
Philadelphia CISO Virtual Executive Summit
May 27, 2021 | 8:00am - 1:30pm EDT
May 27, 2021 | 8:00am - 1:30pm EDT
Collaborate with your peers
Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the Philadelphia CISO Virtual Executive Summit.
Join your peers to discuss the most critical issues impacting CISOs today:
Accelerating security to match the pace of digital business initiatives
Managing the risk created from a landscape of new core technologies
Achieving sustainability for the CISO role without compromising outcomes
Governing Body Co-Chairs

Todd Bearman
TE Connectivity
Chief Information Security Officer

Mark Eggleston
Health Partners Plans
VP, CISO & CPO

Anahi Santiago
Christiana Care
CISO

Dave Snyder
Independence Blue Cross
Chief Information Security Leader

Alden Sutherland
AmerisourceBergen
VP, Chief Information Security Officer

Reginald Williams
The Chemours Co
Chief Information Security Officer
What to Expect
Connect with your CISO community through a variety of different session formats at the upcoming Virtual Executive Summit. You'll have the opportunity to listen, engage and create lasting relationships with like-minded peers.
Meet the Speakers
Don't miss this opportunity to meet with CISO practitioners and industry thought leaders who shared their insights on the agenda. Come with questions and get ready to meet new friends in this casual session designed to foster peer connections and collaboration in the Philadelphia community.
Agenda
May 27, 2021
11:15am - 11:45am EDT Networking
Meet the Speakers
Don't miss this opportunity to meet with Philadelphia practitioners and industry thought leaders who shared their insights on the agenda. Come with questions and get ready to meet new friends in this casual session designed to foster peer connections and collaboration in the CISO community.
11:45am - 12:00pm EDT Break
12:00pm - 1:30pm EDT Virtual Peer-to-Peer Meetings
Peer-to-Peer Meetings
Meet virtually for in-depth conversations with your colleagues
8:00am - 8:45am EDT Virtual Summit Keynote
Navigating A People-Centric Approach to Security
Hosted by Proofpoint

Lucia Milica
Global Resident CISO
Proofpoint
With remote work, organizations around the world are at a greater risk of cyber threats than ever before, and cybercriminals are taking advantage of the situation. In this session, you will examine the biggest challenges security leaders face, and why a people-centric approach to security is everyone’s biggest opportunity to better protect their organization.
In this session, you will explore:
- How remote work and the move to the cloud has changed the nature of threats to data
- The ways in which organizations are building controls to better understand and protect their employees
- The impact of changing behaviors, employee culture and workplace environment on people risk
- How today’s threats are informing your data protection practices/controls
8:45am - 9:00am EDT Break
9:00am - 10:00am EDT Virtual Summit Boardroom
Driving Business Value With Cloud Security Innovation
Hosted by IBM

Amy Claire Smith
Executive Cloud Security Architect, IBM Security
IBM

Aaron Weismann
CISO
Main Line Health

Arvin Bansal
Sr. Director Data & Cloud Security
AmerisourceBergen
Whether you are just moving into the cloud, researching more options within the public cloud, or building your own private cloud, most leaders agree that this is the future of infrastructure as a service. But can CISOs have it all – both increased productivity and cost benefits within a secure cloud?
During this peer-discussion you will explore:
- Automation, orchestration, AI and machine learning cloud strategies
- Nuances for hybrid on- and off-premise systems
- Ways to incorporate the cloud into a fully articulated security strategy
By registering for this session, this serves as your authorization to Evanta or its vendor to provide your contact information to IBM to follow up on your interaction and participation. IBM’s use of your contact information is governed by the IBM Privacy Policy. If you need more information on how IBM is using your personal data you may refer to the IBM Privacy Statement. To withdraw your marketing consent and unsubscribe to receiving emails click on the unsubscribe button at this address: ibm.biz/marketingoptout.
9:00am - 10:00am EDT Virtual Summit Boardroom
Defeating Ransomware by Protecting Active Directory
Hosted by Attivo Networks

Tony Cole
CTO
Attivo Networks

Randy Nitowski
IT Director, Infrastructure & Information Security
Subaru of America

Matt Cerny
Sr Manager, Security Operations
Integra Life Sciences
The majority of corporate ransomware attacks involve the compromise of Active Directory and the SolarWinds Congressional hearings highlighted critical security gaps related to privilege escalation and lateral movement detection. Defending against this stage 2 of an attack has escalated to atop 2021 priority for every CISO. Active Directory is inherently complex and insecure, and without the right tools to understand vulnerabilities and live attacks, comes with dire consequences when its control is lost to an attacker.
Join this session discuss methods to strengthen your defense strategy, including:
- Why Active Directory is the attack vector of choice for 2021
- How ransomware uses AD to accomplish their goals
- How data cloaking conceals credentials, AD objects, and data to prevent lateral movement and derail attacks
- What automated tools can be deployed to improve your security posture and accelerate detection of AD live attacks.
9:00am - 10:00am EDT Virtual Summit Boardroom
Mitigating New Third Party Risks

Michael Ansel
CISO
AMETEK

Tracey Brand - Sanders
CISO
UGI Corporation

Cheryl Flannery
Sr. Director, Cloud, Security, and Infrastructure Architecture Practice Leader
Pfizer

Seth Shestack
Deputy CISO
Temple University
Many third-party risks are identified after initial onboarding and due diligence, suggesting traditional methods in risk management policy fail to capture new and evolving risks. As these external partnerships become increasingly complex, the need for a new vendor risk management approach is clear.
Join this conversation to discuss:
•Establish business-driven methods for ongoing risk management analysis
•Partner across the C-Suite to establish organizational buy-in
•Strategies to employ an iterative approach to ongoing relationship management
10:00am - 10:15am EDT Break
10:15am - 11:15am EDT Virtual Summit Keynote
Securing the Supply Chain: Where Risk Meets Business

Guy Delp
Vice President, Global Information Security
Pfizer

Todd Bearman
Chief Information Security Officer
TE Connectivity

Anahi Santiago
CISO
Christiana Care

Dave Snyder
Chief Information Security Leader
Independence Blue Cross
Security threats have been around for decades, but lately the nature of those threats has changed - the security of supply chains has come to the forefront as an urgent issue for enterprises. CISOs understand that in this interlinked world, they’re only as secure as the weakest link in their supply chain.
Join this keynote to explore:
- New approaches for managing third-party and supply chain partners
- How much can, and should, CISOs control their supply chain
- Tools and strategies that will help you make the best choices for your organization
May 27, 2021
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.