May 9, 2018 – May 10, 2018 HUTTON HOTEL NASHVILLE, TN
The Millennium Alliance is thrilled to present our bi-annual Transformational CISO Assembly, taking place this year on May 9-10, 2018 at the Hutton Hotel in Nashville, TN.
With the instances of cyber attacks increasing, businesses of all sizes are working tirelessly to secure their networks, devices, and data. Fortune 500 organizations are especially vulnerable as they have big data pools and thousands of people who need access. CISOs need to plan for worst-case scenarios, stay ahead of latest IT Security transformation technology, and maintain their company’s information assets, all without losing sight of the corporate culture.
×Phyllis A. Schneck Managing Director and Global Leader of Cyber Solutions & Former Deputy Undersecretary for CyberSecurity, Department of Homeland Security, Promontory
Phyllis joined Promontory from the Department of Homeland Security, where she served as the deputy undersecretary for cybersecurity and communications and led responses to cybersecurity threats against corporations, civilians, and the government. During her DHS tenure, Phyllis led the defensive cybersecurity operational mission to mitigate and respond to cyberthreats across the federal civilian government and private sector. She supported the department’s mission of strengthening the security and resilience of the nation’s critical infrastructure, working with all areas of the department, government agencies, law enforcement, and the private sector. Phyllis led the transformation of signature technology applying analytics to the central cyber protection that the DHS provides to civilian agencies.
×Scott Crawford Research Director, Information Security, 451 Research
Scott Crawford is Research Director for the Information Security Channel at 451 Research, where he leads coverage of emerging trends, innovation and disruption in the information security market.
Well known as an industry analyst covering information security prior to joining 451 Research, Scott has experience as both a vendor and an information security practitioner. At IBM, Scott guided offering strategy and development with a primary focus on security intelligence for IBM Security Services. He is the former CISO of the Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO) International Data Centre in Vienna, Austria, where he pioneered the implementation of security policy and architecture for a non-governmental organization (NGO) serving more than 150 nations.
His experience includes systems and security management for leading organizations in both the private and public sectors, from Emerson to a division of the University Corporation for Atmospheric Research in Boulder, Colorado, focused on the collection, management and analysis of geophysical and meteorological data.
×Simon Carruthers Chief Operating Officer, 451 Research
Simon is a co-founder of The 451 Group. His duties include aligning the research agenda of The 451 Group's analysts with the demands of our target markets. This involves responsibility for the planning of our research efforts, based on qualitative work done with both our customers and our in-house staff, as well as operational responsibility for publishing research in accordance with that plan.
Prior to joining The 451 Group, Simon worked for ComputerWire in both the US and London. He has a BA in English Language and Literature from the University of Manchester.
×Patrick Daly Associate Analyst, IOT Security, 451 Research
As an Associate Analyst in 451 Research’s Information Security Channel, Patrick Daly covers emerging technologies in Internet of Things (IoT) security. His research focuses on different industrial disciplines of IoT security, including the protection of critical infrastructure, transportation and medical devices. In addition, Patrick’s coverage spans technological domains, including security for IoT devices, applications, platforms and networks.
Patrick is a 2015 graduate of Boston College, where he received a bachelor’s degree in Economics.
Tony Blackham is the Chief Information Security Officer at Ancestry. In this capacity, he leads the cybersecurity and compliance program to protect Ancestry’s 2.4 million paying subscribers and more than 2 million DNA samples. Previously, he ran the risk management and compliance function for a global not for profit organization, been a security consultant and served as a business information security officer.
×Vince Campitelli II Enterprise Security Specialist, Cloud Security Alliance
×Bill Russell Chief Information Security Officer, Cummins Inc.
Strategy and innovation Executive with a unique blend of Security Engineering & Operations, Risk Management, Financial Management, and Business Development expertise spanning a 30+ year career across the private and public sectors (Energy/Utilities, Department of Defense, Intelligence Community).
• Proactive, engaging leader with proven experience in building and motivating high-performing teams
• Accomplished corporate strategist with expertise in all aspects of business planning
• Exceptional customer relationship manager, applying the art of behavioral differentiation
• Keen ability to think, decide, and act efficiently and innovatively in ambiguous environments
Specialties: Cyber Security, Information Assurance, Emerging and Disruptive technologies; Information Technology (IT) applications; Information Operations (IO) policy and technologies, to include; Electronic Warfare (EW), Psychological Operations and Computer Network Attack/Exploitation; Space/Satellite acquisition and program management; Special Communications programs
Ms. Rhea Siers served for over thirty years in the US Intelligence Community including as Deputy Assistant Director for Policy at the National Security Agency (NSA). She has extensive operational and policy experience in a wide range of intelligence and cybersecurity matters. Rhea is on the faculty at both GWU and Johns Hopkins University where she teaches on intelligence, terrorism, and cybersecurity. She also served as Scholar In Residence at the Center for Cyber and Homeland Security at George Washington University (GWU). In November 2015, Rhea was honored as a “Cyber Trail Blazer” by The National Law Journal for her work on cybersecurity legal issues.
Rhea is the coauthor of two recent books: Cyberwarfare: Understanding the Law, Policy and Technology and The Theory and Practice of Terrorism: Alternate Paths of Inquiry. She currently serves as Senior Subject Matter Expert (Cyber) at RANE (Risk Assistance Network and Exchange) and as Special Counsel to the Cyber Practice at Zeichner, Ellman and Krause. Rhea is on the Editorial Board of The Journal of Law and Cyberwarfare and writes frequently on cyber and intelligence matters for The Cipher Brief.
×Dr. Ed Amoroso Chief Executive Officer, Tag Cyber LLC
Dr. Ed Amoroso is currently Chief Executive Officer of TAG Cyber LLC, a global cyber security advisory, training, consulting, and media services company supporting hundreds of companies across the world. Ed recently retired from AT&T after thirty-one years of service, beginning in Unix security R&D at Bell Labs and culminating as Senior Vice President and Chief Security Officer of AT&T from 2004 to 2016.
Ed has been Adjunct Professor of Computer Science at the Stevens Institute of Technology for the past twenty-seven years, where he has introduced nearly two thousand graduate students to the topic of information security. He is also affiliated with the Tandon School of Engineering at NYU as a Research Professor, and the Applied Physics Laboratory at Johns Hopkins University as a senior advisor. He is author of six books on cyber security and dozens of major research and technical papers and articles in peer-reviewed and major publications.
Ed holds the BS degree in physics from Dickinson College, the MS/PhD degrees in Computer Science from the Stevens Institute of Technology, and is a graduate of the Columbia Business School. He holds ten patents in the area of cyber security and media technology and he has served as a Member of the Board of Directors for M&T Bank, as well as on the NSA Advisory Board (NSAAB). Ed’s work has been highlighted on CNN, the New York Times, and the Wall Street Journal. He has worked directly with four Presidential administrations on issues related to national security, critical infrastructure protection, and cyber policy.”