Atlanta CISO Executive Summit
June 24, 2019 | The St. Regis Atlanta
June 24, 2019
The St. Regis Atlanta
Collaborate with your peers
Get together with your peers to tackle top business challenges through peer-driven content and discussions at the Atlanta CISO Executive Summit.
Join your peers to discuss the most critical issues impacting CISOs today:
Strategies for a risk-aligned, resilient organization
Developing and investing in the security workforce of tomorrow
Creating business value and supporting agile business operations
Atlanta CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.
Governing Body Co-Chairs
Tim Callahan
Aflac
Global Chief Security Officer
John Dickson
Republic National Distributing Company
VP, IT Infrastructure & Cybersecurity
Lynda Fleury
Unum Group
VP & Global CISO
David Levine
Ricoh USA, Inc.
VP, Corporate and Information Security, CSO
Linda Marcone
Serta Simmons
Director Information Security
Vladimir Svidesskis
Georgia Lottery
Information Security Director
Dan Webber
UST Global
CISO
Agenda
June 24, 2019
7:30am - 8:05am Registration & Breakfast
8:05am - 9:10am Keynote
Criminal Perspectives – Past, Present and Future of Cybercrime
Hosted by Trend Micro Incorporated
Brett Johnson
Former US Most Wanted Cybercriminal and Original Internet Godfather
If you want to know about crime, ask a cybercriminal. Join "The Original Internet Godfather" Brett Johnson for a one-of-a-kind presentation on security and leadership in the new threat landscape. Considered one of the best social engineers in the world, he will share how he learned to live on the right side of the law.
In this keynote, Brett will dive into:
- The current state of crime and common flags, from synthetic fraud to account takeovers.
- The power of organized networks – for good or harm – and ways to disrupt criminals.
- What’s next, and what you can do to protect yourself and your business.
9:10am - 9:40am Networking Break
9:40am - 10:30am Breakout Session
The CISO Role — Where do we Belong?
David Levine
VP, Corporate and Information Security, CSO
Ricoh USA, Inc.
Vladimir Svidesskis
Information Security Director
Georgia Lottery
As the CISO role continues to evolve year-over-year, hear from your peers to see what their reporting structure looks like. Is your current alignment the right alignment or is it time for a change?
In this panel discussion, you’ll cover:
- How other companies structure their org chart
- Security as a culture that is emulated by the leadership team
- Change management when redirecting your structure
9:40am - 10:30am Breakout Session
Securing an Ever Expansive Network of Vendors
Hosted by SecurityScorecard
Marc Moesse
Vice President, Product Management
SecurityScorecard
Is your organization prepared to handle the additional threat exposure that comes from expanding business networks? Hear from Marc Moesse as he shares how to determine where you stand on third party risk maturity and next steps in increasing your third-party cyber resiliency.
This session will explore:
- Finding the right balance between depth and breadth of your third-party risk program
- Leveraging all the organization's resources for adoption
- Methods to manage your fourth party risk
9:40am - 10:30am Executive Boardroom
Protecting Your VIPs, and Your VAPs (Very Attacked People) Too
Hosted by Proofpoint
John Dickson
VP, IT Infrastructure & Cybersecurity
Republic National Distributing Company
Hmong Vang
CISO
Kindred Healthcare, Inc.
Lucia Milica
Resident CISO
Proofpoint
For years, we’ve seen attackers target organizations via their people. Now with fewer reliable exploits and more cloud adoption, we’re also seeing a shift toward attacks that exploit people, with threat actors tricking their targets into running their malware for them, handing over their credentials, or simply sending data or money to an impostor. Lucia Milica of Proofpoint will outline strategies for gaining visibility and mitigating risk in a people-centric threat landscape.
Join to learn:
- Why nearly all threat actors have shifted away from technical exploits to compromise their targets
- How organizations can leverage threat data to understand which people and departments are highly targeted
- How to design effective protection for highly attacked, highly vulnerable, and highly privileged users
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact your event Program Manager, Zack Hellmann at zack.hellmann@evanta.com.
9:40am - 10:30am Executive Boardroom
Securing the Business Transformation Process
Hosted by Imperva
Katie Ewers
Director, Cybersecurity Active Defense
McKesson Corporation
Bob Varnadoe
CISO
NCR Corporation
Tim Chang
VP of Sales Engineering
Imperva
Cybersecurity is a never-ending arms race between bad actors and IT and security teams. The attackers haven’t just grown stronger, the attack surface is growing apace. With that, most companies are currently engaged in a digital transformation, but as you invest in new technologies and move workloads to the cloud the threat surfaces are also evolving and expanding.
In this boardroom we will discuss:
- How security can help enable the business transformation your company is undertaking
- Ways to use security analytics to enable your cloud journey
- Challenges with maintaining consistent visibility during the transformation
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact your event Program Manager.
10:30am - 10:50am Networking Break
10:50am - 11:40am Breakout Session
Control and Automate What You Can to Focus on Value-Creation
Hosted by BlackBerry
Will Alexander
VP, Information Systems
RaceTrac Petroleum, Inc.
Brian Mauter
Director Information Systems
RaceTrac Petroleum, Inc.
At RaceTrac Petroleum, like most enterprises, the IT workload has not decreased, but the demand for IT to help the business grow has increased. The company’s IT leadership came to a simple conclusion: automate utility tasks they can control and focus resources on initiatives that create value. This session explores:
- RaceTrac’s approach to becoming a more productive IT function and optimizing its value to the business
- How IT enhanced morale across business functions by including managers and senior engineers to determine where automation could eliminate barriers
- How the business and IT are building an effective self-service model to reduce bottlenecks
- What was done to get buy-in from the security side of the house to minimize skepticism around risks related to automation
10:50am - 11:40am Breakout Session
Think Differently about Data - Succeed at Threat Hunting & IR
Hosted by ExtraHop
Matt Cauthorn
VP of Security
ExtraHop
Two pillars of a successful and proactive SOC are threat hunting and incident response. The use of network traffic analysis can help improve performance in these two areas, if you can trust the data.
In this session, you will learn:
- Current attack practices, including abuse of legitimate traffic and encryption
- How hunters hide from attackers to avoid counter IR maneuvers
- Ways to make analysts faster and more effective at validating and responding to threats
- Options for empowering cross-training and on-the-job training to increase analysts' skills
- Clarity on how gaining visibility into cloud and encrypted traffic
10:50am - 11:40am Executive Boardroom
Managing the Convergence of Global Data Protection Regulation
Hosted by PKWARE, Inc.
Jim Miles
VP, Information Security
PGi
David Nolan
Director Information Security
Aaron's Inc.
Miller Newton
President and CEO
PKWARE, Inc.
GDPR caused organizations to scramble to meet data protection regulations and reassess their risk management through new compliance reporting requirements and potential exposure to financial penalties. Now California has its own Privacy Act set to come into effect, and it’s one of potentially many different pieces of forthcoming regulation and policy. How can organizations create a unified data protection and compliance strategy that meets conflicting requirements?
In this session, discuss:
- Best practices for managing risk associated with data protection frameworks
- Standards and metrics for measuring data protection risk
- Tools to meet compliance reporting requirements
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact your event Program Manager Zack Hellmann at zack.hellmann@evanta.com.
10:50am - 11:40am Executive Boardroom
Maintaining Agility in the Secure Enterprise
Hosted by Duo Security
John Diaz
Head of Information Security
ThyssenKrupp
Wes Knight
CISO
Georgia Department of Revenue
Wolf Goerlich
Advisory CISO
Duo Security
What tactics and technologies are effective in securing the enterprise without putting up barriers to business operations? In this interactive roundtable discussion, security leaders share strategies that maximize security while minimizing business bottlenecks.
In this session, security leaders will:
- Define shared pain points where security controls are slowing business processes
- Share ideas and best practices for reducing friction from security controls
- Address ways to gain buy-in across the business when bottlenecks are unavoidable
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact your event Program Manager, Zack Hellmann at zack.hellmann@evanta.com.
June 24, 2019
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.