CISO West Summit | Sept. 22, 2020 | Virtual Summit - Real-time Online Conversations

agenda

PDF Download Agenda (PDF)

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Tuesday, September 22, 2020 - CISO West Summit

9:15 am - 9:25 am

Welcome Registration & Opening Remarks

 

9:25 am - 9:55 am

Share:

Keynote Presentation

Open Security - from patchwork to platform

As organizations adopt new technologies and utilize the cloud for business innovation and growth, security teams are challenged with ensuring that those initiatives and missions are successful. They are faced with creating an effective security program from a fragmented patchwork of solutions and data sources that do not easily interoperate without a great deal of custom development and integration. 

To help address this industry wide problem, IBM joined forces with 25 other cybersecurity vendors - including McAfee and Crowdstrike - to form the Open Cybersecurity Alliance (OCA) to promote open and interoperable cybersecurity. OCA members subscribe to the mantra of "Integrate Once, Reuse Everywhere" to enable security teams to focus on solving security issues rather than getting tools to work together. 

Join IBM Security's Chris Bontempo, VP of Marketing for Cloud & Cognitive, Americas to hear how the OCA members are working together and contributing foundational technologies under the open-source Apache 2.0 license to enable security solutions to communicate with each other over a standard fabric during the entire threat management life cycle.

Sponsored by:

IBM View details

 
 

Presented by:

Chris Bontempo, IBM Security Marketing Leader, IBM View details

 
 
 

9:55 am - 10:25 am

Keynote Presentation

How to accelerate innovation through better governance and optimization of your multi-cloud environment

How do companies improve their security, compliance, and governance while becoming more productive in their multi-cloud environments? More than 70 percent of enterprises today are multicloud, either through organic growth, through mergers and acquisitions, or as a corporate strategy. While cloud offers a powerful opportunity to unleash innovation within the enterprise, IT and security teams struggle to devise governance strategies to support that innovation. Join DivvyCloud by Rapid7's Brian Johnson (co-founder and SVP, Cloud Security Practice) as he discusses how companies can accelerate innovation through better governance and optimization of their multi-cloud environment. This session will cover: 

  • The signal and noise problem that many organizations are facing today 
  • Why a self-service approach to cloud is the best way to innovate and remain competitive  
  • How companies can remain secure and compliant while still going through a self-service culture shift

Sponsored by:

DivvyCloud View details

 
 

Presented by:

Brian Johnson, SVP, Cloud Security Practice, DivvyCloud

 
 

10:25 am - 10:45 am

Executive Exchange

 

Think Tank

Bring Your Own . . . Enhancement

Over the next 5 years, it's forecasted that roughly 30% of enterprises will augment BYOD policies to include ?bring your own enhancement? (BYOE) to add focus to augmented staff members. It will be tempting for IT to try and regulate or control human augmentation technology, but the real focus should be to exploit the employee's interest in BYOE to advance the business. We are seeing manufacturing companies currently using wearables to promote worker safety, and companies in both travel and healthcare industries are using these devices to boost productivity. With these technologies constantly evolving, organizations should contemplate how these enhancements can be leveraged in both the personal and professional lives of the workforce. 

Takeaways: 

  • Impactful examples of BYOE Technology  
  • Strategies to encourage employees to use AI 
  • Critical considerations for IT's need to regulate Augmented Technology

Presented by:

Nemi George, Vice President, Information Security Officer | Service Operations, Pacific Dental Services View details

 
 
 

10:45 am - 11:10 am

Executive Exchange

 

Thought Leadership

You Need to Know Who Is Accessing Your Data, But Do You Really?

Knowing who is accessing what data is at the heart of security. Today, users and attackers get to your data through a mesh of web applications, APIs, and microservices. Unfortunately, your database logs only report the querying source as an authorized intermediary application without the originating requestor's information. This blind spot causes glaring gaps during audits, slows incident response, and impede breach detection. 

Learn how to apply new ways of continuously linking originating users' information to every database access with cohesive interworking between edge WAF, server RASP, and Data Activity Monitoring tools.

Sponsored by:

Imperva View details

 
 

Presented by:

Jose Gomez, Sales Engineering Manager, Imperva

 
 

11:10 am - 11:30 am

Executive Exchange

 

Think Tank

Hyper-personalization: Using AI to Drive the Bottom Line

How organizations connect with and influence the customer is set for dramatic changes: AI identification of emotions will be the driving force behind many advertisements; the rise in popularity of wearables that track user's habits, locations and biometrics will enable detection of customer emotions and reactions; environmental and behavior indicators enable companies to establish a much deeper level of hyper-personalization within the customer's experience. Companies that successfully apply these trends to gather and make use of data will increase sales and drive revenue, but there is a new industry standard for also being hyper-transparent with consumers about the data that is being collected and how it is being used. 

Takeaways: 

  • How AI has become a critical part of the advertising industry 
  • How emotional prediction technology will help companies hyper-personalize their offerings 
  • What companies need to consider to succeed in balancing hyper-personalization with being more transparent about data collection

Presented by:

Charles Nelles, VP Global Infrastructure, American Express

 
 

11:30 am - 11:50 am

Executive Exchange

 

Share:

Thought Leadership

Perimeter and Beyond - A Pervasive versus Perimeter-based approach to Email Security

Attackers continue to find new ways to exploit organizations. By design, traditional secure email gateway technologies on their own are not designed to fuse various forms of telemetry to detect and prevent against sophisticated attacks. We will discuss how a pervasive approach to email security can not only provide better visibility from both "human" and "technical" telemetry but also how if done right, it can enrich your broader cybersecurity ecosystem to help more efficiently and quickly respond to new sophisticated attacks. Examples of new "intersections" of value between the Three Zones

Join our session to gain a better understanding:

  • How to drive a Pervasive Email Security Strategy
  • Decrease cyber risks and costs
  • Simplify administrative overhead

Sponsored by:

Mimecast View details

 
 

Presented by:

Dino DiMarino, Chief Revenue Officer, Mimecast

 
 

11:50 am - 12:10 pm

Executive Exchange

 

Fireside Chat

CDM Media's J.D. Miller sits down with Mimecast's Dino DiMarino

 

12:10 pm - 12:30 pm

Executive Exchange

 

Executive Boardroom

Designing the Digital Workplace

Employees are consumers of digital technologies such as IoT, AR and VR. The plethora of mobile devices has enabled them to work where they want and when they want which has raised the bar on employee expectations for tools and capabilities from their employers. In order for companies to retain the best and get the most out of their employees, it is vital to design and continually update the digital workplace. We will discuss the current trends as well as share case studies of successful digital workplace implementations.  

Takeaways:

  • Highly skilled employees will demand a mobile and efficient workplace
  • Keeping these skilled employees fully engaged and passionate about your company is critical to achieving the desired digital transformation

Sponsored by:

Insight Cloud + Data Center Transformation View details

 
 

Executive Boardroom

Bigger, Faster, & Safer: Optimizing Third-Party Risk at Scale

Most vendor risk management programs rely on questionnaires, policy artifacts, and audits to assess the risk of partnering with third-parties. This practice places trust in the vendor where there may have been no prior relationship, can be a drawn out process as vendors attempt to gather information on sometimes hundreds of questions, and puts a heavy burden on the assessing organization as they evaluate the responses and documents received from the prospective vendor. As the 3 AM infomercials say, there's got to be a better way! 

Join our session to find out how data-centric assessments provide an objective metric and move the outcome of TPRM programs from reduction of liability to reduction of risk.

Sponsored by:

BitSight Technologies View details

 
 

Presented by:

Chris Poulin, Director, Technology & Strategy / Deputy CTO, BitSight Technologies

 
 

12:30 pm - 12:50 pm

Executive Exchange

 

Think Tank

Keeping Pace with Innovation, Chronologically and Economically

Today's digital evolution will take major enterprises twice as long and cost twice as much as initially anticipated. Companies will struggle with digital innovation as they realize the associated challenges, and the true cost of modernization. As such, leaders in smaller and more agile organizations have a great opportunity to be first to market, while those in larger organizations suffer through uninspiring, and potentially career limiting, short term results. 

Takeaways: 

  • How to deal with the fact that digital innovation is not cheap or quick 
  • Strategies for success in implementation planning 
  • Lessons learned from smaller organizations, where they have an easier time testing out new technology
 

12:50 pm - 1:10 pm

Executive Exchange

 

Share:

Executive Boardroom

Data Gravity: The mega-trend that is an obstacle to Digital Transformation

Data Gravity inhibits enterprise workflow performance, raises security concerns, and increases costs, all complicated by regulatory requirements and other artificial constraints. With Data Gravity, the laws of physics and IT intersect to provide a proxy for a new age of business architectures that Enterprises will be driven to adopt, and Service Providers will be pressed to support Data gravity forces a new architecture, one that inverts traffic flow and brings users, networks and clouds to privately hosted enterprise data. By doing so, data gravity barriers are removed and new capabilities are unlocked. 

To implement this datacentric architecture, Enterprises and Service Providers need a secure, neutral meeting place to host their infrastructure in proximity to yet separate from each other. Only a multi-tenant datacenter enables such a deployment paradigm. 

Takeaways: 

  • Define Data Gravity and the obstacle it presents to all aspects of IT 
  • Learn how to overcome those obstacles with a Data-Centric Architecture 
  • Understand the key role of the multi-tenant datacenter in solving Data Gravity

Sponsored by:

Digital Realty View details

 
 

Presented by:

Tony Bishop, SVP, Growth Platform & Marketing, Digital Realty

 
 

1:10 pm - 1:30 pm

Executive Exchange

 

Executive Boardroom

TBC


Sponsored by:

Freshworks View details

 
 
 

1:30 pm - 1:50 pm

Executive Exchange

 

Share:

Thought Leadership

Securing 2021 and Beyond- Preparing For What Lies Ahead

We have seen 2020 be an unprecedented year for networking and security teams with the explosion of digital transformation and remote working. Rapid pivoting of people, process, and technology to adjust to new operational norms has ensured business continuity, but it hasn't come without additional security challenges and risks. With no end in sight to this new shifting landscape and with adversaries on our heels, how do we prepare for what lies ahead? This session will focus on ensuring we addressed the security and network needs of today and are prepared for the challenges of tomorrow.

Takeaways: 

  • The operational landscape has significantly changed and we need to ensure we are simultaneously efficient and secure. 
  • As the threats and risks with rapid digital transformation and remote working continue to evolve, we need to be agile in our security solutions. 
  • We had to pivot quickly this past year and now it is time to prepare for the challenges that lie ahead.

Sponsored by:

Fortinet View details

 
 

Presented by:

Renee Tarun, Deputy CISO, Fortinet

 
 

1:50 pm - 2:00 pm

Closing Remarks