Houston CISO Virtual Executive Summit

December 9, 2020 | 8:00am - 4:00pm CST

December 9, 2020 | 8:00am - 4:00pm CST

Collaborate with your peers

Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the Houston CISO Virtual Executive Summit.

Join your peers to discuss the most critical issues impacting CISOs today:

Strategies for a risk-aligned, resilient organization

Developing and investing in the security workforce of tomorrow

Creating business value and supporting agile business operations


Mike Coogan

Waste Management
Senior Director, Cybersecurity

Angelique Grado

MRC Global

Paul Huttenhoff

CenterPoint Energy

Steve Neiers

GM, Info. Risk Strategy & Mgmt. (CISO)

Derek Rude

Director, IT Security

Genady Vishnevetsky

Stewart Title Company


December 9, 2020

8:00am - 8:45am  CST Virtual Summit Keynote

Mitigating the Human Risk

Renee Tarun headshot

Renee Tarun

Deputy CISO/Vice President Information Security


The human element remains a huge challenge in a cohesive information security strategy, as they pose as potential risk as either an accidental or malicious insider. Employees, vendors and even customers all have a role to play when clicking one malicious link can put the organization at serious risk. The CISO must instill discipline, responsibility and buy-in across a huge swath of users – no easy task, especially in a remote working world.

Join this session to learn:

• How today’s situation informs security awareness training needs and objectives

• Training techniques and solutions that work at scale

• How to measure success and hold users accountable

8:45am - 9:00am  CST Break

9:00am - 10:00am  CST Virtual Summit Boardroom

Future Forward — Investing in the Security Workforce of Tomorrow

René Smeraglia headshot

René Smeraglia

JSC - Chief Information Security Officer

NASA Johnson Space Center

Pete Self headshot

Pete Self

Director IT Security and Compliance


Jeffrey Gardner headshot

Jeffrey Gardner

Practice Advisor of Detection & Response


In a field often described as having “negative unemployment,” CISOs are in a constant battle to hire and retain the talent they need to keep their organizations secure. How can CISOs develop and invest in their teams to pave the way for the security workforce of tomorrow?

Join this interactive conversation on:

  • Different approaches to building the talent pipeline
  • How to develop security talent and keep them engaged
  • Strategies to effectively leverage a remote security workforce

9:00am - 10:00am  CST Virtual Summit Boardroom

Bringing Cloud Back Down to Earth

Anthony Caruso headshot

Anthony Caruso

CyberSecurity Advisor

Apache Corporation

Mario Chiock headshot

Mario Chiock



Brandon Finney headshot

Brandon Finney



CISOs face a constant tension between enterprise agility and enterprise security, and in today’s world, this dynamic often plays out in the context of cloud services. How can CISOs gain a centralized view over cloud security posture and workloads?

Join this session to discuss:

  •  Methodical approaches to securing cloud-based technologies, workloads and products
  • Ways to standardize cloud environments
  • Strategies to ensure compliance

9:00am - 10:00am  CST Virtual Summit Boardroom

The Future of Network Security – SASE Implementation

Jason Georgi headshot

Jason Georgi

Global Field Chief Technology Officer for Prisma Access

Palo Alto Networks

Dr. Tim Proffitt headshot

Dr. Tim Proffitt

Managing Director, Information Security


Diego Souza headshot

Diego Souza

Director - Deputy Global Chief Information Security Officer


Information security is in a sprint to match the velocity of digital transformation at organizations. Driven by a number of factors such as remote work and bring-your-own device, CISOs face the puzzle of implementing access controls in a way that works well with borderless organizations, without slowing down the business.

In this session, you will discuss:

  • Common friction points between IT and security for enabling remote work and digital transformation
  • Ways to efficiently deploy security controls without slowing down work
  • The strategic measure and application of SASE to give session protection

10:00am - 10:45am  CST Virtual Summit Keynote

Defending Your Data in a Remote Working World

Mark Adams headshot

Mark Adams

Senior Manager, IT Security and Compliance/ CISO

Superior Energy

Mary Dickerson headshot

Mary Dickerson


University of Houston System

Ryan Kalember headshot

Ryan Kalember

EVP, Cybersecurity Strategy


It’s one of the oldest maxims in cybersecurity – you can’t protect what you can’t see. And with organizations shifting to remote work and the traditional enterprise network going dark in more ways than one, new thinking is required to protect the data that matters to your organization. After all, data doesn’t just leave on its own – a compromised account, malicious insider, or simply negligent user is almost always involved.

In this session you will learn:

  • How to adapt your security architecture to give you visibility in a remote work and cloud-oriented landscape
  • The ways in which remote work and the move to the cloud has changed the nature of threats to data
  • Approaches to better detect and respond to risky user actions with sensitive data

10:45am - 11:00am  CST Break

11:00am - 12:00pm  CST Virtual Summit Boardroom

Using Identity for Intelligent Defense to Enable the Remote Workforce

Eric Seagren headshot

Eric Seagren

Chief Information Security Officer

Oceaneering International

Stuart Wagner headshot

Stuart Wagner

Director, IT Sec. & Compliance

Enterprise Products Partners

Frank Briguglio headshot

Frank Briguglio

Global Public Sector Identity Governance Strategist

SailPoint Technologies Holdings Inc

For many organizations in the coronavirus era, work would grind to a halt without the ability for employees to remotely access critical systems and information. With business’s survival on the line, many CISOs must set a strategy that securely enables this explosion of digital work.

Join this virtual roundtable as we discuss:

  • Best approaches to the secure delivery of access and automated governance controls
  • Establishing complete 360-degree visibility and governance across all privileged and non-privileged accounts
  • Eliminating over-entitled users, and identifying high-risk profile identities violating access policies

11:00am - 12:00pm  CST Virtual Boardroom

Security Analytics – Turning Signal Noise into Actionable Harmony

Brad Hollingsworth headshot

Brad Hollingsworth

Director of Cyber Security

Mattress Firm

Scott Smith headshot

Scott Smith

Chief Information Security Officer

City of Bryan

Augusto Barros headshot

Augusto Barros

VP of Solutions


There is no shortage of data available to the security function, but insights – the signals of a real threat that demands action — are a different story. CISOs who can derive meaningful findings from their environments can better detect threats with fewer resources — a difficult, ongoing challenge as organizations become increasingly digital and complex.

Join your peers to discuss:

  • How emerging technologies and evolving digital businesses are challenging security analytics
  • Best practices for monitoring user behavior and other dynamic risks
  • How to reduce the noise created by the growing number of threat detection technologies and data volume

11:00am - 12:00pm  CST Virtual Summit Boardroom

Protecting Active Directory and Defeating Ransomware

Tony Cole headshot

Tony Cole


Attivo Networks

Christopher Kar headshot

Christopher Kar

Information Security Advisor

Fort Bend Independent School District

Derek Rude headshot

Derek Rude

Director, IT Security


The majority of corporate ransomware attacks stem from the compromise of Active Directory. Protecting AD has become increasingly complex with pervasive access and a multitude of objects with varying privilege levels and domain control. Monitoring and keeping this environment secure has become a significant challenge and comes with dire consequences when that control is lost to an attacker.

Join this boardroom to discuss:

  • How to conceal valuable enterprise resource information and gain insights to reduce the attack surface
  • How to control, provide disinformation, and alter what the attacker sees as a means to slow and deter attacks
  • Gather Tactics, Techniques, and Procedures (TTPs) and company-specific threat intelligence for remediating exploited systems and fortifying defenses

12:00pm - 12:30pm  CST Networking

Key Takeaways Discussion

Dave Lewis headshot

Dave Lewis

Global Advisory CISO

Duo Security

Join your peers for a unique opportunity to engage in freeform virtual discussion on the Shindig meeting platform. Attendees will be able to follow up with presenters, discuss best practices with their peers and form small groups to continue topics from the day. 

2:30pm - 4:00pm  CST Virtual Peer-to-Peer Meetings

Peer-to-Peer Meetings

Meet virtually for in-depth conversations with your colleagues

Conducting business virtually makes it more challenging to meet and network with like-minded peers. During this time of disruption and uncertainty, it’s become even more critical to collaborate with peers who are facing the same challenges.

Now, we are bringing you the opportunity to set up 1-to-1 meetings in a private, virtual setting with community peers directly after the Virtual Executive Summit.

  • Peer-to-Peer meetings are 25 minutes in length, giving you the chance for more personal interaction and in-depth conversation with your fellow Houston CISO Virtual Executive Summit peers.
  • All conversations are private and will not be recorded
  • Meet up to 3 peers based on your shared interests or priorities

Participant Testimonials

  • ‘If I came just for the peer to peer meetings, my time was well spent. This is truly your USP.’ Stuart Hughes, CDIO at Rolls Royce
  • ’The peer to peer mtgs were maybe the BEST part of this mtg’ Edward Wagoner, Executive Director, Digital, JLL
  • ‘Best idea ever; I had such productive sessions with all three of my peers’ Dd Budiharto Sr. Director of Cybersecurity, Baker Hughes

How to Participate 

Available if you sign up and select peer meetings prior to the summit. To join your meetings or download meeting calendar invites, please reference the instructions that were emailed to you from evanta@delegateselect.com.

Your Community Partners

CISO Thought Leaders
Key Partners
Program Partners

Houston CISO Program Manager

For inquiries related to this event, please reach out to your dedicated program contact.

Tyler Ward

Program Manager