CIO/ CISO East Virtual Summit

December 10, 2020

CIO/ CISO East Virtual Summit

Anyone can log in from anywhere. All you need is WiFi.

The Assembly will feature members from...


* All Times In EST


Opening Remarks


Keynote Panel: “How the CIO, CDO & CISO view the Future of Work

Moderated By:

Sallie Wright

United States Department of Defense
Gertrude Van Horn
David Greenlee
Brian McGowan
Sr.Director & Head of Global Security (CISO)
Azher Ahmed
EVP & Chief Digital Officer


Keynote Presenter: “Navigating Enterprise Security in a Post-Compromise Reality

 John Matthews

read more »

Every organization gets compromised – it’s how you fast you detect and respond to an incident that counts. This is especially important when you look at trends like the overnight move to remote work, the subsequent increase in phishing attacks and acceleration of cloud adoption, as well as the proliferation of enterprise IoT that have expanded the attack surface and complicated the job of security professionals. We’ll explore those trends and the opportunity that lay ahead for security teams post-compromise to prevent an event that results in an outage or an incident from becoming a full-scale data breach.

« show less


Thought Leadership Presentation: “Never Let a Good Crisis Go To Waste – Zero Trust in the Age of Covid

Chris Perry
Cyber Security Expert
Veteran, Army Cyber Command

read more »

The jarring transition to work from home has immediately impacted the effectiveness of our security architecture which has most security leaders asking, “how can we do this better?” In this session we will explore the growing trend of “Zero Trust” and how the latest security best practices can be used to address the current gaps organizations are facing, in a remote work force, and why this will ultimately lead to a more resilient security posture.

Key take aways:
– Traditional security architecture is no longer sufficient for defending the IT enterprise
– The core principles of zero trust secure organizations for current and future crisis
– Effective zero trust requires extending the principles to all servers and endpoints, even legacy systems

« show less


Disrupter Presenter: “How to Mitigate Risk in the Enterprise with Automated Penetration Testing

Patrick Guay
Vice President, North American Sales

read more »

As the attack surface continues to grow and the number of attacks increases, there still remains
a gap when it comes to validating the effectiveness and accuracy of the enterprise’s cyber

● Enable secure business continuity on their extended networks
● Continuously validate their cyber defenses with limited on-site access
● Regularly challenge their network against the MITRE ATT & CK framework

« show less


CXO Fireside Chat: “From Cost-Center to Business Enabler: How Cybersecurity is Changing During Covid-19

Jake Olcott
VP, Communications & Government Affairs

read more »

These unprecedented times may usher in a new world for security and risk professionals… but are they ready? With many organizations anticipating full-time remote work and acceleration of digital initiatives, CISOs are increasingly being asked to adapt to the speed of business and demonstrate value to the organization. How can security and risk leaders adapt to the new normal? What changes must they make to their programs? How can security enable the business to succeed — moving beyond the “cost center” mindset? Join this discussion, which will explore the changing role of the security professional, the rise of quantitative measurement and metrics, and how you should be thinking about your program and relationships with executives in the months and years ahead.

« show less


CXO Fireside Chat: “ Digital Transformation Has Never Been More Critical

Josh Mason
VP of Engineering and SaaS
Vinay Indraganti
Global Head of Digital Transformation

read more »

What to Know and What to Do About It

Digital interactions between customers and vendors during the pandemic and redesigned supply chains, along with a massive—and unexpected—shift to remote work, have made implementing digital transformation more urgent than ever before. In this webinar, we’ll build on insights from a recent Lawless Research survey of managers and executives both inside and outside corporate IT departments to discuss companies focus on digital transformation, the emergence of no-code platforms, and the latest trends in remote work.

  • Research study and industry insights when it comes to digital transformation
  • Digital transformation trends in the era of remote work

« show less


Executive Vision: “How AI Augments Humans: Closing Skills Gaps & Driving Executive Decisions

Mike Beck
Global CISO

read more »

Alongside the rise of today’s dynamic workforce, the speed and scale of sophisticated cyber-attacks is rapidly increasing. As the cybersecurity industry continues to endure an ongoing skills shortage, over-worked and under-resourced teams urgently need augmentation in order to defend against evolving, sophisticated threats.

For over three years, Darktrace experts have been working to meet this challenge, investigating whether they could teach AI to think like a cybersecurity analyst. It takes subtle, nuanced skills and implicit knowledge for an analyst to detect genuinely threatening activity, and the creation of the world-first Cyber AI Analyst took analyzing over one hundred of the world’s top threat analysts and complex machine learning algorithms.

Join Mike Beck, Darktrace’s Global CISO, as he discusses the Cyber AI Analyst in action, and how the capability detected and prevented a large-scale worming attack in real time.

« show less


CIO & CISO Closing Keynote Panel Presentation: “Accelerating Digital Growth in 2021

Moderated By:

Gina Scinta
Senior Solutions Architect
Digital Identity & Security

Goulston & Storrs
JPM Chase
John Arsneault
Mou Dasgupta
Executive Director, Digital and Platform Services Strategist
Alan Chai
Head of Digital Transformation & Innovation
Rod Aday
Director Information Risk Management & Security

* All Times In EST

Got questions? We've got answers!

Why should I attend?

Your time is valuable and we make sure to make the most of it! We take the time to figure out your challenges and customize your experience to meet your needs. Our agendas are tailored to your feedback and we pride ourselves in covering the most cutting-edge content delivered by renowned industry experts. Look forward to building enduring partnerships and together we’ll go straight to the top.

Where is the event taking place?

The event is by invitation-only. The location will be released to all attendees once your registration has been confirmed. 

What is the dress code?

We recommend business attire. Most attendees wear suits or comparable attire. Ties are optional.

Can I bring a colleague with me?

Yes! We always urge our members to refer their colleagues! We love adding new members to the community, especially if they come highly recommended by a current member. Either have them reach out to your Apex POC or have them fill out the Member Registration Form.

What if I have dietary restrictions?

No problem! Please let your Apex POC know as soon as possible in order for us to work with the venue on providing alternate options for you at the event.

What if I want to speak at an assembly?

Apex is always looking for speakers that can contribute their valuable insight. If you would like to speak, please contact your Apex POC or fill out the Speaker Registration Form on the Assemblies page. Please keep in mind that we receive many inquiries for speaking and sessions are available on a first come first served basis. But no need to worry, we have plenty of opportunities available at future assemblies.

I plan on being in attendance, but what if something comes up and I have to cancel?

We understand that something may come up on your calendar! Before canceling with us, please know that we will have a separate room for attendees to step out for work-related activities (meetings, emails, conference calls, etc.). If you must cancel, we just ask that you let us know at least 48 hours in advance so that we can open up the waitlist for another member.


straight to the top