators. Learn ways to make this new paradigm work so that it doesn’t cause additional turmoil for your business.
Vicky Ames, Director of Information Security at Marriott International, and Daniel Hoffman, Former Intelligence Officer
Reboot Northeastern Awards
ICON is an invite-only half-day track. For consideration of an invitation to I.C.O.N.
please email firstname.lastname@example.org
Icon: A half-day international clinic for CSO’s
10:30AM to 3:20 PM
This clinic will tackle challenges from a technical, corporate and a policy perspective within both domestic and international realms. This new feature is specifically for senior cybersecurity leaders. This is a must attend event for any C level cybersecurity professional in the NY and Tri-state area.
Inside a Breach
From Risk to Reality
Here we will get a first hand view of a network breach in process. Tricks of the bad guy, what they are after vs. what is the risk, ways they avoid being noticed and of course suggestions on risk reduction techniques.
Lance James, chief scientist at Flashpoint
The not so New Network Solution
The Future of IT in the Cloud
Some experts and security practitioners understand that their future IT departments will be wholly in the cloud. What network level solutions are being replaced and what cloud solutions have or haven’t worked? With that paradigm shift, what are the new strategies for managing security?
The Mobile Policy Dilemma
The fact that organizations worldwide are embracing mobile is old news. However the struggle internationally in the private sector and government for how to make and enforce policies continues. What are some successful policies for network access for organizational owned devices vs. BYOD? How can policy and technology help smooth the path to success here?
From profiling the bad guys to understanding software vulnerabilities and attack points and beyond, threat modeling has become a valuable tool for organizations to tune both technology and human resources in order to better protect assets and the brand. The attacker may not be changing, but the velocity and sophistication of attacks surely are. Learn how threat modeling can help you cope.
Before March 15th
All Inclusive Access
All Keynote and Editorial Sessions
A chance to contribute to the tactical solutions and ideas affecting organisations and individuals
Cyber 360 Clinics
Full immersion on the most insightful analysis in cybersecurity today
Earn up to 9 CPE Credits
Shared perspectives with your senior cybersecurity peer and thought leaders
Key networking opportunities at our breakfast and luncheon receptions
Unlimited Snacks and Beverages
Meet in person your favorite speakers
Convene, 237 Park Avenue
New York, NY