Security Officer (CISO) - ArgyleThe risks to your organization is growing at a rapid pace and with...
Transcript of Security Officer (CISO) - ArgyleThe risks to your organization is growing at a rapid pace and with...
2016 Chief Information Security Officer (CISO) Leadership Forum (Chicago)
WEDNESDAY, JUNE 22, 2016
ADMINISTRATIVE NOTES
SecurityPlease wear your name badge at all times during the meeting.Please do not leave your personal belongings unattended in the meeting rooms.Argyle Executive Forum will not be responsible for items left in the rooms.
Mobile DevicesPlease do not allow any mobile device to disrupt the meeting while in session.All devices should be on silent mode.
ConversationPlease use areas outside of the ballroom to converse when the meeting is in session.
SmokingPlease note that smoking is not permitted in the meeting venue.
The content of this program and the attendee list remain the sole property of Argyle Executive Forum and may not be rented, sold, or given to any outside party or used to market or promote any other meeting. Any such unauthorized distribution represents theft of property for which Argyle Executive Forum will pursue any and all appropriate legal remedies.
Speaker Materials are available upon request, pending availability.
MEETING DAY INFORMATION
Feedback FormsPlease remember to fill these out after each session.They can be dropped off at the registration desk at the end of the day.
Twitter Hashtag The hashtag for this meeting is #ArgyleCISO
Wireless MicrophonesPlease note that we have wireless microphones for the Q&A portion of each session. Please wait for a member of the Argyle Executive Forum staff to bring the microphone over to you before you ask your question.
Room LocationsLunch will be served in the Council Room.Lunch will be held in the Grand Ballroom.The Attendee Meeting Room is the Room 9, located on the 4th floor.The Speaker Meeting Room is the Room 10, located on the 4th floor.Bathrooms are located on this floor, and the 4th floor.
WiFi Wireless internet can be accessed via the following:Network: StClubWAP1Password: from1869
Event ProgramTo download the meeting program, please visit www.argyleforum.com/2016cisochicago
Continuing Education Credits: Due to the nature of our program, Argyle events do not always receive continuing education credits. We do make efforts to apply in several states and will work with members to apply as an individual if credits are not awarded for the event. Should we receive credits, we do however inform our members.
Car Service:Chicago Private Car Service, Inc. (844) 844-7433Echo Limousine (773) 774-1074In Chicago Car Services (773) 430-8531
AGENDA
2016 Chief Information Security Officer (CISO) Leadership Forum (Chicago)
Wednesday, June 22, 20167:35am – 5:40pm
7:35am – 8:35am
Breakfast
8:35am – 8:40am
Argyle Executive Forum Opening Remarks
8:40am – 8:45am
Session Introduction
Tom MurphySales DirectorReturn Path
8:45am – 9:20am
Keynote Session
Richard RushingChief Information Security OfficerMotorola Mobility
KEY INSIGHTS:
1._________________________________________________________________________________
2._________________________________________________________________________________
3._________________________________________________________________________________
AGENDA
9:20am – 9:40am
Thought Leadership Spotlight
Ray BoisvertSAS Partner and PresidentI-SEC Integrated Strategies
KEY INSIGHTS:
1._________________________________________________________________________________
2._________________________________________________________________________________
3._________________________________________________________________________________
9:40am – 10:00am
Coffee Break
10:00am – 10:20am
Fireside Chat: “How to protect your High value assets in an evolving threat landscape”
Chad HolmesPartner and Cybersecurity Leader Ernst & Young
and
Tom PadgettCOO SAP NA Analytics
KEY INSIGHTS:
1._________________________________________________________________________________
2._________________________________________________________________________________
3._________________________________________________________________________________
The risks to your organization is growing at a rapid pace and with the increased sophistication of the malicious actors, it is critical to identify and protect your high value assets. During this session, you will gain insights into the different techniques used by malicious actors and the different security measures you can deploy to protect your critical data.
AGENDA
10:20am – 11:10am
Panel Discussion: "Keeping Up with the Evolution of IT"
• In recent years, CISOs and senior risk managers have seen the threat landscape changewith cyber-attacks like DDoS attacks from various organizations. What are some best in classapproaches you have seen organizations follow to strengthen their processes to mitigate the risksfrom such threats?
• What are some of your key digital technologies that are or going to transform your business?• Looking into the future, what do you see as the top three disruptive technologies to the current
deployed security landscape?• What are the three things we can stop doing in security today with little impact on our overall
security posture?• What are some best practices when balancing the needs of information security in a world where
collaboration and sharing is a business requirement?• Why is it more important than ever for executives to have a controlled, collaborative way to securely
share information outside their organization?• Best practices when managing the free cloud storage and migrating existing applications to the
cloud• How do you capitalize on the growth of data, cloud, and/or application development?
Moderator:John DolceDirector & Chief Information Security Officer American Medical Association
Aman RahejaChief Information Security Officer BMO Harris Bank
Daren GlenisterField Chief Technology OfficerIntralinks
Piero DePaoliSenior Director, Product Marketing, SecurityServiceNow
Panelists:Waqas AkkawiVice President, Chief Information Security Officer SIRVA
KEY INSIGHTS:
1._________________________________________________________________________________
2._________________________________________________________________________________
3._________________________________________________________________________________
AGENDA
11:10am – 11:30am
Thought Leadership Spotlight: "A Data- Centric Approach To Securing the Cloud-First, Mobile-First World"
Mike BassHead of Customer StrategyIonic Security
KEY INSIGHTS:
1._________________________________________________________________________________
2._________________________________________________________________________________
3._________________________________________________________________________________
11:30am – 11:50am
Coffee Break
11:50am – 11:55am
Session Introduction
Katie HanahanRegional Director, Central RegionAgari
The reality of today's data is that it can neither be contained nor constrained. New security strategies need to be adopted to enable secure data ubiquity today and tomorrow. Ionic Security's Head of Customer Strategy, Mike Bass, discusses how his 25+ years in infosec have revealed that everything the industry is doing today to secure data is backwards. The talk addresses what we can do to assure our most sensitive data is protectedl so that companies can securely manage both structured and unstructured data across any network, any device, and any platform.
AGENDA
11:55am – 12:45pm
Panel Discussion: "Balancing Act: Becoming More Transparent & Even More Secure"
• What are some of the emerging threats that you are seeing develop that will have major effects onthe industry?
• What are your thoughts about the shift in the approach to proactive security with the emergence ofdiverse IT environments?
• As data centers become more distributed and the traditional network perimeter dissolves, what canwe use to protect enterprise data?
• Is identity and access management defining the new security perimeter?• With so many organizations struggling to protect their infrastructures and manage identities within
applications, what are some best practices that you can share that helps your team lower costs andrisks?
• What are some of the other data management best practices have helped you lead your team tosuccess?
• What are the key benefits of SSO for an organization? Does it effectively cut costs? Improveproductivity?
• Does security training equal security awareness when it comes to the internet, cloud and data?
Panelists:Bob EichlerHead of Information SecurityCancer Treatment Centers of America
John GermainVice President, Infrastructure and Security ServicesXylem
Cuneyt KarulChief Security Architect BlueCat Networks
Rohit KinraDirector, Verisign Security Services, Technology & Sales Engineering Verisign@rohitkinra
Tris LingenEVP, CISO, Director of Information Security Risk ManagementTCF Financial Corporation
KEY INSIGHTS:
1._________________________________________________________________________________2._________________________________________________________________________________3._________________________________________________________________________________
Moderator:Celedonio AlbarranAVP, Infrastructure & Security Equity Residential
AGENDA
12:45pm – 1:05pm
Thought Leadership Spotlight
Mike SpanbauerVice President, Research NSS Labs
KEY INSIGHTS:
1._________________________________________________________________________________
2._________________________________________________________________________________
3._________________________________________________________________________________
1:05pm – 2:05pm
Lunch
2:05pm – 2:25pm
Thought Leadership Spotlight: "Detecting and Mitigating Insider Threat"
Gaby FriedlanderCo-founder and Chief Technology Officer ObserveIT
KEY INSIGHTS:
1._________________________________________________________________________________
2._________________________________________________________________________________
3._________________________________________________________________________________
AGENDA
2:30pm – 3:05pm
Fireside Chat: Infosec Crossfire
This session will showcase Derek Milroy and Fred Kwong, two security leaders with over 30 years of IS security between them discuss the most relevant topics in today’s security world in a pro/con debate format.
Topics will be as follows:• Insider Threats and User Behavior Analytics• Cloud Security• Securing Internet of Things• Data Loss Prevention• Advanced Persistent Threats• BYOD/Mobile• Protecting the Critical Asset
Fred KwongChief Information Security OfficerDelta Dental
and
Derek MilroyIS Security ArchitectUnited States Cellular Corporation
KEY INSIGHTS:
1._________________________________________________________________________________
2._________________________________________________________________________________
3._________________________________________________________________________________
3:05pm – 3:20pm
Coffee Break
AGENDA
3:20pm – 3:55pm
Keynote Session: "20/20-20/2020: 20 years evolving today’s CISO with 20-20 vision for 2020"
This session explores the historical evolution of the CISO over the past 20 years, why this is relevant today, and the soft skills, knowledge areas, trends shaping the industry, and approaches necessary to be a successful CISO in 2020.
Todd FitzgeraldGlobal Director Information Security Grant Thornton International
KEY INSIGHTS:
1._________________________________________________________________________________
2._________________________________________________________________________________
3._________________________________________________________________________________
4:00pm – 4:35pm
Keynote Session: "Brief: Developers Linearity"
Security can’t happen while developers and delivery professionals continue to be “linear thinkers” on application development. There are multiple tools to help validate applications but is not enough and organizations got exposed to security breaches that could be suppressed by a change in mindset.What should be done towards developing secure applications? What are we doing wrong? This section will discuss the linearity thinking through two recent real cases and how by being non-linear thinkers will help the security front line.
Alejandro ReskalaVice President of Global Technology, InternationalTransUnion
KEY INSIGHTS:
1._________________________________________________________________________________
2._________________________________________________________________________________
3._________________________________________________________________________________
AGENDA
4:35pm – 4:40pm
Argyle Executive Forum Closing Remarks
4:40pm – 5:40pm
Closing Reception
__________________________________________________________________________________
*Please note, the agenda is subject to change.
The information, views, and opinions expressed by speakers and other participants at our conferences are those of the individual and do not necessarily reflect the views and opinions of Argyle Executive Forum.
Argyle Executive Forum, its directors and officers, do not guarantee that any information provided by a speaker or other participant is accurate or complete and Argyle Executive Forum does not endorse any opinions that may be presented.
PARTNERS
Thought Leadership Spotlight Partners
Panel Partners
Session Introduction Partners
PARTNERS
Breakout Session Partners
Senior Supporter & Networking Partner
Senior Supporter Partners
Supporter Partner
FEEDBACK
HOW AREWE DOING?
Please submit feedback(the good, the bad and the ugly!) to:
All feedback goes directly to the office of the CEO where it is reviewed and acted upon
to improve your experience.
DOWNLOAD ARGYLE’S EVENT APPDOWNLOAD ARGYLE’S EVENT APP
INTRODUCING ARGYLE’S MOBILE COMMUNITY
Visit your app store and search “Argyle Executive Forum” to download our event app
and begin engaging with your community. You can also scan the QR codes below:
iPhone Android
STAY CONNECTEDStay ConneCted
If you are interested in contributing to Argyle’s content platform – Argyle Journal
Please e-mail: [email protected]
Join our LinkedIn Group by scanning the below QR code:
RECOMMENDATIONS
If you are interested in recommending a speaker for a future forum,
please email:
If you are interested in recommending a member for a future forum,
please email:
CONTENT NEUTRALITY POLICY
We ask that all speakers, members and sponsors
respect Argyle’s content neutrality guidelines.
We thank you for your continued support for this policy
as a way of protecting the high content standards and trust
that Argyle has established with its members.
• Argyle is proud and protective of our high standards in ensuring the value of all content presented at our events.
• Strict guidelines are in place to ensure that all content presented is balanced and vendor neutral.
• All topics that are covered at our member events are thought leadership-focused and in line with the expectations of our members.
• Argyle seeks to prevent overt sales pitches or unbalanced vendor references.
• Argyle provides all speakers with content presentation guidelines at the behest of our executive membership.
CONTENT NEUTRALITY POLICY