Security Officer (CISO) - ArgyleThe risks to your organization is growing at a rapid pace and with...

19
2016 Chief Information Security Officer (CISO) Leadership Forum (Chicago) WEDNESDAY, JUNE 22, 2016

Transcript of Security Officer (CISO) - ArgyleThe risks to your organization is growing at a rapid pace and with...

Page 1: Security Officer (CISO) - ArgyleThe risks to your organization is growing at a rapid pace and with the increased sophistication of the malicious actors, it is critical to identify

2016 Chief Information Security Officer (CISO) Leadership Forum (Chicago)

WEDNESDAY, JUNE 22, 2016

Page 2: Security Officer (CISO) - ArgyleThe risks to your organization is growing at a rapid pace and with the increased sophistication of the malicious actors, it is critical to identify

ADMINISTRATIVE NOTES

SecurityPlease wear your name badge at all times during the meeting.Please do not leave your personal belongings unattended in the meeting rooms.Argyle Executive Forum will not be responsible for items left in the rooms.

Mobile DevicesPlease do not allow any mobile device to disrupt the meeting while in session.All devices should be on silent mode.

ConversationPlease use areas outside of the ballroom to converse when the meeting is in session.

SmokingPlease note that smoking is not permitted in the meeting venue.

The content of this program and the attendee list remain the sole property of Argyle Executive Forum and may not be rented, sold, or given to any outside party or used to market or promote any other meeting. Any such unauthorized distribution represents theft of property for which Argyle Executive Forum will pursue any and all appropriate legal remedies.

Speaker Materials are available upon request, pending availability.

Page 3: Security Officer (CISO) - ArgyleThe risks to your organization is growing at a rapid pace and with the increased sophistication of the malicious actors, it is critical to identify

MEETING DAY INFORMATION

Feedback FormsPlease remember to fill these out after each session.They can be dropped off at the registration desk at the end of the day.

Twitter Hashtag The hashtag for this meeting is #ArgyleCISO

Wireless MicrophonesPlease note that we have wireless microphones for the Q&A portion of each session. Please wait for a member of the Argyle Executive Forum staff to bring the microphone over to you before you ask your question.

Room LocationsLunch will be served in the Council Room.Lunch will be held in the Grand Ballroom.The Attendee Meeting Room is the Room 9, located on the 4th floor.The Speaker Meeting Room is the Room 10, located on the 4th floor.Bathrooms are located on this floor, and the 4th floor.

WiFi Wireless internet can be accessed via the following:Network: StClubWAP1Password: from1869

Event ProgramTo download the meeting program, please visit www.argyleforum.com/2016cisochicago

Continuing Education Credits: Due to the nature of our program, Argyle events do not always receive continuing education credits. We do make efforts to apply in several states and will work with members to apply as an individual if credits are not awarded for the event. Should we receive credits, we do however inform our members.

Car Service:Chicago Private Car Service, Inc. (844) 844-7433Echo Limousine (773) 774-1074In Chicago Car Services (773) 430-8531

Page 4: Security Officer (CISO) - ArgyleThe risks to your organization is growing at a rapid pace and with the increased sophistication of the malicious actors, it is critical to identify

AGENDA

2016 Chief Information Security Officer (CISO) Leadership Forum (Chicago)

Wednesday, June 22, 20167:35am – 5:40pm

7:35am – 8:35am

Breakfast

8:35am – 8:40am

Argyle Executive Forum Opening Remarks

8:40am – 8:45am

Session Introduction

Tom MurphySales DirectorReturn Path

8:45am – 9:20am

Keynote Session

Richard RushingChief Information Security OfficerMotorola Mobility

KEY INSIGHTS:

1._________________________________________________________________________________

2._________________________________________________________________________________

3._________________________________________________________________________________

Page 5: Security Officer (CISO) - ArgyleThe risks to your organization is growing at a rapid pace and with the increased sophistication of the malicious actors, it is critical to identify

AGENDA

9:20am – 9:40am

Thought Leadership Spotlight

Ray BoisvertSAS Partner and PresidentI-SEC Integrated Strategies

KEY INSIGHTS:

1._________________________________________________________________________________

2._________________________________________________________________________________

3._________________________________________________________________________________

9:40am – 10:00am

Coffee Break

10:00am – 10:20am

Fireside Chat: “How to protect your High value assets in an evolving threat landscape”

Chad HolmesPartner and Cybersecurity Leader Ernst & Young

and

Tom PadgettCOO SAP NA Analytics

KEY INSIGHTS:

1._________________________________________________________________________________

2._________________________________________________________________________________

3._________________________________________________________________________________

The risks to your organization is growing at a rapid pace and with the increased sophistication of the malicious actors, it is critical to identify and protect your high value assets. During this session, you will gain insights into the different techniques used by malicious actors and the different security measures you can deploy to protect your critical data.

Page 6: Security Officer (CISO) - ArgyleThe risks to your organization is growing at a rapid pace and with the increased sophistication of the malicious actors, it is critical to identify

AGENDA

10:20am – 11:10am

Panel Discussion: "Keeping Up with the Evolution of IT"

• In recent years, CISOs and senior risk managers have seen the threat landscape changewith cyber-attacks like DDoS attacks from various organizations. What are some best in classapproaches you have seen organizations follow to strengthen their processes to mitigate the risksfrom such threats?

• What are some of your key digital technologies that are or going to transform your business?• Looking into the future, what do you see as the top three disruptive technologies to the current

deployed security landscape?• What are the three things we can stop doing in security today with little impact on our overall

security posture?• What are some best practices when balancing the needs of information security in a world where

collaboration and sharing is a business requirement?• Why is it more important than ever for executives to have a controlled, collaborative way to securely

share information outside their organization?• Best practices when managing the free cloud storage and migrating existing applications to the

cloud• How do you capitalize on the growth of data, cloud, and/or application development?

Moderator:John DolceDirector & Chief Information Security Officer American Medical Association

Aman RahejaChief Information Security Officer BMO Harris Bank

Daren GlenisterField Chief Technology OfficerIntralinks

Piero DePaoliSenior Director, Product Marketing, SecurityServiceNow

Panelists:Waqas AkkawiVice President, Chief Information Security Officer SIRVA

KEY INSIGHTS:

1._________________________________________________________________________________

2._________________________________________________________________________________

3._________________________________________________________________________________

Page 7: Security Officer (CISO) - ArgyleThe risks to your organization is growing at a rapid pace and with the increased sophistication of the malicious actors, it is critical to identify

AGENDA

11:10am – 11:30am

Thought Leadership Spotlight: "A Data- Centric Approach To Securing the Cloud-First, Mobile-First World"

Mike BassHead of Customer StrategyIonic Security

KEY INSIGHTS:

1._________________________________________________________________________________

2._________________________________________________________________________________

3._________________________________________________________________________________

11:30am – 11:50am

Coffee Break

11:50am – 11:55am

Session Introduction

Katie HanahanRegional Director, Central RegionAgari

The reality of today's data is that it can neither be contained nor constrained. New security strategies need to be adopted to enable secure data ubiquity today and tomorrow. Ionic Security's Head of Customer Strategy, Mike Bass, discusses how his 25+ years in infosec have revealed that everything the industry is doing today to secure data is backwards. The talk addresses what we can do to assure our most sensitive data is protectedl so that companies can securely manage both structured and unstructured data across any network, any device, and any platform.

Page 8: Security Officer (CISO) - ArgyleThe risks to your organization is growing at a rapid pace and with the increased sophistication of the malicious actors, it is critical to identify

AGENDA

11:55am – 12:45pm

Panel Discussion: "Balancing Act: Becoming More Transparent & Even More Secure"

• What are some of the emerging threats that you are seeing develop that will have major effects onthe industry?

• What are your thoughts about the shift in the approach to proactive security with the emergence ofdiverse IT environments?

• As data centers become more distributed and the traditional network perimeter dissolves, what canwe use to protect enterprise data?

• Is identity and access management defining the new security perimeter?• With so many organizations struggling to protect their infrastructures and manage identities within

applications, what are some best practices that you can share that helps your team lower costs andrisks?

• What are some of the other data management best practices have helped you lead your team tosuccess?

• What are the key benefits of SSO for an organization? Does it effectively cut costs? Improveproductivity?

• Does security training equal security awareness when it comes to the internet, cloud and data?

Panelists:Bob EichlerHead of Information SecurityCancer Treatment Centers of America

John GermainVice President, Infrastructure and Security ServicesXylem

Cuneyt KarulChief Security Architect BlueCat Networks

Rohit KinraDirector, Verisign Security Services, Technology & Sales Engineering Verisign@rohitkinra

Tris LingenEVP, CISO, Director of Information Security Risk ManagementTCF Financial Corporation

KEY INSIGHTS:

1._________________________________________________________________________________2._________________________________________________________________________________3._________________________________________________________________________________

Moderator:Celedonio AlbarranAVP, Infrastructure & Security Equity Residential

Page 9: Security Officer (CISO) - ArgyleThe risks to your organization is growing at a rapid pace and with the increased sophistication of the malicious actors, it is critical to identify

AGENDA

12:45pm – 1:05pm

Thought Leadership Spotlight

Mike SpanbauerVice President, Research NSS Labs

KEY INSIGHTS:

1._________________________________________________________________________________

2._________________________________________________________________________________

3._________________________________________________________________________________

1:05pm – 2:05pm

Lunch

2:05pm – 2:25pm

Thought Leadership Spotlight: "Detecting and Mitigating Insider Threat"

Gaby FriedlanderCo-founder and Chief Technology Officer ObserveIT

KEY INSIGHTS:

1._________________________________________________________________________________

2._________________________________________________________________________________

3._________________________________________________________________________________

Page 10: Security Officer (CISO) - ArgyleThe risks to your organization is growing at a rapid pace and with the increased sophistication of the malicious actors, it is critical to identify

AGENDA

2:30pm – 3:05pm

Fireside Chat: Infosec Crossfire

This session will showcase Derek Milroy and Fred Kwong, two security leaders with over 30 years of IS security between them discuss the most relevant topics in today’s security world in a pro/con debate format.

Topics will be as follows:• Insider Threats and User Behavior Analytics• Cloud Security• Securing Internet of Things• Data Loss Prevention• Advanced Persistent Threats• BYOD/Mobile• Protecting the Critical Asset

Fred KwongChief Information Security OfficerDelta Dental

and

Derek MilroyIS Security ArchitectUnited States Cellular Corporation

KEY INSIGHTS:

1._________________________________________________________________________________

2._________________________________________________________________________________

3._________________________________________________________________________________

3:05pm – 3:20pm

Coffee Break

Page 11: Security Officer (CISO) - ArgyleThe risks to your organization is growing at a rapid pace and with the increased sophistication of the malicious actors, it is critical to identify

AGENDA

3:20pm – 3:55pm

Keynote Session: "20/20-20/2020: 20 years evolving today’s CISO with 20-20 vision for 2020"

This session explores the historical evolution of the CISO over the past 20 years, why this is relevant today, and the soft skills, knowledge areas, trends shaping the industry, and approaches necessary to be a successful CISO in 2020.

Todd FitzgeraldGlobal Director Information Security Grant Thornton International

KEY INSIGHTS:

1._________________________________________________________________________________

2._________________________________________________________________________________

3._________________________________________________________________________________

4:00pm – 4:35pm

Keynote Session: "Brief: Developers Linearity"

Security can’t happen while developers and delivery professionals continue to be “linear thinkers” on application development. There are multiple tools to help validate applications but is not enough and organizations got exposed to security breaches that could be suppressed by a change in mindset.What should be done towards developing secure applications? What are we doing wrong? This section will discuss the linearity thinking through two recent real cases and how by being non-linear thinkers will help the security front line.

Alejandro ReskalaVice President of Global Technology, InternationalTransUnion

KEY INSIGHTS:

1._________________________________________________________________________________

2._________________________________________________________________________________

3._________________________________________________________________________________

Page 12: Security Officer (CISO) - ArgyleThe risks to your organization is growing at a rapid pace and with the increased sophistication of the malicious actors, it is critical to identify

AGENDA

4:35pm – 4:40pm

Argyle Executive Forum Closing Remarks

4:40pm – 5:40pm

Closing Reception

__________________________________________________________________________________

*Please note, the agenda is subject to change.

The information, views, and opinions expressed by speakers and other participants at our conferences are those of the individual and do not necessarily reflect the views and opinions of Argyle Executive Forum.

Argyle Executive Forum, its directors and officers, do not guarantee that any information provided by a speaker or other participant is accurate or complete and Argyle Executive Forum does not endorse any opinions that may be presented.

Page 13: Security Officer (CISO) - ArgyleThe risks to your organization is growing at a rapid pace and with the increased sophistication of the malicious actors, it is critical to identify

PARTNERS

Thought Leadership Spotlight Partners

Panel Partners

Session Introduction Partners

Page 14: Security Officer (CISO) - ArgyleThe risks to your organization is growing at a rapid pace and with the increased sophistication of the malicious actors, it is critical to identify

PARTNERS

Breakout Session Partners

Senior Supporter & Networking Partner

Senior Supporter Partners

Supporter Partner

Page 15: Security Officer (CISO) - ArgyleThe risks to your organization is growing at a rapid pace and with the increased sophistication of the malicious actors, it is critical to identify

FEEDBACK

HOW AREWE DOING?

Please submit feedback(the good, the bad and the ugly!) to:

All feedback goes directly to the office of the CEO where it is reviewed and acted upon

to improve your experience.

[email protected]

Page 16: Security Officer (CISO) - ArgyleThe risks to your organization is growing at a rapid pace and with the increased sophistication of the malicious actors, it is critical to identify

DOWNLOAD ARGYLE’S EVENT APPDOWNLOAD ARGYLE’S EVENT APP

INTRODUCING ARGYLE’S MOBILE COMMUNITY

Visit your app store and search “Argyle Executive Forum” to download our event app

and begin engaging with your community. You can also scan the QR codes below:

iPhone Android

Page 17: Security Officer (CISO) - ArgyleThe risks to your organization is growing at a rapid pace and with the increased sophistication of the malicious actors, it is critical to identify

STAY CONNECTEDStay ConneCted

If you are interested in contributing to Argyle’s content platform – Argyle Journal

Please e-mail: [email protected]

Join our LinkedIn Group by scanning the below QR code:

Page 18: Security Officer (CISO) - ArgyleThe risks to your organization is growing at a rapid pace and with the increased sophistication of the malicious actors, it is critical to identify

RECOMMENDATIONS

If you are interested in recommending a speaker for a future forum,

please email:

[email protected]

If you are interested in recommending a member for a future forum,

please email:

[email protected]

Page 19: Security Officer (CISO) - ArgyleThe risks to your organization is growing at a rapid pace and with the increased sophistication of the malicious actors, it is critical to identify

CONTENT NEUTRALITY POLICY

We ask that all speakers, members and sponsors

respect Argyle’s content neutrality guidelines.

We thank you for your continued support for this policy

as a way of protecting the high content standards and trust

that Argyle has established with its members.

• Argyle is proud and protective of our high standards in ensuring the value of all content presented at our events.

• Strict guidelines are in place to ensure that all content presented is balanced and vendor neutral.

• All topics that are covered at our member events are thought leadership-focused and in line with the expectations of our members.

• Argyle seeks to prevent overt sales pitches or unbalanced vendor references.

• Argyle provides all speakers with content presentation guidelines at the behest of our executive membership.

CONTENT NEUTRALITY POLICY