VIRTUAL

Atlanta CISO Virtual Executive Summit

November 17, 2020 | 8:00am - 1:15pm EST

November 17, 2020 | 8:00am - 1:15pm EST

Collaborate with your peers

Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the Atlanta CISO Virtual Executive Summit.

Join your peers to discuss the most critical issues impacting CISOs today:

Strategies for a risk-aligned, resilient organization

Developing and investing in the security workforce of tomorrow

Creating business value and supporting agile business operations

Governing Body Co-Chairs

Derek Benz

Coca-Cola Company
Chief Information Security Officer

Tim Callahan

Aflac
Global Chief Security Officer

Joe DiBiase

Interface
Director, Global IS

John Dickson

Republic National Distributing Company
VP, IT Infrastructure & Cybersecurity

David Levine

Ricoh Americas
VP, Information Security & CISO

Dean Mallis

Marta
CISO

Dan Webber

UST Global
VP Technology

Deborah Wheeler

Delta Air Lines
Chief Information Security Officer

Agenda


November 17, 2020

8:00am - 8:45am  EST Virtual Summit Keynote

Defending Your Data in a Remote Working World

Lucia Milica headshot

Lucia Milica

Global Resident CISO

Proofpoint

David Levine headshot

David Levine

VP, Information Security & CISO

Ricoh Americas

Dean Mallis headshot

Dean Mallis

CISO

Marta

It’s one of the oldest maxims in cybersecurity – you can’t protect what you can’t see. And with organizations shifting to remote work and the traditional enterprise network going dark in more ways than one, new thinking is required to protect the data that matters to your organization. After all, data doesn’t just leave on its own – a compromised account, malicious insider, or simply negligent user is almost always involved.

Join this session to learn:

  • How to adapt your security architecture to give you visibility in a remote work and cloud-oriented landscape
  • The ways in which remote work and the move to the cloud has changed the nature of threats to data
  • Approaches to better detect and respond to risky user actions with sensitive data

9:00am - 10:00am  EST Virtual Summit Boardroom

The Changing Face of Insider Threat

Mat Mathews headshot

Mat Mathews

VP of Information Technology

Boys & Girls Clubs of America

Stephen Moore headshot

Stephen Moore

Chief Security Strategist

Exabeam

Robert Alldread headshot

Robert Alldread

Director – Global Security

Manhattan Associates

As an organizational capability, insider threat management is changing - again. Firstly, the idea of context has changed the categories of insider threat, and secondly insider threat programs now maturing – evolving into a more justifiable and friendly trusted insider program.

Join this virtual boardroom to discuss:

  • The evolving landscape of insider threats and its challenges
  • The impact of changing behaviors, employee culture and workplace environment on insider risk
  • Practical strategies for improving an insider risk management program.

9:00am - 10:00am  EST Virtual Summit Boardroom

Emerging Technologies — Embracing Change

Dan Webber headshot

Dan Webber

VP Technology

UST Global

Armghan Malik headshot

Armghan Malik

CISO

Altium

Christopher Sicard headshot

Christopher Sicard

Consulting & Systems Integration Leader - Canada

IBM

From AI to quantum computing – innovative technologies can open the door to new solutions that can transform your business. However, they can also create clouds of confusion. How do you wade through the noise to discover what really works? How do you determine what is practical, scalable and secure?

In this session discover how:

  • You can introduce security earlier in the development process
  • To identify potential areas of risk regarding emerging technologies
  • You can effectively communicate with all areas of the business before, during and after the adoption process

By registering for this session, this serves as your authorization to Evanta or its vendor to provide your contact information to IBM to follow up on your interaction and participation. IBM’s use of your contact information is governed by the IBM Privacy Policy. If you need more information on how IBM is using your personal data you may refer to the IBM Privacy Statement. To withdraw your marketing consent and unsubscribe to receiving emails click on the unsubscribe button at this address: ibm.biz/marketingoptout.

10:00am - 10:45am  EST Virtual Summit Keynote

The Convergence of Zero Trust and SASE

Jason Clark headshot

Jason Clark

Chief Strategy Officer

Netskope

Dustin Wilcox headshot

Dustin Wilcox

CISO

Anthem

Organizations are feeling a shift in the world of networking and security as they rapidly adopt and embrace the cloud. On-premises private data centers are no longer the place for data and workloads to exist. With this shift, security and networking are brought closer than ever. Enterprises need speed, visibility, security and reliability without compromise. Enter, the secure access service edge, better known as SASE. It's inevitable that SASE implementations and zero trust implementations need to collide to provide a more comprehensive security capability to truly support digital transformation. How can your organization best position itself for the transition?

In this session, you will discuss:

  • Problems SASE can address in the modern enterprise
  • Benefits of planning both SASE and zero trust implementations
  • Insights from organizations adopting SASE and zero trust today

8:45am - 9:00am  EST Break

10:45am - 11:00am  EST Break

9:00am - 10:00am  EST Virtual Summit Boardroom

The New Language of Risk

David Levine headshot

David Levine

VP, Information Security & CISO

Ricoh Americas

Evan Tegethoff headshot

Evan Tegethoff

VP of Consulting Engineering

BitSight

John Gift headshot

John Gift

VP & CISO

WestRock

From front-line employees to top-level directors, CISO must be able to communicate cyber risk in a way that compels others to act. What metrics, measures, methods and messages resonate in today’s risk environment?

Join your peers in this virtual boardroom to discuss:

  • How organizations are assessing cybersecurity and risk
  • Metrics that matter
  • Tips for improving cybersecurity programs using these metrics

9:00am - 10:00am  EST Virtual Summit Boardroom

Using Identity for Intelligent Defense to Enable the Remote Workforce

James Edgar headshot

James Edgar

SVP & Global CISO

FleetCor Technologies

Tim Mullen headshot

Tim Mullen

VP, Information Security

Change Healthcare

Kemper Seay headshot

Kemper Seay

VP Infrastructure & Chief Information Security Officer

Carter's

Frank Briguglio headshot

Frank Briguglio

Global Public Sector Identity Governance Strategist

SailPoint Technologies Holdings Inc

For many organizations in the coronavirus era, work would grind to a halt without the ability for employees to remotely access critical systems and information. With business’s survival on the line, many CISOs must set a strategy that securely enables this explosion of digital work.

Join this virtual roundtable as we discuss:

  • Best approaches to the secure delivery of access and automated governance controls
  • Establishing complete 360-degree visibility and governance across all privileged and non-privileged accounts
  • Eliminating over-entitled users, and identifying high-risk profile identities violating access policies

11:00am - 12:00pm  EST Virtual Summit Boardroom

Redefining the Role of Asset Management in Cybersecurity

Lenny Zeltser headshot

Lenny Zeltser

CISO

Axonius

James Baird headshot

James Baird

CISO

International Market Centers

Tim Callahan headshot

Tim Callahan

Global Chief Security Officer

Aflac

Mike Whitt headshot

Mike Whitt

EVP & CISO

IBERIABANK

The line between IT and security is blurring. Seemingly overnight, a foundational understanding of what devices, users, and cloud instances exist has jumped in priority for CISOs.
Join this roundtable discussion around:

  • Why so many security frameworks consider asset management to be foundational
  • What approaches to asset management work and don't work in today's enterprise environments
  • Why the asset management problem hasn’t been solved yet — and what to do about it

12:00pm - 12:45pm  EST Virtual Summit Keynote

Tomorrow’s Cyberthreats – Staying One Step Ahead

Israel Barak headshot

Israel Barak

CISO

Cybereason

David Nagel headshot

David Nagel

CISO

Genuine Parts

At a time when customer trust is paramount and private data is precious, a major breach can be catastrophic for any organization. Effective security is an essential part of effective business strategy, yet security leaders face an ever-growing challenge to guide their enterprise through the evolving threat landscape.

Join this virtual keynote to explore:

  • Strategies for addressing the emerging threat landscape
  • The role today’s CISO plays in guiding business strategy to mitigate risk
  • Communication strategies for educating users about security – and holding them accountable

12:45pm - 1:15pm  EST Networking

Community Discussion - Networking to Build Diverse Talent

An informal and interactive opportunity for you to network with peers in small groups. 

Join this informative networking break to hear from ICMCP and your peers as they share practical and actionable strategies to build diverse pipelines for cybersecurity. Learn how you can tackle the “great cyber divide” with scholarship opportunities, diverse workforce development, innovative outreach, and mentoring programs. Then break for some fun and informal networking with your peers to wrap-up the day.

11:00am - 12:00pm  EST Virtual Summit Boardroom

Cloud IAM — Enlightenment or Inferno

David Nolan headshot

David Nolan

Director Information Security

Aaron's

Katie Ewers headshot

Katie Ewers

Director, Cybersecurity Active Defense, Alpharetta iSOC

McKesson Corporation

Peter Scott headshot

Peter Scott

VP of Products, Cloud Security

DivvyCloud

A strong IAM is one key to preventing data breaches and limiting the blast radius, should a security incident occur. But cloud IAM presents a new set of constructs for organizations to build and manage. Is this the most comprehensive identity and access control out there, or yet another layer of complexity added to your program? 

In this session, you will discuss: 

  • Why managing cloud IAM is so complex 
  • The challenges cloud IAM creates for IT and cybersecurity professionals
  • How leading organizations are governing cloud IAM to reduce risk and the chance of a data breach

11:00am - 12:00pm  EST Virtual Boardroom

Navigating the Application and Network Threat Landscape

Armghan Malik headshot

Armghan Malik

CISO

Altium

Elias Nyankojo headshot

Elias Nyankojo

Global Information Security and IT Compliance Leader

Avanos

Vivek Patel headshot

Vivek Patel

VP of Technical Services

Radware

Organizations are increasingly operating in an agile digital model where data flows seamlessly between on-premise networks, applications and cloud services. Yet that coherent user experience masks a complex attack surface, where security leaders must tackle a spectrum of vulnerabilities while preserving agile business operations. 

Join this session to discuss:

  • The latest threat landscape for networks and applications
  • How CISOs are navigating the balance of business agility and security controls 
  • Best practices for monitoring threats across complex networks

November 17, 2020

Your Community Partners


CISO Thought Leaders
Key Partners
Program Partners

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Zack Hellmann

Program Manager

971-717-6691

zack.hellmann@evanta.com