CISO Dallas Summit | March 21, 2017 | Hyatt Regency North Dallas - Dallas, TX, USA

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Tuesday, March 21, 2017 - CISO Dallas Summit

7:30 am - 8:30 am

Registration and Networking Breakfast

 

8:35 am - 8:45 am

Welcome Address and Opening Remarks

 

8:45 am - 9:15 am

Keynote Presentation

Security's Place in Enterprise: A Brave New World

Attackers are rapidly refining their ability to evade detection methods against modern cyber security solutions. While Information Security has existed for decades, organizations are starting to realize information security has be fully incarnated in an organization's ecosystem as a formal and holistic behavior, using Threat Intelligence and Enterprise Risk Management (ERM) bestpractices. 

Organizations are more at risk than ever when it comes to advanced attacks, insider threats, compliance issues, change management, ransomware, and many other issues. Savvy CISOs will recognize this new, broader need for threat visibility and management of the overall enterprise risk, and will position themselves for success by looking beyond traditional information security boundaries and engaging business solutions around all cyber enterprise risk. 

Takeaways: 

  • Understand the real risks that enterprises face from cyber attackers. 
  • Learn how organizations manage multiple vendors, products, and solutions when defending against a wide variety of complex attacks. 
  • Just because information security is an aspect of enterprise risk doesn't mean that the CISO needs to take a back seat position. 
  • The end goal is not about fiefdoms and ownership, it is about improving enterprise value and success; maintaining focus is essential.

Sponsored by:

Fortinet View details

 
 
 

9:20 am - 9:45 am

Executive Exchange

 

Share:

Thought Leadership

Become a Change Agent for Business Transformation

Today's modern CIO is embarking on a digital transformation journey exploring radical hybrid IT strategies and leveraging new technologies like Cloud, Social, Mobile and Big Data. However with 'keeping the lights on' legacy IT components costing nearly 90% of a typical IT budget, how can IT make powerful advancements and lead business change?

Join this interactive session to learn how award-winning CIOs are successfully tipping the balance by liberating people, time and money from costly ongoing maintenance of their ERP systems including SAP and Oracle, to invest in strategic initiatives that create real-world competitive advantage.

Sponsored by:

Rimini Street View details

 
 
 

9:50 am - 10:15 am

Executive Exchange

 

Share:

Thought Leadership

Strategic and Secure Mobility

Is mobility a cost? Or is it a key part of your strategy for business success? Many businesses are leveraging mobility to generate real and measurable returns and to increase their competitiveness. How? Join CDM Media and BlackBerry as we explore ways in which companies can strategically manage their mobility investments.

In our session we'll look at security - again from a strategic viewpoint. Security covers a wide range of issues in the modern enterprise. While protection of data is at the forefront, security involves many other aspects and issues from secure collaboration to the security and protection of employees in an increasingly tumultuous world. We'll deal not only with securing mobility, but how the strategic use of mobility can make you more secure.

Sponsored by:

BlackBerry View details

 
 
 

10:20 am - 10:30 am

Morning Networking Coffee Break

 

10:35 am - 11:00 am

Executive Exchange

 

Think Tank

Bridging the Talent Gap: Building the Team of Tomorrow

There is no escaping the fact that the demands on the IT department are changing. Those changes are necessitating changes in the IT department itself and nowhere is this being felt more than in the roles and responsibilities of the IT staff themselves. Complicating this transition is the fact that every IT department is undergoing to change at roughly the same time making the personnel with the requisite skillsets extremely hard to find, and perhaps even harder to retain. Savvy CIOs need to quickly identify which are the hot skills they most urgently require and then build a strategy that allows them to build (train), borrow (outsource), or buy (hire) the right people with the right capability at the right time.

Takeaways:

  • Commit to a talent-first organization which recognizes and rewards the most important asset you have " your people
  • Identify the skills most urgently in need and prioritize their acquisition
  • Determine which acquisition methods needs to be used for which skill to maximize impact and return on investment

Presented by:

Greg Ericson, CIO, Essilor of America

 
 

11:05 am - 11:30 am

Executive Exchange

 

Thought Leadership

Meet the Challenges of Digital Transformation: Tools That Can Help You Solve for the Digital Edge

The digital economy is forcing enterprises to transform how they connect customers, partners, employees and operations. Today's market leaders credit their speed and business advantages to their digital platform. Equinix will discuss how an Interconnection Oriented Architecture (IOATM) with a step-by-step playbook can redefine the edge - which is where to localize delivery of cloud-supported services to your customers, employees and partners - and architect your digital platform.

Sponsored by:

Equinix View details

 
 
 

11:35 am - 12:00 pm

Executive Exchange

 

Executive Boardroom

Can Technology Alone Prevent Phishing Attacks and Breaches?

2016 was undoubtedly the year of ransomware. And while we saw improvements in the number of days to detect a breach, 146 days is still 146 too many. As targeted phishing attacks continue to grow in number and evolve in sophistication, organizations need to reconsider their current approach to these threats. Companies continue to invest billions of dollars in technology to shore up their defenses but it's obviously not enough. Join us to learn how the PhishMe solution combines both technology and human-driven phishing defense to help eliminate phishing breaches through greater employee resilience and better incident response.

Sponsored by:

PhishMe View details

 
 
 

12:05 pm - 12:30 pm

Executive Exchange

 

Think Tank

The Digital Journey - Securing IoT

It is clear that already advanced technologies are positively changing how we live and work, but with the pace of change What if Any security considerations are being taken to ensure that our Digital Journey is safe & secure.

When it comes to IoT there are two perspectives or you could say extremes that have been voiced in a number of forums... we will cover these and discus a what could be the middle ground around IoT security.

  • Which one (or two or three) factor would most accelerate the benefits of the Internet of Things?
  • What's the one piece of advice for a business/industry leader interested in the Internet of Things? 

Takeaways:

  • Common agreement on what companies should do to review their security posture around IoT and their digital journey
  • Identifying near term risks & ways to address them

Presented by:

Jason Cook, Managing Director, The Chertoff Group View details

 
 
 

12:35 pm - 1:20 pm

Networking Luncheon

 

1:25 pm - 1:50 pm

Executive Exchange

 

Think Tank

Speaking the Language of the Business

For many years the CIO, has struggled with the concept of IT-Business alignment and finding ways to ensure that the IT department and the Lines of Business with which it integrates have a common understanding and ability to communicate. Now, as the CISO and the information security department grow out of the IT shadow, they increasingly find themselves in the same position. Their challenge however is greater in that the concepts of IT security are in many ways more abstract than those of generalist IT, and their activities often run counter to the goals of the rest of the organization. CISOs must learn for the trials and tribulations of the CIO and the IT department, and find common ground with the business, to ensure they can hear what their partners are saying, while communicating their own points in understandable terms.

Takeaways:

  • IT-Business communications have long been strained and only now are improving across most organizations through concerted effort
  • IT has had to find ways to speak the language of the business " it was not the business that learned to speak IT
  • The CISO must adopt and emulate the successful communications practices and strategies of the IT department or risk serious relationship issues

Presented by:

Mark Szkudlarek, VP, IT, Aleris International View details

 
 
 

1:55 pm - 2:20 pm

Executive Exchange

 

Executive Boardroom

Digital Transformation In A White Water World

There are prevailing winds of change that are creating a white water affect in the world of data security today. These include high profile and high impact breaches, data center consolidation and narrowing of financial transaction control. When combined with ability to leverage new and advanced technologies -- like Cloud, Google and AWS -- and other expanding service and deployment models, you start to wonder how companies like yours will navigate a successful digital transformation in this turbulent and ever-challenging environment. It is totally possible! 

 Takeaways: 

  • If you adjust your center of gravity, making it through to sail in smooth waters can be a reality. 
  • Companies that embrace new and advanced technologies will reap the benefits. 
  • There are proven strategies that when implemented can protect your data where ever it is created, shared or stored.

Sponsored by:

Thales, e-Security View details

 
 
 

2:25 pm - 2:50 pm

Executive Exchange

 

Executive Boardroom

Identity Deception - Exposing the Source of Malicious Emails

Everywhere we look we see evil emails: at work, at home and in the news. Attempting to steal your money, your identity, your login information, sell you something or take you hostage for a hefty ransom. 

Internet criminals are taking advantage of two fundamental characteristics of the human brain: 

  1. We usually trust something when it's being sent by someone we know, and 
  2. Our brain is designed to gloss over small inconsistencies. 

These criminals are also exploiting another weakness: traditional email filtering gateways. Traditionally designed to to fight spam or check for a malicious attachment, email filtering gateways have evolved slightly to determine if a URL in a given email is bad. Unfortunately, these controls are not enough to out pace today's sophisticated attacks and it's why we continue to see data breach after data breach. 

Agari will share a few recent phishing examples and trends based on real-world cases that were detected - some of these might even look familiar! What is needed is a new approach to this growing problem: the internet criminals are using identity deception to carry out their malicious acts. The only way to stop them is to understand the true identity of these emails.

Sponsored by:

Agari View details

 
 
 

2:55 pm - 3:20 pm

Executive Exchange

 

Think Tank

Security in an Outsourced World

Building security into your enterprise processes, and integrating it with your existing technology investments has never been more critical or complicated than it is in this era of decentralized computing, and ever-tightening compliance requirements. Furthering this complication is the impact that partnering deals can have since infrastructure, applications, and even data may no longer be under your direct control. To be able to ensure efficient and effective security capabilities you need to understand the nature of the threats that exist today, the impact a sourcing relationship can have on these threats, and the mitigation strategies and tools key industry leaders are using to address the challenge.

Takeaways:

  • Social, Mobile, Cloud, and Analytics is already having a significant impact on enterprise security, sourcing potentially adds another layer of complexity
  • Beyond ?simple? security however there are also issues such as privacy and compliance that also need to be considered
  • Investing in the right tools and practices is essential to weather the storm without breaking the bank

Presented by:

Brian Mork, CISO, Celanese View details

 
 
 

3:25 pm - 3:35 pm

Afternoon Networking Coffee Break

 

3:40 pm - 4:05 pm

Executive Exchange

 

Executive Boardroom

Combating Ransomware

Ransomware attacks are pervasive: There are more than 4,000 such attacks in the U.S. each day. To battle ransomware and other cyberattack threats, a layered approach to security is always best. But your endpoints are your last line of defense. After all, your data resides on laptops and other mobile devices as well as your data center. Without a clear understanding of the threat vectors, and the tools you need to prevent or detect an attack, you run the risk of under-protecting your endpoints and exposing your organization to massive costs as well as employee downtime. In this session, you'll learn about effective strategies for protecting your endpoints from cyberattacks.

Sponsored by:

Bitdefender View details

 
 
 

4:10 pm - 4:35 pm

Executive Exchange

 

Think Tank

Turning Around Troubled IT Shops

Broken IT is not something that a CEO or CIO likes to discuss. Too often than not, IT shops are neglected resulting in major business breakdowns and/or government actions. CIOs like to be business aligned, value driven, and forward looking in business strategy. Unfortunately, the reality is many IT organizations are too broken and require a turnaround effort before any strategic changes can even be considered. Often a new CIO is required to make drastic changes in 12 to 18 months to flip an IT shop. To achieve the turnaround, fundamental changes in people-process-technology are necessary.

Takeaways:

  • Review real-world scenario, understand approaches, and build the roadmap
  • Insights on challenges and lessons-learned to achieve a sustainable turnaround
  • Managing Board expectations, government requirements, and staffing skill-gaps while leading and transforming the culture of governance and risk management

Presented by:

Eddie Ho, EVP CIO, Los Alamos National Bank

 
 

4:40 pm - 5:20 pm

Executive Visions

Facilitating Technology-Enabled Business Transformation

The role of the modern IT Executive is more complex than it has ever been before, not just because the technology landscape has become more complex, but also because increasingly IT execs have had to become a business-focused executive, not just a technologist. Long have we talked about the CIO and CISO getting a seat at the table but modern businesses are now demanding that their technology impresario join them and leverage his deep and rich technical acumen to allow the organization as a whole to better position itself for market-place success. To be successful, CxOs need to invest in themselves, in their personnel, and in the right technologies to allow them to position the IT department to proactively address business needs as an innovator and driver, rather than order-taker and enabler.

Takeaways:

  • IT leadership can no longer be simply technology focused, but must instead take their visibility into business process and become business focused
  • A broader business-focus does not preclude maintaining technology excellence however and indeed may demand more of it than ever before
  • Success for CxOs will be measured not in how they can enable enterprise decisions, but in how they can drive growth

Moderated by:

Jason Cook, Managing Director, The Chertoff Group View details

 
 

Panelists:

Eddie Ho, EVP CIO, Los Alamos National Bank

 

Tony Weiss, Chief Infrastructure Technology Officer, Magellan Health View details

 
 

Rajesh Nagarajan, Chief Information Officer, Celanese

 

Greg Ericson, CIO, Essilor of America

 
 

5:20 pm - 5:30 pm

Thank You Address and Closing Remarks

 

5:30 pm - 7:00 pm

Cocktail Reception