11:05 AM - 11:35 AM ET
KEYNOTE PRESENTATION: An Executive's Guide to Cybersecurity for E-Commerce
To accommodate rapid growth in demand for e-commerce, companies must be more attentive than ever to identifying and mitigating cybersecurity risks. During this session, we will reveal what executives most often overlook when evaluating their companies’ vulnerability to breaches, and what processes executives need to put in place to prevent them.
Join our opening session to learn:
Rob HornbuckleChief Information Security OfficerAllegiant
11:40 AM - 12:10 PM ET
THOUGHT LEADERSHIP: Zero Trust - Insider Risk
Many organizations today are engaging in Zero-Trust (ZT), but are ignoring the value of the data that employees can access and corresponding insider threats. The enterprise approach to ZT focuses primarily on a technology concern, and in doing so they don’t recognize the larger business-continuity impacts that insider threats can have on the business should valuable company data be compromised.
Join this session to learn:
Hosted by: Code42
Tommy ToddVP of SecurityCode42
12:15 PM - 1 PM ET
Panel: Post-Pandemic and Beyond: Hiring and Retaining Top Cybersecurity Talent
While the challenges presented by the current environment are vast, it is important for CISOs to stay focused on long-term organizational objectives and plans to ensure cybersecurity is prepared to keep up with the changes that lie ahead.
Join this interactive panel discussion to learn how CISOs are managing talent challenges and:
Tolgay KizilelmaChief Information Security OfficerUniversity of California Merced, Office of Information Technology
Parveen MalikVP, Corporate Information Security – GlobalState Street
Mandar RegeManaging Director, Operational Risk Management - Technology and Cybersecurity Citi
Julie HubbardVP, Enterprise IT & Information SecurityAMN Healthcare
1:05 PM - 1:35 PM ET
THOUGHT LEADERSHIP: Four Steps to Reduce Insider Risk in Today’s New [Work] Reality
2020 has accelerated global reliance on remote work and cloud-based technologies. From a cybersecurity perspective, many organizations have been caught flat-footed by insider threats. Yet, most organizations still rely on defending outside attacks to a “perimeter” that no longer exists – especially in our new work reality. Only an approach that blends people, process, and technology can successfully prevent data loss.
Join Josh Epstein, VP at Proofpoint Insider Threat Management to discuss the four steps that you can take to reduce insider risk in the new [work] reality.
In this session you will learn:
Hosted by: Proofpoint
Josh EpsteinVP Marketing Proofpoint Insider Threat Management
2:20 PM - 3:05 PM ET
PANEL DISCUSSION: Defending Data and Cloud Users
Now, more than ever, organizations are turning to cloud apps to collaborate and run their businesses. However, this new architecture introduces new security risks. What are these risks and vulnerabilities and how can you best protect your organization?
Join this interactive panel discussion as we explore how:
Nathan ZimmermanSr. Information Security OfficerYMCA of the USA
Mike HolcombDirector of Information SecurityFluor
Robert PickEVP, Chief Information OfficerTokio Marine North America
3:10 PM - 3:55 PM ET
PANEL DISCUSSION: Phishing Threats in a Mobile Enabled World
Employees working outside of their corporate perimeters, coupled with the usage of primarily mobile devices, opens a whole new door of vulnerabilities that organizations need to consider. Namely, phishing threats. Now more than ever, organizations need to adopt a security solution that’s designed to protect against phishing attacks in the mobile-first, cloud-first world.
Join this interactive panel discussion where we will explore:
Sajed NaseemChief Information Security OfficerNew Jersey Courts
Vlad BrodskyChief Information Security Officer, SVP of IT Operations and InfrastructureOTC Markets Group Inc.
Konrad FellmannVice President and Chief Information Security OfficerCubic Corporation