Traditional rules-based cybersecurity applications of the past are struggling to keep up in today's mobile, social, and hyper-connected world. However, the convergence of big data technology, analytic advancements, and a variety of other factors have sparked an emerging breed of applications that will forever change the way organizations protect themselves.
Join fellow cybersecurity experts, industry executives, and analysts as we come together to discuss the future of cybersecurity.
Cybersecurity Subject Matter Expert
Mr. DeStefano feels privileged to begin his career with the United States Air Force as member of the Intelligence community. After his military service Rocky went on to serve as a member of the Incident Response Team (IRT) at AFCERT. The dedication and skillsets needed in those roles have been critical in his private sector pursuits too. Among other jobs, Rocky founded and was Technical Director of the Global Security Operations Center at EDS, directed the Security Operations Practice at ArcSight, ran global services for NetWitness and was the founder and CEO of Visible Risk (acquired by Click Security). At every step in his career, Rocky's focus has been to continually strive to find better visibility and detection solutions to defend the enterprise.
Global Solution Architect Group Security Lead Manager, Intel
Jeff has 12 years of experience building innovative, leading edge information security and risk management business models for the enterprise. He leads the Intel Security Architecture Group and provides expert advice on cyber security reference architecture for Intel’s Virtuous Cycle of growth. Security is at the foundation of Intel’s strategy to connect Cloud, Data Center, and the Internet of Things Devices. Big Data solutions are revolutionizing how Intel’s Virtuous Cycle are protected from cyber attacks, nation-state actors and malicious insiders. Jeff helps educate and apply non-deterministic cyber solutions early in the kill chain to discover and remediate anomalies (from hackers or systems outages) in near real-time. Intel’s silicon based, built-in security can be extended to provide true “Edge-to-Cloud” actionable insight. Jeff is a liaison between Intel’s business lines and its major partners such as Accenture, Cloudera and its corresponding ecosystem of partners and suppliers. He is based in Minneapolis and supports security architecture globally for Intel. Prior to Intel he has served in leadership roles at Gurucul, British Telecom, Optiv, and Shavlik Technologies.
Principal Analyst, Ovum
Andrew enjoys the challenge of working with state-of-the-art technology and, as a member of the Ovum IT security team within the IT Solutions practice, he has the opportunity to evaluate and provide opinion on the latest security matters. He is responsible for research on the key technologies used to protect public and private sector organisations, their operational systems, and their users. The role provides a balanced opportunity to promote the need for good business protection and, at the same time, to research the latest threat approaches. In his position as a principal IT security analyst, Andrew has worked to promote the delivery of research on business- and user-focused security systems and written papers on a wide range of business- and technology-related areas. Andrew has been the lead author on a number of major security reports on subjects including identity and access management, security management and, most recently, information security, data loss prevention, and web security. He is also a regular speaker at Ovum strategy briefings and master classes, and has undertaken external speaking engagements. Andrew has worked in the IT industry for over 30 years and, before joining Ovum, was employed as an operations manager and business analyst for an internationally known high street retail service provider. He was responsible for the management and implementation of the company’s EPOS systems and for the selection, deployment, management, and operation of its supporting business systems. Prior to this, Andrew worked as a systems analyst and project manager for a large financial services organisation.
Tanuj Gulati is a thought leader in security applications of big data analytics. He is co-founder and chief technology officer of Securonix where he leads engineering and product management. Internally, he is known as “chief inventor” of the company’s most innovative solutions. Gulati is a sought after security analytics expert who advises Fortune 500 organizations, Federal agencies and think tanks. He sits on the governance boards of information security programs at several large organizations to guide the implementation of identity, access, governance, risk and compliance initiatives. In 2016, the Golden Bridge Awards named Gulati “executive of the year” and “most innovative executive of the year.” Previously, Gulati founded and served at VAAU from its inception to its acquisition by Sun Microsystems. He also held key positions at Oracle and Sun Microsystems where he led the global technology team for the identity governance, compliance, and risk product portfolio.
Director of Sales Engineering, Cloudera
JJ Sakey has been in the Tech Industry for over 25 years, 20 of which have been spent in field as part of different Systems Engineering teams. He started his career at a small software company called Lotus Development Corporation when they owned 85% of the spreadsheet market, and after they got acquired by IBM, had the opportunity to work with and for a number great SE teams within IBM. Prior to joining Cloudera as the Northeast Regional Systems Engineering Director this past January, he was the Technical Executive responsible for all the IBM Analytics Systems Engineering teams supporting clients in the the North Region.