Day 3: Wednesday, December 6th

8:00 AM - 8:40 AM Networking Breakfast

8:40 AM - 8:45 AM Chairperson’s Opening Remarks


8:45 AM - 9:30 AM Dealing with Email Spam and Consuming Threat Intelligence

Common entry points into corporate networks continue to grow. Email spam is profitable for hackers and expensive for companies which must combat against it. As attacks increase, effective ways to utilize threat intelligence must grow, as well. Successful threat intelligence has multiple components including dynamic threat sourcing, pro-active network defense and real-time results.
·Employee involvement is key to spotting phishing attempts and flagging suspicious correspondence
·Near-real time sharing of threat indicators allows public-private dissemination of information
·Leveraging automated indicator sharing

9:30 AM - 10:00 AM Business Meetings

10:00 AM - 10:30 AM Business Meeting


10:30 AM - 11:15 AM Panel: Evolving Role of the CISO

The Chief Information Officer serves as a “translator” between the business and technology divisions of the enterprise. The executive’s role is becoming more risk focused and is much more business-oriented than solely Information Technology. The reporting structure of the CISO is in transition. In this interactive discussion, review technical, business and physical security considerations.

11:15 AM - 12:00 PM Closing Workshop

12:00 PM - 12:30 PM Chairperson's Closing Remarks