CISO East Virtual Summit

May 26, 2021

CISO East Virtual Summit

Anyone can log in from anywhere. All you need is WiFi.
Inquire About Membership
Inquire About Sponsorship

The Assembly will feature members from...

Register Here


* All Times In EST


Opening Remarks


Keynote Panel: “Post Covid Cybersecurity: Hope is not a strategy

read more »

The charter of the CISO has always been daunting, made even more so by the challenges brought forth by the COVID pandemic. From budget constraints to competing priorities, business and security leaders need to rethink their ideas around business continuity, expansion/contraction, work-from-home/work-from-office, all while managing exposure and risk. The CISO is entrusted to protect and defend the enterprise internally and externally from continuous threats in a constantly changing landscape, typically with limited resources and unrealistic deadlines, all with the expectation that there are zero vulnerabilities. Given such an impossible reality, “hope” can seem to be the best strategy. It is not. Please meet our panel of CISOs that will share their experiences in how they navigate these challenges, and plan for success rather than hope for it! You will learn from them:

  • The unique COVID-related cybersecurity challenges presented in 2020;
  • The balance between playing “offense vs. defense” in today’s environment;
  • The benefits and difficulties with outsourcing vs. insourcing cybersecurity solutions;
  • Emerging threats.

« show less


CXO FireSide: “What Defines Quality in Third-Party Pentesting?

Jay Paz
Director of Pentest Operations

read more »

Whether for compliance, customer requests, or as part of a wider security program, third-party pentesting comes up often enough to impact security teams’ priorities and resources. The question is: is that impact valuable? How can teams know that their pentests are of good quality? What even defines quality in pentesting?

From this session, attendees can learn:

  • What to expect from an effective pentest
  • How to spot a high-quality pentesting vendor
  • Dos and don’ts with scoping, execution and triaging

« show less


Disrupter Presenter: “”


Virtual Senior Supporter: “Introduction to Data Management by Cohesity

Chris Colotti
Field Chief Technology Officer

read more »

Abstract: Zero Trust is suddenly THE cyber strategy that everyone is talking about. From the recent Forrester Zero Trust Wave to every security vendor’s website, the words “Zero Trust” are popping up just about everywhere. Despite the attention, Zero Trust is still a strategy for most, with little reality to show for it.

  • Real-world examples of effective Zero Trust strategies
  • Best practices for successful implementation
  • How to take an end-to-end approach to Zero Trust

« show less


Fireside Chat: “You are here. Your data is there. Threats are everywhere

Jiro Shindo
Digital Security Solutions Marketing Director

read more »

Organizations have expanded their use of encryption to protect cloud and on-premises data and applications, but what challenges are they facing? And what tools do they find most effective?

The 2021 Global Encryption Trends Study”, conducted by the Ponemon Institute and sponsored by Entrust highlights how leading organizations are applying encryption strategies with detailed insights into the use cases that are growing the fastest.

Join us for this session to learn about the key findings from this industry-leading study and how your peers are addressing their data protection challenges.

You will learn:

  • How your encryption strategy compares to others in Hong Kong and across the world?
  • Which threats are causing the most concern?
  • Trends in encryption adoption and deployment choices
  • How to strengthen encryption key management at scale across Cloud and mission-critical workloads
  • Where organizations are using hardware security modules (HSM) for increased trust and key protection

« show less


Virtual Senior Supporter: “Security Priorities in 2021 From The CSO Perspective

Gavin Reid

read more »

2020 has had some unique and complex challenges; the internet has become the glue holding our society together – and that has resulted in the need for better security.

This brief session will cover high-level security priorities (with examples) that organizations should keep in mind for 2021:

  • What we should expect from attackers
  • Alerting assumptions, fail-safe alerting
  • Downstream detection capabilities

    « show less


CXO Closing Panel: “ “

read more »

The future of work remains unpredictable and uncertain. More than ever before, business leaders need to remain confident that their operations can continue securely in the face of global or even regional crises, and while sections of the economy are slowly re-opening, cyber-attackers are ramping up their campaigns.

As businesses look set to rely on cloud and SaaS tools for the long term, our digital environments are going to be more dynamic than ever. Yet organizations are finding themselves undergoing a delicate balancing act—each new work practice and technology that is introduced also brings unforeseen risk. Static, legacy approaches have become redundant, both unintelligent and ill-equipped to adapt.

Organizations must rethink their approach to security, and rely on new technologies like AI to achieve much-needed adaptability and resilience. Darktrace is the world leader in Cyber AI technology, and leverages unsupervised machine learning to seamlessly adapt and integrate into changing environments, and to detect and respond to attacks in the earliest moments.

In the face of an uncertain present and future, Cyber AI enables businesses to continue communicating, operating, and innovating.

« show less

* All Times In EST

Media Partners

Learn More About Our Partners

Got questions? We've got answers!

Why should I attend?

Your time is valuable and we make sure to make the most of it! We take the time to figure out your challenges and customize your experience to meet your needs. Our agendas are tailored to your feedback and we pride ourselves in covering the most cutting-edge content delivered by renowned industry experts. Look forward to building enduring partnerships and together we’ll go straight to the top.

Where is the event taking place?

The event is by invitation-only. The location will be released to all attendees once your registration has been confirmed. 

What is the dress code?

We recommend business attire. Most attendees wear suits or comparable attire. Ties are optional.

Can I bring a colleague with me?

Yes! We always urge our members to refer their colleagues! We love adding new members to the community, especially if they come highly recommended by a current member. Either have them reach out to your Apex POC or have them fill out the Member Registration Form.

What if I have dietary restrictions?

No problem! Please let your Apex POC know as soon as possible in order for us to work with the venue on providing alternate options for you at the event.

What if I want to speak at an assembly?

Apex is always looking for speakers that can contribute their valuable insight. If you would like to speak, please contact your Apex POC or fill out the Speaker Registration Form on the Assemblies page. Please keep in mind that we receive many inquiries for speaking and sessions are available on a first come first served basis. But no need to worry, we have plenty of opportunities available at future assemblies.

I plan on being in attendance, but what if something comes up and I have to cancel?

We understand that something may come up on your calendar! Before canceling with us, please know that we will have a separate room for attendees to step out for work-related activities (meetings, emails, conference calls, etc.). If you must cancel, we just ask that you let us know at least 48 hours in advance so that we can open up the waitlist for another member.


straight to the top
View All →