CISO Digital Transformation Summit | Nov. 17, 2020 CST | Virtual Summit - Real-time Online Conversations
IBM
Zero Trust: Optimizing Business with a Modern Approach to Security
Jason Keenaghan
Zero Trust Strategy Leader
IBM
IBM
Zero Trust: Optimizing Business with a Modern Approach to Security
Aarti Borkar
Vice President, Offering Management
IBM
Mimecast
Perimeter and Beyond... A Pervasive versus Perimeter based approach to Email
Dino DiMarino
Chief Revenue Officer
Mimecast
How Self-Compliant Endpoints Can Automate Security and Simplify Your Toolset
Dan Wolff
Director of Products, HCL BigFix
HCL BigFix
Concentric AI
Zero Trust And Data Security: Artificial Intelligence Meets Denise In Accounting
Karthik Krishnan
CEO and Founder
Concentric AI
Beyond "Workplace": Thriving in a Boundless World with a Distributed Workforce
Robert DeVito
Global Director, Chrome Customer & Partner Sales Engineering
Integrative Approaches to Coaching and Innovation
Sarah Richardson
VP IT Change Leadership
Optum
Trust in Technology: Embracing Digital Convergence Through Open Standards
Melanie Nuce
Senior Vice President of Corporate Development
GS1 US
The Elephant in the Room, Data Breaches
Garrett Smiley
CISO
Serco
Balance Your Protection by Planning Left and Right of Boom
Jack Danahy
SVP for Strategy and Chief Evangelist
Alert Logic
Finally, Getting the Recognition That's Deserved!
Troy Wilkinson
CISO
Interpublic Group of Companies
Fossil Group, Inc.
Securing the Human Factor
Marty Ray
Chief Information Security Officer
Fossil Group, Inc.
Raytheon
Information Security Office & Information Systems Office "Finding Common Ground"
Lisa Lafleur
BISO, VP Cyber DevOps
Raytheon
Data Encryption, Bulking up!
Chris White
Deputy Chief Information Security Officer
Interpublic Group of Companies
Microsoft Corporation
AI: Friend or Foe?
Gunter Ollmann
CSO (Cloud and AI Division)
Microsoft Corporation
Automating Cybersecurity
Christopher Leigh
Chief Information Security Officer
Eversource Energy
Hyper-personalization: Using AI to Drive the Bottom Line
Max Chan
Chief Information Officer
Avnet
Target
Going Mobile, Securely
Brenda Bjerke
Senior Director, Information Risk Management
Target
Your Old Sh** Doesn't Work Anymore
Scot Miller
Chief Information Security Officer
Mr. Cooper
Cerner
Combating the Rise in Cloud-based Threats
Don Kleoppel
Chief Security Officer
Cerner
Finding Kimo
Jim Motes
Chief Information Security Officer
GameStop
Supply and Demand: Closing the Growing Gap in Cybersecurity Skills
Mark Cwynar
Vice President, Corporate Security
Republic Services
Still Using Passwords? Forget That Sh*t.
Sharon Vardi
Chief Marketing Officer
Trusona, Inc.
Defense in Diversification: Improving cybersecurity through smart consolidation
Corey Bodzin
Head of Product
Extrahop Networks Inc
Abnormal Security
Is AI the future of Email Security?
Ken Liao
VP of Cybersecurity Strategy
Abnormal Security
Keeping ALL Endpoints Continuously Patched and Compliant - Quickly and Cost Effectively
Mark Phinick
VP, BigFix Product Specialists
HCL BigFix
Protect Your Keys or Don't Waste Your Time Encrypting Your Data
Brad Beutlich
Vice President of Sales Western Region and LATAM
nCipher
Mobile-centric Zero Trust Security Framework
Jay Bhansali
Sr. Director Product Marketing
MobileIron
3 Best Practices for Application Security (and Bonus Tip)
Jose Gomez
Sales Engineering Manager
Imperva
Making Your Way Through the Fog of Cloud Computing in a Secure Path
Jim Cordovana
SVP, Cloud Security Enterprise Architect at Truist
SunTrust Bank
The Boeing Company
Where is the Top Talent?
Edmund Jones
Information Security Officer (ISO)
The Boeing Company
The
Dave Hudson
Chief Information Officer
Insight Global
Regulations Mean Change
Michael Owens
Business Information Security Officer
Equifax
All Eyes on You
Kurt Lieber
Group CISO North America
AETNA
Job Number 1: Top Talent -Finding, Acquiring, Developing, Promoting, and Retaining Great Technologists
Kevin Morrison
CISO
Pulte Group
Job Number 1: Top Talent -Finding, Acquiring, Developing, Promoting, and Retaining Great Technologists
Jodi Watkins
Chief Commercial Officer
GTN Technical Staffing & Consulting
Machine Learning Is Here to Help, Not Replace
Paul Hamman
SVP, Head of Cloud Security
SunTrust Bank
Regulations Mean Change
Anthony Gonzalez
Divisional Chief Information Security Officer
QBE Insurance
CISO: The Cultural Security Information Officer
Grant Sewell
CISO
Scotts Miracle-Gro Company
International Business Machines Corporation
Leveraging AI to Fuel the Future
Shamla Naidoo
Managing Partner Global Information Security
International Business Machines Corporation
Becoming More Decentralized
Chirag Arora
CISO
Crum & Forster
Managing Your Own Career
Mark Gelhardt
SVP Global Technology Governance
US Bank
CISO: The Cultural Security Information Officer
David Levine
Vice President, Corporate Information Security & Chief Security Officer
Ricoh Americas Corporation
KnowBe4, Inc
The Biggest Computer Defense Mistakes & How to Fix Them
Roger Grimes
Data Driven Defense Evangelist
KnowBe4, Inc
How Analytics Disrupted the NPM Market & What's Next
Jeff Costlow
Deputy CISO
Extrahop Networks Inc
Illumio, Inc.
The Bad Habits we Bring to the Cloud
Jeff Francis
Consulting Systems Engineer
Illumio, Inc.
Something old, something new: 2018 attack overview
Tim Amey
Solution Engineering
Cybereason
Securing the Human Factor
David Nagel
CISO
Genuine Parts Company
Zero Trust Privilege for the Modern Threatscape
Tony Goulding
Cyber Security Evangelist
Centrify
Preventing Unknown Cyberattacks Instantaneously & Effortlessly
Arthur Braunstein
VP US Sales
Morphisec Inc.
Preventing Unknown Cyberattacks Instantaneously & Effortlessly
Chuck Markarian
Chief Information Security Officer
PACCAR
Securing the Human Factor
James Robinson
Deputy CISO
Netskope
Identity and the New Age of Enterprise Security
Ben Smith
Field Chief Technology Officer (Field CTO - US)
RSA
The Future of Authentication: Customizable, Frictionless & Secure
Will Summerlin
Founder and CEO
Pinn
The Connected Worker & the Enterprise of Things
Todd Berger
Senior Director, Technical Solutions
BlackBerry
Which "Friends" Do I Trust? Realities of 3rd Party Risk
Alex Wood
CISO
Pulte Group
Knowing Your Network: Tracking Your Assets in the Age of Machine-Speed Attacks
Marshall Kuypers
Director of Cyber Risk
Expanse
Watching the Watchers: What Happens When Your Security Provider Compromises Your Network?
Mark Sangster
Vice President, Strategic Marketing
eSentire
The Evolution of Cyber Crime - A New Approach to Risk is Critical
Colin McKinty
VP of Cyber Security Strategy, Americas
BAE Systems Applied Intelligence
Security's Place in Enterprise Risk Management
Allison Miller
CISO
UnitedHealth Group
Navigating Security and Risk In a Changing IT Landscape
Dennis Spalding
CISO
Insight Enterprises
AI and ML: Using Emerging Technologies to Reinforce Security Defense Efforts
Paul Black
VP Cyber Security Operations
McKesson
Securing the Human Factor
Jamie Neumaier
CISO
Erie Insurance Group
Designing a Digital Workplace: Balancing Security with Effectiveness
Mark Van Holsbeck
Chief Information Security Officer and IT Risk & Security
Avery Dennison
Securing the Human Factor
Joel Lowe
CISO
Sonic Automotive
The Next Phase of Digital Transformation
Paige Adams
CISO Group
Zurich Insurance Group
Securing the Human Factor
Jim Kastle
CISO
Conagra Brands
Which Third Parties Should We Trust?
Adolph Barclift
CISO
NCR Corporation
Say Goodbye to Vulnerability Backlogs: Using RASP to Reclaim Control and Reduce Risk
Kunal Anand
CTO
Imperva
The Road to Digital Transformation: Getting There While Avoiding the Potholes
Keith Fuentes
Vice President, Knox Services
Samsung
Next Generation (Third Party) Security
Thien La
CISO
Wellmark Blue Cross Blue Shield
Aligning the Governance Clutter: A More Holistic View?
Richard Kessler
Executive Director, Cyber Security Strategy & Governance
KPMG
Which "Friends" Do I Trust? Realities of 3rd Party Risk
Jonathan Hale
CISO
Veolia North America
Making Your Way Through the Fog of Cloud Computing in a Secure Path
Gram Ludlow
Vice President of Information Security
Marriott Vacations Worldwide Corporation
CIOs/CISOs as the Consummate Communicator
Myrna Soto
Partner
Comcast Corporation
The CISO Digital Transformation Summit is a chance to network, learn and engage with your peers on key industry concerns. Take some time out of the office to discuss and tackle the big issues currently affecting your company.
If you are interested in speaking at the summit Heed our Call for Speakers to submit your proposed session topic!
For more information about the CISO Digital Transformation Summit contact marketing@cdmmedia.com