Argyle Digital: Cybersecurity Leadership Forum 2020
July 23, 2020


The Argyle Group presents the Argyle Digital Cybersecurity Leadership Forum, an exclusive online gathering of CISOs and senior-level IT & cybersecurity executives in search of a deep-dive examination of techniques and technologies the space is sourcing and implementing to shield their organization against the ever-increasing array of threats, with an emphasis on:

  • advanced threat defense,
  • endpoint protection,
  • cloud security, security analytics, and intelligence,
  • data protection, and
  • emerging trends in identity and access management.

By attending this exclusive event, you will better understand:

  • How to effectively communicate requirements to stakeholders in order to protect the integrity of your data and privacy protection strategies
  • Responding to business risks (including those associated with the global pandemic) in real-time with integrated risk management
  • How to develop actionable strategies to protect your organization from existing and emerging threats

Join us for this day of case studies, discussions, and expert presentations – as well as check out our Argyle Digital CIO Leadership Forum available NOW on-demand.

Both events provide actionable steps that will enable you to take your organization to the next level with their overall digital and data security strategies.

Join Us at this Event


If you'd like to recommend a speaker, please email

Who Should Attend

Executives, aspiring executives, and other driven professionals working in:
  • Information Technology
  • Information Security
  • Cyber Security
  • Systems Administration
  • Network Security
  • Security QA and Testing
  • IT/OT leadership and management with direct cybersecurity oversight

  • CISOs
  • CSOs
  • CIOs
  • CTOs
  • CEOs
  • VPs of technology and network systems
  • Chief Privacy Officers
  • IT Directors
  • IT Auditors
  • Risk Officers
  • Heads of IT Strategy
  • IT Infrastructure Directors
  • Head of Security Operations
  • Cyber Security Specialists
  • IT Security Architects

  • IT Security Coordinators
  • Data Security Directors
  • IT Security Managers
  • Heads of Networks
  • Network Managers
  • IT Security Analysts
  • Head of IT Operations
  • IT Architects
  • IT Technicians
  • Data Protection Officers
  • Compliance Managers
  • Internal Audit Managers
  • IT-solution managers (ISM)
  • IT Operations Directors
  • System Administrators
  • IT System Managers











11 AM - 11:05 AM ET

Argyle Opening Remarks

11:05 AM - 11:35 AM ET

KEYNOTE PRESENTATION: Security Architecture - Balancing Business Outcome and Risk for a More Secure Enterprise

Dealing with data security up-front rather than repairing the costly and time-consuming fallout caused by security breaches makes good business sense, and the best way to do so is by rethinking your approach enterprise security architecture. By implementing security controls as supportive roles, companies can ensure that solutions work and are efficient to meet business needs, protect against known threats and properly balance risk.

Attend this session to learn how to:

  • Utilize existing functions to aid security transformation efforts in your company
  • Reduce data risk by baking security design (homegrown and shelf-ware) into solutions
  • How to integrate security architecture with app architecture, infra architecture, and data architecture

Jason DeMarcoExecutive Director of Information Security - Architecture & EngineeringMGM Resorts International

11:40 AM - 12:10 PM ET

THOUGHT LEADERSHIP: Introduction to Risk-Based Vulnerability Management - featuring Kenna Security

Organizations have millions of vulnerabilities. And our research has shown that those same organizations, large or small, on average, can only fix one in 10 of those vulnerabilities.

But as a security executive you still need to keep your organization secure, so how do you do that when you can’t possibly fix all of your vulnerabilities? The answer is to focus on your highest-risk vulnerabilities first.

Join Kenna Security’s Jonathan Cran as he:

  • Reviews what years of research into vulnerability management data uncovered about the scope of the challenge
  • Details the findings on how risk-based is the way to get ahead in vulnerability management
  • Lays out several factors that drive better remediation performance
  • Provides steps for setting up a successful risk-based vulnerability management program

Jonathan Cran Head of ResearchKenna Security

12:15 PM - 1 PM ET

PANEL DISCUSSION: Pandemic, Layoffs & Shutdowns - How Are You Protecting Data from Looming Insider Threats?

The COVID-19 global crisis has turned enterprises inside out.  Remote workers using outside networks amplify the need for new strategies in data protection. As CISOs and senior-level cybersecurity and technology executives, you and your teams spend extensive time and money preparing for external threats – but are you ignoring insider threats?  Insider threats are the fastest growing risk organizations face today and the global pandemic has proven that people and data will continue to be on the move and vulnerable.  Job tenure is declining and the ways in which data moves is increasing at an unprecedented pace. The reality is – prevention is no longer enough.

In this session, topics of discussion will include:

  • Implementing security measures to quickly identify and respond to insider threats to data
  • Understanding high risk users and how to create an insider threat program to protect your organization
  • Changing the perception of your security team as the ‘no’ police to the protectors of collaboration


Tolgay KizilelmaChief Information Security OfficerUniversity of California Merced, Office of Information Technology


Amit BhardwajChief Information Security Officer Lumentum

Sathish KuppuswamyChief Security Architect, Cybersecurity Leader PG&E

Juan MoralesDeputy Chief Information Security Officer, Global Information SecurityRealogy Holdings Corporation

Ray StirbeiSenior Director, Information Security and PrivacySignet Jewelers

1:05 PM - 1:30 PM ET

THOUGHT LEADERSHIP: Best Practices to Improve Cyber Resilience with Zero Trust - featuring Centrify

Cyber breaches are bigger and worse than ever. Hardly a day goes by without headlines about some new devastating cyber-attack. As hundreds of millions of customer records, credentials, and proprietary information are stolen from organizations every year, regulators and oversight agencies have put special emphasis on enforcing proper cyber hygiene and improving cyber resilience.

Realizing that traditional security strategies are no longer enough in battling today’s threats, many security practitioners have altered their approach and adopted a Zero Trust model to secure their ever-expanding modern attack surfaces, including cloud, big data lakes, DevOps, containers, and microservices.

There are many starting points on the path to Zero Trust. However, all roads still lead to identity. Hackers don’t hack in anymore — they log in using weak, default, stolen, or otherwise compromised credentials. Indeed, Forrester Research estimates that 80 percent of today’s breaches involve privileged access abuse — that is, user accounts that have administrative access to critical systems in the organization.

Attend this session to learn about:

  • Why today’s security is not secure;
  • Explore today’s tactics, techniques, and procedures of hackers to implement an effective security strategy;
  • Best practices of prevention;
  • Why Zero Trust is considered the antidote of today’s threatscape;
  • Why the path to Zero Trust starts with identity;
  • How to start your journey towards Zero Trust; and
  • What benefits you can achieve by aligning your security strategy with a Zero Trust approach

David McNeelyChief Strategy OfficerCentrify

1:30 PM - 2:15 PM ET

Lunch Break

2:50 PM - 3:35 PM ET

PANEL DISCUSSION: Top Cybersecurity Regulations - the What, How & When?

Having a deep understanding of the cybersecurity regulations currently in place and the specific information that is being extracted through breaches is of course a top priority for you and your teams.  A short list of the regulations you may actively stay abreast of include data collection practices and the responsibility of protecting all collected data against cyberattacks including viruses, phishing, and information theft.

By attending this session, your key takeaways will include:

  • Better understanding of the current cybersecurity laws and regulations
  • Solutions that ease the burden of compliance and help organizations understand the necessary regulations
  • The importance of protecting all confidential information from cyberattacks


W. Reece HirschPartner, Co-Head Privacy and CybersecurityMorgan Lewis & Bockius


Brian CostelloVice President Data Access Strategy and Strategic SolutionsEnvestnet | Yodlee

John ReedSenior Manager, IT SecurityTrue Value Company

Dr. Sasi PillayVice President and Chief Information Officer Washington State University System

3:40 PM - 4:10 PM ET

KEYNOTE PRESENTATION: Real Talk on Ransomware

Ransomware attacks bring companies to their knees! One of the most damaging cyberattacks, ransomware worries top every CISO’s nightmare scenario list. According to most industry estimates, ransomware cost Americans over 7.5 billion dollars in 2019 alone. This session will delve into the latest ransomware attacks and how to defend your organization.

In this timely session, you will learn:

  • The latest iterations of ransomware attacks
  • What to do before, during and after an attack
  • The latest technologies available to fend off these dangerous attacks

Sajed NaseemChief Information Security OfficerNew Jersey Courts

4:15 PM - 5 PM ET

PANEL DISCUSSION: Key Security Considerations in the Age of Accelerated Digital Transformation

The COVID-19 crisis forced companies to accelerate digital transformation projects originally scheduled to be phased implementations of one- to three-years. This hyper-acceleration of digital initiatives opened a world of unique cybersecurity concerns. And there’s no going back! Most CISO’s know that a clear vision is key for a secure digital transformation, but what steps, processes and gotchas await you along the way? Now is the time to reassess security considerations and clearly map a vision for all digital initiatives.

Attend this panel discussion to learn real-life examples and lessons on:

  • How technology leaders are navigating digital transformation security in 2020
  • The most common web application, network, and cloud vulnerabilities in our digital world, and how some companies are addressing them
  • The importance of AppSec in digital transformation
  • How to use company culture and education to help mitigate digital risk
  • Key aspects of a deliberate and effective long-term digital security strategy


Michael Anderson Chief Information Security OfficerDallas County


Les CorreiaDirector – Global Information Security – Architecture, Engineering and OperationsEstée Lauder

Ryan LloydVice President of ProductsVeracode

Mark OstrowskiHead of Engineering, US EastCheck Point Software

5 PM - 5:05 PM ET

Closing Remarks


This event will feature insights from top executives, including

Interested in sponsoring an event?

Speak to one of our dedicated sponsorship teams

Media Partners

This event will feature insights from top media partners, including

Keep up to date by following us at


We are proud to share with you the following Argyle Industry Influencers. Their contributions to Argyle help keep the programs we offer our membership current and relevant, so we can continue delivering you premiere experiences, content development, and membership engagement.