11:30am - 11:40am
| Opening RemarksFeaturing
&
Beth Kormanik, Manager, Content Development, Foundry, an IDG Inc. company
|
|
11:40am - 12:20pm
| Leading Transformation to a Digital Culture: Leveraging AI for CompetitivenessThe emergence of generative artificial intelligence in the last year has demonstrated the power of the technology to both the general public and to corporate leaders. As you chart your organization’s AI journey, join us for guidance and insight from the AI expert, tech CEO and investor Ann Marie Sastry. The greatest access to AI tools is via APIs that enable ingestion, analysis and decision-making with business and technical data. Sastry argues that integration of these tools requires careful consideration of infrastructures and adaptations to security and privacy practices that support their use, and training of staff at all levels to promote awareness, respect and desire to leverage data and AI.
|
|
12:20pm - 12:40pm
| Live Discussion: AI and the Future of SecurityWhat questions do you have about security and AI? Join us for a real-time, moderated discussion with the AI expert and entrepreneur Ann Marie Sastry that builds on her keynote presentation.
|
|
12:40pm - 1:00pm
| Is There an Easier Way to Manage and Remediate Risk?The challenges cybersecurity teams face include budget constraints and competing for talent. On the technology side, there are too many legacy risk tools, increasingly complex infrastructure and applications stacks, and an average of 75 security tools in many companies. The solution starts with visibility gleaned with insight from a single pane of glass. Today’s prevention and remediation now include a high degree of automation and data analytics augmented by AI and machine learning.
Jason Mical, Field Chief Technology Officer – Americas, Rapid7
Interviewed by:
Charles Pelton, Contributing Editor, CIO, CSO, Network World, Foundry, an IDG Inc. company
|
|
1:00pm - 1:25pm
| Exploring the Impact of the SEC’s Cyber-Risk GovernancePublic companies will face an additional layer of governance under new guidelines from the Securities and Exchange Commission. What will this look like in practice? And what do CISOs need to know to protect their organizations – as well as themselves? This session will dive into the questions around the impact to businesses, particularly on the board level. If you have a cyber advisor on the board, is that person at greater level of risk than other board members? Would they be a target of the SEC in the event of a breach? What if there’s a difference of opinion between the board and the corporate leader in the seat? Join us to find out.
Interviewed by:
|
|
1:25pm - 1:50pm
| Proactive Cybersecurity: Reduce Your Risk Exposures Before It’s Too LateWith IT environments growing more complex and potential risk exposures more numerous, organizations need to think about using a holistic proactive cybersecurity management platform that brings all cyber-risk exposures to one place. The result? Easier prioritization and reporting as well as an overall culture of trust that benefits both partners and customers.
|
|
1:50pm - 2:00pm
| BreakNow’s the time to grab your coffee, visit sponsor booths, or answer a couple of emails.
|
|
2:00pm - 2:25pm
| Strategies to Tame Today’s Volatile Regulatory EnvironmentEver-shifting state, federal, industry and international data privacy laws make regulatory compliance a moving target for all businesses. JCPenney Global Privacy Officer Shaina Varia leads an integrated team of attorneys and technologists who are developing a modular security platform that functions across various jurisdictions. Key advantages of integrating the two disciplines are greater speed and accuracy in responding to changing laws worldwide.
Interviewed by:
Julia King, Contributing Editor, Computerworld/CIO, Foundry, an IDG Inc. company
|
|
2:25pm - 2:55pm
| Getting More or Less from Cyber InsuranceCyber insurance can help mitigate an organization’s exposure to financial and operational risk, but the insurance landscape is shifting significantly. As the frequency and severity of ransomware, phishing, and denial of service attacks have increased, demand for and conditions relating to coverage have evolved. Policies are becoming more diverse and complex, presenting CISOs and their organizations new challenges when it comes to getting the most value from cyber insurance. This panel explores the current state of cyber insurance, why policies may be more difficult to obtain, and helpful strategies for optimal cyber insurance investment.
Moderated by:
|
|
2:55pm - 3:10pm
| Concurrent Silver SessionsSessions in development.
|
|
3:10pm - 3:35pm
| The Complicated State of InfoSec TalentWhile each week seems to bring headlines of layoffs, one seemingly immune field are security jobs. That’s both the good news and the bad news, as companies struggle with hiring for available positions, to the tune of millions of unfilled positions globally. Join us for an up-to-the-minute look at trends in cybersecurity hiring and what we can expect to see in the near future. We’ll also explore innovative ways of building your tech talent pipeline.
Interviewed by:
Beth Kormanik, Manager, Content Development, Foundry, an IDG Inc. company
|
|
3:40pm - 3:55pm
| Lightning InsightsJoin us for a lively series of market insights geared to solving your biggest challenges, delivered in rapid-fire 5 minute segments.
|
|
3:55pm - 4:20pm
| Visibility and Vulnerability in the CloudWidespread cloud adoption has created security challenges as business struggle with visibility into what clouds they operate in. Business units can stand up a service without going through security, exposing businesses to undue risk. This session will explore observability in the cloud from a networking perspective, including what a good relationship with procurement looks like.
Interviewed by:
|
|
Always On
| Always On Sessions (June 2023)Backup and Recovery Does Not Mean Cyber Recovery
Demo: Watch the Tanium Platform in Action
Pain Points: Analyzing the Data Disclosure Layer of Double Extortion Ransomware Attacks
The New Paradigm: Cyber Resilience
|
|