VIRTUAL

Minneapolis CISO Virtual Executive Summit

December 2, 2020 | 8:00am - 1:15pm CST

December 2, 2020 | 8:00am - 1:15pm CST

Collaborate with your peers

Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the Minneapolis CISO Virtual Executive Summit.

Join your peers to discuss the most critical issues impacting CISOs today:

Strategies for a risk-aligned, resilient organization

Developing and investing in the security workforce of tomorrow

Creating business value and supporting agile business operations

Governing Body Co-Chairs

Pat Joyce

Medtronic
VP, Global IT & CSO

Mike Kearn

US Bank
Director, Threat Informed Defense

Tris Lingen

3M
Chief Information Security Officer

Jim O'Conner

Cargill
CISO

Agenda


December 2, 2020

8:00am - 8:45am  CST Virtual Summit Keynote

Defending Your Data in a Remote Working World

Pat Joyce headshot

Pat Joyce

VP, Global IT & CSO

Medtronic

Jim Stephani headshot

Jim Stephani

VP - Director of Business Technology

Federated Insurance

Lucia Milica headshot

Lucia Milica

Global Resident CISO

Proofpoint

It’s one of the oldest maxims in cybersecurity – you can’t protect what you can’t see. And with organizations shifting to remote work and the traditional enterprise network going dark in more ways than one, new thinking is required to protect the data that matters to your organization. After all, data doesn’t just leave on its own – a compromised account, malicious insider, or simply negligent user is almost always involved.

Join Lucia Milica, Resident CISO at Proofpoint as she and a CISO panel discuss: 

  • How to adapt your security architecture to give you visibility in a remote work and cloud-oriented landscape
  • The ways in which remote work and the move to the cloud has changed the nature of threats to data
  • Approaches to better detect and respond to risky user actions with sensitive data

9:00am - 10:00am  CST Virtual Summit Boardroom

Data Governance as a Business Enabler

Linda Goettler headshot

Linda Goettler

CISO

City of Saint Paul

Aimee Martin headshot

Aimee Martin

Director, Information Security, Compliance and PMO.

Vista Outdoor

Stéphane Charbonneau headshot

Stéphane Charbonneau

CTO, Co-Founder

Titus, A HelpSystems Company

Some organizations lack resources to help them track and govern their data at scale. With large segments of the workforce now remote, data protection is more critical than ever. How can organizations work to combat this problem and ensure the data is properly managed and secured without impacting productivity or the customer experience?

Join this boardroom for a discussion on:

  • Advances in automated processes that will improve efficiency
  • Strategies to map and govern data
  • How to ensure data compliance in a remote or hybrid workforce

9:00am - 10:00am  CST Virtual Summit Boardroom

Bringing Cloud Back Down to Earth

Pat Joyce headshot

Pat Joyce

VP, Global IT & CSO

Medtronic

Greg Matthias headshot

Greg Matthias

EVP, CISO

TCF Bank

Elia Zaitsev headshot

Elia Zaitsev

CTO of the Americas

CrowdStrike

CISOs face a constant tension between enterprise agility and enterprise security, and in today’s world, this dynamic often plays out in the context of cloud services. How can CISOs gain a centralized view over cloud security posture and workloads?

Join this session to discuss:

  • Methodical approaches to securing cloud-based technologies, workloads and products
  • Ways to standardize cloud environments
  • Strategies to ensure compliance

10:00am - 10:45am  CST Virtual Summit Keynote

The Convergence of Zero Trust and SASE

Christopher Burger headshot

Christopher Burger

Vice President, Information Security & Governance

Slalom

James Christiansen headshot

James Christiansen

VP, CSO Cloud Security Transformation

Netskope

Organizations are feeling a shift in the world of networking and security as they rapidly adopt and embrace the cloud. On-premises private data centers are no longer the place for data and workloads to exist. With this shift, security and networking are brought closer than ever. Enterprises need speed, visibility, security and reliability without compromise. Enter, the secure access service edge, better known as SASE. Its’ inevitable that SASE implementations and zero trust implementations need to collide to provide a more comprehensive security capability to truly support digital transformation. How can your organization best position itself for the transition?

In this session, you will discuss:

  • Problems SASE can address in the modern enterprise
  • Benefits of planning both SASE and zero trust implementations
  • Insights from organizations adopting SASE and zero trust today

8:45am - 9:00am  CST Break

10:45am - 11:00am  CST Break

9:00am - 10:00am  CST Virtual Summit Boardroom

2020 – Lessons Learned for What’s Next with Cyber Risk Management

Randy Kirsch headshot

Randy Kirsch

VP of IT

Presbyterian Homes and Services

Bernie Rominski headshot

Bernie Rominski

Director, Information Security

Regis Corporation

Rob Gurzeev headshot

Rob Gurzeev

CEO

Cycognito

The disruption of a global pandemic was a significant test for information security executives in 2020, forcing many to flex evolving strategic plans to the massive challenges of remote work, transforming business models and more. Clearly this year validated the CISO’s importance to business continuity. Was it also an opportunity for CISOs to learn valuable lessons to transform their approach to cyber risk management?

Join your peers in this virtual town hall to discuss:

  • Enduring lessons learned from 2020
  • The state of cyber risk management entering 2021
  • How to build security assurance capabilities for the future

11:00am - 12:00pm  CST Virtual Summit Boardroom

Cloud IAM – Enlightenment or Inferno

Judy Hatchett headshot

Judy Hatchett

VP & CISO

Surescripts

Tris Lingen headshot

Tris Lingen

Chief Information Security Officer

3M

Chris Hertz headshot

Chris Hertz

VP Cloud Solutions

DivvyCloud

A strong IAM is one key to preventing data breaches and limiting the blast radius, should a security incident occur. But cloud IAM presents a new set of constructs for organizations to build and manage. Is this the most comprehensive identity and access control out there, or yet another layer of complexity added to your program? 

In this session, you will discuss: 

  • Why managing cloud IAM is so complex
  • The challenges cloud IAM creates for IT and cybersecurity professionals
  • How leading organizations are governing cloud IAM to reduce risk and the chance of a data breach

11:00am - 12:00pm  CST Virtual Summit Boardroom

The Future of Network Security – SASE Implementation

Brad Abbott headshot

Brad Abbott

Director of Information Security, CISO

Medica

Richard Coleman headshot

Richard Coleman

Senior Security Analyst

Andersen Corporation

Jason Georgi headshot

Jason Georgi

Global Field Chief Technology Officer for Prisma Access

Palo Alto Networks

Information security is in a sprint to match the velocity of digital transformation at organizations. Driven by a number of factors such as remote work and bring-your-own device, CISOs face the puzzle of implementing access controls in a way that works well with borderless organizations, without slowing down the business.

In this session, you will discuss:

  • Common friction points between IT and security for enabling remote work and digital transformation
  • Ways to efficiently deploy security controls without slowing down work
  • The strategic measure and application of SASE to give session protection

12:00pm - 12:45pm  CST Virtual Summit Keynote

Tomorrow’s Cyberthreats — Staying One Step Ahead

Israel Barak headshot

Israel Barak

CISO

Cybereason

Jeff Johnson headshot

Jeff Johnson

Director, IT Security

Digi-Key Electronics

At a time when customer trust is paramount and private data is precious, a major breach can be catastrophic for any organization. Effective security is an essential part of effective business strategy, yet security leaders face an ever-growing challenge to guide their enterprise through the evolving threat landscape.

Join this virtual keynote to explore:

  • Strategies for addressing the emerging threat landscape
  • The role today’s CISO plays in guiding business strategy to mitigate risk
  • Communication strategies for educating users about security – and holding them accountable

12:45pm - 1:15pm  CST Networking

Networking to Build Diverse Talent

Rich Agostino headshot

Rich Agostino

SVP, Chief Information Security Officer

Target

Larry Whiteside Jr. headshot

Larry Whiteside Jr.

Co-Founder & President

International Consortium of Minority Cybersecurity Professionals

Hear from the International Consortium of Minority Cybersecurity Professionals and your peers as they share actionable strategies to build a diverse cybersecurity workforce. Learn how you can support this non-profit and help tackle the “great cyber divide.” ICMCP's mission is to achieve the consistent representation of women and minorities in the cybersecurity industry – it offers scholarships, diverse workforce development, and mentoring programs. Listen, learn, and join them if you want to help drive the mission. Then break for some fun and informal networking with your peers to wrap-up the day.

11:00am - 12:00pm  CST Virtual Summit Boardroom

Security Operations – Empowering Teams

Becky MacDonald headshot

Becky MacDonald

CISO

Essentia Health

Dinah Davis headshot

Dinah Davis

VP of the Security Operations Platform

Arctic Wolf Networks

Mike Kearn headshot

Mike Kearn

Director, Threat Informed Defense

US Bank

Peter Christy headshot

Peter Christy

Director Information Security

Patterson Companies

Automation in the world of information security allows teams to move more swiftly in the face of persistent threats while stitching together best-in-class tools that get the job done. For smaller companies, the challenge may be having to do more, with less. Rather than eliminating the need for security talent, the use of a security operations team is freeing up bandwidth for analysts and others to engage in the meaningful work that requires a human touch.

 Join this session to learn:

  • The role of automation and orchestration in today’s security stack 
  • How the dispersion of the workforce has caused an increase in compromises
  • How to stay vigilant in the face of Account Takeover Attacks (ATO)

December 2, 2020

Your Community Partners


CISO Thought Leaders
Key Partners
Program Partners

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Joey Freedman

Program Manager

971-978-5009

joey.freedman@evanta.com