trend micro directions17 - agenda (090517) word - trend micro directions17 - agenda (090517).docx...
TRANSCRIPT
Agenda: Tuesday May 16 Arrival, Check-‐in, Registration
7:00 – 9:00pm Welcome Reception
Agenda: Wednesday May 17 7:15 -‐ 8:45am Breakfast and “Birds of a Feather”
9:00 -‐ 10:00am Keynote Speaker Chris Hadfield -‐ Astronaut, Commander of the International Space Station, NASA Chief of Space Station Operations
10:00 -‐ 11:00am Featured Speaker Eva Chen -‐ Trend Micro CEO, co-‐Founder. Vision and Technology. IoT Demo
11:00 -‐ 11:30am Coffee Break
11:30 -‐ 12:45am Featured Speakers Mahendra Negi -‐ Trend Micro CFO Wael Mohamed -‐ Trend Micro President & COO Leah MacMillan -‐ Trend Micro SVP Global Marketing
12:45 -‐ 2:00pm Lunch 1:30 -‐ 3:15pm Expo
Product Experts & Demos Get the latest product demos, and speak with business and solution experts from:
• Trend Micro • AWS • Dropbox • Google (Cloud) • Microsoft • VMware
Technical Whiteboard Sessions Trend Micro technology subject matter experts will host a series of interactive, 30-‐minute educational whiteboard sessions that explain key technology principles and security issues and their implications as they relate to enterprise security, and will answer your questions. Topics are not Trend Micro-‐specific:
• Machine Learning • Cloud Security • Connected Threat Defense (Abstracts on last page)
3:15 -‐ 3:30pm Transition Break 3:30 -‐ 4:00pm Customer Panel A panel of executives from some of Trend Micro’s top customers will
discuss their key current and future security challenges. • Partha Panda -‐ VP, Corporate & Business Development, Trend Micro • Erik Dooper -‐ Head of Architecture, Randstad Global IT Solutions • Joe LoBianco -‐ VP, Information Security, CIBC • James Patterson Wicks, Senior Director, Infrastructure Security, Live
Nation Entertainment/Ticketmaster 4:00 – 6:30pm Free Time / Networking 6:30 – 11:00pm Dinner & Reception, San Antonio
Agenda: Thursday May 18 7:15 – 8:45am Breakfast and “Birds of a Feather” 9:00 -‐ 10:00am Featured
Speaker Theresa Payton -‐ Former White House CIO & Cybersecurity Authority; Respected authority on Internet Security, Data Breach and Fraud Mitigation; founder and CEO of cybersecurity consulting firm Fortalice Solutions
10:00 -‐ 10:45am Threat Panel Trend Micro threat experts will discuss and debate the rapidly evolving threat landscape, focusing on the emerging threats that are shaping enterprise security strategies.
• Steve Quane -‐ EVP, Network Defense (Panel Moderator) • Brian Gorenc -‐ Senior Manager, Vulnerability Research -‐ Zero Day Initiative • Mark Nunnikhoven -‐ Vice President, Cloud Research • Rik Ferguson -‐ Vice President, Security Research • Martin Roesler -‐ Senior Director Threat Research
10:45 -‐ 11:00am Transition Break 11:00 -‐ 12:00pm Hot Topic
Sessions #1 Select 1 of 5 of these parallel sessions
Subject matter experts -‐-‐ from Trend Micro and its customers, and analyst firm IDC -‐-‐ will profile the latest industry-‐specific issues and emerging threats, and discuss the business and compliance challenges that organizations are facing. 1. Healthcare: Reducing risk in the healthcare ecosystem 2. Ransomware: Don’t let them hold your data hostage
• Rik Ferguson -‐ Vice President, Security Research, Trend Micro • William Crank – CISO, MEDHOST
3. Critical Infrastructure: Securing critical systems and defending against attacks • Steve Povolny -‐ Senior Manager, Trend Micro, TippingPoint DVLabs • Steve Magers – Cyber Security, Sempra Energy
4. Cyber Security, a C-‐Level Priority: Strategies for selling and reporting security internally
• Eric Skinner, VP Trend Micro • James Patterson Wicks, Senior Director, Infrastructure Security, Live Nation
Entertainment/Ticketmaster • Frank Bunton – VP & CISO, MedImpact Healthcare Systems Inc.
5. General Data Protection Regulation: What you need to know about GDPR to do business in Europe
• Tracy Shouldice -‐ Director of Industry Analyst Relations, Trend Micro • Dominic Trott -‐ Research Manager, European Security, IDC • Lianne Harcup -‐ Director, Corporate Governance, Trend Micro
12:00 -‐ 1:00pm Lunch
Agenda: Thursday May 18 (continued) 12:30 -‐ 2:15pm Expo
Product Experts & Demos Get the latest product demos, and speak with business and solution experts from:
• Trend Micro • AWS • Dropbox • Google (Cloud) • Microsoft • VMware
Technical Whiteboard Sessions Trend Micro technology subject matter experts will host a series of interactive, 30-‐minute educational whiteboard sessions that explain key technology principles and security issues and their implications as they relate to enterprise security, and will answer your questions. Topics are not Trend Micro-‐specific:
• Machine Learning • Cloud Security • Connected Threat Defense (Abstracts on last page)
2:15 -‐ 3:15pm Hot Topic Sessions #2 Select 1 of 5 of these parallel sessions
Trend Micro product leaders will discuss the latest security challenges they’re addressing, our current solutions, and present our product roadmaps. 1. User Protection: Moving beyond ‘next-‐gen’ with advanced endpoint protection
• Wendy Moore -‐ Director of Solutions Marketing, Trend Micro • John Hermano -‐ VP, Product Management for Endpoint, Trend Micro
2. Network Defense: Protecting against known, unknown and undisclosed threats • Don Closser -‐ VP Engineering (TippingPoint), Trend Micro • Chris Taylor -‐ Director -‐ Product Marketing, Trend Micro
3. Cloud Security: Automating event-‐driven security in the cloud • Mark Nunnikhoven -‐ Vice President, Cloud Research, Trend Micro
4. Hybrid Cloud Security: Skip the slow lane with security designed for physical, virtual and public clouds, and containers
• Bryan Webster -‐ Sr. Solutions Architect, Trend Micro • Adam Boyle -‐ Dir of Product Mgt, Hybrid Cloud Security, Trend Micro
5. Connected Threat Defense: Discover how Trend Micro solutions seamlessly work together for greater visibility, and faster response
• Steve Duncan -‐ Sr. Manager, Product Marketing, Trend Micro • Eric Shulze -‐ Principal Sales Engineer, Trend Micro
3:15 -‐ 3:30pm Transition break 3:30 -‐ 4:00pm CISO Panel A panel of customer executives will share their reflections, key insights and takeaways
from Directions’17. • Hernan Armbruster -‐ VP Sales, Latin America, Trend Micro (Panel Moderator) • Kevin Miller -‐ CISO, Herman Miller • Carey Frey -‐ Chief Security Officer, Telus • Mike Turner – COO, Capgemini Global Cybersecurity Practice
4:00 -‐ 4:15pm Wrap-‐up 5:30pm–2:00am Closing Party and After-‐Party Receptions Agenda: Friday May 19 6:00am + Departures for Airport 7:30 – 9:00am Breakfast
Abstracts for Technical Whiteboard Sessions Hybrid Cloud Security Mark Nunnikhoven, Vice President, Cloud Research, Trend Micro
• Intro Session (30 mins): Putting the Pieces Together: Cloud service providers offer services that provide the blocks for you to build with in the cloud. Simply forklifting your current, on-‐premises designs into the cloud may be a good stop-‐gap, but it’s not your goal. Learn how these new pieces offer a new, more secure way of building.
• Advanced Session (30 mins): The New Operations Playbook: Learn how taking advantage of new cloud
services lets you change your approach to operations. Going “cloud native” can help you automate security response, reduce your overall risk, and help improve the efficiency of your solution delivery.
Machine Learning Jon Oliver, Director and Data Scientist, Trend Micro
• Intro Session (30 mins): Malware Detection with Machine Learning: Learn how security vendors use machine learning to detect malware, and gain a deeper understanding of its benefits for endpoint protection, and the circumstances that can lead to higher false positives.
• Advanced Session (30 mins): Machine Learning Directions: Learn how machine learning can be most
effectively deployed in a multilayered solution to better protect your enterprise from cybercriminals that use machine learning evasion techniques.
Connected Thread Defense Eric Shulze, Principal Sales Engineer, Trend Micro
• Intro Session (30 mins): Security Architectures, and Layered Security: Learn what an effective layered security approach looks like in today’s enterprise, and about the most common architectural mistakes that infosec professionals make in deploying it.
• Advanced Session (30 mins): Threat Intel Sharing -‐ Connected Threat Defense: Learn how threat
intelligence is shared between parts of a layered security architecture, about common industry threat intelligence sharing standards, and why having products that can share intelligence with each other helps your enterprise maximize the value of each layer.