12 top talks from the 2017 r-cisc summit
TRANSCRIPT
![Page 1: 12 Top Talks from the 2017 R-CISC Summit](https://reader034.vdocuments.us/reader034/viewer/2022050614/5a6601da7f8b9a04148b464d/html5/thumbnails/1.jpg)
![Page 2: 12 Top Talks from the 2017 R-CISC Summit](https://reader034.vdocuments.us/reader034/viewer/2022050614/5a6601da7f8b9a04148b464d/html5/thumbnails/2.jpg)
STEPPING INTO LEADERSHIP: STAYING AHEAD OF TODAY’S THREATS AND THE EVOLVING
CISO ROLE
Rich Agostino discusses leadership, the cyber landscape and what it takes to protect and
advance the cyber security function for a Fortune 100
company. Agostino shares how he helped redefine and elevate
Target’s cyber security practices, and how he and his team try to stay one step ahead of the bad
guys.
Rich Agostino, CISO, Target
![Page 3: 12 Top Talks from the 2017 R-CISC Summit](https://reader034.vdocuments.us/reader034/viewer/2022050614/5a6601da7f8b9a04148b464d/html5/thumbnails/3.jpg)
THE TRUE COST OF CYBERCRIME
The cost of cybercrime across industries is accelerating as
attacks continue to succeed. Kelly Bissell provides insights
into the cost of cybercrime, the value of current security
investments, and best practices for prioritizing the cybersecurity
efforts that will truly make a difference.
Kelly Bissell,Managing Director, Accenture Security
@ckellybissell
![Page 4: 12 Top Talks from the 2017 R-CISC Summit](https://reader034.vdocuments.us/reader034/viewer/2022050614/5a6601da7f8b9a04148b464d/html5/thumbnails/4.jpg)
WORLD-CLASS CYBERSECURITY OPERATIONS
Most CSOCs continue to fall short in keeping the adversary –
even the unsophisticated attacker – out of the enterprise. Carson Zimmerman offers some observations on what it takes to do Computer Network Defense well in the modern IT enterprise,
presenting 10 fundamental qualities of an effective CSOC
that cut across elements of people, process and technology.
Carson Zimmerman, Author, Cybersecurity
Engineer
![Page 5: 12 Top Talks from the 2017 R-CISC Summit](https://reader034.vdocuments.us/reader034/viewer/2022050614/5a6601da7f8b9a04148b464d/html5/thumbnails/5.jpg)
DRIVING SECURITY OPERATIONS EFFICIENCY
THROUGH ORCHESTRATION AND AUTOMATION
Scott Howitt and Vikram Desai provide the results of new
research on the rising cost of cyber crime in retail, sharing a
real-world example of how MGM has applied orchestration and
automation to simplify operations, eliminate manual
tasks, and increase threat visibility and responsiveness.
Vikram Desai, Managing Director, Accenture Security
@vkdesai
Scott Hewitt, CISO, MGM
International
@scotthewitt
![Page 6: 12 Top Talks from the 2017 R-CISC Summit](https://reader034.vdocuments.us/reader034/viewer/2022050614/5a6601da7f8b9a04148b464d/html5/thumbnails/6.jpg)
FROM GEOPOLITICS TO THE TWITTERSPHERE: STRATEGIES FOR NAVIGATING RISK IN THE
SPOTLIGHT
Panelists discuss the real-world factors that influence cyber risk,
strategies for effective preparation and response, and
insight on navigating the implications of brand and
reputation in today’s cyber threat landscape.
Greg Alexander, VP, Global Security
Advisor, Priceline Group
Rebecca Janutis, VP, Info Security, Kohl’s
Rocco Grillo, Executive Managing
Director, StrozFriedberg
![Page 7: 12 Top Talks from the 2017 R-CISC Summit](https://reader034.vdocuments.us/reader034/viewer/2022050614/5a6601da7f8b9a04148b464d/html5/thumbnails/7.jpg)
THE NEXT EVOLUTION OF SECURITY MONITORING AND
ANALYTICS
Kostas Georgakopoulos shares a global and in-the-trenches
perspective on the inner-workings of managing cyber
security teams, systems and incidents. He showcases how open-sourced capabilities can transform an organization and
innovative security capabilities, while bringing flexibility and
cost savings.
Kostas Georgakopoulos,
CISO, P&G
![Page 8: 12 Top Talks from the 2017 R-CISC Summit](https://reader034.vdocuments.us/reader034/viewer/2022050614/5a6601da7f8b9a04148b464d/html5/thumbnails/8.jpg)
HOW LEADING SECURITY AND FRAUD TEAMS FIGHT ACCOUNT TAKEOVER
To combat attacks and protect customers against large-scale ATO using stolen passwords, retail security, network, and
fraud teams have begun collaborating more than ever
before. Shuman Ghosemajumder shares leading
practices and new ideas in business and technology
across the retail industry to protect users against ATO.
Shuman Ghosemajumper,
CTO, Shape Security
![Page 9: 12 Top Talks from the 2017 R-CISC Summit](https://reader034.vdocuments.us/reader034/viewer/2022050614/5a6601da7f8b9a04148b464d/html5/thumbnails/9.jpg)
THE IMPORTANCE OF WOMEN IN CYBERSECURITY
Women represent a mere 11% of the world’s information security
workforce. Leading women in strategic roles within their
cybersecurity organizations deliberate the importance of
women in this industry, sharing their journey into the field, ways to eliminate barriers for aspiring
female leaders and how to help shift this trend for the future.
Deborah Dixon, SVP, Global CISO, Best
Buy
Roseann Larson, VP & CISO, VF
Corp.
Lauren Dana Rosenblatt, Exec.
Director, Global Head, Cyber Threat
Mgmt
Suzie Squier, Executive Director,
R-CISC
![Page 10: 12 Top Talks from the 2017 R-CISC Summit](https://reader034.vdocuments.us/reader034/viewer/2022050614/5a6601da7f8b9a04148b464d/html5/thumbnails/10.jpg)
BIG THREATS, SMALL SHOP: TRACKING MAJOR
CAMPAIGNS WITH LIMITED RESOURCES
With limited resources, no purchased tools and no
vendors, Jason Lay shares how he relies on open source
methods, homegrown practices and R-CISC intelligence to track
campaigns and mitigate threats. He covers options for smaller companies to remain
effective with minimal resources.
Jason Lay, Threat Intel, QVC
![Page 11: 12 Top Talks from the 2017 R-CISC Summit](https://reader034.vdocuments.us/reader034/viewer/2022050614/5a6601da7f8b9a04148b464d/html5/thumbnails/11.jpg)
LEADING WITH EXCELLENCE: THE FIRST PERSON YOU
MUST LEAD IS YOU!
Through her personal leadership stories from her experiences in
both combat and peacetime environments, Becky Halstead discusses the importance of
curiosity and diverse thinking in leadership. She believes those we lead deserve the best from
us as their leader; that each of us chooses to lead, or not to lead,
and we must lead ourselves first.
Becky Halstead, Retired Brigadier
General
![Page 12: 12 Top Talks from the 2017 R-CISC Summit](https://reader034.vdocuments.us/reader034/viewer/2022050614/5a6601da7f8b9a04148b464d/html5/thumbnails/12.jpg)
RISK AND FRAUD MITIGATION: INSIGHTS FROM THE FRONT
LINES
Panelists discuss current trends in the fraud space, strategies for mitigating risk, and examples of
organizational structure and approach. They share how
organizations are structuring their departments around fraud,
engaging their cross departmental teams, and their approaches to
identify and protect fraud.
Tim Brewer, VP, Engineering,
CashStar
Michel Huffaker, IT Threat Intel & VM,
MGM Resorts
Scott Roubic, VP, Internal Audit,
Asset Protection & Real Estate, Jo-Ann
Stores
Dan Holden, CTO, Intelligence
Director, R-CISC
![Page 13: 12 Top Talks from the 2017 R-CISC Summit](https://reader034.vdocuments.us/reader034/viewer/2022050614/5a6601da7f8b9a04148b464d/html5/thumbnails/13.jpg)
THE GREAT TEAMS UNDERSTAND “THE WHY”
The more a company creates “mission moments” for
employees and team members to understand that Greater
purpose, the better off the team will be when it comes to
enduring any challenges along the way to achieving its goal.
Don Yaeger shares his findings from interviews with Olympic and
champion athletes, renowned thought-leaders and more.
Don Yaeger, New York Times,
Best-Selling Author
@donyaeger
![Page 14: 12 Top Talks from the 2017 R-CISC Summit](https://reader034.vdocuments.us/reader034/viewer/2022050614/5a6601da7f8b9a04148b464d/html5/thumbnails/14.jpg)