Agenda

All curriculum for the Leadership Exchange is developed and delivered by the CISO community. We are currently conducting research with the Dallas Leadership Board to finalize the agenda. Please check back for updates!

Featured Speakers

  • Dan Bailey, SVP, Director of Enterprise Risk Management, Beal Bank 
  • Rameshwar Balanagu, Chief Architect Officer, UNFI 
  • Everett Bates, CISO, Crunchyroll 
  • KC Condit, CISO, G6 Hospitality 
  • Alain Espinosa, BISO, Upbound Group 
  • Travis Farral, VP & CISO, bp/Archaea Energy 
  • Bill Floyd, CIO/CISO, Futu  
  • Derek Morton, CISO, Alcon 
  • Guy Pieroni, Director, IT Security & Risk Management, Yum! Brands 

 

** Session times, speakers, and topic may change.

Tuesday, May 14, 2024
8:00 AM

Please join us for networking and breakfast.

 
9:10 AM

CISOs must keep their organizations ready to handle rising threats and build a strong security culture capable of outpacing threat actors. With insight provided from Unit42 on the current threat landscape, this panel discussion will reflect on how CISOs and technology partners uncover and prepare for today’s most significant risks.

 
9:40 AM

Learn about innovative use cases from leading-edge technology partners. 

 
10:15 AM

Organizations run critical operations on an interconnected digital ecosystem creating seamless connectivity and enhancing user experiences. But it also creates an easy target for sophisticated threat actors and demands CISOs have a robust application security posture. This collaborative roundtable explores:  

  • Challenges to maintain visibility into application security 
  • How AI is enabling new opportunities and creating risk 
  • Advice to stay abreast of and prepare for emerging threats 
 

Maturing an insider threat program in today’s connected environment requires unique security processes, technical controls, and an enterprise-wide approach. Discuss with your peers the challenges of managing risk from within. Explore how to:  

  • Leverage existing governance processes to consistently monitor critical assets   
  • Ensure analytical tools proactively detect data use and movement anomalies, focusing on high-risk activity  
  • Develop incident response protocols mindful of privacy, regulatory implications, and severity of the incident  
 

Please check back regularly for agenda updates.

 
11:00 AM
 
 
11:30 AM

Security incidents can be unpredictable, and the increased complexity of an organization’s environment requires security teams to act quickly in a high-pressure situation. This boardroom discussion explores the challenges, best practices, and resources to prepare your team and enterprise for controlled, confident action amidst the chaos. Discuss:  

  • Effective tabletop exercises to prepare and practice IR enterprise wide  
  • Your organization’s most significant incident response challenges  
  • Creating a feedback loop between threat detection, mitigation, and IR preparedness 
 

Business depends on IT that is agile, reliable, and secure. However, differences in priorities and operational speeds across Security, Development, Operations, and Lines of Business can create friction, impacting both collaboration and security effectiveness. Discuss actionable strategies to harmonize these relationships and ensure robust security that supports business objectives. Topics include: 

  • Identifying and addressing common collaboration barriers 
  • The impact of cross-team alignment on security strategies 
  • Best practices for integrating cutting-edge technologies to foster cooperation 
 

In 2024, CISOs face an evolving cybersecurity landscape marked by sophisticated threats from advanced technologies like AI and IoT. This discussion will outline strategic approaches for CISOs to enhance their organizations' resilience, including adopting multi-layered defenses, regulatory compliance, and proactive threat management. Key focus areas will include: 

  • Strengthening AI and IoT security 
  • Implementing effective cybersecurity testing 
  • Integrating cybersecurity with broader business strategies 
KC Condit Mitchelle Schanbaum
12:15 PM
 
 
1:10 PM

Learn about innovative use cases from leading-edge technology partners. 

 
1:30 PM

CISOs maintain a broad understanding of various business facets, from regulatory and legal matters to cyber threats and technology, all while mastering the strategic skills to be truly impactful: trust, communication, negotiation, and influence. This would stretch any leader, but in today’s era of rapid technological change CISOs must also embrace continuous innovation. This panel discussion explores how the CISO role is morphing in unprecedented ways and offers valuable insights to successfully lead teams and organizations securely through an innovative era.

Cindi Carter
2:00 PM
 
 
2:25 PM

Generative AI has taken over the conversation and, in time, will be transformative to the cyber industry and our society. But the models are still in development, and ultimately, CISOs must discern the appropriate places to leverage AI to help their company as well as define acceptable risks and proper usage. Explore with your peers: 

  • Preventative approaches to AI generated threats    
  • Weighing the risk of AI to privacy and data confidentiality   
  • Vetting AI technologies and third-party security concerns 
 

Reliance on siloed data and manual processes has long frustrated security leader’s attempts to understand how an organization’s cyber risk profile—for better or worse—is moving. The SEC’s recent cyber disclosure ruling only sharpens the need for real time insights on potential cyber risks and their estimated financial impact. Join for a discussion with CISO peers, exploring:  

  • Current approaches to reporting cyber risk at the board level  
  • How past security incidents have informed risk indicators and IR plans 
  • Interpretation of materiality and its impact to cyber risk qualification   
 

The adoption of SaaS has become increasingly essential for enterprise success but integrating these services – often sitting outside of security and IT teams – introduces significant risk that can be challenging to fully understand. This roundtable is an opportunity for CISOs to share their approach to creating a comprehensive supply chain security strategy. Explore: 

  • Current challenges to detect risk in third party systems  
  • How to create accountability for software manufacturers 
  • Scope of effort to remediate third-party vulnerabilities  
  • Strategy to elevate supply chain risk to the executive level 
     
 
3:20 PM

Learn about innovative use cases from leading-edge technology partners. 

 
3:40 PM

Organizations are dealing with unprecedented cybersecurity challenges, from regulatory scrutiny and increased personal liability to a proliferation of data and new risk from emerging technologies. In this panel, CISOs share their advice to create organizational resiliency within complexity, the mindset leaders must adopt to create personal and team resiliency, and what the future will demand of security executives.

 
4:15 PM

Enjoy networking, cocktails, and hors d'oeuvres at the closing reception.