Virtual CIO/ CISO East Summit
September 29, 2020
Virtual CIO/ CISO East Summit
In today’s digital landscape, the role of the CIO has become the most dynamic amongst their peers. CIOs are focused on finding the most transformative technologies that enable them to bring value to their enterprise and customers.
Adopting an enterprise wide transformation strategy is driven by fundamental shifts in internal and external forces that impact the business and how it operates. Disruptive technologies are being introduced to the market faster than ever and executives must have the ability to align and address the enterprise-wide transformation challenges. These changes will ultimately influence strategic planning, business operations and the overall trajectory of the operating model moving forward. With unceasing demands, technology has become more complex and solution providers more difficult to decipher.
On September 29th, Apex Assembly will unite visionary leaders and industry experts for a half day of content and discussion, where we will examine the challenges of 2019 and concentrate on the most pressing issues of 2020 in the information technology sector.
Through collaboration with our executive community, we have discovered key industry challenges and trends. These topics form the foundation of the Summit and will be addressed through Panels, Disrupter sessions, and Fireside chats.
Hosted using video conferencing technology, our Virtual Summit gives executives and service providers the opportunity to engage with like-minded executives and industry leaders without having to leave their office or home.
Anyone can log in from anywhere. All you need is WiFi.
The Assembly will feature members from...
Event Registration Request
Agenda
* All Times In EST
12:00pm-12:05pm
Opening Remarks
12:05pm-12:50m
Keynote Panel: “Managing Trust Amidst Chaos“
Moderated By:
Lauren Vaccarello CMO, Talend |
Conair Corporation |
Georgia Department of Revenue |
|||
Dara Meath Divisional CIO & Head of Digital |
Tamika Bass CISO |
Anne Hardy CISO, Talend |
read more »
- Discuss how shifting priorities in rapidly changing environments affect businesses, customers and employees
- Learn how agility today will prepare you for the next “pandemic”
- Hear about the importance of trust as the connective tissue that binds our relationships, actions and expectations
- Learn ways to reinforce trust during crisis and uncertainty
« show less
12:55pm-1:20pm
Keynote Presenter: “DISCOVER, PROTECT, CONTROL – In an Age of Uncertainty“
Todd Moore Vice President, Encryption Products Thales, Cloud Protection and Licensing |
read more »
The biggest disruption to the security industry in many years is happening right now. Working from home is changing our business, as well as our threat landscape. Cybersecurity has a bigger role than ever in protecting data, no matter where it resides or whatever network it traverses. New compliance laws, emerging threats from using cloud based applications, as well as ransomware are just a few of the elements that IT professionals are dealing with on a daily basis.
Takeaways:
- Huge disruption in the way that we protect our business and our remote workers
- Three pillars for data protection – discover, protect and control
- Holistic platform approach reduces operational complexities and allows business to recover from the effects of the COVID-19 pandemic.
« show less
1:25pm-1:45pm
Executive Vision Presenter: “Maintaining Data Protection and Privacy During a Pandemic“
Jeffrey DiMuro Deputy CISO, ServiceNow |
Mark Cockerill VP, Legal and Head of Global Privacy |
read more »
NOW is the time review your InfoSec and Privacy policies and standards to ensure your organization has solid data governance practices. Data Entitlement reviews, data minimization, least privilege access controls, and training your employees on data stewardship are essential steps to establish Trust and Transparency with your employees and customers as we re-mobile our workforce back into our corporate offices.
- The intersection of data protection, privacy, and supporting global health are forcing us to think differently
- The ability to analyze data quickly and offer services to people has never been so important to understand and reactive to the COVID pandemic
- At the same time, by law, we need to uphold the sanctity and the security of the data while maintaining the consumer (aka the Data subject) privacy rights – which can vary by jurisdiction
- While Zoom has transformed the word from a Verb to a Noun, with more employees working remotely, the ability to protect data and enforce InfoSec requirements has become more difficult to manage
- ServiceNow has also quickly pivoted and leveraged many of process flow automation to create back-to-work and health escalation apps to get employees back to work and bring assistance to people who needed medical help
- Transparency builds Trust
- Obtaining consent and/or a having a legitimate interest in collecting and maintaining data is paramount
« show less
1:50pm-2:10pm
Executive Vision Presenter: “Cyber Defense during a time of crisis and after“
Ran Shahor Brigadier General (Ret.) CEO & Founder, HolistiCyber |
read more »
Any and every one is a target for nation-state grade cyber attacks, especially during a global crisis. During times of crisis there is a shift in focus which allows cyber-attacks to grow and intensify, and a large portion of them are nation-state grade. The private sector, all verticals and industries, have always been a target for these, and the pandemic has only worsened it.
These highly advanced mechanisms of cyber assault are continuously evolving and readily available for sale on the darknet, enabling hackers and new players looking for alternative income due to COVID19 to become extremely powerful attackers. The question arises – How can organizations protect themselves in today’s crisis cyber reality? And what happens the day after? Fortunately, there are answers and solutions.
In his presentation, Ran Shahor, IDF Brigadier General (Ret.) will discuss the challenges financial organizations face during a time of crisis, the solutions, the holistic approach and the secret sauce needed in order to be protected and stay ahead of the curve.
« show less
2:15pm-3:00pm
CXO Panel: “Enabling the acceleration of digital transformation before, during and after the pandemic“
Moderated By:
Andre Bromes Former CIO & CISO Goodwill Industries |
||||
Cox Media Group |
United Wholesale Mortgage |
|||
Ray Griffin Head of Information Security |
Sean Mack CIO & CISO |
Jason Bressler EVP & CTO |
read more »
Any and every one is a target for nation-state grade cyber attacks, especially during a global crisis. During times of crisis there is a shift in focus which allows cyber-attacks to grow and intensify, and a large portion of them are nation-state grade. The private sector, all verticals and industries, have always been a target for these, and the pandemic has only worsened it.
These highly advanced mechanisms of cyber assault are continuously evolving and readily available for sale on the darknet, enabling hackers and new players looking for alternative income due to COVID19 to become extremely powerful attackers. The question arises – How can organizations protect themselves in today’s crisis cyber reality? And what happens the day after? Fortunately, there are answers and solutions.
In his presentation, Ran Shahor, IDF Brigadier General (Ret.) will discuss the challenges financial organizations face during a time of crisis, the solutions, the holistic approach and the secret sauce needed in order to be protected and stay ahead of the curve.
« show less
3:05pm-3:35pm
Thought Leadership Presentation: “Navigating Complexity: A path through too much choice“
Dr. Mike Lloyd RedSeal CTO |
read more »
We’re all trying to protect constantly changing network environments without enough people, and with too many tools – all while we face attackers who are persistent and automated. Dr. Mike Lloyd, RedSeal CTO, draws on his background in epidemiology and modern cybersecurity, as well as his study of history to provide a guide for understanding and evaluating what you need to do next to be most successful.
« show less
3:40pm-3:55pm
Disrupter Presenter: “Open Source Software: Please Build Responsibly“
Maury Cupitt VP Solutions Architect |
read more »
Open Source Software (OSS) makes it easy to consume and contribute to software projects. You can fork OSS projects or do whatever else you want with them. The most common use case for OSS to consume them as dependencies, so we don’t have to write our entire application from scratch, saving a huge amount of time. However, these benefits bring risks:
Open source projects can be hijacked by bad actors, compromising any applications that depend on those projects.
Vulnerable dependencies can create security holes in the applications that depend on them.
Dependencies hosted in public repositories can disappear, breaking your builds and causing people to substitute dependencies from more questionable sources.
Dependency hell can obscure the true surface area of your application, making it more difficult to spot or prevent security holes from appearing in your applications.
Aging dependencies can reveal new vulnerabilities that threaten your production applications, forcing interrupt-driven and expensive remediation work.
It’s best to mitigate these risks if possible. Here are the five things you’ll take away from this talk:
1) Understand the importance of picking a trusted source of OSS components.
2) Learn how to check publicly-available data to see if there are any issues in the components you want to use.
3) See how caching dependencies can improve the speed and reliability of your build pipeline.
4) Understand how bundling dependencies with your application can make it easier to audit them for issues in the future.
5) Learn how automation can help you find and fix security issues quickly without it taking a huge amount of your time.
« show less
4:00pm-4:20pm
Member Roundtable: “Data Management Trends & Challenges – the needs of a Data Science team”
Austin Sun Head of Data Engineering |
4:25pm-4:50pm
Closing Keynote Fireside Chat: “Future of Work“
Moderated By:
Lauren Vaccarello CMO, Talend |
Anisha Vaswani CIO, BOX |
* All Times In EST
Media Partners
Got questions? We've got answers!
Why should I attend?
Your time is valuable and we make sure to make the most of it! We take the time to figure out your challenges and customize your experience to meet your needs. Our agendas are tailored to your feedback and we pride ourselves in covering the most cutting-edge content delivered by renowned industry experts. Look forward to building enduring partnerships and together we’ll go straight to the top.
Where is the event taking place?
The event is by invitation-only. The location will be released to all attendees once your registration has been confirmed.
What is the dress code?
We recommend business attire. Most attendees wear suits or comparable attire. Ties are optional.
Can I bring a colleague with me?
Yes! We always urge our members to refer their colleagues! We love adding new members to the community, especially if they come highly recommended by a current member. Either have them reach out to your Apex POC or have them fill out the Member Registration Form.
What if I have dietary restrictions?
No problem! Please let your Apex POC know as soon as possible in order for us to work with the venue on providing alternate options for you at the event.
What if I want to speak at an assembly?
Apex is always looking for speakers that can contribute their valuable insight. If you would like to speak, please contact your Apex POC or fill out the Speaker Registration Form on the Assemblies page. Please keep in mind that we receive many inquiries for speaking and sessions are available on a first come first served basis. But no need to worry, we have plenty of opportunities available at future assemblies.
I plan on being in attendance, but what if something comes up and I have to cancel?
We understand that something may come up on your calendar! Before canceling with us, please know that we will have a separate room for attendees to step out for work-related activities (meetings, emails, conference calls, etc.). If you must cancel, we just ask that you let us know at least 48 hours in advance so that we can open up the waitlist for another member.
ROLE DESCRIPTION
We are looking for a Membership Manager to join the company and take on one of the most opportunistic roles the industry has to offer. This is a role that allows for you to create and develop relationships with leading solution providers in the enterprise technology space. Through extensive research and conversation you will learn the goals and priorities of IT & IT Security Executives and collaborate with companies that have the solutions they are looking for. This role requires professionalism, drive, desire to learn, enthusiasm, energy and positivity.
Role Requirements:
Role Responsibilities:
Apex offers our team:
Entry level salary with competitive Commission & Bonus opportunities
Apex offers the ability to make a strong impact on our products and growing portfolio.
Three months of hands on training and commitment to teach you the industry and develop invaluable sales and relationship skills.
Opportunity to grow into leadership role and build a team
Extra vacation day for your birthday when it falls on a weekday
All major American holidays off
10 paid vacation days after training period
5 paid sick days
Apply Now >>