Agenda

Thursday, June 27, 2024
8:00 AM

Please join us for networking and breakfast.

 

 
 
9:00 AM

Cybersecurity is a significantly more important factor to business decisions for customers, partners, and investors when compared to ten years ago. With larger and more impactful breaches and increasing attention from regulators, security will continue to become more critical to effective organizations, and CISOs must be proactive about adapting their approach to leadership. In this interactive discussion, senior security leaders share insight on becoming a different type of CISO today to ensure better results tomorrow.

Trina Ford
 
9:40 AM

Learn about innovative use cases from leading-edge technology partners. 

 
 
10:15 AM

The new SEC security disclosure rules and increased frequency and impact of cyber incidents have made it essential for CISOs to structure security programs that are highly measurable with clear lines from investments to risk reductions. This roundtable conversation will delve into: 

  • Defining materiality and its integration into your operations
  • Reevaluating program structure to be more measurable 
  • Impact to a CISOs personal liability and protective measures
Scot Hutton
 

The adoption of SaaS has become increasingly essential for enterprise success but integrating these services – often sitting outside of security and IT teams – introduces significant risk that can be challenging to fully understand. This roundtable is an opportunity for CISOs to share their approach to creating a comprehensive supply chain security strategy. Explore: 

  • Current challenges to detect risk in third party systems
  • How to create accountability for software manufacturers 
  • Scope of effort to remediate third-party vulnerabilities
 
 

Not only is the number of attacks increasing, but the environments that cybersecurity teams must protect are becoming more connected, complex, and expensive. In this collaborative group discussion, senior security leaders share insights on how to leverage leadership skills to improve their teams ability to protect the attack surface.  

 
 
11:00 AM
 
 
 
11:30 AM

Reliance on siloed data and manual processes has long frustrated security leader’s attempts to understand how an organization’s cyber risk profile—for better or worse—is moving. The SEC’s recent cyber disclosure ruling only sharpens the need for real time insights on potential cyber risks and their estimated financial impact.  Join for a discussion with CISO peers, exploring:  

  • Current approaches to reporting cyber risk at the board level  
  • How past security incidents have informed risk indicators and IR plans 
  • Interpretation of materiality and its impact to cyber risk qualification  
Patrick Voon
 

The most effective security leaders balance responding to day to day challenges with preparing their organization for the future. In this breakout discussion, Nick Reva, Head of Corporate Security Engineering, Snap Inc. shares how he is using enterprise browser to enable an innovative organization and how other security leaders can start being innovative with enterprise browser. 

Nick Reva
 
12:15 PM
 
 
 
1:10 PM

Learn about innovative use cases from leading-edge technology partners. 

 
 
1:30 PM

Security leaders have a crucial position in the organization’s posture. As the number and severity of cybersecurity attacks continues to increase, effective security leaders can leverage their position to create a holistic resiliency plan. In this fireside chat, Amy Bogac shares her insight on building not just technical resiliency but fostering business and personal resiliency in the face of complex security incidents.

 
 
2:00 PM
 
 
 
2:25 PM

Identity access management is a critical element of security program innovation, laying the groundwork for organizational agility, innovation, and a consistent security posture. As organizations increase the number of tools, users, and partners they work with, building an agile identity program that doesn’t impede the business becomes increasingly challenging. In this highly collaborative session, discuss IAM implementation and maturation with your peers, exploring:     

  • Implementing next gen technology governing the identity and access lifecycle
  • Developing new metrics on the effectiveness of your IAM architecture
Ginny Davis
 

The rapid innovation of AI technology has not translated to immediate benefits for cybersecurity teams. With so many organizations offering AI and ML empowered technology, CISOs must cut through the noise to understand, prioritize, and adapt the right AI for the right job. In this collaborative discussion, local security leaders share insights on the real value they have received from AI projects. Discussion will address:
•    Evaluating AI technology for optimal business & security value
•    Building the right budget and team skill set for AI innovation
•    Sharing insights and lessons learned from AI implementation

 
 
3:20 PM

Learn about innovative use cases from leading-edge technology partners. 

 
 
3:40 PM

Security leaders are looking for any opportunity to automate this year, but several pillars of information security remain dauntingly manual—third and fourth-party risk management and an increasing number of internal vulnerabilities. Most CISOs must tie down multiple FTEs to manage the never ending spiderweb of risks. In this collaborative panel discussion, local security leaders share insights on increasing risk visibility, automating mitigation where appropriate, and adapting strategy to current industry challenges. 

Dan Meacham
 
4:15 PM

Enjoy networking, cocktails, and hors d'oeuvres at the closing reception.