CISO National Virtual Summit
June 10, 2021
CISO National Virtual Summit
Anyone can log in from anywhere. All you need is WiFi.
The Assembly will feature members from...
Agenda
* All Times In EST
12:00pm-12:05pm
Opening Remarks
12:05pm-12:50pm
Keynote Panel: “The Intersection of Compliance and Cyber Security – How to build compliant, secure infrastructure“
Genuine Parts Company |
Mindbody |
Mr. Cooper |
CBRE |
|
Wayne Lewandowski VP of Global Sales HyTrust Sales |
Damian Apone Director, Global Retail Cybersecurity |
Jason Loomis CISO |
Scot Miller CISO |
Patrick Benoit BISO |
read more »
« show less
12:55pm-1:15pm
Keynote Presenter: “SASE Crash Course: Getting started with Confidence“
Ryan Poppa Director of Product Management |
read more »
« show less
1:20pm-1:40pm
Fireside Chat: “How Pentesting Can Evolve To Enable Better Collaboration Between Security and Engineering”
Cengage |
||||
Caroline Wong Chief Strategy Officer |
Eric Galis VP, Compliance and Security |
read more »
Fixing vulnerabilities found by third-party pentests has rarely been a smooth or collaborative process. Once the extensive PDF report hits their inboxes, teams struggle to exchange relevant information, issues aren’t added to sprints, and manual tasks slow the process down. Meanwhile, critical issues stay open.
To keep our applications secure, we need to be able to work together effectively. And the truth is, while pentesting has lagged behind, many other AppSec testing methods have adapted to DevOps workflows. This fact alone is what signals to Caroline Wong, Chief Strategy Officer at Cobalt, and Eric Galis, VP Compliance and Security at Cengage, that the problem isn’t so much with internal teams — it’s that pentest providers don’t set them up for success.
In this APEX Assembly session, Caroline and Eric will discuss how pentest delivery can evolve to enable faster, easier, and more effective remediation. Attendees can expect to learn:
- What are the issues that prevent security and engineering from working together effectively
- What changes can help remediation become a more collaborative process
- What results teams can look forward to when implementing these changes
« show less
1:45pm-2:10pm
Thought Leadership: “Now on Now: Lessons Learned—Evolving Our Own SOC”
Tim Boswell Senior Solutions Architect, Security and Risk |
read more »
In this session, we will reveal our own history and expertise in empowering enterprise cyber-defense, maturing teams, and scaling the Security Operations Center (SOC). Gain insights on:
- Protect our organization—one of the fastest-growing SaaS companies out there
- Provide the performance metrics you need for assessing your SOC’s capacity and maturity
- Gain insights into threat impacts and risks to effectively evolve your security team and response workflow
« show less
2:15pm-2:35pm
Closing Fireside Chat: “Building and Maturing a TPRM Program“
Third Party Risk Association |
||||
Jonathan Ehret, CISSP, CISA, CRISC, VP, Vice President, Strategy& Risk | Julie Gaiaschi Co-Founder and CEO |
read more »
These days it seems no organization or industry is adverse to cyber attacks. From open-source software tools to critical infrastructure, threats are coming in all shapes and sizes. It’s more critical than ever to understand the threats facing your organization from the inside and your vendor ecosystem.
Managing your digital supply chain risk does not have to be a cumbersome process. Firms can look beyond security assessments and questionnaires to ensure that their vendor network is operating securely and efficiently.
During this session, attendees will learn:
- new methods for managing supply chain risk
- what tools are most effective to combat vendor risk
- how to generate key data points to make effective third-party risk decisions
« show less
* All Times In EST
Media Partners
Got questions? We've got answers!
Why should I attend?
Your time is valuable and we make sure to make the most of it! We take the time to figure out your challenges and customize your experience to meet your needs. Our agendas are tailored to your feedback and we pride ourselves in covering the most cutting-edge content delivered by renowned industry experts. Look forward to building enduring partnerships and together we’ll go straight to the top.
Where is the event taking place?
The event is by invitation-only. The location will be released to all attendees once your registration has been confirmed.
What is the dress code?
We recommend business attire. Most attendees wear suits or comparable attire. Ties are optional.
Can I bring a colleague with me?
Yes! We always urge our members to refer their colleagues! We love adding new members to the community, especially if they come highly recommended by a current member. Either have them reach out to your Apex POC or have them fill out the Member Registration Form.
What if I have dietary restrictions?
No problem! Please let your Apex POC know as soon as possible in order for us to work with the venue on providing alternate options for you at the event.
What if I want to speak at an assembly?
Apex is always looking for speakers that can contribute their valuable insight. If you would like to speak, please contact your Apex POC or fill out the Speaker Registration Form on the Assemblies page. Please keep in mind that we receive many inquiries for speaking and sessions are available on a first come first served basis. But no need to worry, we have plenty of opportunities available at future assemblies.
I plan on being in attendance, but what if something comes up and I have to cancel?
We understand that something may come up on your calendar! Before canceling with us, please know that we will have a separate room for attendees to step out for work-related activities (meetings, emails, conference calls, etc.). If you must cancel, we just ask that you let us know at least 48 hours in advance so that we can open up the waitlist for another member.
With an alarming number of breaches, it is clear that the attack surface has greatly expanded. As enterprises work to develop a progressive strategy, there is an increasing need to deploy and manage a variety of advanced internal and external security services. This leaves the Chief Information Security Officer faced with a multitude of challenges to maintain and run a secure enterprise.
The CISO is at the center of the security dialogue and is ultimately responsible for the guidance and leadership of an increasingly intricate technology landscape. Given the weight of that responsibility, the search for the most transformative solutions that enable them to protect the enterprise is constant and the need to stay ahead of the curve, a must.
Apex Assembly will unite visionary leaders and industry experts for a half day of content and discussion, where we will examine the challenges and the most pressing issues of 2021 in the information technology sector.
Through collaboration with our executive community, we have discovered key industry challenges and trends. These topics form the foundation of the Summit and will be addressed through Panels, Disrupter sessions, and Fireside chats.
Hosted using video conferencing technology, our Virtual Summit gives executives and service providers the opportunity to engage with like-minded executives and industry leaders without having to leave their office or home.