Philadelphia CISO Executive Summit
June 1, 2018 | Sonesta Philadelphia Rittenhouse Square
June 1, 2018
Sonesta Philadelphia Rittenhouse Square
Collaborate with your peers
Get together with your peers to tackle top business challenges through peer-driven content and discussions at the Philadelphia CISO Executive Summit.
Join your peers to discuss the most critical issues impacting CISOs today:
Strategies for a risk-aligned, resilient organization
Developing and investing in the security workforce of tomorrow
Creating business value and supporting agile business operations
Philadelphia CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.
Governing Body Co-Chairs
Todd Bearman
TE Connectivity
CISO
Cathy Beech
The Children's Hospital of Philadelphia
CISO
Jim Connelly
Lockheed Martin
VP & CISO
Chet Davis
Campbell Soup
VP - IT Operational Excellence and Governance
Mark Eggleston
Health Partners Plans
VP, CISO & CPO
Dave Snyder
Independence Blue Cross
Chief Information Security Leader
Alden Sutherland
AmerisourceBergen
CISO
Agenda
June 1, 2018
7:00am - 7:45am Registration & Breakfast
7:45am - 8:30am Keynote
Inspiring Crazy Security Loyalty
Chris Laping
Author, “People Before Things” and Former CIO, Red Robin Gourmet Burgers, Inc.
People Before Things, LLC
Unfortunately, we often hear stories and jokes that suggest security is not seen as an equal to “the business.” The reality: security has an opportunity to drive game-changing outcomes that inspire “crazy loyalty” in the communities they serve—which can result in a powerful brand for themselves as security professionals. In this discussion, Chris will focus on the fundamental mind shift that CISO leaders and staff must make to evolve their role and become transformative change leaders.
8:30am - 9:00am Networking Break
9:00am - 9:50am Breakout Session
Innovation in Security at Comcast
Noopur Davis
SVP, Chief Product and Information Security Officer
Comcast Corporation
Comcast has embraced innovation in many areas, among them the X1 platform, the voice remote and enabling the digital home. The company is bringing that same innovative spirit to its security. In this presentation, Noopur Davis discusses three areas where Comcast is trying new approaches: leveraging the potential of blockchain in digital-home security, using big-data and security analytics and using security micro-services.
9:00am - 9:50am Breakout Session
Charting AI’s Rise as Cybersecurity’s Force Multiplier
Hosted by Fortinet, Inc.
Keith Rayle
Strategist
Fortinet, Inc.
It has never been easier for bad actors to build and deliver malicious software. Today’s world of coders-for-hire and software-as-a-service has made malware an exponentially growing issue, and CISOs are racing to keep up. Against these challenges, Artificial Intelligence has emerged as a tool that could turn the tide for resource-constrained security programs. This session will trace the history of AI and machine learning, and explore how artificial neural networks can operate as part of security operations.
9:00am - 9:50am Executive Boardroom
Evolving Threats Meet Evolving Defenses
Hosted by Cylance
Michael Ansel
Director, IT
AMETEK, Inc.
Chris Miller
Director, Global Infrastructure and Operations
Keystone Foods LLC
Rob Bathurst
Managing Director
Cylance
The threat landscape has evolved. Malicious actors are more nimble and more persistent than ever before, and each week seems to bring the revelation of a major new vulnerability. Yet CISOs are also evolving, drawing on new technologies and strategies to keep their organizations secure. Join this roundtable session to discuss what is categorically different about the threats facing today’s organizations, and learn your peers’ latest tools and techniques for battling the breach.
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).
To reserve your seat, please contact:
Omar Bedran at 971-717-6680 or omar.bedran@evanta.com
9:50am - 10:20am Networking Break
10:20am - 11:10am Breakout Session
Securing the Future of IoT
Julie Fitton
VP, Digital Product Security
Stanley Black & Decker
Automated doors, lifesaving medical devices and yes, high-tech tools – Stanley Black & Decker is building a future of connected products that communicate smoothly and securely across the Internet of Things. As vice president of digital product security, Julie Fitton is at the forefront of enabling Stanley Black & Decker’s transformation to IoT innovator. What lessons can these efforts offer for CISOs tackling IoT security at their own organizations? Join Fitton for a look at the security underlying Stanley’s new products and an exploration of best practices in the IoT.
10:20am - 11:10am Breakout Session
Building ‘Security Incorporated’ Into Your Organization
Stephen Dunkle
Chief Information Security Officer
Geisinger Health System
No matter how big or small, many businesses succeed today through mergers, acquisitions or divestitures. Often organizations see increased security risk and liability when the contract is signed. For many security professionals, this is now a way of life — especially in health care. Stephen Dunkle is facing this challenge in an era of rapid expansion for Geisinger Health System, where success requires an entrepreneurial mindset. Join Dunkle as he explains how to build a security business-within-a-business. Learn how to leverage IT-agnostic, cloud-based security services and forward-looking strategic teams to enable and secure your organization’s growth.
10:20am - 11:10am Executive Boardroom
The Practical Application of ‘Cognitive Cybersecurity’
Hosted by IBM
David Fiore
Sr. Director, IT & CISO
Iroko Pharmaceuticals, LLC
Cathy Beech
CISO
The Children's Hospital of Philadelphia
Doug Lhotka
Executive Cybersecurity Architect
IBM
The sheer volume of threat intelligence and suspicious activity alerts facing security teams is daunting, yet finding that needle in the haystack can make the difference between stopping an attacker or becoming victim to the next breach. “Cognitive cybersecurity” – machine learning and the automation of human tasks and processes – can transform the security program by free staff to focus on stopping the real threats. In this interactive discussion, CISOs will explore common threats all organizations face, how to identify the areas where cognition can be used and how to get business buy-in for the next wave of advanced technology.
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).
To reserve your seat, please contact:
Omar Bedran at 971-717-6680 or omar.bedran@evanta.com
11:10am - 11:40am Networking Break
June 1, 2018
Community Program Managers
For inquiries related to this community, please reach out to your dedicated contacts.