
Boston CISO Executive Summit
May 7, 2019 | InterContinental Boston
May 7, 2019
InterContinental Boston
Collaborate with your peers
Get together with your peers to tackle top business challenges through peer-driven content and discussions at the Boston CISO Executive Summit.
Join your peers to discuss the most critical issues impacting CISOs today:
Strategies for a risk-aligned, resilient organization
Developing and investing in the security workforce of tomorrow
Creating business value and supporting agile business operations
Boston CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.
Governing Body Co-Chairs

Kevin Brown
Boston Scientific
CISO

Brian Haugli
Recognized Industry Expert

Larry Jarvis
Iron Mountain
CISO
Taylor Lehmann
Tufts Medical Center
CISO, Wellforce

Michael McNeil
Philips Healthcare
Global Product Security & Services Officer

Holly Ridgeway
Citizens Bank
Chief Security Officer
Agenda
May 7, 2019
7:00am - 7:45am Registration & Breakfast
7:45am - 8:30am Keynote
What's Trust Got to Do With It?
Hosted by Cofense, formerly PhishMe

David Horsager
CEO and Best-Selling Author, "The Trust Edge"
Trust is both a fundamental business issue and the biggest asset of a company. Without trust, companies lose reputations, relationships, and revenue. With trust, organizations enjoy greater creativity, productivity, and results. Through extensive research and experience, David Horsager learned what it takes to gain — and keep — the “Trust Edge.”
Join this session as Horsager outlines:
- The keys to building morale, sales, and customer loyalty
- His Eight-Pillar Framework for building trust in an organization
- Creating successful leaders and organizations centered on the tenants of trust
9:00am - 9:50am Breakout Session
Securing Success – Principles of a Sound Cyber Program

Esmond Kane
Deputy CISO
Partners HealthCare
Running a strong security program requires a fail-fast mindset and the right people at the helm. The best programs are collaborative, agile and business focused – just like the people who run them.
In this session, you’ll explore:
- Principles for designing a sound security program
- A staffing strategy to hire the right people
- Survival tactics when things go wrong
9:00am - 9:50am Breakout Session
Develop Metrics That Influence Business Decision Making
Srinath Sampath
Senior Director, Analyst
Gartner
Security and risk management leaders are always trying to improve their metrics to better inform organizational decision making. However, aligning with the business is still a challenge for most. Key risk indicators should provide actionable information to decision makers.
In this session, you'll learn how to:
- Define what makes a metric actionable
- Create a relationship between security and business outcomes
- Present risk & security metrics to business decision makers
9:00am - 9:50am Executive Boardroom
Managing the Convergence of Global Data Regulations
Hosted by PKWARE, Inc.
Steven Keller
AVP, Chief Information Security Officer
MAPFRE

Joe Sturonas
CTO
PKWARE, Inc.
Information security leaders navigate an increasingly complex matrix of national and foreign data privacy regulations. GDPR caused organizations to scramble to meet data protection directives and reassess risk management through new compliance reporting requirements and potential exposure to financial penalties. Now California has its own Privacy Act set to come into effect, and it’s one of potentially many different pieces of forthcoming regulation and policy. How can organizations create a unified data protection and compliance strategy that meets conflicting requirements?
In this session, discuss:
- The current landscape of data privacy regulation around the world
- Best practices for managing risk associated with data protection frameworks
- Standards and metrics for measuring data protection risk
- Data classification strategies to aid compliance, regardless of regulation
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact your event Program Manager.
9:50am - 10:20am Networking Break
10:20am - 11:10am Breakout Session
Handing Over the Reins on Risk — To Your Business
Hosted by Attivo Networks

Bill Hill
CISO
MITRE
Traditionally, CISOs have been responsible for assessing and managing organizational risk. They decide how much risk an enterprise can shoulder. But what if security leaders released that control and business units took ownership instead?
In this session, Bill Hill shares how to:
- Improve risk management by involving the business in decision making
- Challenge the traditional security mindset
- Evolve your security program alongside the business
10:20am - 11:10am Breakout Session
How to Discover Cloud Shadow IT Infrastructure
Hosted by Expanse

Matt Kraning
Co-Founder and CTO
Expanse
The move to the cloud has led to great increases in agility and cost savings in information technology, but it's enabled employees to evade centrally-mandated security controls, unlike in on-premise environments.
In this session,you’ll explore:
- Risks of shadow cloud infrastructure
- Lessons from relevant cases studies
- Techniques to identify rogue cloud assets and prevent them from being created
10:20am - 11:10am Executive Boardroom
The People Problem — Security Awareness Training

Bobbi Bookstaver
Manager Information Security
Shawmut Design and Construction

Joe Burgoyne
Sr. Director, Cyber Security
GE Healthcare Bio-Sciences
Even as security tools become increasingly advanced, the biggest vulnerability in a company continues to be its people. With attacks on the rise, executives must make employee training even more sophisticated.
In this boardroom, you’ll:
- Discuss different educational approaches with your peers
- Determine how to evaluate the level of training needed
- Identify key training components and methods of measuring their efficacy
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact your event Program Manager.
10:20am - 11:10am Executive Boardroom
Modernizing Your SOC
Hosted by Securonix

Alex Cunningham
CISO
Advisor360

Jon Fredrickson
ISO
Blue Cross and Blue Shield of Rhode Island
Sudhir Udipi
Director, Systems Engineering, CISSP, GCNA, GCFA
Securonix
When it comes to taking your data from you, cyber criminals never rest. If they can’t get in one way, they will try another. A sound Security Operations Center - staffed by the right people and with the right tools - should be a key part of your cyber defense strategy.
In this session you will discover how to:
- Effectively develop your team
- Automate to reduce workloads and drive efficiency
- Equip SOC teams to operate within BYOD and Cloud
- Create strong KPIs and KRIs to measure success
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact your event Program Manager.
11:10am - 11:40am Networking Break
May 7, 2019
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.