CISO Leadership Forum: Strengthening Cyber Defense in an Uncertain Threat Landscape - Argyle Executive Forum Events

OVERVIEW

Red alert — security threats are at an all-time high. CISOs are having to contend with a heightened risk of breach from both internal and external sources. Forward-thinking leadership at the executive level is needed now more than ever.

Connect with CISOs from diverse organizations to learn strategies for coping with sophisticated and rapidly evolving threats in today’s digital climate.

Take a front seat at the CISO Leadership Forum on April 27, 2021 to learn:

  • The top threat and security concerns for CISOs in 2021
  • How to strategize to secure the remote workforce
  • Latest tools and processes to defend against insider threats
  • Communication planning to respond to critical infrastructure attacks
  • Understanding the threat landscape surrounding offensive AI
  • How to mitigate the risk of data breach in the cloud
Join Us at This Event

Speakers

Agenda

 

1100

1200

1300

1400

1500

1600

11 AM - 11:30 AM ET

KEYNOTE ADDRESS: Securing the New Normal: Preparing for the Hybrid and Remote Flexible Workforce

What kinds of vulnerabilities does the hybrid workforce present? CISOs across the country are tasked with securing the decentralized force amid a constantly evolving threat landscape.

How can leaders collaborate to create a stable security architecture that is suited for the remote workplace?

Attend this session to learn:

  • Best practices for hardening technology to keep networks secure
  • How to manage various security scenarios for employees that work onshore and offshore
  • How to craft a communication plan with employees to stay accountable for risk and effectively manage sensitive information

Raj BadhwarSVP, Global Chief Information Security OfficerVoya Financial

11:35 AM - 12:05 PM ET

THOUGHT LEADERSHIP

12:10 PM - 12:55 PM ET

PANEL DISCUSSION: Detecting Insider Threats: Hardening Controls to Decrease Internal Breach

Today’s security framework is complicated. For most large-scale organizations, data is stored using variety of different mediums on and off-prem. The physical office used to be the security “mecca” to ensure that devices and data remained secure, but the unpredictability and boundary-less landscape of the remote workplace has forced security professionals to explore other angles.

How can cyber security professionals ramp up their defense strategies to increase response to breach and reduce impact?

Attend this session to:

  • Analyze the ways that your insider threat defense plan needs to evolve in the remote and hybrid workplace
  • Discover how strategies like Zero Trust and SASE can change the way that organizations monitor and deal with security attacks
  • Observe how you can strategize to respond to internal threats more efficiently

Moderator:

Aaron BaillioChief Information Security OfficerUniversity of Oklahoma

Panelists:

Morgan ReeceSystem Director Security ArchitectureBaylor Scott & White Health

Amit BhardwajChief Information Security Officer Lumentum

Joel CaminerDirector of Cyber Security EducationNew York University

Patrick BenoitVP, Global Cyber Governance, Risk, & Compliance (GRC) / Business Information Security Officer (BISO)CBRE

1 PM - 2 PM ET

Lunch Break

2 PM - 2:30 PM ET

Keynote Address: Preparing CISOs to Combat Critical Infrastructure Attacks

Abstract coming soon!

Nicholas Andersen Chief Information Security Officer - Public Sector Lumen Technologies

2:35 PM - 3:20 PM ET

PANEL DISCUSSION: Navigating the Cloud: Best Practices for Securing Your Cloud Environment

Organizations across the globe have rushed to move workloads onto the cloud to enable employees to better manage enterprise data in the remote world. The migration to the cloud presents additional security measures that are often beyond CISO control.

How can executives take a step back to identify where vulnerabilities in the cloud exist, while strategizing to make continuous improvements against strengthening security threats?

Attend this session to learn:

  • How to manage risk to secure corporate data stored on SaaS applications
  • Best practices to monitor cloud implementation to maintain control of your data
  • Address additional authentication measures to incorporate into your cloud security architecture to prevent breach

Moderator:

Matt ConnorsDirector of Information Security Southern New Hampshire University

Panelists:

Michael Dennehy Information Security ArchitectService Corporation International

Jason ElrodExecutive Director, Head of Cybersecurity & InvestigationsSutter Health

Johnnie RogersDirector, Application Security Consulting Nike

Edwin CovertDirector- Security Testing and ReviewWarner Media

3:25 PM - 3:55 PM ET

KEYNOTE ADDRESS: Going on the Offensive: How to Use AI to Fight AI

AI has a dark side. Bad actors are using artificial intelligence to develop more sophisticated threats such as malicious malware and deep fake technology. Experts predict that offensive AI-driven attacks will only increase over the next few years.

Join Sujeet, Bambawale, Chief Information Security Officer, 7-Eleven, to learn what kind of controls need to be implemented to protect algorithm against algorith.

Attend this session to learn:

  • How to use artificial intelligence to identify deep fakes and other malicious behaviors
  • The best practices to upskill IT teams to respond to malicious AI to reduce impact
  • What the future of offensive AI might endure — how can CISOs prepare for the speed and unpredictability of AI-driven cyberattacks?

Sujeet BambawaleChief Information Security Officer7-Eleven

ADVISORY BOARD

We are proud to share with you the following Argyle Industry Influencers. Their contributions to Argyle help keep the programs we offer our membership current and relevant, so we can continue delivering you premiere experiences, content development, and membership engagement.

Innovative IT leader with 20+ years of experience in risk management, security, compliance, third-party risk management, business analysis, and planning. Adept at driving business solutions, improving organizational processes and leveraging technology to better achieve business goals.


Tolgay Kizilelma is a business IT leader with almost three decades of experience covering the whole IT spectrum. He started his professional career in 1992 developing CASE ERP tools for System Software Associates (SSA, later acquired by Infor Global). After working briefly for the University of California, Berkeley as a business systems analyst, Tolgay transitioned to private sector leading and managing IT initiatives for a Distribution and Supply Chain Company, Shields Harper & Co. After almost two decades in private sector, Tolgay returned to UC and worked for UC Agriculture and Natural Resources (UC ANR) leading statewide infrastructure projects to extend broadband to UC researchers in rural communities by connecting UC ANR sites to the California Research and Education Network (CalREN). UC ANR has been awarded the CENIC 2018 Innovations in Networking Award for Broadband Applications due to these projects. At UC ANR, he also led and managed the service desk, network, infrastructure/systems, and information security teams covering the whole state.


He is currently leading cybersecurity efforts as the Chief Information Security Officer at UC Merced. He is an advocate of lifelong learning and teaches graduate business analytics courses at Saint Mary’s College of California. His current research interests are cybersecurity, digital transformation, business analytics, and educational IT programs. He has various industry certifications, a BS degree in computer engineering, an MBA, and PhD focusing on information security, quality, and patient safety.


Dr. Sasi Pillay serves as the Vice President and Chief Information Officer (CIO) at Washington State University (WSU). In this role he oversees the computing infrastructure of foundational technologies and research computing, working in collaboration with his constituents. He is also responsible for telecommunications, local area and wide area networking and IT Security. He led the development of roadmaps for Academic and Research Computing, Administrative and Business Computing and for Foundational Technologies. He has improved the service delivery of the ITS organization, by instituting change management, architectural review and project management. In addition, his team is involved in improving IT Security across all of WSU campuses and in deploying a Security Operations Center and a Network Operations Center.


Previously, he served as the Associate Vice President and Chief Information Officer of the University of Wisconsin System, comprising 26 campuses. In this role, he was responsible for the leadership and guidance of a broad portfolio of enterprise technology operations including broadband networking, major academic and business applications, library automation and adoption of strategic new technologies that added value to the University of Wisconsin System for instruction, research, learning and public service. He led the creation of a Strategic Intent Document working closely with the Campus CIOs, initiated a working group to recommend and create a Unified Communication and Collaboration framework and worked on improving IT Security with the help of Campus IT professionals. He also initiated the formation of a system wide Data Governance Council and an Innovation Fund to help introduce and infuse new ideas into the system.


Dr. Pillay served as the Chief Technology Officer for Information Technology (IT) at National Aeronautical and Space Administration (NASA). In this capacity, he directed how promising technologies are developed, evaluated and integrated into mainstream IT services at the Agency. To facilitate innovation, he set up two programs, Open Innovation and IT Labs. These programs have been heralded as a model in government and have received several national awards. He was also responsible for managing Enterprise Architecture, Open Government activities and the dissemination of Scientific and Technical Information for the Agency. Previously, he served as the Chief Information Officer at the NASA John H. Glenn Research Center for 15 years. In this regard, Dr. Pillay had a broad scope of responsibility including managing administrative telecommunications, networking, desktop computing, several key administrative applications, computer modeling and simulation, and high-end computing and visualization. Under his leadership, NASA Glenn served as the lead for NASA for the development of Agency-wide standards and architecture for end user devices and systems with a focus on security, interoperability, and collaboration. He was also responsible for NASA Glenn saving nearly $8 million annually through standardization, consolidation and outsourcing of end user devices and services while improving customer satisfaction and other service metrics. These savings continue to accrue over the years. He also implemented and promoted a collaboration environment resulting in improved productivity and reduced expenses across multiple disciplines comprised of over 200 workgroups.


Dr. Pillay is the recipient of NASA’s Exceptional Service Medal and the Outstanding Leadership Medal. He is also the recipient of the Presidential Rank Award recognizing him as a Meritorious Executive in the U.S. federal government. He was recognized as one of the Federal 100 winners based on his positive impact on NASA and the community. He was also named as one of the top 25 IT leaders in Government citing his technology vision, clout among peers in other agencies, and for the ability to show concrete results. He was recognized as the CIO of the Year by the North East Ohio Software Association in 2008.


Dr. Pillay received his B.S. in Mechanical Engineering from Pennsylvania State University and his M.S. and Ph.D. degrees in Computer Engineering from Case Western Reserve University. He also has a Master’s degree in Management of Technology from the Sloan School of Management at the Massachusetts Institute of Technology.