11:05 AM - 11:35 AM ET
KEYNOTE PRESENTATION: Security Architecture - Balancing Business Outcome and Risk for a More Secure Enterprise
Dealing with data security up-front rather than repairing the costly and time-consuming fallout caused by security breaches makes good business sense, and the best way to do so is by rethinking your approach enterprise security architecture. By implementing security controls as supportive roles, companies can ensure that solutions work and are efficient to meet business needs, protect against known threats and properly balance risk.
Attend this session to learn how to:
Jason DeMarcoExecutive Director of Information Security - Architecture & EngineeringMGM Resorts International
11:40 AM - 12:10 PM ET
THOUGHT LEADERSHIP: Introduction to Risk-Based Vulnerability Management - featuring Kenna Security
Organizations have millions of vulnerabilities. And our research has shown that those same organizations, large or small, on average, can only fix one in 10 of those vulnerabilities.
But as a security executive you still need to keep your organization secure, so how do you do that when you can’t possibly fix all of your vulnerabilities? The answer is to focus on your highest-risk vulnerabilities first.
Join Kenna Security’s Jonathan Cran as he:
Jonathan Cran Head of ResearchKenna Security
12:15 PM - 1 PM ET
PANEL DISCUSSION: Pandemic, Layoffs & Shutdowns - How Are You Protecting Data from Looming Insider Threats?
The COVID-19 global crisis has turned enterprises inside out. Remote workers using outside networks amplify the need for new strategies in data protection. As CISOs and senior-level cybersecurity and technology executives, you and your teams spend extensive time and money preparing for external threats – but are you ignoring insider threats? Insider threats are the fastest growing risk organizations face today and the global pandemic has proven that people and data will continue to be on the move and vulnerable. Job tenure is declining and the ways in which data moves is increasing at an unprecedented pace. The reality is – prevention is no longer enough.
In this session, topics of discussion will include:
Tolgay KizilelmaChief Information Security OfficerUniversity of California Merced, Office of Information Technology
Amit BhardwajChief Information Security Officer Lumentum
Sathish KuppuswamyChief Security Architect, Cybersecurity Leader PG&E
Juan MoralesDeputy Chief Information Security Officer, Global Information SecurityRealogy Holdings Corporation
Ray StirbeiSenior Director, Information Security and PrivacySignet Jewelers
1:05 PM - 1:30 PM ET
THOUGHT LEADERSHIP: Best Practices to Improve Cyber Resilience with Zero Trust - featuring Centrify
Cyber breaches are bigger and worse than ever. Hardly a day goes by without headlines about some new devastating cyber-attack. As hundreds of millions of customer records, credentials, and proprietary information are stolen from organizations every year, regulators and oversight agencies have put special emphasis on enforcing proper cyber hygiene and improving cyber resilience.
Realizing that traditional security strategies are no longer enough in battling today’s threats, many security practitioners have altered their approach and adopted a Zero Trust model to secure their ever-expanding modern attack surfaces, including cloud, big data lakes, DevOps, containers, and microservices.
There are many starting points on the path to Zero Trust. However, all roads still lead to identity. Hackers don’t hack in anymore — they log in using weak, default, stolen, or otherwise compromised credentials. Indeed, Forrester Research estimates that 80 percent of today’s breaches involve privileged access abuse — that is, user accounts that have administrative access to critical systems in the organization.
Attend this session to learn about:
David McNeelyChief Strategy OfficerCentrify
2:50 PM - 3:35 PM ET
PANEL DISCUSSION: Top Cybersecurity Regulations - the What, How & When?
Having a deep understanding of the cybersecurity regulations currently in place and the specific information that is being extracted through breaches is of course a top priority for you and your teams. A short list of the regulations you may actively stay abreast of include data collection practices and the responsibility of protecting all collected data against cyberattacks including viruses, phishing, and information theft.
By attending this session, your key takeaways will include:
W. Reece HirschPartner, Co-Head Privacy and CybersecurityMorgan Lewis & Bockius
Brian CostelloVice President Data Access Strategy and Strategic SolutionsEnvestnet | Yodlee
John ReedSenior Manager, IT SecurityTrue Value Company
Dr. Sasi PillayVice President and Chief Information Officer Washington State University System
3:40 PM - 4:10 PM ET
KEYNOTE PRESENTATION: Real Talk on Ransomware
Ransomware attacks bring companies to their knees! One of the most damaging cyberattacks, ransomware worries top every CISO’s nightmare scenario list. According to most industry estimates, ransomware cost Americans over 7.5 billion dollars in 2019 alone. This session will delve into the latest ransomware attacks and how to defend your organization.
In this timely session, you will learn:
Sajed NaseemChief Information Security OfficerNew Jersey Courts
4:15 PM - 5 PM ET
PANEL DISCUSSION: Key Security Considerations in the Age of Accelerated Digital Transformation
The COVID-19 crisis forced companies to accelerate digital transformation projects originally scheduled to be phased implementations of one- to three-years. This hyper-acceleration of digital initiatives opened a world of unique cybersecurity concerns. And there’s no going back! Most CISO’s know that a clear vision is key for a secure digital transformation, but what steps, processes and gotchas await you along the way? Now is the time to reassess security considerations and clearly map a vision for all digital initiatives.
Attend this panel discussion to learn real-life examples and lessons on:
Michael Anderson Chief Information Security OfficerDallas County
Les CorreiaDirector – Global Information Security – Architecture, Engineering and OperationsEstée Lauder
Ryan LloydVice President of ProductsVeracode
Mark OstrowskiHead of Engineering, US EastCheck Point Software