VIRTUAL

Seattle CISO Virtual Executive Summit

November 10, 2020 | 8:00am - 1:15pm PST

November 10, 2020 | 8:00am - 1:15pm PST

Collaborate with your peers

Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the Seattle CISO Virtual Executive Summit.

Join your peers to discuss the most critical issues impacting CISOs today:

New processes and tools for seamless transition

The growing importance of the CIO & CISO

How IT and security impact culture

Governing Body Co-Chairs

Brian Abrahamson

Pacific Northwest National Laboratory
CIO

Anja Canfield-Budde

University of Washington
Associate Vice President, Information Management

Darren Challey

Amazon
Director - Security Operations and Technology (SOT) / Global Security Operations (GSO)

James Weaver

State of Washington
CIO

Agenda


November 10, 2020

8:00am - 8:45am  PST Virtual Summit Keynote

The Convergence of Zero Trust and SASE

James Christiansen headshot

James Christiansen

VP, CSO Cloud Security Transformation

Netskope

Jerry Sto. Tomas headshot

Jerry Sto. Tomas

CISO

Apria Healthcare

Organizations are feeling a shift in the world of networking and security as they rapidly adopt and embrace the cloud. On-premises private data centers are no longer the place for data and workloads to exist. With this shift, security and networking are brought closer than ever. Enterprises need speed, visibility, security and reliability without compromise. Enter, the secure access service edge, better known as SASE. Its’ inevitable that SASE implementations and zero trust implementations need to collide to provide a more comprehensive security capability to truly support digital transformation. How can your organization best position itself for the transition?

In this session, you will discuss:

  • Problems SASE can address in the modern enterprise
  • Benefits of planning both SASE and zero trust implementations
  • Insights from organizations adopting SASE and zero trust today

8:45am - 9:00am  PST Break

9:00am - 10:00am  PST Virtual Summit Boardroom

Is Your Technology Getting the Most Out of Your Strategy?

Dan Willey headshot

Dan Willey

CIO

Wilbur-Ellis Company

Tamara Barr headshot

Tamara Barr

Chief Information Officer

Continental Mills

Bryan Kirschner headshot

Bryan Kirschner

Vice President, Strategy

DataStax

Technology itself is not a strategy, but maximizing the right technology makes a strong strategy successful. Getting there requires excellent data for decision-making, actionable metrics for benchmarking and AI-enrichment of quality information to take the next step. In this session, CIOs will dive into the ways that data-driven enterprises leverage tech better to come out on top.

Join this boardroom to discuss:

  • Data scalability, data portability and AI-ready infrastructure
  • The right tools to enhance to enhance your digital-consumer strategy
  • Benchmarking tools and processes 

9:00am - 10:00am  PST Virtual Summit Boardroom

Cloud IAM – Enlightenment or Inferno

Jerry Cochran headshot

Jerry Cochran

CISO

Pacific Northwest National Laboratory

Jeremy Snyder headshot

Jeremy Snyder

VP Business Development and Corporate Development

DivvyCloud

A strong IAM is one key to preventing data breaches and limiting the blast radius, should a security incident occur. But cloud IAM presents a new set of constructs for organizations to build and manage. Is this the most comprehensive identity and access control out there, or yet another layer of complexity added to your program?

In this session, you will discuss:

  • Why managing cloud IAM is so complex
  • The challenges cloud IAM creates for IT and cybersecurity professionals
  • How leading organizations are governing cloud IAM to reduce risk and the chance of a data breach

9:00am - 10:00am  PST Virtual Summit Boardroom

Bringing Cloud Back Down to Earth

Kevin Morrison headshot

Kevin Morrison

Chief Information Security Officer

Alaska Airlines

Elia Zaitsev headshot

Elia Zaitsev

CTO of the Americas

CrowdStrike

Sean Murphy headshot

Sean Murphy

SVP, CISO

BECU

CISOs face a constant tension between enterprise agility and enterprise security, and in today’s world, this dynamic often plays out in the context of cloud services. How can CISOs gain a centralized view over cloud security posture and workloads? Join this session to discuss:

  • Methodical approaches to securing cloud-based technologies, workloads and products
  • Ways to standardize cloud environments
  • Strategies to ensure compliance

10:00am - 10:45am  PST Virtual Summit Keynote

Accelerate your Journey to AI

Daniel Hernandez headshot

Daniel Hernandez

General Manager, IBM Data and AI

IBM

James Weaver headshot

James Weaver

CIO

State of Washington

AI is the main ingredient to help you pivot quickly in today’s environment and ensure a successful digital transformation. To scale AI, you need to overcome the challenges of talent scarcity, data complexity and a lack of trust in AI systems.

In this session, you’ll discuss:

  • Common challenges businesses and government sectors face in their AI journey
  • Prescriptive approach to collect, organize, analyze, infuse AI, and modernize your data
  • Efficient information architectures (IA) for AI

By registering for this session, this serves as your authorization to Evanta or its vendor to provide your contact information to IBM to follow up on your interaction and participation. IBM’s use of your contact information is governed by the IBM Privacy Policy. If you need more information on how IBM is using your personal data you may refer to the IBM Privacy Statement. To withdraw your marketing consent and unsubscribe to receiving emails click on the unsubscribe button at this address: ibm.biz/marketingoptout.

10:45am - 11:00am  PST Break

11:00am - 12:00pm  PST Virtual Summit Boardroom

DevOps and Security – Agile, not Fragile

Ronald Jimerson headshot

Ronald Jimerson

CISO

Port Of Seattle

Brandon Traffanstedt headshot

Brandon Traffanstedt

Global Director, Systems Engineering

CYBERARK

In a world where almost any large enterprise can call itself a software company, the rapid pace required for innovation is expanding the attack surface at equal speed. Information security can no longer be a retroactive exercise, but must be a coequal partner in digital transformation. 

Join this boardroom for a discussion on:

  • How the attack surface has shifted with the introduction of modern human and non-human workflows
  • Pragmatic steps to ensure security maintains a voice in development without becoming a constraint
  • Techniques to leverage the same themes that your developers for use in your security programs

11:00am - 12:00pm  PST Virtual Summit Boardroom

2020 Mobility Trends – 5G’s Role in the “New Normal”

Nelly Pitocco headshot

Nelly Pitocco

VP of Product and Solution Engineering

T-Mobile for Business

Matt Modarelli headshot

Matt Modarelli

CIO & Director, IT

Washington State Department of Transportation

Darren Challey headshot

Darren Challey

Director - Security Operations and Technology (SOT) / Global Security Operations (GSO)

Amazon

As the enterprise workplace changes at an accelerated pace, enterprise and IT leaders are looking to the advantages of 5G to enable their workforce and support a “mobile-first” mindset. Now more than ever, having a network that can meet and anticipate your evolving business needs is crucial for your future success.

In this session, engage in an open dialogue with your peers and T-Mobile’s 5G experts about:

  • How mobility will drive digital transformation, enable innovation and support a more mobile workforce
  • The ways 5G is powering the new remote work reality
  • Setting up advanced network security the enterprise can rely on

11:00am - 12:00pm  PST Virtual Summit Boardroom

Achieving an Effective Cloud Strategy

Vishal Ganeriwala headshot

Vishal Ganeriwala

VP, Product Marketing

Citrix Systems, Inc.

B.J. Moore headshot

B.J. Moore

Executive VP & CIO

Providence St. Joseph Health

Jim Phelps headshot

Jim Phelps

Director of Enterprise Architecture & Strategy

University of Washington

As companies evolve to keep pace with a digital world, successful cloud strategies elude many IT departments. Dealing with high operational costs and a talent shortage are just some of many reasons that cloud solutions are often a bigger undertaking than they first appear.

This session will focus on:

  • Discovering the right road map for your organization
  • Winning the business' trust during transition
  • Avoiding common pitfalls

12:00pm - 12:45pm  PST Virtual Summit Keynote

Mitigating the Human Risk

Renee Tarun headshot

Renee Tarun

Deputy CISO/Vice President Information Security

Fortinet

The human element remains a huge challenge in a cohesive information security strategy, as they pose as potential risk as either an accidental or malicious insider. Employees, vendors and even customers all have a role to play when clicking one malicious link can put the organization at serious risk. The CISO must instill discipline, responsibility and buy-in across a huge swath of users – no easy task, especially in a remote working world.

Join this session to learn:

  • How today’s situation informs security awareness training needs and objectives
  • Training techniques and solutions that work at scale
  • How to measure success and hold users accountable

12:45pm - 1:15pm  PST Networking

Community Discussion

Chuck Markarian headshot

Chuck Markarian

Chief Information Security Officer

PACCAR

An informal and interactive opportunity for you to network with peers in small groups.

8:00am - 8:45am  PST Virtual Summit Keynote

The Convergence of Zero Trust and SASE

James Christiansen headshot

James Christiansen

VP, CSO Cloud Security Transformation

Netskope

Jerry Sto. Tomas headshot

Jerry Sto. Tomas

CISO

Apria Healthcare

Organizations are feeling a shift in the world of networking and security as they rapidly adopt and embrace the cloud. On-premises private data centers are no longer the place for data and workloads to exist. With this shift, security and networking are brought closer than ever. Enterprises need speed, visibility, security and reliability without compromise. Enter, the secure access service edge, better known as SASE. Its’ inevitable that SASE implementations and zero trust implementations need to collide to provide a more comprehensive security capability to truly support digital transformation. How can your organization best position itself for the transition?

In this session, you will discuss:

  • Problems SASE can address in the modern enterprise
  • Benefits of planning both SASE and zero trust implementations
  • Insights from organizations adopting SASE and zero trust today

8:45am - 9:00am  PST Break

9:00am - 10:00am  PST Virtual Summit Boardroom

The Future of How We Do Business

Christian Nascimento headshot

Christian Nascimento

Vice President, Product Management & Strategy

Comcast

Sue Taylor headshot

Sue Taylor

Chief Information Officer

Bill & Melinda Gates Foundation

Kari Escobedo headshot

Kari Escobedo

CIO

Bartell Drugs

Julie Ellis headshot

Julie Ellis

VP, Information Security Architecture

The Walt Disney Company

At the start of the pandemic, organizations quickly turned to move a significant portion of the workforce to work fully remote. Now, CIOs are at the forefront of supporting a hybrid workforce of in-office and remote employees that will remain sustainable for the foreseeable future. 

In this virtual boardroom discussion, CIOs will discuss:

  • A new mindset for distributed workers: remote access is now strategic workforce policy
  • Evolving technologies to help with business continuity and resiliency
  • Best practices on how to implement a safe and secure remote work environment

9:00am - 10:00am  PST Virtual Summit Boardroom

Cloud IAM – Enlightenment or Inferno

Jerry Cochran headshot

Jerry Cochran

CISO

Pacific Northwest National Laboratory

Jeremy Snyder headshot

Jeremy Snyder

VP Business Development and Corporate Development

DivvyCloud

A strong IAM is one key to preventing data breaches and limiting the blast radius, should a security incident occur. But cloud IAM presents a new set of constructs for organizations to build and manage. Is this the most comprehensive identity and access control out there, or yet another layer of complexity added to your program?

In this session, you will discuss:

  • Why managing cloud IAM is so complex
  • The challenges cloud IAM creates for IT and cybersecurity professionals
  • How leading organizations are governing cloud IAM to reduce risk and the chance of a data breach

9:00am - 10:00am  PST Virtual Summit Boardroom

Bringing Cloud Back Down to Earth

Kevin Morrison headshot

Kevin Morrison

Chief Information Security Officer

Alaska Airlines

Elia Zaitsev headshot

Elia Zaitsev

CTO of the Americas

CrowdStrike

Sean Murphy headshot

Sean Murphy

SVP, CISO

BECU

CISOs face a constant tension between enterprise agility and enterprise security, and in today’s world, this dynamic often plays out in the context of cloud services. How can CISOs gain a centralized view over cloud security posture and workloads? Join this session to discuss:

  • Methodical approaches to securing cloud-based technologies, workloads and products
  • Ways to standardize cloud environments
  • Strategies to ensure compliance

10:00am - 10:45am  PST Virtual Summit Keynote

Accelerate your Journey to AI

Daniel Hernandez headshot

Daniel Hernandez

General Manager, IBM Data and AI

IBM

James Weaver headshot

James Weaver

CIO

State of Washington

AI is the main ingredient to help you pivot quickly in today’s environment and ensure a successful digital transformation. To scale AI, you need to overcome the challenges of talent scarcity, data complexity and a lack of trust in AI systems.

In this session, you’ll discuss:

  • Common challenges businesses and government sectors face in their AI journey
  • Prescriptive approach to collect, organize, analyze, infuse AI, and modernize your data
  • Efficient information architectures (IA) for AI

By registering for this session, this serves as your authorization to Evanta or its vendor to provide your contact information to IBM to follow up on your interaction and participation. IBM’s use of your contact information is governed by the IBM Privacy Policy. If you need more information on how IBM is using your personal data you may refer to the IBM Privacy Statement. To withdraw your marketing consent and unsubscribe to receiving emails click on the unsubscribe button at this address: ibm.biz/marketingoptout.

10:45am - 11:00am  PST Break

11:00am - 12:00pm  PST Virtual Summit Boardroom

Security Tool Tipping Point: How More Tools Can Increase Overall Risk

Chris Dalton headshot

Chris Dalton

Chief Information Security Officer

Weyerhaeuser

Steve Person headshot

Steve Person

CISO

Cambia Health Solutions

Gaurav Kulkarni headshot

Gaurav Kulkarni

VP of Solutions Architecture

ReliaQuest

A rapidly growing number of security tools have arisen to help organizations better secure their environments and actively protect important data, from SIEM to EDR to SOAR and more. In response, many organizations are purchasing more tools than they can effectively manage or find, train and retain staff for as they struggle to stay protected against the latest security threats. However, a recent study of hundreds of security leaders finds a majority fear they have increased organizational risk levels and decreased ability to respond effectively to threats. In this session, we will detail these findings, then explore how your organization can better measure visibility, efficacy and performance to optimize investments and reduce risk. In this discussion, you’ll learn:

  • The state of “tools sprawl” and data showing its impact on security organizations
  • Tips to implement immediately to get a handle on tool efficacy
  • Apply a new approach to maturing your security posture

11:00am - 12:00pm  PST Virtual Summit Boardroom

2020 Mobility Trends – 5G’s Role in the “New Normal”

Nelly Pitocco headshot

Nelly Pitocco

VP of Product and Solution Engineering

T-Mobile for Business

Matt Modarelli headshot

Matt Modarelli

CIO & Director, IT

Washington State Department of Transportation

Darren Challey headshot

Darren Challey

Director - Security Operations and Technology (SOT) / Global Security Operations (GSO)

Amazon

As the enterprise workplace changes at an accelerated pace, enterprise and IT leaders are looking to the advantages of 5G to enable their workforce and support a “mobile-first” mindset. Now more than ever, having a network that can meet and anticipate your evolving business needs is crucial for your future success.

In this session, engage in an open dialogue with your peers and T-Mobile’s 5G experts about:

  • How mobility will drive digital transformation, enable innovation and support a more mobile workforce
  • The ways 5G is powering the new remote work reality
  • Setting up advanced network security the enterprise can rely on

11:00am - 12:00pm  PST Virtual Summit Boardroom

Achieving an Effective Cloud Strategy

Vishal Ganeriwala headshot

Vishal Ganeriwala

VP, Product Marketing

Citrix Systems, Inc.

B.J. Moore headshot

B.J. Moore

Executive VP & CIO

Providence St. Joseph Health

Jim Phelps headshot

Jim Phelps

Director of Enterprise Architecture & Strategy

University of Washington

As companies evolve to keep pace with a digital world, successful cloud strategies elude many IT departments. Dealing with high operational costs and a talent shortage are just some of many reasons that cloud solutions are often a bigger undertaking than they first appear.

This session will focus on:

  • Discovering the right road map for your organization
  • Winning the business' trust during transition
  • Avoiding common pitfalls

12:00pm - 12:45pm  PST Virtual Summit Keynote

Mitigating the Human Risk

Renee Tarun headshot

Renee Tarun

Deputy CISO/Vice President Information Security

Fortinet

The human element remains a huge challenge in a cohesive information security strategy, as they pose as potential risk as either an accidental or malicious insider. Employees, vendors and even customers all have a role to play when clicking one malicious link can put the organization at serious risk. The CISO must instill discipline, responsibility and buy-in across a huge swath of users – no easy task, especially in a remote working world.

Join this session to learn:

  • How today’s situation informs security awareness training needs and objectives
  • Training techniques and solutions that work at scale
  • How to measure success and hold users accountable

12:45pm - 1:15pm  PST Networking

Community Discussion

Chuck Markarian headshot

Chuck Markarian

Chief Information Security Officer

PACCAR

An informal and interactive opportunity for you to network with peers in small groups.

November 10, 2020

Your Community Partners


CISO Thought Leader
Key Partners
Program Partners

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Tom Ward

Senior Program Manager

971-271-6883

tom.ward@evanta.com