Argyle Digital: Cybersecurity Leadership Forum 2020 October - Argyle Executive Forum Events


Over the last few months, unprecedented events have upended normalcy for many organizations and the critical role of Cybersecurity has continued to evolve to combat new threats.

Global lockdown and stay-at-home orders force organizations to shift to a fully remote workforce, inviting new threats and breaches into their home offices.

Cybersecurity executives and IT professionals are now facing higher insider threat risks and leaders must ensure remote employees are working diligently to protect confidential information.

Now, more than ever, there is an emphasized importance to reduce risk and implement new safeguards to ensure the security and privacy of an organization’s data.

Join this Argyle Digital Cybersecurity Leadership Forum to hear from some of the top minds in Cybersecurity and IT as they explore strategies for:

  • Effectively communicating security risks internally and externally
  • Advancing security features and taking preventive measures
  • Reshaping processes and access remote workers have to confidential data
  • Holding teams accountable for following security protocols


Register form











11 AM - 11:05 AM ET

Argyle Opening Remarks

11:05 AM - 11:35 AM ET

KEYNOTE PRESENTATION: An Executive's Guide to Cybersecurity for E-Commerce

To accommodate rapid growth in demand for e-commerce, companies must be more attentive than ever to identifying and mitigating cybersecurity risks. During this session, we will reveal what executives most often overlook when evaluating their companies’ vulnerability to breaches, and what processes executives need to put in place to prevent them.

Join our opening session to learn:

  • How to address the latest compliance concerns
  • How to instill customer trust and how to keep customer information secure
  • How the cyber threat landscape has evolved for e-commerce companies

Rob HornbuckleChief Information Security OfficerAllegiant

11:40 AM - 12:10 PM ET

THOUGHT LEADERSHIP: Zero Trust - Insider Risk

Many organizations today are engaging in Zero-Trust (ZT), but are ignoring the value of the data that employees can access and corresponding insider threats. The enterprise approach to ZT focuses primarily on a technology concern, and in doing so they don’t recognize the larger business-continuity impacts that insider threats can have on the business should valuable company data be compromised.

Join this session to learn:

  • Why Data isn’t just “data” anymore – It’s now about “value”.
  • How the nature of insider threat has changed to focusing on context.
  • Why data handling behavior is crucial in understanding insider risk.
  • How the insider risk approach maps to zero trust architecture.

Hosted by: Code42

Tommy ToddVP of SecurityCode42

12:15 PM - 1 PM ET

Panel: Post-Pandemic and Beyond: Hiring and Retaining Top Cybersecurity Talent

While the challenges presented by the current environment are vast, it is important for CISOs to stay focused on long-term organizational objectives and plans to ensure cybersecurity is prepared to keep up with the changes that lie ahead.

Join this interactive panel discussion to learn how CISOs are managing talent challenges and:

  • Acquiring, upskilling, and retaining talent
  • Overcoming the challenges of remote work
  • Building and upholding a positive and dynamic culture in their cyber organizations


Tolgay KizilelmaChief Information Security OfficerUniversity of California Merced, Office of Information Technology


Parveen MalikVP, Corporate Information Security – GlobalState Street

Mandar RegeManaging Director, Operational Risk Management - Technology and Cybersecurity Citi

Julie HubbardVP, Enterprise IT & Information SecurityAMN Healthcare

1:05 PM - 1:35 PM ET

THOUGHT LEADERSHIP: Four Steps to Reduce Insider Risk in Today’s New [Work] Reality

2020 has accelerated global reliance on remote work and cloud-based technologies. From a cybersecurity perspective, many organizations have been caught flat-footed by insider threats. Yet, most organizations still rely on defending outside attacks to a “perimeter” that no longer exists – especially in our new work reality. Only an approach that blends people, process, and technology can successfully prevent data loss.

Join Josh Epstein, VP at Proofpoint Insider Threat Management to discuss the four steps that you can take to reduce insider risk in the new [work] reality.

In this session you will learn:

  • New realities of how a distributed workforce and third-party workers access systems and data
  • Unique risks of insider threats and how to protect against data loss
  • How to take a people-centric approach to strengthen resilience and reduce insider risk

Hosted by: Proofpoint

Josh EpsteinVP Marketing Proofpoint Insider Threat Management

1:35 PM - 2:20 PM ET


2:20 PM - 3:05 PM ET

PANEL DISCUSSION: Defending Data and Cloud Users

Now, more than ever, organizations are turning to cloud apps to collaborate and run their businesses. However, this new architecture introduces new security risks. What are these risks and vulnerabilities and how can you best protect your organization?

Join this interactive panel discussion as we explore how:

  • You can proactively detect, investigate, and defend against cybercriminals
  • Organizations are benefiting from visibility into cloud threats


Nathan ZimmermanSr. Information Security OfficerYMCA of the USA


Mike HolcombDirector of Information SecurityFluor

Robert PickEVP, Chief Information OfficerTokio Marine North America

3:10 PM - 3:55 PM ET

PANEL DISCUSSION: Phishing Threats in a Mobile Enabled World

Employees working outside of their corporate perimeters, coupled with the usage of primarily mobile devices, opens a whole new door of vulnerabilities that organizations need to consider. Namely, phishing threats. Now more than ever, organizations need to adopt a security solution that’s designed to protect against phishing attacks in the mobile-first, cloud-first world.

Join this interactive panel discussion where we will explore:

  • How attacks have evolved
  • Common mobile phishing attacks
  • Tangible steps to thwart threats within your organization
  • Protecting your network inside and outside enterprise perimeters


Sajed NaseemChief Information Security OfficerNew Jersey Courts


Vlad BrodskyChief Information Security Officer, SVP of IT Operations and InfrastructureOTC Markets Group Inc.

Konrad FellmannVice President and Chief Information Security OfficerCubic Corporation

3:55 PM - 4 PM ET

Argyle Closing Remarks



We are proud to share with you the following Argyle Industry Influencers. Their contributions to Argyle help keep the programs we offer our membership current and relevant, so we can continue delivering you premiere experiences, content development, and membership engagement.

Bob Pick is the SVP & Chief Information Officer for Tokio Marine North America Services, an organization providing shared professional services to North American businesses of the $40B Tokio Marine Group of insurance and financial services companies.  In this capacity, his responsibilities cover the full spectrum of technology solution design, service delivery, operations, and support for multiple TM Group carriers, including Philadelphia Insurance Companies and Tokio Marine America.  Prior to Tokio Marine, he was the Senior Executive Director for Technology at Condé Nast, also a shared services entity, supporting 30 additional media, cable and newspaper businesses owned by Condé’s parent, Advance Publications. Mr. Pick came to Condé Nast from PricewaterhouseCoopers, LLP, where he was a Principal Consultant in their Enterprise Technology Integration practice following-on several years in PW’s risk management and audit/advisory practices.

Mr. Pick serves on the Board of Trustees of the Philadelphia Youth Orchestra, the Advisory Board of Johns Hopkins University Press, the Strategic Advisory Boards for Guidewire, Insurity and Sapiens, and the CIO Advisory Board for Blumberg Capital.  He holds a BA, summa cum laude, from McDaniel College, an MA from Cornell University, and has been CISM and ITIL certified.