CIO/CISO North Central Virtual Summit

May 13, 2021

CIO/CISO North Central Virtual Summit

Anyone can log in from anywhere. All you need is WiFi.
Inquire About Membership
Inquire About Sponsorship

The Assembly will feature members from...

Register Here

Agenda


* All Times In CST


12:00pm-12:05pm

Opening Remarks


12:05pm-12:50pm

Keynote Panel: “How the CIO, CDO & CISO view the Future of Work


12:50pm-1:15pm

Keynote Presenter: “How Cloud is Enabling & Accelerating Digital Transformation and the Business



read more »


Every organization gets compromised – it’s how you fast you detect and respond to an incident that counts. This is especially important when you look at trends like the overnight move to remote work, the subsequent increase in phishing attacks and acceleration of cloud adoption, as well as the proliferation of enterprise IoT that have expanded the attack surface and complicated the job of security professionals. We’ll explore those trends and the opportunity that lay ahead for security teams post-compromise to prevent an event that results in an outage or an incident from becoming a full-scale data breach.

« show less


1:20pm-1:45pm

CIO/CISO Fireside Chat: “Conquering Cloud with consistent Cyber, Data | Cloud Security and Governance Model



read more »


The jarring transition to work from home has immediately impacted the effectiveness of our security architecture which has most security leaders asking, “how can we do this better?” In this session we will explore the growing trend of “Zero Trust” and how the latest security best practices can be used to address the current gaps organizations are facing, in a remote work force, and why this will ultimately lead to a more resilient security posture.

Key take aways:
– Traditional security architecture is no longer sufficient for defending the IT enterprise
– The core principles of zero trust secure organizations for current and future crisis
– Effective zero trust requires extending the principles to all servers and endpoints, even legacy systems

« show less


1:50pm-2:05pm

Disrupter Presenter: “Top concerns regarding the complexity of Integrating a Multi Cloud Strategy



read more »

Alongside the rise of today’s dynamic workforce, the speed and scale of sophisticated cyber-attacks is rapidly increasing. As the cybersecurity industry continues to endure an ongoing skills shortage, over-worked and under-resourced teams urgently need augmentation in order to defend against evolving, sophisticated threats.

For over three years, Darktrace experts have been working to meet this challenge, investigating whether they could teach AI to think like a cybersecurity analyst. It takes subtle, nuanced skills and implicit knowledge for an analyst to detect genuinely threatening activity, and the creation of the world-first Cyber AI Analyst took analyzing over one hundred of the world’s top threat analysts and complex machine learning algorithms.

Join Mike Beck, Darktrace’s Global CISO, as he discusses the Cyber AI Analyst in action, and how the capability detected and prevented a large-scale worming attack in real time.

« show less


2:10pm-2:35pm

CIO/CISO Fireside Chat: “”



read more »


As the attack surface continues to grow and the number of attacks increases, there still remains
a gap when it comes to validating the effectiveness and accuracy of the enterprise’s cyber
posture.

● Enable secure business continuity on their extended networks
● Continuously validate their cyber defenses with limited on-site access
● Regularly challenge their network against the MITRE ATT & CK framework

« show less


2:40pm-2:55pm

Disrupter Presenter:

read more »


These unprecedented times may usher in a new world for security and risk professionals… but are they ready? With many organizations anticipating full-time remote work and acceleration of digital initiatives, CISOs are increasingly being asked to adapt to the speed of business and demonstrate value to the organization. How can security and risk leaders adapt to the new normal? What changes must they make to their programs? How can security enable the business to succeed — moving beyond the “cost center” mindset? Join this discussion, which will explore the changing role of the security professional, the rise of quantitative measurement and metrics, and how you should be thinking about your program and relationships with executives in the months and years ahead.

« show less


2:55pm-3:30pm

CXO Panel: “Cloud & Collaboration: Bridging the data gap between on-premises systems and the latest as-a-service cloud applications

read more »


What to Know and What to Do About It

Digital interactions between customers and vendors during the pandemic and redesigned supply chains, along with a massive—and unexpected—shift to remote work, have made implementing digital transformation more urgent than ever before. In this webinar, we’ll build on insights from a recent Lawless Research survey of managers and executives both inside and outside corporate IT departments to discuss companies focus on digital transformation, the emergence of no-code platforms, and the latest trends in remote work.

  • Research study and industry insights when it comes to digital transformation
  • Digital transformation trends in the era of remote work

« show less


3:55pm-4:40pm

CXO Fireside Chat: “Aligning, Moving and Prioritizing Data Analytics Workloads to the Cloud for Performance Optimization


* All Times In CST

Media Partners

Learn More About Our Partners

Got questions? We've got answers!

Why should I attend?

Your time is valuable and we make sure to make the most of it! We take the time to figure out your challenges and customize your experience to meet your needs. Our agendas are tailored to your feedback and we pride ourselves in covering the most cutting-edge content delivered by renowned industry experts. Look forward to building enduring partnerships and together we’ll go straight to the top.

Where is the event taking place?

The event is by invitation-only. The location will be released to all attendees once your registration has been confirmed. 

What is the dress code?

We recommend business attire. Most attendees wear suits or comparable attire. Ties are optional.

Can I bring a colleague with me?

Yes! We always urge our members to refer their colleagues! We love adding new members to the community, especially if they come highly recommended by a current member. Either have them reach out to your Apex POC or have them fill out the Member Registration Form.

What if I have dietary restrictions?

No problem! Please let your Apex POC know as soon as possible in order for us to work with the venue on providing alternate options for you at the event.

What if I want to speak at an assembly?

Apex is always looking for speakers that can contribute their valuable insight. If you would like to speak, please contact your Apex POC or fill out the Speaker Registration Form on the Assemblies page. Please keep in mind that we receive many inquiries for speaking and sessions are available on a first come first served basis. But no need to worry, we have plenty of opportunities available at future assemblies.

I plan on being in attendance, but what if something comes up and I have to cancel?

We understand that something may come up on your calendar! Before canceling with us, please know that we will have a separate room for attendees to step out for work-related activities (meetings, emails, conference calls, etc.). If you must cancel, we just ask that you let us know at least 48 hours in advance so that we can open up the waitlist for another member.

UPCOMING ASSEMBLIES

straight to the top
View All →