Virtual CIO/ CISO East Summit

September 29, 2020

Virtual CIO/ CISO East Summit

In today’s digital landscape, the role of the CIO has become the most dynamic amongst their peers. CIOs are focused on finding the most transformative technologies that enable them to bring value to their enterprise and customers.

Adopting an enterprise wide transformation strategy is driven by fundamental shifts in internal and external forces that impact the business and how it operates. Disruptive technologies are being introduced to the market faster than ever and executives must have the ability to align and address the enterprise-wide transformation challenges. These changes will ultimately influence strategic planning, business operations and the overall trajectory of the operating model moving forward. With unceasing demands, technology has become more complex and solution providers more difficult to decipher.

On September 29th, Apex Assembly will unite visionary leaders and industry experts for a half day of content and discussion, where we will examine the challenges of 2019 and concentrate on the most pressing issues of 2020 in the information technology sector.

Through collaboration with our executive community, we have discovered key industry challenges and trends. These topics form the foundation of the Summit and will be addressed through Panels, Disrupter sessions, and Fireside chats.

Hosted using video conferencing technology, our Virtual Summit gives executives and service providers the opportunity to engage with like-minded executives and industry leaders without having to leave their office or home.

Anyone can log in from anywhere. All you need is WiFi.
Inquire About Membership
Inquire About Sponsorship

The Assembly will feature members from...

Event Registration Request

Click Here for Full Access

Agenda


* All Times In EST


12:00pm-12:05pm

Opening Remarks


12:05pm-12:50m

Keynote Panel: “Managing Trust Amidst Chaos

Moderated By:

Lauren Vaccarello
CMO, Talend



Conair Corporation
Georgia Department of Revenue
Anne Hardy
CISO, Talend
Anisha Vaswani
CIO, BOX
Dara Meath
Divisional CIO & Head of Digital
Tamika Bass
CISO



read more »

  • Discuss how shifting priorities in rapidly changing environments affect businesses, customers and employees
  • Learn how agility today will prepare you for the next “pandemic”
  • Hear about the importance of trust as the connective tissue that binds our relationships, actions and expectations
  • Learn ways to reinforce trust during crisis and uncertainty

« show less


12:55pm-1:20pm

Keynote Presenter: “DISCOVER, PROTECT, CONTROL – In an Age of Uncertainty

Todd Moore
Vice President, Encryption Products
Thales, Cloud Protection and Licensing



read more »


The biggest disruption to the security industry in many years is happening right now. Working from home is changing our business, as well as our threat landscape. Cybersecurity has a bigger role than ever in protecting data, no matter where it resides or whatever network it traverses. New compliance laws, emerging threats from using cloud based applications, as well as ransomware are just a few of the elements that IT professionals are dealing with on a daily basis.

Takeaways:

  • Huge disruption in the way that we protect our business and our remote workers
  • Three pillars for data protection – discover, protect and control
  • Holistic platform approach reduces operational complexities and allows business to recover from the effects of the COVID-19 pandemic.

« show less


1:25pm-1:45pm

Executive Vision Presenter: “Maintaining Data Protection and Privacy During a Pandemic

Jeffrey DiMuro
Deputy CISO, ServiceNow
Mark Cockerill
VP, Legal and Head of Global Privacy



read more »


NOW is the time review your InfoSec and Privacy policies and standards to ensure your organization has solid data governance practices. Data Entitlement reviews, data minimization, least privilege access controls, and training your employees on data stewardship are essential steps to establish Trust and Transparency with your employees and customers as we re-mobile our workforce back into our corporate offices.

  • The intersection of data protection, privacy, and supporting global health are forcing us to think differently
  • The ability to analyze data quickly and offer services to people has never been so important to understand and reactive to the COVID pandemic
  • At the same time, by law, we need to uphold the sanctity and the security of the data while maintaining the consumer (aka the Data subject) privacy rights – which can vary by jurisdiction
  • While Zoom has transformed the word from a Verb to a Noun, with more employees working remotely, the ability to protect data and enforce InfoSec requirements has become more difficult to manage
  • ServiceNow has also quickly pivoted and leveraged many of process flow automation to create back-to-work and health escalation apps to get employees back to work and bring assistance to people who needed medical help
  • Transparency builds Trust
  • Obtaining consent and/or a having a legitimate interest in collecting and maintaining data is paramount

« show less


1:45pm-2:05pm

Executive Vision Presenter: “Cyber Defense during a time of crisis and after

Ran Shahor
Brigadier General (Ret.)
CEO & Founder, HolistiCyber



read more »


Any and every one is a target for nation-state grade cyber attacks, especially during a global crisis. During times of crisis there is a shift in focus which allows cyber-attacks to grow and intensify, and a large portion of them are nation-state grade. The private sector, all verticals and industries, have always been a target for these, and the pandemic has only worsened it.

These highly advanced mechanisms of cyber assault are continuously evolving and readily available for sale on the darknet, enabling hackers and new players looking for alternative income due to COVID19 to become extremely powerful attackers. The question arises – How can organizations protect themselves in today’s crisis cyber reality? And what happens the day after? Fortunately, there are answers and solutions.

In his presentation, Ran Shahor, IDF Brigadier General (Ret.) will discuss the challenges financial organizations face during a time of crisis, the solutions, the holistic approach and the secret sauce needed in order to be protected and stay ahead of the curve.

« show less


2:05pm-2:40pm

CXO Panel: “Enabling the acceleration of digital transformation before, during and after the pandemic

Moderated By:

Andre Bromes
Former CIO & CISO
Goodwill Industries



Cox Media Group
United Wholesale Mortgage
Ray Griffin
Head of Information Security
Sean Mack
CIO & CISO
Jason Bressler
EVP & CTO



read more »

Any and every one is a target for nation-state grade cyber attacks, especially during a global crisis. During times of crisis there is a shift in focus which allows cyber-attacks to grow and intensify, and a large portion of them are nation-state grade. The private sector, all verticals and industries, have always been a target for these, and the pandemic has only worsened it.

These highly advanced mechanisms of cyber assault are continuously evolving and readily available for sale on the darknet, enabling hackers and new players looking for alternative income due to COVID19 to become extremely powerful attackers. The question arises – How can organizations protect themselves in today’s crisis cyber reality? And what happens the day after? Fortunately, there are answers and solutions.

In his presentation, Ran Shahor, IDF Brigadier General (Ret.) will discuss the challenges financial organizations face during a time of crisis, the solutions, the holistic approach and the secret sauce needed in order to be protected and stay ahead of the curve.

« show less


2:45pm-3:15pm

Thought Leadership Presentation: “Navigating Complexity: A path through too much choice

Dr. Mike Lloyd
RedSeal CTO



read more »

We’re all trying to protect constantly changing network environments without enough people, and with too many tools – all while we face attackers who are persistent and automated. Dr. Mike Lloyd, RedSeal CTO, draws on his background in epidemiology and modern cybersecurity, as well as his study of history to provide a guide for understanding and evaluating what you need to do next to be most successful.

« show less


3:20pm-3:35pm

Disrupter Presenter: “Open Source Software: Please Build Responsibly

Maury Cupitt
VP Solutions Architect



read more »


Open Source Software (OSS) makes it easy to consume and contribute to software projects. You can fork OSS projects or do whatever else you want with them. The most common use case for OSS to consume them as dependencies, so we don’t have to write our entire application from scratch, saving a huge amount of time. However, these benefits bring risks:

Open source projects can be hijacked by bad actors, compromising any applications that depend on those projects.
Vulnerable dependencies can create security holes in the applications that depend on them.
Dependencies hosted in public repositories can disappear, breaking your builds and causing people to substitute dependencies from more questionable sources.
Dependency hell can obscure the true surface area of your application, making it more difficult to spot or prevent security holes from appearing in your applications.
Aging dependencies can reveal new vulnerabilities that threaten your production applications, forcing interrupt-driven and expensive remediation work.

It’s best to mitigate these risks if possible. Here are the five things you’ll take away from this talk:
1) Understand the importance of picking a trusted source of OSS components.
2) Learn how to check publicly-available data to see if there are any issues in the components you want to use.
3) See how caching dependencies can improve the speed and reliability of your build pipeline.
4) Understand how bundling dependencies with your application can make it easier to audit them for issues in the future.
5) Learn how automation can help you find and fix security issues quickly without it taking a huge amount of your time.

« show less


3:35pm-4:00pm

Member Roundtable: “Data Management Trends & Challenges – the needs of a Data Science team

Austin Sun
Head of Data Engineering




4:05pm-4:45pm

Closing Keynote Panel: “Understanding the role of the CIO/CTO in Security, Risk, and Compliance


* All Times In EST

Learn More About Our Partners

Media Partners

Got questions? We've got answers!

Why should I attend?

Your time is valuable and we make sure to make the most of it! We take the time to figure out your challenges and customize your experience to meet your needs. Our agendas are tailored to your feedback and we pride ourselves in covering the most cutting-edge content delivered by renowned industry experts. Look forward to building enduring partnerships and together we’ll go straight to the top.

Where is the event taking place?

The event is by invitation-only. The location will be released to all attendees once your registration has been confirmed. 

What is the dress code?

We recommend business attire. Most attendees wear suits or comparable attire. Ties are optional.

Can I bring a colleague with me?

Yes! We always urge our members to refer their colleagues! We love adding new members to the community, especially if they come highly recommended by a current member. Either have them reach out to your Apex POC or have them fill out the Member Registration Form.

What if I have dietary restrictions?

No problem! Please let your Apex POC know as soon as possible in order for us to work with the venue on providing alternate options for you at the event.

What if I want to speak at an assembly?

Apex is always looking for speakers that can contribute their valuable insight. If you would like to speak, please contact your Apex POC or fill out the Speaker Registration Form on the Assemblies page. Please keep in mind that we receive many inquiries for speaking and sessions are available on a first come first served basis. But no need to worry, we have plenty of opportunities available at future assemblies.

I plan on being in attendance, but what if something comes up and I have to cancel?

We understand that something may come up on your calendar! Before canceling with us, please know that we will have a separate room for attendees to step out for work-related activities (meetings, emails, conference calls, etc.). If you must cancel, we just ask that you let us know at least 48 hours in advance so that we can open up the waitlist for another member.

UPCOMING ASSEMBLIES

straight to the top
View All →