AGC’s 13th Annual West Coast Information Security & Broader Technology Growth Conference
February 13th - 14th The Park Central San Francisco, CA
AGC PARTNERS Thank you for joining us at AGC Partners’ 13 th Annual West Coast Information Security and Broader Technology Growth Conference. As always, we are grateful to the 414 participating companies and all of the attendees for their time and effort in making it such a worthwhile program. We would also like to thank our corporate sponsors, Invest Northern Ireland, S&P Global, Capital Advisors, and Alli- anceBernstein Private Credit Investors for their role in bringing together this event. Today’s program includes panel discussions on today’s most relevant technology topics and presen- tations delivered by CEOs of leading technology companies. We have a strong turnout for the 1-on-1 meetings, and look forward to hearing about the connections and relationships developed during these sessions. After more than 14 years of hosting great growth conferences, the 1-on-1 meetings we facilitate among strategic acquirers, private equity and venture professionals and the technology entrepreneurs have become the cornerstone of AGC events. At our East Coast Technology Growth Conference in mid-September, more than 1,300 1-on-1 meetings were held among 600 participants. Since AGC Partners’ inception in 2003, we have completed 298 transactions and have grown to be- come one of the largest global technology investment banking firms. Our 50+ person team is led by 18 partners located in our Boston headquarters, Silicon Valley, New York, London, and Minneapolis. AGC Partners has been ranked by 451 Research as one of the most active boutique technology dealmakers in the United States for the past 7 years. This momentum continues with a record 32 transactions completed in 2016. We achieve our success by developing and building upon outstand- ing relationships with the most active corporate technology buyers and top VC and PE firms across the globe, many of which are represented at this event. Our continued dedication is to discover and work with exciting emerging growth companies and to help them raise capital or execute strategic transactions in order to propel their businesses to their next stage of growth. To those of you who are current clients or first time attendees at an AGC event, we are confident that you will find this conference to be a valuable experience and we hope to have the opportunity to connect with you during the program.
M. Benjamin Howe
Maria Lewis Kussmaul , CFA
The Top Technology Boutique Bank
At the Forefront of Technology Advisory
AGC’s 13th Annual West Coast Information Security & Broader Technology Growth Conference Monday February 13th, 2017
Cyber Risk Assessment Yong-Gon Chon, Focal Point Data Risk Patrick Gorman, CyberGRX Mark Nicholson, Deloitte Kelly White, RiskRecon Larry Jones, Coalfire Moderator: Michael Fox, Stroz Friedberg Directions in Enterprise Security Marc van Zadelhoff, IBM Niloo Howe, RSA Gary Steele, Proofpoint Marty Roesch, CISCO Amit Yoran, Tenable Network Security Moderator: Mike Rothman, Securosis Nicole Eagan, Darktrace Guy Caspi, Deep Instinct Greg Martin, JASK Moderator: Dorit Dor, Check Point Keynote Address Patrick Morely, Carbon Black A/V Refresh Kevin Simzer, Trend Micro Patrick Morley, Carbon Black Neal Creighton, CounterTack Tomer Weingarten, SentinelOne Lior Div , Cybereason Moderator: Vik Phatak, NSS Labs Investing in Cyber Security Shardul Shah, Index Ventures Bob Ackerman, Allegis Capital Mike Biggee, Sunstone Partners Disruptors on Security Disruption Dug Song, Duo Security Rakesh Loonkar, Transmit Security Jack Ancone, Cylance Stuart Scholly, Akamai Tom Noonan, TechOperators Moderator: Scott Crawford, 451 Research Active Defense, Cyber Deception Christopher Ahlberg, Recorded Future George Kurtz, CrowdStrike Greg Enriquez, TrapX Security Jon Ramsey, SecureWorks Ofer Israeli, Illusive Networks Moderator: Russ Workman, AGC Partners Security Automation Vivek Shivananda, RSAM Oliver Friedrichs, Phantom Cyber Grady Summers, FireEye Slavik Markovich, Demisto Scott Chasin, ProtectWise Moderator: Eric Davis, AGC Partners Impact of DevOps on Cyber Stephan Chenette, AttackIQ Lou Shipley, Black Duck Software Ben Bernstein, Twistlock Andrew Peterson, Signal Sciences Ed Bellis, Kenna Security Moderator: Josh Corman, The Atlantic Council Keynote Address Niloo Howe, RSA AI in Cyber Security Ann Johnson, Microsoft Alon Arvatz, Intsights Kris Hagerman, Sophos Manish Sarin, Proofpoint Moderator: Maria Lewis Kussmaul, AGC Partners Keynote Address Dug Song, Duo Security Keynote Address Oliver Friedrichs, Phantom
Context Rele- vant
Lynx Technology Partners
White Cloud Security
Javelin Net- works
Corero Net- work
Bracket Compu- ting
Bayshore Net- works
Nok Nok Labs
Digital Immunity S21Sec
Oxford Solutions ZeroFox
OPĀQ Networks Digital Shadows
Security Score- card
Fast Orientation Bullguard
Security On- Demand
Contrast Securi- ty
Security Matters Wandera
Entrust Data- card
Social SafeGuard NopSec
AGC's 13th Annual West Coast Information Security & Broader Technology Growth Conference Tuesday, February 14th, 2017
COMPANY PRESENTATIONS UNIVERSITY ROOM
INDUSTRY PANELS - OLYMPIC ROOM
9:20-10:00 AM Data Analytics
10:10-10:50 AM Integrating IoT for Connected Care
11:00-11:40 AM Food Tech
AGC Partners Welcome
Keynote Address: Thomas F. Bogan Chief Executive Officer, Adaptive Insights
COMPANY PRESENTATIONS UNIVERSITY ROOM
INDUSTRY PANELS - OLYMPIC ROOM
Keynote Speakers - Day One
Niloofar Howe, Chief Strategy Officer, Senior Vice President, Strategy, Operations, RSA
Niloo is Chief Strategy Officer and Senior Vice President of Strategy and Operations at RSA where she has worked since November 2015. Niloo’s focus is on security and she is responsible for leading corporate and business develop- ment, corporate strategy and planning as well as business operations. Prior to her current position, Niloo was the Chief Strategy Officer at Endgame. Previously, Niloo was Managing Director at Paladin Capital Group where she con- tinues to be an Operating Partner. Niloo also worked as a Principal at Zone Ventures, an Engagement Manger with McKinsey and Company, and an Associate Lawyer with O’Melveny & Myers.
Niloo holds a BA in English Literature from Columbia College and a JD from Harvard Law School.
Patrick Morley, Chief Executive Officer, President, Carbon Black
Patrick is the Chief Executive Officer and President of Carbon Black, which he joined in 2007. Prior to Carbon Black, Morley held senior leadership positions with six venture-backed software companies, including three that had success- ful IPOs. As the Chief Operating Officer of Corel, Morley played a significant leadership role in the company’s turna- round, acquisition strategy and eventual IPO. Prior to Corel, Morley was the Chief Executive Officer of Imprivata, a Massachusetts-based healthcare security company. Morley has also held senior management positions at Macrome- dia, Allaire, Rational Software and SQA.
Morley received a Bachelor’s degree in Mathematics and Computer Science from Providence College.
Keynote Speakers - Day One
Dug Song, Chief Executive Officer, Co-Founder, Duo Security
Dug has a history of leading successful products and companies to solve pressing security problems. Dug spent 7 years as founding Chief Security Architect at Arbor Networks , protecting 80% of the world's Internet service provid- ers, and growing to $120M+ annual revenue before its acquisition by Danaher. Before Arbor, Dug built the first com- mercial network anomaly detection system (acquired by NFR / Check Point ), and managed security in the world's largest production Kerberos environment (University of Michigan). Dug's contributions to the security community in- clude popular open source security ( OpenSSH , libdnet , dsniff ), distributed filesystem ( NFSv4 ), and operating system ( OpenBSD ) projects, and cofounding the USENIX Workshop On Offensive Technologies ( WOOT ).
Oliver Friedrichs, Founder, Chief Executive Officer, Phantom Cyber
With a remarkable record in building three successful enterprise security companies over the past two decades, Friedrichs serves as the CEO of Phantom. Prior to Phantom, Friedrichs founded Immunet, acquired by Sourcefire in 2010 and a key component to Cisco's $2.7b acquisition of Sourcefire in 2013; now thriving as Cisco's Advanced Malware Protection (AMP) business. Friedrichs co-founded SecurityFocus (Bugtraq) and led DeepSight, the world's first Internet early warning system, acquired by Symantec in 2002, and a recognized leader in security intelligence to this day. He co-founded Secure Networks and led Ballista (CyberCop), one of the industry’s first vulnerability man- agement solutions, acquired by McAfee in 1998. Friedrichs developed a prototype of the first commercial penetration -testing product, SNIPER, acquired by Core Security Technologies in 2001 and further developed into CORE IM- PACT. He attended the University of Manitoba and is the co-author of three security books and recipient of 8 pa- tents.
Keynote Speaker - Day Two
Thomas F. Bogan Chief Executive Officer, Adaptive Insights
Tom is a seasoned enterprise software executive with deep SaaS expertise and a passion for help- ing companies achieve their potential. Prior to Adaptive Insights, he was an investor and Board member of several highly successful software companies including Citrix Systems (where he served as Chairman), PTC and SaaS companies Acquia, Apptio, and Rally Software (RALY). He remains on the board of Acquia and Apptio today. Previously Tom was a Partner at Greylock Partners, focusing on enterprise software investments. He was also President and COO at Rational Software (RATL) until its acquisition by IBM for $2.1 bil- lion. Before Rational, Tom served as CEO at Avatar Technologies and Pacific Data. Tom began his career as a financial officer in both public and private companies, serving as CFO at SQA and Or- ange Nassau, Inc., as well as VP, Finance at SCA Services. He has also held positions in public ac- counting. Tom graduated with a Bachelor of Science degree in Accounting from Stonehill College in Easton, MA where he also serves as a Trustee.
ABS Capital Partners
Google Ventures Great Hill Partners
Octopus Ventures ONSET Ventures
Oregon Angel Fund
Adams Street Partners
Greylock Partners Grotech Ventures
ORIX Growth Capital
Albion Ventures Allegis Capital
Paladin Capital Group
Alsop Louie Partners
Gula Tech Adventures
Amadeus Capital Partners
Pamplona Capital Management
Harbert Growth Partners HarbourVest Partners
Parallax Capital Partners
AXA Strategic Ventures Azure Capital Partners
ParkerGale Capital Parthenon Capital
Hewlett-Packard Enterprise Highland Capital Partners Housatonic Partners HPE Growth Capital Index Ventures Industry Ventures Inner Loop Capital Insight Venture Partners Insignia Capital Group
Portage Partners Presidio Ventures Primus Capital
Beach View Capital
Pritzker Group Venture Capital
Boathouse Capital Boldstart Ventures Bregal Sagemount Canvas Ventures
Providence Equity Partners
Redline Capital (UK) Limited Rembrandt Venture Partners
Carrick Capital Partners
ClearSky Power & Technology
Clearlake Capital Group Comcast Ventures Crestline Investors Data Point Capital Decathlon Capital Delta-v Capital DN Capital (US) EDB Investments EQT Partners GmbH Escalate Capital Partners Evolution Equity Partners
Kaiser Permanente Ventures Kohlberg Kravis Roberts & Co. L Squared Capital Partners
Samsung Ventures Sapphire Ventures
Savano Capital Partners
Scale Venture Partners
Los Altos Advisors
Second Phaze Sequoia Capital
Luminate Capital Partners
Shasta Ventures Sierra Ventures
Madison Dearborn Partners
Marlin Equity Partners
Silver Lake Kraftwerk
Silversmith Capital Partners
Siris Capital Spark Capital
Founders Equity Partners Founders Circle Capital
Meritech Capital Partners
Sprout Capital Partners
Staley Capital Stereo Capital
NewSpring Capital NexStar Partners NextEquity Partners Nokia Growth Partners North Bridge Growth Equity Norwest Equity Partners Norwest Venture Partners
Strategic Cyber Ventures
Fulcrum Equity Partners
General Atlantic General Catalyst
Sumeru Equity Partners
Summit Partners Sunstone Partners
GGV Capital GI Partners
Susquehanna Growth Equity
Glilot Capital Partners
Sutter Hill Ventures
Sverica Capital Management
Third Point Ventures
Vista Equity Partners Vistara Capital Partners
Three Kings Capital
Volition Capital Vulcan Capital Warburg Pincus
Triangle Peak Partners
Technology Crossover Ventures Trident Capital Cybersecurity
Waud Capital Partners
TechOperators Venture Capital
Trinity Ventures True Wind Capital Updata Partners
Work-Bench YL Ventures
Ten Eleven Ventures The Carlyle Group The Gores Group
RJH Holdings, Inc. Rogue Wave Software
Bluefocus Communication Group Juniper Networks
Level 3 Communications
Silver Spring Networks
Site 1001 SK infosec Software AG
Cognizant Technology Solutions Marsh
Entrust Datacard Ernst & Young
Tenable Network Security
Nokia Okta Optiv
Fair Isaac Corp
Focal Point Data Risk
Palo Alto Networks
VASCO Data Security International
Raytheon Company Riverbed Technology
Participating Companies - Day One
Glasswall Solutions Limited
Alert Logic AlienVault
CrowdStrike Cyber adAPT Cybereason
Gurucul Haystax Hexadite
Arctic Wolf Networks
Cybertech Systems and Software Identropy
Darktrace DataGravity Deep Instinct
Intergrity Security Services
Denim Group, Ltd.
Javelin Networks Kenna Security
BitSight Technologies Black Duck Software
Digital Immunity Digital Shadows Distil Networks
Blancco Technology Group
Dtex Systems Duo Security Efflux Systems
Lynx Technology Partners
Emergent Network Defense
MeasuredRisk Medina Capital
Champion Tech | DarkLight Cyber Entrust Datacard
Check Point Circumventive
eSentire Evident.io Exabeam
Mi3Security MIRACL Morphick Morphisec
N-Dimension Solutions Nehemiah Security
Cohesive Networks Context Relevant Contrast Security
Fireglass Firemon Flashpoint
Nok Nok Labs
Fortress Information Security
Corero Network Security
Participating Companies - Day One
SAIFE SecBI Secdo Seceon
ThreatConnect ThreatQuotient ThreatSTOP
Outlier Security Oxford Solutions
SecureMySocial SecureOctane SecureWorks Security Innovation Security Matters Security On-Demand SecurityScorecard
PerimeterX PFP Cyber Phantom PhishLine
Transmit Security TrapX Security
Picus Security Ping Identity
TrustPipe Security TSC Advantage
Twistlock Uptycs Vaultive
SilverDome SilverFort SK infosec
Virsec Systems Virtru Corporation
QuintessenceLabs Recorded Future
VirtuCrypt, a Futurex Company
Rhino Security Labs
White Cloud Security
RiskRecon RiskSense RiskVision
ROMAD Cyber Rook Security
Participating Companies - Day Two
Bernoulli Big Health
Big Switch Networks
Participating Companies - Day Two
Data I/O Corporation
Digital Foodie Disruptor Beam
Kloudless Kollective Kontena
Rocana Rundeck ScaleArc Sentrian
Elastic Path Software
Electric Cloud Encoding.com
My Power Supply
STRIVR Labs Sun Basket
Netmotion Software Networked Insights Nexenta Systems
Tempo Thunder TrackVia
Gengo Gigya Glance
Openwave Mobility OutboundEngine
OutMatch Panzura PayLease PDFfiller
Hortau HotLink IGLOO
Phone2Action PlaceIQ Platform9 Point Inside
PresenceLearning Presto Engineering
Cyber Risk Assessment
Abstract: As cybercrime continues to proliferate across the globe, cyber risk is no longer just an issue for CISOs and now de- mands the attention from the Board of Directors, management, and the broader organization. High profile data breaches over the past decade have not only led to financial loss, but also paralyzing brand reputation damage. Adding to the scrum, the propagation of IoT and digitalization of corporations have created an unprecedented level of cyber interde- pendency increasing the odds that the effects of an attack could be broad and cascade across the ecosystem – a “Cyber Hurricane” scenario. Companies are proactively moving to understand and assess their exposure through a unified pic- ture of third party vendors, internal controls, and security procedures. Because of the size, complexity, and constant evolution of attack vectors, there is no simple, one-size-fits-all approach to managing the risks associated with cyber crime. However, it is essential to establish a baseline for identifying critical components that must be incorporated into the risk management strategy. Even as standards and best practices begin to solidify, areas and techniques of assessment still vary between cybersecurity companies. Nonetheless, the common goal of understanding an enterprise’s exposure is the quantification of risk and how to track that over time. The evolving threat landscape has made quantifying risk a complex and difficult exercise. This dynamic field of risk, in itself, drives greater spend for growing sub-verticals around strategic advisory services for quantifying data breach risk. Attorneys, threat mitigation firms, and consulting firms are investing more time and resources to provide risk manage- ment and resilience consulting services as organizations face the reality that need help to effectively plan and respond to an attack. These vendors help companies understand and benchmark their cyber posture so leadership can manage exposure in the same manner as other enterprise risks. This panel will be an informative discussion about the growing cyber risk assessment ecosystem and the rapid adoption of these vendors as companies harden their defenses against cyber crime.
Market Statistics, Sizing/Growth:
The Integrated Risk Management market is expected to grow at a 15% CAGR reaching $5.7B by 2021 from $2.9B today (Gartner) Global cyber crime is estimated to cost between $375B and $575B annually (McAfee, CSIS), expected to grow to $2.1T by the end of the decade (Juniper Networks)
Since 2005, there have been nearly 6,800 data breaches exposing 886 million records (ITRC)
The average cost of a data breach grew from $3.8M in 2015 to $4.0M in 2016 (Ponemon Institute)
66% of public company board members are not fully confident their companies are properly protected against a cyber attack (NYSE)
Annual gross written premiums for cyber insurance rose 20% since last year to $3.25B (Betterley)
What are the core techniques of an assessment and how do methodologies compare across vendors?
What are the typical challenges encountered when assessing an enterprise’s security posture?
How do you address the human element when building a cyber resilience plan?
With the cyber insurance market dominated by North America, how do you see growth abroad for these consulting and assessment services?
What proportion of companies have dedicated cyber resilience budgets?
How do you see government regulations contributing to the adoption of security assessments?
How is the proliferation of data and applications to the cloud impacting the threat environment?
How often are you partnering with cyber insurance providers in the underwriting process?
Cyber Risk Assessment
Michael Patsalos-Fox, Chief Executive Officer, Stroz Friedberg
Michael Patsalos-Fox serves as CEO of Stroz Friedberg, an Aon company. He is based in the firm’s New York office and was first appointed as the firm’s CEO in November 2013, prior to the firm’s acquisition by Aon. A former chairman of the Americas for management consulting firm McKinsey & Company, Mr. Patsalos-Fox is responsible for Stroz Friedberg’s global operations and growth strategies. Mr. Patsalos-Fox brings decades of international and senior stra- tegic consulting experience to bear, having helped his clients solve their most difficult business problems. Mr. Patsa- los-Fox served as chairman of the Americas for McKinsey from 2003-2009, where he was responsible for driving an aggressive growth agenda, leading over 2,500 consultants, including 300 partners. Between 2009 and 2013, he led the creation and development of McKinsey Solutions, a practice that combined industry and functional expertise with data science to unlock lasting insights and performance for the firm’s largest global clients. He also served as a senior partner on McKinsey’s operating committee for nine years, and he held a seat on the firm’s board for twelve years. Yong-Gon is the Chief Executive Officer of Focal Point Data Risk, which he joined in February 2015. Yong-Gon is re- sponsible for all aspects of business execution. Prior to Focal Point Data Risk, Yong-Gon served as the Senior Vice President of Cyber Solutions for Kratos Defense and Security Solutions. Previously, Yong-Gon has served as the Senior Vice President of Cyber Security and Chief Technology Officer at SecureInfo Corporation, Director of Compli- ance Management at Cybertrust, and Vice President of Consulting for iDEFENSE. Chon received a BS in Emergency Medical Services Management from George Washington University. Patrick is the Head of Strategy and Product Development at CyberGRX, where he has worked since 2015. Patrick is responsible for developing strategy and overall product design. Prior to his current position, Patrick served as Chief Security Officer at Bridgewater Associates, Chief Information Security Officer at Bank of America, and Associate Di- rector of National Intelligence for Technology and Strategy at the Office of the Director of National Intelligence. Previ- ously, Patrick worked at Booz Allen Hamilton as a Principal, leading cybersecurity practices in both government and commercial markets. He also served in the United States Air Force in electronic security and intelligence. Patrick holds a BA in Economics and Political Science from University of Maryland College Park and an MA in Russian, Central European, East European, and Eurasian Studies from George Washington University. Mr. Jones has served as Chairman of the Board of Coalfire since 2012 and became CEO in 2015. He has more than 25 years of experience building, operating and growing public and private companies in the business process out- sourcing, marketing services, enterprise software, smart-grid, information and IT services industries. He has a proven track record as the CEO of six companies and has served as director of 13 private equity, public and VC-backed com- panies and executive chairman of two others. Mr. Jones currently also serves as a director of Diligent Corporation (NZX: DIL) and Essential Power, LLC. He is also active member and Fellow in the National Association of Corporate Directors (NACD). Mark Nicholson, Principal, Deloitte Mark is a Principal at Deloitte where he has worked since May 2013. Mark is responsible for operating Vigilant by Deloitte which is a cyber security practice within the security and privacy business services division. Prior to his cur- rent position, Mark was Co-Founder and Chief Operating Officer at Vigilant. Previously, Mark was Business Develop- ment Manager at Predictive Systems. Mark has also held a number of sales positions including at Top Layer, Comdis- co, and Cabletron. He holds a BA in Journalism and Political Science from Keene State College. Kelly is the Founder and Chief Executive Officer at RiskRecon where he has worked since 2015. Kelly has assembled a group of security researchers, computing developers, and data scientists that are building enterprise security tech- nology. Prior to his current role, Kelly was Chief Information Security Officer at Progrexion. Previously, Kelly was Vice President of Security Strategy at Trusteer. Kelly also held multiple positions at Zions Bancoporation with the most re- cent one being Vice President and Information Security Manager. Kelly began working at CyberTrust and EY. Kelly holds a MA in Accounting and Information Systems from Brigham Young University. Patrick Gorman, Strategy, Product Development, CyberGRX Larry Jones, Chief Executive Officer, Coalfire Kelly White, Founder, Chief Executive Officer, RiskRecon Panelists: Yong-Gon Chon, Chief Executive Officer, Focal Point Data Risk
Directions in Enterprise Security: Is Leadership up for Grabs?
Abstract: Cybersecurity spending surpassed $80B in 2016, driven by the evolving threats and increased public awareness. To combat the complexity of the modern threat environment, a wholesale architectural refresh in enterprise security infra- structure is well underway. Tremendous amounts of private capital have been injected over the past several years, leading to an overwhelming number of point solutions. As the “new guards” attempt to capture market share, the “incumbents” endeavor to protect their stake by evolving their security solutions via organic development and inorganic acquisitions. The growing, fragmented market presents a land grab opportunity, which will be seized by agents of transformation. Winners will need to navigate the imminent technology disruption represented by the cloud and mobility with an eye to the future, yet without alienating existing customers. Tactically, endpoint security is going through an “anti-virus refresh” as companies look to combine tools and techniques, including machine learning / artificial intelligence, behavioral ana- lytics, and deception to defend against advanced attacks. Simultaneously, the lack of available skilled security resources has led both organizations and security acquirers to place significant emphasis and value on orchestration and managed service capabilities. As cybersecurity threats have evolved from CIO concerns, to board room discussions, to nation state conflicts, the visibility of enterprise security has never been higher. The security industry has been waiting for this moment for decades, the question is what to do now that the spotlight is on us. This panel will be a spirited discussion about what it’s going to take to survive as a security practitioner over the next 3- 5 years and the impact that will have on security companies. And then you can decide for yourself who’s best posi- tioned to emerge victorious.
Market Statistics, Sizing / Growth:
Worldwide spending on cybersecurity products and services is predicted to exceed $1T cumulatively from 2017 to 2021 (Cybersecurity Ventures) 82% of IT decision-makers surveyed reported a shortage of cybersecurity skills, with 71% citing this deficiency for organizational damage; however, in the US alone, 209,000 cybersecurity jobs went unfilled (CSIS)
More than 4,000 ransomware attacks occurred every day in 2016, a 300% increase over 2015 (CCIPS)
For a second year in a row, Information Security is anticipated to be the largest segment of acquisition spending (451 Research)
What will drive security transformation in 2017?
How broad of a solution set must the winners have? Can you prosper if you don’t have full coverage?
When will we see the golden age of cybersecurity startups come to an end?
What are you doing to address the cybersecurity workforce shortage?
Will AI lead to the eventual replacement of humans in the security operations center?
How has the emergence of security orchestration affected your approach towards deploying end-to-end vs best-of- breed solutions? With the expansion of IoT and interconnectivity of devices / networks, how does this change the threat landscape of cybersecurity going forward? Will anti-ransomware software become a priority in 2017 following a record year in which over $1B was lost to cyberextortion?
In the long term, will traditional infrastructure become obsolete as we move to the cloud?
As cybersecurity plays an even more important role in nation state interaction and foreign policy, how are business- es affected? Does this put the security industry in a different light than other tech sectors?
Directions in Enterprise Security: Is Leadership up for Grabs?
Mike Rothman, President, Analyst, Securosis
Mike is the President and Analyst at Securosis where he has worked since 2010. Mike helps to determine effective strategies to grapple with dynamic security threats. Mike’s specialization in security is protecting networks and end- points, security management, and compliance. Prior to his current position, Mike was Senior Vice President of Strate- gy and Chief Marketing Officer at elQnetworks. Previously, Mike was President, Principal Analyst, and Chief Blogger at Security Incite. Mike has also worked at CipherTrust, TruSecure, Rothman Consulting, SHYM Technology, META Group, EY, and AMS. Mike holds a BS in Operations Research and Industrial Engineering from Cornell University.
Niloo Howe, Chief Strategy Officer, Senior Vice President, Strategy, Operations, RSA
Niloo is Chief Strategy Officer and Senior Vice President of Strategy and Operations at RSA where she has worked since November 2015. Niloo’s focus is on security and she is responsible for leading corporate and business devel- opment, corporate strategy and planning as well as business operations. Prior to her current position, Niloo was the Chief Strategy Officer at Endgame. Previously, Niloo was Managing Director at Paladin Capital Group where she continues to be an Operating Partner. Niloo also worked as a Principal at Zone Ventures, an Engagement Manger with McKinsey and Company, and an Associate Lawyer with O’Melveny & Myers. Niloo holds a BA in English Litera- ture from Columbia College and a JD from Harvard Law School. Marty Roesch, Chief Architect, Security Business Group, Cisco Marty is the Chief Architect of the Security Business Group at Cisco where he has worked since October 2013. Prior to his current position, Marty was Founder, Chief Executive Officer, and Chief Technology Officer at Sourcefire which was acquired by Cisco. Marty is the Creator and Lead Architect of the open source project, Snort. Previously, Marty was a Director at Honeynet Project and an Instructor at SANS Institute. He was also an Engineer at Hiverworld, GTE Internetworking, and Stanford Telecom. Marty holds a BS in Electrical and Computer Engineering from Clarkson University. Gary is the Chief Executive Officer at Proofpoint where he has worked since 2002. Gary led its rise from an early- stage start-up to a leading SaaS provider. Prior to his current position, Gary was the Chief Executive Officer at Por- tera where he led the growth of an early stage private SaaS company focused on delivering applications to the pro- fessional services industry. Previously, Gary was Vice President and General Manager at Sybase. Gary was also Manager of Market Development at Sun Microsystems. Gary started his career at Hewlett-Packard as a Product Manager and Software Engineer. He holds a BS in Computer Science from Washington State University. Amit is Chief Executive Officer at Tenable Network Security, which he joined in January 2017. Prior to his current position, Amit was promoted to President from Senior Vice President of Product at RSA Security. Previously, Amit was Chief Executive Officer at NetWitness. He was also National Cybersecurity Director at the United States Depart- ment of Homeland Security, a Vice President of Worldwide Managed Security Services at Symantec, the Chief Exec- utive Officer at Riptech, and a member of the Computer Emergency Readiness Team in the United States Depart- ment of Defense. Amit is currently on the Board at Tenable Network Security and Invincea. Amit was previously on the Board at Guardium, Guidance Software, and Cyota. Amit holds a BS in Computer Science from United States Military Academy at West Point and an MS in Computer Science from George Washington University. Marc is a General Manager at IBM, a position he has held since January 2016. Marc focuses on security and he works with customers globally to advise them on security strategy and the development of new technologies to meet their goals. Prior to his current position, Marc has had several other roles at IBM including most recently as Vice President of Strategy, Marketing, and Product Management. Previously, Marc was Vice President of Marketing and Business Development at Consul Risk Management. Marc also worked for NeSBIC Venture Capital and Gemini Con- sulting. Marc holds a BA in Economics and Political Science from Bowdoin College and an MBA from Wharton School, University of Pennsylvania. Gary Steele, Chief Executive Officer, Proofpoint Amit Yoran, Chief Executive Officer, Tenable Network Security Marc van Zadelhoff, General Manager, IBM
Al in Cyber Security
Abstract: Despite increased enterprise security spending and layers of security technology, major breaches remain a seemingly daily occurrence. At the same time, the enterprise IT environment is evolving rapidly as organizations move their sensi- tive data and applications to the cloud, workforces become more mobile, and data analytics drive automated IT sys- tems. To combat the complexity of the modern enterprise threat environment, security companies are racing to stay one step ahead of the competition as well as the cybercriminals they defend against via organic development and inor- ganic acquisitions of so-called next generation technologies. Do we expect to replace some of them with AI? Simultaneously, the lack of skilled security resources employed by enterprises has led organizations and acquirers to place significant emphasis and value on services, analytics and automation. A number of forward leaning companies are leveraging data analytics and developing advanced systems capable of autonomously monitoring, identifying, and blocking malicious activity. During the panel, we will explore the potential of Advanced data analytics and AI, to en- hance the effectiveness of these cybersecurity systems while simultaneously removing the manual legwork required to maintain them. Our panel of experts will explore the question if AI can evolve to replace some of the more traditional technologies in- side solutions for Network Security, Endpoint Security, SaaS Security, User Behavior Analytics and more.
Market Statistics, Sizing/Growth:
The number of organizations that reported exploits of operational, embedded and consumer systems increased 152% YOY in 2015 (PwC). Theft of “hard” intellectual property increased 56% in 2015 57% of organizations in 2015 said that lack of skilled resources is a main challenge to information security, up from 54% in 2014 (EY)
On average organizations boosted their information security budgets by 24% in 2015 (PwC)
91% of organizations use advanced authentication techniques, According to PwC, 59% of organizations leverage big data analytics for cybersecurity. 61% of companies leveraging data-driven cybersecurity reported a better un- derstanding of external threats
The current scope of AI – assisting humans or replacing them?
To what extent can we solve more complex problems that were unsolvable before or are we mainly automating existing tasks? Which manual cybersecurity processes do you foresee becoming automated in the next 3-5 years? What are the most common shortfalls in trying to turn security analytics into action? How much can we rely on AI today? How much do clients completely entrust their security on artificial intelligence? Can we trust 100% AI modules (by machines) or do we need a person to moderate?
The role of academia in AI development for Cyber & is this different from “classic” cyber security?
Do we foresee AI powered hackers? Building sophisticated malware using AI?
Do we expect AI for finding vulnerabilities and penetration testing / hacking
How is the proliferation of data & applications to the cloud impacting the enterprise threats & AI ?
Are we expecting security war game that is actually Machine vs. Machine – AI defenders against AI attackers…
Al in Cyber Security
Dorit Dor, Vice President, Products, Check Point
Dorit is the Vice President of Products at Check Point Software Tech where she has worked since October 1995. Dor- it manages all product definition and development functions for both the enterprise and consumer divisions of the company. Dorit’s core responsibilities include leading the company’s product management, research and develop- ment and quality assurance initiatives from concept to delivery. Prior to her current role, Dorit was a Major in the Israel Defense Forces. Dorit holds a BA, MS in Computer Science, and a PhD in Computer Science all from Tel Aviv Univer- sity.
Alon Arvatz, Co-Founder, Chief Product Officer, Intsights
Alon is the Co-Founder and Chief Product Officer at Intsights since January 2015. Alon’s experience and knowledge is in the world of cyber threat intelligence. Prior to his current position, Alon was the Co-Founder and Chief Executive Officer at both Cyber School and Kanfey Kesef. Alon established Cyber School to provide teenagers with courses, seminars and workshops on cyber intelligence. Previously, Alon was a Cyber Intelligence Researcher for the Israel Defense Forces. Alon served in the most innovative and operational setting, he led and coordinated large cyber intelli- gence operations. Alon holds a BA in Accounting and Law from Tel Aviv University. Guy is the Co-Founder and Chief Executive Officer at Deep Instinct which he joined in 2014. Guy is a leading mathe- matician and a data science global expert. Prior to his current position, Guy was the President and General Manager of a leading division at Xura and Verint Group. Guy has 15 years of extensive experience in applying mathematics and machine learning in a technology elite unit of the Israel Defense Forces, financial institutions and intelligence or- ganizations around the world. Guy led some of the largest government cyber and big data projects in the world. Guy brings substantial management background in leading innovative technological challenges from research and devel- opment through commercialization. Guy holds a BS in Mathematics, an MS in Machine Learning, and an MBA from Hebrew University and Massachusetts Institute of Technology. Nicole has an extensive career in technology leadership with over 25 years of commercial and marketing expertise, turning fundamental ideas into real world products and helping companies scale. Nicole is Chief Executive Officer at Darktrace, where she has led the company since 2014, and rapidly grown it into a global leader in cyber defense. Darktrace’s machine learning and mathematical approach to cyber defense has won over 20 awards including World Economic Forum Technology Pioneer. Darktrace has raised over $90 million to fund its global expansion and now has 350 employees working across 22 countries. Prior to her current positon, Nicole was a Partner at Invoke Capital. Ni- cole previously held positions as Chief Marketing Officer at Autonomy, Senior Vice President of Marketing at Quest Software, Chief Marketing Officer at Peregrine Systems, and Senior Director of Strategic marketing at Oracle. Nicole was the winner of Female Executive of the Year at The Stevie Awards for Women in Business. Ann is the General Manager of Enterprise Cyber Security Group at Microsoft where she has worked since December 2015. Ann’s experience is in creating and leading software, SaaS, mobile and hardware sales teams. Prior to her cur- rent position, Ann was the Chief Executive Officer at Boundless Spatial. Previously, Ann was the President and Chief Operating Officer at Qualys. She also held several positions at RSA Security with her most recent being Vice Presi- dent of Global IPV and Accounts. She has held other sales positions at EMC and Data General. Ann is currently on the Board at HYPR. Ann holds a BS in Communication and Political Science from Weber States University. Greg is the Co-Founder and Chief Executive Officer at Jask which he started in September 2015. Greg’s focus is on cyber security with a passion for innovation, attracting and motivating strong teams to shift the balance of power in security from bad to good. Greg is also currently an Advisor to Acalvio Technologies. Prior to his current positions, Greg held multiple positions at ThreatStream most recently being Founder and Strategic Advisor. Previously, Greg has held multiple positions at ArcSight with the most recent being Practice Lead of Europe, the Middle East, and Afri- ca. Greg was actively involved battling cyber criminals as Technical Adviser to the FBI, the United States Secret Ser- vice, and NASA and consulted with numerous Fortune 500 companies. Greg was also Chief Information Security Of- ficer at Sentinel IPS. Guy Caspi, Co-Founder, Chief Executive Officer, Deep Instinct Nicole Eagan, Chief Executive Officer, Darktrace Ann Johnson, General Manager, Enterprise Cyber Security Group, Microsoft Greg Martin, Co-Founder, Chief Executive Officer, Jask LabsPage 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 Page 10 Page 11 Page 12 Page 13 Page 14 Page 15 Page 16 Page 17 Page 18 Page 19 Page 20 Page 21 Page 22 Page 23 Page 24 Page 25 Page 26 Page 27 Page 28 Page 29 Page 30 Page 31 Page 32 Page 33 Page 34 Page 35 Page 36 Page 37 Page 38 Page 39 Page 40 Page 41 Page 42 Page 43 Page 44 Page 45 Page 46 Page 47 Page 48 Page 49 Page 50 Page 51 Page 52 Page 53 Page 54 Page 55 Page 56 Page 57 Page 58 Page 59 Page 60 Page 61 Page 62 Page 63 Page 64 Page 65 Page 66 Page 67 Page 68 Page 69 Page 70 Page 71 Page 72 Page 73 Page 74 Page 75 Page 76 Page 77 Page 78 Page 79 Page 80 Page 81 Page 82 Page 83 Page 84 Page 85 Page 86 Page 87 Page 88 Page 89 Page 90 Page 91 Page 92 Page 93 Page 94 Page 95 Page 96 Page 97 Page 98 Page 99 Page 100 Page 101 Page 102 Page 103 Page 104 Page 105 Page 106 Page 107 Page 108 Page 109 Page 110 Page 111 Page 112 Page 113 Page 114 Page 115 Page 116 Page 117 Page 118 Page 119 Page 120 Page 121 Page 122 Page 123 Page 124 Page 125 Page 126 Page 127 Page 128 Page 129 Page 130 Page 131 Page 132 Page 133 Page 134 Page 135 Page 136 Page 137 Page 138 Page 139 Page 140 Page 141 Page 142 Page 143 Page 144 Page 145 Page 146 Page 147 Page 148 Page 149 Page 150 Page 151 Page 152 Page 153 Page 154 Page 155 Page 156 Page 157 Page 158 Page 159 Page 160 Page 161 Page 162 Page 163 Page 164 Page 165 Page 166 Page 167 Page 168 Page 169 Page 170 Page 171 Page 172 Page 173 Page 174 Page 175 Page 176 Page 177 Page 178 Page 179 Page 180 Page 181 Page 182 Page 183 Page 184 Page 185 Page 186 Page 187 Page 188 Page 189 Page 190 Page 191 Page 192 Page 193 Page 194 Page 195 Page 196 Page 197 Page 198 Page 199 Page 200
Made with FlippingBook - Online catalogs