Boston CISO Virtual Executive Summit

November 18, 2020 | 8:00am - 1:15pm EST

November 18, 2020 | 8:00am - 1:15pm EST

Collaborate with your peers

Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the Boston CISO Virtual Executive Summit.

Join your peers to discuss the most critical issues impacting CISOs today:

The evolution of identity and access management

Strategies for a risk-aligned resilient organization

Reenergizing the CISO

Co-Chairs

Kevin Brown

Boston Scientific
Vice President & Chief Information Security Officer

Javed Ikbal

Bright Horizons
VP/CISO

Lawrence Jarvis

Iron Mountain Inc
SVP, Chief Information Security Officer

Lorna Koppel

Trustees of Tufts College
Director of Information Security/CISO

Holly Ridgeway

Citizens Financial Group
Chief Security Officer

Ravi Thatavarthy

BJ's Wholesale Club
VP & CISO

Marnie Wilking

Wayfair
Global Head of Security and IT Risk Management

Agenda


November 18, 2020

7:30am - 8:00am EST Virtual Summit Boardroom

Women's Coffee Networking Break

Your Co-Chairs are thrilled to keep with tradition and invite you to join them for some uplifting networking to kick off this year’s Virtual Executive Summit with the Women’s Coffee Break. Connection is a key component of leadership and we are delighted to create space for you all to bring each other to new heights and share how you’re leading with power and inspiring those around you.

8:00am - 8:45am EST Virtual Summit Keynote

Protecting People, the New Perimeter

Lucia Milica headshot

Lucia Milica

Global Resident CISO

Proofpoint

Robert Sherman headshot

Robert Sherman

Chief Information Security Officer & Vice President, Information Technology

American Tower Corp

Ravi Thatavarthy headshot

Ravi Thatavarthy

VP & CISO

BJ's Wholesale Club

As 2020 changes the way we live and work, cyber criminals are adapting as well. Join us as we examine the biggest challenges security leaders face, and why a people-centric approach to security is everyone’s biggest opportunity to stop attackers and protect their organization.

Join Lucia as she and a panel of CISOs discuss:

  • Why social engineering dominates among today’s cyber threat actors
  • How remote work and the move to the cloud has changed the nature of threats
  • The ways their organizations are building controls to better understand and protect people

8:45am - 9:00am EST Break

9:00am - 10:00am EST Virtual Summit Boardroom

Identity, Access and the Strategic Approach to Trust

Dave Lewis headshot

Dave Lewis

Global Advisory CISO

Duo Security

Bobbi Bookstaver headshot

Bobbi Bookstaver

Director of Information Security

Shawmut Design and Construction

Esmond Kane headshot

Esmond Kane

CISO

Steward Health Care System

As endpoints sprawl and users access systems from across the globe, the challenge of verifying identity has only become more complex. Yet each road block to verify identity is a speed bump in enterprise agility, requiring CISOs to address identity and access management from a strategic risk-management approach.

Join this session to learn:

  • Technologies that enable seamless identity management across platforms
  • How to right-size identity verification at your organization
  • The latest for zero-trust strategy, and where it makes sense

9:00am - 10:00am EST Virtual Summit Boardroom

The Changing Face of Insider Threat

Stephen Moore headshot

Stephen Moore

Chief Security Strategist

Exabeam

Adam Glick headshot

Adam Glick

VP, Chief Information Security Officer

Rocket

Joe Burgoyne headshot

Joe Burgoyne

Sr. Director, Cyber Security

GE Healthcare

As an organizational capability, insider threat management is changing - again. Firstly, the idea of context has changed the categories of insider threat, and secondly, insider threat programs now maturing – evolving into a more justifiable and friendly, trusted insider program.

Join this virtual boardroom to discuss:

  • The evolving landscape of insider threats and its challenges
  • The impact of changing behaviors, employee culture and workplace environment on insider risk
  •  Practical strategies for improving an insider risk management program

9:00am - 10:00am EST Virtual Summit Boardroom

Managing Third-Party Risk with First-Rate Partnership

Chris Poulin headshot

Chris Poulin

Deputy CTO & Director, Technology and Strategy

BitSight

Eric Jacobsen headshot

Eric Jacobsen

Executive Director of Information Security

Boston University

Justin Armstrong headshot

Justin Armstrong

Security Architect

MEDITECH

In an era of cloud computing, software-as-a-service and outsourcing, some CISOs have noted that it can feel like every other business process sits in the hands, and systems, of an outside vendor. The key is to bring those partners into lockstep with the organization’s security strategy, a challenge that is both technical and classically human.

Join this session to learn:

  • How CISOs are evaluating third-party risk across an ever-growing constellation of vendor services
  • How to get off on the right foot, and to maintain strong partnerships with third parties
  • Technologies that help manage third-party risk

9:00am - 10:00am EST Virtual Summit Boardroom

Bringing Cloud Back Down to Earth

Thomas Etheridge headshot

Thomas Etheridge

Senior Vice President Services

CrowdStrike

Marnie Wilking headshot

Marnie Wilking

Global Head of Security and IT Risk Management

Wayfair

Jon Fredrickson headshot

Jon Fredrickson

Information Security & Privacy Officer

Blue Cross & Blue Shield of Rhode Island

As the Global pandemic continues, CISOs are reshaping their digital security strategy to strength the enterprise posture against diverse adversary activity. CISOs face a constant tension between enterprise agility and enterprise security, and in today’s world, this dynamic often plays out in the context of protecting a holistic cloud environment. How can CISOs gain a centralized view over cloud security posture and workloads in order to protect against a sundry of new threat activity? 

Join this session to discuss:

  • Methodical approaches to securing cloud-based technologies, workloads and products
  • Approaches to various adversary and nuanced attacks
  • Ransomware readiness and breach prevention in a new landscape


10:00am - 10:45am EST Virtual Summit Keynote

Tomorrow’s Cyberthreats – Staying One Step Ahead

Israel Barak headshot

Israel Barak

CISO

Cybereason

Helen Negre headshot

Helen Negre

CISO of Americas

Siemens USA

Holly Ridgeway headshot

Holly Ridgeway

Chief Security Officer

Citizens Financial Group

At a time when customer trust is paramount and private data is precious, a major breach can be catastrophic for any organization. Effective security is an essential part of effective business strategy, yet security leaders face an ever-growing challenge to guide their enterprise through the evolving threat landscape.

Join this virtual keynote to explore:

  • Strategies for addressing the emerging threat landscape
  • The role today’s CISO plays in guiding business strategy to mitigate risk
  • Communication strategies for educating users about security – and holding them accountable

10:45am - 11:00am EST Break

11:00am - 12:00pm EST Virtual Summit Boardroom

Emerging Technologies – Embracing Change

Christopher Sicard headshot

Christopher Sicard

Consulting & Systems Integration Leader - Canada

IBM

Glenn Strickland headshot

Glenn Strickland

CISO

Boston Partners

Lorna Koppel headshot

Lorna Koppel

Director of Information Security/CISO

Trustees of Tufts College

From AI to quantum computing – innovative technologies can open the door to new solutions that can transform your business. However, they can also create clouds of confusion. How do you wade through the noise to discover what really works? How do you determine what is practical, scalable and secure?

In this session discover how:

  • You can introduce security earlier in the development process
  • To identify potential areas of risk regarding emerging technologies
  • You can effectively communicate with all areas of the business before, during and after the adoption process

By registering for this session, this serves as your authorization to Evanta or its vendor to provide your contact information to IBM to follow up on your interaction and participation. IBM’s use of your contact information is governed by the IBM Privacy Policy. If you need more information on how IBM is using your personal data you may refer to the IBM Privacy Statement. To withdraw your marketing consent and unsubscribe to receiving emails click on the unsubscribe button at this address: ibm.biz/marketingoptout.

11:00am - 12:00pm EST Virtual Summit Boardroom

Cloud IAM – Enlightenment or Inferno

Brian Johnson headshot

Brian Johnson

SVP, Cloud Security Practice

DivvyCloud

Deb Briggs headshot

Deb Briggs

CSO

Netscout

A strong IAM is one key to preventing data breaches and limiting the blast radius, should a security incident occur. But cloud IAM presents a new set of constructs for organizations to build and manage. Is this the most comprehensive identity and access control out there, or yet another layer of complexity added to your program?

In this session, you will discuss:

  • Why managing cloud IAM is so complex
  • The challenges cloud IAM creates for IT and cybersecurity professionals
  • How leading organizations are governing cloud IAM to reduce risk and the chance of a data breach

11:00am - 12:00pm EST Virtual Summit Boardroom

Security Analytics – Turning Signal Noise into Actionable Harmony

Augusto Barros headshot

Augusto Barros

VP of Solutions

Securonix

David Escalante headshot

David Escalante

Dir., Computer Policy & Sec.

Boston College

Tony Faria headshot

Tony Faria

Chief Information Security Officer

FM Global

There is no shortage of data available to the security function, but insights – the signals of a real threat that demands action — are a different story. CISOs who can derive meaningful findings from their environments can better detect threats with fewer resources — a difficult, ongoing challenge as organizations become increasingly digital and complex.

Join your peers to discuss:

  • How emerging technologies and evolving digital businesses are challenging security analytics
  • Best practices for monitoring user behavior and other dynamic risks
  • How to reduce the noise created by the growing number of threat detection technologies and data volume

12:00pm - 12:45pm EST Virtual Summit Keynote

The Convergence of Zero Trust and SASE

James Christiansen headshot

James Christiansen

VP, CSO Cloud Security Transformation

Netskope

David Christensen headshot

David Christensen

Director of Global Information Security Engineering and Operations

Wex

Organizations are feeling a shift in the world of networking and security as they rapidly adopt and embrace the cloud. On-premises private data centers are no longer the place for data and workloads to exist. With this shift, security and networking are brought closer than ever. Enterprises need speed, visibility, security and reliability without compromise. Enter, the secure access service edge, better known as SASE. It’s inevitable that SASE implementations and zero trust implementations need to collide to provide a more comprehensive security capability to truly support digital transformation. How can your organization best position itself for the transition?

In this session, you will discuss:

  • Problems SASE can address in the modern enterprise
  • Benefits of planning both SASE and zero trust implementations
  • Insights from organizations adopting SASE and zero trust today

12:45pm - 1:15pm EST Networking

Networking to Build Diverse Talent

Hear from ICMCP and your peers as they share actionable strategies to build a diverse cybersecurity workforce. Learn how you can support this non-profit and help tackle the “great cyber divide.” ICMCP mission is to achieve the consistent representation of women and minorities in the cybersecurity industry – it offers scholarships, diverse workforce development, and mentoring programs. Listen, learn, and join them if you want to help drive the mission. Then break for some fun and informal networking with your peers to wrap-up the day.

Your Community Partners


CISO Thought Leaders
Key Partners
Program Partner

Boston CISO Program Manager


For inquiries related to this event, please reach out to your dedicated program contact.

Rebecca Buchanan

Program Manager

971-717-6645

rebecca.buchanan@evanta.com