Wednesday, June 21, 2017 | |||
8:00 am - 9:00 am | Registration & Networking Breakfast | ||
9:00 am - 9:10 am | Welcome and Opening Remarks Bob Bragdon, Publisher, CSO | ||
9:10 am - 9:55 am | Defining Risk in 2017 Elizabeth Hackenson, CIO & SVP, Technology & Services, AES Corp. Scott Goodhart, VP & CISO, AES Corp. Bob Bragdon, Publisher, CSO What is top of mind in information security and other areas of risk in 2017? How has the landscape changed in the past year, and what factors on the horizon are likely to change through the end of the decade? Join CSO SVP and Publisher Bob Bragdon for new research and a conversation with the top IT and information security executives at AES, a Fortune 200 global power company, as they share their top risk concerns and mitigation priorities. | ||
9:55 am - 10:15 am | Data Destruction in the IoT Era Sameer Sait, VP, IT & CSO, Arrow Protecting your company’s data is mission critical. The rapid proliferation of connected devices creates new forms of media as well as new locations where data is stored. Most new devices require specialized methods of erasure not yet commercially available. In addition, privacy regulations are broadening in scope and accountability, creating additional risk to an organization. To counteract this exponential growth in IoT devices, Arrow’s CSO will discuss standards and practices to mitigate these risks. View Presentation | ||
10:15 am - 10:45 am | Refreshment & Networking Break | ||
10:45 am - 11:30 am | Building a World Class Security Program Mark Maybury, VP & CSO; Director, NIST National Cybersecurity FFRDC, MITRE Corp. In a world fraught with cyber risk and insider threats, organizations must continually evaluate the tools and techniques they use to manage risk. What does a best in class security program look like today? We'll hear how a leading organization has built its security practice and understand where it focuses resources as it balances priorities and different types of risks. View Presentation | ||
11:30 am - 12:00 pm | Managing the IT/Security Relationship Rodrigo Loureiro, CISO, Laureate International Universities Ben Sizemore, CIO, First Guaranty Mortgage Corp. Bob Bragdon, Publisher, CSO Security is top of mind for both CIOs and CISOs/CSOs. Yet working together to instill a culture where each part of the organization works with the others to build in security best practices is not easy. Despite the sophistication of today’s enterprises, the security organization can still be the last to know about projects where controls were overlooked — while UX specialists bemoan anything that slows down responsiveness or impedes the customer experience. In this discussion with executives from both sides of the fence, we’ll look at the friction points between IT and security and discuss best practices for overcoming them – and building a proactive, collaborative and security-minded culture. | ||
12:00 pm - 1:15 pm | Luncheon with Table Discussions Topics to include: Data Destruction Policies for IoT, hosted by Arrow Migrating to the Cloud, hosted by Unisys Authenticating Consumers & Citizens, hosted by iovation Protecting Sensitive Corporate Data from Mobile Risks, hosted by Lookout Using AI for next-generation Cyber Security, hosted by Darktrace Visibility and Security in the Cloud, hosted by Ixia | ||
1:15 pm - 2:00 pm | Winning Strategies for IoT and New Business Ventures Lisa Tuttle, CISO, SPX Corp. In today’s digital age, many organizations will find themselves affected by IoT and business transformation to launch new data-driven business ventures. These innovations place companies in the crosshairs of new and evolving security exploits and business risks. SPX Corporation is a manufacturing company on that journey, as it adds sensors to equipment and develops new software to manage data. Join CISO Lisa Tuttle to learn how a modern enterprise is managing the risk of IoT and becoming a software provider – with all the technology, cultural change and education that involves. View Presentation | ||
2:00 pm - 2:20 pm | Publisher’s Panel: Securing the Evolving IT Environment Sean O'Connor, VP Cyber Technologies, Darktrace Mark Loucks, Senior Data Scientist, Principal Practice Director, Unisys Bob Bragdon, Publisher, CSO In this fast-paced session, industry expert panelists will weigh in with their views on the latest security news and how it is affecting customers in this new era of threats. Citing specifics from their customer engagements, the panel will talk about the problems their customers are facing and how they are addressing those. They will also share their thoughts on enterprise security in the future when IT environments are rife with IoT, AI, augmented reality, and of course, even more data. | ||
2:20 pm - 3:05 pm | The Threat from Within: How to Minimize Insider Threats Jeff Berkin, SVP & CSO, CACI International Research estimates that nearly 50 percent of data breach incidents originate with insiders. Whether accidental or malicious, insider threats highlight the need for improved security awareness, better monitoring programs and more. What are the latest approaches to managing insider threats across phishing, social engineering and rogue employees? Join us as CSO Jeff Berkin shares the latest techniques that can protect your organization from the inside out. View Presentation | ||
3:05 pm - 3:25 pm | Refreshment and Networking Break | ||
3:25 pm - 4:00 pm | Managing Third-Party Risk in the IT Supply Chain Andy Purdy, CSO, Huawei Technologies USA Organizations rely on third parties for a range of critical functions and IT technologies. Such partners are essential to your business yet introduce supply chain risks that can impact your organization’s risk posture. How should third-party, supply chain risk be considered in your organization’s management of risk? How can you evaluate and mitigate the risk from third parties, including in technology development and the IT supply chain? Join CSO Andy Purdy to discuss this important issue. | ||
4:00 pm - 4:45 pm | Building Credibility with Senior Business Leadership: A CIO/CISO Panel Jeff Berkin, SVP & CSO, CACI International Derrick A. Butts, CIO, Truth Initiative Andy Purdy, CSO, Huawei Technologies USA Chad Sheridan, CIO, Risk Management Agency, Department of Agriculture/USDA Bob Bragdon, Publisher, CSO Key to building a strong security program is the support of senior leadership. IT and security executives need their buy-in to get funding and build a culture of security. What are the best ways to help executives and the board understand the risks to the business? Which conversations do you need to be part of, and how do you make sure you’re invited? We’ll explore these questions and more. | ||
4:45 pm - 4:50 pm | Closing Remarks | ||
4:50 pm - 5:30 pm | Networking Cocktail Reception |