CISO Cloud Summit | November 18-20, 2019 | Westin Kierland Resort & Spa - Scottsdale, AZ, USA

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Monday, November 18, 2019 - CISO Cloud Summit

12:00 pm - 1:00 pm

Registration & Greeting

 

1:00 pm - 1:10 pm

Welcome & Opening Remarks

Presented by:

Scott Dillon, Former EVP, CTO Head of Technology, Wells Fargo View details

 
 
 

1:10 pm - 1:45 pm

Keynote Presentation

All Eyes on You

Security breaches are the most intimidating threats for CISOs and security executives. Because of that, upper level management, shareholders and even consumers are focusing now more than ever on the security department. With that, CISOs need to see this as an opportunity to work closely with business stakeholders to incorporate cybersecurity strategy with their organization's business initiatives. This is an ideal opportunity to address skill shortages and increase professional development of the internal security workforce.

Takeaways:

  1. How the CISO's role has changed
  2. The latest security threats and how they can positively impact your team
  3. How to measures your teams shortcomings and areas for improvement

Presented by:

Kurt Lieber, Group CISO North America, AETNA View details

 
 
 

1:50 pm - 2:25 pm

Share:

Keynote Presentation

Protect Your Keys or Don't Waste Your Time Encrypting Your Data

For over 2000 years, governments, armies, businesses and lovers have been encrypting messages. For the same amount of time, the keys used to perform the encryption have been the weakest link in the chain. After 2000 years, technology has advanced such that the keys can be protected but many companies don't understand how important it really is. 

Mr. Beutlich will explain in an entertaining (and sometimes graphic) fashion why protecting the encryption key is more important than the encryption itself.

Sponsored by:

nCipher View details

 
 

Presented by:

Brad Beutlich, Vice President of Sales Western Region and LATAM, nCipher View details

 
 
 

2:30 pm - 2:55 pm

Executive Exchange

 

Thought Leadership

3 Best Practices for Application Security (and Bonus Tip)

Applications are the lifeblood of the enterprise, but as the threats multiply, as applications move to the cloud, as legacy applications need to be maintained, and as organizations seek competitive advantage with new technologies and faster release cycles, it's easy to see that application security can be a thankless, endless and challenging job. 

Imperva has distilled three best practices (and a bonus tip) that help enterprises of any size vastly improve and simplify application security, accelerate threat detection and operationalize application security in a dynamic world where change is the only constant.

Sponsored by:

Imperva View details

 
 

Presented by:

Jose Gomez, Sr. Sales Engineer of Strategic Accounts, Imperva View details

 
 

Thought Leadership

Is your IT Roadmap Business Driven or Vendor Dictated?

Today, the #1 CEO priority is GROWTH and most see technology as a key enabler. But vendor policies pose major roadblocks to innovation, growth and even security by forcing CIOs and CISOs to spend limited budget, resources and time on projects that may not drive your business. 

Learn how you can take control of your IT roadmap including security by choosing a Business-Driven Roadmap designed around your business and compliance objectives and not the vendor's. Leverage vendor software, but do it on your terms, on your timetable and with the flexibility, funding and freedom to focus on initiatives that support growth and protect the enterprise.

Sponsored by:

Rimini Street View details

 
 

Presented by:

Sebastian Grady, President, Rimini Street

 
 

3:00 pm - 3:25 pm

Executive Exchange

 

Think Tank

Regulations Mean Change

More complex regulations, such as the General Data Protection Regulation (GDPR), have come into play due to the rise of data breaches forces. As data today is viewed as a such an asset, it is also a tremendous liability. Understanding that, organizations must consider both while they implement technologies that will be both innovative their business, but also cost effective.

Takeaways:

  1. Understand the latest regulations, such as GDPR
  2. How to tell your CEO and other business stakeholders that data protection can be a key differentiator for your organization
  3. The steps needed to take to be regulatory compliant

Presented by:

Michael Owens, Business Information Security Officer, Equifax

 

Think Tank

Digitalization Model Development


Presented by:

Wenying Jiangli, Managing Director, Business Analytics, Credit-Suisse

 
 

3:25 pm - 3:35 pm

Networking Break

 

3:40 pm - 4:05 pm

Executive Exchange

 

Share:

Thought Leadership

Mobile-centric Zero Trust Security Framework

Passwords are no longer sufficient protection against breaches because users are accessing information from a variety of untrusted devices, apps, networks, locations and services. So, in the reality of today's security world how does an organization protect itself? One answer is with a Zero Trust approach and framework to security. But with numerous theories about Zero Trust, how do you ensure that you've taken the right approach? in this session, discover how to: 

Takeaways: 

  • Drive business innovation with mobile productivity by giving employees the ability to use mobile, cloud and endpoints 
  • Enforce corporate security without impacting the user experience 
  • Redefine enterprise security strategies to address a perimeter-less environment

Sponsored by:

MobileIron View details

 
 

Presented by:

Jay Bhansali, Sr. Director Product Marketing, MobileIron View details

 
 

Thought Leadership

Enabling a Business-First Network

In this session, we will focus on helping companies sort through the massive number of current SDWAN product offerings, how to properly vet and evaluate an SDWAN provider, and the SDWAN features/technologies that make a difference in a manufacturing environment. Q&A to follow

Sponsored by:

Silver Peak Systems View details

 
 

Presented by:

Gunnar Gustafson, Director, Enterprise Sales, Silver Peak Systems View details

 
 
 

4:10 pm - 4:35 pm

Executive Exchange

 

Think Tank

The Solution for Your Legacy System's Security: The Cloud

Over lifespan of an organization, CIOs/CISOs have developed and implemented technologies that has been key to the organization's success. However, CISOs and their security teams today find themselves stuck ensuring that legacy systems are secure. The solution is cloud-delivered security products that are more agile with the ability to implement new detection methods and services faster than on-site solutions. While cloud security is an ideal solution, it is important to know that using the cloud is more than moving legacy management servers to the cloud. 

Takeaways:

  1. Review the status of legacy system security
  2. What cloud solutions are the best fit for their business
  3. What are the main needs in regards to system's scale, data telemetry, staff growth, machine learning, API-based access, and more

Presented by:

Mindy Eihusen, Head of Information Security and Risk Management, ConAgra

 

Share:

Think Tank

Enterprise 2.0: The Future of Enterprise Software

The future of enterprise software looks vastly different than it does today. How can today's technologists create tomorrow's enterprise software? Digital disruption presents opportunities and threats, encouraging businesses to use enterprise software to innovate and push boundaries. The future of enterprise software will have systems that are perfectly composed and personalized for the user-similar to the customized shopping experience on Amazon. Post-digital transformation, users should have the same perfectly adaptable experiences in the office as they do with consumer applications.  

AI can help create personalized experiences in enterprise software, rapidly transforming data into insights that feed process automation and innovation experiences. This can only happen if organizations have a plan in place to successfully drive AI implementations. A recent IDC report found that about two-thirds of companies have adopted AI technologies, but only a quarter of those enterprises have a strategy in place to reach that goal.  

Intelligent technologies like AI and machine learning are key to a successful digital transformation, as digital businesses need data to create a more personalized user experience in enterprise software. These technologies will change how technologists deliver systems and enhance corporate innovation-eventually making an AI-powered Enterprise 2.0 a reality.

Presented by:

Andy Mutz, Global Head of Technology and Data Architecture, SAP View details

 
 
 

4:40 pm - 5:05 pm

Solutions Spotlight

Deep dives into the latest and greatest technology solutions to today's business problems. 
 

5:10 pm - 6:10 pm

Fireside Chat

Moderated by:

Deidre Diamond, Founder and CEO, CyberSn

 

Panelists:

Diana Camplinger, Chief Administrative Officer, Consumer Technology/ Head of Marketing Technology, SunTrust Bank

 
 

6:30 pm - 7:30 pm

Summit Networking Happy Hour

 

7:30 pm - 8:30 pm

Share:

Dinner Keynote

AI: a CISO's Best Friend

It does not take an expert to know that information security threats will only continue to increase. That said, AI is proving to be a worthy defense against these threats. Leading enterprise organizations are investing and relying on AI-based security systems and analytics. As this trend continues, AI-defense will only continue to grow and improve. 

Takeaways: 

  1. The future of AI-based security and how it will impact your organization 
  2. The latest threats and how AI-based security can help 
  3. Create awareness for your stakeholders to gain support behind AI-based security systems

Presented by:

Shamla Naidoo, Managing Partner Global Information Security, International Business Machines Corporation

 
 

8:30 pm - 9:30 pm

After Dinner Networking Reception

 

Tuesday, November 19, 2019 - CISO Cloud Summit

7:45 am - 8:30 am

Registration & Networking Breakfast

 

8:30 am - 8:40 am

Welcome & Opening Remarks

 

8:40 am - 9:15 am

Keynote Presentation

Case Studies in Digital Transformation: Learnings Along the Journey

We will explore key learnings from various industries and verticals on the good, the bad and the ugly of digital transformation. We will have an opportunity to not only be exposed to successful use cases, but also ask the hard questions behind those successes. 

Takeaways: 

  1. One of the best ways to learn is to hear the stories of success (and failure) from companies similar to yours. 
  2.  Asking questions of HOW the journey unfolded are just as important as the end result

Sponsored by:

IBM View details

 
 

Presented by:

Scott Buckles, Business Unit Executive - North America Business Analytics and Unified Governance Solutions Sales, IBM View details

 
 
 

9:20 am - 9:55 am

Keynote Presentation

CIOs & CISOs: One Foot on the Gas & One Foot on the Brake?

CIOs are facing increasing pressure to guide their companies to rapidly adopt new technologies and solutions to keep their companies competitive in their industry. CISOs are facing increasing pressure to keep their company and its data safe and secure from all threats. Without great vision and cooperation these goals can appear to be at cross purposes. 

Takeaways:

  1. CIOs and CISOs are both facing pressures that could seem to be at cross purposes.
  2. CIOs and CISOs must work very closely together to accomplish both their individual organizational goals but also the overarching company goals to thrive

Presented by:

Scott Dillon, Former EVP, CTO Head of Technology, Wells Fargo View details

 
 
 

10:00 am - 10:25 am

Executive Exchange

 

Share:

Think Tank

Making Your Way Through the Fog of Cloud Computing in a Secure Path

What have we learned from a decade of cloud computing? What are the best practices that we should be taking into account as we take the next step on the digital transformation journey? We will discuss the full range of data center to cloud to hybrid cloud to fog and everything in between. 

Takeaways: 

  1. Cloud computing has effectively been with us for a decade. There are clear learnings in the last 10 years that we should leverage as we implement new solutions.
  2. One size does not fit all. Effective solutions can range from a state of the art data center to a hybrid cloud to a fully implemented cloud solution.
  3. Security requirements must be considered on the various cloud implementation options.
  4. Multi-cloud considerations from a security standpoint and operationalization aspect.

Presented by:

Jim Cordovana, Group VP, Head of Cloud Security Architecture, SunTrust Bank View details

 
 
 

10:30 am - 10:55 am

Executive Exchange

 

Share:

Thought Leadership

The Collaboration Security Blindspot

Organizations don't just communicate via email anymore. Slack, OneDrive, Salesforce, Yammer....there are many new channels internally and externally where employees exchange content, that are ripe for cyber attacks. Join us to learn more about this new security challenge and how to close the gap.

Sponsored by:

Perception Point View details

 
 

Share:

Thought Leadership

What Knowledge Gaps Will You Face When Your Best Workers Retire?

Boomers make up nearly a third of the workforce. More than half of them are in leadership positions, and they are retiring in droves. This massive exodus of talent is an existential problem for companies. 

Most institutional knowledge about products, processes, and customers is formally documented, but is in the collective heads of the people who have done the work for years and know the intricacies of workflows. When these workers retire, they take the knowledge with them, causing a massive drain of organizational wisdom. 

Capturing this tacit knowledge from an aging workforce, and putting it to use, can make the difference between companies that thrive and ones that die off. 

This session will explore how organizations are approaching the need to preserve tacit knowledge. 
  • Is the C-suite aware of the risks involved with tacit knowledge?  
  • What initiatives can help preserve tacit knowledge? 
  • What types of expertise should be involved? 
  • How might machine learning, deep learning, and other AI help?

Sponsored by:

Lucidworks View details

 
 

Presented by:

Justin Sears, VP of Product Marketing, Lucidworks

 
 

10:55 am - 11:05 am

Networking Break

 

11:10 am - 11:35 am

Executive Exchange

 

Share:

Thought Leadership

Is AI the future of Email Security?

Email continues to be the dominant attack vector for threat actors in today's landscape. Email security gateways have been focused and effective on widespread attacks and campaigns, but have been porous to sophisticated, highly targeted attacks. Despite significant investments into email security, Business Email Compromise (BEC) losses have nearly doubled year over year over year - from $360M in 2016 to $1.3B in 2018. This represents roughly 48% of all cybercrime losses. Combatting BEC and other socially-engineered, payload-less attacks requires a shift in mindset and approach. AI and Machine Learning have hyped technologies in security over the past several years. So the question is - Is AI the future of email security?

Sponsored by:

Abnormal Security View details

 
 

Presented by:

Ken Liao, VP, Marketing, Abnormal Security

 

Thought Leadership

Leveling up your Organization with Innersource

Innersource' describes the application of open source principles, practices, and culture inside an organization. While the benefits of innerSource seem like common sense, many enterprises face challenges adopting innersource internally. In this talk, we'll review innersource in some detail, highlight typical obstacles, and share ideas on practical approaches to implementing innersource.

Sponsored by:

GitHub View details

 
 

Presented by:

Edd Patterson, Director, Enterprise Solutions Engineering, GitHub View details

 
 
 

11:40 am - 12:05 pm

Executive Exchange

 

Think Tank

GDPR Causing Confusion with Cloud Technology

Security is, and will continue to be, an issue within cloud technology especially with recent regulations such as the General Data Protection Regulation (GDPR). Because of the advantages and opportunities of the cloud, organizations will likely rush into cloud technologies without being fully aware of the security risks. After GDPR came into effect, there is now an even greater responsibility on organizations to manage their data compliantly as they continue transformations towards the cloud.

Takeaways:

  1. How GDPR affects your organization's security and cloud services
  2. Discuss the threats that cloud technologies present and how your organization may be more vulnerable
  3. Regulations' impact on the future of cloud security

Presented by:

Gregory Ericson, CIO, Essilor View details

 
 
 

12:10 pm - 12:35 pm

Executive Exchange

 

Executive Boardroom

Building the Business Case for ServiceDesk Task Automation

ITSM solutions, such as ServiceNow, are essential if you want to give employees a modern workplace experience. However, digitizing your helpdesk workflow is only the first step. To achieve the full spectrum of productivity enhancements that ITSM solutions offer, they must be complemented by task automation to further reduce incident volume and improve issue resolution times. 

In this session, automation experts from 1E will walk you through how to craft and present a business case for workflow and task automation based on real-world application and a business-first approach.

Sponsored by:

1E View details

 
 

Presented by:

Jason Keogh, VP, Product, 1E

 

Executive Boardroom

Defense in Diversification: Improving cybersecurity through smart consolidation

Cybersecurity tool sprawl is has reached unsustainable levels, and research shows 66% of businesses are striving to consolidate their security portfolio. But overconsolidating to a few platform solutions risks creating a vulnerable, innovation-stifling monoculture. If every organization uses a nearly identical set of security tools, compromising one means compromising them all. Heterogeneity of cybersecurity systems is itself a defense, so security teams need to approach consolidation differently. In this session, attendees will learn: 

  • How a data-first approach to security architectures can illuminate natural consolidation points 
  • How collaboration with other parts of the IT organization can improve security posture and reduce tool sprawl. 
  • How this collaborative approach also creates opportunity to leverage other parts of the organization to improve security posture through smarter processes and practices.

Sponsored by:

Extrahop Networks Inc View details

 
 

Presented by:

Corey Bodzin, Head of Product, Extrahop Networks Inc View details

 
 
 

12:40 pm - 1:05 pm

Solutions Spotlight

 

1:05 pm - 2:15 pm

Executive Visions Panel

The Revitalizing Change in the Role of the CXO

A CXO's role, goals and objectives have drastically changed over the years as most CXOs supervise teams and units beyond their IT/IT's security. Because of these changes in responsibilities, a CXO's success is measured in greater business metrics. As a result, the role of a CXO has become both more attractive and more demanding.

Takeaways:

  1. What are the significant changes regarding the role of the CXO
  2. How to keep up with the changing requirements
  3. How to properly measure a CXO's success

Moderated by:

Scott Dillon, Former EVP, CTO Head of Technology, Wells Fargo View details

 
 

Panelists:

Kurt Lieber, Group CISO North America, AETNA View details

 
 

Max Chan, CIO, Avnet View details

 
 

David Price, CTO, AVP Asset Management, Black & Veatch View details

 
 

Dave Hudson, Chief Information Officer, Insight Global View details

 
 

Vinod Bidarkoppa, SVP and CIO , OptumServe, UnitedHealth Group View details

 
 
 

2:20 pm - 2:45 pm

Executive Exchange

 

Thought Leadership

Keeping ALL Endpoints Continuously Patched and Compliant - Quickly and Cost Effectively

IT security and operations teams struggle to keep Unix, Linux, Mac and Windows servers and end user devices continuously patched and compliant with security and regulatory mandates. They also strive for faster time-to-remediation during incidents. Using HCL BigFix, IT operations and security teams can instantly report to executives, board members and high-value supply chain partners that all systems are continuously patched and compliant, resulting in increased productivity and cost savings.

Sponsored by:

HCL BigFix View details

 
 

Presented by:

Mark Phinick, Vice President of BigFix Sales, HCL BigFix View details

 
 
 

2:50 pm - 3:15 pm

Executive Exchange

 

Executive Boardroom

Implementing a Multi-Cloud Strategy

It is imperative for IT to become a business partner to each line of business for successful Digital Transformation. To do so, the correct technology must be used for the right reasons. DevOps and CI/CD are necessary practices that must be operationalized from the infrastructure layer to production software. Please join this session to understand the complexities of multi-cloud and DevOps and how to implement a strategy to be successful. 

Key Takeaways: 

  • What is cloud. 
  • What are cloud native applications.  
  • How to combine the use of cloud, traditional applications, and cloud native applications to power the lines of business.

Sponsored by:

VMware View details

 
 

Presented by:

Amanda Blevins, Senior Director and Chief Technologist Office of the CTO, VMware

 

Executive Boardroom

Sponsored by:

Vectra AI, Inc View details

 
 
 

3:20 pm - 3:45 pm

Executive Exchange

 

Think Tank

Information Security Office & Information Systems Office "Finding Common Ground"

CIOs are facing increasing pressure to guide their companies to rapidly adopt new technologies and solutions to keep their companies competitive in their industry. 

CIOs, CISOs and Privacy Officers are facing increasing pressure to keep their company and its data safe and secure from all threats.  

Finding common ground takes careful and nuanced negotiations in order to avoid under or over securing technologies. 

 Takeaways: 

  1. CIOs, CISOs and Privacy Officers are collectively facing pressures that could seem to be at cross purposes. 
  2. CIOs, CISOs and Privacy Officers must work together to accomplish both their individual office goals but also the overarching organizational goals to thrive.

Presented by:

Jamie Franklin, SVP/CIO, Community Medical Centers

 

Eric Saff, VP,CTO, Community Medical Centers

 

Debra Muscio, SVP Audit, Privacy Compliance,CISO, Community Medical Centers

 
 

3:45 pm - 3:55 pm

Afternoon Networking Coffee Break

 

4:00 pm - 4:25 pm

Executive Exchange

 

Share:

Think Tank

Where is the Top Talent?

One of the major challenges for CISOs is finding top information security talent. However, look at 2019 as an opportunity to begin your search with universities and colleges that are expanding their cybersecurity programs due to the shortage of cybersecurity professionals. This session will also cover how to recruit and hire top cybersecurity talent.

Takeaways:

  1. Where to seek out the best cybersecurity talent
  2. The red flags to watch out for with incoming applicants
  3. The importance of focusing on retention

Presented by:

Edmund Jones, Information Security Officer (ISO), Technical Fellow Cyber Security

 

Think Tank

How To Tackle Culture as a Driving Force of Digital Transformation

As Peter Drucker famously said, "Culture eats strategy for breakfast". Everyone is eager to use and accept this as a reality, but most struggle with what it really means and how to go about taking it on. This can be even further compounded when a single part of the organization, such as IT takes on this challenge and the rest of the company is not on the same page. Couple this with a rapidly changing workforce that has a completely different set of ideals around culture and you are sure to have your breakfast devoured before your coffee even begins to cool. A holistic, passionate, "heart centered" approach is required and you need to manage all facets of your culture to get hiring right, develop your talent pipeline, improve productivity and ultimately lower attrition. These are the basic pillars required to sustain a true digital transformation. 

Takeaways: 

  • Culture is not just a buzz-word. It can, and will be, one of the core things that ultimately drives your organization and your company's failure or success. 
  • Today's workforce is changing and we have a tight labor market- if you have an old school attrition model, you will not be able to compete with those having a development model.
  • Getting your culture right gives you the foundational pillars of your organization and business. 
  • Future successful organizations will rely on their culture, not their technology as their differentiator. 
  • A holistic approach is required - and there are clear examples of this working and not working that we can observe.

Presented by:

Dave Hudson, Chief Information Officer, Insight Global View details

 
 
 

4:30 pm - 4:55 pm

Executive Exchange

 

Share:

Closing Keynote

Still Using Passwords? Forget That Sh*t.

The constant barrage of breaches over the last decade has made it clear that usernames and passwords - invented back in 1964 - are simply no longer secure enough. According to the 2019 Verizon Breach Investigations Report, compromised credentials are responsible for over 80% of all breaches. 

Despite attempts to make static credentials more secure by adopting two-factor authentication utilizing SMS, OTPs or hardware tokens, these added layers still leave organizations vulnerable to phishing attacks, keylogging, malware and more. 

By removing the past reliance on usernames and passwords, you can enhance your organization's security by significantly reducing your overall attack surface and virtually eliminating the risk of compromised credentials. 

Takeaways: 

  1. Learn how usernames and passwords are leaving your organization at risk. 
  2. See how passwordless authentication removes major threat vectors. 
  3. Provide users a fast, simple and consistent authentication experience across any channel.

Sponsored by:

Trusona, Inc. View details

 
 

Presented by:

Sharon Vardi, Chief Marketing Officer, Trusona, Inc. View details

 
 
 

5:00 pm - 6:30 pm

Summit Happy Hour

 

6:30 pm - 8:30 pm

Networking Dinner

 

8:30 pm - 10:00 pm

After Dinner Networking & Entertainment