CISO Digital Transformation Summit US West | November 11-13, 2018 | Westin Kierland Resort & Spa - Scottsdale, AZ, USA

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Sunday, November 11, 2018 - CISO Digital Transformation Summit US West

12:00 pm - 5:00 pm

Golf Tournament

Optional Activities

 

12:00 pm - 6:00 pm

Registration & Greeting

 

5:30 pm - 6:30 pm

Summit Networking Happy Hour

 

6:30 pm - 8:30 pm

Welcome Dinner and Panel

The Next Phase of Digital Transformation

Today's digital technologies quickly become commodities, and adoption of emerging technologies provides only temporary edge and differentiation. To stay ahead, you must think bigger and take bigger risks. Do not make the technologies themselves the focal point, but the profound business transformations they make feasible.

Moderated by:

Becky Wanta, COO & CIO, One Degree World View details

 
 

Panelists:

Dave Hudson, CIO, Veritiv View details

 
 

Julia Anderson, Global CIO, Smithfield Foods View details

 
 

Paul Moulton, EVP & CIO, Costco Wholesale View details

 
 

Paige Adams, Group CISO, Zurich Insurance Group View details

 
 
 

8:30 pm - 9:30 pm

After Dinner Networking

 

Monday, November 12, 2018 - CISO Digital Transformation Summit US West

7:15 am - 8:00 am

Registration and Networking Breakfast

 

8:00 am - 8:10 am

Welcome Address and Opening Remarks

Moderated by:

Becky Wanta, COO & CIO, One Degree World View details

 
 
 

8:10 am - 8:45 am

Keynote Presentation

Security's Place in Enterprise Risk Management

While Information Security has existed for decades, Enterprise Risk Management (ERM), as a formal and holistic practice, is much newer yet already has taken pre-eminence over its forebear. What is the CISO, who in many ways has toiled in invisibility, infamy, or ignominy to do when faced with the issue of being supplanted by the Chief Risk Officer, just as enterprise demand for and focus on security has reached all-time heights? Savvy CISOs will recognize this new, broader need for holistic visibility into, and management of, overall enterprise risk and will position themselves for success by looking beyond traditional information security boundaries and engaging business partners around all enterprise risk.

Takeaways:

  1. Just because information security is an aspect of enterprise risk doesn't mean that the CISO needs to take a back seat position
  2. Enterprise risk is defined by the business but needs to be quantified by an expert; CISOs bring risk quantification expertise to the table
  3. The end goal is not about fiefdoms and ownership, it is about improving enterprise value and success; maintaining focus is essential

Presented by:

Allison Miller, Deputy CISO, UnitedHealth Group

 

Dwight DeGiacomo, Sr. Director Business Information Security Officer, UnitedHealth Group

 
 

8:50 am - 9:25 am

Share:

Keynote Presentation

Knowing Is Half the Battle - Protecting Applications & Their Sensitive Data

Application security testing tools scan your code to reveal the long lists of known vulnerabilities, but not all are remediated before the next release-even with mature secure software development practices. Enterprises resort to using theoretical levels of criticality - not actual risks-to prioritize which accumulated vulnerabilities to fix and in what order. Many vulnerabilities often undergo an exception process and make it into protocol. 

A real-time, embedded solution like Prevoty's runtime application self-protection (RASP) changes the game completely. Prevoty places an automated security mechanism at the front of the line - directly in the application's operating environment - to immediately lower risk and act as a compensating control at runtime. 

As such, Prevoty-enabled enterprises see 98%+ of their known vulnerabilities mitigated instantly, reducing backlogs and expediting an otherwise cumbersome release process. Prevoty RASP detects live production attacks and generates real-time security event longs and reports. Security teams can then correlate pre-production vulnerability scan results with Prevoty's runtime attack logs to go back, remediate based on actual risk - not just hypothetical threats. The result? Improved forensics.

Sponsored by:

Prevoty, Inc. View details

 
 

Kunal Anand, CTO, Prevoty, Inc. View details

 
 
 

9:30 am - 10:05 am

Share:

Keynote Presentation

The Future of Authentication: Customizable, Frictionless & Secure

This session will discuss how authentication has become a critical part of security strategy. In 2016, over 81% of data breaches were perpetrated using compromised credentials. Traditional means of authenticating users - passwords and OTPs - are no longer sufficient. With that, users expect authentication to be frictionless and secure. That sounds great, but how do you make it happen? We'll discuss the leading forms of authentication including biometrics, PKI and behavioral analytics and explore ways to orchestrate these authenticators with risk-based adaptive authentication.

Takeaways:

  1. Discuss the different types of authentication technologies available
  2. Explore the orchestration of authenticators with risk-based adaptive authentication
  3. Highlight best-practices that balance security with user experience

Sponsored by:

Pinn View details

 
 

Presented by:

Will Summerlin, Founder and CEO, Pinn View details

 
 
 

10:15 am - 10:40 am

Executive Exchange

 

Share:

Thought Leadership

The Bad Habits we Bring to the Cloud

There's a common saying that the cloud is "just somebody else's server". While there's an element of truth in that statement, it overlooks the fact that the cloud as we know it today is transforming the way companies do business. It allows large companies enormous flexibility in facilities and finance. It allows small companies the ability to adapt and compete in ways undreamed of just ten years ago, without massive amounts of capital. So why are we overlooking the opportunity to re-think the way we approach network and application security, and instead drag along the worst of our habits from the old world to the new? 

This talk is about those bad habits, and how Microsegmentation can give you a whole new way to look at and solve your security and compliance concerns in the cloud, as well as your existing datacenter.

Sponsored by:

Illumio, Inc. View details

 
 

Jeff Francis, Consulting Systems Engineer, Illumio, Inc. View details

 
 
 

10:45 am - 11:10 am

Executive Exchange

 

Share:

Thought Leadership

Identity and the New Age of Enterprise Security

From a technology standpoint, the world of business has gone through two distinct stages in the evolution of its information security focus. The first addressed network-based protection and preventive controls such as firewalls and anti-virus. The second looked at data-centric and detective controls such as encryption and intrusion/extrusion monitoring. As breaches continue to occur at a record pace, what is needed today is a new evolution, one that pushes towards individual-focused security through granular user monitoring and management as provided by solutions such as Identity and Access Management. While IAM isn't a new technology field, it is one whose time has come and CISOs need to begin investing in modern-day, lightweight, easy to implement IAM solutions now to stay ahead of the curve, and to reduce enterprise threats

Sponsored by:

RSA View details

 
 

Presented by:

Ben Smith, Principal Sales Engineer + Field CTO (US), RSA View details

 
 
 

11:15 am - 11:40 am

Executive Exchange

 

Share:

Thought Leadership

The Connected Worker & the Enterprise of Things

The smartphone is the primary communication and computing device for many of today's consumers. This dependency on mobile devices will translate into a majority of enterprise computing outside of traditional PC computing. This will have the greatest impact with on campus (non-office-based) and off campus mobile workers who are becoming increasingly connected by rich real time communications powered by mobile applications running on wearable devices such as smart glasses. The rise of IoT in the enterprise, or the Enterprise of Things, will allow these workers to instantly connect with assets in the field to gain immediate understanding of the situation around them. 

This session will explore the impact that these connected workers and endpoints will have on your enterprise and its ability to drive growth. Attendees will also learn security concerns that come with these new tools and how to best address them.

Sponsored by:

BlackBerry View details

 
 

Presented by:

Todd Berger, Senior Director, Technical Solutions, BlackBerry View details

 
 
 

11:45 am - 12:10 pm

Executive Exchange

 

Share:

Thought Leadership

Remove Business Friction with Risk-Adaptive Cybersecurity

We are in the midst of a digital revolution with more and more companies embracing data as their competitive advantage. Traditional security practices no longer apply when you consider the volume & velocity of data being generated (& collected). There is not enough time in the day for a SecOps team to constantly monitor, analyze and respond to potential threats. What makes this more complicated is the fact that our digital assets are spread out over on-premise, cloud and hybrid environments.

In order to tackle this changing landscape, we need to focus on two constants: People & Data.

  • By understanding the intersection of people, critical data and IP across our environments, we can contextualize behavior and apply appropriate enforcement.
  • By analyzing behavior at a granular level, we can provide quality enforcement, faster response times and build behavioral models that get more effective over time.
  • By creating behavioral models, we can automate SecOps activities allowing for more efficient use of resources.

Sponsored by:

Forcepoint LLC View details

 
 

Presented by:

Sameer Sait, Chief Information Security Officer (CISO), Forcepoint LLC View details

 
 
 

12:15 pm - 1:30 pm

Networking Luncheon and Panel

Charging Ahead: Speeding Up Transformation Through Disruption

Disruption alters, destroys, but also creates value. You realize the need to act once revenue starts to shift, which is happening at a faster pace than most would think. Disruption can be a great thing if you act upon it, but it's a threat if you watch idly. We will discuss how CIOs and CISOs can be proactive and act on disruption by figuring out how to identify, prioritize and respond.

Moderated by:

Becky Wanta, COO & CIO, One Degree World View details

 
 

Panelists:

Donna Kladis, CIO, Techtronics Industries View details

 
 

Michael Golz, CIO, SAP

 

Larry Quinlan, Global Chief Information Officer, Deloitte View details

 
 

Kathy McElligott, EVP & Chief Information Officer, McKesson Corporation View details

 
 
 

1:35 pm - 2:00 pm

Executive Exchange

 

Executive Boardroom

Something old, something new: 2018 attack overview

So far, the 2018 security threat landscape has yielded a combination of tried and true techniques like ransomware (look at the attack that crippled the city of Atlanta in March) and relatively new methods like supply chain attacks (Delta Airlines, Best Buy, Sears, and KMart all suffered one in April). What other attack methods are adversaries likely to turn to this year? Attend this talk for an overview of the 2018 threat landscape and learn how organizations can defend against these threats.

Sponsored by:

Cybereason View details

 
 

Tim Amey, Solution Engineering, Cybereason View details

 
 
 

2:05 pm - 2:30 pm

Executive Exchange

 

Share:

Executive Boardroom

The Biggest Computer Defense Mistakes & How to Fix Them

Most companies have huge gaps in their computer security defenses and can be compromised at will by a determined hacker. The industry even has a term for it: ?Assume Breach?. However, it does not have to be that way!

Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, as he explores the latest research on what is wrong with current network defenses and how they got this way.

You will learn:

  •  What most companies are doing wrong, why, and how to fix it.
  • An action plan to improve the effectiveness of your computer security defenses.
  • How to create your ?human firewall"

Sponsored by:

KnowBe4, Inc View details

 
 

Roger Grimes, Data Driven Defense Evangelist, KnowBe4, Inc View details

 
 
 

2:35 pm - 3:00 pm

Executive Exchange

 

Think Tank

Designing a Digital Workplace: Balancing Security with Effectiveness

Employees are consumers of digital technologies such as IoT, AR and VR. The plethora of mobile devices has enabled them to work where they want and when they want which has raised the bar on employee expectations for tools and capabilities from their employers. In order for companies to retain the best and get the most out of their employees, it is vital to design and continually update the digital workplace. We will discuss the current trends as well as share case studies of successful digital workplace implementations including how to deal with the inherent security risks of expanded accessibility to company resources.

Presented by:

Mark Van Holsbeck, CISO, Avery Dennison View details

 
 
 

3:05 pm - 3:30 pm

Solutions Spotlight

Deep dives into the latest and greatest technology solutions to today's business problems.

 

3:35 pm - 4:00 pm

Executive Exchange

 

Share:

Executive Boardroom

The Evolution of Cyber Crime - A New Approach to Risk is Critical

Evolution never stops. This is most evident in the world of cyber crime. Threats constantly mutate, technology progresses and the lines of responsibility blur. Protecting against new forms of attack requires experience of how criminals change their methods. Defenders must use intelligence on adversaries and understand the vulnerabilities of their organization to build a picture of the situation.

Sponsored by:

BAE Systems Applied Intelligence View details

 
 

Presented by:

Colin McKinty, VP of Cyber Security Strategy, Americas, BAE Systems Applied Intelligence View details

 
 

Share:

Executive Boardroom

Zero Trust Privilege for the Modern Threatscape

As traditional network perimeters dissolve, organizations must discard the old model of "trust but verify" which relied on well-defined boundaries. Zero Trust mandates a "never trust, always verify, enforce least privilege" approach to privileged access, from inside or outside the network. Zero Trust Privilege helps organizations grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment. By implementing least privilege access, organizations minimize the attack surface, improve audit and compliance visibility, and reduce risk, complexity and costs for the modern, hybrid enterprise.

Sponsored by:

Centrify View details

 
 

Presented by:

Tony Goulding, Senior Director of Product Marketing, Centrify View details

 
 
 

4:05 pm - 4:30 pm

Executive Exchange

 

Think Tank

AI and ML: Using Emerging Technologies to Reinforce Security Defense Efforts

Artificial Intelligence (AI) and Machine Learning (ML) both have the capability to greatly improve upon security decision making and incident pattern recognition. CISOs can improve upon being able to recognize exploits and weaknesses within their network by using the advancements of these technologies. With hackers using AI and ML to create malware, adopting these technologies to stay ahead of advanced threats has become a matter of high importance.

Presented by:

Paul Black, VP Cyber Security Operations, McKesson View details

 
 
 

4:35 pm - 5:00 pm

Executive Exchange

 

Share:

Executive Boardroom

How Analytics Disrupted the NPM Market & What's Next

It is no secret that the IT landscape is evolving rapidly, creating new challenges for IT organisations. Megatrends such as mobility, desktop virtualisation, ransomware, the Internet of Things and the software-defined datacentre all demand that IT organisations operate smarter and are equipped with real-time insights into what is happening in their environments. However, legacy IT monitoring products have not kept pace with these changes, leaving enterprises with a hodgepodge of niche tools designed for the paradigms of decades past. Left without a means to cut through increasing complexity, IT teams struggle to achieve key outcomes. 

This session will discuss: 

  • How the network is the richest source of data.  
  • How the network has become the common denominator tying everything together during digital transformation. 
  • How organisations are able to mine the communications between devices for real-time insights and data-driven operation.  
  • How your wire data can be used strategically within your IT ecosystem. 

This session will offer a clear understanding of how your organisation can unlock the hidden value in your networks, discovering, observing, and analyzing every digital interaction as it occurs.

Sponsored by:

Extrahop Networks Inc View details

 
 

Jeff Costlow, Deputy CISO, Extrahop Networks Inc View details

 
 
 

5:05 pm - 5:35 pm

Executive Visions

Securing the Human Factor

The biggest fear is not the technology, it is the mistakes made by the people using the technology that could potentially lead to a cyberattack. The majority of CISOs agree that an employee carelessly falling victim to a phishing scam is the most likely cause of a security breach. Most also agree that they will not be able to reduce the level of employee disregard for information security. How do we guard against human error without limiting employee efficiency and productivity?

Moderated by:

Daphne Jones, Former CIO for GE and Hospira, Individual View details

 
 

Panelists:

Joel Lowe, CISO, Sonic Automotive View details

 
 

Jamie Neumaier, CISO, Erie Insurance Group

 

David Nagel, CISO, Genuine Parts Company View details

 
 

Jim Kastle, CISO, ConAgra View details

 
 

Sponsored by:

Netskope View details

 
 

Luminate View details

 
 

James Robinson, Deputy CISO, Netskope View details

 
 
 

6:00 pm - 7:00 pm

Summit Happy Hour

 

7:00 pm - 8:30 pm

Networking Dinner on the Terrace

 

8:30 pm - 10:00 pm

After Dinner Networking

 

Tuesday, November 13, 2018 - CISO Digital Transformation Summit US West

7:45 am - 8:35 am

Networking Breakfast

 

8:40 am - 8:45 am

Welcome and Opening Remarks

Presented by:

Becky Wanta, COO & CIO, One Degree World View details

 
 
 

8:45 am - 9:20 am

Keynote Presentation

CIOs & CISOs: One Foot on the Gas & One Foot on the Brake?

CIOs are facing increasing pressure to guide their companies to rapidly adopt new technologies and solutions to keep their companies competitive in their industry. CISOs are facing increasing pressure to keep their company and its data safe and secure from all threats. Without great vision and cooperation these goals can appear to be at cross purposes. 

Takeaways: 

  1. CIOs and CISOs are both facing pressures that could seem to be at cross purposes. 
  2. CIOs and CISOs must work very closely together to accomplish both their individual organizational goals but also the overarching company goals to thrive.

Presented by:

Scott Dillon, EVP, CTO Head of Technology, Wells Fargo View details

 
 
 

9:25 am - 10:00 am

Keynote Presentation

The Heart of Digital Transformation: Governance

At the heart of a digitally transformed organization is data. Data that can be trusted and securely accessed by everyone in the organization to enable new product creation, superior customer experiences or deeper marketplace insights. To reach this level of maturity, organizations are starting to leverage governance to foster and deliver trusted data to their line of business data consumers.

Sponsored by:

IBM View details

 
 

Scott Buckles, Business Unit Executive - North America Business Analytics and Unified Governance Solutions Sales, IBM View details

 
 
 

10:10 am - 10:35 am

Executive Exchange

 

Share:

Executive Boardroom

Watching the Watchers: What Happens When Your Security Provider Compromises Your Network?

The 2017 M.E. Docs cyberattack that crippled hundreds of companies crafted blueprints for hijacking a vendor by targeting and attacking clients through trusted vendor partners. These events herald a new generation of supply chain-based attacks that pit vendor and client against each other as they struggle to navigate co-managed risk mitigation and the resulting consumer, regulatory and legal backlash. 

In 2018, eSentire detected and mitigated an exploit that targeted a key remote administration tool relied upon by a multitude of managed security service firms. This exploit was used to deliver a dangerous payload to their client base. In this talk, Mark Sangster will provide frameworks for assessing your vendors' cyber resilience and discuss building a trusted supply chain through co-managed cybersecurity programs, open communication and event notification, and proactive contractual obligations. 

Learning Objectives:  

  1. Understand how to navigate co-managed risk mitigation when working with a vendor. 
  2. Build and utilize a framework to assess your vendors' cyber resilience.
  3. Understand the indicators of compromise and detection mechanisms needed to proactively detect and mitigate exploits that target vendors. 
  4. Explore the real-time forensics data and disruption capabilities of Endpoint security through real-world attacks.

Sponsored by:

eSentire View details

 
 

Presented by:

Mark Sangster, Vice President, Strategic Marketing, eSentire View details

 
 
 

10:40 am - 11:05 am

Executive Exchange

 

Share:

Executive Boardroom

Knowing Your Network: Tracking Your Assets in the Age of Machine-Speed Attacks

In this talk, we will discuss how attackers have begun conducting Internet-scale attacks at machine speed by leveraging new scanning technologies. Qadium will present examples of how new classes of perimeter exposures are creating new risks, and data on global Internet trends.

Sponsored by:

Expanse View details

 
 

Presented by:

Marshall Kuypers, Director of Cyber Risk, Expanse View details

 
 
 

11:10 am - 11:35 am

Executive Exchange

 

Share:

Executive Boardroom

Preventing Unknown Cyberattacks Instantaneously & Effortlessly

Cyber criminals use advanced threat technology that bypasses today's endpoint defenses. IT is challenged to simplify and focus on business goals. Morphisec lets IT both combat advanced threats and simplify. Advanced threats have a strength that is also their weakness. They execute in memory, where AV cannot detect them, but if they can not find the specific DLL they must target in memory, the attack is terminated. Period. 

Morphisec dynamically scrambles the run-time environment, making it impossible for an attack to find its DLL. The implications for simplicity are profound. Morphisec has no run time component and no CPU utilization. It prevents attacks so early in the kill chain, there is nothing to analyze or investigate. There are no signatures, rules, or databases to update. It works with all other security tools. It silently and relentlessly prevents advanced threats, with no impact on end users or IT.

Sponsored by:

Morphisec Inc. View details

 
 

Presented by:

Arthur Braunstein, VP US Sales, Morphisec Inc. View details

 
 

Chuck Markarian, CISO, PACCAR View details

 
 
 

11:40 am - 12:05 pm

Solutions Spotlight

Deep dives into the latest and greatest technology solutions to today's business problems.

 

12:10 pm - 12:35 pm

Executive Exchange

 

Think Tank

Which "Friends" Do I Trust? Realities of 3rd Party Risk

It is not a matter of if, but a matter of when. Organizations, more and more, and are outsourcing business activities to 3rd-parties because of cost-savings, revenue opportunities, expertise, etc. Thus collaborating with our business partners early to select the right 3rd-party vendor(s) with the appropriate security posture is essential, especially for vendors hosting, processing and/or transmitting sensitive/regulatory information, or having access to our IT assets.

Presented by:

Alex Wood, CISO, Pulte Group View details

 
 
 

12:40 pm - 1:05 am

Executive Exchange

 

Think Tank

Navigating Security and Risk In a Changing IT Landscape

Agile, DevOps, containers, microservices, the cloud are all seeing increased adoption across the enterprise. But, while there are valid business reasons to embrace these new models, there is potential risk in implementation. Is this change necessary? If so, how can this change be accommodated effectively, safely? This session will cover some common elements of the risk of change - and of not changing - and suggest approaches to minimize risk as you adopt these new technologies.

Presented by:

Dennis Spalding, CISO, Insight Enterprises View details

 
 
 

1:05 pm - 1:10 pm

Closing Remarks


Moderated by:

Becky Wanta, COO & CIO, One Degree World View details

 
 
 

1:10 pm - 1:45 pm

Grab & Go Luncheon