Welcome to Argyle Digital: Cybersecurity Leadership Virtual Forum - Argyle Executive Forum Events

Welcome to the Argyle Digital Cybersecurity Leadership Forum, powered by Argyle Digital.

We have a full day of sessions for you. But don’t worry if you have to miss a few— they’ll be available on-demand for your viewing convenience.

Below the agenda on this page, you’ll find our virtual “exhibit hall,” where you can engage our sponsors, and view or download insightful take-aways they have on offer.

Live sessions will open up 15 minutes prior to start time, and on-demand playback is available 30 minutes after the session has finished. 

Lastly, here’s a quick time zone converter to assist those located in a time zone other than US Eastern.

To join any Agenda session below, click the arrow to expand the Agenda section, then click the session name to launch that session.











11:05 AM - 11:35 AM ET

KEYNOTE PRESENTATION: Security Architecture - Balancing Business Outcome and Risk for a More Secure Enterprise

Dealing with data security up-front rather than repairing the costly and time-consuming fallout caused by security breaches makes good business sense, and the best way to do so is by rethinking your approach enterprise security architecture. By implementing security controls as supportive roles, companies can ensure that solutions work and are efficient to meet business needs, protect against known threats and properly balance risk.

Attend this session to learn how to:

  • Utilize existing functions to aid security transformation efforts in your company
  • Reduce data risk by baking security design (homegrown and shelf-ware) into solutions
  • How to integrate security architecture with app architecture, infra architecture, and data architecture

Jason DeMarcoExecutive Director of Information Security - Architecture & EngineeringMGM Resorts International

11:40 AM - 12:10 PM ET

THOUGHT LEADERSHIP: Introduction to Risk-Based Vulnerability Management - featuring Kenna Security

Organizations have millions of vulnerabilities. And our research has shown that those same organizations, large or small, on average, can only fix one in 10 of those vulnerabilities.

But as a security executive you still need to keep your organization secure, so how do you do that when you can’t possibly fix all of your vulnerabilities? The answer is to focus on your highest-risk vulnerabilities first.

Join Kenna Security’s Jonathan Cran as he:

  • Reviews what years of research into vulnerability management data uncovered about the scope of the challenge
  • Details the findings on how risk-based is the way to get ahead in vulnerability management
  • Lays out several factors that drive better remediation performance
  • Provides steps for setting up a successful risk-based vulnerability management program

Jonathan Cran Head of ResearchKenna Security

12:15 PM - 1 PM ET

PANEL DISCUSSION: Pandemic, Layoffs & Shutdowns - How Are You Protecting Data from Looming Insider Threats?

The COVID-19 global crisis has turned enterprises inside out.  Remote workers using outside networks amplify the need for new strategies in data protection. As CISOs and senior-level cybersecurity and technology executives, you and your teams spend extensive time and money preparing for external threats – but are you ignoring insider threats?  Insider threats are the fastest growing risk organizations face today and the global pandemic has proven that people and data will continue to be on the move and vulnerable.  Job tenure is declining and the ways in which data moves is increasing at an unprecedented pace. The reality is – prevention is no longer enough.

In this session, topics of discussion will include:

  • Implementing security measures to quickly identify and respond to insider threats to data
  • Understanding high risk users and how to create an insider threat program to protect your organization
  • Changing the perception of your security team as the ‘no’ police to the protectors of collaboration


Tolgay KizilelmaChief Information Security OfficerUniversity of California Merced, Office of Information Technology


Amit BhardwajChief Information Security Officer Lumentum

Sathish KuppuswamyChief Security Architect, Cybersecurity Leader PG&E

Juan MoralesDeputy Chief Information Security Officer, Global Information SecurityRealogy Holdings Corporation

Ray StirbeiSenior Director, Information Security and PrivacySignet Jewelers

1:05 PM - 1:30 PM ET

THOUGHT LEADERSHIP: Best Practices to Improve Cyber Resilience with Zero Trust - featuring Centrify

Cyber breaches are bigger and worse than ever. Hardly a day goes by without headlines about some new devastating cyber-attack. As hundreds of millions of customer records, credentials, and proprietary information are stolen from organizations every year, regulators and oversight agencies have put special emphasis on enforcing proper cyber hygiene and improving cyber resilience.

Realizing that traditional security strategies are no longer enough in battling today’s threats, many security practitioners have altered their approach and adopted a Zero Trust model to secure their ever-expanding modern attack surfaces, including cloud, big data lakes, DevOps, containers, and microservices.

There are many starting points on the path to Zero Trust. However, all roads still lead to identity. Hackers don’t hack in anymore — they log in using weak, default, stolen, or otherwise compromised credentials. Indeed, Forrester Research estimates that 80 percent of today’s breaches involve privileged access abuse — that is, user accounts that have administrative access to critical systems in the organization.

Attend this session to learn about:

  • Why today’s security is not secure;
  • Explore today’s tactics, techniques, and procedures of hackers to implement an effective security strategy;
  • Best practices of prevention;
  • Why Zero Trust is considered the antidote of today’s threatscape;
  • Why the path to Zero Trust starts with identity;
  • How to start your journey towards Zero Trust; and
  • What benefits you can achieve by aligning your security strategy with a Zero Trust approach

David McNeelyChief Strategy OfficerCentrify

2:50 PM - 3:35 PM ET

PANEL DISCUSSION: Top Cybersecurity Regulations - the What, How & When?

Having a deep understanding of the cybersecurity regulations currently in place and the specific information that is being extracted through breaches is of course a top priority for you and your teams.  A short list of the regulations you may actively stay abreast of include data collection practices and the responsibility of protecting all collected data against cyberattacks including viruses, phishing, and information theft.

By attending this session, your key takeaways will include:

  • Better understanding of the current cybersecurity laws and regulations
  • Solutions that ease the burden of compliance and help organizations understand the necessary regulations
  • The importance of protecting all confidential information from cyberattacks


W. Reece HirschPartner, Co-Head Privacy and CybersecurityMorgan Lewis & Bockius


Brian CostelloVice President Data Access Strategy and Strategic SolutionsEnvestnet | Yodlee

John ReedSenior Manager, IT SecurityTrue Value Company

Dr. Sasi PillayVice President and Chief Information Officer Washington State University System

3:40 PM - 4:10 PM ET

KEYNOTE PRESENTATION: Real Talk on Ransomware

Ransomware attacks bring companies to their knees! One of the most damaging cyberattacks, ransomware worries top every CISO’s nightmare scenario list. According to most industry estimates, ransomware cost Americans over 7.5 billion dollars in 2019 alone. This session will delve into the latest ransomware attacks and how to defend your organization.

In this timely session, you will learn:

  • The latest iterations of ransomware attacks
  • What to do before, during and after an attack
  • The latest technologies available to fend off these dangerous attacks

Sajed NaseemChief Information Security OfficerNew Jersey Courts

4:15 PM - 5 PM ET

PANEL DISCUSSION: Key Security Considerations in the Age of Accelerated Digital Transformation

The COVID-19 crisis forced companies to accelerate digital transformation projects originally scheduled to be phased implementations of one- to three-years. This hyper-acceleration of digital initiatives opened a world of unique cybersecurity concerns. And there’s no going back! Most CISO’s know that a clear vision is key for a secure digital transformation, but what steps, processes and gotchas await you along the way? Now is the time to reassess security considerations and clearly map a vision for all digital initiatives.

Attend this panel discussion to learn real-life examples and lessons on:

  • How technology leaders are navigating digital transformation security in 2020
  • The most common web application, network, and cloud vulnerabilities in our digital world, and how some companies are addressing them
  • The importance of AppSec in digital transformation
  • How to use company culture and education to help mitigate digital risk
  • Key aspects of a deliberate and effective long-term digital security strategy


Michael Anderson Chief Information Security OfficerDallas County


Les CorreiaDirector – Global Information Security – Architecture, Engineering and OperationsEstée Lauder

Ryan LloydVice President of ProductsVeracode

Mark OstrowskiHead of Engineering, US EastCheck Point Software


Be sure to explore our virtual “exhibit hall” below during breaks and downtime. Each row represents a sponsor’s “booth.” Click on the tiles to learn more about our sponsors and gain valuable insights.