Dallas CISO Executive Summit
June 24, 2019 | Renaissance Dallas
June 24, 2019
Renaissance Dallas
Collaborate with your peers
Get together with your peers to tackle top business challenges through peer-driven content and discussions at the Dallas CISO Executive Summit.
Join your peers to discuss the most critical issues impacting CISOs today:
Strategies for a risk-aligned, resilient organization
Developing and investing in the security workforce of tomorrow
Creating business value and supporting agile business operations
Dallas CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.
Governing Body Co-Chairs
Sara Andrews
PepsiCo
SVP, Global CISO
Jason Frugé
Fossil
Chief Information Security Officer
Parrish Gunnels
Fiserv
Director, Information Security Officer
Jairo Orea
Kimberly-Clark
CISO
Shamoun Siddiqui
Neiman Marcus Group
CISO
Duaine Styles
Globe Life
CSO
Agenda
June 24, 2019
7:30am - 8:15am Registration & Breakfast
8:15am - 9:00am Keynote
Develop an Eye for ROI
Hosted by Kenna Security
Jason Frugé
Chief Information Security Officer
Fossil
Mustapha Kebbeh
Global CISO
The Brink's Company
In this interactive session, CISOs from organizations across the size spectrum will split into small groups to share their most creative solutions for stretching their resources as far as possible. Join this session to collaborate on your peers and share your high-impact initiatives for:
- Retaining, attracting and developing security talent
- Effective incident response
- Impactful security awareness training
- Unique, creative security strategies
9:10am - 10:00am Breakout Session
Leading in the C-Suite — Bolster Your Executive Presence
Hosted by Attivo Networks
Andrew Albrecht
CISO
Michaels
Chuck Lankford
CISO
The Container Store
Mike Tiddy
CISO
BNSF Railway Company
Caught in the crosshairs of leadership and information security, CISOs often are expected to act not only as security professionals, but business leaders. How can CISOs effectively become bold c-suite leaders while also juggling their security demands?
Join this interactive session to explore:
- How to tailor communication styles to senior leaders
- Ways CISOs can gain the trust of their c-suite
- How to prepare for stepping into the CISO role
- The leadership capabilities necessary for being an effective CISO
9:10am - 10:00am Breakout Session
Think Differently About Data — Succeed at Threat Hunting & IR
Hosted by ExtraHop
Tom Roeh
Director of Sales Engineering
ExtraHop
Two pillars of a successful and proactive SOC are threat hunting and incident response. The use of network traffic analysis can help improve performance in these two areas, if you can trust the data.
In this session, you will learn:
- Current attack practices, including abuse of legitimate traffic and encryption
- How hunters hide from attackers to avoid counter IR maneuvers
- Ways to make analysts faster and more effective at validating and responding to threats
- Options for empowering cross-training and on-the-job training to increase analysts' skills
- Clarity on how gaining visibility into cloud and encrypted traffic
9:10am - 10:00am Executive Boardroom
Cyber-Risk Management — New Approaches for Reducing Your Cyber-Exposure
Hosted by Tenable
Mustapha Kebbeh
Global CISO
The Brink's Company
Robert Pace
Vice President, Information Security & Compliance
First American Payment Systems
Kevin Flynn
Senior Product Manager
Tenable
When it comes to reducing cyber risk, overcoming vulnerability overload is critical. Find out how predictive prioritization will improve your vulnerability management efforts so you can focus on what matters most to your business. During this peer-discussion you will explore:
- How to use threat intelligence to move the most dangerous vulnerabilities up your priority list
- The resources required to effectively assess your environment and prioritize your efforts in a predictive manner
- Practices that will help you take appropriate actions to make your organization more secure
- How to make your staff more efficient by drastically reducing the number of high priority vulnerabilities they need to remediate
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact Lawrence Figueroa at 971-222-2374 or lawrence.figueroa@evanta.com.
9:10am - 10:00am Executive Boardroom
The Continual Shifting of Threats
Hosted by Illusive Networks
David Bell
CISO & Managing Director - Information Security & Technology Risk Management
American Airlines
Gary Todd
Assoc. Director, Cyber Security
PNM Resources, Inc.
Chad Gasaway
Director, Solutions Architecture
Illusive Networks
Whether it’s cybercriminals motivated by profit or nation-state attackers with geopolitical motives, public and private organizations of all sizes have felt the impact of cyberattacks. Enterprise organizations are reeling from the onslaught of massively spread ransomware attacks to surgical pinpointed attacks on their assets from sophisticated state-sponsored actors. How can CISOs best face changing threat vectors?
Join this roundtable conversation to discuss:
- The current threat landscape
- How to best discover and thwart nation-state attacks
- What security executives can do to build resiliency
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact Lawrence Figueroa at 971-222-2374 or lawrence.figueroa@evanta.com.
10:00am - 10:30am Networking Break
10:30am - 11:20am Breakout Session
You’ve Been Compromised – Now What?
Sailaja Kotra-Turner
Senior Director, IT Security and Risk Management
Brinker International
Duaine Styles
CSO
Globe Life
When an incident happens, things unfold in a frenzy. The board wants to know what happened. There may be financial and legal implications and disclosures required. Your security team wants to know what to do. How do you keep your organization together when the inevitable happens?
In this session, two security leaders discuss:
- Best practices for creating a well-rounded response plan that accounts for legal and regulatory requirements
- How to collaborate with your entire leadership team, including marketing, public relations, HR and legal teams
- Ways to support your CISO peers when they weather a breach
10:30am - 11:20am Breakout Session
Phishing Defense — The Art of Human Intuitive Repulsion
Hosted by Cofense, formerly PhishMe
Andy Spencer
VP Sales Engineering
Cofense
As intuitive human beings we often somehow sense when things aren’t quite right. When a newborn is “too quiet,” a sixth-sense can be more reliable than a baby monitor. What applies to life also applies to cybersecurity. Machine learning and artificial intelligence can weed out some of the threats, but they won't catch everything. Find out why trusting your gut – knowing when to say something when you see something – is a key part of any organization's phishing defense. In this session:
- Discover security trends, threat-actor tactics and defense strategies across the globe
- Learn the types of actual phishing attacks
- See how attackers evolve their tactics to avoid perimeter controls
10:30am - 11:20am Executive Boardroom
Modernizing Your SOC
Hosted by Securonix
George Finney
Chief Security Officer
SMU Cox School of Business
Gary Toretti
SVP, Chief Information Security Officer
CBRE
Tanuj Gulati
CTO
Securonix
When it comes to taking your data from you, cyber criminals never rest. If they can’t get in one way, they will try another. A sound Security Operations Center - staffed by the right people and with the right tools - should be a key part of your cyber defense strategy.
In this session you will discover how to:
- Effectively develop your team
- Automate to reduce workloads and drive efficiency
- Equip SOC teams to operate within BYOD and Cloud
- Create strong KPIs and KRIs to measure success
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact Lawrence Figueroa at 971-222-2374 or lawrence.figueroa@evanta.com.
10:30am - 11:20am Executive Boardroom
Dissecting Recent Breaches and Ensuring Cyber Resiliency
Hosted by Onapsis, Inc.
Jason Frugé
Chief Information Security Officer
Fossil
Jessica Nemmers
Manager of Information Security
Commercial Metals
Alex Horan
Director of Product Management
Onapsis
In April 2019, the Department of Homeland Security issued an alert citing "New Exploits for Unsecure SAP Systems" after new exploits, termed "10KBlaze" were publicly released. While protecting endpoint access, phishing, and network monitoring is important, nothing else matters if your core business applications are not a primary strategic component. In this session, we will explore:
- Why and how ERP applications are actively under attack
- How cloud, mobile and digital transformations are expanding the attack surface
- Steps you can take to ensure cyber resiliency and mitigate risk
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact your event Program Manager.
June 24, 2019
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.