IN-PERSON

Global CISO Executive Summit

September 11-13, 2023 | Four Seasons Hotel Nashville

September 11-13, 2023
Four Seasons Hotel Nashville

Collaborate with your global peers

Get together with other CISOs who lead global operations at this exclusive, three-day summit to exchange ideas and validate strategies unique to large, complex organizations. Engage in candid discussions, dive deep into critical issues and validate strategies with other enterprise heads of (IT/Security) on the challenges unique to large, complex organizations. Executives are assured a level of information exchange and interaction with true, global peers beyond a regional community on discussion topics driven by Global CISOs, for Global CISOs.

Connect with true peers who lead their function globally and have similar opportunities and challenges, gain new perspectives and share experiences unique to the global nature of your role, and participate in discussions and sessions geared specifically toward global (IT/Security) leaders.

Proven Strategies for Global Cyber Executives to Maximize Organizational Security and Efficiency

Collaborative Methods for Securely Adopting New Tech Advancements

Elevating Your Security Program Amidst Complex International Compliance Requirements

Global CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Rich Agostino

Target
SVP, Chief Information Security Officer

Sara Andrews

Experian
Global CISO

Derek Benz

Coca-Cola Company
Chief Information Security Officer

Tim Callahan

Aflac
SVP, Global CISO

Kirsten Davies

Unilever
Global CISO

Meredith Harper

Synchrony Financial
Senior Vice President, Chief Information Security Officer

Tim McKnight

SAP
Executive VP & Chief Security Officer

Marc Varner

Lowe's Companies
Corporate VP & Global CISO

Kylie Watson

Sumitomo Mitsui Banking Corporation
CISO

Juan Gomez-Sanchez

Whirlpool Corporation
Global CISO

Marcos Marrero

H.I.G. Capital
Chief Information Security Officer

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Global CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


September 11, 2023

September 12, 2023

September 13, 2023

6:30am - 3:15pm  Social Experience

Golf at Greystone Golf Club

Tee off on one of Tennessee's most beautiful courses. Greystone Golf club (designed by PGA Tour pro Mark McCumber) is known to golfers of all skill levels for its scenery and uniquely exciting holes. 

Round play in groups of 4-5.  Check-in is on the 5th floor from 6:30am-6:45am. Transportation provided (6:45am departure).

Tee Time: 7:45am

10:15am - 3:00pm  Social Experience

Hat Makin' & Bourbon Sippin'

Flourish with the perfect Nashville pair; bourbon and Wrangler hats. Head over to a local Rustler Hat Co. for an exclusive hat shop experience to customize your perfect 100% Australian wool hat. Each guest will choose hat color plus add charms, fabric wraps, stitching and fire burnt accents with the help of a professional hat designer. Then head to lunch at Nelson’s Greenbrier Distillery’s brand-new restaurant followed by distillery tour and tasting. Founded in the 1800s by their great-great-great grandfather Charles Nelson, the Nelson brothers have resurrected Nelson’s Green Brier Distillery —not just to make and sell whiskey—but to rebuild a business that helped bring the term ‘Tennessee Whiskey’ to America and Europe.

3:00pm - 5:00pm  Break

5:00pm - 5:45pm  Social Hour

5:45pm - 6:30pm  Keynote

Podcast Recording: CISO Series - Live from the Four Seasons Nashville

David Spark headshot

David Spark

Co-Host

Guest Speaker

Mary Rose Martinez headshot

Mary Rose Martinez

VP, CISO

Marathon Petroleum

Allan Cockriel headshot

Allan Cockriel

CIO - Global Functions / IRM, and CISO

Shell

Are you ready for the live podcast that has spotlighted one of the most critical areas of InfoSec – relations between buyers and sellers of cybersecurity products? Join us at the Four Seasons Nashville as our host David Spark and special guests comment on hot cybersecurity issues, and listener questions, and play risk-based security games like "What's Worse?!"

6:30pm - 8:30pm  Executive Networking Reception

Welcome Reception

 Join your peers as we welcome the community back to the Global CISO Executive Summit. 

7:15am - 7:45am  Registration

7:15am - 8:30am  Day Two Agenda

Day Two: Breakfast & Registration

The Global CISO Executive Summit agendas are driven by the mission-critical priorities identified among the community. Each agenda is uniquely crafted ‘by Global CISOs, for Global CISOs,’ and will be available closer to the gathering. All topics and sessions will be inspired by the following themes.

  • Advancing the Business Value of Security
  • Protecting Critical Infrastructure Against Advanced Attacks
  • Investing in Company Culture to Attract Talent and Empower Staff

During the second day of the 3-day Executive Summit, attendees will be given the opportunity to attend a variety of sessions, including keynotes, peer-led breakout presentations, and boardroom discussions.

Many of our sessions will be hosted by the community’s most strategic partners.

For questions about the sessions, please contact Kody Paine, Senior Community Program Manager at kody.paine@evanta.com

7:45am - 8:30am  Breakfast Service

8:00am - 8:30am  Networking

Rising Together — Empowered Women, Empower Women

Meredith Harper headshot

Meredith Harper

Senior Vice President, Chief Information Security Officer

Synchrony Financial

This will be an intimate, informal space for women in cybersecurity leadership roles and their allies to freely discuss best practices, key challenges and mission-critical priorities. Come prepared to share ideas and forge new connections that can help empower each other to make an impact in your organizations and communities.

This session is aimed at, but not limited to, women who are leading the cybersecurity function at their organizations (CISO or equivalent) and those reporting directly to the CISO/equivalent. Priority access will be reserved to these groups.

8:30am - 9:15am  Keynote

Unleash the Full Power of Secure Digital Transformation

Jay Chaudhry headshot

Jay Chaudhry

CEO, Chairman & Founder

Zscaler

Tim Callahan headshot

Tim Callahan

SVP, Global CISO

Aflac

Every age is accompanied by new, special demands for the decision-makers who steer the fortunes of companies. In recent years, business success has become intrinsically linked to IT infrastructure and seamless and secure connectivity is the key to unlock innovation and accelerate business outcomes. To reach this state, enterprises are transforming their networks and security to a zero trust architecture, thereby reducing risk, eliminating cost and complexity and increasing agility.

Join this session to hear Jay Chaudhry and Tim Callahan to learn:

  • How zero trust architecture secures users, workloads, IoT/OT devices, and your business partners by addressing critical security shortcomings of legacy network architecture
  • How to reduce network complexity without exposing your organization to new risks
  • The key steps in a phased secure digital transformation journey as well as proven advice to drive the mindset and cultural change required

9:15am - 9:35am  Networking Break

9:35am - 10:20am  Breakout Session

Blazing Your Tr(AI)l - The CISOs Role in AI Preparedness

Eric Hussey headshot

Eric Hussey

CISO

Aptiv

Tim Callahan headshot

Tim Callahan

SVP, Global CISO

Aflac

Ali Syed headshot

Ali Syed

VP Information Security & Risk (CISO)

Amway

If advancements in AI haven't peaked, then neither have the interests or expectations of organizational leadership. And though it's no small order, finding a thoughtful, low-risk, high-reward, goal-enabling approach to the enterprise's AI use is up to technology executives.

In this panel-led discussion and collaboration session, you'll:

  • Consider the pros and cons of a formal, business-wide, AI policy
  • Learn from those who have banned the tool, as well as those who were early adopters
  • Prepare yourself to answer even the hardest AI questions leadership may ask

9:35am - 10:20am  Breakout Session

What Security Professionals Can Learn From Shipbuilders

Steve Winterfeld headshot

Steve Winterfeld

Advisory CISO

Akamai Technologies

Today’s security professionals must keep the business afloat while navigating architectural challenges with securing modern infrastructure with traditional defenses. How can CISOs learn from shipbuilders about a design pattern that has stood the test of time in ensuring that a breached hull does not mean a sunken ship?

In this session, we will cover:

  • Challenges in dealing with initial access techniques such as phishing and exploiting zero-day vulnerabilities
  • Enabling developers who need to move fast without sacrificing security
  • Ways to build defense in depth that offer more opportunities to avoid disaster in post-breach scenarios

9:35am - 10:20am  Executive Boardroom

Unifying the Analyst Experience for Global Threat Detection and Response

Glenn Dally headshot

Glenn Dally

Executive Advisor & Architect

IBM

Glen Armes headshot

Glen Armes

Chief Information Security Officer

Old Republic International Corporation

Andrea Bergamini headshot

Andrea Bergamini

VP of IT, CISO

Orbia

Genady Vishnevetsky headshot

Genady Vishnevetsky

CISO

Stewart Title Company

Given today’s dynamic threat landscape, involving constantly changing malicious TTPs, CISOs must have a proactive threat management strategy to handle complex attacks. However, with widely distributed infrastructures and the number of tools with different levels of control and responsibility, maintaining true visibility is difficult. Staffing shortages and the high volume of alerts that come in from fragmented tools adds to this challenge. The solution? Unifying the analyst experience to connect existing tools and workflows across your hybrid cloud environment.

Join this session to discuss:

  • Detecting and responding to advanced attacks like ransomware
  • Unifying the analyst experience with AI and machine learning - starting with understanding your attack surface and through EDR/XDR, SIEM, SOAR
  • Identifying blind spots in your cloud security strategy due to information fragmentation

9:35am - 10:20am  Executive Boardroom

Prevent, Detect, Respond - The Rhythm of Global Security

Sohail Iqbal headshot

Sohail Iqbal

CISO

Veracode

Jacob Lorz headshot

Jacob Lorz

Vice President & CISO

Cintas

Jeff Greene headshot

Jeff Greene

CISO

International Paper

Cesar Suarez headshot

Cesar Suarez

Chief Information Security Officer

Worley

Ideally, threats get stopped at the door. But in a developing environment or a growth period for your security program, it can be tough to continuously find and fix the flaws that happen at every stage. 

Gather with your C-Level peers to discuss: 

  • Why increased security sometimes starts with developer competency

  • Ways of managing and maintaining your attack surface

  • Actionable, practical response processes

9:35am - 10:20am  Executive Boardroom

Data IS Your Business – How Do You Secure it in the Cloud-Era

Eric Chang headshot

Eric Chang

CTO, RubrikX

Rubrik

Ed Harris headshot

Ed Harris

Global Director of Information Security

Mauser Packaging Solutions

Juan Gomez-Sanchez headshot

Juan Gomez-Sanchez

Global CISO

Whirlpool Corporation

In these times of rapid technological advancement, data stands as the cornerstone of innovation. As we navigate through the information age, it's evident that data residing in the cloud represents the fastest area of growth. To maintain pace with the agility of cloud operations, it is imperative to discover and adopt strategic approaches and robust architectures.

Gather with your C-level peers to:

  • Start solving the challenge of data visibility in the cloud
  • Determine who in your organization should own data security (CISO? CDO? CPO?)
  • Discuss how automation and agility can be accomplished through tooling or processes

10:20am - 10:40am  Networking Break

10:40am - 11:50am  Innovation Spotlight

Innovation Spotlight - SYN Ventures

Meredith Harper headshot

Meredith Harper

Senior Vice President, Chief Information Security Officer

Synchrony Financial

Marcos Marrero headshot

Marcos Marrero

Chief Information Security Officer

H.I.G. Capital

Juan Gomez-Sanchez headshot

Juan Gomez-Sanchez

Global CISO

Whirlpool Corporation

Anil Karmel headshot

Anil Karmel

CEO

RegScale

Jonathan Dambrot headshot

Jonathan Dambrot

CEO & Co-Founder

Cranium

Mark Curphey headshot

Mark Curphey

Co-founder

Crash Override

Be among the first to see what’s new and next in the security solutions landscape. Three early-stage providers will get the chance to showcase their innovative solutions to the most pressing cybersecurity challenges.

You'll hear from: 

  • Cranium
  • Crash Override
  • Regscale

11:50am - 12:45pm  Lunch Service

12:45pm - 1:20pm  Keynote

A CISO’s Guide to the AI Threatscape

Amit Singh headshot

Amit Singh

Chief Business Officer

Palo Alto Networks

Generative AI has tremendous promise for businesses but also comes with peril. While AI promises to bring tremendous efficiency, protecting your organization during the era of AI will become increasingly difficult. 

Join this session to hear Amit Singh, Palo Alto Network's Chief Business Officer to explore:

  • How attackers adopt and deploy AI
  • Examples of how major incidents–like Solarwinds or Log4J–would be different if attackers were equipped with AI in their toolset
  • How CISOs should prepare moving forward

1:20pm - 1:40pm  Networking Break

1:40pm - 2:25pm  Breakout Session

Life After CISO — What's Next?

Emily Heath headshot

Emily Heath

Board Member, CISO Emeritus

Nicole Ford headshot

Nicole Ford

Global VP & CISO

Rockwell Automation

Myrna Soto headshot

Myrna Soto

Board Member, CISO Emeritus

Meredith Harper headshot

Meredith Harper

Senior Vice President, Chief Information Security Officer

Synchrony Financial

You've spent a good majority of your career in information security, climbing your way to the top - to the CISO role. You're finally there, but what's next? What are your career options, and how should you prepare for exploring them?

Join this session with Emily Heath, current board member and former CISO to learn about: 

  • How to set yourself up for success when preparing for the transition after a CISO Role
  • Knowing what your career options are
  • The skills and experience you'll need to bolster your board position marketability 

1:40pm - 2:25pm  Breakout Session

Why Should Global CISOs Care About A Browser?

Bradon Rogers headshot

Bradon Rogers

Global Head of Customer Experience

Island.Io

IT professionals and cybersecurity practitioners face immense challenges adapting to shifts in the desired work models employed by users and their organizations. According to recent Gartner®️ research*, "Enterprise browsers will evolve to become the core platform for almost all of the day-to-day enterprise productivity and security software used by the workforce." Traditional architectural approaches are quite limited in such areas as BYOD programs, contractor/third-party provisioning, hybrid work, and modernization efforts. What if solutions to many of these difficult challenges could be solved by reimagining the browser as a core component of enterprise architecture? 

In this session, Island will provide examples on how this new category and technology:

  • Revolutionizes your organization, enabling you to address modern work challenges while unlocking new opportunities.
  • Streamlines BYOD, contractor/third-party, and hybrid work initiatives with innovative architectural approaches
  • Implements novel security measures to safeguard organizational applications and data


* Source: Source: Gartner, Emerging Tech: Security — The Future of Enterprise Browsers, Dan Ayoub, Evgeny Mirolyubov, Max Taggett, Dave Messett, 14 April 2023 

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.

1:40pm - 2:25pm  Executive Boardroom

Generative AI – The Key to Fast-Tracking Third-Party Risk Decisions

Gary Phipps headshot

Gary Phipps

VP, Strategy and Business Transformation

CyberGRX

Adam Fletcher headshot

Adam Fletcher

Chief Security Officer

Blackstone Group

Jeffery Schilling headshot

Jeffery Schilling

Global CISO

Teleperformance

Time is critical in third-party risk decisions and security teams face a balancing act in conducting proper vendor due diligence without being perceived as the impediment to the speed of business. Data is critical to these risk conversations and the time has come to combine generative AI and third-party risk to enhance insights from third-party risk assessments and intelligence to accelerate vendor decisions.

Join this session to discuss the potential of generative AI to:

  • Revolutionize the speed at which teams extract insights
  • Improve efficiency, decision-making and reducing resources required for assessments and discuss a real-world use case
  • Address challenges in the third-party risk lifecycle

1:40pm - 2:25pm  Executive Boardroom

Strategic Pitfalls in Third-Party Risk Management

Jonathan Ehret headshot

Jonathan Ehret

Vice President, Strategy and Risk

RiskRecon - A MasterCard Company

John Scrimsher headshot

John Scrimsher

CISO

Kontoor Brands

Mark Gabel headshot

Mark Gabel

Vice President & Chief Information Security Officer

Berry Global

Managing cyber risk across an Global IT infrastructure has never been harder. Remote workers, advancing attack methods, and an ever-expanding vendor network are challenging every firm, as total visibility into threats has become nearly impossible. As digital business strategy matures, more organizations are becoming dependent on the cyber posture and protection of third parties. Third-party risks present a unique challenge because you are depending on vendors and partners to operate securely to keep your data and information safe. As a global security leader, how are you mitigating the associated risks and demonstrating this to the business to ensure effective security programs?

Join our session to hear about:

  • Common failings across TPRM programs that led to breach events
  • How executives can provide strategic direction for third-party risk teams
  • Key practices being implemented by leading vendor risk firms to maintain strong supply chain risk management

1:40pm - 2:25pm  Executive Boardroom

Cloud Security Challenges Unveiled - Insights and Strategies for Success

Chris Boehm headshot

Chris Boehm

Field CISO

SentinelOne

David Tyburski headshot

David Tyburski

Vice President, Chief Information Security Officer

Wynn Resorts

There are many different challenges that can occur when trying to manage the cloud as a security leader. While cloud threat detection is important, you'll also need to know how to measure the cloud security scaling process. Challenges like these will arise, but what about integrating and navigating cloud security tools while keeping compliance at the forefront of your strategy? With the right approach, you should feel empowered to fortify your organizations' cloud security posture.

Join this thought-provoking discussion with your Global CISO peers to discuss:

  • Effectively enhancing organizational capabilities to detect and respond to threats targeting cloud environments
  • Key considerations for formulating an effective incident response plan in the cloud
  • Today's unique compliance challenges organizations face when operating in the cloud

2:25pm - 3:10pm  Networking Break

2:30pm - 2:55pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:10pm - 3:55pm  Breakout Session

Building Culture Bridges in Cyber

Rex Booth headshot

Rex Booth

Chief Information Security Officer

SailPoint

Nicole Ford headshot

Nicole Ford

Global VP & CISO

Rockwell Automation

The complexity of the cyber domain extends well beyond the technology. Navigating across cultures is essential to the success of any cyber initiative. International relations, the IT/OT gap, public/private partnerships, and diversity issues can all add layers of complexity. But by building bridges to join otherwise disconnected groups, your initiatives can be more successful with more durable results. 

Join Nicole Ford, CISO at Rockwell Automation, and Rex Booth, CISO at SailPoint, as they: 

  • Explore just some of the many cultural disconnects in the our domain
  • Consider how best to close those gaps
  • Determine which practices lead to long-term change for you and your organization

3:10pm - 3:55pm  Breakout Session

De-mystifying AI for Threat Detection and Response

Hitesh Sheth headshot

Hitesh Sheth

CEO

Vectra AI

Let’s face it - Not all AI is created equal. But when used properly, data science and AI can turn the tables on cyberattacks in favor of defenders. During this session, we’ll navigate the merits of the dominant AI methodologies, dispel misconceptions, consider the impact of Generative AI and LLMs, and unveil how AI can transform the SOC away from manual and mundane tasks and empower analysts to stay ahead of the evolving threat landscape.

Join Hitesh Sheth, Chief Executive Officer at Vectra AI, to discover:

  • Key differences in AI methodologies and which work best for threat detection
  • How integrated signal reduces alert noise and surfaces real threats
  • Why AI is key to empowering humans to move at the speed of hybrid and multi-cloud attackers

3:10pm - 3:55pm  Executive Boardroom

A Modern Strategy for Securing Data in the Cloud

Aaron Cockerill headshot

Aaron Cockerill

Chief Strategy Officer

Lookout

Ryan Boulais headshot

Ryan Boulais

CISO

AES Corporation

Susan Koski headshot

Susan Koski

CISO

PNC

The world has changed, but have your security policies and tools kept up? Are they fit for a world with a hybrid workforce accessing data primarily from the cloud? Organizations need to adapt and evolve as their data moves to the cloud, embracing change and enabling secure productivity, not locking data down.

In this interactive discussion, we will focus on:

  • The evolution of threats and breaches after digital transformation
  • Simplifying and simultaneously improving cloud-based data protection
  • The changing endpoint problem

3:10pm - 3:55pm  Executive Boardroom

Keepin' It Simple – Breaking Down Cloud Misconfigurations

Jonathan Trull headshot

Jonathan Trull

CISO

Qualys

Eric Hussey headshot

Eric Hussey

CISO

Aptiv

Tony Velleca headshot

Tony Velleca

CISO

UST

Jacob Lorz headshot

Jacob Lorz

Vice President & CISO

Cintas

Monitoring, alerting, immutable configurations are simple strategies that lead to security success. But why are we our own worst enemy?

Join this boardroom session with your global peers to dig in deeper on:

  • The persistent issues of insecure configurations such as IAM, alerting, monitoring logging and encryption
  • Misconfigurations that are consistently exploited in the real world
  • The why AND how to addressing all of the above

3:10pm - 3:55pm  Executive Boardroom

Elevating Security Through Risk and Compliance

Gil Geron headshot

Gil Geron

CEO & Co-Founder

Orca Security

Moses Bulus headshot

Moses Bulus

Global CISO

Bunzl

Erika Carrara headshot

Erika Carrara

CISO

Wabtec

The cloud security landscape never stops evolving. For the Global CISO, trying to keep pace will only get you so far. You'll need to stay ahead by highlighting risk, compliance, and collaboration strategies.

Join this gathering of your Global C-level peers to begin:

  • Navigating the challenge of prioritization between risk mitigation and compliance
  • Evaluating the effectiveness of security tools in complex cloud environments
  • Discovering ways to unify security and development teams

3:55pm - 4:10pm  Networking Break

4:10pm - 4:45pm  Keynote

No Looking Back — Embracing the Biggest Shift to Security & Networking

Sanjay Beri headshot

Sanjay Beri

CEO & Co-Founder

Netskope

Bob Schuetter headshot

Bob Schuetter

Chief Information Security Officer

Ashland

David Mahon headshot

David Mahon

Global Chief Information Security Officer

Deloitte

Whether it's where we work, the clouds, or devices used — the blend between personal, corporate, private, and public is ever-changing and presents us with a host of new challenges. This has complicated the attack surface many times over and the pressure to converge tools, quickly evaluate AI-based solutions, and do “more with less” is at peak levels. We must meet this watershed moment with the right team, plans, and technology.

Join this session to learn:

  • Technology trends that are driving emerging capabilities, including AI
  • Consolidation approaches that save money without sacrificing security
  • Real-world stories and use cases that deliver immediate value and efficiency

4:45pm - 6:30pm  Break

6:30pm - 7:15pm  Gala Reception

7:15pm - 8:00pm  Gala Dinner

8:00pm - 8:45pm  Keynote

1% Better, Every Day

Chris Nikic headshot

Chris Nikic

Athlete

Guest Speaker

Chris Nikic is an American athlete who made history by becoming the first person with Down Syndrome to complete a full Ironman triathlon. Since then, Chris has inspired people around the globe with his determination and unwavering tenacity. He continues to show others how shifting your focus from your disabilities to your abilities can help anyone achieve any goals they aspire to achieve.

In this session Chris shares how to:

  • Overcome personal and societal obstacles
  • Apply the 1% Better strategy and develop a success habit
  • Build a no-quit grit and success mindset to achieve the impossible


8:45pm - 9:30pm  Gala Social Hour

7:45am - 8:30am  Breakfast Service

8:30am - 9:15am  Keynote

Break the Attack Chain — The Importance of Integrated Threat Protection

Ryan Kalember headshot

Ryan Kalember

EVP, Cybersecurity Strategy

Proofpoint

Organizations worldwide are being faced with multistage attacks such as BEC, ransomware, and supply chain, that happen with the same basic steps in the same sequence. It’s been a decade since defenders began referring to this as the attack chain, but the attacks continue to successful with the same tactics, from phishing to Active Directory abuse to data exfiltration. So how do we finally turn the tables on adversaries, and take away what they depend across the attack chain?

Join this keynote as Ryan Kalember discusses:

  • Understanding the evolving nature of initial compromises
  • The art and science of preventing small compromises from becoming big incidents
  • Reducing your team's workload by using the attack chain to prioritize controls

9:15am - 9:35am  Networking Break

9:35am - 10:20am  Breakout Session

Bo(OT)strapped - Planning, Launching, and Perfecting Your Operational Tech Security Journey

Andrea Bergamini headshot

Andrea Bergamini

VP of IT, CISO

Orbia

Allan Cockriel headshot

Allan Cockriel

CIO - Global Functions / IRM, and CISO

Shell

Bill Podborny headshot

Bill Podborny

CISO

Constellation Brands

The fourth industrial revolution is well underway. Industrial sites, once safely air-gapped, are now sprawling with connected devices. Mix in other factors like cloud or remote access and it becomes clear: The CISOs jurisdiction is changing rapidly. Where organizations stand on this security journey may vary. Some may be in the early phases or still gathering leadership buy-in. Others may be further down the line, ready to share their successful practices.

Join this session and start understanding:

  • Your new or growing operational technology responsibilities
  • How to (and how NOT to) start or revamp your OT security journey 
  • What you can do to effectively bring IT and OT along on the journey

9:35am - 10:20am  Breakout Session

How Global CISOs are Driving Digital Transformation

John Spiegel headshot

John Spiegel

Field CTO, Network Transformation

Hewlett Packard Enterprise

Alex Green headshot

Alex Green

CISO

Delta Dental

Despite the challenges posed by organizational and technological silos that can occur with the global enterprise, the modern CISO is stepping up to the plate. Impactful digital transformation through intentional technology decisions can minimize organizational obstacles.

Join this session to discover:

  • Embracing digital transformation to stay competitive and secure in today's business world
  • Leveraging SASE to simplify your security architecture, level-up compliance monitoring and improve visibility globally
  • Driving meaningful change with a holistic approach that considers not just security, but also organizational culture, processes, and people

9:35am - 10:20am  Executive Boardroom

AI — The SOC Analyst's New Best Friend?

Augusto Barros headshot

Augusto Barros

VP, Cybersecurity Evangelist

Securonix

Vivek Kumar headshot

Vivek Kumar

Global Deputy Chief Information Security Officer

CBOE Global Markets Inc

Victor Campos headshot

Victor Campos

Chief Information Security Officer

JM Family Enterprises

Rajesh David headshot

Rajesh David

VP, Global CISO

Molex

With the emergence of new generative AI models such as OpenAI ChatGPT, there are now many initiatives across various industries to find new use cases and opportunities to leverage this technology. Cybersecurity is no different, and some technology providers are already launching new products and features based on Large Language Models (LLMs).

In this session we’ll discuss:

  • What are the use cases for LLMs and other generative AI systems in the Security Operations Center?
  • How can organizations leverage the technology without falling into the trough of disillusionment?
  • Where do we go from here, and what can the SOC expect from the future of AI?

9:35am - 10:20am  Executive Boardroom

Driving Real Value Through AppSec Processes and Tech

Trevor Young headshot

Trevor Young

Chief Product Officer

Security Compass

Jeff Johnson headshot

Jeff Johnson

Director, IT Security and Privacy

Digi-Key

Adam Keown headshot

Adam Keown

Global CISO

Eastman Chemical

Mary Rose Martinez headshot

Mary Rose Martinez

VP, CISO

Marathon Petroleum

CISOs and security leaders from across the globe have implemented a myriad of AppSec tools and processes. But its only by dissecting the efficacy of tools like SAST, DAST, and SCA; or processes like Threat Modeling and Pen Testing, that you’ll ever be able to determine which are actually delivering results. It’s time to address the issue through thoughtful exchange and leave with actionable insights.

Join this lively, closed-door discussion to:

  • Challenge your assumptions regarding these long-accepted processes
  • Share perspectives and gather understanding through the experiences of your fellow CISOs
  • Gain a fresh understanding of AppSec strategies

10:20am - 10:40am  Networking Break

10:40am - 11:50am  Innovation Spotlight

Innovation Spotlight - Ten Eleven Ventures

Meredith Harper headshot

Meredith Harper

Senior Vice President, Chief Information Security Officer

Synchrony Financial

Marcos Marrero headshot

Marcos Marrero

Chief Information Security Officer

H.I.G. Capital

Juan Gomez-Sanchez headshot

Juan Gomez-Sanchez

Global CISO

Whirlpool Corporation

Wasim Khaled headshot

Wasim Khaled

CEO

Blackbird.AI

Nick Lantuh headshot

Nick Lantuh

CEO & Co-Founder

Interpres Security

Chris Sestito headshot

Chris Sestito

Co-Founder & CEO

HiddenLayer

Be among the first to see what’s new and next in the security solutions landscape. Three early-stage providers will get the chance to showcase their innovative solutions to the most pressing cybersecurity challenges.

You'll hear from: 

  • Interpres Security
  • HiddenLayer
  • Blackbird AI

11:50am - 12:45pm  Lunch Service

12:45pm - 1:20pm  Keynote

The Business of Global Talent

Kirsten Davies headshot

Kirsten Davies

Global CISO

Unilever

Talent is a key engine for any company and cyber is no exception. In her keynote speech, Kirsten Davies, Global CISO, Unilever, will share why she’s passionate about using internal, external and unconventional talent pools to build and develop a sustainable global talent pipeline. 

Join this session and begin: 

  • Placing diversity and inclusivity at the core of everything you do
  • Breaking new ground and finding new ways of managing the holistic talent life cycle, enabled by advanced technology
  • Forging partnerships across the business to attract a new generation of talent from outside the core cyber function

1:20pm - 1:50pm  Closing Reception & Prize Drawing

September 11, 2023

September 12, 2023

September 13, 2023

We look forward to seeing you at an upcoming in-person gathering


Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

Four Seasons Hotel Nashville
MORE INFORMATION

A block of rooms has been reserved at the Four Seasons Hotel Nashville at a reduced conference rate. Reservations should be made online or by calling 615-610-6995. Please mention 'Global Executive Summit' to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $465 USD (plus tax) is August 11, 2023.

Your Community Partners


Global Thought Leaders
CISO Thought Leaders
Key Partners

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Kody Paine

Senior Community Program Manager

541-914-2330

kody.paine@evanta.com