8:00 am - 5:20 pm
| Registration OpensLocation: Wassaja Foyer
|
|
8:00 am - 9:00 am
| Networking BreakfastLocation: Palos Verdes Foyer & Terrace
Grab a coffee and breakfast while connecting with our sponsoring partners.
|
|
9:00 am - 9:10 am
| Where Is the CSO Role Headed?Today’s security leaders are facing existential questions: What are the challenges facing CSOs in the years to come? How will technology advancements impact their ability to mitigate risks? How will increasingly intrusive regulations impact them? Exploring these questions will set the stage for the panels, interviews, and presentations to come at the CSO50 Conference + Awards.
Bob Bragdon, Publisher Emeritus, CSO, Foundry, an IDG Inc. company
Location: Wassaja Ballroom
|
|
9:10 am - 9:40 am
| Improving the Cyber Ecosystem: What Government and Private Businesses Can Do to Strengthen DefensesLocation: MGM Grand Ballroom
Within the Department of Homeland Security, the Cybersecurity and Infrastructure Security Agency has raised its profile and stepped up communication on topics from specific vulnerabilities to bigger-picture warnings and threats from nation-state actors. CISA Director Jen Easterly will join us to talk about the role of government in private-sector security, future threats, and more.
Jen Easterly, Director, Cybersecurity and Infrastructure Security Agency
Interviewed by:
Bob Bragdon, Publisher Emeritus, CSO, Foundry, an IDG Inc. company
|
|
9:40 am - 10:10 am
| Analyst Experience (AX) and Open: Shifting the Way the Industry Delivers Security ToolsLocation: MGM Grand Ballroom
If security analysts are our first line of defense against cyberattacks, and 77% of analysts want more support for open standards, then why are more organizations not delivering open and analyst-friendly security tools? By investing in open analyst experiences, you can retain security expertise which leads to high-performing SOCs. IBM monitors over 1 trillion events each month and understands the importance of simplifying and streamlining analyst workflow. In this keynote, IBM will discuss how both open and AX are causing the security industry to rethink security tools.
|
|
10:10 am - 10:35 am
| Security & Supply Chain ChallengesLocation: MGM Grand Ballroom
It’s clear now that supply chain disruptions are more than a product of the pandemic. Finding ways to upgrade technology to digitize them is a key priority for tech leaders, but what is security’s role? Join us to hear from two CSO Hall of Fame inductees on security’s role in predicting, minimizing, and mitigating risk to the supply chain – and where we may be headed.
James Beeson, SVP, Global Chief Information Security Officer , Cigna
Moderated by:
Bob Bragdon, Publisher Emeritus, CSO, Foundry, an IDG Inc. company
|
|
10:35 am - 11:05 am
| BreakNow’s the time to grab your coffee, visit sponsor booths, or answer a couple of emails.
Location: Wassaja Foyer
|
|
11:05 am - 11:25 am
|
The Upgrade Your PCs and Macs Have Been Waiting ForLocation: Aria Meeting Room
Businesses need a solution that delivers a fast, modern work experience with simple deployment and effective, proactive security. Unfortunately, to upgrade existing hardware investments, you would normally need to rip and replace devices to experience this. In this presentation, you’ll see how Chrome OS Flex is enabling businesses to modernize their PC and Mac investments in a sustainable way. Chrome OS Flex is the cloud-first, easy-to-manage, fast and secure operating system. It’s easy to deploy across your fleet and simple to try it to see what a cloud-first OS has to offer.
| Supply Chain Resilience in a Time of Techtonic Geopolitical ShiftsLocation: Beau Rivage Meeting Room
For decades, the confluence of globalization and digitization drove supply chains toward increasing complexity, optimization, opaqueness and insecurity. These physical and digital ties are fracturing at a rapid pace along geopolitical fault lines, powered by growing interstate hostilities, global trade wars, the Splinternet and emerging technologies, and an unprecedented pace of regulatory change. This session will detail the challenges and opportunities associated with these “techtonic” shifts and how organizations can take steps toward greater resilience during significant geopolitical uncertainty.
| XDR: An Extension of SIEM or the Evolution of SIEM?Location: MGM Grand Ballroom
SIEM (security information and event management) and XDR (extended detection and response) are powerful tools, but they are not one and the same. They each connect existing tools and solutions to provide better context and automate processes, but what is the fundamental difference between the two? In this session, we’ll cover market perceptions, current capabilities, and how IBM views the evolution of the two products.
Gary Katz, Chief Architect for Threat Content, IBM
|
|
|
11:30 am - 11:55 am
|
Metrics That Matter: Dashboards, Scorecards and MoreLocation: Aria Meeting Room
Panelists: Rahat Sethi, Tim Callahan, James Hartley
Moderator: Andy Ellis
Security initiatives generate countless metrics, so selecting the relevant information and presenting it in a useful and elegant way is a challenge. Learn how Adobe, Aflac and Zurich North America devised clear and actionable ways of communicating key security metrics. The results speak for themselves: elevating cyber risk visibility, measuring performance against goals, and closing the information gap between business leaders and security leaders.
Rahat Sethi, Director, Technology Governance, Risk and Compliance , Adobe
Tim Callahan, Senior VP/Chief Global Information Security Officer, Aflac
James Hartley, Associate Vice President of Cyber Security, Zurich North America
| Post M&A Security Integration and Other ChallengesLocation: Beau Rivage Meeting Room
Panelists: Tony Soules
Moderator: Beth Kormanik
Following a merger or acquisition, how do you ensure that each organization continues to stay protected while moving toward full integration of security programs and teams? Amgen, which recently went through that process, will share best security practices as it tackled consolidating data centers, application security, and protecting sensitive data.
Tony Soules, Executive Director, Information Security and Deputy Chief Information Security Officer, Amgen, Inc
Beth Kormanik, Event Content Director, Foundry, an IDG Inc. company
|
|
|
12:00 pm - 1:30 pm
| LunchLocation: Salon A
|
|
1:30 pm - 1:55 pm
|
New Approaches to Risk ManagementTime: 1:30 pm – 1:55 pm
Location: Aria Meeting Room
Panelists: Bob Bruns, Vidya Srinivasan
Moderator: Chris Ritchie
Identifying and managing security risks internally and with clients is a perennial challenge that requires a constant stream of new ideas. This session will explore Avanade’s new standardized, automated approach to managing risk as well as Genpact’s methodology of identifying risk throughout a lifecycle, a model that shifts risk from an InfoSec issue to the appropriate business unit. The result is that you’re not only speaking the language of business risk, but equipping the entire team to take action.
Bob Bruns, Chief Information Security Officer, Avanade
Chris Ritchie, Vice President, North America, Foundry, an IDG Inc. company
| The Heavy Lifting of Zero TrustTime: 1:30 pm – 1:55 pm
Location: Beau Rivage Meeting Room
Panelists: Stephanie Franklin-Thomas
Moderator: Beth Kormanik
Successful zero trust management of enterprise firewalls and other controls will have a ripple effect on the rest of the network. Learn best practices for implementing zero trust in an increasingly sophisticated threat environment, including partnering with business leaders and other security teams within an organization.
Beth Kormanik, Event Content Director, Foundry, an IDG Inc. company
|
|
|
2:00 pm - 2:25 pm
| How to Think About Incident ResponseLocation: MGM Grand Ballroom
When cyberattacks are a matter of if, not when, effective responses are crucial to mobilize resources to contain the attack and limit damage. But does one kind of incident response fit all? Hear from CSO Hall of Fame inductees on their current thinking on incident response, how to plan and evaluate strategies, how to engage employees instead of demoralize them, and what they have learned from responding to real-world attacks.
Mark Connelly, Chief Information Security Officer, Boston Consulting Group
Chandra McMahon, Senior Vice President & Chief Information Security Officer, CVS Health
Moderated by:
Bob Bragdon, Publisher Emeritus, CSO, Foundry, an IDG Inc. company
|
|
2:25 pm - 2:50 pm
| Getting Digitally Ready: Leaning Into New TechnologiesLocation: MGM Grand Ballroom
Creating strong cyber defenses and data protection is part of any security leader’s job. But so is building an offense. As CISO at Johnson & Johnson for more than 12 years, Marene Allison has drafted technology roadmaps that have helped the company pivot through unexpected challenges. Allison, a new CSO Hall of Fame inductee, will share her philosophy for keeping an eye on the future.
Marene Allison, Vice President and Chief Information Security Officer, Johnson & Johnson
Interviewed by:
Bob Bragdon, Publisher Emeritus, CSO, Foundry, an IDG Inc. company
|
|
2:50 pm - 3:20 pm
| BreakNow’s the time to grab your coffee, visit sponsor booths, or answer a couple of emails.
Location: Wassaja Foyer
|
|
3:20 pm - 3:50 pm
| Join the Security RevolutionLocation: MGM Grand Ballroom
Work has changed forever. And it’s changed for the better. Anytime/anywhere productivity isn’t just possible, it’s popular and growing thanks to shifting social norms and cloud-first business strategies. As a result, a better and healthier flexible work schedule finally feels attainable. The catch is, these ways of working come with more vulnerabilities, risks and bad actors than ever before. And in many organizations, security hasn’t yet caught up to the aggressively paced change in working styles. Going back isn’t an option, so we must come together to move security forward. In this presentation, learn how Chrome Enterprise is evolving to provide new levels of proactive protection that complement today’s need for flexibility. It’s a look at where security is heading, and where every business should be.
|
|
3:50 pm - 4:15 pm
| Nurturing the Next Generation of Security TalentLocation: MGM Grand Ballroom
The best leaders build strong teams around them, from entry level to top deputies. Join us for insights into leading teams, empowering deputies, and knowing when to move on for a bigger job yourself.
Interviewed by:
Bob Bragdon, Publisher Emeritus, CSO, Foundry, an IDG Inc. company
|
|
4:20 pm - 4:45 pm
|
Phish Fight: Strategies to Reduce Digital HarmTime: 4:20 pm – 4:45 pm
Location: Aria Meeting Room
Panelists: Diego Souza, Julie Moog
Moderator: Andy Ellis
Protecting the enterprise is everyone’s job, and it’s maddening how something as simple as clicking a malicious link can cause so much harm. Phishing threats evolve, and employees – including executives – can become complacent. Find out how TIAA revitalized its phishing awareness to raise the bar on KPI thresholds, hold associates accountable for poor performance, and invigorated a stagnated program, as well as how Cummins created the CyberSMART initiative to teach employees how to recognize the signs of potential phishing emails, how to respond to an active attack, and the proper handling of information and company assets.
Diego Souza, Global Chief Information Security Officer, Cummins, Inc
Julie Moog, Managing Director of Cybersecurity, TIAA
| IT Solutions for Consumer EducationTime: 4:20 pm – 4:45 pm
Location: Beau Rivage Meeting Room
Panelists: Max Graupner, Nick Percoco
Moderator: Beth Kormanik
A vital aspect of security is empowering the public on how to protect themselves against vulnerabilities. Using techniques such as passwordless technology, consumer education campaigns, and in-product privacy notifications, these companies all boosted security and privacy while improving the user experience.
Beth Kormanik, Event Content Director, Foundry, an IDG Inc. company
|
|
|
4:50 pm - 5:20 pm
| CSO50 Lightning InsightsLocation: MGM Grand Ballroom
Join us for a lively series of five-minute market insights geared to solving your biggest challenges.
Vulnerability Program: Work Queue or Landfill? presented by Checkmarx
Lightning Insight, presented by LastPass
Cyber Threat Intelligence: Defining Needs for Your Organization & How it Can Be Used to Strengthen Your Cybersecurity Program Strategically & Tactically, presented by ZeroFox
Illuminating Hacker Ecosystems using Telos Advanced Cyber Analytics (ACA), presented by Telos Corporation
Be Quantum Secure, Today!, presented by Qrypt
|
|