Philadelphia CISO Executive Summit

June 1, 2018, Sonesta Philadelphia Rittenhouse Square

June 1, 2018
Sonesta Philadelphia Rittenhouse Square

Collaborate with your peers

Get together with your peers to tackle top business challenges through peer-driven content and discussions at the Philadelphia CISO Executive Summit.

Join your peers to discuss the most critical issues impacting CISOs today:

Strategies for a risk-aligned, resilient organization

Developing and investing in the security workforce of tomorrow

Creating business value and supporting agile business operations

Philadelphia CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Co-Chairs

Todd Bearman

TE Connectivity
CISO

Cathy Beech

The Children's Hospital of Philadelphia
CISO

Jim Connelly

Lockheed Martin
VP & CISO

Chet Davis

Campbell Soup
VP - IT Operational Excellence and Governance

Mark Eggleston

Health Partners Plans
VP, CISO & CPO

Dave Snyder

Independence Blue Cross
Chief Information Security Leader

Alden Sutherland

AmerisourceBergen
CISO

Agenda


June 1, 2018 - morning

7:00am - 7:45am  Registration & Breakfast

7:45am - 8:30am  Keynote

Inspiring Crazy Security Loyalty

Chris Laping headshot

Chris Laping

Author, “People Before Things” and Former CIO, Red Robin Gourmet Burgers, Inc.

People Before Things, LLC

Unfortunately, we often hear stories and jokes that suggest security is not seen as an equal to “the business.” The reality: security has an opportunity to drive game-changing outcomes that inspire “crazy loyalty” in the communities they serve—which can result in a powerful brand for themselves as security professionals. In this discussion, Chris will focus on the fundamental mind shift that CISO leaders and staff must make to evolve their role and become transformative change leaders.

8:30am - 9:00am  Networking Break

9:00am - 9:50am  Breakout Session

Innovation in Security at Comcast

Noopur Davis headshot

Noopur Davis

SVP, Chief Product and Information Security Officer

Comcast Corporation

Comcast has embraced innovation in many areas, among them the X1 platform, the voice remote and enabling the digital home. The company is bringing that same innovative spirit to its security. In this presentation, Noopur Davis discusses three areas where Comcast is trying new approaches: leveraging the potential of blockchain in digital-home security, using big-data and security analytics and using security micro-services.

9:00am - 9:50am  Breakout Session

Charting AI’s Rise as Cybersecurity’s Force Multiplier

Keith Rayle headshot

Keith Rayle

Strategist

Fortinet, Inc.

It has never been easier for bad actors to build and deliver malicious software. Today’s world of coders-for-hire and software-as-a-service has made malware an exponentially growing issue, and CISOs are racing to keep up. Against these challenges, Artificial Intelligence has emerged as a tool that could turn the tide for resource-constrained security programs. This session will trace the history of AI and machine learning, and explore how artificial neural networks can operate as part of security operations.

9:00am - 9:50am  Executive Boardroom

Evolving Threats Meet Evolving Defenses

Michael Ansel headshot

Michael Ansel

Director, IT

AMETEK, Inc.

Chris Miller headshot

Chris Miller

Director, Global Infrastructure and Operations

Keystone Foods LLC

Rob Bathurst headshot

Rob Bathurst

Managing Director

Cylance

The threat landscape has evolved. Malicious actors are more nimble and more persistent than ever before, and each week seems to bring the revelation of a major new vulnerability. Yet CISOs are also evolving, drawing on new technologies and strategies to keep their organizations secure. Join this roundtable session to discuss what is categorically different about the threats facing today’s organizations, and learn your peers’ latest tools and techniques for battling the breach.

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).

To reserve your seat, please contact: 

Omar Bedran at 971-717-6680 or omar.bedran@evanta.com

9:50am - 10:20am  Networking Break

10:20am - 11:10am  Breakout Session

Securing the Future of IoT

Julie Fitton headshot

Julie Fitton

VP, Digital Product Security

Stanley Black & Decker

Automated doors, lifesaving medical devices and yes, high-tech tools – Stanley Black & Decker is building a future of connected products that communicate smoothly and securely across the Internet of Things. As vice president of digital product security, Julie Fitton is at the forefront of enabling Stanley Black & Decker’s transformation to IoT innovator. What lessons can these efforts offer for CISOs tackling IoT security at their own organizations? Join Fitton for a look at the security underlying Stanley’s new products and an exploration of best practices in the IoT.

10:20am - 11:10am  Breakout Session

Building ‘Security Incorporated’ Into Your Organization

Stephen Dunkle headshot

Stephen Dunkle

Chief Information Security Officer

Geisinger Health System

No matter how big or small, many businesses succeed today through mergers, acquisitions or divestitures. Often organizations see increased security risk and liability when the contract is signed. For many security professionals, this is now a way of life — especially in health care. Stephen Dunkle is facing this challenge in an era of rapid expansion for Geisinger Health System, where success requires an entrepreneurial mindset. Join Dunkle as he explains how to build a security business-within-a-business. Learn how to leverage IT-agnostic, cloud-based security services and forward-looking strategic teams to enable and secure your organization’s growth.

10:20am - 11:10am  Executive Boardroom

The Practical Application of ‘Cognitive Cybersecurity’

David Fiore headshot

David Fiore

Sr. Director, IT & CISO

Iroko Pharmaceuticals, LLC

Cathy Beech headshot

Cathy Beech

CISO

The Children's Hospital of Philadelphia

Doug Lhotka headshot

Doug Lhotka

Executive Cybersecurity Architect

IBM

The sheer volume of threat intelligence and suspicious activity alerts facing security teams is daunting, yet finding that needle in the haystack can make the difference between stopping an attacker or becoming victim to the next breach. “Cognitive cybersecurity” – machine learning and the automation of human tasks and processes – can transform the security program by free staff to focus on stopping the real threats. In this interactive discussion, CISOs will explore common threats all organizations face, how to identify the areas where cognition can be used and how to get business buy-in for the next wave of advanced technology.

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).

To reserve your seat, please contact: 

Omar Bedran at 971-717-6680 or omar.bedran@evanta.com

11:10am - 11:40am  Networking Break

June 1, 2018 - mid-afternoon

11:40am - 1:10pm  Keynote

Cybersecurity — Getting Mature and Staying Mature

Brian Cincera headshot

Brian Cincera

VP, Global Info Security

Pfizer

Noopur Davis headshot

Noopur Davis

SVP, Chief Product and Information Security Officer

Comcast Corporation

Rich Mahler headshot

Rich Mahler

Vice President

Revolutionary Security LLC

Jim Connelly headshot

Jim Connelly

VP & CISO

Lockheed Martin

Elevating a security program to the apex of maturity is no easy task, nor is maintaining that operational excellence in a shifting landscape of technologies and threats. The trials and tribulations of sustaining a mature security program’s effectiveness are unique, and security leaders must embrace the right strategies to ensure their organizations protect that crucial investment. Learn what it takes to reach strong program maturity, as well as tactics for preserving that success into the future.

1:10pm - 1:40pm  Networking Break

June 1, 2018 - afternoon

1:40pm - 2:30pm  Breakout Session

Partnering for Success in GDPR Compliance

Sheila Hawes headshot

Sheila Hawes

Vice President, Associate General Counsel & Chief Privacy Officer

AmerisourceBergen

Umesh Yerram headshot

Umesh Yerram

VP, Chief Data Protection Officer

AmerisourceBergen

Security, privacy, human resources, IT, compliance and operations – when AmerisourceBergen embarked on an effort to comply with new European Union data privacy regulations, leaders knew it would require cross-functional partnerships to succeed. Yet what would it take to get those varied stakeholders pointed toward the same goal? Join Sheila Hawes and Umesh Yerram to learn how AmerisourceBergen’s journey to GDPR compliance inspired a sense of ownership across the business, and how a close partnership between privacy and security helped lead the way.

1:40pm - 2:30pm  Executive Boardroom

Political and Computer Science – Next-Gen Threat Intel

Nancy Hunter headshot

Nancy Hunter

CISO

Federal Reserve Bank of Philadelphia

Keith Hartranft headshot

Keith Hartranft

CISO

Lehigh University

Gary Sockrider headshot

Gary Sockrider

Principal Security Technologist

NETSCOUT | Arbor

Understanding and minimizing the greatest security threats no longer comes solely through traditional security infrastructure and technical intelligence. As global adversaries wage hard-to-detect campaigns, security teams must weave political risk and human intelligence into their security operations and cyber threat functions. This peer-to-peer roundtable will focus on techniques such as visualization and global intelligence that CISOs are leveraging to predict and prevent the latest threats.

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).

To reserve your seat, please contact: 

Omar Bedran at 971-717-6680 or omar.bedran@evanta.com

1:40pm - 2:30pm  Executive Boardroom

Examining the Threats — and Opportunities — of Cloud

Tammy Klotz headshot

Tammy Klotz

Director of Information Security

Versum Materials

Bill Arey headshot

Bill Arey

CISO

Air Products and Chemicals, Inc.

The evolution of cloud technologies, advanced third-party solutions and software-as-a-service offerings have been steadily transforming the enterprise, allowing for greater flexibility and advanced customization of the IT environment. The ascendance of these tools has also introduced myriad challenges to CISOs charged with securing critical data. As organizations look to the cloud, they must also weigh the risks of migrating data in an increasingly threatened world. How can data in the cloud be secured? How does the risk-minded organization evaluate and trust the security posture of their vendor partners? In this session, security executives will examine the benefits, threats and challenges of the new cloud business.

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).

To reserve your seat, please contact: 

Omar Bedran at 971-717-6680 or omar.bedran@evanta.com

2:30pm - 2:50pm  Networking Break

2:50pm - 3:40pm  Breakout Session

Who’s Missing at Your Tabletop?

Dave Snyder headshot

Dave Snyder

Chief Information Security Leader

Independence Blue Cross

Michael Driscoll headshot

Michael Driscoll

Assistant Special Agent in Charge

Federal Bureau of Investigation

A patient gets the wrong surgery. An appliance receives a dangerous flaw on the assembly line. A packaged food becomes contaminated. In today’s connected world, cyberattacks can be a matter of life and death and engulf operations well beyond IT. With malicious actors now afflicting all areas of the organization, security leaders must broaden their traditional incident-response training programs to involve the key players they will rely on when the firewall falls. Learn how to build effective, cross-discipline security training that will prepare your organization to weather the next major cyber incident. 

2:50pm - 3:40pm  Executive Boardroom

GDPR and Beyond – Protecting Personal Data

Cathy Beech headshot

Cathy Beech

CISO

The Children's Hospital of Philadelphia

Kim Gray headshot

Kim Gray

Global Chief Privacy Officer

IQVIA

Derek Tumulak headshot

Derek Tumulak

VP, Global Product Mgmt.

Thales

The threat of a breach – and the potential of losing customers’ private data – creates an added layer of complexity under new GDPR regulations. The recent requirements place a hefty monetary penalty on impacted organizations that lose personal data, and possible future regulations will only increase the burden. While these rules hold companies to a higher standard, they creates an additional consequences when the inevitable breach happens. In this session, executives discuss ways to ensure data integrity and explore methods for protecting personal data – such as encrypting – that can support future compliance.

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is

To reserve your seat, please contact: 

Omar Bedran at 971-717-6680 or omar.bedran@evanta.com

2:50pm - 3:40pm  Executive Boardroom

Name Your Nemesis — Today’s Biggest Security Threats

Joshua Beeman headshot

Joshua Beeman

University CISO

University of Pennsylvania

Nick Falcone headshot

Nick Falcone

CISO

Albert Einstein Healthcare Network

Whether it’s Meltdown, Spectre, Petya or WannaCry, today’s major cyber threats and newly discovered vulnerabilities have achieved supervillain status in the popular psyche. The daily digital demon is a mainstay of headline news, and voices from across the organization turn to security leaders with the same question — “Are we safe?” Learn what cyber risks are front-and-center for your peers in today’s threat landscape, and discover the strategies — from communication to mitigation — that are successful.

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).

To reserve your seat, please contact: 

Omar Bedran at 971-717-6680 or omar.bedran@evanta.com  

3:40pm - 4:00pm  Networking Break

4:00pm - 4:40pm  Keynote

Privacy, Security and the Great CISO Debate

Anahi Santiago headshot

Anahi Santiago

CISO

Christiana Care Health System

Mark Eggleston headshot

Mark Eggleston

VP, CISO & CPO

Health Partners Plans

Todd Bearman headshot

Todd Bearman

CISO

TE Connectivity

Pick your side! Should CISOs hold the mantle of chief privacy officer? Or should these roles be separate — CISO and CPO? It’s Anahi Santiago versus Mark Eggleston in an Oxford-style debate exploring how organizations should define their executive roles in an era when data represents both the key to success and a perilous regulatory landscape. Join the discussion, as two InfoSec leaders battle for the hearts and minds of the audience, a clash where the most changed opinions will decide the winner!

4:40pm - 5:20pm  Closing Reception & Prize Drawing

Location


Your Community Partners


Presenting Sponsor
National Sponsors

Philadelphia CISO Program Managers


For inquiries related to this event, please reach out to your dedicated program contacts.

Omar Bedran

Program Manager

971-717-6680

omar.bedran@evanta.com

Jim Enger

Senior Program Manager

503-972-4429

jim.enger@evanta.com