arrow-circle-full-right arrow-circle-full-up arrow-circle-up arrow-down arrow-right calendar calendar-done facebook flickr home linkedin login pin reload search share signin star twitter video video youtube nav star-plus info signout double-arrow arrow-up checked
Telecoms, Media and Technology

FT Cyber Security Summit USA

Is America Losing the Cyber War?

Washington DC |
Speakers include:
John McAfee

John McAfee

MGT Capital Investments

Mary McCord

Mary McCord

US Department of Justice

Maureen Ohlhausen

Maureen Ohlhausen

Federal Trade Commission

Overview

Cyber security is a pressing concern for US government officials, business leaders and citizens, and will become more so as the online world develops. Policymakers, company executives and their information security teams are fighting back against the cyber attackers, but the onslaught continues, despite the valuable support they receive from technology solutions vendors, research institutes and consultants.

The internet of things will exacerbate the problem, with attackers able to disrupt more organisations and more people through more devices. At the same time, federal and governments are introducing new laws and regulations that require companies to do more to protect themselves, and their customers, from security breaches. While company bosses can see the need for tougher rules on data protection and personal privacy, these new rules create an additional burden. For instance, the EU/US Privacy Shield improves protection for Europe’s citizens whose data is kept on US servers, but it places strict obligations on American companies on how that data is processed and people’s privacy guaranteed.

FT Cyber Security Summit USA, now in its third year, will explore the cyber threats facing America, and what is being done to deal with them. Leading experts will talk about a range of issues, including measures to be taken by the new presidential administration, the responsibilities of corporate boards and senior management, data protection, technological innovation in cyber security, the pressures facing chief information security officers in banking and other critical infrastructure industries, national security concerns, cyber terrorism and the emerging threat posed by the Internet of Things. Speakers will grapple with the big question: Is America losing the cyber war? 

fallback
fallback Add to my Calendar 03/15/2017 08:00:0003/15/2017 18:00:00trueFT Cyber Security Summit USACyber security is a pressing concern for US government officials, business leaders and citizens, and will become more so as the online world develops. Policymakers, company executives and their information security teams are fighting back against the cyber attackers, but the onslaught continues, despite the valuable support they receive from technology solutions vendors, research institutes and consultants.The internet of things will exacerbate the problem, with attackers able to disrupt more organisations and more people through more devices. At the same time, federal and governments are introducing new laws and regulations that require companies to do more to protect themselves, and their customers, from security breaches. While company bosses can see the need for tougher rules on data protection and personal privacy, these new rules create an additional burden. For instance, the EU/US Privacy Shield improves protection for Europe’s citizens whose data is kept on US servers, but it places strict obligations on American companies on how that data is processed and people’s privacy guaranteed.FT Cyber Security Summit USA, now in its third year, will explore the cyber threats facing America, and what is being done to deal with them. Leading experts will talk about a range of issues, including measures to be taken by the new presidential administration, the responsibilities of corporate boards and senior management, data protection, technological innovation in cyber security, the pressures facing chief information security officers in banking and other critical infrastructure industries, national security concerns, cyber terrorism and the emerging threat posed by the Internet of Things. Speakers will grapple with the big question: Is America losing the cyber war? FT-Cyber-Security-Summit-USA8a3b604058d34f38907ef050f7d91b99MM/DD/YYYY

John McAfee on cyber espionage

Watch here

America under cyber attack

Watch here

FT Cyber Security Summit Portfolio

Learn more here

Testimonials

“It may have been the ultimate forum. Leading cyber-security experts from industry and government having topical conversations with knowledgeable investigative journalists serving as moderators who hit fast forward and went directly to the heart of the issues.”
- Timothy Masluk, CSO, BNY Mellon

“Insight from my peers around Cyber Security topics made this a great investment in time."
- Jeff Fawcett, Director, Cisco

“As a senior executive at a critical infrastructure company, I believe FT's cyber summit was one of the best of these that I've attended over the past year or so.”
- Anonymous

fallback

Speakers (20)

John McAfee

John McAfee

Executive Chairman and Chief Executive Officer
MGT Capital Investments

Cyber security and software pioneer John McAfee is Executive Chairman and Chief Executive Officer of MGT Capital Investments, which is in the process of acquiring a diverse portfolio of cyber security technologies. The company intends to change its corporate name to “John McAfee Global Technologies”. Mr McAfee began his career at NASA’s Institute for Space Studies from 1968 to 1970. He later contributed to various software and development projects with technology leaders such as Univac, Zerox, Computer Sciences Corporation, and consulting firm Booze Allan Hamilton. After working for Lockheed Martin he left to form McAfee Associates, the world’s first antivirus company. Two years after McAfee Associates went public, he sold his remaining stake in the company to Intel Corporation in August 2010. In 2016 he sought the office of President of the United States as a candidate of the Libertarian Party. He joined MGT Capital Investments in May 2016 and was subsequently appointed Executive Chairman and CEO in September and November respectively. Mr McAfee has a bachelor’s degree in mathematics from Roanoke College, which subsequently awarded him an honorary Sc.D degree in 2008.

Mary McCord

Mary McCord

Acting Assistant Attorney General for National Security
US Department of Justice

Mary B. McCord is the Acting Assistant Attorney General and Principal Deputy Assistant Attorney General for National Security at the US Department of Justice. Ms McCord oversees nearly 400 employees responsible for protecting the country against international and domestic terrorism, espionage, cyber, and other national security threats. She also works closely with the nation’s 93 United States Attorney’s Offices in the investigation and prosecution of national security matters in their districts. Ms McCord joined the National Security Division in 2014 from the US Attorney’s Office for the District of Columbia, where she served for nearly 20 years, most recently as the Criminal Division Chief. In that capacity, she supervised the prosecution of all criminal matters in federal district court. Ms McCord also served for more than five years as a Deputy Chief in the Appellate Division, where she supervised and argued hundreds of cases in the US and District of Columbia Courts of Appeals. Ms McCord graduated from Georgetown University Law School, and clerked for Judge Thomas Hogan of the US District Court for the District of Columbia.

Maureen Ohlhausen

Maureen Ohlhausen

Acting Chairman
Federal Trade Commission

Maureen K. Ohlhausen was sworn in as a Commissioner of the Federal Trade Commission in April 2012, and was designated to serve as Acting FTC Chairman by President Donald Trump in January 2017. Prior to joining the Commission she was a partner at Wilkinson Barker Knauer LLP, where she focused on FTC issues, including privacy, data protection and cyber security. Ms Ohlhausen previously served at the Commission for 11 years, most recently as Director of the Office of Policy Planning from 2004 to 2008, where she led the FTC's Internet Access Task Force. She was also Deputy Director of that office. From 1998 to 2001, she was an attorney advisor for former FTC Commissioner Orson Swindle, advising him on competition and consumer protection matters. She started at the FTC General Counsel’s Office in 1997. Before joining the FTC, Ms Ohlhausen spent five years at the US Court of Appeals for the DC Circuit, serving as a law clerk for Judge David B. Sentelle and as a staff attorney. She also clerked for Judge Robert Yock of the US Court of Federal Claims from 1991 to 1992. Ms Ohlhausen graduated with distinction from Antonin Scalia Law School, George Mason University in 1991 and graduated with honors from the University of Virginia in 1984. She was on the adjunct faculty at the Antonin Scalia Law School, George Mason University, where she taught privacy law and unfair trade practices. She served as a Senior Editor of the Antitrust Law Journal and a member of the American Bar Association Task Force on Competition and Public Policy. She has written a variety of articles on competition law, privacy, and technology matters.

Dmitri Alperovitch

Dmitri Alperovitch

Co-Founder and CTO
CrowdStrike

Dmitri Alperovitch is Co-Founder and CTO of CrowdStrike Inc, a leading provider of next- generation endpoint security, threat intelligence and incident response services. A renowned computer security researcher, he is a thought leader on cybersecurity policies and state tradecraft and has served as special advisor to the US Department of Defense. Prior to founding CrowdStrike, Mr Alperovitch was Vice President of Threat Research at McAfee, where he led the company’s global Internet threat intelligence analysis and investigations. In 2016, he revealed the suspected Russian intelligence agencies' hacking of the Democratic National Committee (DNC). In 2010 and 2011, he led the global team that investigated and brought to light the ground-breaking Operation Aurora, Night Dragon and Shady RAT cyber-espionage intrusions, and gave those incidents their names. In 2016, Politico Magazine featured Mr Alperovitch as one of the “Politico 50” influential thinkers, doers and visionaries transforming American politics. In 2013, he was selected as one of MIT Technology Review’s “Young Innovators under 35” (TR35), an award previously won by such luminaries as Larry Page, Sergey Brin, Mark Zuckerberg and Jonathan Ive. Mr Alperovitch was also named as Foreign Policy Magazine’s Leading Global Thinker for 2013, an award shared with Secretary of State John Kerry, Elon Musk and Jeff Bezos. He was the recipient of the prestigious Federal 100 Award for his contributions to federal information security in 2011, and was recognized in 2013 and 2015 as one of Washingtonian’s Tech Titans for his accomplishments in the field of cybersecurity. With more than a decade of experience in the field of information security, Mr Alperovitch is an inventor of 25 patented technologies and has conducted extensive research on reputation systems, spam detection, web security, public-key and identity-based cryptography, malware and intrusion detection and prevention. A recognized authority on cyber-espionage, cyber warfare, online organized criminal activity, and cybersecurity, Mr Alperovitch has worked as a subject matter expert with all levels of US and international policy makers, intelligence and law enforcement agencies on analyzing, investigating and profiling transnational organized criminal activities and cyber threats from terrorist and nation-state adversaries. Prior to joining McAfee, he led the research team and the Cloud Security business unit at Secure Computing. Mr Alperovitch holds a Master's degree in Information Security and a Bachelor's in Computer Science, both from Georgia Institute of Technology.

Joshua Corman

Joshua Corman

Director, Cyber Statecraft Initiative
Atlantic Council

Joshua Corman is the Director of the Cyber Statecraft Initiative at the Atlantic Council's Brent Scowcroft Center and a founder of iamthecavalry.org. He previously served as CTO for Sonatype, director of security intelligence for Akamai, and in senior research and strategy roles for The 451 Group and IBM Internet Security Systems. He co­founded @RuggedSoftware and @IamTheCavalry to encourage new security approaches in response to the world’s increasing dependence on digital infrastructure. His approach to security in the context of human factors, adversary motivations, and social impact has helped position him as one of the most trusted names in security. Mr Corman also served as an adjunct faculty for Carnegie Mellon’s Heinz College and on the 2016 HHS Cybersecurity Task Force.

Beth  Dugan

Beth Dugan

Deputy Comptroller for Operational Risk, Office of the Comptroller of the Currency
US Department of the Treasury

Beth Dugan is the Deputy Comptroller for Operational Risk at the Office of the Comptroller of the Currency (OCC), in the US Department of the Treasury. She oversees policy and examination procedures development addressing operational risk, bank information technology, cyber security and critical infrastructure, payments systems, and corporate and risk governance. She assumed these responsibilities in November 2014. Throughout her career at the OCC, Ms Dugan has held a variety of leadership roles in supervising large complex financial institutions as well as mid-size and community banks and technology service providers. She has significant examination experience in technology, operations, audit, Basel II, enterprise governance, systems integration, and credit, capital markets, and trading platforms. She also participated in the OCC’s initial reviews of major service providers based in India. She joined the OCC in West Virginia where she assisted in supervising all aspects of community and mid-size national banks throughout the southeastern and mid-Atlantic region. Prior to this she served as Examiner-In-Charge of Citizens Bank, in Providence, Rhode Island, where she managed a team of examiners covering all disciplines, activities, products and aspects of the bank. She is a commissioned National Bank Examiner and Certified Information Systems Auditor. She holds a master of business administration and a bachelor of arts in English and a master of business administration, both from West Virginia.

Jamil Farshchi

Jamil Farshchi

Chief Information Security Officer
The Home Depot

Jamil Farshchi is Vice President for IT and Chief Information Security Officer (CISO) for The Home Depot. He has overall responsibility for The Home Depot’s information security, data protection and vulnerability management and leads the company’s compliance activities. He brings more than 15 years of cyber security, risk management and technology experience to this role. Before joining The Home Depot, he was the CISO for Time Warner where he developed a federated, risk-based and frictionless security program that served as the benchmark for the media and entertainment industry. Prior to that, Mr Farshchi was the Vice President for Global Information Security at Visa Inc where he was responsible for protecting Visa’s consumer payment card transactions, supporting product innovation and growth, and ensuring Visa’s trust and security brand. He also held key security leadership roles at Los Alamos National Laboratory (LANL), Sitel Corp, Nextwave Wireless and the National Aeronautics and Space Administration (NASA). Mr Farshchi is a graduate of the University of Oklahoma and holds an MS from the Wharton School, University of Pennsylvania, and a PLD (Program for Leadership Development) from Harvard Business School.

Ron Green

Ron Green

EVP and Chief Security Officer
Mastercard

Ron Green is executive vice president and Chief Security Officer at Mastercard. He leads a global team that ensures the safety and security of the Mastercard network as well as internal and external products and services. He is responsible for corporate security, architecture and engineering, security event management and incident response. He also oversees cryptographic key management, business continuity, disaster recovery and emergency management.

Mr Green joined Mastercard in 2014 after serving as Deputy Chief Information Security Officer at Fidelity Information Services (FIS). There he led a team responsible for North American information security operations, including security architecture and engineering programs, security testing and governance. Prior to this he was Director, Investigation and Protections Operations at Blackberry where he was responsible for global cyber and physical investigations, security operations centers, network security architecture, technical surveillance countermeasures and threat intelligence programs. He also served as a senior vice president across several areas at Bank of America. Mr. Green has extensive experience working with international and federal law enforcement agencies both as a special agent in the United States Secret Service and as an officer in the United States Army. With the Secret Service, he worked on protection, and fraud investigations. He was one of the first agents to receive formal training on seizing and analyzing electronic evidence, and worked on a number of international cyber-crime investigations. Mr Green serves on several advisory councils including the Financial Services – Information Sharing and Analysis Center (FS-ISAC) and the Overseas Security Advisory Council. He holds a bachelor’s degree in mechanical engineering from the United States Military Academy at West Point; is a graduate of the FBI’s Domestic Security Executive Academy; and holds a graduate certification in Information Assurance from George Washington University. 

Kevin Jacobsen

Kevin Jacobsen

Executive Director, Fraud Investigation & Dispute Services (FIDS)
Ernst & Young LLP

Kevin Jacobsen leads the FIDS Forensic Technology and Cyber Investigations team of Ernst & Young LLP, which assists clients in responding to, investigating and remediating cyber incidents. Prior to EY, Mr Jacobsen served 34 years in the US Air Force, retiring in the permanent rank of Brigadier General. His military career culminated as the Commander of the US Air Force Office of Special Investigations, the Air Force’s worldwide federal law enforcement and investigative agency, operating at over 265 locations around the globe. He had spent the majority of his military career at the Office, as a special agent conducting and supervising felony-level criminal, fraud, cyber and counterintelligence investigations and operations. Mr Jacobsen also led the Defense Cyber Crime Center; the Department of Defense’s most advanced capability to confront cyber threats. The Center is an IT/Information Assurance leader supporting major investigative and intelligence clients via high-end multimedia forensics lab services; research, development, cyber training, testing and evaluation, analytics, and intrusion forensics.

Richard Ledgett

Richard Ledgett

Deputy Director
National Security Agency

Richard Ledgett serves as the Deputy Director and senior civilian leader of the National Security Agency (NSA). In this capacity he acts as the agency's chief operating officer, responsible for guiding and directing studies, operations and policy. He led the NSA Media Leaks Task Force from June 2013 to January 2014, and was responsible for integrating and overseeing the totality of NSA's efforts surrounding the unauthorized disclosures of classified information by a former NSA affiliate. Mr Ledgett began his NSA career in 1988 and has served in operational, management and technical leadership positions at the branch, division, office, and group levels. From 2012 to 2013 he was the Director of the NSA/CSS Threat Operations Center, responsible for round-the-clock cryptologic activities to discover and counter adversary cyber efforts. Prior to NTOC he served in several positions from 2010 to 2012 in the Office of the Director of National Intelligence in both the collection and cyber mission areas. He was the first National Intelligence Manager for Cyber, serving as principal advisor to the Director of National Intelligence on all cyber matters, leading development of the Unified Intelligence Strategy for Cyber, and coordinating cyber activities across the Intelligence Community (IC). Previous positions at NSA include Deputy Director for Analysis and Production (2009-2010), Deputy Director for Data Acquisition (2006-2009), Assistant Deputy Director for Data Acquisition (2005-2006), and Chief, NSA/CSS Pacific (2002-2005). He also served in a joint IC operational activity, and as an instructor and course developer at the National Cryptologic School. Mr Ledgett spent nearly 11 years in the US Army as a SIGINTer and, between the Army and NSA, has completed six field tours. Mr Ledgett has an undergraduate degree in psychology and a graduate degree in strategic intelligence. He has taken additional graduate coursework in engineering, computer science, and business, and served as adjunct faculty at both the National Cryptologic School and the Joint Military Intelligence College. His civilian awards include both the Distinguished and Meritorious Executive Presidential Rank Awards, the NSA Exceptional Civilian Service and Meritorious Civilian Service Awards, and the National Intelligence Superior Service Medal.

Stuart Madnick

Stuart Madnick

Professor of Information Technology, MIT Sloan School of Management
Massachusetts Institute of Technology

Professor Stuart Madnick is Director of the Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity (IC3) at Massachusetts Institute of Technology (MIT). He is also Professor of Information Technology at MIT Sloan School of Management. He has been a faculty member at MIT since 1972 and has served as the head of MIT's Information Technologies Group for more than 20 years. He has been involved in cyber security research since 1979. Apart from cyber security, his other research interests include connectivity among disparate distributed information systems, database technology, software project management, and the strategic use of information technology. Prof Madnick has been active in industry, making contributions as a key designer and developer of projects such as IBM's VM/370 operating system and Lockheed's DIALOG information retrieval system. He has served as a consultant to major corporations, such as IBM, AT&T, and Citicorp. He has also been the founder or co-founder of several high-tech firms, including Intercomp (acquired by Logicon), Mitrol (acquired by General Electric's Information Systems Company), Cambridge Institute for Information Systems (subsequently re-named Cambridge Technology Group), iAggregate (acquired by ArsDigita which was subsequently acquired by Red Hat), and currently operates a hotel in the 14th century Langley Castle in England. Prof Madnick is the author or co-author of over 380 books, articles, or technical reports including the classic textbook, Operating Systems (McGraw-Hill), and the books, The Dynamics of Software Development (Prentice- Hall) and Computer Security (Academic Press). He has degrees in Electrical Engineering (B.S. and M.S.), Management (M.S.), and Computer Science (Ph.D.) from MIT. He has been a Visiting Professor/Scholar at Harvard University, Nanyang Technological University (Singapore), University of Newcastle (England), Technion (Israel), Victoria University (New Zealand), University of Edinburgh (Scotland), Conservatoire National des Arts et Métiers (Paris, France), and the European Research Consortium for Informatics and Mathematics (Nice, France).

Jeanette Manfra

Jeanette Manfra

Acting Deputy Under Secretary for Cybersecurity, National Protection and Programs Directorate
Department of Homeland Security

Jeanette Manfra is the Acting Deputy Under Secretary for Cybersecurity and Communications in the National Protection and Programs Directorate (NPPD) of the Department of Homeland Security (DHS). As such, she is the chief cyber security official in the DHS and supports its mission of strengthening the security and resilience of the nation's critical infrastructure. Ms Manfra is also the permanent Director for Strategy, Policy, and Plans in the NPPD. Prior to her current position, she was the Senior Counselor for Cybersecurity to the Secretary of Homeland Security. Previously, she was the Director for Critical Infrastructure Cybersecurity on the National Security Council staff at the White House. At the DHS she has held multiple positions in the Office of Cybersecurity and Communications, including advisor for the Assistant Secretary for Cybersecurity and Communications and Deputy Director, Office of Emergency Communications, during which time she led the Department’s efforts in establishing the Nationwide Public Safety Broadband Network. Before joining the DHS, Ms Manfra served in the US Army as a communications specialist and a Military Intelligence Officer.

Jenny Menna

Jenny Menna

SVP, Security Intelligence, Engagement and Awareness
US Bank

Jenny Menna is Senior Vice President for Security Intelligence, Engagement and Awareness at US Bank. She leads collaboration initiatives with industry and government to advance the cyber security position of the bank, and the financial sector as a whole. She also leads US Bank’s information systems security intelligence, cyber exercise, education and awareness, and business line information security officer teams. Her industry leadership roles include the Global Cybersecurity Alliance Strategic Advisory Committee, the Financial Top Level Domain Board of Directors, the Risk Committee of Early Warning Services, and the Financial Services Information Sharing and Analysis Center’s (FS-ISAC) Threat Intelligence Committee. Ms Menna brings 20 years experience in leadership roles in cyber security, information sharing, systems development and integration and critical infrastructure protection. Prior to joining US Bank she held a variety of senior leadership positions in the Department of Homeland Security division responsible for securing federal civilian, state and local government and critical  infrastructure networks, as well as for coordinating cyber incident response. She was selected for the Senior Executive Service in 2009. Ms Menna received both her Bachelors and Masters degrees from the University of Chicago, and served as Career Chairman and Board Member for the DC Alumni organization. She is a Certified Information Security Manager (CISM).

Essye Miller

Essye Miller

Chief Information Security Officer
US Department of Defense

Ms. Essye Miller is the Chief Information Security Officer (CISO) and a member of the Senior Executive Service in the Department of Defense (DoD). She is responsible for ensuring the DoD’s Chief Information Officer (CIO) has a well- defined and well-executed cyber security program. She is responsible for coordinating cyber security standards, policies, and procedures with other federal agencies, coalition partners, and industry. She was previously the Director of Cybersecurity for the Army Chief Information Officer (CIO)/G-6. She was also the Army's Senior Information Assurance Officer and therefore was responsible for the development, implementation, execution, and oversight of the Army's Cybersecurity Program. From November 2010 until August 2014, M. Miller served as the Director of Information Management and the Headquarters Air Force Chief Information Officer, Office of the Administrative Assistant to the Secretary of the Air Force in Washington DC. She also chaired the Architecture Configuration Control Board as part of the Pentagon Area CIO Council. Before 2010, Ms Miller served in various leadership positions throughout the Air Force, including the Air Force Communication and Information Center, Air Force Office of Warfighting Integration and Chief Information Office at the Pentagon, Air Combat Command at Langley Air Force Base, and the 75th Communications and Information Directorate and Deputy Chief Information Officer at Hill Air Force Base in Ogdon, UT.  She earned her Bachelor of Arts degree from Talladega College, a Master of Business Administration Degree from Troy State University, and a Master of Strategic Studies from Air University at the Air War College. Additionally, she is Acquisition Level III certified in Information Technology. She is a member of Armed Forces Communications and Electronics Association (AFCEA).

Chris Porter

Chris Porter

Vice President and Chief Information Security Officer
Fannie Mae

Christopher Porter is the CISO for Fannie Mae. In this role, he helps to communicate the importance of information security across the enterprise and to mature and innovate Fannie Mae’s defense and response capabilities. He has over 15 years of experience in IT and security industries. His background includes work as an economist, network and system administration, information security consultant and researcher. In his previous role at Verizon, Mr Porter was a lead analyst and author of Verizon’s Data Breach Investigations Report series. He was also the co-creator of the VERIS Framework (Vocabulary for Event Recording and Incident Sharing) which allows organizations to collect and report security incident metrics in a standard and repeatable manner. Mr Porter has a bachelor’s degree in Economics and Psychology from the University of Virginia. He also earned his master’s degree in Management of Information Technology from the University of Virginia’s McIntire School of Commerce. He is a member of the Advisory Board for the McIntire School of Commerce MS in MIT Advisory Board at the University of Virginia as well as the Board of Directors at the FAIR Institute.

Edward Ryan

Edward Ryan

Executive Vice President
Marriott International

Edward Ryan, EVP and General Counsel, Marriott International Edward Ryan is Executive Vice President and Global General Counsel of Marriott International. He manages a global Law Department located in over a dozen offices worldwide, works closely with the Board of Directors and senior management, and is part of the governance structure for all major financial and policy decisions. Since becoming General Counsel, Mr Ryan has led the restructuring of the Law Department to become more locally focused and agile in regions outside the US, and helped lead the company to become the world’s largest hotel company, through organic growth and mergers and acquisitions, most recently with Starwood Hotels and Resorts, fueling overall growth of owned, managed and franchised hotels from 3,000 to 5,700 properties, and a global footprint growth from 70 to 110 countries and territories. Mr Ryan graduated from the University of Pennsylvania Law School, cum laude, in 1978, and the University of Pennsylvania College, summa cum laude, in 1975.

William Saito

William Saito

Special Adviser, Prime Minister
Government of Japan

William Saito is a Special Adviser to the Prime Minister of Japan, and a Member of the Global Agenda Council on Cyber Security at the World Economic Forum. One of Nikkei’s “100 Most Influential People in Japan,” he took his first serious job (programming software for a major corporation) while in middle school. A decade later he incorporated his own company, was named Entrepreneur of the Year in 1998, and became an authority on encryption, biometric authentication and cyber security. In 2004 he sold his company to Microsoft, moved to Tokyo, and founded InTecur, venture capital company that identifies innovative technologies and helps entrepreneurs maximise their potential. After the Fukushima nuclear disaster, Mr Saito was named Chief Technology Officer of the Fukushima Nuclear Accident Independent Investigation Commission. In 2012, he was appointed to a council on national strategy which reported directly to the Prime Minister. At the World Economic Forum, besides being a member of the Global Agenda Council on Cyber Security he is also a Foundation Board Member and a Young Global Leader. He advises several national governments. In Japan, he has worked with METI, MIC, MEXT, MLIT, the Japan Society for the Promotion of Science, and the Information Technology Promotion Agency, among others. A popular lecturer at various universities, he frequently appears on TV, sits on the boards of several companies, and is the author of several newspaper columns and numerous publications. His hit management book, The Team: Solving the Biggest Problem in Japan (Nikkei BP) was a best-seller last year, and his autobiography, An Unprogrammed Life: Adventures of an Incurable Entrepreneur, appeared in 2011 (John Wiley).

George Smirnoff

George Smirnoff

CISO, Information Security & Technology Risk
Comerica

George Smirnoff is Chief Information Security Officer, Information Security & Technology Risk, at Comerica. The bank is headquartered in Dallas, Texas, and has offices in several other states, as well as in Mexico and Canada. Mr Smirnoff is an influential cyber security and information technology executive in the financial services sector. He directs all information security and technology risk functions for Comerica, leading multiple organizations focused on information security, business resilience, disaster recovery, information lifecycle management, and IT governance, risk, and compliance. He has multiple advisory roles in both the public and private sector: he is a member of the Executive Committee of the Financial Services Sector Coordinating Council (FSSCC); a member of the CISO Advisory Council for the Department of Homeland Security, Science and Technology Directorate; and a member of the Board Enterprise Risk Committee for The Clearing House. Before joining Comerica he held leadership positions at Morgan Stanley and Ernst & Young. He has a JD from the Cleveland-Marshall College of Law, an MBA from Cleveland State University, a BA from Bucknell University, and has completed the Goizueta Executive Program at Emory University. He is also a Certified Information Systems Security Professional (CISSP) and a member of the Ohio Bar.

Trent Teyema

Trent Teyema

Section Chief, Cyber Readiness Section
Federal Bureau of Investigation

Trent Teyema is the Section Chief of the Cyber Readiness Section at the Federal Bureau of Investigation (FBI). Before his current position he was the Special Agent in Charge of Counterintelligence and Cyber for the FBI’s Los Angeles Field Office, and before that he was a Supervisory Inspector in the Inspection Division at FBI Headquarters. Other previous assignments at the Bureau include serving as the first Cyber Assistant Special Agent in Charge (ASAC) at the Washington Field Office (WFO). In this role, he established WFO’s Cyber Branch, which was responsible for all cyber, intellectual property rights, crimes against children, and digital forensics investigations in Washington DC and Northern Virginia. Mr Teyema has previously served as the Director of Cybersecurity Policy on the National Security Council, where he was responsible for the formulation and execution of cyber security policy. He also established the FBI’s National Cyber Investigative Joint Task Force (NCIJTF), which coordinates and investigates some of the most serious cyber threats to the national and economic security of the United States. He joined the FBI in 1995 and was first assigned to the Los Angeles Field Office, where he worked on cyber and national security matters.  He received the FBI Director’s Award for Excellence in Technology Innovation in 2010, and was nominated for the award a second time in 2013. Mr Teyema has taught and lectured extensively on information security, infrastructure protection, and digital forensics. He has a Master of Forensic Science (MFS) from The George Washington University and is an adjunct faculty for the FBI Academy in Quantico, Virginia.  He is a Certified Information Security Manager (CISM), is Certified in Risk and Information Systems Control (CRISC), and is an ethics and compliance officer certified by ECI as a Leading Professional in Ethics & Compliance (LPEC).  

Spencer Wilcox

Spencer Wilcox

Director of Security Strategy, Risk and Cyber Assurance
Exelon
fallback

Chair and Moderators (3)

Gillian Tett

Gillian Tett

US Managing Editor
Financial Times

Gillian Tett serves as US Managing Editor, leading the Financial Times’ editorial operations in the region across all platforms. She writes weekly columns for the FT, covering a range of economic, financial, political and social issues throughout the globe. Ms Tett previously served as Assistant Editor, US Managing Editor from 2010 to 2012, and prior to this Assistant Editor responsible for the FT’s markets coverage. Other roles at the FT have included Capital Markets Editor, Deputy Editor of the Lex column, Tokyo Bureau Chief, Tokyo Correspondent, London-based economics reporter and a reporter in Russia and Brussels.

In 2014, she was named Columnist of the Year in the British Press Awards and also received the Royal Anthropological Institute Marsh Award. Ms Tett's latest book is The Silo Effect: Why Putting Everything In Its Place Isn't Such A Bright Idea (Simon & Schuster, 2015). She is the author of New York Times bestseller Fool’s Gold: How Unrestrained Greed Corrupted a Dream, Shattered Global Markets and Unleashed a Catastrophe (Little Brown, UK and Simon and Schuster, US, 2009) and Saving the Sun: A Wall Street Gamble to Rescue Japan from Its Trillion Dollar Meltdown (Harper Collins, 2003). Before joining the FT in 1993, Ms Tett was awarded a PhD in Social Anthropology from Cambridge University, where she also earned her Bachelor’s degree.

Hannah Kuchler

Hannah Kuchler

San Francisco Correspondent
Financial Times

Hannah Kuchler is a San Francisco Correspondent for the Financial Times, writing about technology with a particular focus on cyber security and social media. She enjoys telling the story of the Silicon Valley to the FT's broad international audience, wading through the complex world of cyber security to warn about the threats and attacks faced by companies and the new generation of start ups springing up to protect them. Ms Kuchler has worked for the FT for six years in the US, Europe and Asia, covering everything from Chinese Internet companies to British politics.

David Lynch

David Lynch

Enforcement Correspondent,
Financial Times

David J. Lynch is the Financial Times’ Washington-based Enforcement Correspondent. Previously, he was the Cyber Security Editor at Politico and a senior writer with Bloomberg News focusing on the intersection of politics and economics. He followed the global economy for USA TODAY, where he was the founding Bureau Chief in both London and Beijing and covered the wars in Kosovo and Iraq, the latter as an embedded reporter with the US Marines. He was the paper’s first recipient of a Nieman fellowship at Harvard University, and is the author of When The Luck Of The Irish Ran Out: The World’s Most Resilient Country and Its Struggle to Rise Again.

2017 Summit Photos

Screen Shot 2017-03-24 at 4.37.06 PM

To view this year's photos please click here.

fallback

Agenda - 15th Mar

  • 8:00am
    Registration and breakfast
  • 9:00am
    Chair's Opening Remarks

    Gillian Tett, US Managing Editor, Financial Times

  • 9:10am
    Keynote address: Protecting Our National Assets

    Mary McCord, Acting Assistant Attorney General for National Security, US Department of Justice

  • 9:35am
    Panel Framing Presentation: Corporate Security and the Role of the Board, Senior Management and Security Team

    Kevin Jacobsen, Executive Director, Cyber Investigation & Forensics, Fraud Investigation & Dispute Services, EY

  • 9:45am
    Panel: Corporate Security and the Role of the Board, Senior Management and Security Team

    Board directors and senior management teams now realize that cybercrime is a major strategic issue, and can even be an existential threat. They are therefore providing additional financial, operational, technological and moral support to their information security teams and others in the frontline to help them deter, detect and respond to attacks. Company defenses are certainly more expensive and sophisticated than before, but they are still being breached, and sometimes all to easily.

    • Is America losing the cyber war? If yes, why? If not, why not?
    • What new protective measures should be considered by the Trump administration?
    • Which types of attack, and attacker, are the hardest to defend against? What are the best new forms of defense against such attacks? What are the latest technological developments in cyber warfare and defense?
    • What are companies doing to enlist outside support, not only from federal and state departments and agencies, but also software vendors, research organizations, policy institutes and consultants? What difficulties do they face in gaining government support?
    • What should be done to address the lack of security awareness and technology skills in the workforce?

    Kevin Jacobsen, Executive Director, Cyber Investigation & Forensics, Fraud Investigation & Dispute Services, EY
    Jeanette Manfra, Acting Deputy Under Secretary for Cybersecurity, National Protection and Programs Directorate, Department of Homeland Security
    Spencer Wilcox, Director of Security Strategy, Risk and Cyber Assurance, Excelon; Member of the Board, Cybersecurity Association of Maryland, Inc. (CAMI)

    Moderator: Hannah Kuchler, San Francisco Correspondent, Financial Times

  • 10:25am
    Networking Break
  • 10:50am
    On-stage interview: State-sponsored Intrusions – How to Identify Them, How to Stop Them

    In June 2016, CrowdStrike exposed alleged efforts by Russian intelligence services to interfere in the US presidential election through the hacking and subsequent leaking of information from political organizations and individuals. This type of targeted intrusion activity is not new for nation states looking to protect and advance their security, economic, and diplomatic interests. In this dynamic session, Dmitri Alperovitch, CrowdStrike’s CTO and Co-founder, will discuss the common anatomy of nation state cyber campaigns, how to protect against them, and what to expect in the coming year from the most notable threat actors.  

    Dmitri Alperovitch, Co-Founder and Chief Technology Officer, CrowdStrike

    In Conversation With: Gillian Tett, US Managing Editor, Financial Times

  • 11:20am
    Presentation: Transatlantic Cooperation On Personal Privacy And Data Protection – The EU/US Privacy Shield

    The European Union and US agreed a new framework for transatlantic data flow – the EU/US Privacy Shield – which came into effect on 1 August 2016. The agreement includes a requirement that American companies wishing to import data from Europe meet new obligations on how personal data is processed and individual rights are guaranteed.

    • The verdict so far – is the Privacy Shield working as intended? What difficulties are American companies facing in complying with the Privacy Shield, which in the US is operated by the Department of Commerce and enforced by the Federal Trade Commission?
    • The Privacy Shield also includes limitations, safeguards and oversight mechanisms protecting the rights of EU citizens during US government law enforcement and national security investigations. Are there any signs that this is hampering the activities of US law enforcement and national security agencies?
    • The impact of Brexit – will Britain still be included in the Privacy Shield when it leaves the EU?
    • The Privacy Shield provides mechanisms for EU citizens to seek redress for violations of the agreement and for annual reviews of the agreement. Have there been any cases of EU citizens seeking redress so far? What issues are likely to be included in the first annual review?
    • Could the Privacy Shield, combined with the EU’s General Data Protection Regulation, turn Europe into a data backwater?
    • What obligations does the US place on EU public authorities and companies when importing and processing personal data from the US?
    • Do similar data protection agreements exist between the US and other countries?

    Maureen Ohlhausen, Acting Chairman, Federal Trade Commission

  • 11:45am
    Panel: Cyber Warfare in the Financial Sector

    Attacks on banks and other financial firms are increasing in volume and seriousness. The $81m theft from the central bank of Bangladesh, and the Securities and Exchange Commission’s revelation that 74% of investment advisers in one examination had suffered cyber attacks, dramatically illustrate the scale of the problem.

    • Who are the aggressors, what are their motives and what methods do they use?
    • What are battle-hardened banks, investment managers and others in the financial sector doing to defend themselves better?
    • Given that crime can never be totally defeated, only contained, what should the financial sector’s war aims be? How should “victory” be defined, and what would a “safe” cyberspace look like?

    Beth Dugan, Deputy Comptroller for Operational Risk, Office of the Comptroller of the Currency, US Department of the Treasury
    Ron Green, Chief Security Officer, MasterCard
    Jenny Menna, SVP, Security Intelligence, Engagement and Awareness, US Bank

    Moderator: Hannah Kuchler, San Francisco Correspondent, Financial Times

  • 12:30pm
    Lunch
  • 1:30pm
    Panel framing presentation: National Security on the Line

    Richard Ledgett, Deputy Director, National Security Agency

  • 1:40pm
    Panel Session: National Security on the Line

    Multiple US intelligence agencies and organizations are working overtime to protect the nation from cyber attack with a large degree of success – but more needs to be done.

    • What is the nature and scale of the cyber threat to national security?
    • How is the US intelligence community – in particular the Department of Defense, the CIA and the FBI – responding to those threats and could they do better? How do they co-ordinate their efforts?
    • Keeping up with technological innovation – as attackers become more technologically sophisticated, how must the intelligence agencies respond?

    Richard Ledgett, Deputy Director, National Security Agency
    Essye Miller, Chief Information Security Officer, US Department of Defense
    Trent Teyema, Section Chief, Cyber Readiness Section, Federal Bureau of Investigation

    Moderator: David Lynch, Enforcement Correspondent, Financial Times

  • 2:20pm
    Panel: The Internet of Things – Attack Vulnerabilities and Solutions

    The growth in the Internet of Things (IoT) is allowing attackers to broaden their horizons. The problem will only get worse as more people and companies use more equipment connected to the internet, such as cars, heating systems, security cameras and industrial control systems.

    • Hype versus reality – is the cyber threat posed by the IoT largely imagined or real?
    • Where do the biggest threats come from now, and where will they come from five years from now?
    • Are manufacturers doing enough to build adequate security into their IoT equipment? What is their legal liability in the event of a successful cyber attack on a manufacturer’s equipment?

    Joshua Corman, Director, Cyber Statecraft Initiative, Atlantic Council
    Stuart Madnick, Director of the Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity and Professor of Information Technology, MIT Sloan School of Management, Massachusetts Institute of Technology
    Chris Porter, VP & Chief Information Security Officer, Fannie Mae
    Edward Ryan, EVP and General Counsel, Marriott International

    Moderator: Hannah Kuchler, San Francisco Correspondent, Financial Time

  • 3:00pm
    Networking Break
  • 3:20pm
    Panel: Nightmare Scenarios – What Keeps Corporate CISOs Awake at Night?

    The role of the chief information security officer (CISO) in a company’s security strategy and operations has never been so vital. The CISO is responsible for protecting the company in an increasingly insecure world.

    • What are the most difficult types of cyber attack to defend against?
    • Who poses the greatest threat to your company – terrorists, foreign governments, organized criminal gangs, individual fraudsters, denial-of-service hackers or some other group or individual? Should the new US president’s administration do more to help corporate America?
    • What are the commonest weak-links in corporate cyber security, such as a lack of security awareness and skills ? How do you identify and rectify those weaknesses?
    • What makes a good CISO?

    Lou Bladel, Executive Director, Fraud Investigation & Dispute Services, EY
    Jamil Farshchi, Vice President and CISO, The Home Depot
    William Saito, Special Advisor to the Prime Minister, Government of Japan; and Member, Global Agenda Council on Cyber Security, World Economic Forum
    George Smirnoff, CISO, Information Security & Technology Risk, Comerica

    Moderated by: David Lynch, Enforcement Correspondent, Financial Times

  • 4:00pm
    Closing Keynote Interview: Maintaining the Technological Upper Hand

    Recent attacks have proved two certainties: hackers are becoming more sophisticated, and many targets are ill-equipped or unprepared to protect themselves. John McAfee, the anti-virus software pioneer, shares his thoughts on the cyber security landscape and discusses the need for solutions to evolve in order to counter the new weapons being developed and used by cyber aggressors.

    John McAfee, Executive Chairman and Chief Executive Officer, MGT Capital Investments

    Interviewer: Hannah Kuchler, San Francisco Correspondent, Financial Times

  • 4:30pm
    Closing Remarks
  • 4:35pm
    Networking Drinks Reception

Why Attend?

  • Find out from board directors and senior managers in major US corporations what their biggest concerns are in cyberspace
  • Discover what businesses are doing to develop and implement new and improved cyber security strategies
  • Hear from federal and state officials what they are doing to combat cyber crime in the public and private sectors
  • Meet leading cyber security experts
  • Listen to financial services practitioners describe the threats they face and the counter measures deployed
fallback

Who Attends?

Sectors:

  • Businesses – especially Critical Infrastructure Companies in sectors such as Financial Services, Energy, Telecommunications, Water and Transport.
  • Policymakers – Federal, State and Foreign governments; Supranational Bodies.
  • Public Sector Organizations – Police, Security and Intelligence Services, Healthcare, Emergency Services, Industry Regulators 
  • Service Providers – Software Vendors, Telecommunications Companies, Law Firms, Consultancies.
  • Other Influencers – NGOs, Universities, Research Institutes, Industry Associations

Titles:

  • Chief Executive Officer
  • Chief Information Officer, Chief Technology Officer, IT Director
  • Chief Security Officer, Chief Information Security Officer, Director of Security/Information Security/Digital Security
  • Chief Risk Officer, Chief Compliance Officer, Director of Risk/Crisis Management/Business Continuity Planning
  • Head or Director of Fraud Prevention/Intelligence/Forensics/Investigations
  • Chief Financial Officer
  • General Counsel, Head of Legal Affairs, Chief Legal Officer
  • HR Director
  • Network Architect, Head of Database Systems/Cloud Computing
fallback

Past Attendees

Past FT Cyber Security Summit USA Attendees Included:

Aflac AIG Akin Gump Strauss Hauer & Feld Alcatel-Lucent American Civil Liberties Union (ACLU) Ann Inc. AOL Bank of America Bank of New York Mellon Barclays Bloomberg CA Technologies Cargill Center for Audit Quality Cisco Citigroup Columbia University ConEdison CrowdStrike CVS Health Darktrace Deloitte & Touche Deutsche Bank E*Trade Embassy of Canada Ernst & Young Federal Bureau of Investigation FedEx Ford Motor Company Fortune Freddie Mac Freshfields Bruckhaus Deringer GE Capital Google Haliburton Hill and Knowlton Strategies Hogan Lovells Horizon Blue Cross Blue Shield of New Jersey Huawei Technologies USA IBM International Monetary Fund JP Morgan Chase Kelley Drye Liberty Mutual Insurance Lockheed Martin Mayer Brown McGraw Hill Merck Microsoft Moody's MUFG Union Bank Nasdaq Palo Alto Networks PNC Financial Services Group PwC Ropes & Gray SAP Shearman & Sterling Sidley Austin Standard Chartered Bank T. Rowe Price Target The Carlyle Group The World Bank Time Warner Cable UBS United Rentals US Chamber of Commerce US Department of Defense US Department of Homeland Security US Department of Justice US Department of the Treasury US Navy Visa Wells Fargo WWE

fallback

Why Sponsor?

  • Gain access to corporate decision makers and experts looking for solutions to cyber security issues
  • Brand alignment with the FT and its unrivalled credibility
  • Demonstrate thought leadership around the current critical issues affecting business and cyber security strategy
  • Benefit from sustained international visibility through our advertising and marketing campaigns
fallback

Lead Sponsor (1)

About EY’s Fraud Investigation & Dispute Services
Dealing with complex issues of fraud, regulatory compliance and business disputes can detract from efforts to succeed. Better management of fraud risk and compliance exposure is a critical business priority — no matter the industry sector. With our more than 4,500 fraud investigation and dispute professionals around the world, we assemble the right multidisciplinary and culturally aligned team to work with you and your legal advisors. And we work to give you the benefit of our broad sector experience, our deep subject matter knowledge and the latest insights from our work worldwide.

Exhibitor (1)

CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation AV, endpoint detection and response (EDR), and a 24/7 managed hunting service — all delivered via a single lightweight agent. The CrowdStrike Falcon™ platform, certified to replace legacy antivirus, has reinvented how endpoint security is delivered with its industry-leading, cloud-native architecture. CrowdStrike Falcon protects customers against all cyber attacks, using sophisticated signatureless artificial intelligence/machine learning and Indicator-of-Attack (IOA) based threat prevention to stop known and unknown threats in real-time. Core to its innovative approach is the CrowdStrike Threat Graph™ which analyzes and correlates over 30 billion events per day from millions of sensors deployed across 176 countries, uniquely providing crowdsourced protection for the entire customer community.

Many of the world’s largest organizations put their trust in CrowdStrike, including three of the 10 largest global companies by revenue, five of the 10 largest financial institutions, three of the top 10 healthcare providers, and three of the top 10 energy companies.

Supporting Partners (2)

CIS is a forward-thinking nonprofit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threats. Our CIS Controls and Benchmarks are the global standard and recognized best practices for securing IT systems and data against the most pervasive attacks. These proven guidelines are continually refined and verified by a volunteer, global community of experienced IT professionals. CIS is home to the Multi-State Information Sharing and Analysis Center (MS-ISAC), the go-to resource for cyber threat prevention, protection, response, and recovery in state to tribal governments.

Founded in 1989, the Information Security Forum (ISF) is an independent, not-for-profit association of leading organisations from around the world. It is dedicated to investigating, clarifying and resolving key issues in cyber, information security and risk management and developing best practice methodologies, processes and solutions that meet the business needs of its Members.

ISF Members benefit from harnessing and sharing in-depth knowledge and practical experience drawn from within their organisations and developed through an extensive research and work program. 

Venue

The National Press Club
529 14th St. NW
Washington DC 20045

United States of America

Tel: +1 202-662-7500

fallback

Hotel Accommodations

FT Cyber Security Summit USA has reserved a block of rooms at The Westin Washington, D.C. City Center from March 14-March 16, 2017. Rooms are available for $329. Group rate available until February 14, 2017.  Subject to availability.

Click Here to Access the Online Booking Portal 

Any questions, contact Meredith Vachon at meredith.vachon@ft.com

fallback

Contacts

Toufique Khan
Sponsorship Opportunities
Financial Times
Meredith Vachon
Media Partner & Press Inquiries
Financial Times
Funmbi Adenubi
Delegate Booking and Registration Enquiries
Financial Times