11:30 - 11:35 am
| Welcome Remarks
|
|
11:35 - 12:05 pm
| The Future of Cybersecurity: Evolving Paradigms About Security, Privacy and Digital AccessToday’s cyber criminals are innovating just as fast as the digitally innovative organizations they attack. In this environment, are you and your organization thinking about what’s next? In this forward-looking presentation, Keren will shed light on emerging security threats, new attack vectors and techniques; discuss what you can learn from friendly hackers and how to work with them – and talk about practical ideas on how executives can make a difference in their organizations, including how to foster more diversity in cybersecurity. Finally, she’ll look at the future of cybersecurity and explain why resilience will be defined not just by our efforts to balance technology’s benefits against the risks it brings with it, but by how we evolve our paradigms about security, privacy and digital access.
|
|
12:05 - 12:30 pm
| How Privacy Investment Translates to Business ValueIn today’s digital era where data is the currency of business and our lives, protecting personal data and privacy as a fundamental human right is mission critical. As organizations accelerate digital transformation to keep pace with demand, how can they earn and maintain trust for those they serve?
Join Cisco VP and Chief Privacy Officer Harvey Jang as he provides insights into how privacy investment translates to business value and ROI, showing how demonstrable compliance builds trust.
Harvey Jang, Vice President, Deputy General Counsel, and Chief Privacy Officer, Cisco
|
|
12:30 - 12:55 pm
| Building Resilience: Addressing Employee Anxiety Amid Organizational TransformationThis candid discussion about the stress that security teams are feeling right now will provide important tips about communicating with staff and coaching employees through difficult transitions and situations. This conversation does not gloss over a difficult and important topic. Isaac and Joanne dive into an honest conversation that explores what you need to realize is on everyone’s minds before and after a big organizational transformation, and how you can best take care of yourself and your team.
Joanne Friedman, CEO and Principal, Smart Manufacturing, Connektedminds Inc.
|
|
12:55 - 1:20 pm
| Don’t Lose Your Focus: It’s Not About the AI; It’s About the DataData is the enabling infrastructure for security AI. Three characteristics are deterministic of success: data framework structures; data management; and data curation. Every cybersecurity vendor is going to roll-out a generative AI interface for their tools, and they should. The ability of the tool to create outcomes in your environment however will be determined not by the power of generative AI but in the data and the predictive AI models behind the generative AI. Join this fascinating presentation to hear from IDC analyst Frank Dickson about the focus you should have, and the questions you should be asking, as you look to unlock the potential of AI.
Frank Dickson, Program Vice President, Cybersecurity Products, IDC
|
|
1:20 - 1:35 pm
|
The State of Data Security and ManagementHear details from the 2023 State of Data and Security and Management report on the biggest challenges global IT and security operations leaders face in the rise of ransomware attacks and other cyber threats. This session will provide practical tips for IT and security leaders building cyber resilient strategies, including an overview of a data security and management operating model and key capabilities to consider when evaluating solutions that align to the NIST cybersecurity framework.
| Truth Is Not An Average: Know-Manage-SecureWe’ll unpack the “Know – Manage – Secure” strategy, underscoring the necessity of accurate, real-time data. Truth that is required for: crisis management, threat hunting, and incident response, also enhances and matures key foundational IT Ops & InfoSec programs. This session will illustrate how mastering this knowledge enables more effective risk management.
Learn the real sources of truth and equip your organization with the knowledge to strengthen its cyber defenses.
|
|
|
1:35 - 2:00 pm
| Reaping the Benefits of Security MetricsThere are multiple metrics CISOs can use to improve the effectiveness of security efforts and demonstrate business value and ROI. However, to get true value from security performance metrics, it’s important that CISOs avoid drowning in metrics that lack meaning or context, focusing on those that show how security is enabling the organization.
This session will explore the metrics of most value to CISOs and outline how they can use them to not only measure and improve the effectiveness of their security efforts, but also show valuable business alignment.
Interviewed by:
|
|
2:00 - 2:05 pm
| BreakNow’s the time to grab your coffee, visit sponsor booths, or answer a couple of emails.
|
|
2:05 - 2:30 pm
| Preventing the Cracks from Becoming a Hole that Becomes a CraterThere are multiple metrics CISOs can use to improve the effectiveness of security efforts and demonstrate business value and ROI. However, to get true value from security performance metrics, it’s important that CISOs avoid drowning in metrics that lack meaning or context, focusing on those that show how security is enabling the organization. This session will explore the metrics of most value to CISOs and outline how they can use them to not only measure and improve the effectiveness of their security efforts, but also show valuable business alignment.
Tera Ladner, Vice President, Information Risk Management and Governance, Aflac Inc
Interviewed by:
Bob Bragdon, Publisher Emeritus, CSO, Foundry, an IDG Inc. company
|
|
2:30 - 2:50 pm
| Lightning InsightsJoin us for a lively series of 5-minute market insights geared towards solving your biggest challenges.
Cisco Security: A Better Way of Doing Security presented by Cisco
Cyber Resilience with Cohesity presented by Cohesity
Tanium Converged Endpoint Management presented by Tanium
Reduce risk, optimize investments, and fill talent gaps presented by Secureworks
Future of Identity Security presented by BeyondTrust
|
|
2:50 - 3:10 pm
| AI and Cybersecurity: Speed Bumps, Training, and CommunicationIf you are hesitant to embrace AI tools because of cybersecurity concerns, don’t miss this illuminating presentation from Dennis Legori who will explain why the risk of not using AI is greater than the risk of using it. What guardrails should you have in place to ensure AI is used for good and not creating unnecessary risk? How should you be thinking about completing a privacy impact analysis and risk assessment as your use of AI tools evolves? How can security leaders add speed bumps and education to provide caution and risk mitigation as needed? Dennis will share his perspective around these and other important issues you need to consider as you widely adopt AI tools in your organization.
Dennis Legori, Associate Director, Security Awareness & Digital Communications, Carrier
|
|
3:10 - 3:30 pm
| Prioritizing Customers’ Needs for Data Security, Privacy, And TransparencyCisco’s 2023 Data Privacy Benchmark Study reveals that to build trust, organizations focus primarily on compliance, whereas consumers value transparency most. 92% of respondents say their organization needs to do more to reassure customers about how their data is used in AI. In this insightful presentation from Brad Arkin, a leading Chief Security & Trust Officer, you will hear about effective data privacy strategies that bridge the gap between organizations’ and customers’ privacy priorities.
Brad Arkin, SVP and Chief Security and Trust Officer, Cisco
|
|
Always On
| Always On Sessions (Dec 23)Bringing Strategy and Resilience Together
Building Cyber Resilience Data Management Architectures
Tanium Converged Endpoint Management
Speaker TBC
A look at the Threat Landscape in 2023
Gain a 360-Degree View Over Your Identities, Privileges and Secrets
|
|