2022 CISO National Virtual Summit January 27

CISO National Summit

January 27, 2022

CISO National Summit

Anyone can log in from anywhere. All you need is WiFi.
Inquire About Membership
Inquire About Sponsorship

The Assembly will feature members from...

Entrust

Register Here

Agenda


* All Times In EST


12:00pm-12:05pm

Opening Remarks


12:05pm-12:55pm

Keynote Panel: “The War on Talent: Scaling the Security Team through Developers

Simon Maple
Field CTO



VistaPrint
Centene Corporation/Carolina Complete Health
Baker Hughes
The Standard
Rosa Feygin
Head of Security
Rick Doten
CISO
Aakrati Mehta Adhvaryu
Director of CyberSecurity Identity and Access Management
Suresh Chawdhary
Sr. Director Information Security & Risk Management



read more »

« show less


1:00pm-1:25pm

Keynote Presenter: “Why legacy MFA is not good enough for modern auth requirements

Patrick McBride
CMO



read more »

On top of new and existing regulatory requirements, the massive uptick in ransomware and other attacks that feed off of stolen credentials have prompted cyber insurers to mandate widespread adoption of MFA as a requirement for renewal. But not all MFA is created equal.

Long-standing MFA pain points such as user friction, complexity and cost are still notable obstacles to MFA adoption. But in a surprising change, the US Government and others are warning companies about the major vulnerability with “phishable” MFA. Join us for an insightful discussion on requirements for modern MFA and how you can build a trusted authentication architecture that includes both the ‘who’ you as well as ‘what’ device employees logging in from. We will also explore how this is a key building block for zero trust.

Discussion points:

  • How does passwordless and MFA fit in?
  • Can organizations avoid the “transitive trust” pitfall with new authentication models?
  • What are the issues with existing, “legacy” MFA solutions and how can they be overcome?
  • What does an ideal solution look like?
  • What are some of the barriers to implementing stronger authentication?
  • What path(s) are advanced organizations are taking to adopt strong authentication that can underpin their zero trust initiatives.

« show less


1:30pm-1:45pm

Fireside Chat: “Rise of Next-Generation Software Supply Chain Attacks

Maury Cupitt
VP



read more »

« show less


1:50pm-1:55pm

Senior Supporter: “What you need to know about protecting your APIs

Edward Roberts
VP of Marketing



read more »

« show less


2:00pm-2:25pm

Fireside Chat: “Security Observability – Are you ready for the next Log4J?

Dana Gardner
Director, Product Evangelist
Sanjay Nagaraj
Co-Founder & CTO



read more »

« show less


2:30pm-2:45pm

Disrupter Presenter: “Empowering your Organization to Prevent ATO Attacks and Ultimately Boost Revenue

Carl Mosby
Manager, Solutions Engineering



read more »

« show less


2:50pm-3:30pm

CXO Panel: “Ransomware: How to Reduce Your Likelihood of Being a Victim”

Cushman & Wakefield 
State of Arizona
Royal Caribbean Group 
 
Jacob Olcott
Vice President, Communications and Government Affairs
Erik Hart
CISO
Dan Wilkins
CISO
Terry Griffith
Director of Incident Response & Counter Threat Unit



read more »

Colonial Pipeline. JBS meat processor. Scripps Health. The list of recent high-profile ransomware victims is long and growing. So are the costs to recover from these crimes.

But what if you could take preventive steps to reduce your likelihood of becoming a ransomware victim? BitSight recently analyzed hundreds of ransomware incidents to identify common security performance gaps and challenges that lead to successful ransomware incidents. One finding: Poor patching performance is a strong indicator of increased risk to ransomware. In fact, organizations with less mature patching programs
are 7x more likely to experience a ransomware incident.

Register for this executive roundtable for new insights and discussion about:

  • Sector-specific insights tied to recent ransomware trends
  • Vulnerabilities that indicate heightened risk of ransomware
  • Programmatic areas to to reduce the likelihood of being a ransomware victim

« show less


* All Times In EST

Media Partners

Learn More About Our Partners

Got questions? We've got answers!

Why should I attend?

Your time is valuable and we make sure to make the most of it! We take the time to figure out your challenges and customize your experience to meet your needs. Our agendas are tailored to your feedback and we pride ourselves in covering the most cutting-edge content delivered by renowned industry experts. Look forward to building enduring partnerships and together we’ll go straight to the top.

Where is the event taking place?

The event is by invitation-only. The location will be released to all attendees once your registration has been confirmed. 

What is the dress code?

We recommend business attire. Most attendees wear suits or comparable attire. Ties are optional.

Can I bring a colleague with me?

Yes! We always urge our members to refer their colleagues! We love adding new members to the community, especially if they come highly recommended by a current member. Either have them reach out to your Apex POC or have them fill out the Member Registration Form.

What if I have dietary restrictions?

No problem! Please let your Apex POC know as soon as possible in order for us to work with the venue on providing alternate options for you at the event.

What if I want to speak at an assembly?

Apex is always looking for speakers that can contribute their valuable insight. If you would like to speak, please contact your Apex POC or fill out the Speaker Registration Form on the Assemblies page. Please keep in mind that we receive many inquiries for speaking and sessions are available on a first come first served basis. But no need to worry, we have plenty of opportunities available at future assemblies.

I plan on being in attendance, but what if something comes up and I have to cancel?

We understand that something may come up on your calendar! Before canceling with us, please know that we will have a separate room for attendees to step out for work-related activities (meetings, emails, conference calls, etc.). If you must cancel, we just ask that you let us know at least 48 hours in advance so that we can open up the waitlist for another member.

UPCOMING ASSEMBLIES

straight to the top
View All →

2022 CISO National Canada Virtual Panel January 20

CISO National Canada Virtual Panel

January 20, 2022

XDR and Zero Trust and What This Means For You

As the sophistication of cyberattacks evolves and the stakes continue to rise, cybersecurity teams face the same challenges they always have: discerning security data, detecting threats, orchestrating cyber response, and overcoming the cyber skills gap. Lately it seems that no one is too small to avoid notice from cyber attackers, and that the time to detect and shut down threats is ever narrowing. XDR and Zero Trust are new buzzwords, with vendors and analysts alike touting these as the way of the future for security operations – but what do they really mean, and what do these approaches and tools offer?

Join IBM Cybersecurity Architect Vivienne Suen as she breaks down the meaning of XDR and Zero Trust, the challenges facing security teams, and how to take advantage of emerging technologies and pragmatic new approaches.

Learn More...

IBM is the global leader in business transformation through an open hybrid cloud platform and AI, serving clients in more than 170 countries around the world. Today 47 of the Fortune 50 Companies rely on the IBM Cloud to run their business, and IBM Watson enterprise AI is hard at work in more than 20,000 engagements. IBM is also one of the world’s most vital corporate research organizations, with 27 consecutive years of patent leadership. Above all, guided by principles for trust and transparency and support for a more inclusive society, IBM is committed to being a responsible technology innovator and a force for good in the world. For more information about IBM visit: www.ibm.com.

Speakers Include...

Vivienne Suen
Cybersecurity Architect, CCSP
IBM Security

Nicolas Buache
CISO
University of Ottawa

Tracy Dallaire
Director Information Security
McMaster University

Fritz Jean Louis
Chief Information Security Officer (CISO)
The Globe And Mail

Khalid Walid Akawi
Director Technology Risk and Controls
Manulife

Speaker: Vivienne Suen, Cybersecurity Architect, CCSP, IBM Security

Read Bio »

Vivienne Suen is a cybersecurity architect with a passion for storytelling and over 15 years’ experience advising IBM customers on IT solutions and strategy. A featured speaker at numerous conferences and user groups, she thrives on demystifying the complexities of cybersecurity and designing practical solutions to meet clients’ security needs. As an unabashed technology optimist with a passion for music, Vivienne is a strong believer in nurturing diverse viewpoints, creating new connections, and a well-crafted analogy. She lives in Montreal with her husband and son.

« show less

Inquire About Membership
Inquire About Sponsorship

Invited Members Include...

Entrust

Register Here

Agenda


3:00pm-3:10pm (EST)

Opening Remarks & Executive Introductions


3:10pm-3:20pm (EST)

Host Introduction


3:20pm-4:00pm (EST)

CIO/CISO Panel Hosted by Sponsor


4:00pm-4:30pm (EST)

Executive Discussion

Title Representation

Industry Breakdown

Org. Size by Revenue

Got questions? We’ve got answers!

Why should I attend?

Your time is valuable and we make sure to make the most of it! We take the time to figure out your challenges and customize your experience to meet your needs. Our agendas are tailored to your feedback and we pride ourselves in covering the most cutting-edge content delivered by renowned industry experts. Look forward to building enduring partnerships and together we’ll go straight to the top.

Where is the event taking place?

The event is by invitation-only. The location will be released to all attendees once your registration has been confirmed. 

What is the dress code?

We recommend business attire. Most attendees wear suits or comparable attire. Ties are optional.

Can I bring a colleague with me?

Yes! We always urge our members to refer their colleagues! We love adding new members to the community, especially if they come highly recommended by a current member. Either have them reach out to your Apex POC or have them fill out the Member Registration Form.

What if I have dietary restrictions?

No problem! Please let your Apex POC know as soon as possible in order for us to work with the venue on providing alternate options for you at the event.

What if I want to speak at an assembly?

Apex is always looking for speakers that can contribute their valuable insight. If you would like to speak, please contact your Apex POC or fill out the Speaker Registration Form on the Assemblies page. Please keep in mind that we receive many inquiries for speaking and sessions are available on a first come first served basis. But no need to worry, we have plenty of opportunities available at future assemblies.

I plan on being in attendance, but what if something comes up and I have to cancel?

We understand that something may come up on your calendar! Before canceling with us, please know that we will have a separate room for attendees to step out for work-related activities (meetings, emails, conference calls, etc.). If you must cancel, we just ask that you let us know at least 48 hours in advance so that we can open up the waitlist for another member.

UPCOMING ASSEMBLIES

straight to the top
View All →

2022 CIO/ CISO National Virtual Panel January 20

CIO/ CISO National Virtual Panel

January 20, 2022

Reinventing Cyber Risk Quantification

Cyber risk is an inevitable part of doing business in today’s world. But when security leaders engage in conversations about cyber risk, they find themselves at a disadvantage. For many non-technical people, cyber risk is seen as complex and too often discussed in technical terms or through the lens of remediation plans for security incidents.

Cyber risk quantification enables organizations to translate cyber risk into financial terms so CISOs, CROs, and board members can make better risk management decisions. But traditional approaches to cyber risk quantification often lead to long, complex projects. As the demand for CRQ increases, organizations need access to automated methods that streamline and simplify the inefficiencies in traditional approaches. Reinventing cyber risk quantification enables organizations to adopt the appropriate level of CRQ based on their organization’s needs and maturity.

Join us for this executive roundtable discussion to explore cyber risk quantification in more detail.

In this session, we discuss:

  • How to choose the right CRQ approach for your organization
  • CRQ best practices and tips to get started today
  • Streamlining the process of quantifying cyber risk in financial terms
  • Operationalizing cyber risk quantification across your cybersecurity program
  • Communicating cyber risk in financial terms to your Board of Directors and other non-technical stakeholders
  • Building a business case for funding of cyber risk quantification

Key takeaways include:

  • Ideas to assist the development of a sound business case for the funding of cyber risk quantification
  • Tips and tricks about how to operationalize cyber risk quantification
  • Communication strategies to facilitate a universal understanding of cyber risk

Learn More...

BitSight transforms how organizations manage cyber risk. The BitSight Security Ratings Platform applies sophisticated algorithms, producing daily security ratings that range from 250 to 900, to help organizations manage their own security performance; mitigate third party risk; underwrite cyber insurance policies; conduct financial diligence; and assess aggregate risk. With over 2,100 global customers and the largest ecosystem of users and information, BitSight is the Standard in Security.

Speakers Include...

Vince Dasta
Head of Risk Delivery
BitSight

Michael Woodson
Director Information Security & Privacy
Sonesta Hotels

Anthony Foust
Global CISO
Belron International

Robert Sheesley
CIO
Wrench Group

Upendra Mardikar
Chief Security Officer
Snap Finance

Speaker: Vince Dasta, Head of Risk Delivery, BitSight

Read Bio »


« show less

Inquire About Membership
Inquire About Sponsorship

Invited Members Include...

Entrust

Register Here

Agenda


3:00pm-3:10pm (EST)

Opening Remarks & Executive Introductions


3:10pm-3:20pm (EST)

Host Introduction


3:20pm-4:00pm (EST)

CIO/CISO Panel Hosted by Sponsor


4:00pm-4:30pm (EST)

Executive Discussion

Title Representation

Industry Breakdown

Org. Size by Revenue

Got questions? We’ve got answers!

Why should I attend?

Your time is valuable and we make sure to make the most of it! We take the time to figure out your challenges and customize your experience to meet your needs. Our agendas are tailored to your feedback and we pride ourselves in covering the most cutting-edge content delivered by renowned industry experts. Look forward to building enduring partnerships and together we’ll go straight to the top.

Where is the event taking place?

The event is by invitation-only. The location will be released to all attendees once your registration has been confirmed. 

What is the dress code?

We recommend business attire. Most attendees wear suits or comparable attire. Ties are optional.

Can I bring a colleague with me?

Yes! We always urge our members to refer their colleagues! We love adding new members to the community, especially if they come highly recommended by a current member. Either have them reach out to your Apex POC or have them fill out the Member Registration Form.

What if I have dietary restrictions?

No problem! Please let your Apex POC know as soon as possible in order for us to work with the venue on providing alternate options for you at the event.

What if I want to speak at an assembly?

Apex is always looking for speakers that can contribute their valuable insight. If you would like to speak, please contact your Apex POC or fill out the Speaker Registration Form on the Assemblies page. Please keep in mind that we receive many inquiries for speaking and sessions are available on a first come first served basis. But no need to worry, we have plenty of opportunities available at future assemblies.

I plan on being in attendance, but what if something comes up and I have to cancel?

We understand that something may come up on your calendar! Before canceling with us, please know that we will have a separate room for attendees to step out for work-related activities (meetings, emails, conference calls, etc.). If you must cancel, we just ask that you let us know at least 48 hours in advance so that we can open up the waitlist for another member.

UPCOMING ASSEMBLIES

straight to the top
View All →