As the threats of APTs deepen and become increasingly difficult to prevent or detect in a timely fashion, CISOs are rethinking the approach to security, pooling their efforts and information to attain better intelligence on how to respond quickly and appropriately to mitigate damage. What we’re seeing is Big Data transforming into “Big Intelligence” in the security space, with CISOs aiming toward a shared information network by utilizing Big Data and the combined information of those fighting the good fight. So how can we enable such a “Big Intelligence” network, how can CISOs derive actionable intelligence from it, and how will it help us get a step ahead of the bad guys?
Dr. Roger R. Schell, Professor, USC/ISI, University of Southern California
Dr. Roger R. Schell recently joined USC/ISI supporting their Masters of Cyber Security degree program. He is internationally recognized for originating several key modern security design and evaluation techniques, and he holds patents in c... More View all posts
Dr. Roger R. Schell recently joined USC/ISI supporting their Masters of Cyber Security degree program. He is internationally recognized for originating several key modern security design and evaluation techniques, and he holds patents in cryptography, authentication and trusted workstation. For more than decade he has been co-founder and President of Aesec Corporation, a start-up company providing verifiably secure platforms. Previously Dr. Schell was co-founder and vice president for Gemini Computers, Inc., where he directed development of their highly secure (what NSA called “Class A1”) commercial product, the Gemini Multiprocessing Secure Operating System (GEMSOS). He was also the founding Deputy Director of NSA’s National Computer Security Center. He has been referred to as the "father" of the Trusted Computer System Evaluation Criteria (the "Orange Book"). Dr. Schell is a retired USAF Colonel. He received a Ph.D. in Computer Science from the MIT, an M.S.E.E. from Washington State, and a B.S.E.E. from Montana State. The NIST and NSA have recognized Dr. Schell with the National Computer System Security Award. In 2012 he was inducted into the inaugural class of the National Cyber Security Hall of Fame. Less View all posts
Roy Mellinger, VP and CISO, Wellpoint
Roy Mellinger is vice president of information technology security and chief information security officer at WellPoint, overseeing a department of 150 information security and risk management professionals responsible for protecting WellPoi... More View all posts
Roy Mellinger is vice president of information technology security and chief information security officer at WellPoint, overseeing a department of 150 information security and risk management professionals responsible for protecting WellPoint's computer systems, technical infrastructure and information assets. As CISO he is the decision-maker on all corporate information security matters, and establishes security policy and standards for products and systems throughout the organization. He is also responsible for IT risk management and overseeing information technology incident response, cyber-investigation and computer forensic programs. Mr. Mellinger joined WellPoint in March 2009 bringing 30 years of experience in developing and managing best-in-class physical, logical and information security programs for domestic and international business operations. Prior to joining WellPoint, he served in executive security leadership positions for Sallie Mae, GE Capital, Heller Financial, Household International, Inc. and Spiegel. Before beginning his career in the private sector, Mr. Mellinger worked in the government sector, assigned to both Intelligence and Law Enforcement operations, where he held top-level security clearances and specialized in communications and operational security. Mr. Mellinger has extensive experience establishing organizational governance structures, risk based operational models, and operational security protocols and programs. He is a Certified Information Systems Security Professional (CISSP), with advanced certifications in Information Security Architecture and Information Security Management. He completed the Project Management Professional (PMP) and Six Sigma Black Belt training and certification programs. He is on the board of directors for HITRUST (The Health Information Trust Alliance) and for NPower Indiana, and is on the advisory board for The Lares Institute. He is a frequent guest lecturer and keynote speaker on cyber security and information security management best practices. In 2012 he was invited to the White House on several occasions to work with President Obama administration officials, members of the National Security Council, and other federal agency officials on improving government – public sector cooperation on cyber security threats; the President’s National Strategy for Trusted Identities in Cyberspace (NSTIC); and to provide comment during the drafting of Executive Order 13636, Improving Critical Infrastructure Cyber Security issued by President Obama into law on February 12, 2013 Less View all posts