Boston CISO Virtual Executive Summit
November 18, 2020 | 8:00am - 1:15pm EST
November 18, 2020 | 8:00am - 1:15pm EST
Collaborate with your peers
Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the Boston CISO Virtual Executive Summit.
Join your peers to discuss the most critical issues impacting CISOs today:
The evolution of identity and access management
Strategies for a risk-aligned resilient organization
Reenergizing the CISO
Governing Body Co-Chairs
Kevin Brown
Boston Scientific
Vice President & Chief Information Security Officer
Javed Ikbal
Bright Horizons
VP/CISO
Lawrence Jarvis
Iron Mountain Inc
SVP, Chief Information Security Officer
Holly Ridgeway
Citizens Financial Group
Chief Security Officer
Ravi Thatavarthy
BJ's Wholesale Club
VP & CISO
Agenda
November 18, 2020
11:00am - 12:00pm EST Virtual Summit Boardroom
Emerging Technologies – Embracing Change
Hosted by IBM
Christopher Sicard
Consulting & Systems Integration Leader - Canada
IBM
Glenn Strickland
CISO
Boston Partners
Lorna Koppel
Director of Information Security/CISO
Trustees of Tufts College
From AI to quantum computing – innovative technologies can open the door to new solutions that can transform your business. However, they can also create clouds of confusion. How do you wade through the noise to discover what really works? How do you determine what is practical, scalable and secure?
In this session discover how:
- You can introduce security earlier in the development process
- To identify potential areas of risk regarding emerging technologies
- You can effectively communicate with all areas of the business before, during and after the adoption process
By registering for this session, this serves as your authorization to Evanta or its vendor to provide your contact information to IBM to follow up on your interaction and participation. IBM’s use of your contact information is governed by the IBM Privacy Policy. If you need more information on how IBM is using your personal data you may refer to the IBM Privacy Statement. To withdraw your marketing consent and unsubscribe to receiving emails click on the unsubscribe button at this address: ibm.biz/marketingoptout.
11:00am - 12:00pm EST Virtual Summit Boardroom
Cloud IAM – Enlightenment or Inferno
Hosted by DivvyCloud by Rapid 7
Brian Johnson
SVP, Cloud Security Practice
DivvyCloud
Deb Briggs
CSO
Netscout
A strong IAM is one key to preventing data breaches and limiting the blast radius, should a security incident occur. But cloud IAM presents a new set of constructs for organizations to build and manage. Is this the most comprehensive identity and access control out there, or yet another layer of complexity added to your program?
In this session, you will discuss:
- Why managing cloud IAM is so complex
- The challenges cloud IAM creates for IT and cybersecurity professionals
- How leading organizations are governing cloud IAM to reduce risk and the chance of a data breach
11:00am - 12:00pm EST Virtual Summit Boardroom
Security Analytics – Turning Signal Noise into Actionable Harmony
Hosted by Securonix
Augusto Barros
VP of Solutions
Securonix
David Escalante
Dir., Computer Policy & Sec.
Boston College
Tony Faria
Chief Information Security Officer
FM Global
There is no shortage of data available to the security function, but insights – the signals of a real threat that demands action — are a different story. CISOs who can derive meaningful findings from their environments can better detect threats with fewer resources — a difficult, ongoing challenge as organizations become increasingly digital and complex.
Join your peers to discuss:
- How emerging technologies and evolving digital businesses are challenging security analytics
- Best practices for monitoring user behavior and other dynamic risks
- How to reduce the noise created by the growing number of threat detection technologies and data volume
12:00pm - 12:45pm EST Virtual Summit Keynote
The Convergence of Zero Trust and SASE
Hosted by Netskope
James Christiansen
VP, CSO Cloud Security Transformation
Netskope
David Christensen
Director of Global Information Security Engineering and Operations
Wex
Organizations are feeling a shift in the world of networking and security as they rapidly adopt and embrace the cloud. On-premises private data centers are no longer the place for data and workloads to exist. With this shift, security and networking are brought closer than ever. Enterprises need speed, visibility, security and reliability without compromise. Enter, the secure access service edge, better known as SASE. It’s inevitable that SASE implementations and zero trust implementations need to collide to provide a more comprehensive security capability to truly support digital transformation. How can your organization best position itself for the transition?
In this session, you will discuss:
- Problems SASE can address in the modern enterprise
- Benefits of planning both SASE and zero trust implementations
- Insights from organizations adopting SASE and zero trust today
12:45pm - 1:15pm EST Networking
Networking to Build Diverse Talent
Hear from ICMCP and your peers as they share actionable strategies to build a diverse cybersecurity workforce. Learn how you can support this non-profit and help tackle the “great cyber divide.” ICMCP mission is to achieve the consistent representation of women and minorities in the cybersecurity industry – it offers scholarships, diverse workforce development, and mentoring programs. Listen, learn, and join them if you want to help drive the mission. Then break for some fun and informal networking with your peers to wrap-up the day.
7:30am - 8:00am EST Virtual Summit Boardroom
Women's Coffee Networking Break
Your Co-Chairs are thrilled to keep with tradition and invite you to join them for some uplifting networking to kick off this year’s Virtual Executive Summit with the Women’s Coffee Break. Connection is a key component of leadership and we are delighted to create space for you all to bring each other to new heights and share how you’re leading with power and inspiring those around you.
8:00am - 8:45am EST Virtual Summit Keynote
Protecting People, the New Perimeter
Hosted by Proofpoint
Lucia Milica
Global Resident CISO
Proofpoint
Robert Sherman
Chief Information Security Officer & Vice President, Information Technology
American Tower Corp
Ravi Thatavarthy
VP & CISO
BJ's Wholesale Club
As 2020 changes the way we live and work, cyber criminals are adapting as well. Join us as we examine the biggest challenges security leaders face, and why a people-centric approach to security is everyone’s biggest opportunity to stop attackers and protect their organization.
Join Lucia as she and a panel of CISOs discuss:
- Why social engineering dominates among today’s cyber threat actors
- How remote work and the move to the cloud has changed the nature of threats
- The ways their organizations are building controls to better understand and protect people
8:45am - 9:00am EST Break
9:00am - 10:00am EST Virtual Summit Boardroom
Identity, Access and the Strategic Approach to Trust
Hosted by Duo Security
Dave Lewis
Global Advisory CISO
Duo Security
Bobbi Bookstaver
Director of Information Security
Shawmut Design and Construction
Esmond Kane
CISO
Steward Health Care System
As endpoints sprawl and users access systems from across the globe, the challenge of verifying identity has only become more complex. Yet each road block to verify identity is a speed bump in enterprise agility, requiring CISOs to address identity and access management from a strategic risk-management approach.
Join this session to learn:
- Technologies that enable seamless identity management across platforms
- How to right-size identity verification at your organization
- The latest for zero-trust strategy, and where it makes sense
9:00am - 10:00am EST Virtual Summit Boardroom
The Changing Face of Insider Threat
Hosted by Exabeam
Stephen Moore
Chief Security Strategist
Exabeam
Adam Glick
VP, Chief Information Security Officer
Rocket
Joe Burgoyne
Sr. Director, Cyber Security
GE Healthcare
As an organizational capability, insider threat management is changing - again. Firstly, the idea of context has changed the categories of insider threat, and secondly, insider threat programs now maturing – evolving into a more justifiable and friendly, trusted insider program.
Join this virtual boardroom to discuss:
- The evolving landscape of insider threats and its challenges
- The impact of changing behaviors, employee culture and workplace environment on insider risk
- Practical strategies for improving an insider risk management program
9:00am - 10:00am EST Virtual Summit Boardroom
Managing Third-Party Risk with First-Rate Partnership
Hosted by BitSight
Chris Poulin
Deputy CTO & Director, Technology and Strategy
BitSight
Eric Jacobsen
Executive Director of Information Security
Boston University
Justin Armstrong
Security Architect
MEDITECH
In an era of cloud computing, software-as-a-service and outsourcing, some CISOs have noted that it can feel like every other business process sits in the hands, and systems, of an outside vendor. The key is to bring those partners into lockstep with the organization’s security strategy, a challenge that is both technical and classically human.
Join this session to learn:
- How CISOs are evaluating third-party risk across an ever-growing constellation of vendor services
- How to get off on the right foot, and to maintain strong partnerships with third parties
- Technologies that help manage third-party risk
9:00am - 10:00am EST Virtual Summit Boardroom
Bringing Cloud Back Down to Earth
Hosted by CrowdStrike
Thomas Etheridge
Senior Vice President Services
CrowdStrike
Marnie Wilking
Global Head of Security and IT Risk Management
Wayfair
Jon Fredrickson
Information Security & Privacy Officer
Blue Cross & Blue Shield of Rhode Island
As the Global pandemic continues, CISOs are reshaping their digital security strategy to strength the enterprise posture against diverse adversary activity. CISOs face a constant tension between enterprise agility and enterprise security, and in today’s world, this dynamic often plays out in the context of protecting a holistic cloud environment. How can CISOs gain a centralized view over cloud security posture and workloads in order to protect against a sundry of new threat activity?
Join this session to discuss:
- Methodical approaches to securing cloud-based technologies, workloads and products
- Approaches to various adversary and nuanced attacks
- Ransomware readiness and breach prevention in a new landscape
10:00am - 10:45am EST Virtual Summit Keynote
Tomorrow’s Cyberthreats – Staying One Step Ahead
Hosted by Cybereason
Israel Barak
CISO
Cybereason
Helen Negre
CISO of Americas
Siemens USA
Holly Ridgeway
Chief Security Officer
Citizens Financial Group
At a time when customer trust is paramount and private data is precious, a major breach can be catastrophic for any organization. Effective security is an essential part of effective business strategy, yet security leaders face an ever-growing challenge to guide their enterprise through the evolving threat landscape.
Join this virtual keynote to explore:
- Strategies for addressing the emerging threat landscape
- The role today’s CISO plays in guiding business strategy to mitigate risk
- Communication strategies for educating users about security – and holding them accountable
10:45am - 11:00am EST Break
November 18, 2020
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.