August 12 - 14, 2018
SEAPORT HOTEL, BOSTON, MA

Day 3, Tuesday, August 14, 2018

8:30 am - 9:00 am Networking Breakfast

9:00 am - 9:05 am Chairperson's Opening Remarks

How do US companies, in the context of data, operate in Asia? Despite the
global reach of companies, there is a need for a separate answer when it
comes to doing data and analytics in Asia. Participants should leave with new
models for customer journey mapping in Asia, increasing operational
efficiencies and communication with overseas offices, and ultimately a
blueprint for entering the emerging The role of the CFO has changed from being the keeper of accounting records to the driver of business change with data and financial information. The CFO should now be prepared to be a trusted advisor and partner to the CEO, CIO and CISO in the development of strategic plans and to drive innovation throughout the organization all while controlling costs. To truly be effective, it is impossible to ignore the data and fraud risks related to cybersecurity as part of the role. Explore how driving the importance of a modern IT infrastructure and advise how transforming your IT organization will enhance security, mitigate fraud exposure and provide savings and efficiencies critical to your business’ success.market in Asia.

In this session, explore insights in:
•Improving intelligence sharing
•Increasing detection of adversaries with threat intelligence gateways and next-generation endpoint security
•Reducing the attack surface with micro-segmentation
•Deploying intelligent application controls

img

Jeanette Wade

Executive Office of Technology Services and Security
Commonwealth of Massachusetts

9:40 am - 10:10 am Business Meetings

10:10 am - 10:40 am Business Meetings

10:40 am - 11:15 am Sabotage and Disruption in the Changing Threat Landscape

The cyber landscape is vulnerable to a variety of physical and cyber threats. The drive among hackers for greater financial gain, damage and disruption will yield new forms of cyber crimes.  Unlike traditional crime, which requires physical proximity, cyber crime can be launched from anywhere in the world that permits a link between cyber space and computers. The attack surface, which includes the ever-growing Internet of Things, that corporations need to protect continues to grow.  Defenders must proactively reduce the attackers’ operational space while the number of devices needing protection continues to grow.

In this session, explore insights in:
•Improving intelligence sharing
•Increasing detection of adversaries with threat intelligence gateways and next-generation endpoint security
•Reducing the attack surface with micro-segmentation
•Deploying intelligent application controls


11:15 am - 12:00 pm Technical Staffing- Recruitment and Retention Challenges and Solutions

Karen Davis - Business Group Chief Information Officer RTI
Developing an effective talent strategy prevents turnover and drives consistent performance. In an area of zero unemployment, it’s crucial to attract, develop and retain talent. Talent development including training, hiring, retaining, lost productivity, awareness training, and  training specific to function are all part of the organization’s security mission. The lack of skilled people to fill current openings is a well known fact.
This session will discuss developing cybersecurity executives throughout their careers:
•             Helping equip the next generation to understand what cybersecurity professionals are and what they  do including the right recruitment practices
•             Equipping hiring managers to develop the right team for the enterprise
•             Inspiring and motivating cyber security professionals
•             Innovative ways to close the IT security skills gap

img

Karen Davis

Business Group Chief Information Officer
RTI

12:00 pm - 12:15 pm Chairperson’s Closing Remarks