CIO/CISO TOLA Virtual Summit
April 22, 2021
CIO / CISO TOLA Virtual Summit
Anyone can log in from anywhere. All you need is WiFi.
The Assembly will feature members from...
Agenda
* All Times In EST
12:00pm-12:05pm
Opening Remarks
12:05pm-12:40pm
CISO Fireside Chat: “Top Trends & Challenges for CISOs in 2021“
Moderated by:
Rob Cross Client Director, Synack |
Mr.Cooper |
Lumentum |
|||
Scot Miller CISO |
Amit Bhardwaj CISO |
read more »
The use of encryption to protect sensitive data has become much more pervasive, with the average enterprise now using more than 8 different products that perform encryption. Protecting and managing the secret keys used to perform encryption and decryption is the linchpin of a data protection strategy, but many organizations struggle to do it consistently and effectively.
This session and discussion will explore:
- The challenges created by digital transformation, mobility, and other initiatives that create new destinations for sensitive data
- The evolving threat landscape and the role encryption plays – both good and bad
- Best practices for managing encryption and the security of keys in complex multi-cloud and enterprise environments, particularly as new technologies are introduced.
« show less
12:45pm-1:05pm
Executive Vision Presenter: “Defying (Data) Gravity | What the future of accelerated data growth holds for enterprises“
Dave McCrory VP Of Growth and Global Head of Insights and Analytics |
read more »
What do you get when you take the laws of physics and the laws of IT and intersect them with digital transformation? The answer is data gravity, the single biggest challenge facing all companies today and into the foreseeable future. Data gravity inhibits workflow performance, raises security concerns, and increases costs, all complicated by regulatory and legacy architecture constraints.
In this information-packed session – delivered by Dave McCrory, VP of Growth and Global Head of Insights and Analytics at Digital Realty – you’ll gain a deep understanding of the intensity and implications of accelerated data growth and increasing data gravity on global enterprises.
You’ll receive actionable quantitative insights and CAGR forecasts for more than 50 metros worldwide and seven industries that will help unlock the dynamics of data gravity for enterprises, as well as a blueprint for addressing infrastructure constraints. You’ll also learn our patent-pending formula for measuring data gravity, a methodology based on thousands of attributes of Global 2000 enterprises.
- Understand the data creation lifecycle, influencing factors and macro trends contributing to the explosion of data gravity.
- Dive into our patent-pending formula for measuring data gravity.
- See how fast data gravity intensity is forecasted to spike globally through 2024, comparing more than 50 metros and seven industries that include Banking and Financial Services, Insurance, Manufacturing and others.
- Learn about the implications of such accelerated data gravity growth, which now requires a connected data community approach between enterprises, connectivity, cloud and content providers integrating core, cloud and edge at centers of data exchange, implementing a secure, hybrid IT and data-centric architecture globally at points of business presence.
« show less
1:10pm-1:35pm
CXO Fireside Chat: “Cloud Computing and Security is More than Lifting and Shifting“
Jonathan Nguyen-Duy Vice President, Global Field CISO Team |
read more »
Enterprise IT strategies have always been determined by the dynamics of centralized and distributed computing. Indeed, one could say that networking and security always follow the compute. Rapid adoption of multi-cloud and hybrid computing means networks are now more distributed than ever before with business value shifting to agility, innovation and software – leading to the rise of the software defined enterprise.
Multi-cloud adoption is also driving three strategic technology trends: Zero Trust, SD-WAN, and SASE. Going forward, IT teams will have to grapple with these key trends while managing a combination of in-house and service provider solutions, while balancing risk management with business objectives and customer experiences. How should we think about computing, networking, and security when enterprises own less and less infrastructure, platform and software?
In this session, we’ll review practical strategies to secure cloud computing while delivering better outcomes and experiences.
« show less
1:40pm-2:00pm
Executive Vision Presenter: “Threat Modeling SaaS Applications: The Anatomy of a Data Breach“
Brendan O’Connor Co-Founder and CEO, AppOmni |
read more »
Companies are adopting SaaS faster than ever before, but investment in SaaS security hasn’t kept up. Join Brendan O’Connor, the former CSO at Salesforce and Security CTO at ServiceNow, as he discusses why enterprise SaaS is the biggest security vulnerability no one is talking about. Brendan will cover many common misconceptions about SaaS security, and the mistakes that nearly every enterprise is making. He’ll also present anonymized examples of data exposure from some of the world’s most recognized companies and explain the steps enterprises need to take now to secure your environment and prevent SaaS data breaches.
Common SaaS vulnerabilities we’ll be covering:
- Portals
- 3rd party applications
- Vendor updates and releases
- Anonymous API access
« show less
2:05pm-2:20pm
Disrupter Presenter: “PtaaS: Strengthen Your Security Program Through a Scalable, Data-Driven Approach to Pentesting”
Alex Jones Information Security Manager |
read more »
What is Pentest as a Service (PtaaS) and how is it better than traditional pentesting models? Pentest as a Service transforms your traditional pentesting model by combining on-demand access to expert talent with a modern SaaS delivery platform that allows for real-time collaboration and quick remediation. In this session, find out how customers like you can proactively build a data-driven pentesting program, test more of their applications more frequently, and mature their security posture over time.
« show less
2:25pm-2:50pm
Fireside Chat: “Protecting your data – no matter what happens next“
|
||||
John Grimm Vice President of Strategy and Business Development |
read more »
The use of encryption to protect sensitive data has become much more pervasive, with the average enterprise now using more than 8 different products that perform encryption. Protecting and managing the secret keys used to perform encryption and decryption is the linchpin of a data protection strategy, but many organizations struggle to do it consistently and effectively. This session and discussion will explore
- The challenges created by digital transformation, mobility, and other initiatives that create new destinations for sensitive data
- The evolving threat landscape and the role encryption plays – both good and bad
- Best practices for managing encryption and the security of keys in complex multi-cloud and enterprise environments, particularly as new technologies are introduced.
« show less
2:55pm-3:30pm
Closing Keynote Fireside Chat: “How to Accelerate and Secure Your Digital Transformation Journey“
Moderator: Joshua Crumbaugh, CISO, Warehouse Services & Chief Hacker at PhishFirewall
Boeing |
NCH Corporation |
BlockFi |
||
Ramki Ramaswamy CIO, Commercial Airlines |
Gertrude Van Horn CIO |
Mahesh Paolini-Subramanya CTO |
* All Times In EST
Media Partners
Got questions? We've got answers!
Why should I attend?
Your time is valuable and we make sure to make the most of it! We take the time to figure out your challenges and customize your experience to meet your needs. Our agendas are tailored to your feedback and we pride ourselves in covering the most cutting-edge content delivered by renowned industry experts. Look forward to building enduring partnerships and together we’ll go straight to the top.
Where is the event taking place?
The event is by invitation-only. The location will be released to all attendees once your registration has been confirmed.
What is the dress code?
We recommend business attire. Most attendees wear suits or comparable attire. Ties are optional.
Can I bring a colleague with me?
Yes! We always urge our members to refer their colleagues! We love adding new members to the community, especially if they come highly recommended by a current member. Either have them reach out to your Apex POC or have them fill out the Member Registration Form.
What if I have dietary restrictions?
No problem! Please let your Apex POC know as soon as possible in order for us to work with the venue on providing alternate options for you at the event.
What if I want to speak at an assembly?
Apex is always looking for speakers that can contribute their valuable insight. If you would like to speak, please contact your Apex POC or fill out the Speaker Registration Form on the Assemblies page. Please keep in mind that we receive many inquiries for speaking and sessions are available on a first come first served basis. But no need to worry, we have plenty of opportunities available at future assemblies.
I plan on being in attendance, but what if something comes up and I have to cancel?
We understand that something may come up on your calendar! Before canceling with us, please know that we will have a separate room for attendees to step out for work-related activities (meetings, emails, conference calls, etc.). If you must cancel, we just ask that you let us know at least 48 hours in advance so that we can open up the waitlist for another member.
In today’s digital landscape, the role of the CIO and the CISO have become the most dynamic amongst their peers. CIOs are focused on finding the most transformative technologies that enable them to bring value to their enterprise and customers. The CISO is at the center of the security dialogue and is ultimately responsible for the guidance and leadership of an increasingly intricate technology landscape.
Given the weight of that responsibility, the search for the most transformative solutions that enable them to prepare and protect the enterprise is constant and the need to stay ahead of the curve, a must.
Apex Assembly will unite visionary leaders and industry experts for a half day of content and discussion, where we will examine the challenges and the most pressing issues of 2021 in the information technology sector.
Through collaboration with our executive community, we have discovered key industry challenges and trends. These topics form the foundation of the Summit and will be addressed through Panels, Disrupter sessions, and Fireside chats.
Hosted using video conferencing technology, our Virtual Summit gives executives and service providers the opportunity to engage with like-minded executives and industry leaders without having to leave their office or home.