IN-PERSON

Global CISO Executive Summit

September 9-11, 2019 | Four Seasons Westlake Village

September 9-11, 2019
Four Seasons Westlake Village

Collaborate with your peers

Get together with your peers to tackle the unique and specific challenges for CISOs with global responsibilities at the three-day Global CISO Executive Summit. Global CISOs engage in candid conversations, learn from each other and discuss challenges and solutions unique to global operations.

Join your peers to discuss the most critical issues impacting CISOs today:

Strategies for a risk-aligned, resilient organization

Developing and investing in the security workforce of tomorrow

Creating business value and supporting agile business operations

Global CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Derek Benz

Ford Motor Company
CISO

Tim Callahan

Aflac
SVP & Global Chief Security Officer

Darren Challey

Amazon
CISO, Amazon Fulfillment & Operations

Dan Chisum

Conoco Phillips
Mgr., IT Security, Strategy & Planning

Kirsten Davies

Estée Lauder Companies
SVP & CISO

Emily Heath

United Airlines
VP & CISO

Tim McKnight

SAP
EVP & CISO

Nasrin Rezai

General Electric Company
Global CISO & Product Security Officer

Alden Sutherland

AmerisourceBergen
CISO

Andy Tuck

Costco Wholesale Corporation
Director of Information Security

Marc Varner

YUM! Brands, Inc.
VP & Global CISO

Agenda


September 8, 2019

September 9, 2019

September 10, 2019

September 11, 2019

12:30pm - 5:30pm  Social Experience

Social Experience — Golf at Los Robles Greens

Join us at Los Robles when they open their doors to welcome CISO executives for a 1:30 pm tee time. This is your chance to get out and enjoy the day on the course!

If you plan on taking advantage of the complimentary transportation to the course, please arrive in the Four Seasons Westlake Village hotel lobby at at 12:30 pm. The shuttle to the course will depart promptly at 1:00 pm. At the end of your golf experience, shuttles buses will be waiting to transport you back to the Four Seasons.

5:30am - 2:30pm  Social Experience

Social Experience — Golf at Rustic Canyon

CISO executives have a special invitation to be the first group on the course at Rustic Canyon Golf Course! Tee time is 7:00 am.

For those who would like to take advantage of the complimentary transportation from the Four Seasons Westlake Village, please arrive in the lobby at 5:30 am. The shuttle will depart promptly at 6:00 am. To help you get ready for the day, breakfast will be provided upon checking in at the hotel. At the conclusion of your golf experience, shuttles buses will be waiting to transport you back to the Four Seasons.

3:30pm - 5:00pm  Breakout Session

Innovation Spotlight

Sheldon Cuffie headshot

Sheldon Cuffie

VP & Chief Information Security Officer

Dell Technologies

Delaram Divi headshot

Delaram Divi

VP, CISO

Dine Brands Global

Juan Gomez-Sanchez headshot

Juan Gomez-Sanchez

Chief Security Officer

Lennar Corporation

Jay Leek headshot

Jay Leek

Managing Director

ClearSky Cyber Security

Be among the first to see what’s new and next in the security solutions landscape. Five early-stage providers will get the chance to showcase their innovative solutions to the most pressing cybersecurity challenges before a panel of influential global enterprise CISOs – and you! – for coaching and feedback. 


Kick off this session, facilitated by security investor and former CISO Jay Leek, with a look at the state and trends in the security startup landscape and practical advice for working with early-stage providers.


Featured in the "Spotlight"

  • Mike Armistead, CEO and Co-Founder, Respond-Software
  • Dave Baggett, CEO and Co-Founder, Inky
  • Fred Kneip, CEO, CyberGRX
  • Balaji Parimi, Founder and CEO, CloudKnox Security
  • John Viega, CEO, Capsule8

3:30pm - 5:00pm  Breakout Session

Innovation Spotlight — The Presenters

Mike Armistead headshot

Mike Armistead

CEO and Co-Founder

Respond-Software

Dave Baggett headshot

Dave Baggett

CEO and Co-Founder

Inky

Fred Kneip headshot

Fred Kneip

CEO

CyberGRX

Balaji Parimi headshot

Balaji Parimi

CEO, Founder

CloudKnox Security

John Viega headshot

John Viega

CEO

Capsule8

Access this session in your EvantaEvents App to evaluate these presenters and provide feedback!

6:00pm - 7:00pm  Executive Networking Reception

Mentoring & Diversity Reception

Patricia Collins Weedon headshot

Patricia Collins Weedon

SVP & Global CISO

Discovery

Juan Gomez-Sanchez headshot

Juan Gomez-Sanchez

Chief Security Officer

Lennar Corporation

Suzie Smibert headshot

Suzie Smibert

Global Director Enterprise Architecture & CISO

Finning International

Leila Powell headshot

Leila Powell

Lead Security Data Scientist

Panaseer

A strong program starts with a strong CISO. And a strong CISO needs a strong network and peers to help them lead the way.

Maximize the value of your Global CISO Executive Summit experience and uncover the importance of mentorship and new mentor/mentee opportunities in this collaborative networking event with your global colleagues. Find out how working together leads to powerful, innovative and diverse security teams.

This session is open only to CISO attendees and Governing Body members.

7:00pm - 9:00pm  Governing Body Welcome Reception

Welcome & Kickoff Reception

Kick off the summit, and connect with your peers from the area and around the world in this fun and casual reception. 

10:00am - 2:00pm  Social Experience

Social Experience — Wine Tour

Cielo Farms and Rosenthal wineries will open their doors for an afternoon of vineyard tours and tastings. Transportation, logistics and lunch will all be taken care of so guests can sip and relax while taking in all that Malibu Wine Country has to offer.

This is the perfect way to sip, relax and enjoy the beauty of Malibu Wine Country. Register to reserve your space!

10:00am - 2:00pm  Social Experience

Social Experience — Malibu Giraffe Wine Tour

Can you see wild animals in Malibu? Absolutely! During this private tour at Malibu’s exotic ranch, guests can hike through the property, stop to see zebras, camels and even get up close and personal with a giraffe. After the walk, wine and lunch awaits. It is a great opportunity to relax in the sun while sampling locally sourced wines. Register to reserve your space!

7:00am - 7:40am  Registration & Breakfast

7:40am - 7:45am  Opening Comments

7:45am - 8:00am  Awards Gala

CISO Breakaway Leadership Awards — Impact Finalists

JP Calderon headshot

JP Calderon

VP/CISO Global Architecture

Clorox Company

Suzie Smibert headshot

Suzie Smibert

Global Director Enterprise Architecture & CISO

Finning International

Linda Marcone headshot

Linda Marcone

VP & CISO

Conn's HomePlus

The Breakaway Leadership Awards honor global CISOs who drive exceptional impact, innovation and influence. Hear from the Finalists in the Impact category, nominated as leaders who have made a transformative impact on projects or initiatives that benefit their company in meaningful and measurable ways.

8:00am - 8:45am  Keynote

Overcoming Circumstance — Lessons From an Athlete

Inky Johnson headshot

Inky Johnson

Former NCAA Football Player and Author

Author & Thought Leader

Ten football games. That’s all that separated Inky Johnson from the NFL. He was a projected top-30 draft pick — a dream he’d had since age 7. But all that changed during his second game. A routine tackle went wrong, and his right arm became paralyzed. He’d never play football again. Still, he knew his life wasn’t over. Harnessing the same discipline and positive attitude he had in training, Johnson motivated himself and excelled despite his circumstance. Join this session to hear his story and leave with lessons that can be applied on and off the field.

8:45am - 9:15am  Networking Break

9:15am - 10:15am  Breakout Session

Managing, Securing and Taking Inventory of the Global IoT Landscape

Kevin Kealy headshot

Kevin Kealy

CISO

Scientific Games

Arthur Lessard headshot

Arthur Lessard

SVP & CISO

Universal Music Group

Jennifer Ramsey headshot

Jennifer Ramsey

Vice President, Chief Information Security Officer

Activision Blizzard

Teresa Zielinski headshot

Teresa Zielinski

SVP CISO and Product Security

GE Power

Todd Friedman headshot

Todd Friedman

CISO

ResMed

We all worry about confidentiality, availability and integrity when it comes to the connected world, but as we extend into industrial environments should we not add “safety” to that list? Join this esteemed panel of CISOs as they provide their future-forward perspectives on the Internet of Things.



9:15am - 10:15am  Breakout Session

Digital Transformation — Expect the Unexpected

Chris Leach headshot

Chris Leach

Senior CISO Advisor

Cisco Systems, Inc.

As we try to safely guide our organizations through digital transformation, it sometimes feels like we are taking one step forward, then two steps back. We do our best to navigate through detailed security road maps, only to find that the landscape has changed mid-journey. Are you prepared for the twists and turns?

In this session you will:

  • Learn how to create strategies that will help you deal with rapid change more effectively
  • Discover how to simplify the crowded solution landscape
  • Find out how to build a successful team that can pivot

9:15am - 10:15am  Interactive Session

Wear the Black Hat in a Cybersecurity Escape Room

Lauren Howard headshot

Lauren Howard

Senior Cybersecurity Awareness Specialist

Boston Scientific

As a security executive, you know how many disparate pieces of information can together leave you vulnerable to hackers. Framed photos. Letters from family. Personal documents tucked away in a drawer. For 50 minutes, you’ll try on the black hat, assuming the role of a hacker trying to access an organization’s most sensitive data.

The catch—you only have 40 minutes to gather all the correct intel to gain access to the data, and you’re limited to the clues around the room.

In this session, be prepared to:

  • Hack a Facebook account using information left behind on employees’ desks
  • Identify which sensitive documents commonly found on employees’ desks can be used to access important accounts
  • Learn a new way to gamify insider threat training

*Please note: This interactive session is limited to 10 attendees.

9:15am - 10:15am  Executive Boardroom

Connecting Security, Risk, and IT to Enable a Best-in-Class Program

Justin Staples headshot

Justin Staples

CISO

MUFG Securities Americas Inc.

Terrence Weekes headshot

Terrence Weekes

CISO

Jack in the Box, Inc.

Todd Rotger headshot

Todd Rotger

Vice President, Global Sales for Security & Risk

ServiceNow

The breaches of the past few years continue to show us that organizations are overwhelmed and struggling with patching software vulnerabilities. But what if the you were able to properly pinpoint the vulnerabilities that represent the most risk and align these risks with overall enterprise risk?

Join this conversation to discuss:

  • How security, risk, and IT staff can best work together to locate vulnerabilities and remediate cyber risk
  • Best practices for strengthening governance, risk, and compliance programs
  • Effective methods for communicating cyber risk to the BOD


Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs). To reserve your seat, please contact Tom Ward at +1 971-271-6883 or Tom.Ward@evanta.com.

9:15am - 10:15am  Executive Boardroom

Security Toolbox – The Future Is Now

Umesh Yerram headshot

Umesh Yerram

VP, Chief Data Protection Officer

AmerisourceBergen

Chris Wilson headshot

Chris Wilson

Vice President of Global Professional Services

BlackBerry Cylance

How can CISOs better understand emerging technologies and proactively apply them to improve their security program? Join this peer conversation to explore concepts such as AI, ML and blockchain, as well as use cases for security practitioners.

In this session you will:

  • Uncover practical applications for emerging technologies
  • Discuss how other CISOs are implementing new tech
  • Take a look at the future technology landscape for CISOs

10:15am - 10:45am  Networking Break

10:45am - 11:45am  Breakout Session

Making a Difference With The Phoenix Project

Taylor Lehmann headshot

Taylor Lehmann

CISO

athenahealth

At one time or another, we all have asked the question, “How do we turn the office of no into the office of yes?” In Taylor Lehmann’s case, he also wondered how he could he effectively “feel the pain” in order to gain perspective and to find a way to align security to the mission of his hospital system – in doing so, improving care and reducing physician burnout in his organization. To find the answers, are you ready to walk in someone else’s shoes like Taylor did?

In this session you will:

  • Learn how to step back from the role of the security practitioner to better understand the company
  • Explore strategies on how you can bring efficiency and value back to the business
  • Find out creative and dynamic applications for DevOps user-experience principles featured in the best seller, “The Phoenix Project” 

10:45am - 11:45am  Breakout Session

Defense in Diversification and the Proactive SOC

John Matthews headshot

John Matthews

CIO

ExtraHop

The rush to innovate has resulted in more sophisticated threat defenses, but it has also created a complex web of tools that must be managed by an already overworked and understaffed security team. Heterogeneity of defense systems is itself a defense, so modern security teams need to approach consolidation differently.

In this session, attendees will learn how:

  • Data-first approaches to security architectures illuminates natural consolidation points
  • Cross-collaboration within the IT organization improves security posture and reduce tool sprawl
  • Leveraging other parts of the organization improves security posture through smarter processes and practices

10:45am - 11:45am  Executive Boardroom

Managing the Convergence of Global Data Regulations

Chris McFarland headshot

Chris McFarland

VP & CISO

Abercrombie & Fitch

Miller Newton headshot

Miller Newton

President and CEO

PKWARE

Information security leaders navigate an increasingly complex matrix of national and foreign data privacy regulations. GDPR caused organizations to scramble to meet data protection directives and reassess risk management through new compliance reporting requirements and potential exposure to financial penalties. Now California has its own Privacy Act set to come into effect, and it’s one of potentially many different pieces of forthcoming regulation and policy. How can organizations create a unified data protection and compliance strategy that meets conflicting requirements?

In this session, discuss:

  • The current landscape of data privacy regulation around the world
  • Best practices for managing risk associated with data protection frameworks
  • Standards and metrics for measuring data protection risk
  • Data classification strategies to aid compliance, regardless of regulation


Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs). To reserve your seat, please contact Tom Ward at +1 971-271-6883 or Tom.Ward@evanta.com.

10:45am - 11:45am  Executive Boardroom

IoT/OT Intelligence – The Next Transformational Shift in Security

Billy Spears headshot

Billy Spears

EVP, CISO

loanDepot

Michael Wilson headshot

Michael Wilson

SVP & CSO

Molina Healthcare, Inc.

Pedro Abreu headshot

Pedro Abreu

Chief Product & Strategy Officer

Forescout Technologies

When it comes to reducing cyber risk across the extended enterprise, today’s CISO is being driven to reinvent themselves to address the influx of devices and technologies accessing their networks. Yesterday’s view of cybersecurity is becoming obsolete as organizations and their boards are demanding measurement of risk in real-time and enforcement of risk mitigation policies in an automated manner.

Join this discussion to:

  • Understand how your peers are embracing new ways of thinking
  • Determine the state of controls within your ecosystem
  • Learn how to forge forward with confidence to manage this next transformational shift


Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs). To reserve your seat, please contact Tom Ward at +1 971-271-6883 or Tom.Ward@evanta.com.

10:45am - 11:45am  Executive Boardroom

Protecting Your VIPs, and Your VAPs (Very Attacked People) Too

Catharina Budiharto headshot

Catharina Budiharto

Sr. Director, Cybersecurity Architect & Data Protection

BHGE

Karla Thomas headshot

Karla Thomas

Director IT, Global Security & Audit

Tower International

Ryan Kalember headshot

Ryan Kalember

EVP, Cybersecurity Strategy

Proofpoint

For years, we’ve seen attackers target organizations via their people. Now with fewer reliable exploits and more cloud adoption, we’re also seeing a shift toward attacks that exploit people, with threat actors tricking their targets into running their malware for them, handing over their credentials, or simply sending data or money to an impostor. Ryan Kalember of Proofpoint will outline strategies for gaining visibility and mitigating risk in a people-centric threat landscape.

Join to learn:

  • Why nearly all threat actors have shifted away from technical exploits to compromise their targets
  • How organizations can leverage threat data to understand which people and departments are highly targeted
  • How to design effective protection for highly attacked, highly vulnerable, and highly privileged users


Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs). To reserve your seat, please contact Tom Ward at +1 971-271-6883 or Tom.Ward@evanta.com.

12:00pm - 12:05pm  Lunch & Comments

12:05pm - 12:20pm  Awards Gala

CISO Breakaway Leadership Awards — Innovation Finalists

Kevin Brown headshot

Kevin Brown

CISO

Boston Scientific

Kevin Kealy headshot

Kevin Kealy

CISO

Scientific Games

Jeff Stark headshot

Jeff Stark

Vice President, Technology Risk & CISO

IGM Financial

The Breakaway Leadership Awards honor global CISO who drive exceptional impact, innovation and influence. Hear from the Finalists in the Innovation category, nominated as creative thinkers who find out-of-the-box ways to use or create technology or unique solutions to solve problems and drive results.

12:20pm - 12:45pm  Lunch & Comments

12:45pm - 1:30pm  Keynote

Leading Your Board to the Next Cybersecurity Frontier

Paul Gagliardi headshot

Paul Gagliardi

CISO

SecurityScorecard

Umesh Yerram headshot

Umesh Yerram

VP, Chief Data Protection Officer

AmerisourceBergen

Today, boards have a fiduciary duty to know about the cybersecurity risks of their organizations. We’ve all seen how a breach can have harsh consequences, not just for the company, but for the CISO. Join Paul Gagliardi and Umesh Yerram as they share how to turn your organization’s cybersecurity posture into a differentiator. As you take charge of your organization’s cybersecurity health, you will shine as a CISO with leading edge analytics.

In this session, you’ll explore how to:

  • Create a trusted dialogue with your board by providing transparency into the cybersecurity posture of your entire risk ecosystem
  • Educate, influence and get buy in for cybersecurity investments with predictive insights
  • Use organizational analytics to develop crystal-clear reporting to enable the board to make informed decisions about budget, people and tools

1:30pm - 2:40pm  Networking Break

Peer-to-Peer Meetings

This is your opportunity to pre-book private face-to-face meetings with executive peers attending the Summit, using a private online portal running up to and during the event. Gain real, practical insights into what other companies and industries are doing, to take back to your boardroom.


Please note: This is for CISO attendees only. 

2:40pm - 3:40pm  Breakout Session

Journey to the Cloud – Extend Your Security, Reduce Risk

Sheila Jordan headshot

Sheila Jordan

CIO

Symantec Corporation

Diego Souza headshot

Diego Souza

Managing Director - Security Technology

United Airlines

Session details coming soon.

2:40pm - 3:40pm  Breakout Session

Delivering Trust and Confidence Through Resilience

Kurt Van Etten headshot

Kurt Van Etten

Senior VP, Security Strategy

RedSeal

At a time when security professionals fuel business enablement and enhance bottom-line value, CISOs have never had a more vital business role. But in order to get the board buy-in they need for their programs, they need to be trusted. In the age of the breach, this is easier said than done.

In this session, you’ll learn how to:

  • Give senior leaders visibility into your network and process
  • Build the board’s confidence in your security program
  • Present appropriate executive level staff and board metrics

2:40pm - 3:40pm  Interactive Session

Wear the Black Hat in a Cybersecurity Escape Room

Lauren Howard headshot

Lauren Howard

Senior Cybersecurity Awareness Specialist

Boston Scientific

As a security executive, you know how many disparate pieces of information can together leave you vulnerable to hackers. Framed photos. Letters from family. Personal documents tucked away in a drawer. For 60 minutes, you’ll try on the black hat, assuming the role of a hacker trying to access an organization’s most sensitive data.

The catch—you only have 50 minutes to gather all the correct intel to gain access to the data, and you’re limited to the clues around the room.

In this session, be prepared to:

  • Hack a Facebook account using information left behind on employees’ desks
  • Identify which sensitive documents commonly found on employees’ desks can be used to access important accounts
  • Learn a new way to gamify insider threat training

*Please note: This interactive session is limited to 10 attendees.

2:40pm - 3:40pm  Executive Boardroom

Secure the Core — Protect the Applications that Run Your Business

Dan Chisum headshot

Dan Chisum

Mgr., IT Security, Strategy & Planning

Conoco Phillips

Tim McKnight headshot

Tim McKnight

EVP & CISO

SAP

Mariano Nunez headshot

Mariano Nunez

CEO & Co-Founder

Onapsis

In May 2019, the Department of Homeland Security issued an alert citing "New Exploits for Unsecure SAP Systems" after new exploits, termed "10KBlaze" were publicly released. While protecting endpoint access, phishing, and network monitoring is important, nothing else matters if your core business applications are not a primary strategic component.

In this session, we will explore:

  • Why and how ERP applications are actively under attack
  • How cloud, mobile and digital transformations are expanding the attack surface
  • Steps you can take to ensure cyber resiliency and mitigate risk


Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs). To reserve your seat, please contact Tom Ward at +1 971-271-6883 or Tom.Ward@evanta.com.

2:40pm - 3:40pm  Executive Boardroom

The Continual Shifting of Threats

John Graham headshot

John Graham

CISO

EBSCO Industries

Andy Tuck headshot

Andy Tuck

Director of Information Security

Costco Wholesale Corporation

Ofer Israeli headshot

Ofer Israeli

CEO

Illusive Networks

Whether it’s cybercriminals motivated by profit or nation-state attackers with geopolitical motives, public and private organizations of all sizes have felt the impact of cyberattacks. Enterprise organizations are reeling from the onslaught of massively spread ransomware attacks to surgical pinpointed attacks on their assets from sophisticated state-sponsored actors. How can CISOs best face changing threat vectors?

Join this roundtable conversation to discuss:

  • The current threat landscape
  • How to best discover and thwart nation-state attacks
  • What security executives can do to build resiliency


Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs). To reserve your seat, please contact Tom Ward at +1 971-271-6883 or Tom.Ward@evanta.com.

3:40pm - 4:00pm  Networking Break

4:00pm - 4:15pm  Awards Gala

Breakaway Leadership Awards — Influence Finalists

Craig Froelich headshot

Craig Froelich

CISO

Bank of America

Raymond Lipps headshot

Raymond Lipps

Executive Director & CISO, Global Information Security

Celgene

Patricia Collins Weedon headshot

Patricia Collins Weedon

SVP & Global CISO

Discovery

The Breakaway Leadership Awards honor global CISO who drive exceptional impact, innovation and influence. Hear from the Finalists in the Influence category, nominated as leaders who who have made a significant contribution beyond their day-to-day work within their organization to benefit their community or profession.

4:15pm - 5:00pm  Keynote

Planning for the Future – The Next-Gen CISO

Kirsten Davies headshot

Kirsten Davies

SVP & CISO

Estée Lauder Companies

It’s no secret that we need more cybersecurity professionals to keep our organizations safe and secure. What’s even more challenging? Finding the next generation of cybersecurity leadership. Join Kirsten Davies as she shares her strategies for developing effective and successful teams for the future.

In this session you will:

  • Discover how you can tap into energy and ideas that millennials bring to the table
  • Learn how to uncover hidden talent in your company
  • Find out how to create a powerful pipeline that can deal with the expanding threat landscape

5:00pm - 6:30pm  Networking Break

6:30pm - 7:45pm  Awards Gala

8:00pm - 8:45pm  Keynote

Cybersecurity and the CISO – Looking Back to the Future and Beyond

Eugene Spafford headshot

Eugene Spafford

Professor of Computer Science

Purdue University

It has been nearly 25 years since the first chief Information security officers were appointed to keep organizations safe and secure. How much have things changed? Or have they pretty much stayed the same? Join industry luminary Professor Eugene H. Spafford for an inspirational look at security and the impact it has had on how we do business today.

In this session you will:

  • Reflect on how the cybersecurity profession first began
  • Journey into the future for a glimpse at what is next for the role of the CISO
  • Explore industry challenges and discover what we need do to take cybersecurity leadership to the next level

9:00pm - 11:00pm  Social Hour

Proofpoint After Dark

Continue the celebration at the Sound Stage with Proofpoint After Dark!

This session is open only to CISO attendees and Governing Body members.

7:00am - 8:00am  Opening Comments

8:00am - 8:45am  Keynote

Transforming Agility and Security in a Cloud World

Manoj Apte headshot

Manoj Apte

Chief Strategy Officer

Zscaler

John Graham headshot

John Graham

CISO

EBSCO Industries

Paolo Vallotti headshot

Paolo Vallotti

Global CISO

Mondelez International

The cloud and mobility are powerful enablers of digital transformation, but many IT organizations are grappling with legacy architectures and processes that haven't evolved in over 30 years. When apps lived in the data center, it made sense to invest in building a 'hub-and-spoke' network and to protect that network by employing a 'castle-and-moat' security model. But agility demands from both internal and external stakeholders in the new world of SaaS, cloud and mobility requires organizations to evolve their network and security architectures.

8:45am - 9:15am  Networking Break

9:15am - 10:15am  Breakout Session

Going for Security Gold at the Olympics

Gary Symes headshot

Gary Symes

Former VP Security

British Telecom

In securing today’s digital world, it feels like we all are tasked to do more with less. But what happens when you need to deliver a consistent, quality user experience to a billion users worldwide – without going over budget – no matter what happens? Join BT’s Gary Symes as he shares best practices and strategies that he learned at the London 2012 Olympics, which can be scaled to fit any business.

9:15am - 10:15am  Breakout Session

Creating a Culture of Innovation — The Next Frontier of Security

Shamla Naidoo headshot

Shamla Naidoo

Global CISO

IBM

When it comes to keeping your company safe, it is all about managing risk. And as cyber criminals become faster and more adept at exploiting vulnerabilities, we find that we need to be even more nimble and creative to keep ahead of the challenges. Join Shamla Naidoo as she explains how a culture of innovation can bring security closer to the business. Find out how you can make things easier for everyone, from the CEO down, resulting in better security choices.

In this session you will:

  • Discover how you can drive innovation in your company
  • Learn how to use market conditions to proactively predict your company’s security opportunities
  • Take a look into the future to see what new ideas, strategies and solutions are on the horizon to help strengthen your security posture

9:15am - 10:15am  Executive Boardroom

Making the Best Choice – An Integrated Security Approach

Steve Neiers headshot

Steve Neiers

GM, Info. Risk Strategy & Mgmt. (CISO)

Chevron

Paolo Vallotti headshot

Paolo Vallotti

Global CISO

Mondelez International

Julian Martin headshot

Julian Martin

VP Business Development

Mimecast

Threats have changed over the years and so have the targets. It’s not just your perimeter that is at risk, it’s your customers, your supply chain, your staff and your business reputation that could be easily tarnished with just one breach.

In this session, we’ll discuss:

  • How to look at an integrated approach to IT security
  • Why a layered approach is better
  • Reasons why deep integration with threat data sharing at speed is a modern necessity


Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs). To reserve your seat, please contact Tom Ward at +1 971-271-6883 or Tom.Ward@evanta.com.

9:15am - 10:15am  Executive Boardroom

Mobile-centric Zero Trust Security Framework

Mikhael Felker headshot

Mikhael Felker

Director, Information Security & Risk Management

Farmers Insurance

Alex Mosher headshot

Alex Mosher

VP, Global Solutions

MobileIron

Passwords are no longer sufficient protection against breaches because users are accessing information from a variety of untrusted devices, apps, networks, locations, and services. So, in the reality of today’s security world how does an organization protect itself? One answer is with a Zero Trust approach and framework to security. But with numerous theories about Zero trust, how do you ensure that you’ve taken the right approach?

In this session, discover how to:

  • Drive business innovation with mobile productivity by giving employees the ability to use mobile, cloud, and endpoints
  • Enforce corporate security without impacting the user experience
  • Redefine enterprise security strategies to address a perimeter-less environment

9:15am - 10:15am  Executive Boardroom

Redefining Personal Data Protection and Privacy

Zouhair Guelzim headshot

Zouhair Guelzim

VP & CISO

L'Oreal

John Koester headshot

John Koester

Senior Director of Information Security & CISO

HD Supply

Dimitri Sirota headshot

Dimitri Sirota

CEO and Co-Founder

BigID

Some organizations lack dedicated resources that help them track and govern their data at scale. How can CISOs work to combat this problem and ensure their data is properly managed and secured in the era of increasing privacy regulations such as GDPR and CCPA?

During this peer conversation, you will uncover: 

  • Advances in automated processes that will improve efficiency
  • Strategies to map and govern data
  • How to ensure data compliance


Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs). To reserve your seat, please contact Tom Ward at +1 971-271-6883 or Tom.Ward@evanta.com.

10:15am - 10:45am  Networking Break

10:45am - 11:45am  Breakout Session

Taking Calculated Risks – Identity in the Age of Cloud Transformation

Amit Saha headshot

Amit Saha

CEO

Saviynt

Cloud transformation changes the way enterprises conduct business. Innovation, however, often comes with failure and CISOs can’t remove risk. Therefore, you need calculated risks to take full advantage of transformation, especially as the attack perimeter shifts to identity.

In this session, you will learn how to:

  • Evolve operating models to reduce internal threat attack surface
  • Analyze challenges associated with identity in interconnected ecosystems
  • Apply risk-based analytics for an identity-focused technology adoption strategy

10:45am - 11:45am  Interactive Session

Wear the Black Hat in a Cybersecurity Escape Room

Lauren Howard headshot

Lauren Howard

Senior Cybersecurity Awareness Specialist

Boston Scientific

As a security executive, you know how many disparate pieces of information can together leave you vulnerable to hackers. Framed photos. Letters from family. Personal documents tucked away in a drawer. For 60 minutes, you’ll try on the black hat, assuming the role of a hacker trying to access an organization’s most sensitive data.

The catch—you only have 50 minutes to gather all the correct intel to gain access to the data, and you’re limited to the clues around the room.

In this session, be prepared to:

  • Hack a Facebook account using information left behind on employees’ desks
  • Identify which sensitive documents commonly found on employees’ desks can be used to access important accounts
  • Learn a new way to gamify insider threat training

*Please note: This interactive session is limited to 10 attendees.

10:45am - 11:45am  Executive Boardroom

Internet Isolation as a Business Enabler — Oxymoron or Game Changer?

Christopher Hall headshot

Christopher Hall

CISO

Pacific Life

Steve Schwartz headshot

Steve Schwartz

Director, IT Security

Lionsgate

Colin McKinty headshot

Colin McKinty

General Manager – North America

Garrison Technology

The internet is part of everyone’s professional and personal lives and the office of the CISO can no longer be the “Office of No.” Are you tempted to block your users from the internet to manage risk? Come and share your thoughts on how you can best create the desired web experience without putting your organization’s sensitive data and systems at risk.

During this peer-driven conversation you will:

  • Discuss the real oxymoron — "software security"
  • Share effective internet risk management strategies
  • Learn about hardware-based security approaches that with both enable your business and secure it for decades to come


Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs). To reserve your seat, please contact Tom Ward at +1 971-271-6883 or Tom.Ward@evanta.com.

10:45am - 11:45am  Executive Boardroom

Taking Action – Dealing With Evolving Cybersecurity Threats On System Z

George DeCesare headshot

George DeCesare

SVP, Chief Technology Risk Officer

Kaiser Permanente

Marcos Marrero headshot

Marcos Marrero

VP of Information Security

H.I.G. Capital

Brian Marshall headshot

Brian Marshall

President

Vanguard Integrity Professionals

When it comes to handling shifting cybersecurity threats, specifically for the IBM system Z, everyone plays an important role in keeping the organization safe. Are your teams aware of their responsibilities? During this peer-discussion, find out how you can help drive effective execution of critical security action items.

In this session you will:

  • Develop a better understanding of cybersecurity framework action items
  • Create an effective strategy for dealing with System Z cybersecurity threats
  • Discover specific steps that will ensure a continuous, evolving security setup for System Z


Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs). To reserve your seat, please contact Tom Ward at +1 971-271-6883 or Tom.Ward@evanta.com.

11:45am - 12:15pm  Networking Break

12:30pm - 1:15pm  Keynote

The Sky Is Not the Limit — Lessons from a Year in Space

Captain Scott Kelly headshot

Captain Scott Kelly

History-Making U.S. Astronaut & Retired U.S. Navy Captain

NASA Headquarters

With his record-breaking year in space, U.S. astronaut Scott Kelly laid the foundation for the future of space exploration and exemplified the power and resilience of the human spirit. And while science was at the core of his mission, it is the lessons of leadership and teamwork from Kelly’s personal journey that are most vivid.

In this keynote, Captain Kelly will share:

  • His incredible path from U.S. Navy fighter pilot to record-holding astronaut
  • The importance of embracing risk and testing your own limits to achieve your true potential
  • The challenges he faced and overcame on the road to becoming a true American hero

1:15pm - 1:45pm  Closing Reception & Prize Drawing

12:15pm - 12:30pm  Lunch & Comments

September 8, 2019

September 9, 2019

September 10, 2019

September 11, 2019

Location


Venue & Accommodation

Four Seasons Westlake Village

Awards


2019 Breakaway Leadership Awards

The Breakaway Leadership Awards recognize Global CISOs who are leaders of multinational teams and drive exceptional impact, innovation and influence at an international level. This unique recognition celebrates global business leaders and the teams they lead who are changing the way we think about technology, processes and innovation on the global stage.

This award program is open to CISOs of multinational, enterprise organizations and is made even more meaningful as the finalists and winners are selected by their true peers. 

Finalists are chosen by a panel of Global CISO judges that includes past winners, and participants at the Global CISO Executive Summit select the winners. 

Nominate a global leader today for driving exceptional impact, innovation, or influence and recognize their achievements.

2019 Winners

Your Community Partners


National Thought Leaders
Keynote Sponsor
National Sponsors
Global Thought Leader

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Tom Ward

Senior Program Manager

971-271-6883

tom.ward@evanta.com