Cybersecurity Leadership Forum October 2020 - Argyle Executive Forum Events

Welcome to the Cybersecurity Leadership Forum, powered by Argyle Digital.

We have a full day of sessions for you. But don’t worry if you have to miss a few— they’ll be available on-demand for your viewing convenience. 

Below the agenda on this page, you’ll find our virtual “exhibit hall,” where you can engage our sponsor, and view or download insightful take-aways they have on offer.

Live sessions will open up 15 minutes prior to start time, and on-demand playback is available 30 minutes after the session has finished. 

Lastly, here’s an easy time zone converter to assist those located in a time zone other than US Eastern.

To join any Agenda session below, click the arrow to expand the Agenda section, then click the session name to launch that session.










11:05 AM - 11:35 AM ET

KEYNOTE PRESENTATION: An Executive's Guide to Cybersecurity for E-Commerce

To accommodate rapid growth in demand for e-commerce, companies must be more attentive than ever to identifying and mitigating cybersecurity risks. During this session, we will reveal what executives most often overlook when evaluating their companies’ vulnerability to breaches, and what processes executives need to put in place to prevent them.

Join our opening session to learn:

  • How to address the latest compliance concerns
  • How to instill customer trust and how to keep customer information secure
  • How the cyber threat landscape has evolved for e-commerce companies

Rob HornbuckleChief Information Security OfficerAllegiant

11:40 AM - 12:10 PM ET

THOUGHT LEADERSHIP: Zero Trust - Insider Risk

Many organizations today are engaging in Zero-Trust (ZT), but are ignoring the value of the data that employees can access and corresponding insider threats. The enterprise approach to ZT focuses primarily on a technology concern, and in doing so they don’t recognize the larger business-continuity impacts that insider threats can have on the business should valuable company data be compromised.

Join this session to learn:

  • Why Data isn’t just “data” anymore – It’s now about “value”.
  • How the nature of insider threat has changed to focusing on context.
  • Why data handling behavior is crucial in understanding insider risk.
  • How the insider risk approach maps to zero trust architecture.

Hosted by: Code42

Tommy ToddVP of SecurityCode42

12:15 PM - 1 PM ET

Panel: Post-Pandemic and Beyond: Hiring and Retaining Top Cybersecurity Talent

While the challenges presented by the current environment are vast, it is important for CISOs to stay focused on long-term organizational objectives and plans to ensure cybersecurity is prepared to keep up with the changes that lie ahead.

Join this interactive panel discussion to learn how CISOs are managing talent challenges and:

  • Acquiring, upskilling, and retaining talent
  • Overcoming the challenges of remote work
  • Building and upholding a positive and dynamic culture in their cyber organizations


Tolgay KizilelmaChief Information Security OfficerUniversity of California Merced, Office of Information Technology


Parveen MalikVP, Corporate Information Security – GlobalState Street

Mandar RegeManaging Director, Operational Risk Management - Technology and Cybersecurity Citi

Julie HubbardVP, Enterprise IT & Information SecurityAMN Healthcare

1:05 PM - 1:35 PM ET

THOUGHT LEADERSHIP: Four Steps to Reduce Insider Risk in Today’s New [Work] Reality

2020 has accelerated global reliance on remote work and cloud-based technologies. From a cybersecurity perspective, many organizations have been caught flat-footed by insider threats. Yet, most organizations still rely on defending outside attacks to a “perimeter” that no longer exists – especially in our new work reality. Only an approach that blends people, process, and technology can successfully prevent data loss.

Join Josh Epstein, VP at Proofpoint Insider Threat Management to discuss the four steps that you can take to reduce insider risk in the new [work] reality.

In this session you will learn:

  • New realities of how a distributed workforce and third-party workers access systems and data
  • Unique risks of insider threats and how to protect against data loss
  • How to take a people-centric approach to strengthen resilience and reduce insider risk

Hosted by: Proofpoint

Josh EpsteinVP Marketing Proofpoint Insider Threat Management

2:20 PM - 3:05 PM ET

PANEL DISCUSSION: Defending Data and Cloud Users

Now, more than ever, organizations are turning to cloud apps to collaborate and run their businesses. However, this new architecture introduces new security risks. What are these risks and vulnerabilities and how can you best protect your organization?

Join this interactive panel discussion as we explore how:

  • You can proactively detect, investigate, and defend against cybercriminals
  • Organizations are benefiting from visibility into cloud threats


Nathan ZimmermanSr. Information Security OfficerYMCA of the USA


Mike HolcombDirector of Information SecurityFluor

Robert PickEVP, Chief Information OfficerTokio Marine North America

3:10 PM - 3:55 PM ET

PANEL DISCUSSION: Phishing Threats in a Mobile Enabled World

Employees working outside of their corporate perimeters, coupled with the usage of primarily mobile devices, opens a whole new door of vulnerabilities that organizations need to consider. Namely, phishing threats. Now more than ever, organizations need to adopt a security solution that’s designed to protect against phishing attacks in the mobile-first, cloud-first world.

Join this interactive panel discussion where we will explore:

  • How attacks have evolved
  • Common mobile phishing attacks
  • Tangible steps to thwart threats within your organization
  • Protecting your network inside and outside enterprise perimeters


Sajed NaseemChief Information Security OfficerNew Jersey Courts


Vlad BrodskyChief Information Security Officer, SVP of IT Operations and InfrastructureOTC Markets Group Inc.

Konrad FellmannVice President and Chief Information Security OfficerCubic Corporation


Be sure to explore our virtual “exhibit hall” below during breaks and downtime. Each row represents a sponsor’s “booth.” Click on the tiles to learn more about our sponsor and gain valuable insights.