CISO Seattle Summit | Dec. 3, 2020 - PST | Virtual Summit - Real-time Online Conversations

agenda

PDF Download Agenda (PDF)

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Thursday, December 3, 2020 - CISO Seattle Summit

9:15 am - 9:30 am

Welcome Registration & Opening Remarks

 

9:30 am - 10:10 am

Keynote Panel

Steering Cultural Change

An IT executive's role, goals and objectives have drastically changed over the years. Most leaders supervise teams and units beyond their IT department. Due to these changes in responsibilities, their success is measured in greater business metrics. As a result, these roles have become both more attractive and more demanding.  

Takeaways: 

  • What are the significant changes regarding the role of the IT Executive 
  • How to keep up with the changing requirements 
  • How to properly measure an IT executive's success
 

10:10 am - 10:40 am

Share:

Keynote Presentation

Open Security - from patchwork to platform

As organizations adopt new technologies and utilize the cloud for business innovation and growth, security teams are challenged with ensuring that those initiatives and missions are successful. They are faced with creating an effective security program from a fragmented patchwork of solutions and data sources that do not easily interoperate without a great deal of custom development and integration. To help address this industry wide problem, IBM joined forces with 25 other cybersecurity vendors - including McAfee and Crowdstrike - to form the Open Cybersecurity Alliance (OCA) to promote open and interoperable cybersecurity. OCA members subscribe to the mantra of "Integrate Once, Reuse Everywhere" to enable security teams to focus on solving security issues rather than getting tools to work together. Join IBM Security's Patrick Vowles, Team Lead North America Marketing to hear how the OCA members are working together and contributing foundational technologies under the open-source Apache 2.0 license to enable security solutions to communicate with each other over a standard fabric during the entire threat management life cycle.

Sponsored by:

IBM View details

 
 

Presented by:

Carolina Howland, Security Field Marketing Manager, IBM

 
 

10:40 am - 11:00 am

Executive Exchange

 

Think Tank

Bring Your Own . . . Enhancement

Over the next 5 years, it's forecasted that roughly 30% of enterprises will augment BYOD policies to include ?bring your own enhancement? (BYOE) to add focus to augmented staff members. It will be tempting for IT to try and regulate or control human augmentation technology, but the real focus should be to exploit the employee's interest in BYOE to advance the business. We are seeing manufacturing companies currently using wearables to promote worker safety, and companies in both travel and healthcare industries are using these devices to boost productivity. With these technologies constantly evolving, organizations should contemplate how these enhancements can be leveraged in both the personal and professional lives of the workforce. 

Takeaways: 

  • Impactful examples of BYOE Technology  
  • Strategies to encourage employees to use AI 
  • Critical considerations for IT's need to regulate Augmented Technology

Think Tank

The Elephant in the Room, Data Breaches

In 2019, data breaches endured yet again as the largest security threat noted by organizations and IT security professionals alike. If data remains as a high valued commodity, ensuring data privacy and securing personal data will continue to be at the top of the list of an organization's concerns. The increases in privacy legislation, such as GDPR and CCPA, and the understanding of the ramifications stemming from a breach have allowed these concerns to remain heavily in the spotlight. Web application flaws have been identified as the top cause of data breaches. As such, establishing and maintaining web application security has developed into a high priority for all organizations. 

Takeaways: 

  • Data breaches are the biggest security concern 
  • Data continues to be a high value asset but the need to protect it is even higher
  • New laws like GDPR and CCPA enforce consequences for failing to secure data

 

11:00 am - 11:20 am

Executive Exchange

 

Thought Leadership

Hacking Exposed

Brian Robison has over 20 years of cybersecurity experience. As Chief Evangelist at BlackBerry, he is focused on educating and inspiring the world. During this Hacking Exposed session, Brian will reveal the tools and techniques of real-world threat actors and explain why preventing cybersecurity threats is actually possible and a much better approach than detecting and responding after the attack.

Sponsored by:

BlackBerry View details

 
 

Presented by:

Brian Robison, Chief Evangelist, BlackBerry

 
 

11:20 am - 11:40 am

Executive Exchange

 

Share:

Thought Leadership

You Need to Know Who Is Accessing Your Data, But Do You Really?

Knowing who is accessing what data is at the heart of security. Today, users and attackers get to your data through a mesh of web applications, APIs, and microservices. Unfortunately, your database logs only report the querying source as an authorized intermediary application without the originating requestor's information. This blind spot causes glaring gaps during audits, slows incident response, and impede breach detection. 

Learn how to apply new ways of continuously linking originating users' information to every database access with cohesive interworking between edge WAF, server RASP, and Data Activity Monitoring tools.

Sponsored by:

Imperva View details

 
 

Presented by:

Jose Gomez, Sales Engineering Manager, Imperva

 
 

11:40 am - 12:00 pm

Executive Boardroom

Continuous Vulnerability Management and Zero Trust provide a one two combo vs Ransomware

Modern ransomware has dominated the headlines in 2020 and cast fear into the hearts of many organizations. While it feels like ransomware is winning the war there is still hope for a future where ransomware is just another threat to be managed. Hear from Chris Goettl, about how Zero Trust and Continuous Vulnerability Management can dramatically reduce the threat that modern ransomware poses.

Sponsored by:

Ivanti View details

 
 

Presented by:

Chris Goettl, Senior Director, Product Management, Ivanti

 

Executive Boardroom

Enabling Self-Healing Endpoints in a Work From Home World

As more people work from home and anxiety mounts, expect cyberattacks of all sorts to take advantage. If you were asked to continuously patch all of your endpoints across your enterprise, how many tools would you need and how would you handle those endpoints that are off the corporate network? These issues can be handled smoothly with:  

  • The right tools  
  • The right processes 
  • An automated, self-healing endpoint environment 

Join this webinar to learn how to quickly shift endpoints to remote workers, speed processes, and an automated, self-healing endpoint environment.

Sponsored by:

HCL BigFix View details

 
 

Presented by:

Dennis Stimpson, Western US Product Specialist Director, HCL BigFix

 
 

12:00 pm - 12:20 pm

Executive Exchange

 

Think Tank

Keeping Pace with Innovation, Chronologically and Economically

Today's digital evolution will take major enterprises twice as long and cost twice as much as initially anticipated. Companies will struggle with digital innovation as they realize the associated challenges, and the true cost of modernization. As such, leaders in smaller and more agile organizations have a great opportunity to be first to market, while those in larger organizations suffer through uninspiring, and potentially career limiting, short term results. 

Takeaways: 

  • How to deal with the fact that digital innovation is not cheap or quick 
  • Strategies for success in implementation planning 
  • Lessons learned from smaller organizations, where they have an easier time testing out new technology
 

12:20 pm - 12:40 pm

Executive Exchange

 

Thought Leadership

Zero Trust in the Real World: A Practical First Step

Zero Trust is a security strategy and framework based on the concept that you must never trust, always verify. Learn practical ways to implement Zero Trust with confidence. Align to Forrester's framework for Zero Trust and minimize your attack surface, improve visibility, reduce complexity and cost, and strengthen your overall security to protect your business from data loss and cyber breaches.

Sponsored by:

Illumio, Inc. View details

 
 

Presented by:

Sam Rastogi, Product Marketing Director, Illumio, Inc.

 
 

12:40 pm - 1:00 pm

Executive Exchange

 

Executive Boardroom

Modern IT Operations to enable Digital Transformation

Time to value for any Digital Transformation effort is greatly enhanced by modernizing IT Operations. This modernization has to happen regardless of where the infrastructure is hosted: private/on-premises, hybrid, public cloud, and/or multi-cloud. We will discuss how to build an operational model that supports the developer led requirements as well as provide the necessary controls and measures expected of a well run IT organization.n

Sponsored by:

Insight Cloud + Data Center Transformation View details

 
 

Presented by:

Jeff Bozic, Principal Architect, Insight Cloud + Data Center Transformation

 

Executive Boardroom

What is Vendor Account Compromise and How to Stop It

Session content coming

Sponsored by:

Abnormal Security View details

 
 

Presented by:

Roman Tobe, Sr. Product Marketing Manager, Abnormal Security

 
 

1:00 pm - 1:10 pm

Closing Remarks

Closing Remarks