assembly guide - the millennium alliance · pdf fileassembly guide may 2 – 3 four...

86
PRIVATE SECTOR CISO & CIO ASSEMBLY 2016 ASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly

Upload: vandang

Post on 16-Feb-2018

215 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

PRIVATE SECTOR CISO & CIOASSEMBLY 2016

ASSEMBLYGUIDE

May 2 – 3Four Seasons │Dallas, TX

Follow the Assembly @Mill_All #CISOassembly | #PSTassembly

Page 2: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John
Page 3: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

WELCOME

It is our great pleasure to welcome all of you to The Four Seasons Las Colinas in Dallas, Texas for the 2016 Private Sector CISO & CIO Assembly.

We are looking forward to an exciting two days of peer-led, high level discussions on some of the most press-ing technology issues impacting the Private Sector IT and security sectors today.

We are hugely grateful for the expertise and input from all of our partners, session leaders, members, dele-gates, and sponsors for helping put the program together and create an innovative and stimulating agenda.

The Millennium Alliance was created to provide opportunities for collaboration and offer guidance of best practices for executives from the worlds leading organizations. We are dedicated to providing meaningful opportunities for our partners to simplify their personal growth, increase business networks, and have the right information to build their capabilities and leadership skills at every level. Our National Assemblies are committed to providing the best environment for shared thought leadership, executive education, and for-mal and informal peer-to-peer interaction.

With a constant thirst for conversation that has real value, it is our duty to provide a platform for all leaders to further develop in an ecosystem of innovation and knowledge so all parties can continue to shape the real purpose of business: to make things efficient and worthwhile.

We would like to wish everyone a successful event and hope you enjoy the Assembly both professionally and personally, and can use it to build better, more profitable businesses.

Very Best Regards,

Rob & Alex

Co-Founders & Managing Partners

Page 4: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

Visit www.netiq.com/ipsbriefIdentity, Access and Security Solutions

Identity-Powered Security Balancing user access with company securitySecurity breaches are high risk. You need to spot, stop and protect sensitive information from all external and internal threats.

NetIQ® integrated solutions are designed to manage the identity and access lifecycle. We call our approach Identity-Powered Security, and it consists of three complementary disciplines:

- Identity Governance AdministrationProvide correct access so users can do their job

- Access Management and AuthenticationStop insider credentials being abused by outsiders

- Activity User MonitoringDetect and disrupt misuse of privileged rights

To download a paper with more information, visit www.netiq.com/ipsbrief

Page 5: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

Visit www.netiq.com/ipsbriefIdentity, Access and Security Solutions

Identity-Powered Security Balancing user access with company securitySecurity breaches are high risk. You need to spot, stop and protect sensitive information from all external and internal threats.

NetIQ® integrated solutions are designed to manage the identity and access lifecycle. We call our approach Identity-Powered Security, and it consists of three complementary disciplines:

- Identity Governance AdministrationProvide correct access so users can do their job

- Access Management and AuthenticationStop insider credentials being abused by outsiders

- Activity User MonitoringDetect and disrupt misuse of privileged rights

To download a paper with more information, visit www.netiq.com/ipsbrief

Page 6: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com6

CONTENTS

Assembly Sponsors ............................................................................ 9

Contacts ............................................................................................. 11

Thought Leaders ...............................................................................13

Analyst Partner ................................................................................. 16

Delegate Profiles .............................................................................. 21

Sponsor Profiles ...............................................................................43

Program ..............................................................................................59

Assembly-at-a-Glance ......................................................................70

Page 7: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com 7

Gold Sponsor

Emerald Sponsor

Silver Sponsors

Bronze Sponsor

®

Page 8: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

Mimecast AD

Are your employeesletting cyber-criminalsinto your business?

Stop malicious, targeted email attacks with Mimecast Targeted Threat Protection – a cloud solution that:

• Scans every email hyperlink in real-time, as you click

• Protects all devices, no client software needed

• Educates users about recognizing malicious links in emails

• Can be rapidly deployed and has simple, centralized management

• Includes granular security monitoring and reporting

To find out more about our Targeted Threat Protection email solution please email us: [email protected] or call 1-617-393-7050

Page 9: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com 9

CONTACTS

The Millennium Alliance

Headquartered in Midtown Manhattan, The Millennium Alliance is a leading technology, business, and educational advisory firm. Focusing primarily in areas such as business transformation, executive education, growth, policy, and needs analysis. Millennium is quickly becoming one of the most dynamic locations for collaboration across the world.

Millennium was created to provide opportunities for collaboration and offer guidance of best practices for executives from the worlds leading organizations. We are dedicated to providing meaningful opportunities for Alliance members to simplify their personal growth, increase business networks, and have the right information to build their capabilities and leadership skills at every level.

The Millennium Alliance3 Park Avenue, 20th Floor T: 212-256-9890 New York, NY 10016 E: [email protected]

Alex SobolCo-Founder & Managing Partnert: 646 315 [email protected]

Chris WilsonStrategic Alliance Directort: 646 315 [email protected]

Matt RoseStrategic Account Executivet: 646 315 [email protected]

Priya SoodVP Client Servicest: 646 315 [email protected]

Joanna KlausnerClient Services Directort: 646 315 [email protected]

Angelo GalassoStrategic Account Executivet: 646 315 [email protected]

Kimberly SchioppoStrategic Account Executivet: 646 315 [email protected]

Nick Peacock SmithDirector, Strategic Partnershipst: 646 315 [email protected]

Evan RothStrategic Alliance Directort: 646 315 6380 [email protected]

Page 10: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

As your organization’s digital assets move outside the safety of the firewall, they form a soft underbelly to your security program that’s shockingly vulnerable to external threats.

RiskIQ provides actionable data that helps map your digital attack surface and pinpoint and analyze threats across your entire business.

Security teams using RiskIQ can:

• Discover and Monitor both known and unknown digital assets• Quickly Detect and Eliminate live threats in the wild• Research and Investigate threats to prevent future attacks

Are You Protected Outside the Firewall? Your attack surface is larger—and more vulnerable—than you think

riskiq.com

Page 11: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

KEYNOTE

SPEAKER

Page 12: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com12

The JGI Consulting Group is a consortium of former FBI and law enforcement that provide client services in the cyber and physical security arena, to include developing corporate policies and providing training on cyber security, active shooter awareness, risk management, and crisis preparedness, as well as other areas of concern. JGI Consulting clients include both the FBI and the NFL, along with many additional large and medium-size businesses throughout the United States and other parts of the world. To educate and protect companies from threats, JGI Consulting personnel regularly present at conferences and symposiums, as well as appear on national news programs.

John G. Iannarelli retired from the FBI after more than 20 years of service, during which he participated in the investigations of the Oklahoma City Bombing, the 9/11 attack, and the Congresswoman Gabriel Giffords shooting. John previously served at FBI Headquarters as the national spokesperson and on the Cyber Division Executive staff. In Phoenix, John was the Cyber squad supervisor before promotion to Assistant Special Agent in Charge, the number two position overseeing all Criminal, Cyber, and Counter Intelligence investigations throughout Arizona. In addition to being an attorney, John was awarded an Honorary Doctorate of Computer Science for his contributions to the field of cyber investigations. John is also a former San Diego Police Officer and he currently works as a private consultant.

JGI Consulting Group

JOHN IANNARELLI

President, FBI Assistant Special Agent in

Charge (Ret.)

Page 13: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

THOUGHT

LEADERS

The Advisory Council Gardere Wynne Sewell LLP

George Washington University New York University Stern School of Business

Page 14: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com14

ALAN R. GUILBORD, Founder & Chairman

Alan has more than 35 years of global IT management experience, and is the Founder and Chairman of The Advisory Council (TAC). TAC’s unique Expertise-as-a-Service® (EaaS™) gives clients access to a wide array of services, tools and workshops designed to help CIOs and IT managers reduce costs, improve productivity, and increase the status of IT in the boardroom. Prior to founding TAC, Al was President and Chief Executive Officer of Computerworld, International Data Group’s flagship weekly magazine for IT leaders. During his tenure,Computerworld was the only publication in its market to hold top line performance during adverse market conditions and moved from fourth position into second.

Prior to joining Computerworld, Mr. Guibord was Vice President and CIO at Fort James Corp., an international consumer products company with more than $9 billion in sales, 28,000 employees and more than 60 manufacturing facilities around the world. Previously, Mr. Guibord was Vice President Information Technology for RR Donnelley and Sons. He had global responsibility for all IT and telecomm, and was given the challenge of positioning the company’s infrastructure for high-growth and global expansion. Before joining RR Donnelley and Sons, Mr. Guibord was Chief Information Officer of PictureTel, Inc.

Mr. Guibord has been a member of several key executive advisory boards, including Oracle and Microsoft.

Mr. Guibord is a frequent speaker on IT leadership and organizational strategy. He published his first book, theIT Leadership Manual, in September 2012 (John Wiley & Sons).

The Advisory Council

®

International

TAC International is a non-profit entity launched in January 2013. It consists of approximately 25 legendary former global CIOs of Fortune 200 companies, who act as executive advisors. 100% of the profits of TAC International go back to the major IT professional associations (SIM and WITI) and to Year Up, an organization that helps disadvantaged teenagers get into the workforce by sponsoring scholarships, internships, and training (some of which is done by our executive advisors).

The “sweet spot” of TAC (The Advisory Council) is providing trusted and impartial advice on information technology issues to C-suite executives and Board-level non-executives. We call that Expertise-as-a-Service®. To provide that service, TAC has recruited more than 25 alumni of the Research Board to act as executive advisors, coaches and mentors. The Research Board is the most highly respected network in the IT profession, consisting of only Global Fortune 50 CIOs. TAC has leveraged a number of recently retired Research Board members, chosen for their successful track record as practitioners; for their extensive experience in leadership roles; for their up-to-date subject-matter expertise; for their personality and ability to work as trusted advisors at the C-suite level; for their breadth of coverage of the spectrum of business sectors; and for their extensive personal network. These advisors have recently shaped the strategic IT plans of a number of client companies ranging from “sell-side” start-ups to “buy-side” mid-cap and large-cap organizations (including several Fortune 15 companies). They also advise on sourcing strategy with a number of supply chain executive clients, and make numerous presentations at trade conferences on IT sourcing strategy. This advisory service is built on top of an established business that has hundreds of IT experts who provide IT advisory services to hundreds of client companies, and has been operating successfully at this more technical level since 2002.

Page 15: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com 15

RHEA SIERS, Scholar in Residence, Center for Cyber and

Homeland Security

Ms. Siersis a veteran of over after thirty years in US Intelligence. She served NSA Deputy Director for Policy andsenior operational, legal, and policy positions in cyber operations, information sharing, and counterterrorism.AsScholar in Residence at the Center for Cyber and Homeland Security at George Washington Universityshefocuses on key cyber policy including “Active Defense”.A professor at GWU and Johns Hopkins University, she teaches courses on Cybersecurity and Transnational Security.In November 2015, The National LawJournalrecognized Ms. Siers as a “Cyber Trail Blazer.”

George Washington University

The Center for Cyber and Homeland Security (CCHS) at the George Washington University is a nonpartisan “think and do” tank whose mission is to carry out policy-relevant research and analysis on cybersecurity, homeland security, and counterterrorismissues. By convening domestic and international policymakers and practitioners at all levels of government, the private and non-profit sectors, and academia, CCHS develops innovative strategies to address and confront current and future threats. Currently CCHS is engaged in groundbreaking cyber policy and operational research on the issue of “Active Defense”.

PETER S. VOGEL, Partner & Chair of the eDiscovery Group and

the Internet, eCommerce, & Technology Team

Peter S. Vogel is a trial partner at Gardere Wynne Sewell LLP where he is Chair of the eDiscovery Group and the Internet, eCommerce, & Technology Team. Before practicing law he worked as a systems programmer, received a Masters in Computer Science, and taught graduate courses in information systems. Peter has had trials around the US on software implementations, misappropriation of trade secrets, copyright infringement, software patent infringement, and Internet disputes. For 12 years he has

served as the Founding Chair of the Texas Supreme Court Judicial Committee on Information Technology which is responsible for helping automate the Texas court system and creating the Texas eFiling System. Peter has taught courses the SMU Dedman School of Law for more than 25 years including courses on eDiscovery and the Law of eCommerce. Many of Peter’s topics are discussed on his blog www.vogelitlawblog.com and in his monthly legal column on www.ecommercetimes.com.

Gardere Wynne Sewell LLP

Founded in 1909, Gardere Wynne Sewell LLP is an Am Law 200 firm and one of the Southwest’s largest full-service law firms – with more than 230 attorneys serving clients from three of the largest cities in Texas, as well as Colorado and Mexico, and covering more than 40 different areas of practice. We are noted for our commitment to client service and

our ability to assist clients with their most complex and demanding legal and business challenges worldwide. By combining the comprehensive resources of a large firm with the specialized, boutique-like expertise of the lawyers in each of our practice areas, we have the unique capabilities and resources necessary to provide our clients with efficient, effective and quality legal counsel.

Page 16: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com16

NATALIA LEVINA, Toyota Motors Corporation Term Chair and

Professor of Information Systems

Natalia Levina is Toyota Motors Corporation Term Chair and Professor of Information Systems at New York University Stern School of Business.Prof. Levina studies strategic and operational complexities involved in managing multi-party collaborative relationships focused on innovation. She investigates how diverse professional, organizational, and cultural backgrounds of project participants influence collaborationeffectivenessand innovation on projects. Her current research focuses on open innovation,

global sourcing, and crowdsourcing. She has been awarded an NSF grant for studying open innovation and crowdsourcing as well as Alfred P. Sloan Industry Studies Fellowship and IBM faculty fellowshipfor studying innovation management practices in global sourcing.

Prof. Levina’s work has been published in numerous academic journalsincluding among others Information Systems Research, MIS Quarterly, Journal of MIS, Decision Sciences, Organization Science, Academy of Management Journal, and MIT Sloan Management Review and received a number of awards from academic societies. Shehas served as a senior editor of several top academic journals and is a program co-chair in 2016 of the International Conference on Information Systems, top international academic conference in her field. Prof. Levina is a dynamic and highly accomplished teacher. Her teaching portfolio includes such courses as “Globalization, Open Innovation, and Crowdsourcing,” (MBA and Exec MBA), “IT in Business and Society” (undergraduate), and “IT in Organizations” (PhD seminar).

She has received her B.A. in Computer Science and Mathematics from Boston University, M.A. in Mathematics from Boston University, and Ph.D. in Information Technologies from the Massachusetts Institute of Technology, Sloan School of Management.

New York University Stern School of Business

Page 17: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

ANALYST

PARTNER

International Data Corporation (IDC)

Page 18: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com18

International Data Corporation (IDC) is the most experienced and most trusted IT advisory firm in the market. Our global team of 1,100 analysts assist businesses around the world in moving to the 3rd Platform of computing. Our IT advisory services not only advise on the technologies of the 3rd Platform (cloud, mobile, social and analytics), but also on how to effectively lead technology initiatives. For 50 years, IDC has provided strategic insights to help our clients achieve their key business objectives. IDC is a subsidiary of IDG, the world’s leading technology media, research, and events company.

To learn more visit www.IDC.com/itexecutive.

IDC

PETE LINDSTROM, Vice President, Security Strategies

Pete Lindstrom is Vice President of Security Strategies at IDC. He has over 25 years of professional experience as an IT auditor, IT security practitioner, and industry analyst. Pete is an authority on applying core risk management and cybersecurity economics principles and practices to new IT architectures incorporating technologies like virtualization, cloud security, and big data. Pete has held certifications as an information systems auditor (CISA) and information systems security professional (CISSP).

H. WILLIAM KEYWORTH, Vice President Research

Bill Keyworth is Vice President of Research for IDC’s CIO Advisory Services. Leveraging over 25 years of successfully defining technology and market trends within the IT shared services management industry, Bill has established a reputation as one of the more credible and consistent voices in maximizing business value from IT operations. Through research and consulting roles at both IDC and Gartner Group, Bill has led a focus on IT Operations as critical for managing the dynamic elements of business applications. Through vendor executive roles, Bill has demonstrated expertise in turning product driven companies into market driven industry leaders.

Page 19: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

DELEGATE

PROFILES

AB InbevAgribankAutoNationAutoZone Parts, Inc.Ball Aerospace & Technologies CorpBeam SuntoryBiogenCincinnati Insurance CompaniesCSAA InsuranceDean FoodsDocuSignDuke Energy

Fairview Health ServicesFedExFinning InternationalFluor Federal Petroleum Operations (FFPO)HARMANHD Vest Financial ServicesHearstHM Health SolutionsMasterCard WorldwideMINDBODYMohawk Industries

MoneygramNational Hockey LeagueNeiman Marcus GroupPetcoPfizerPizza Hut Global - Yum ! BrandsPriceline GroupRite AidSchnuck Markets, Inc.ServiceMasterStaplesUnityPoint Health

PRIVATE SECTOR CISO

Page 20: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com20

AB Inbev

ERIC HLUTKE, Global Information Technology Security Director

Eric Hlutke is the global director of IT security strategy and architecture at Anheuser-Busch InBev working to drive common security platforms across all zones. Hlutke is a security leader with 20-plus years’ experience in many industry verticals solving complex business security and compliance challenges through innovation and execution to drive rapid impact.

Anheuser-Busch InBev is a publicly traded company (Euronext: ABI) based in Leuven, Belgium, with American Depositary Receipts on the New York Stock Exchange (NYSE: BUD). It is the leading global brewer and one of the world’s top five consumer products companies. Beer, the original social network, has been bringing people together for thousands of years and our portfolio of well over 200 beer brands continues to forge strong connections with consumers. This includes global brands

Budweiser®, Corona® and Stella Artois®; international brands Beck’s®, Leffe®, and Hoegaarden®; and local champions Bud Light®, Skol®, Brahma®, Antarctica®, Quilmes®, Victoria®, Modelo Especial®, Michelob Ultra®, Harbin®, Sedrin®, Klinskoye®, Sibirskaya Korona®, Chernigivske®, Cass®, and Jupiler®. Anheuser-Busch InBev’s dedication to heritage and quality originates from the Den Hoorn brewery in Leuven, Belgium dating back to 1366 and the pioneering spirit of the Anheuser & Co brewery, with origins in St. Louis, USA since 1852. Geographically diversified with a balanced exposure to developed and developing markets, Anheuser-Busch InBev leverages the collective strengths of its approximately 155,000 employees based in 25 countries worldwide. In 2013, AB InBev realized 43.2 billion USD revenue. The company strives to be the Best Beer Company Bringing People Together For a Better World.

Agribank

ART WONG, Enterprise Information Security Officer

Arthur Wong is the enterprise information security officer for AgriBank, FCB. Wong has a wide breadth and depth of experience in all fields of IT at an IT Director level. Wong is the 2016 chairman for the nationwide Farm Credit System Cybersecurity Workgroup.

Wong has worked full-time for 3M, GMAC Mortgage, NWA, Xcel Energy, Kroll Ontrack, as well as an independent consulting for the Federal Reserve Bank, and Microsoft.

Wong holds a BS degree in IS and holds numerous industry credentials - CISSP, CISA, CISM, ITIL, SAFR, HISP certifications. He also holds a fifth degree black belt in Shotokan karate.

AgriBank supports rural communities and agriculture with reliable, consistent credit and financial services today and tomorrow. AgriBank is one of the largest banks within the Farm Credit System, a national network of borrower-owned lending institutions. This unique cooperative System has more than 13,000 employees nationwide and offers many opportunities for career advancement. Farm Credit was established to provide a reliable source of credit for the nation’s farmers and ranchers. AgriBank plays a key role fulfilling this mission by: • Providing funding and other solutions to 17 locally based Farm Credit Associations, which in turn own AgriBank • Supporting these Associations in meeting the financial needs of approximately 238,000 farmers, ranchers, agribusinesses and rural homeowners across 15 states in America’s heartland • Operating from a foundation of financial strength, backed by more than $90 billion in assets AgriBank stays on the cutting edge of emerging trends, evolving business practices and technology that affect the success of production agriculture.

Page 21: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com 21

AutoZone Parts, Inc.

STEPHEN AGAR, Director, Information Security and Compliance

As a proven Information Technology leader with nearly 20 years of experience, focusing on Information Security; Stephen combines experience, thought leadership and expert critical thinking to develop strategy, translate vision and deliver high quality results. Stephen embodies the power to persuade, the status and authority to steer organizations in new directions and the influence to implement real change and widespread innovation. He is a charismatic, no nonsense leader with deep technical and functional

experience and a proven track record of building and leading global Information Security Programs. His ability to strike the perfect balance between business drivers and Enterprise Security allows the Information Security function to not only ensure the Confidentiality, Integrity and Availability of assets within the enterprise, but also deliver concrete business value.

AutoZone is the nation’s leading retailer and a leading distributor of automotive replacement parts and accessories with more than 5,000 stores in US, Puerto Rico, Mexico, and Brazil. Each store carries an extensive line for cars, sport utility vehicles, vans and light trucks, including new and remanufactured hard parts, maintenance items and accessories. Since opening its first store in Forrest City, Ark. on July 4, 1979, the company has joined the New York Stock Exchange (NYSE: AZO) and earned a spot in the Fortune 500.

AutoNation

KEN ATHANASIOU, Vice President & Chief Information Security

OfficerKen Athanasiou is Vice President, Chief Information Security Officer at AutoNation, Inc. Ken has extensive experience in information security and risk management. His career includes senior positions with global companies in the retail and financial service sectors as well as thirteen years of service as an officer in the United States Air Force. Just prior to joining AutoNation he was the Global Information Security Director

& Chief Information Security Officer for American Eagle Outfitters. Ken holds a Bachelor’s Degree in Computer Information Systems and a Master’s Degree in Computer Resources Management and is a Certified Information Systems Security Professional (CISSP).

AutoNation, Inc., headquartered in Fort Lauderdale, Florida, is America’s largest automotive retailer. AutoNation is a component of the S&P 500 Index. AutoNation owns and operates over 340 new vehicle franchises in 15 states. AutoNation offers a diversified range of automotive products and services, including new and used vehicles, automotive repair services, and automotive finance and insurance products. AutoNation has sold over 10 million vehicles, the only auto retailer to achieve this milestone. AutoNation seeks to be the best-run, most profitable automotive retailer in the nation.

Page 22: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com22

Ball Aerospace & Technologies Corp

BRETT BRADSHAW, Chief Information Security OfficerBrett Bradshaw joined Ball Aerospace & Technologies Corporation as Chief Information Security Officer in 2014. He is directly responsible for leading the information/cyber security teams and providing strategic guidance on Ball Aerospace’s IT Risk management strategy.

Prior to joining Ball Aerospace, Brett served as Deputy CISO for Newport News Shipbuilding – A division of Huntington Ingalls Industries, and formerly Northrop Grumman Shipbuilding. He also served in various IT leadership roles within Northrop Grumman’s Information Security organization to include

Enterprise Information Security Engineering Management, and Business Continuity Management. Prior to joining Northrop Grumman, Brett worked for Lockheed Martin within the Cyber Threat Intelligence Division focused on providing cyber threat intelligence to the Department of Defense.

Ball Aerospace & Technologies Corp. supports critical missions for national agencies such as the Department of Defense, NASA, NOAA and other U.S. government and commercial entities. The company develops and manufactures spacecraft, advanced instruments and sensors, components, data exploitation systems and RF solutions for strategic, tactical and scientific applications. Ball continues to invest and innovate in affordable, high resolution imaging systems, contributing to the needs of civil, military and commercial customers.

Beam Suntory

SETH MCCALLISTER, Head of Global Information Security

Seth McCallister is the Head of Global Information Security at Beam Suntory. Since 2010, he has been responsible for global information security strategy, controls and compliance and IT risk management. Seth is a proven leader that has built a highly functioning information security practice from the ground up, with a strategy that closely aligns with Beam Suntory’s risk levels and global regulations. Seth has more than 15 years of experience and has worked in multiple industries such as consumer packaged goods, insurance and the defense industry.

As the world’s third largest premium spirits company, Beam Suntory is Crafting the Spirits Brands that Stir the World. Consumers from all corners of the globe call for the company’s brands, including the iconic Jim Beam and Maker’s Mark bourbon brands and Suntory whisky Kakubin, as well as world renowned premium brands including Knob Creek bourbon, Yamazaki, Hakushu and Hibiki Japanese whiskies, Teacher’s, Laphroaig, and Bowmore Scotch whiskies, Canadian Club whisky, Courvoisier cognac, Sauza tequila, Pinnacle vodka, and Midori liqueur.

Beam Suntory was created in 2014 by combining the world leader in bourbon and the pioneer in Japanese whisky to form a new company with a deep heritage, passion for quality, innovative spirit and commitment to Growing for Good.

Page 23: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com 23

Cincinnati Insurance Companies

MICHAEL DOCKERY, Vice President & Chief Information

Security OfficerChief Information Security Officer for Cincinnati Insurance, Mike Dockery joined the company in 2000. He is a vice president of Cincinnati Insurance and a past president of the Cincinnati Information System Security Association. He is also active with the annual American Medical Center Security and Privacy Conference in Chapel Hill, N.C. He holds the Certified Information System Security Professional (CISSP) and Certified Information System Auditor (CISA) designations.

Our parent company, Cincinnati Financial Corporation, operates through a family of insurance and financial services subsidiaries including The Cincinnati Insurance Company which itself has four insurance subsidiaries. Together, The Cincinnati Insurance Company and its subsidiaries are among the nation’s top 25 property casualty insurer groups, based on 2014 net written premiums. Four independent insurance financial strength ratings agencies acknowledge our ability to meet financial obligations to policyholders.

We believe it’s important to act ethically, treating people the way we would want to be treated. In recognition of those efforts, Cincinnati Financial Corporation, ranks among America’s 50 Most Trustworthy Financial Companies in 2015. This Marks the fifth consecutive time Forbes has recognized Cincinnati Financial for trustworthiness.

Biogen

LARRY JARVIS, Chief Information Security OfficerSenior Information Security Executive qualified by a 25+ year career in the complex financial and biotechnology industries. Consistently delivers world class information security results through expertise in bridging information security solutions across global application and infrastructure environments. Highly accomplished in NIST Cybersecurity Framework (NIST/CSF) enterprise adoption, board-level demystification of cybersecurity concepts and objectives, and development of external and insider threat strategies.

Biogen is a global biotechnology company based in Cambridge, Massachusetts, specializing in discovering, developing, and delivering important therapies for the treatment of neurodegenerative, hematologic and autoimmune diseases to patients worldwide.

Page 24: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com24

CSAA Insurance

PHIL CANTU, Chief Information Security OfficerPhillip Cantu is a recognized Information Security and Risk Management leader with more than 19 years of Information Technology experience and over 13 years of Information Security experience in the Healthcare, Financial Services, Technology, Energy, and Government sectors. His most recent experience areas include Cyber Security Strategy, Threat & Vulnerability Management, IT Risk Management, and Data Loss Prevention in large enterprise environments. Currently, Mr. Cantu is serving as the Chief Information Security Officer for CSAA Insurance Group. Previously, Mr. Cantu served as a Leader in the Security and

Privacy practice at Deloitte & Touche. He also served a variety of roles including Consultant, Engineer, Manager, Program Manager and Product Manager of Systems Assurance as well as implementing Security Awareness and Training programs at Kaiser Permanente. The scope of Mr. Cantu’s responsibilities at Kaiser Permanente included over 230,000 endpoints and 180,000 employees.

Celebrating our 100th anniversary in 2014, CSAA Insurance Group is one of the top 20 personal lines property and casualty insurance groups in the United States. We offer automobile, homeowners and other personal lines of insurance to AAA members, through partnerships with AAA clubs in 23 states and the District of Columbia. Headquartered in Walnut Creek, California, we have more than 3,600 employees located primarily in Arizona, California, Colorado, Nevada, New Jersey, and Oklahoma. Our employees are committed to building strong relationships that serve AAA members and clubs by making insurance simple, proactive and personal. We are proud

of our values-based culture and are frequently recognized as a leader in employee professional development, corporate responsibility, diversity and wellness.

Dean Foods

JOSEPH D’AGOSTINO, Director IT Security, Risk, Compliance

Professional Biography unavailabe at time of print.

Dean Foods® (NYSE:DF) is the largest U.S. processor and direct-to-store distributor of fluid milk, marketed under more than 50 local and regional dairy brands and private labels. Headquartered in Dallas, Texas, Dean Foods also distributes ice cream, cultured products, juices, teas, bottled water and other products.

Page 25: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com 25

DocuSign

VANESSA PEGUEROS, Chief Information Security OfficerVanessa is currently VP and CISO for DocuSign helping to lead the company in providing an industry leading security program to its customers. Vanessa formally worked with US Bank as the Senior VP responsible for Enterprise Information Security and a team of over 120 people. She also was the CISO at Expedia and has held senior level security roles with Washington Mutual, Cingular and AT&T Wireless. She has held numerous other roles specifically within the wireless arena including Network Planning, Architecture & Engineering, Technical Sales, and Product Development.

DocuSign® is changing how business gets done by empowering more than 100,000 companies and more than 50 million users in 188 countries to sign, send and manage documents anytime, anywhere, on any device with trust and confidence. DocuSign replaces printing, faxing, scanning and overnighting documents with the easiest, fastest, most trusted way to make every approval and decision digital. Our eSignature software and Digital Transaction Management platform enable organizations of every size, industry and geography to accelerate contracts, approvals and workflows. DocuSign keeps life and business moving forward.

Duke Energy

Duke Energy makes life better for millions of people every day by providing electric and gas services in a sustainable way: affordable, reliable and clean. We are the largest electric power holding company in the United States, supplying and delivering energy to approximately 7.2 million U.S. customers. We have approximately 57,700 megawatts of electric generating capacity in the Carolinas, the Midwest and Florida; and natural gas distribution services in Ohio

and Kentucky. Our commercial and international businesses own and operate diverse power generation assets in North America and Latin America, including a portfolio of renewable energy assets. Headquartered in Charlotte, N.C., Duke Energy is a Fortune 250 company traded on the New York Stock Exchange under the symbol DUK.

TERRELL GARREN, Chief Security OfficerTerrell Garren serves as vice president and chief security officer for Duke Energy. In this role, he leads the group responsible for maintaining cybersecurity and physical security for the enterprise. This includes enterprise protective services and IT security and compliance. He assumed his current position in August 2015. Garren joined Duke Energy in 1983 and has extensive experience in the technology field, from programming and systems architecture, to leading strategy and deliverables for information security and infrastructure organizations. He is a certified information systems security professional and serves on the

board of advisors for Security magazine. He is a retired colonel from the U.S. Army National Guard, where he served 28 years and earned a Bronze Star for meritorious active duty service in Iraq.

A native of Brevard, N.C., Garren earned a master’s degree in computer engineering from North Carolina State University in Raleigh, N.C., and a bachelor’s degree in computer science from Appalachian State University in Boone, N.C. He is also a graduate of the U.S. Army War College.

Page 26: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com26

FedEx

ANTHONY SHARP, Vice President

Professional Biography unavailabe at time of print.

FedEx connects people and possibilities through our worldwide portfolio of shipping, transportation, e-commerce and business services. We offer integrated business applications through our collaboratively managed operating companies — collectively delivering extraordinary service to our customers — using the expertise and reliability represented by the FedEx brand.

Our people are the foundation of our success, and FedEx has consistently ranked among the world’s most admired and trusted employers. We inspire our global workforce of more than 300,000 employees to remain absolutely, positively focused on safety, the highest ethical and professional standards, and the needs of their customers and communities.

We owe our success as an industry leader to the more than 300,000 global team members who deliver exceptional customer service experiences day-in and day-out.

Fairview Health Services

BARRY CAPLIN, Vice President & Chief Information Security OfficerBarry is the first Chief Information Security Officer for Fairview Health Services, responsible for enterprise information security and technologies including HIPAA compliance and security architecture.

Barry has 30 years of experience in technology, the last 20 focused on information security. He holds an MS in applied mathematics from Virginia Polytechnic Institute (Virginia Tech), and CISSP, ISSMP, CISA, and CISM certifications.

He frequently speaks on a variety of security, safety and privacy topics, particularly staying safe with the internet, social media, and mobile devices.

Follow him on Twitter @bcaplin and read his blog http://securityandcoffee.blogspot.com/

Fairview Health Services, based in Minneapolis, is a nonprofit, integrated health system providing exceptional health care across the full spectrum of health care services. In partnership with the University of Minnesota, our 22,000-plus employees and 2,500 employed and aligned physicians embrace innovation and new thinking to drive a healthier future through healing, discovery and education.

Page 27: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com 27

Fluor Federal Petroleum Operations (FFPO)

CHRIS SHIPP, Chief Information Security Officer, Fluor Federal Petroleum Operations, Contractor to the U.S. Department of Energy

Chris Shipp is a columnist, speaker, and consultant with over 15 years of experience in the field of information security and currently serves as the Chief Information Security Officer for the U.S. Department of Energy Strategic Petroleum Reserve (contractor). Chris is

known for his unique and entertaining speaking style and has provided cyber security training and support for many commercial and government entities including the Federal Bureau of Investigation and U.S. military. Currently, Chris is working within the cyber security community to develop and implement better information security within industrial control system environments.

FLUORFEDERAL PETROLEUM OPERATIONS

ONE MISSION

ONE VISIONON

E T

EAM

O N E SP R

Fluor Federal Petroleum Operations (FFPO) is a special-purpose company formed for the sole purpose of managing and operating the Strategic Petroleum Reserve (SPR) under a prime contract with the U.S. Department of Energy (DOE). The DOE established the SPR in 1975 to reduce the adverse impact of a major interruption of petroleum supply to the United States and carry out our nation’s obligation under the International Energy program. With the capacity for holding up to 727 million

barrels, the SPR is the largest emergency supply of crude oil in the world. The oil is stored in specially created underground salt domes located at four sites along the Gulf Coast: two in Louisiana (Bayou Choctaw and West Hackberry) and two in Texas (Bryan Mound and Big Hill). In addition to the four storage sites, the SPR operates a Project Management Office in New Orleans, Louisiana and an equipment storage facility in Stennis, Mississippi.

Finning International

SUZIE SMIBERT, Chief Information Security OfficerBreaking the mold of the typical CISO, Suzie Smibert is making a mark in the global Information Security community as a leading, innovative, and benchmark-setting Information Security C-Level Executive. She mastered the art of translating complex IT challenges into relevant business discussions, transformed companies culture into security champions and she continues to inspire the information security community to embrace a risk approach instead of fear tactics.

Currently the global CISO for Finning International, Suzie is responsible for the enterprise information security, risk and compliance management program for Finning in the Americas, UK, Ireland, and South-America.

Finning International Inc. is the world’s largest Caterpillar equipment dealer delivering unrivalled service to customers since 1933. Finning sells, rents and services equipment and engines to help customers maximize productivity. Headquartered in Vancouver, B.C., the company operates in Western Canada, Chile, Argentina, Bolivia, Uruguay, as well as in the United Kingdom and Ireland.

Delivering unrivalled service begins with our people. Having the best people in the industry is a competitive advantage that Finning actively cultivates through our commitment to building a high-performance culture that meets the personal and professional needs of our employees.

Page 28: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com28

HD Vest Financial Services

PAUL HORN, Chief Information Security OfficerPaul is the CISO at HD Vest Financial Services and has over 15 years of various security experiences that includes time spent as a Special Agent with the Air Force Office of Special Investigations, lead a global information security program for DynCorp International’s logistics and air operations for various government contracts, and led the Drug Enforcement Administration’s Aviation Division vulnerability management program. In addition Paul has been a finalist in 2013, 2014 and 2015 for Certified CISO of the Year through EC-Council. Paul serves on a variety of Advisor Boards for information security related

topics and has a deep dedication to the information security community by mentoring other security professionals.

Since its inception in 1983, HD Vest Financial Services® has supported an independent network of tax and non-tax professionals who provide comprehensive financial services including securities, insurance, money management services, and banking solutions.

Ranked one of the leading broker/dealer firms – we know what it takes to make your practice really flourish.

HD Vest Financial Services®is the holding company for the group of companies providing financial services under the HD Vest name. Securities offered through HD Vest Investment ServicesSM, Member SIPC, Advisory services offered through HD Vest Advisory ServicesSM, 6333 N. State Highway 161, Fourth Floor, Irving, TX 75038, 972-870-6000.

HARMAN

MAURICE STEBILA, Chief Information Security OfficerChief Information Security and Compliance Officer within the Global Manufacturing and Financial Services Industry with over 25+ years of extensive information security, SOX compliance management, risk management and business continuity experience overseeing cross-functional teams in the development and implementation of high performance global information systems and services. Certified Information Security Systems Professional, providing executive guidance to some of world’s largest enterprises - including EDS, HP, General Motors and most recently Harman International.

Internationally recognized as a leader in IT security and SOX compliance with the proven ability to manage on a global scale, contractual and regulatory information security compliance in a multiplatform environment, resolving international discrepancies between information security and data privacy requirements. Author of multiple security awareness programs and information protection newsletters. Was named a winner in the (ISC)2 Annual Cyber Security Awareness contest and previously won the Infosecurity News magazine award for Excellence in Promoting Information Protection Awareness.

Headquartered in Stamford, Connecticut, HARMAN (harman.com) designs and engineers connected products and solutions for automakers, consumers and enterprises worldwide, including connected car systems; audio and visual products, enterprise automation solutions; and connected services. With leading brands including AKG®, Harman Kardon®, Infinity®, JBL®, Lexicon®, Mark Levinson® and Revel®, HARMAN is admired by audiophiles, musicians and the entertainment venues where

they perform around the world. More than 25 million automobiles on the road today are equipped with HARMAN audio and connected car systems. The Company’s software services power billions of mobile devices and systems that are connected, integrated and secure across all platforms, from work and home to car and mobile. HARMAN has a workforce of approximately 27,000 people across the Americas, Europe, and Asia and reported sales of $6.2 billion during the 12 months ended June 30, 2015.

Page 29: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com 29

Hearst

DAVID HAHN, Vice President & Chief Information Security OfficerDavid is the head of Corporate Information Security and Risk (CISO) for the Hearst Corporation. He is helping Hearst innovate and lead into more Cloud computing and moving content to Digital capabilities leveraging Hearst’s multiple media outlets in a fast, efficient and secure manner. Hearst also has significant holdings in Healthcare information. Prior to Hearst, David was at Intuit where he lead the CyberFraud strategy and managed areas in Security Operations, including Cloud with the many product/business groups such as TurboTax, Quicken, Mint, and QuickBooks. David also spent many years at Wells

Fargo Bank, where he headed up all security for Wellsfargo.com, at the time the largest on-line banking site.

Hearst is one of the nation’s largest diversified media, information and services companies with more than 360 businesses. Its major interests include ownership in cable television networks such as A&E, HISTORY, Lifetime and ESPN; majority ownership of global ratings agency Fitch Group; Hearst Health, a group of medical information and services businesses; 30 television stations such as WCVB-TV in Boston and KCRA-TV in Sacramento, Calif., which reach a combined 19 percent of U.S. viewers; newspapers such as the Houston Chronicle, San Francisco Chronicle and Albany Times Union, more than 300 magazines around the world includingCosmopolitan, ELLE,Harper’s BAZAAR and Car and Driver; digital services businesses such as iCrossing and KUBRA; and investments in emerging digital and video companies such as Complex, BuzzFeed, VICE and AwesomenessTV.

HM Health Solutions

OMAR KHAWAJA, Chief Information Security OfficerOmar Khawaja has spent 15+ years delivering, developing and managing security solutions for startups, service providers, consulting firms and enterprises. Omar is currently VP and Chief Information Security Officer (CISO) at Highmark, the third largest integrated health care delivery and financing system in the nation, employing more than 35,000 people and serving 40 million Americans in 50 states. Prior to Highmark, Omar was at Verizon Enterprise Solutions, where he had responsibility for their portfolio of security solutions with customers in 72 countries.

HM Health Solutions (HMHS) was formed in March 2014, as a subsidiary of Highmark Health. HMHS enables health plans to achieve top-line revenue growth, reduce costs and gain economies of scale. The HMHS Enterprise platform leverages state-of-the-art cloud technology to support a comprehensive suite of offerings. HMHS offers expertise in multiple product lines, including Medicare, Medicaid, commercial, and individual business. Our industry-leading expertise in people, process and platforms deliver measurable results while increasing customer engagement.

For more information, visit www.hmhs.com.

Page 30: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com30

MasterCard Worldwide

RON GREEN, Chief Security OfficerRon Green is group executive and chief information security officer. He leads a global team that ensures the safety and security of the MasterCard network as well as internal and external products and services. He is responsible for Information Security Operations, Architecture and Engineering, Security Event Management and Incident Response. Mr. Green also oversees cryptographic key management, business continuity, disaster recovery and emergency management. Mr. Green joined MasterCard in 2014 after serving as deputy chief information security officer at Fidelity Information Services (FIS). There, he led a team responsible for North American Information Security Operations, including security architecture

and engineering programs, security testing and governance. Prior to this position, Mr. Green was director, Investigation and Protections Operations at Blackberry where he was responsible for global cyber and physical investigations, security operations centers, network security architecture, technical surveillance countermeasures and threat intelligence programs. He also served as a senior vice president across several areas at Bank of America. Mr. Green has extensive experience working with international and federal law enforcement agencies both as a special agent in the United States Secret Service and as an officer in the United States Army. With the Secret Service, Mr. Green worked protection, and fraud investigations. He was one of the first agents to receive formal training on seizing and analyzing electronic evidence, and worked on a number of international cyber-crime investigations. Mr. Green serves on several advisory councils including the Financial Services/ Information Sharing and Analysis Center and the Overseas Security Advisory Council. He holds a bachelor’s degree in mechanical engineering from the United States Military Academy at West Point; is a graduate of the FBI’s Domestic Security Executive Academy; and holds a graduate certification in Information Assurance from George Washington University.

As a technology company in the global payments business, we operate the world’s fastest payments processing network, connecting consumers, financial institutions, merchants, governments and businesses in more than 210 countries and territories. MasterCard’s products and solutions make everyday commerce activities – such as shopping, traveling, running a business and managing finances – easier, more secure and more efficient for everyone.

MINDBODY

MICHAEL HANSON, Chief Information Security Officer / Senior Vice President of Information Security

Mr. Michael Hanson serves as an the Chief Information Security Officer and Vice President of IT Security at MINDBODY, Inc. Mr. Hanson is responsible for guiding and directing global security activities including architecture, design, implementation and operations. His 21 years of experience in IT include service in the United States Marine Corps (USMC) as the Senior Enlisted Security Advisor to the Chief Communication Officer during the war in Iraq, where he received the Meritorious Service Medal. He

also served as the Director of Information Systems for Naval Station Guantanamo Bay in Cuba. Mr. Hanson’s most notable achievement was directing the emergency communications efforts for the emergency response activity staged in Cuba to support the Haitian Earthquake disaster of 2010.

MINDBODY Business Management Software is trusted by thousands of clients in over 80 countries to manage and grow their businesses. Named one of the top software companies in the US by Inc. magazine, MINDBODY helps businesses leverage technology to streamline operations and make their services more accessible to their clients. The MINDBODY mission is to leverage technology to improve the health and wellness of the world. And, we walk our talk. MINDBODY employees can choose to participate in the corporate Wellness program, supporting our local clients. Many of our

team members are artists or yoga, gyrotonic, and fitness instructors - all of which MINDBODY encourages. Construction of our office building was done naturally and progressively, including a recycling program. Our office building is LEED (Leadership in Energy & Environmental Design) Gold certified.

Page 31: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com 31

Moneygram

BETTY HOLTE ELLIOTT, Vice President & Chief Information

Security OfficerProven Security, Risk and Compliance professional with a rare combination of business acumen and technical knowledge. Effectively creates and drives strategic vision to execution. Exemplary leadership and interpersonal skills focusing on relationship building and delivering results. Excellent analytical and problem solving skills. Able to communicate successfully throughout all levels of the organization.

MoneyGram is a global provider of innovative money transfer services and is recognized worldwide as a financial connection to friends and family. Whether online, or through a mobile device, at a kiosk or in a local store, we connect consumers any way that is convenient for them. We also provide bill payment services, issue money orders and process official checks in select markets. More information about MoneyGram International, Inc. is available at moneygram.com. MoneyGram offers person-to-person money transfer and payment services in more than 200

countries and territories through a global network of approximately 350,000 locations, working with retailers, international post offices and banks. MoneyGram also offers bill payment services, issues money orders and processes official checks in select markets. The company is committed to providing affordable, reliable, secure and convenient payment services to consumers around the world. A dynamic organization with a culture of innovation, action and internal promotion, MoneyGram offers competitive compensation and benefits packages and is looking for high performers that are ready to be part of the company’s success.

Mohawk Industries

JEVIN JENSEN, Vice President, Global Infrastructure

IT Executive with a focus on leading a globally dispersed technical workforce. Charged with setting strategic vision for an Infrastructure shared service (Center of Excellence) and executing initiatives that support growth of multiple global business units in Fortune 500 public company. Accountable for driving cost containment while providing the enterprise with competitive technology solutions. Responsible for all areas of infrastructure: storage, compute, local and wide area networks, datacenters, disaster recovery, cyber security, end-user first and second level support, mobile devices, architecture design, mid range/

mainframe, ITIL, and agile IT project management. Demonstrated ability to develop, hire, and retain IT leaders and senior staff with extremely low turn-over.

Mohawk Industries is a leading global flooring manufacturer that creates products to enhance residential and commercial spaces around the world. Mohawk’s vertically integrated manufacturing and distribution processes provide competitive advantages in the production of carpet, rugs, ceramic tile, laminate, wood, stone and vinyl flooring. Our industry-leading innovation has yielded products and technologies that differentiate our brands in the marketplace and satisfy all remodeling and new construction requirements. Our brands are among the most recognized in the industry and include American Olean, Bigelow, Daltile, Durkan, Karastan, Lees, Marazzi, Mohawk, Mohawk Home, Pergo, Unilin and Quick-Step. During the past decade, Mohawk has transformed its business from an American carpet manufacturer into the world’s largest flooring company with operations in Australia, Brazil, Canada, China, Europe, India, Malaysia, Mexico, Russia and the United States.

Page 32: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com32

National Hockey League

GREG NOTCH, Senior Vice President, Information Technology &

Security

Greg has been architecting and implementing large scale infrastructure and enterprise systems since 1995. For the past 8 years he has worked on defining top level technology, infrastructure, and security strategy for the NHL. Currently he is developing and implementing a league-wide comprehensive information security program which includes building out policies, selecting technologies and

developing response capabilities. Prior to joining the NHL he has worked on infrastructure and software systems for Apple, Yahoo Search, eMusic, The FeedRoom, and several NYC based startups.

The National Hockey League (NHL) a professional ice hockey league composed of 30 member clubs: 23 in the United States and 7 in Canada. Headquartered in New York City, the NHL is considered to be the premier professional ice hockey league in the world, and one of the major professional sports leagues in the United States and Canada. The Stanley Cup, the oldest professional sports trophy in North America, is awarded annually to the league playoff champion at the end of each season.

Neiman Marcus Group

SARAH HENDRICKSON, Chief Information Security OfficerSarah Hendrickson is VP and Chief Information Security officer for Neiman Marcus Group. She is responsible for security operations, risk management and compliance. Sarah has brought her expertise to several industries, including government, retail and health care. She is currently a subject matter expert, content developer and exam item writer for ISC2.

For over a century, The Neiman Marcus Group has stayed focused on serving the unique needs of the luxury market. Today, that commitment is stronger than ever. We have stayed true to the principles of our founders – to be recognized as the premier luxury retailer dedicated to providing our customers with distinctive merchandise and superior service. The Company offers upscale assortments of apparel, accessories, jewelry, beauty and decorative home products to the affluent consumer. The Company operates 42 Neiman Marcus Stores across the United States and two Bergdorf Goodman stores in Manhattan. The Company also operates thirty Last Call clearance centers and thirteen Last Call Studios as well as five CUSP stores. These store operations total more than 6.9 million gross square feet. The Company conducts direct to consumer operations under the Neiman Marcus, Bergdorf Goodman, Last Call, Horchow, CUSP and mytheresa brand names.

Page 33: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com 33

Petco

DAVID RICHTER, Ph.D, Vice President, Chief Technology Officer, Chief Information Security OfficerDr. Richter is accountable for Petco’s IT Security, Enterprise Architecture, Infrastructure Engineering & Operations, Help Desk, End User Support, Enterprise Applications, and Drs. Foster & Smith IT (a Petco subsidiary).

Previously, Dr. Richter built multiple start-ups and transformed several large, global, and high-growth IT organizations. As an avocation, he has taught Management, Computer Science, and Mathematics at several universities.

Dr. Richter received his Bachelor’s Degree with Honors in Computer Science from the University of California, Berkeley. He went on to earn his Masters of Computer Science, an MBA and a PhD. in Engineering and Technology Management.

Petco is a leading pet specialty retailer that focuses on nurturing powerful relationships between people and pets. Everything we do is guided by our vision for Healthier Pets. Happier People. Better World. We operate more than 1,400 Petco locations and provide prescription services and pet supplies from the leading veterinary-operated pet product supplier, Drs. Foster & Smith.

The Petco Foundation, an independent nonprofit organization, has raised more than $125 million to improve the welfare of companion animals. The Foundation works with and supports thousands of local animal welfare groups and helps find homes for more than 400,000 animals every year.

PfizerBRIAN CINCERA, Vice President, Global Information Security

Brian Cincera joined Pfizer in 2005 after working with the company as a consultant developing its digital credential and identity strategy. In his role in Business Technology Infrastructure, he is accountable for Security and Client Computing Services. This includes all service management for PC’s, printing, Email, Instant Message, IT Security, Identity & Access Management, audio & video conferencing and voice telephones. Prior to joining Pfizer,Brian spent 15 years as a consultant and service provider, specializing in network, security and computer platform engineering. Brian’s customers included major healthcare,

financial services, transportation, energy and telecommunications companies inside and outside the US.Brian has a Bachelor’s of Science in Business Administration from Penn State University.

Pfizer is a leading research-based biopharmaceutical company. We apply science and our global resources to deliver innovative therapies that extend and significantly improve lives. We make medicines and vaccines that help people when they are sick and prevent them from getting sick in the first place, as well as some of the world’s best-known consumer healthcare brands. Every day, our colleagues work in developed and emerging markets to treat, cure and eradicate life-threatening conditions and challenge some of the most feared diseases of our time. Pfizer also collaborates with healthcare providers, governments and local communities to support and expand access to reliable, affordable healthcare around the world. For more than 150 years, Pfizer has worked to make a difference for all who rely on us.

Page 34: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com34

Priceline Group

GREG ALEXANDER, Vice President, Global Security Advisor

Greg is the VP, Global Security Advisor for the Priceline Group. He is responsible for leading the IT Security function within Group, providing security advice and guidance to Senior Leadership, assessing the status of security within the group and providing updates and recommendations to the Board of Directors and Group Senior Leadership. He holds the CISM certificate from ISACA and is a recognized speaker; having presented IT Security papers in London, Dublin, Nice, and Singapore as well as numerous US locations.

Greg is a retired US Army LTC and a graduate of Western Michigan University, holding an MBA and a BBA.

The Priceline Group is the world’s leading provider of online travel & related services, provided to consumers and local partners in over 220 countries and territories through six primary brands: Booking.com, priceline.com, agoda.com, KAYAK, rentalcars.com and OpenTable. Collectively, The Priceline Group operates in over 220 countries and territories in Europe, North America, South America, the Asia-Pacific region, the Middle East and Africa in over 42 languages. The Priceline Group’s mission is to help people experience the world.

Pizza Hut Global - Yum ! BrandsAJAY GUPTA, Chief Information Security OfficerAjay is a seasoned Information Security and Technology Leader with 20+ years’ enterprise IT experience in progressive leadership roles, spearheading strategic security initiatives, large design and application development/migrations. Proven track record of conceptualizing and implementing IT security strategies, risk management strategies and integrated security architecture approaches that build company value and result in sustainable and profitable growth. Adept at balancing competing resources across concurrent high-profile projects while also uncovering opportunities to elevate productivity. Leverage business and tech-solution acumen to execute innovative projects, improve efficiency and streamline

processes. Experienced at successfully facilitating corporate transformation programs and building secure infrastructure. Played a key role in developing Humana’s information security strategy and evangelized information security, leading to a successful enterprise wide adoption and security integration in key business critical processes.

Yum! Brands isn’t your average Fortune 250 company. We like to do things a little differently. From our world-famous culture of fun and recognition to our focus on your career potential, Yum! puts a unique stamp on day-to-day business. As the world’s largest restaurant company, Yum! Brands, Inc. has over 39,000 restaurants in more than 130 countries and territories and more than 1 million associates worldwide. The Company’s brands - KFC, Pizza Hut and Taco Bell– are the global leaders of the chicken, pizza and Mexican-style food categories. What

makes Yum! a great place to work? It’s our people. That’s why we invest in people capability so they can make the most of their career. With a diverse workforce and ongoing opportunities for personal and professional success, we’ve built a culture that rewards and recognizes great effort while providing the work/life balance that is so important to all of us. Around the globe, we bring people together to have fun and to celebrate special occasions. Our restaurant support centers are no different! Our passion for hospitality and making people feel welcomed knows no bounds. We say “hi!” in the hallway, we tell people how much we appreciate their contributions and we celebrate each other’s achievements. Whether it’s chattering-teeth trophies or an “open door” atmosphere, we’ve made sure Yum! remains an un-corporate corporation. We’re a team, yet we take a tremendous amount of pride in each individual, and believe in acknowledging a job well done on every level. Here, we don’t stop until we have breakthrough results, so we encourage you to master your skill set, while constantly expanding your expertise. This tried-and-true practice keeps every day dynamic and encourages long, rewarding careers.

Page 35: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com 35

Schnuck Markets, Inc.

JOEY SMITH, Chief Information Security OfficerJoey Smith joined Schnuck Markets in January 2014 and is responsible for enhancing the security program of the company. Previously, he worked for MasterCard Worldwide running the incident response program. From 2008 - 2012, he was the primary investigator and incident manager for MasterCard’s global computer security incident response team. Additional experience at MasterCard included being part of the Account Data Compromise team with responsibilities of conducting ADC Fraud Investigations as well as being a member of the Payment Card Industry Security Standards

Council responsible for reviewing the work of the various PCI forensic investigation companies. In 2015 Smith received the CISO Rising Star Award from the Security Advisor Alliance. Additionally, in 2014 Smith was an honored recipient of the Southeast Missouri State University Young Alumni Merit Award.

Schnucks was founded in 1939 with the promise of delivering quality food at a great value. Schnuck Markets, Inc. is still a family-run business, and what started as a 1,000-square-foot corner confectionery in north St. Louis has grown to more than 100 full-service supermarkets in five states.

Rite Aid

ROBERT V. LAUTSCH, CISM, CISA, CRISC, DABCHS, Vice

President & Chief Information Security OfficerRobert is responsible for the development and management of the Information Security program throughout Rite Aid and its subsidiaries. In addition, he is also the co-chairman of the corporate contingency planning steering committee. Robert was recognized by Execrank.com as one of the top 32 security executives in 2012/2013. Previously he was Senior Vice President /CISO for Charter One Financial Corp.

At Rite Aid, our mission is to improve the health and wellness of our communities through engaging experiences that provide our customers with the best products, services and advice to meet their unique needs. We have a personal interest in your health and wellness. That’s why we deliver the products and services that our valued customers need to lead a healthier, happier life. Everyone at Rite Aid—from our knowledgeable, caring associates and pharmacists to the members of our board of directors—works together to provide you with a superior pharmacy experience.

Page 36: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com36

Staples

DAVID BILLETER, Vice President, Global Security, Privacy &

Regulatory Compliance

David Billeter is currently the Vice President, Global Security, Privacy and Regulatory Compliance at Staples, Inc., where he is responsible for information security and privacy issues at all of Staples’ stores and corporate centers. Prior to joining Staples, Mr. Billeter was responsible for information security at the InterContinental Hotels Group. He has held positions at QVC and General Motors, and is an active

member of the Utah State Bar. His interests include encryption, particularly digital signatures, and electronic contracting.

Staples makes it easy to make more happen with more products and more ways to shop. Through its world-class retail, online and delivery capabilities, Staples lets customers shop however and whenever they want, whether it’s in store, online or on mobile devices. Staples offers more products than ever, in categories such as technology, facilities and breakroom, furniture, safety, and medical, as well as Copy & Print and Staples® EasyTechsm services. Staples has been making it easy for businesses for 27 years with thousands of associates worldwide. Headquartered outside of Boston, Staples operates throughout North and South America, Europe, Asia, Australia and New Zealand.

More information about Staples (Nasdaq: SPLS) is available at staples.com®

ServiceMaster

JENNIFER COLE, Chief Information Security Officer, Vice President Information Security and Governance

I am an experienced manager with a passion for team collaboration and problem solving. My educational goals are to attain a Masters of Business Administration and CISM (certified information security manager) within the next two years. My career goals are to advance in any leadership position that allows me to manage people, projects and/or products that make a difference in security, customer experience and

revenue generation for my company. An important objective for me as a leader is to develop and grow all associates and to challenge myself to always learn new things. Specialties: I am a very analytical and strategic thinker. I am passionate and greatly enjoy the subject matter of Compliance and Security. Problem solving, methodical auditing, controls creation and process, incident management and research, presentations, and multi-function team collaboration are my primary attributes.

ServiceMaster Global Holdings, Inc. (NYSE: SERV) is a leading provider of essential residential and commercial services, operating through an extensive service network of more than 8,000 company-owned, franchised and licensed locations. The company’s portfolio of well-recognized brands includes American Home Shield (home warranties), AmeriSpec (home inspections), Furniture Medic (furniture repair), Merry Maids (residential cleaning), ServiceMaster Clean (janitorial), ServiceMaster Restore (disaster restoration) and Terminix (termite and pest control). We serve residential and commercial customers through an employee base of approximately 13,000 company associates and a franchise network that independently employs an estimated 33,000 additional people.

Page 37: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com 37

DARWIN LARRISON, Corporate Information Security OfficerDarwin Larrison joined UnityPoint Health as Corporate Information Security Officer on December 11, 2014. Previously, Darwin was the Director of Information Protection for FBL Financial Group, Inc.

Darwin holds a Bachelor of Science degree in Business and Information Technology and is also a Certified Information Systems Security Professional and GIAC Information Security Leadership certified; along with several technology based certifications.

Darwin currently serves as the Chairman of the Technology Association of Iowa CISO Roundtable and is an active member of Infragard Iowa and the Information Systems Security Association. He is also a sitting member on the Symantec Healthcare Advisory Board.

UnityPoint Health has a vision for health care, and it starts with you: “Best outcome for every patient every time.”

Our team of professionals communicates with you to clearly and effectively address your health care in the most appropriate setting: whether that is a clinic, a hospital or at home. Our 30,000 employees, located in three states, sixteen hospitals and over 300 clinics; including home careexperts, our hospital teams and more than 900 doctors and specialists, focus on your care, your concerns and your health. We are constantly looking for better ways to work together to improve the way health care is delivered. UnityPoint Health has annual revenue of approximately 2.7 Billion.

UnityPoint Health

Page 38: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

Real-Time Threat Intelligence

Out-Innovate Your AdversariesRecorded Future arms you with real-time threat intelligence so you can proactively defend against cyber attacks.

With billions of indexed facts, and more added every day, our patented Web Intelligence Engine continuously analyzes the entire Web to give you unmatched insight into emerging threats. Recorded Future helps protect

four of the top five companies in the world.

Gain threat-insight beyond your network

Alert on threats from the entire

Web

Quickly dismiss non-critical incidents

www.recordedfuture.com|@RecordedFuture

LEARN MORE AT WWW.RECORDEDFUTURE.COM

Urgent Ad 02.indd 1 21/03/2016 16:49

Page 39: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

ASSEMBLY SPONSOR

PROFILES

PRIVATE SECTOR CISO

AlgoSecCloudPassageKaspersky

Micro Focus | NetIQMimecast

Recorded FutureRiskIQ

Page 40: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com40

MIKE BROWN, Global Director of Strategic Accounts

Mike has been in High Tech for 27 years. Mike started his career in mainframe technologies. He has worked for companies like IBM, Oracle, Tivoli, Siebel, Lawson, etc.

He has held various positions from CEO of a company he founded, to his current role of Global Director of Strategic Accounts.

Mike’s experience crosses many areas of expertise in high tech from systems management, CRM, ERP, Web, and security.

He has a unique skill of leveraging new technologies to find ways to create business transformation.

AlgoSec

AlgoSec simplifies, automates and orchestrates security policy management to enable enterprise organizations and service providers to manage security at the speed of business. Over 1,500 of the world’s leading organizations, including 20 of the Fortune 50, rely on AlgoSec to optimize their network security policy throughout its lifecycle, to accelerate application deliv-ery while ensuring security and compliance. AlgoSec is committed to the success of each and every customer, and provides the industry’s only money-back guarantee.

Our Solution

AlgoSec manages complex network security policies throughout their lifecycle— from discovering application connectivity requirements, through ongoing change management and proactive risk analysis, to secure decommissioning. With powerful visibility across firewalls and cloud security controls, AlgoSec simplifies, automates and orchestrates security policy manage-ment to accelerate application delivery while ensuring security and continuous compliance across the enterprise.

With the AlgoSec Security Management Solution you can:

Quickly and securely provision application connectivity, and avoid outages

Unify security management across heterogeneous cloud, software-defined and on-premise environments

Automate firewall change management and eliminate misconfigurations

And More!

Page 41: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com 41

CloudPassage

MITCH BISHOP, Chief Marketing Officer

Mitch is an experienced, high integrity business leader with a successful track record of driving high growth enterprise software companies in a variety of disciplines (mobile, CMS, software visualization, CRM, databases). Prior to CloudPassage, Mitch led the marketing organizations at Moovweb, DNN Corp. and iRise, where he also managed a high growth inside sales team. Prior to that, he held senior marketing roles at Sybase, Wind River Systems and Ingres. He started his career as a UNIX kernel programmer and engineering manager. Mitch also sits on the governing council of the non-profit International Motor Racing Research Center in Watkins Glen, NY.

MARK STEPHENSON, Executive Vice President of Sales

Mark Stephenson drives worldwide sales for CloudPassage. Mark is an accomplished sales leader who brings enterprise solution selling experience and CXO partnering expertise to CloudPassage. He most recently led sales in the Western Region for $8 billion global data center solutions provider, Digital Realty Trust. Prior to that, Stephenson built Hewlett Packard’s networking salesforce and grew the company’s core routing and switching business. At Cisco, he led and developed a senior team of 45 enterprise account managers to grow Cisco’s business within key healthcare, high-tech, financial and retail accounts.

CloudPassage® Halo® is the world’s leading agile security platform that provides instant visibility and continuous protection for servers in any combination of data centers, private clouds and public clouds. The Halo platform is delivered as a service, so it deploys in minutes and scales on-demand. Halo uses minimal system resources; so layered security can be deployed where it counts, right at every workload – servers, instances and containers. Leading enterprises like Citrix, Salesforce.com and Adobe use CloudPassage today to enhance their security and compliance posture, while at the same time enabling business agility.

Our Solution

CloudPassage® Halo® is the world’s leading agile security platform that provides instant visibility and continuous protection for servers in any combination of data centers, private clouds and public clouds. The Halo platform is delivered as a service, so it deploys in minutes and scales on-demand. Halo uses minimal system resources; so layered security can be deployed where it counts, right at every workload – servers, instances and containers. Leading enterprises like Citrix, Salesforce.com and Adobe use CloudPassage today to enhance their security and compliance posture, while at the same time enabling business agility.

Page 42: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com42

Kaspersky

BILL CUNNINGHAM, Vice President of Enterprise Sales

Bill Cunningham is Kaspersky’s Vice President of Enterprise sales. He has over 20 years of experience in the high technology sales space in the security, cloud back-up, business process, education and productivity segments.

He has built and managed sales teams and channels in the enterprise, smb and consumer space with companies such as The Learning Company, Suplicity, Riverdeep, Carbonite and WhiteSky.

MICHAEL CANAVAN, Senior Director Systems Engineering, North

America

As Senior Director Systems Engineering, North America Michael Canavan is responsible for actively driving and managing the technology evaluations stage of the sales process in North America, while working in conjunction with the sales team as a key technical advisor and product advocate.

Michael brings nearly a decade of experience in network security and systems administration to his role. Prior to Kaspersky Lab, Michael served a variety of roles at Trend Micro including management of endpoint sales engineering and liaison with product management on 3rd party integration projects. He also spent several years in the channel as a security specialist. These experiences have exposed Michael to the customer challenges through the multitude of diverse environments.

Kaspersky Lab is the world’s largest privately held vendor of endpoint protection solutions. Throughout its 18-year history Kaspersky Lab has remained an innovator in IT security and provides effective digital security solutions for consumers, SMBs and Enterprises. Kaspersky Lab has over 2,500 employees, including more than 800 research and development specialists.

For further information about the company: www.kaspersky.com.

Our Solution

The most important factor in a corporate security strategy is a next-generation endpoint security platform, powered by a global intelligence network (Kaspersky Security Network), which provides a higher level of business processes and data protection together with a wide range of security capabilities to fight advanced threats (detecting suspicious activities and protecting against zero-day attacks). No matter what endpoints you have – desktops, servers, mobile devices, virtual machines, even het-erogeneous IT environments – you need a solution that gives you centralized control to protect all your endpoints.

Page 43: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com 43

RON LAPEDIS, Sales Enablement Specialist

Ron LaPedis, CISSP, is a sales enablement specialist at Micro Focus. Prior to joining Micro Focus, he was a hands-on security leader, designing secure offshore development environments, and writes on the topics of cyber security, physical security, disaster recovery, and business continuity. He has lead or participated in the design of dozens of business continuity plans and secure networks for financial and healthcare institutions around the world.

BERNIE GOICOECHEA, Area Sales Director

Bernie has over 25 years of experience in information technology in a variety of sales leadership and general management internationally and in the United States. He is currently the Central Area Sales Director for NetIQ, an industry recognized leader in the identity and access management, security and data center management market. He holds a Bachelor of Science degree from George Mason University in Fairfax, Virginia.

JEFF GIBSON, Manager – Identity, Access and Security Sales

Engineering

Jeff has been with Micro Focus/NetIQ for over 16 years supporting the Identity, Access and Security line of solutions where he now manages a team of technical sales specialists. He is also a member of the Micro Focus/NetIQ senior sales leadership team establishing vision and corporate strategy.

SIMON PULEO, Sales Enablement Specialist

Simon Puleo, CEH (Certified Ethical Hacker), is a security and enablement professional with over 15 years of experience across industries with companies including Micro Focus, HPE, 3M, Pfizer, and UBS. At Micro Focus he enables sales and partners on identity powered security, building the frameworks and solutions that provide a user centered approach to securing intellectual property, systems, and data. Previous to Micro Focus Simon was with HPE Enterprise Security enabling global sales in application security, network

security, encryption key management and SIEM. Simon plays a leading role in helping customers understand the adversary ecosystem and disrupt the kill-chain at each point in an attack. He is currently involved in a 2016 research effort evaluating advanced multi-factor authentication software and hardware.

Micro Focus | NetIQ

Micro Focus (LSE: MCRO.L) is a global enterprise software company helping customers innovate faster with lower risk. Our software helps customers build, operate and secure IT systems that bring together existing business logic and applications with emerging technologies to meet increasingly complex business demands. NetIQ is the security portfolio of Micro Focus. Our Identity-powered Security solutions help organizations secure access to sensitive information and reduce the complexity of demonstrating regulatory compliance. For more information, visit www.netiq.com.

Our Solution

NetIQ is the world’s leading provider of integrated Identity, Access and Security Management solutions. We help customers all over the world manage access so that users only have the rights they need to do their jobs. We help ensure that users are who they say they are by providing authentication solutions that deliver convenient and secure access across cloud, mobile and enterprise applications. And to help identifyaccess rights abuse, our security monitoring solutions combine rich contextual information about events, roles and entitlements todetect and disrupt attacks in real time.

Page 44: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com44

Mimecast

ALEX BENDER, Senior Vice President of Global Marketing

Alex joined Mimecast in February 2016 as Senior Vice President of Global Marketing, overseeing corporate communications, branding, field and channel marketing, product marketing and demand generation. He also oversees the online community and the threat intelligence initiatives at Mimecast. Alex’s deep domain expertise in information security spans across security operations, incident response, security maturity models, GRC, security analytics, email security, threat intelligence and research.

Prior to Mimecast, Alex was the General Manager of the RSA Conference, the leading industry event for information security professionals and community.

DAVE HOOD, Director of Technology Marketing

David is the Director of Technology Marketing at Mimecast. Previously he was Vice President and General Manager of Data Services at Connotate. David has held senior positions in marketing and product marketing at Kyruus, Memento (acquired by FIS) and additional enterprise software companies. He holds an MBA from Boston College and graduated from Vanderbilt University.

J. PETER BRUZZESE, Strategic Technical Consultant

J. Peter Bruzzese, Microsoft Office 365 MVP (5 time awardee with previous technical expertise being Exchange), Triple-MCSE, MCT, MCITP: Enterprise Messaging, is the co-founder of an end-user training solution called ClipTraining.com. In addition, he is an internationally published author with over a dozen titles to his name. He is a technical speaker for various conference venues including Techmentor, Connections and, at times, Tech Ed. He writes for both online and in-print tech publications like Redmond

Magazine, WindowsITPro, Tech Target’s SearchExchange.com and others. For 5+ years he has been the mind behind the Enterprise Windows column for InfoWorld. J. P. B. loves teaching and has applied his energies to screencast instruction with a variety of series on Exchange 2010 and 2013 availability through Pluralsight. More recently JPB focused attention on a side of the Exchange/O365 community that needed help… the “newbies” and he wrote short (150 page) book entitled “Conversational Exchange (in 10 days!)” to help folks learn the conceptual side to Exchange (without all the how-to, step-by-step info). Last but not least, J. Peter is a strategic technical consultant for Mimecast.

Mimecast (NASDAQ: MIME) makes business email and data safer for 16,200 customers and millions of employees worldwide. Founded in 2003, the Company’s next-generation cloud-based security, archiving and continuity services protect email and deliver comprehensive email risk management in a single, fully-integrated subscription service. Mimecast reduces email risk and the complexity and cost of managing the array of point solutions traditionally used to protect email and its data. For customers that have migrated to cloud services like Microsoft Office 365, Mimecast mitigates single vendor exposure by strengthening security coverage, combating downtime and improving archiving.

Our Solution

Mimecast Email Security protects against malware, spam, advanced phishing and other emerging attacks, while preventing data leaks. Mimecast Mailbox Continuity enables employees to continue using email during planned and unplanned outages. Mimecast Enterprise Information Archiving unifies email, file and instant messaging data to support e-discovery and give employees fast access to their personal archive via PC, Mac and mobile apps.

Page 45: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com 45

CHRISTOPHER AHLBERG, Chief Executive Officer

Dr. Christopher Ahlberg is the CEO of Recorded Future, Inc. and Chairman of Hult International Business School. He advises a series of start up companies. Earlier Ahlberg was the president ofthe Spotfire Division of TIBCO, which he founded in 1996 and in 2007 sold to TIBCO (Nasdaq:TIBX) for $195M. Spotfire was founded based on his groundbreakingresearch on informationvisualization. Dr. Ahlberg earned his doctorate from Chalmers University of Technology,worked as a visiting researcher at the University of

Maryland, and has lectured and consultedextensively for industry, academia, military, and intelligence communities aswell as published& lectured in computer science, cyber security, psychology, linguistics, biology, and chemistry.He has five granted software patents, and multiple pending.

Dr. Ahlberg was named among the World’s Top 100 Young Innovators by Technology Review,MIT’s Magazine of Innovation in 2002. He is a member of the Royal Swedish Academy ofEngineering Sciences.

ERIN BYRNE, Director Field Sales, North America

Erin Byrne is the Director of Field Sales, North America at Recorded Future, a RealTime Cyber Threat Intelligence Company located in Somerville, MA.

After graduation, Erin began her career at the Raytheon Company in Arlington, VA, working on International Agreements with Representatives and Consultants across the Middle East, Africa,and Asia.

Soon after, she was promoted to International Business Development Manager in theMiddle East and Africa representing Raytheon’s six business units in the region and spendingextended time in the UAE. In 2011, she moved to Boston to work for Raytheon BBNTechnologies where she worked to launch Boomerang, in the Middle East and North Africa.

The Boomerang Technology is an acoustic sniper detection system that pinpoints where the shooter’s location is. There are over 10,000 systems deployed to help protect troops in Iraq and Afghanistan.In January 2013, Erin decided to switch gears and join the Cambridge, MA based startupRecorded Future as one of their first sales reps. She has helped the Company growsignificantly in the last three years, doubling sales, and is now running the Field Sales Team inNorth America.

Recorded Future

Recorded Future arms you with real-time threat intelligence so you can proactively defend against cyber attacks. With billions of indexed facts, and more added every day, our patented Web Intelligence Engine continuously analyzes the entire Web to give you unmatched insight into emerging threats. Recorded Future helps protect four of the top five companies in the world.

Our Solution

Recorded Future provides real-time threat intelligence for threat intelligence teams and security operations center (SOC) teams. Threat teams receive alerts on critical threats from the entire Web, spend less time manually collecting data and improve communication with interactive visualizations. SOC teams can quickly dismiss non-critical incidents, detect important incidents that are otherwise missed, and gain threat awareness beyond their network. Recorded Future’s Web Intelligence Engine technology, generates threat intelligence by harvesting the Entire Web, extracting and organizing threat information, and making it relevant and actionable with context-rich alerts, analysis and security integrations.

Page 46: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com46

RiskIQ

ERIK LAIRD, Executive Vice President of Sales

Erik has more than 20 years of enterprise software sales experience. He joined RiskIQ from HP, where he was vice president of sales for HP Enterprise Security Product’s largest critical mass territory. During his tenure at HP, Erik led the integration of several distinct sales forces from ArcSight, Fortify and Tipping Point into a cohesive HP Enterprise Security Products team across the Central and Western United States. Prior to HP, Erik managed sales for Opsware, BEA Systems, Object Design eXcelon Corp., and Parametric Technology Corporation.

ARIAN EVANS, Vice President of Product Strategy

Arian Evans is a recognized expert in information and application security, software development, systems architecture, and financial services. He previously ran operations and product strategy for WhiteHat Security and built the company’s world-renowned Threat Research Center. In addition to managing the global application security practice for consulting firm FishNet Security, Arian has worked on global security projects for the Center for Internet Security, NIST, the FBI, and the U.S. Secret Service. As VP

of Product Strategy, Arian is responsible for ensuring RiskIQ technology enables enterprises to accurately visualize their enterprise beyond the firewall and actionably detect and respond to threats to their brand and customers. In this role he draws upon his previous 12 years in creating software solutions and methodologies for discovering and managing application security across the enterprise, and throughout the SDLC.

RiskIQ provides organizations the visibility and intelligence they need to secure their Enterprise Digital Footprint and to map their adversaries’ infrastructure. RiskIQ’s external threat management platform, powered by a global proxy network, virtual user technology, and threat analysis engine enables organizations to get an actionable and timely picture of both their own and their adversaries infrastructure proactively defending against threats targeting their websites, mobile applications, brands, customers, and employees.

RiskIQ is the only complete external threat management solution purpose-built to address the growing threats in all digital channels—web, mobile, and social.

To learn more about RiskIQ, visit www.riskiq.com.

Our Solution

RiskIQ’s External Threat Management Platform takes an outside-in view of your digital assets to provide a timely, actionable picture of your attack surface so you can proactively defend against threats. With it, security teams can:

Discover and Monitor assets and analyze attack surfaces with RiskIQ’s Enterprise Digital Footprint.

Detect and Respond to live attacks in the wild with our Threat Detection Suite.

Research and Investigate adversaries and threats and prevent attacks with RiskIQ’sPassiveTotal.

What makes us different?

• Unmatched global visibility: Our machine learning uses raw internet data collected by a global network of crawlers and internet sensors

• In-the-wild threat detection: We detect publicly visible threats in real time

• Closed-loop event management and remediation: We reduce the time to remediation from weeks to hours.

Page 47: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

Instant Visibil ity

Micro-segmentation

Automated Compliance

Security at DevOps Speed

On-demand, automated infrastructure security that works

anywhere, at any scale.

CloudPassage Halo enables the transformation to agile IT delivery models: mixed infrastructure, automation,

high rates of change, and on-demand IT services.

cloudpassage.com

Page 48: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

Getting from the 2nd to the 3rd Platform is major transformation for a business. Everything from the impact technology has on the business, to the business model of the IT organization, to the nature of IT talent is changing. IDC DecisionScape methodologies align with the various stages of decision making. They enable IT executives to make better informed strategic decisions.

5 Speen StreetFramingham, MA 01701+1.508.872.8200

Navigate your way to the 3rd Platform with IDC DecisionScapes

www.idc.com/itexecutive

Page 49: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

DELEGATE

PROFILES

American Realty CapitalBerkshire Hathaway AutomotiveByer CaliforniaCaliber Home LoansCBRE, Inc.Celanese CorporationCitiGroupConResDitoFairway Independent Mortgage Corporation

Fidelity InvestmentsGM FinancialJet Propulsion Laboratory (JPL)KBRMGM Resorts InternationalMurphy USANCROldcastle MaterialsPorts AmericaRue La La

Snapchat Inc.Sony Pictures EntertainmentSpringfield ClinicSunnova Energy CorpThe Salvation ArmyU.S. Retirement PartnersUniGroupUnited States Tennis AssociationWillbur-Ellis

PRIVATE SECTOR CIO

Page 50: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com50

American Realty Capital

EDWARD BARBEZAT, Senior Vice President -Information

Technology

With over 17 years of experience managing Information Technology in Finance and Real Estate environments, Ed Barbezat is responsible for the management, vision and direction of Information Technology (including Technical Support, Server, Network and Telecommunications functions) at AR Global. Prior to joining AR Global, Ed was the Director of Technology Infrastructure of American Financial

Realty Trust from December 2005 to November 2007 and Vice President of IT Support Services for American Business Financial Services from January 2003 to August 2005.

AR Global is a privately-held, fully independent investment management firm managing more than $19 billion of primarily real estate assets. AR Global is focused on alternative investment programs, including numerous sector specific, non-traded real estate investment trusts (REITs), business development companies (BDC), and open and closed end funds. AR Global specializes in building customized investment solutions that seek to provide capital preservation and high current yields.

AR Global

Berkshire Hathaway Automotive

DAVID AUSTIN, Chief Technology OfficerDavid Austin is the Chief Technology Officer for Berkshire Hathaway Automotive. He is responsible for leading the company’s technology effort to provide a world-class customer and employee experience. Previously, Mr. Austin was vice president of technology at Larry H. Miller Automotive Group. Earlier, he held a number of different technical positions at ADP Dealer Services.

Berkshire Hathaway Automotive is one of the largest dealership groups in America, with over $9 billion in revenue and 81 independently operated dealerships with over 100 franchises in 10 states, including Arizona, California, Florida, Georgia, Illinois, Indiana, Missouri, Nebraska, New Mexico and Texas.

Through its wholly-owned administrator MPP Company, Berkshire Hathaway Automotive is able to offer the dealerships’ auto retail customers a unique, industry-leading portfolio of proprietary vehicle service and ancillary contracts, which are insured by its two insurance underwriters, Old United Casualty Co. and Old United Life.

Our mission is to serve our dealerships with a wide variety of managerial and marketing tools, optimizing their profitability and maximizing their competitive edge. Using extensive experience, innovative strategies and technological expertise, we work to assure our dealerships obtain and maintain position as leaders and trendsetters in the automotive field. We focus on building resilient and adaptive business models that cultivate engaged, strong and proactive leadership.

- See more at: http://www.berkshirehathawayautomotive.com/#sthash.rDc3De1L.dpuf

Page 51: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com 51

Caliber Home Loans

ALI AYUB, Chief Technology OfficerA mortgage lender created by industry experts who understand the challenges of today’s home financing market. Everyone at Caliber Home Loans, Inc. is part of a customer-centric culture that concentrates on you. We all work together to expand your lending options, close loans ahead of schedule, and create innovative new loan solutions.

Unlike many banking institutions, mortgages are our only business. What’s in it for you? More loan choices, many with fewer restrictions – and that’s just the beginning.We offer a growing range of home loan and refinancing options. These include loans insured by the FHA, VA and USDA, Jumbo loans up to $2.5 million, and financing for new construction, second homes and investment properties.

Self motivated leader and result oriented technologist in company operations, technology innovations and designing and delivering world class technology solutions. With an extensive experience as a seasoned senior manager developing and supporting High Availability environments, Enterprise Resource Planning solutions and implementations, developing and delivering large teams to support company goals, technology advancement and cost effective information technology solutions. Seasoned professional with over 15 years of senior management planning, business operations globally and domestic experience. Creates competitive advantage by utilizing cutting-edge technical and business acumen, innovating solutions and influencing positive change across an enterprise.

Byer California

FERNANDO GONZALEZ, Chief Information OfficerFernando is the CIO of Byer California, where he started in IT June of 1963. He has worked for companies such as EDS, Rand, Informix and various manufacturing companies around the world from medical device manufacturing to aerospace manufacturing, both public and private companies, and has been a CIO for the last 20 plus years. Fernando has worked in most positions in the IT field from programming, to DBA, to CIO.

Byer California started in 1964 selling blouses and today the company has grown to include a huge selection of girls and women clothing for all ages. Byer designs, manufacturing and distributes clothing most of all the major retailers in the US and one in Mexico and one in Spain under either the Byer labels or private labels for the retailers. Byer has started a direct to the consumer business through Ecommerce and our own brick and mortar stores. Byer is headquartered in San Francisco with 2 locations in Los Angeles, 1 in Manhattan, 1 in Hong Kong. The company is $400 million business that is privately owned.

Page 52: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com52

CBRE, Inc.

Celanese Corporation

CHRISTOPHER GARRICK, Senior Vice President, Information

Technology

Chris Garrick is Senior Vice President with CBRE, the world’s largest commercial real estate services and investment firm. He leads the global IT strategy, enterprise architecture and innovation practices, and is the co-founder of CBRE Labs. Garrick has more than 20 years of operational and consulting experience and has helped companies enable their strategic capabilities with technology. Garrick is a leader in understanding how technology trends shape the enterprise. He is an expert on topics such as innovation,

strategy realization and value management. Prior to his current role, Garrick was a lead consultant with Booz & Company, where he was aligned with consumer, media and digital practice.

Garrick studied electrical engineering at the University of Massachusetts and earned an MBA at Southern Methodist University where he graduated with distinction.

CBRE Group, Inc. (NYSE: CBG) provides globally integrated commercial real estate and investment services that transform real estate into real advantage. A Fortune 500 and S&P 500 company headquartered in Los Angeles, the Company has approximately 44,000 employees (excluding affiliates), and serves real estate owners, investors and occupiers through approximately 350 offices (excluding affiliates) worldwide.

RAJESH NAGARAJAN, Chief Information OfficerRajesh Nagarajan has served as Chief Information Officer of Celanese Corporation, a Fortune 500 global technology and specialty materials company, since April 2015.He first joinedCelanese in 1992 as a systems analyst. Since then, he hashad a progressive career working in various technical and management roles in information technology and supply chain management for Celanese, as a Celanese contractor and for an outside organization. In 2004 Nagarajan left Celanese for BearingPoint, a technology and consulting firm,then returned to Celanese in 2008 as director of IT strategybefore being named director of supply chain.

Celanese Corporation is a global technology leader in the production of differentiated chemistry solutions and specialty materials used in most major industries and consumer applications. Our two complementary business cores, Acetyl Chain and Materials Solutions, use the full breadth of Celanese’s global chemistry, technology and business expertise to create value for our customers and the corporation. As we partner with our customers to solve their most critical business needs, we strive to make a positive impact on our communities and the world through The Celanese Foundation. Based in Dallas, Celanese employs approximately 7,000 employees worldwide and had 2015 net sales of $5.7 billion. For more information about Celanese and our product offerings, visit www.celanese.com or our blog at www.celaneseblog.com.

Page 53: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com 53

CitiGroup

DR. LORENZO C. HINES, Senior Vice President, Information

Technology

Lorenzo C. Hines is a skilled business focused technology executive with 25 years of experience in transforming and turning around organizations with companies like CitiGroup, MBNA (now Bank of America), Royal Bank of Canada, Dain Rauscher Wealth Management, Chief AutoParts, and U.S. Navy.

Over his career, Lorenzo has been responsible for leading every area of technology and customer support, including application development, desktop virtualization, mobile application development, project management office, server and network operations, data management, architecture, testing/release management, data center management, telecommunication, IT security, regulatory and compliance, and help desk support. He has an extremely strong background in mergers and acquisitions, global IT management, ERP development and management, outsources and insourcing.

Citi is the world’s largest credit card issuer, with 142 million accounts, $365 billion in annual purchase sales and $150 billion in receivables across Citi Branded Cards and Citi Retail Services.

Citi Branded Cards provides payment and credit solutions to consumers and small businesses in 34 countries. With more than 52 million accounts in circulation, the business had annual purchase sales of $290 billion and a loan portfolio of $104 billion.

In 2015, Citi continued to deliver value, convenience and the power of our global network to card members. Citi Prestige® card, a global credit card built upon the bank’s unique relationships and capabilities worldwide, launched in Colombia, Hong Kong, Malaysia, Mexico, Singapore and the U.S.

ConRes

SAM SCHOELEN, Chief Information OfficerMr. Sam Schoelen started his career as a technologist where he specialized in managed hosting and BBS via a dial-up. Mr. Schoelen progressively maneuvered through the changes in technology, keeping current of industry deviations and technology growth, from windows administration, networking, UNIX administration, data security, and software development. As Mr. Schoelen moved successfully through each technology change, he continued to advance his accreditation holding most industry standard certifications, to this day, he still maintains his certification of, CISSP. Mr. Schoelen started

NetWorks Work, Inc., a technology consulting company which specialized in assisting organizations with IT support, having a specific niche, the company grew rapidly. Never satisfied Mr. Schoelen strived for more, he joined Continental Resources to start their now booming Managed Services division. Mr. Schoelen wrote the initial business plan, implemented it and successfully grew the business through marketing, sales, engineering hires and even writing the original monitoring software used to support the continually growing customer base. Mr. Schoelen’s success was so well received within ConRes, he was promoted to the company’s first ever Chief Information Officer. As CIO, Mr. Schoelen is now responsible for both the Managed Services operations as well as corporate IT and the recently established Cloud Service practice. Mr. Schoelen still keeps abreast of the latest technologies and has had several articles published. Mr. Schoelen holds a Bachelor degree and Master degree in Information Technology from the University of Massachusetts and is currently working on finishing his Master of Business Administration.

From test equipment to IT solutions, Continental Resources, Inc. (ConRes) provides high technology products, services and support to business, government and academia. Combining 50 years of high tech know-how and financial stability, ConRes is a low-risk option for organizations seeking to strengthen the ROI on their technology investments.

Page 54: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com54

Fairway Independent Mortgage Corporation

TED LAYNE, Chief Information Security Officer/ Senior Vice President Information Technology Shared Services

Ted Layne is the Senior Vice President of IT Shared Services and Chief Information Security Officer at Fairway Independent Mortgage Corporation. A 30 year veteran of the Information Technology Industry, he’s spent most of the last 20 years within the Mortgage Industry. Having been a business owner, he’s emphatic that IT is a business, and mentors young IT professionals in the ability to recognize and

empathize with the goals of other business units. As a profession, he believes that IT has an ethical responsibility to ensure that the information entrusted to IT is protected and used responsibly.

Founded in 1996 by Steve Jacobson, Fairway Independent Mortgage Corporation is a mortgage lender headquartered in Madison, Wisconsin and Carrollton, Texas. Fairway is the 17th largest mortgage lender in the US having lent more than $11 billion in 2015. Our 3200+ associates provide home loans in over 400 locations in 48 states.

Fairway’s American Warrior Initiative is dedicated to inspire, encourage, educate and give back to our active duty military members and veterans. Since its inception, the initiative has provided direct assistance to numerous services members; everything from business grants to mortgage free homes. We are “Serving Those Who Serve”.

Dito

WILLIAM FLOYD, Chief Technology OfficerBill Floyd is Chief Technology Officer for Dito since March 2016. He is responsible for the cloud migration strategy, process and tools for Dito and its customers. He is former Chief Information Officer for Gold’s Gym where executed a digital transformation being responsible for all IT Infrastructure, Telecommunications, Business applications, customer facing web and mobile applications and operations. Prior to Gold’s Gym, Mr. Floyd was former Chief Technology Officer for MB Trading, where he had the same responsibilities in addition

to front-end software product strategy and development and the platform strategy and development for the datafeed platform. Prior to MB Trading, Mr. Floyd was Vice President of Products and Operations at Realm Business Solutions (now ARGUS Software and Yardi Systems Software). Prior to Realm, Mr. Floyd was the VP of Product Development at S1 Corporation. Mr. Floyd held a successful progression of positions in software product development with increasing levels of leadership and responsibility in multiple industries. Mr. Floyd holds a Bachelor of Science in Mechanical Design Engineering from Brigham Young University.

Dito is a cloud focused service provider with focused expertise in the Google cloud platform and apps. Dito has continued to evolve with cutting-edge cloud solutions, becoming a launch partner for each of the cloud expansions into enterprise solutions. Dito has developed close relationships with Google’s Enterprise teams as a result of our success helping many customers. Dito has developed industry expertise in multiple verticals: Construction & Trades, High-Tech & Internet, Manufacturing, Real Estate, & Retail.

Page 55: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com 55

Fidelity Investments

THOMAS BLESSING, Chief Information Officer, Corporate Technology Group

Thomas Blessing is the CIO of the Corporate Technology Group at Fidelity Investments. He leads a team of over 800 IT professionals located internationally providing:

• Finance, Procurement, & Accounting IT • Compliance, Risk, Security, & Legal IT • HR, Payroll, & Communications IT • Information Management Services

Tom joined Fidelity in 2008 as a lead on their IT Transformation initiative. Previously Tom was at Ford Motor Company where he held several IT leadership positions in product development, strategy and organizational development, manufacturing, and human resources/health care.

Tom holds a Master of Science degree in Electrical Engineering and a Master of Business Administration degree from the University of Michigan. He also holds a Bachelor of Science degree in electrical and computer engineering from Wayne State University.

Company Biography unavailabe at time of print.

GM Financial

ASHWANI CHOUDHARY, Vice President, Global Systems, ITS

Ashwani Choudhary is Vice President for General Motors Financial. Ashwani oversees Information Technology, Global Business Systems and Reporting Solutions for GM Financial. Ashwani is a transformational and visionary leader known for building global forward-thinking technology teams across EMEA, APAC, LAR and U.S. Ashwani has extensive background in information technology, global business systems development, business intelligence, projects delivery, enterprise IT strategy, operational planning, IT

security and risk management.

Ashwani has over two decades of IT expertise with demonstrated ability to deliver mission-critical results at global multi-billion dollar companies. Prior to joining GM Financial, Ashwani held executive leadership and strategic IT management roles at Encore Capital Group, TrendMicro Inc., First American Corp, Corelogic and iGate global solutions.Ashwani has a Bachelor’s degree with honours in Electronics Engineering and an Executive MBA from the McCombs School of Business, University of Texas.

GM Financial is the captive finance company and the wholly owned subsidiary of General Motors and is headquartered in Fort Worth, Texas. The company is a global provider of auto finance solutions, with operations in North America, Europe, Latin America and

China. Through our long-standing relationships with auto dealers, we offer attractive retail loan and lease programs to meet the needs of each customer. We also offer commercial lending products to dealers to help them finance and grow their businesses. GM Financial employs more than 5,000 hard-working team members, and we’re always looking for new people with diverse talents. GM Financial is a workplace where dedicated people have the opportunity to work together and celebrate our successes. Our culture is based on respect, integrity, innovation and personal development. GM Financial is committed to strengthening the communities where we live and work. Each year, we select several philanthropic organizations to support through our Signature Events program. The company and its team members actively support these organizations through many company-wide initiatives; in addition we support numerous other nonprofit organizations through sponsorships and monetary donations.

Page 56: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com56

Jet Propulsion Laboratory (JPL)

TOMAS SODERSTROM, Information Technology Chief Technology

& Innovation OfficerTom is the IT Chief Technology and Innovation Officer at the Jet Propulsion Laboratory. He leads a collaborative, practical, and hands-on approach with JPL and industry to investigate and infuse emerging IT technology trends that are relevant to JPL, NASA, and large enterprises.

Tom has led remote teams and large scale IT best practices and tools development and change efforts in small startups, large commercial companies, in international venues, and in the US Government arena.

Meeting the challenges of robotic space exploration has resultedin new knowledge that has kept JPL a world leader in science andtechnology. The tools JPL has developed for space explorationhave also proved invaluable in providing new insights and discoveriesin studies of Earth, its atmosphere, climate, oceans, geologyand the biosphere. The ongoing invention of ever more-sensitivespace sensors has also resulted in a myriad of technology applicationswidely used for medical, industrial and commercial useson Earth.

JPL is a federally funded research and development facility managedby the California Institute of Technology for the NationalAeronautics and Space Administration.

KBR

JOHN THOMSON, Vice President & Chief Information OfficerJohn brings more than 20 years of Information Technology experience in the offshore and hydrocarbons industry. He has a record as a leader and business partner who collaborates with other executives to use technology to transform and simplify business processes while delivering bottom line measurable benefits. John has held various senior Information Technology and engineering roles at WorleyParsons in Australia, United States, and the United Kingdom.

KBR, Inc. is a global technology, engineering, procurement and construction company serving the hydrocarbons and government services industries, employing approximately 25,000 people worldwide with customers in more than 70 countries and operations in 40 countries across three distinct global businesses:Technology & Consulting, Engineering & Construction, and Government Services.

KBR is proud to work with its customers across the globe to provide technology, value-added consulting services, integrated EPC delivery and Long Term Industrial Services to ensure consistent project delivery with predictable results. At KBR, we deliver.

Page 57: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com 57

MGM Resorts International

ELENA SEIPLE, Executive Director Information Technology

Operations

Dynamic and highly respected IT leader with demonstrated track record of bottom-line results and consistent high-growth client/partner engagements,consistently looking to apply IT strategic planning, implementation, process change management and exceptional best practices to ensure company objectives and technical goals are exceeded. My clients and co-workers would describe me as a high-

impact change leader, recognized for consistent success in developing the processes and procedures needed to ensure the highest levels of customer service, delivery and quality.

The resorts and casinos of MGM Resorts International™ are some of the most famous in the world. Our 23 destinations are renowned for their winning combination of quality entertainment, luxurious facilities and exceptional customer service. We are actively expanding our presence globally, with potential developments in a number of domestic and international markets. At MGM Resorts International, we are all striving together to deliver an enticing blend of entertainment to every corner of the world.

Murphy USA

Murphy USA is a leading retailer of gasoline and convenience merchandise with more than 1,300 stations located primarily in the Southwest, Southeast and Midwest United States. The company and its team of almost 10,000 employees serve an estimated 1.6 million customers each day through its network of retail gasoline stations in 24 states. The majority of Murphy USA’s stations are located in close proximity to Walmart stores. The company also

markets gasoline and other products at standalone stations under the Murphy Express brand. Ranked 202 among Fortune 500 companies, Murphy USA reported revenue of $15 billion in 2014.

CHARLES JARRETT, Chief Information Officer, Vice President of Technology Services

Charles Jarrett is the Vice President of Technology Services, Procurement, and Chief Information Officer at Murphy USA, Inc (NYSE: MUSA) where he is responsible for all facets of the Company’s technology strategy, tactics, governance, and all non-retail procurement activities.

Charles serves on the Board of the State of Arkansas Science, Technology, Engineering, and Mathematics (S.T.E.M.) Coalition and on the Board of the Union County Arkansas Animal Protection Society.

Charles holds a Bachelor’s of Science in Business Information Systems from Indiana Wesleyan. In his spare time he enjoys woodworking, restoring his 1949 pickup, and reading about world history.

Page 58: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com58

Murphy USA

OCTAVIUS WHITE, Director, Information Technology Strategy &

Transformation

Octavius White is currently an IT Strategist at Murphy Oil USA, Inc. with 20 years of experience implementing practices, metrics and performance in Information Technology.

Octavius has contributed to the profitability and success of multibillion-dollar organizations through skillful development and execution of IT strategies in line with corporate business objectives. Prior to joining Murphy USA ,Octavius provided expertise working in multiple verticals including Construction, Telecommunication, Imaging, Healthcare, Manufacturing, Banking, and Technology. Mr. White will receive his MBA from Louisiana Tech University this May, and has attended Georgia State University where he earned a Bachelor of Science.

Murphy USA is a leading retailer of gasoline and convenience merchandise with more than 1,300 stations located primarily in the Southwest, Southeast and Midwest United States. The company and its team of almost 10,000 employees serve an estimated 1.6 million customers each day through its network of retail gasoline stations in 24 states. The majority of Murphy USA’s stations are located in close proximity to Walmart stores. The company also

markets gasoline and other products at standalone stations under the Murphy Express brand. Ranked 202 among Fortune 500 companies, Murphy USA reported revenue of $15 billion in 2014.

NCR

BILL VANCUREN, Vice President & Chief Information OfficerBill VanCuren is vice president and CIO for NCR Corporation. Bill is a member of both the corporate leadership team and Chief Financial Office organizations.

His current assignment as the CIO has oversight over the full strategic IT portfolio, global networks and processing services for both internal and external customer managed services, and all workgroup collaborative and mobile computing. His role also includes information security and compliancy as well

as SaaS datacenter strategy and rationalization.

At NCR, we make the everyday easier. We do this by listening to our customers, keeping their best interests in mind, and always working to make interacting with your business an exceptional experience. Read on to learn more about the people who lead our team, our company by the numbers, and how we’ve become the world leader in consumer transaction technologies.

Page 59: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com 59

Oldcastle Materials

ALAN FRALICK, Chief Information OfficerA seasoned technology executive and consultant with experience managing through transformative business situations, maximizing opportunities to deliver positive business results through effective planning, creative problem solving and good old fashioned perseverance - addressing people, process and system challenges. I enjoy challenging situations and can generally add the most value where there are ideas that need to be fleshed out and built upon combined with a desire and willingness to bring people together to help develop a collective vision and strategy.

Oldcastle is North America’s largest manufacturer and distributor of building products. Oldcastle produces architectural masonry and concrete products including architectural glass, roof tiles, veneers, segmental retaining walls, bricks, sand, aggregates, precast concrete, masonry units and concrete pavers.

Ports America

TIANBING QIAN (TQ), Senior Vice President & Chief Information

OfficerTianbingQian (TQ) is Senior Vice President & Chief Information Officer at Ports America, the largest marine terminal operator and stevedoring service provider in the United States, operating in more than 42 ports and 80 locations. In this role, TQ is overall responsible for the strategy and execution of leveraging IT to enable Ports America’s operational excellence and profitable growth.

Prior to joining Ports America in 2015, TQ was Vice President of Information Technology and Business Analytics at Celestica, a $6B global leader in electronics manufacturing & end-to-end product lifecycle services. At Celestica, TQ and his team helped create an award-winning Business Analytics Center-of-Excellence, consolidate and standardize end-to-end application architecture, migrate infrastructure to cloud-based platforms, and spend time on the road with customers to help create values and win new business.

Ports America is the largest terminal operator and stevedore in the United States, with operations in more than 42 ports and 80 locations. Having more than 85 years of experience through predecessor companies, Ports America possesses dedicated resources that only a company of such scale and scope can deliver, including: skilled personnel, robust training programs, best-in class technology and experienced management.

With a highly skilled and trained labor force, Ports America has the expertise to manage all types of cargo. Handling more than 12.7 million TEU, 2.5 million vehicles, 8.9 million tons of general cargo and 1.6 million cruise ship passengers annually, Ports America’s services include container, bulk, breakbulk and project cargo; world-class cruise terminals; intermodal facilities and quality RoRo operations.

Page 60: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com60

Rue La La

ANTHONY ACCARDI, Chief Technology OfficerAnthony serves as the CTO of Rue La La. Having recently joined in 2015, Anthony was previously CTO at Swipely, where he grew the organization since its inception in 2009 to process and provide analytics for $5 billion in payments annually. Prior to Swipely, Anthony helped create Tellme Networks in 1999, subsequently acquired by Microsoft. He served as Chief Architect for Tellme’s VoIP platform, proven to handle millions of phone calls a day with carrier-grade reliability. Anthony holds Bachelors, Masters, and Ph.D. degrees from MIT. His published research contributions span multiple disciplines, including speech

processing, high availability, and optics.

Rue La La’s mission is to be the most engaging online, off-price, style destination connecting world-class brands to the next-generation shopper. Our unique private flash sale model disrupted e-commerce in 2008 and earned the love of our members for delivering desirable brands at incredible prices through a great shopping experience and top-notch customer service. Our success is the result of our synthesis of merchandising, marketing, and technology. Rue La La is headquartered in Boston.

Snapchat Inc.

FRANK TAWIL, Head of Information Technology

Technology thought leader with extensive global experience in Management including P&L, Cloud Infrastructure Architecture, Engineering, Operations, and Consulting. Successfully completed more than 10 mergers and acquisitions and key member of the M&A evaluation team for hosting services. Have proven hands on record of solving technical, management and strategic issues. Built many strong teams from the ground up and instilled a strong team spirit fostered by excellent leadership and strategic skills.

Snapchat was started by Brown and Spiegel as a project for one of Spiegel’s classes at Stanford University, where Spiegel was a product design major. Beginning under the name “Picaboo”, the two later brought Murphy into the project to code the application. When Spiegel floated the idea in April 2011 in front of the product design class for his final project, classmates balked at the idea of impermanent photos.[10] Snapchat first launched in July 2011 under the name Picaboo in Spiegel’s father’s living room, though the application was later renamed and relaunched under the name Snapchat.

Page 61: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com 61

Sony Pictures Entertainment

ANDY SCHLEI, Senior Vice President, Information Technology

Andy Schlei is Senior Vice President, Information Technology at Sony Pictures Entertainment. Andy currently directs Sony Pictures’ Application Development and Maintenance organization, overseeing application operations, driving quality technology service delivery to the Production, Theatrical, Home Entertainment, Television and Corporate lines of business. He is responsible for overall service delivery strategy, working close with the rest of IT to deliver state of the art applications supporting emerging digital business models and advanced analytics while maintain stability in the legacy

application portfolio. Prior to joining Sony Pictures, Andy was a Partner in IBM’s Global Business Services group and PricewaterhouseCoopers Consulting.

Sony Pictures Entertainment (SPE) is a subsidiary of Sony Entertainment Inc., a subsidiary of Tokyo-based Sony Corporation. SPE’s global operations encompass motion picture production, acquisition and distribution; television production, acquisition and distribution; television networks; digital content creation and distribution; operation of studio facilities; and development of new entertainment products, services and technologies. For additional information, go to http://www.sonypictures.com.

Springfield ClinicSHASHI TRIPATHI, Chief Information OfficerShashiTripathi joined Springfield Clinic in early July, 2013 as the organization’s Chief Information Officer. He is responsible for strategic planning, business leadership, development, management and integration of the organization and the direct reporting departments of: Information Systems and Technologies, Health Information Management, Business & Clinical Intelligence, Information Security and Information Privacy.

Tripathi is a published author and has been named among the CIO 100 by CIO Magazine. He is active member of College of Healthcare Information Management Executives (CHIME), Health Information Management and Systems Society (HIMSS), Board Chair for AMGA CIO / CMIO Leadership Council 2015-16 and a board member at Lincoln Land Health Information Exchange (LLHIE).

Founded in 1939 by five physician partners, Springfield Clinic was one of the first multi-specialty medical clinics to form in downstate Illinois. The concept became popular among patients and so too among other physicians in the area. Through numerous local mergers and physician recruitment, Springfield Clinic became and remains Illinois’ second largest private multi-specialty clinic.

While Springfield Clinic has grown in size, the same dedication to patients, commitment to quality and spirit of innovation remain present at Springfield Clinic more than 75 years later. Today, Springfield Clinic’s mission is to provide the highest quality health care to the people of central Illinois and the doctors of Springfield Clinic continue to lead the way in the delivery of quality care.

Page 62: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com62

Sunnova Energy Corp

BROCK HUBBARD, Chief Information OfficerBrock Hubbard is the Chief Information Officer of Sunnova Energy Corporation, based in Houston, Texas. He holds a bachelor of science degree from Florida Atlantic University and a master of business administration degree from Regis University. Mr. Hubbard joined Sunnova after serving as practice director of financial services at Bluewolf, a global IT consulting firm. Prior to joining Bluewolf, he managed the institutional business intelligence division at Janus Capital Group. As part of the executive team at Sunnova, Mr. Hubbard is focused on developing enterprise data and applications, user support, infrastructure and information security.

Sunnova is a different kind of power company, offering rooftop solar service to homeowners within and outside the United States through our network of local sales and installation partners. Our mission is to change the energy industry by providing the choice of low-cost, worry-free solar power that generates long-term savings for our customers and continued business growth for our partners.

The Salvation Army

CLARENCE WHITE, Chief Information OfficerClarence White is an award winning CIO specializing in the nonprofit sector. Following a stint with PwC, White spent 25 years successfully leading technology for nonprofit organizations around the world. His sector-leading innovation and instinct for value have been widely recognized and celebrated. Recently, his current employer, The Salvation Army, was ranked at #32 in the 2014 InformationWeek 500 as one of the most innovation organizations in America. White is also an inductee into the ComputerWorld 100 listing of top CIOs.

The Salvation Army, America’s favorite charity, has earned worldwide respect for its integrity and effectiveness in helping the poor and disaster victims, but what is not as well known is that the Salvation Army is an integral part of the Christian Church, its doctrine following the mainstream of Christian belief. Its objectives are the advancement of education, the relief of poverty, the war against substance abuse, and other charitable endeavors beneficial to the community or mankind as a whole. The movement’s partnership with both private and public philanthropy continue to bring comfort to the needy, while the proclamation of God’s love offers individuals and communities the opportunity to enjoy a better life on earth.

Page 63: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com 63

U.S. Retirement Partners

KEVIN S. DUNN, Senior Vice President & Chief Information OfficerKevin Dunn is a technology strategist, speaker, and thought leader with over 20 years’ experience in highly available infrastructure, e-commerce, mobile application and payments, BYO Enterprise strategies, and the leadership of technical teams. He joined U.S. Retirement Partners (USRP) in December 2014 as the Chief Information Officer where his responsibilities include technology platform development, enterprise security, and information management. Before that, through his independent practice, he assisted clients in creating innovation through a combination of people, process, and technology.

U.S. Retirement Partners is an independent national financial services firm specializing in public school, governmental, and not-for-profit employee benefits plans and employer-sponsored retirement plans.

UniGroup

ANTHONY DECANTI, Chief Information Officer/Chief Operating Officer LogisticsOver the past three decades Anthony has had the unique experience of being an effective operational leader in Logistics as well as Information Technology. Anthony is currently the Chief Information Office for UniGroup Inc. and the Chief Operations Officers of UniGroup Logistics a $350M global logistics division. Anthony’s passion is developing Operations Research solutions that optimize the Supply Chain as well as

the development of complete Supply Chain Management application platforms. Anthony holds a Bachelor of Science Degree in Computer Science from Creighton University.

UniGroup is a $1.7 billion transportation company and parent of United Van Lines, the nation’s leading corporate mover, and Mayflower Transit, the most well-known name in the moving industry. Between the two van lines, UniGroup handles one in three professional interstate moves.UniGroup is also the parent company of UniGroup Worldwide, UniGroup Logistics and other transportation related companies including Allegiant Move Management, which is a transportation management company for both corporate and government accounts, and Trans Advantage, which sells and finances rolling stock and sells movers’ supplies.

Page 64: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com64

United States Tennis Association

LARRY BONFANTE, Chief Information OfficerLarry Bonfante has held executive leadership positions over the past 30 years in the Financial, Pharmaceutical, Not for Profit, Consulting, and Sports and Entertainment industries. He has received numerous industry accolades including being nominated for the CIO Hall of Fame in 2013, being named as one of CIO Magazine’s CIO 100 in 2011 and one of Computerworld’s Premier 100 IT Leaders in 2009. As Chief Information Officer at the United States Tennis Association, Larry’s team is responsible for all information technology related services supporting the US Open, the most highly attended annual

sporting event in the world. Larry is the founder of CIO Bench Coach, LLC an executive coaching practice for IT executives and the author of the book “Lessons in IT Transformation” published by John Wiley & Sons.

The USTA is the national governing body for tennis in the U.S. Our mission is to promote and develop the growth of tennis, from local communities to the professional game.in support of our mission we run the US Open which is the most highly attended annual sporting event in the world.

Willbur-EllisDAN WILLEY, Chief Information OfficerDan Willey is the Chief Information Officer at Wilbur-Ellis, based in Seattle, Washington. His duties include directing the technology strategy and operations of a growing multi-national company, which includes technology research, infrastructure support, back office systems, BI and analytics, and the program management office. Before joining Wilbur-Ellis, Dan managed client operations for Alliance Data Systems for clients such as Puget Sound Energy and various public utilities. Dan’s background includes

additional leadership roles at drugstore.com, CIBER, and Kaiser Aluminum. Dan has extensive experience in all aspects of information systems, pragmatic IT strategies, systems development, and IT governance. Dan’s education includes a degree in Management Information Systems from Eastern Washington University and an MBA from University of Phoenix

Founded in 1921, Wilbur-Ellis is a leading international marketer and distributor of agricultural products, animal feed and specialty chemicals and ingredients. By developing strong relationships, making strategic market investments and capitalizing on new opportunities, Wilbur-Ellis has continued to grow its business with sales over $3 billion.

Page 65: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.cloudbolt.io [email protected]

W H A T I S C L O U D B O L T ?CloudBolt’s award winning management platform provides a single interface to:> Turn internal IT resources into a

self-service cloud> Manage accounts and

configurations for all your cloudenvironments

> Establish infrastructure costs forchargeback or shameback

> Set quotas, system leases, andapproval workflows

> Configure a wide range oforchestration elements andextensible actions

F E A T U R E S> Intuitive User Interface

> Easy on-Premise Installation

> Environment Auto-Discovery

> Automated Provisioning

> Internal & External Workflow

> Multi-Tenant

> Role-Based Quotas

> Manages Both Brownfield andGreenfield Resources

K E Y B E N E F I T S> Speeds IT Deployments

> Simple, Intuitive Installationand Configuration

> Line of Business CostTransparency

> Greater Workload Flexibility

> Enables End-User Self-Service

> Drive More Value FromExisting IT Investments

> Facilitates DevOps

D I R E C T L Y I N T E G R A T E W I T H D O Z E N S O F C O M P L E M E N T A R Y T E C H N O L O G I E S

U s e y o u r e x i s t i n g a u t o m a t i o n a n d o r c h e s t r a t i o n t e c h n o l o g y

ServerAutomation

OperationsOrchestration

Anything with an API

®

EMPOWER END -USERS WITH SELF -SERVICE APPLICATIONS AND ENVIRONMENTS

1page-CIOsummit-v2.indd 1 4/5/16 10:17 AM

Page 66: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

ASSEMBLY SPONSOR

PROFILES

CloudBolt SoftwareEquinix

PRIVATE SECTOR CIO

HPMimecast

Subsidium Technologies

Page 67: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com 67

JON MITTELHAUSER, Chief Executive Officer

A 20-year Silicon Valley veteran, Jon Mittelhauser has a proven track record of building highly regard-ed technology organizations from the ground up and helping to architect pioneering technologies. Mittelhauser is considered one of the founding fathers of the World Wide Web. He was co-author of the first widely-used Web browser, NCSA Mosaic, and was a founding engineer of Netscape Communications Corporation. Most recently, Mittelhauser was VP of Engineering at Nebula, Inc., leading the effort for the

company’s OpenStack-based enterprise private cloud appliance. He was also a founding investor and advisor for converged infrastructure vendor Renasar Technologies (acquired by EMC in March 2015).

BERNARD SANDERS, Chief Technology Officer

Bernard Sanders has 16 years of experience in enterprise software leadership, including roles in engineer-ing and product management, technical sales, software development, and professional services engi-neering at leading technology companies. As a recognized technology leader in data center automation and software development, Sanders has developed a reputation for building powerful, flexible software solutions that don’t compromise usability or simplicity. Sanders started his career in NASA’s Jet Propulsion

Laboratory, and also worked at Loudcloud, Opsware, and HP. Within these organizations he has been one of the top solution architects, sought out by customers for his ability to make IT organizations successful with server automation products.

BRIAN J. KELLY, Head of Sales

Mr. Kelly brings more than a decade of enterprise sales experience to CloudBolt from leading technology companies including IronKey and Xerox. Kelly focuses on sales execution, program deployment, and cus-tomer-centric sales & marketing. He is also adept in strategic problem solving and relationship building, all of which he puts to productive use on behalf of CloudBolt and its customers.

CloudBolt Software

Founded in 2012 by leaders in the IT automation space and managed by experienced executives, CloudBolt Software, Inc. is entirely focused on delivering solutions which help large enterprises manage their increasingly complex multi-cloud environ-ments. Amongst their customers are many Fortune 1000 companies who have been delighted by the CloudBolt product and company. CloudBolt currently has offices in Silicon Valley, Washington D.C., and Portland.

Our Solution

CloudBolt is consistently recognized as the top cloud management platform, integrating on-premises virtualization with public clouds, configuration management tools, and domain-specific technologies. Users can rapidly provision the resources they need through CloudBolt’s intuitive self-service portal. Enterprise IT organizations maintain control through configura-tion standards, usage quotas, and cost transparency. Multi-cloud flexibility enables selection of the best provider and tool for each workload. By delivering a responsive and agile alternative to shadow IT, CloudBolt gives users what they want, when they want it.

®

Page 68: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com68

Equinix

Equinix, Inc. (Nasdaq: EQIX) connects the world’s leading businesses to their customers, employees and partners inside the most interconnected data centers. In 40 markets across five continents, Equinix is where companies come together to realize new opportunities and accelerate their business, IT and cloud strategies. In a digital economy where enterprise business models are increasingly interdependent, interconnection is essential to success. Equinix operates the only global interconnection platform, sparking new opportunities that are only possible when companies come together.

Equinix.com

Our Solution

Equinix is enabling the hybrid cloud market by being the interconnection point for the cloud and is at the center of the top cloud providers strategy to access enterprises customers. This enables Equinix to provide enterprise customers incredible levels of efficiencies and new customer use cases that will change the corporate IT world much like the Internet has changed the consumer world. Through Equinix Cloud Exchange™ enterprise customers can access over 100+ cloud providers in 145+ Equinix datacenters around the globe. And with Equinix Performance Hub™, enterprise customers can move applications closer to the edge, increase Quality of Experience, reduce latency and facilitate easy private cloud deployment with secure and direct connectivity to public clouds thereby, laying the foundation of a hybrid cloud. Through Equinix Interconnected Oriented Architecture™ we are helping enterprise customers connect people, locations, data and clouds around the world.

Page 69: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com 69

HP

GEOFF TUDOR, Chief Strategist for HP Cloud Americas

Geoff Tudor serves as Chief Strategist for HP Cloud Americas.Geoff has over 20 years of experience in the storage, broadband and networking industries. Prior to HP Geoff led cloud storage architecture for Nirvanix and was co-founder of Unwired Nation, a mobile cloud application platform serving the banking industry. Geoff holds an M.B.A. from the University of Texas, a bachelor’s degree from Tulane University and is a patent holder in the area of satellite communications. He also served for five years as Legislative Director for U.S. Rep. Lamar Smith, Chairman of the House Science Committee in Washington D.C.

JEFF COLLOP, Central Area Sales Specialist- HP Cloud Americas

Jeff Collop has been designing, managing, developing and selling IT Infrastructure since1995 and involved with very early Cloud Technology since2007. Currently Jeff is responsible for support Cloud engagements in the Central Area for the Cloud America’s Business unit at HP. Prior to joining the Americas HP Cloud team, Jeffserved as Sales Director for Cloud Security startup FireHost, Senior Global Account Managerfor Rackspace and IT Director for Velocity Credit Union in Austin, TX.

Jeff holds a BS in Corporate Communication from The University of Texas.

DAN KEUSENKOTHEN, Central Area Sales Director- HPE Hybrid IT

Dan Keusenkothen has been with Hewlett-Packard since 1989. During that time, he has assumed positions of increasing responsibility in sales, rising to his current position of Central Area Sales Director-HP Cloud Americas in February of 2014. In addition to his overall responsibility for running the HP Cloud business for HP’s Central Area, Dan also managesa team of specialists covering all HP account segments and coordinatesthe HP Cloud strategy across HP business units to deliver an integrated HP Cloud message to customers. Prior to joining

the Americas HP Cloud team, Dan served as Converged Infrastructure District Sales Manager and District Sales Manager Enterprise Accounts for the seven-state North Plains district. He was also the Business Critical Server Sales Manager.

Dan holds a B.T. in Electrical Engineering Technology from Washington University.

Hewlett Packard Enterprise is an industry leading technology company that enables customers to go further, faster. With the industry’s most comprehensive portfolio, spanning the cloud to the data center to workplace applications, our technology and services help customers around the world make IT more efficient, more productive and more secure.

Our Solution

Transform to a hybrid infrastructure with the Right Mix. HPE Helion enables you to offer the Right Mix of public cloud, pri-vate cloud, and traditionalIT capabilities to meet performance, scalability, security, and data residency requirements—allwithin a single management environment supported end-to-end by HPE.

Page 70: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com70

Mimecast

ALEX BENDER, Senior Vice President of Global Marketing

Alex joined Mimecast in February 2016 as Senior Vice President of Global Marketing, overseeing corporate communications, branding, field and channel marketing, product marketing and demand generation. He also oversees the online community and the threat intelligence initiatives at Mimecast. Alex’s deep domain expertise in information security spans across security operations, incident response, security maturity models, GRC, security analytics, email security, threat intelligence and research.

Prior to Mimecast, Alex was the General Manager of the RSA Conference, the leading industry event for information security professionals and community.

DAVE HOOD, Director of Technology Marketing

David is the Director of Technology Marketing at Mimecast. Previously he was Vice President and General Manager of Data Services at Connotate. David has held senior positions in marketing and product marketing at Kyruus, Memento (acquired by FIS) and additional enterprise software companies. He holds an MBA from Boston College and graduated from Vanderbilt University.

J. PETER BRUZZESE, Strategic Technical Consultant

J. Peter Bruzzese, Microsoft Office 365 MVP (5 time awardee with previous technical expertise being Exchange), Triple-MCSE, MCT, MCITP: Enterprise Messaging, is the co-founder of an end-user training solution called ClipTraining.com. In addition, he is an internationally published author with over a dozen titles to his name. He is a technical speaker for various conference venues including Techmentor, Connections and, at times, Tech Ed. He writes for both online and in-print tech publications like Redmond

Magazine, WindowsITPro, Tech Target’s SearchExchange.com and others. For 5+ years he has been the mind behind the Enterprise Windows column for InfoWorld. J. P. B. loves teaching and has applied his energies to screencast instruction with a variety of series on Exchange 2010 and 2013 availability through Pluralsight. More recently JPB focused attention on a side of the Exchange/O365 community that needed help… the “newbies” and he wrote short (150 page) book entitled “Conversational Exchange (in 10 days!)” to help folks learn the conceptual side to Exchange (without all the how-to, step-by-step info). Last but not least, J. Peter is a strategic technical consultant for Mimecast.

Mimecast (NASDAQ: MIME) makes business email and data safer for 16,200 customers and millions of employees worldwide. Founded in 2003, the Company’s next-generation cloud-based security, archiving and continuity services protect email and deliver comprehensive email risk management in a single, fully-integrated subscription service. Mimecast reduces email risk and the complexity and cost of managing the array of point solutions traditionally used to protect email and its data. For customers that have migrated to cloud services like Microsoft Office 365, Mimecast mitigates single vendor exposure by strengthening security coverage, combating downtime and improving archiving.

Our Solution

Mimecast Email Security protects against malware, spam, advanced phishing and other emerging attacks, while preventing data leaks. Mimecast Mailbox Continuity enables employees to continue using email during planned and unplanned outages. Mimecast Enterprise Information Archiving unifies email, file and instant messaging data to support e-discovery and give employees fast access to their personal archive via PC, Mac and mobile apps.

Page 71: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com 71

Subsidium Technologies

JOHN BOVA, Co-Founder, Managing Partner

John Bova is co-founder and managing partner of Subsidium Technologies. He is aseasoned executive with over 25 years of experience. Prior to founding Subsidium Technologies, John served as a successful account executive with Cable & Wireless USA. John harnesses his experience in the telecommunications industryand his unending desire to provide clients with the best cloud and network servicesolutions available to chart a path to success for Subsidium Technologies. His strong beliefin Karma translates into a corporate culture with uncompromising ethical standards and ateam that always acts in the best interests

of the people they serve.

ED DEGENHART, Co-Founder, Managing Partner

Ed Degenhart is co-founder and managing partner responsible for developing and overseeingSubsidium’s market strategy, sales, service delivery, and customer retention. Prior to founding Subsidium, Ed served as a successful account executive with Fortune 500 technology and telecommunications firm Qwest/CenturyLink. Ed’s analytic approach to problem solving, combined with his sincere commitment to building long-term customer relationships, translates into comprehensive solutions executed by a

company that truly cares about its customers’ satisfaction.

As the nation’s premier agency for next-generation technologies, Subsidium Technologies has the resources and relationships needed to successfully navigate the ever-evolving world of communications and IT infrastructure. From complex cloud design to global wide-area-network deployments, we empower our clients with the valuable business intelligence they need, including back-office support, engineering guidance, strategic consulting, and ongoing communication of new technologies as they become available.

Subsdium is dedicated to helping our clients make informed choices about services, technology, and cost-efficient communications. Our goal is to set the industry standard for knowledge and navigation expertise within the global technology marketplace.

Our Solution

Leveraging a broad portfolio of global cloud and network solutions providers, Subsidium develops a best-fit solution that aligns with a client’s economic and technology roadmap. This is achieved through our unique, transparent process that centers on client service and dedication to excellence.

Page 72: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

Are your employeesletting cyber-criminalsinto your business?

Stop malicious, targeted email attacks with Mimecast Targeted Threat Protection – a cloud solution that:

• Scans every email hyperlink in real-time, as you click

• Protects all devices, no client software needed

• Educates users about recognizing malicious links in emails

• Can be rapidly deployed and has simple, centralized management

• Includes granular security monitoring and reporting

To find out more about our Targeted Threat Protection email solution please email us: [email protected] or call 1-617-393-7050

Page 73: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com 73

ASSEMBLY

PROGRAM

Page 74: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com74

KEYNOTES & WORKSHOPS

DAY 1: MONDAY

WELCOME ADDRESS & KEYNOTECyber Security Business3:00-3:45 pm Room – Pavilion

Why rob a bank when a criminal can steal far more money from the ease and safety of sitting behind a computer screen? More and more businesses are becoming victims of cyber crime, but yet are not equipped to address the problem. Through story telling of FBI investigations, former cyber FBI Special Agent John Iannarelli discusses the most common ways your company is vulnerable to the various cyber threats, to include identity theft, fraud scams, hackers, and even terrorists. Most importantly learn how you and your business can avoid becoming a victim.

WORKSHOPDrones Take Over – The Internet of Things3:55–4:25 pm Room – Ballroom B&C

Drones are making the news on a daily basis but what are the practical applications in today’s corporate environment? In this session we will explore customer use cases, highlighting the relevancy of such disruptive technology.

WORKSHOPThe Urgency of Cyber Security for Business Survival3:55–4:25 pm Room – Ballroom D Key Discussion Points:• Incident Response—you can never be wholly secure, you must be prepared to identify issues and react to them in a consistent matter.• Making better use of the technical security control measures you already have in place.• Understanding Cyber Security and how it can affect an enterprise.• What methodologies are effective and examples of lessons learned and how they can be turned into best practices.• Understand how to manage risk when introducing new-age services and technologies• Hear about the latest security tools being used to stay ahead of cyber criminals.Cyber crime is making headlines almost on a daily basis. And as organizations move to leverage new technologies – cloud computing, social media, tablets and smartphones, a new set of security risks and challenges are surfacing. So how can today’s CISO introduce these emerging technologies without compromising their organization’s security? Cyber Security Strategy is MORE than a technical approach- with billons lost every year through data breech, social engineering attacks and Industrial espionage, it’s essential for companies to be thinking more aggressively about an effective Cyber Security Strategy. Many companies have gone to great lengths to protect themselves from the “technical threat”, however many have done little to safeguard the core of their intellectual property.

Keynote:

John Iannarelli Retired Assistant Special Agent In Charge

Leader:

Tomas Soderstrom IT Chief Technology & Innovation Office

Leader:

Darwin LarrisonCorporate Information Security Officer

Page 75: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com 75

WORKSHOPUsing Security and Identity Analytics to Increase Return on Governance4:30–5:00 pm Room – Ballroom B&C

Key Discussion Points:

Attend this session to learn how analytics can make your governance investment worthwhile with examples including:

• Prioritization of orphan or rogue accounts.

• Identification of abnormal behavior (especially for privileged users).

• Step-up and multi-factor authentication in response.

Many organizations use access governance only to satisfy auditors, resulting in rampant rubber-stamping of access certifications with little risk reduction. Integrated identity and security analytics can provide better inline decision-making information for business managers, driving access revocation rates higher.

Ron LaPedis Sales Enablement Specialist

Simon Puleo Sales Enablement Specialist

WORKSHOP Hybrid Cloud Integration5:05–5:35 pm Room – Ballroom B&C

Key Discussion Points:• NCR’s journey to hybrid cloud.

• Security, integration and data management challenges NCR faced and their solutions.

• NCR’s hybrid cloud 2020 vision.

Cloud-based application hosting models are able to deliver business value faster in many areas. The traditional on premise alternatives are expensive to operate and slow to adapt to business changes. In order to quickly adapt to business changes, NCR, as a leading company, is moving to a hybrid cloud model to stay ahead of all competition. NCR faced security, data management, systems integration, and vendor management as challenges while operationalizing their hybrid cloud strategy. NCR protected data in the cloud through the use of multiple tools and standards. NCR systems were connected using best practices and integration tools to manage the enterprise data across public and private clouds. NCR is using these solutions to help the business rapidly transform itself into a software company while continuing to be the world leader in consumer transaction technologies.

Advantage: This discussion explores NCR’s journey to IT agility and excellence through cloud technologies while highlighting key considerations around security, data governance, systems integration, and vendor management to provide a converged ecosystem of tools capable of supporting companies going thru a significant cloud transformation.

WORKSHOP Securing the Digital Enterprise5:05–5:35 pm Room – Ballroom D

Key Discussion Points:

• How can IT benchmark its current level of security maturity against other IT organizations and identify the gaps between critical business needs and IT capabilities?

• How can IT adversarial risk be measured and managed in support of a proactive, resilient security strategy?

• What steps can be taken to enhance IT security maturity with an eye to more efficient and effective economic decisions?

• How should the IT security architecture evolve to address security needs for identity, trust, threat, and vulnerability management programs?

With the unprecedented value opportunities for digital transformation (DX) lurks an ugly downside — intelligent adversaries looking for ways to abuse or exploit the complex IT systems that keep things running. Breaches are constantly being identified and disclosed, and IT security is working hard to manage risk, but is challenged to meet security needs in the face of scarce resources and highly dynamic IT architectures. This workshop advocates the approach of IT adversarial risk management within the scope of a robust IT security maturity model, the IDC MaturityScape: IT Security.

Leader:

Bill VanCuren Vice President & Chief Information Officer

Leader:

Pete Lindstrom Vice President, Security Strategies

Leaders:

Page 76: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com76

Moderator:

Alan Guibord Founder & Chairman

GALA DINNER AND KEYNOTE PANEL The Biggest Cloud Security Challenges Of 2016: Maintaining Security After A Cloud Implementation7:45-9:30 pm Room – Ballroom D

Roughly one in three IT leaders anticipates an increase of more than 20 percent in cloud security spending next year. The biggest cloud security challenges of 2016 will be controlling downloads, evaluating cloud provider security, external sharing and shadow IT. Cloud in particular as cloud infrastructure and mobile devices are the next biggest challenges for IT security. Another risk factor for organizations is the understanding of security issues among board members. We will also discuss implementing and adapting strategic processes, procedures, and controls for cloud governance and due diligence.

KEYNOTE BREAKFAST PANEL Duty of Care: How the CIO & CISO Must Mutually Work Towards Success Forming Strategy and Partnership to Solve Issues7:45-8:45 amRoom – Pavilion

Key Discussion Points:• Fixing the disconnect between you and your Board

• How to become a corporate leader rather than a technology leader

• Cyber security isn’t an IT but business issue and needs to be handled at the board to help get them to understand the importance

• How well can you react, not protect, and how comprehensive are your reactive plan?

Consumerization of IT has meant that staff are more demanding and will work around the technology department if their IT needs are not satisfied. Following numerous failed large IT projects confidence in Boards is waning. With many Boards ill-equipped to understand both the potential and risks of ICT, some CIOs & CISOs feel they would be better suited to govern high-risk technology initiatives. The self-governance of IT management could lead to an exercise in self-interest, however, without the Board to hold them to account and look at the bigger picture. Some therefore still feel the need for Boards to maintain governance of all large projects, with technology no exception.

In this panel session, CIOs & CISOs will discuss and debate which party is best placed to manage technology projects based on their experience working on, or with, the Board, and how best to fix the growing digital skills gap among non-executives.

Moderator:

Peter Vogel Partner

Sam Schoelen Chief Information Officer & Chief Security Officer

David Austin Chief Information Officer

Robert LautschVice President & Chief Information Security Officer

Tianbing Qian Chief Information Officer

David Hahn Vice President & Chief Information Security Officer

Kevin S. Dunn Senior Vice President & Chief Information Officer

Ron Green Chief Security Officer

Barry Caplin Vice President & Chief Information Security Officer

Panelists:

Panelists:

KEYNOTES & WORKSHOPS

DAY 1: MONDAY continued

DAY 2: TUESDAY

®

International

Page 77: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com 77

Leader:

John Thomson President & Chief Information Officer

Leader:

David HahnVice President & Chief Information Security Officer

WORKSHOPBringing Faster Time to Value with Hybrid IT and DevOps8:50-9:20 am Room – Ballroom B&CThe idea economy is driving new challenges for CIOs. This includes delivering more value faster to their lines of business. Not just by reducing IT infrastructure costs—but by transforming their IT investments for maximum agility and productivity for developers.

In this workshop you will learn how enterprises are moving beyond their initial Cloud 1.0 virtualization environments to a Cloud 2.0, open-source and DevOps driven framework.

Key Concepts Being Explored Include: • Open-Source frameworks for maximum DevOps agility such as CloudFoundry, Kubernetes and Docker.

• Integration of a DevOps architecture within existing IT investments to deliver infrastructure-as-code.

• Bridging legacy and cloud-native architectures for unified management for both private and public cloud.

• Enterprise case study examples.

Leader:

Geoff Tudor Chief Strategist, HP Cloud Americas

WORKSHOPNew IT Economics 9:25-9:55 amRoom – Ballroom B&C

Increase efficiency, reduce costs, and stay abreast of new technologies and capabilities.

These are all normal demand for CIOs who are caught in the middle of the push-pull paradox of technology and cost. With rising expectations for the capabilities IT can provide, and higher demand for efficiencies, CIOs must think strategically about creating structured approaches to identifying, measuring, reducing, and understanding technology needs and costs. In this session we will discuss how to accomplish your IT goals while playing nice with your CFO.

WORKSHOPOutsourcing Security9:25-9:55 amRoom – Ballroom D

The idea of outsourcing your most sacred knowledge base and intelligence inside your company years ago would have been consider crazy. Yet, in the current race against much more sophisticated and funded adversaries, you must consider this and you must do it well. Keep your internal security team small and focused on the most strategic and important work and outsource the rest utilizing services and cloud to scale like you’ve never could have in the past.

Page 78: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com78

WORKSHOPHow to Leverage your Existing Infrastructure and Become an Internal Cloud Provider (Including Case Studies)10:35-11:05 am Room – Ballroom B&C

Key Discussion Points:• Many IT departments are struggling with the manual work and delays to build new VMs on their internal infrastructure. This directly leads to the growth of shadow IT, VM sprawl and a lack of visibility into usage and spending.

• We will discuss two large enterprise companies who converted their existing infrastructure into self-service clouds, giving their IT teams newfound control and visibility while bringing agility to their operations and restoring harmony between teams.

Many companies are still relying on multi-step, semi-manual provisioning processes to build servers and environments in their data centers. IT teams have more work than they can handle, slowing fulfillment and creating a lack of faith in the IT teams’ ability to deliver. Users begin to resort to public cloud more and more to meet their deadlines. This results in hefty bills and an expensive datacenter being under utilized. These IT shops need a solution that leverages their existing capital investment to give self-service to their end users with the level of service as these users can get from public cloud providers.

We will host an interactive discussion focused around two case studies of companies who faced this exact problem and how they addressed it. Key discussion points include:

• IT as a Service Broker.

• Avoiding vendor lock-in through provider neutrality.

• Enabling DevOps delivery and best practices.

• Providing an intuitive interface for simple user self-service.

• Building a hybrid cloud does not mean starting over.

• Faster response and execution through automation and integrations.

Bernard Sanders Chief Technology Officer

Jon Mittelhauser Chief Executive Officer

KEYNOTES & WORKSHOPS

DAY 2: TUESDAY continued

Leaders:

®

Page 79: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com 79

WORKSHOPThe Devops Transformation: Why 2016 Is Going To Be The Year Of DevOps 1:05–1:35 pmRoom – Ballroom B&C

The overall DevOps message is compelling, because many IT organizations want to achieve the scale-out and economies of scale achieved by world-class cloud providers. There are still several gaps that prevent implementation of DevOps. In this session we will discuss these gaps and how the DevOps mindset might apply to our own environments. Culture is not easily or quickly changed and the key to the culture within is bridging the gap.

WORKSHOPIncident Management – It’s not “If”, but “When”1:05–1:35 pmRoom – Ballroom DKey Discussion Points: • Regardless of the quality of your proactive posture, you will have incidents and are likely to have a breach.

• There are basic steps that any organization should take as part of a comprehensive response program.

• Incident response and management could be the most important thing a security leader does. How you respond matters.

Have you heard??? 2015 was the “Year of the Breach”. Of course, 2014 was the year of the breach. And, 2013 was the year of the breach.

2016 is shaping up to be quite a year as well.

While we’ve traditionally focused on breaches – attacks on the confidentiality of data, over the past couple of years we’ve seen a rise in attacks on availability and integrity of data.

How do we prevent these attacks? We can’t. In fact, just ban the word “prevent” from your security vocabulary. The attackers are well funded and skilled. This has become a business, and business is “good”. And, it’s not if, but when an organization will suffer an attack.

Incident Response and Management could be one of the most important parts of a security program because “when” it happens, how we respond to minimize the impact can make a huge different both for the patients/customers and the organization. Incident Management needs to be a key part of an overall enterprise security program.

But where do you start?

In this session we’ll discuss common parts of the planning process, exchange ideas on how to mature an existing practice and perhaps share real world experiences.

Advantage: With new and renewed attacks against our organizations, Incident Response and Management needs to be a core part of your Information Security program.

Doing only what’s worked in the past and focusing on “preventing” breaches in not a viable tactic. We need to focus broadly on proactive, detective and responsive measures. We need to provide leadership when things go wrong.

Incident Response and Management could be one of the most important parts of a security program because “when” it happens, how we respond to minimize the impact can make a huge different both for the patients/customers and the organization.

Leader:

Andy Schlei Senior Vice President, Information Technology

Leader:

Barry Caplin Vice President & Chief Information Security Officer

Page 80: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com80

KEYNOTES & WORKSHOPS

DAY 2: TUESDAY continued

WORKSHOPLeveraging Foresight from IDC’s 2016 CIO Predictions 1:40-2:10 pmRoom – Ballroom B&CKey Discussion Points: • What are the imperatives for CIO’s strategically leading their organizations through accelerating change?

• How will CIOs incorporate business innovation into the fabric of the enterprise?

• How can CIO’s migrate from a “crisis in leadership” to a “calm in execution” in moving their enterprise’s technology transformation forward?

• What are the foreseeable changes for use of IT resources in supporting the creation of new digital revenue streams?

• What are the reasons behind the high failure rate of digital transformation initiatives?

This session will share IDC’s latest research, insight and foresight related to the changing imperatives for CIOs, IT and line-of-business executives who are empowering “thriving” IT organizations. IDC will review its recently released 2016 FutureScape for CIOs, identifying near term IT predictions that are driving digital transformation and the escalated use of 3rd Platform. IDC will provide pragmatic guidance on how IT executives can work more effectively in this new dynamic of shifting technology priorities required by accelerating business demands.

WORKSHOPEvolving World of Security: The Cloud and Mobile Revolution1:40-2:10 pmRoom – Ballroom DKey Discussion Points: • How has the move to cloud services affected information security?

• How can we best protect data on mobile devices and in the cloud while delivering a great user experience?

The move to cloud services like Office365, Box, and others represents a paradigm change in how businesses store and access data. A corresponding change of thought and methodologies is required to protect sensitive and proprietary data. This presentation addresses new technologies like cloud access security brokers (CASB) and identity and access management (IAM) solutions that can enable organization to properly protect their data wherever it may reside.

Advantage: A working knowledge of information security solutions that are designed for the cloud can enable C-level decision makers to promote and support efficient and effective protections for data in the cloud.

Leader:

Bill Keyworth Vice President of Research, Chief Information Officer Advisory Services

Leader:

Chris Shipp Chief Information Security Officer, Fluor Federal Petroleum Operations, Contractor to the U.S. Department of Energy

FLUORFEDERAL PETROLEUM OPERATIONS

ONE MISSION

ONE VISIONON

E T

EAM

O N E SP R

Page 81: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com 81

WORKSHOPShadow IT: How To Tame Unauthorized Apps & Services In Your Business2:50-3:20 pmRoom – Ballroom B&C

Shadow IT, is a major problem in the enterprise. Shadow IT can introduce security risks when unsupported hardware and software are not subject to the same security measures that are applied to supported technologies. Furthermore, technologies that operate without the IT department’s knowledge can negatively affect the user experience of other employees by impacting bandwidth and creating situations in which network or software application protocols conflict. Shadow IT can also become a compliance concern when, for example, end users use DropBox or other free cloud storage services to store corporate data. In this session we will discuss what its growth means for your IT department.

Leader:

Dr. Lorenzo C. Hines Senior Vice President, Information Technology

WORKSHOPThe Innovative Technology Leader2:15–2:45 pmRoom – Ballroom B&CHow can you create a culture of innovation to drive growth and performance? How can design thinking add value to leading edge information technology? What strategies and tactics are needed to move your organization forward? Join your peers in debating & discussing how to anticipate and respond to the complex and rapidly changing issues in the world of information technology.

WORKSHOPPotential Destruction of Privacy— Security Going Digital & The Internet of Things (IOT)2:15–2:45 pmRoom – Ballroom D

Love it or fear it, the Internet of Things is fast becoming a reality. By the year 2020, there will be more than 26 billion Internet-connected “things” — not including PCs, tablets, or smartphones — all of which are raising the challenges of cyber security to a whole new level. How will we monitor and protect our homes, automobiles, printers, security systems, even coffee pots? Will we sacrifice security and privacy on the altar of convenience?

Leader:

Brock Hubbard Chief Information Officer

Leader:

Maurice Stebila Chief Information Security Officer, Information Technology Security, Compliance and Privacy Officer

Page 82: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

EQ_Interconnected_Ad_1F1.indd 1 2/29/2016 7:08:44 PM

Page 83: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

transparent procurement of cloud & network

global footprint of tier 3 cloud and tier 1 carrier services available

best-practice fault-tolerant design, pricing & contract terms

consulting available to our clients at zero cost

C

M

Y

CM

MY

CY

CMY

K

Subsidium Ad for Assembly.pdf 1 3/7/16 2:33 PM

Page 84: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com84

ASSEMBLY-AT-A-GLANCE

DAY 1: MONDAY, MAY 2, 2016

12:00–1:30 pm REGISTRATION/LUNCH BUFFET/NETWORKING Room: Ballroom Foyer

1:30–2:45 pm EXECUTIVE EDUCATION ROUNDTABLES

Information of Everything Moderator: Natalia Levina Toyota Motors Corporation Term Chair and Professor of Information Systems New York University Stern School of Business Room: Sabine River

Becoming an Enabler of Change and Not an Inhibitor Moderator: Alan Guibord Founder & Chairman The Advisory Council Room: Brazos River

The CIO Turned Digital Leader: Prepare your Business for Digital Transformation Moderator: Peter Vogel Partner Gardere Wynne Sewell LLP Room: Cypress River

Phenomenon of Absorption Moderator: Rhea Siers Scholar in Residence, Center for Cyber and Homeland Security George Washington University Room: Fairway Ranch

3:00–3:45 pm WELCOME ADDRESS & KEYNOTE Cyber Security Business Keynote Speaker: John Iannarelli Retired Assistant Special Agent In Charge FBI Room: Pavilion

3:55–4:25 pm SESSION 1A: WORKSHOP Drones Take Over – The Internet of Things Leader: Tomas Soderstrom IT Chief Technology & Innovation Officer Jet Propulsion Laboratory (JPL) Room: Ballroom B&C

SESSION 1B: WORKSHOP: The Urgency of Cyber Security for Business Survival Leader: Darwin Larrison Corporate Information Security Officer UnityPoint Health Room: Ballroom D

4:30–5:00 pm SESSION 2: WORKSHOP Using Security and Identity Analytics to Increase Return on Governance Leaders: Ron LaPedis Sales Enablement Specialist Micro Focus | Simon Puleo Sales Enablement Specialist Micro Focus Room: Ballroom B&C

5:05–5:35 pm SESSION 3A: WORKSHOP Hybrid Cloud Integration Leader: Bill VanCuren Vice President & Chief Information Officer NCR Corporation Room: Ballroom B&C

SESSION 3B: WORKSHOP Securing the Digital Enterprise Leader: Pete Lindstrom VP, Security Strategies IDC Room: Ballroom D

5:40–6:40 pm ROUNDTABLES

91% of attacks start in email. But hey 9% don’t! Snap out of it! Moderator: Pete Lindstrom VP, Security Strategies IDC Room: Sabine River

Security Intelligence Services Moderator: Rhea Siers Scholar in Residence, Center for Cyber and Homeland Security George Washington University Room: Brazos River

Business Impact of Social Media: Mixing the C-Suites Moderator: Alan Guibord Founder & Chairman The Advisory Council Room: Cypress River

CIO Leadership at the time of Digital Disruption Moderator: Natalia Levina Toyota Motors Corporation Term Chair and Professor of Information Systems New York University Stern School of Business Room: Fairway Ranch

6:45–7:30 pm COCKTAIL RECEPTION Room: Ballroom Foyer

7:45–9:30 pm GALA DINNER AND KEYNOTE PANEL The Biggest Cloud Security Challenges Of 2016: Maintaining Security After A Cloud Implementation Moderator: Peter Vogel Partner Gardere Wynne Sewell LLP Panelists: Sam Schoelen Chief Information Officer & Chief Security Officer Continental Resources | Kevin S. Dunn Senior Vice President & Chief Information Officer U.S. Retirement Partners | Robert Lautsch Vice President & Chief Information Security Officer Rite Aid | Ron Green Chief Security Officer MasterCard Worldwide Room: Ballroom D

Page 85: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

www.mill-all.com 85

DAY 2: TUESDAY, MAY 3, 2016

7:00–7:45 am BREAKFAST Room: Pavilion

7:45–8:45 am KEYNOTE BREAKFAST PANEL Duty of Care: How the CIO & CISO Must Mutually Work Towards Success Forming Strategy and Partnership to Solve Issues Moderator: Alan Guibord Founder & Chairman The Advisory Council Panelists: David Austin CIO Berkshire Hathaway Automotive | Barry Caplin VP, CISO Fairview Health Services | Tianbing Qian CIO Ports America Corporation | David Hahn Vice President & Chief Information Security Officer Hearst Room: Pavilion

8:50–9:20 am SESSION 4: WORKSHOP Bringing Faster Time to Value with Hybrid IT and DevOps Leader: Geoff Tudor Chief Strategist, HP Cloud Americas Hewlett Packard Enterprise Room: Ballroom B&C

9:25–9:55 am SESSION 5A: WORKSHOP New IT Economics Leader: John Thomson Vice President & Chief Information Officer KBR Room: Ballroom B&C

9:25–9:55 am SESSION 5B: WORKSHOP Outsourcing Security Leader: David Hahn Vice President & Chief Information Security Officer Hearst Room: Ballroom D

10:00–10:30 am SESSION 6: NETWORKING & CHECK-OUT Room: Ballroom Foyer

10:35–11:05 am SESSION 7: WORKSHOP How to Leverage your Existing Infrastructure and Become an Internal Cloud Provider (Including Case Studies) Leaders: Bernard Sanders CTO CloudBolt Software | Jon Mittelhauser CEO CloudBolt Software Room: Ballroom B&C

11:15–12:15 pm ROUNDTABLES

Securing The Enterprise Digital Footprint: How do we Discover and Secure Unknown Digital Assets Against the External Threats that Target them, in an Increasingly Agile, Decentralized World? Moderator: Peter Vogel Partner Gardere Wynne Sewell LLP Room: Sabine River

The Great Office 365 Migration Moderator: Rhea Siers Scholar in Residence, Center for Cyber and Homeland Security George Washington University Room: Brazos River

Information Security & Economics Moderator: Pete Lindstrom VP, Security Strategies IDC Room: Cypress River

12:20–1:00 pm LUNCH Room: Pavilion

1:05–1:35 pm SESSION 8A: WORKSHOP The Devops Transformation: Why 2016 Is Going To Be The Year Of DevOps Leader: Andy Schlei Senior Vice President, Information Technology Sony Pictures Entertainment Room: Ballroom B&C

SESSION 8B: WORKSHOP Incident Management – It’s not “If”, but “When” Leader: Barry Caplin Vice President & Chief Information Security Officer Fairview Health Services Room: Ballroom D

1:40–2:10 pm SESSION 9A: WORKSHOP Leveraging Foresight from IDC’s 2016 CIO Predictions Leader: Bill Keyworth Vice President of Research, CIO Advisory Services IDC Room: Ballroom B&C

SESSION 9B: WORKSHOP Evolving World of Security: The Cloud and Mobile Revolution Leader: Chris Shipp Chief Information Security Officer, Fluor Federal Petroleum Operations, Contractor to the U.S. Department of Energy Fluor Federal Petroleum Operations (FFPO) Room: Ballroom D

2:15–2:45 pm SESSION 10A: WORKSHOP The Innovative Technology Leader Leader: Brock Hubbard Chief Information Officer Sunnova Energy Corp Room: Ballroom B&C

SESSION 10B: WORKSHOP: Potential Destruction of Privacy— Security Going Digital & The Internet of Things (IOT) Leader: Maurice Stebila CISO, IT Security, Compliance and Privacy Officer HARMAN International Room: Ballroom D

2:50–3:20 pm SESSION 11: WORKSHOP Shadow IT: How To Tame Unauthorized Apps & Services In Your Business Leader: Dr. Lorenzo C. Hines Senior Vice President, Information Technology CitiGroup Room: Ballroom B&C

Page 86: ASSEMBLY GUIDE - The Millennium Alliance · PDF fileASSEMBLY GUIDE May 2 – 3 Four Seasons │Dallas, TX Follow the Assembly @Mill_All #CISOassembly | #PSTassembly. WELCOME ... John

31% PUBLICCLOUD

69% PRIVATE

CLOUD

*Source: Synergy Research Group.© Copyright 2015 Hewlett Packard Enterprise Development LP. Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.

Brought to you by HPE & Intel®. Intel Inside®. Powerful Cloud Outside.

Accelerating next

HPE Helion hybrid cloud helps Fortune 500 companies scale up and down and up.First, the Hewlett Packard Enterprise Helion platform lets you shift traditional apps into a private cloud that can heighten security and lower costs. Then it lets you add a public cloud that can scale up and down as rapidly as demand does. So you can always find your right mix.

See how companies like yours are moving to hybrid with the leader in private cloud solutions.* hpe.com/hybrid

HEX_000_P13462_PrintAd_8_5x11_M2.indd 1 11/17/15 10:10 AM