Dallas CISO Executive Summit
May 17, 2022 | Marriott Allen Hotel and Convention Center
May 17, 2022
Marriott Allen Hotel and Convention Center
Collaborate with your peers
Get together with Dallas's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.
Join your peers to discuss the most critical issues impacting CISOs today:
Supporting business agility with risk-based programs
Evaluating, communicating and responding to evolving threats
Building a culture of security to enable smart, secure decision-making
Dallas CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.
Governing Body Co-Chairs
Sara Andrews
Experian
Global CISO
Mustapha Kebbeh
The Brink's Co
Global CISO
Mike Priest
Globe Life
CISO
Shamoun Siddiqui
Neiman Marcus
VP, CISO
Gary Toretti
CBRE
SVP, Chief Information Security Officer
What to Expect
Agenda
May 16, 2022
May 17, 2022
7:30am - 8:15am Registration & Breakfast
8:30am - 9:00am Keynote
Stress and the CISO — Practical Strategies to Mitigate Burnout
Hosted by AppOmni
Sheila Hamilton
Mental Health Thought Leader and Author of "All the Things We Never Knew"
Guest Speaker
Today’s CISOs face daunting challenges. It is a balance between fighting off increasingly sophisticated attacks, managing scarce resources, and working with stakeholders that often don't understand the inevitability of a breach. Since there continues to be a knowledge gap about the criticality of the CISO’s role, it is no surprise that they’re experiencing stress and burnout at unprecedented rates. How can CISOs make their careers sustainable and maintain a sense of well-being?
Join this keynote to explore:
- How to recognize the signs and symptoms of toxic stress and burnout
- How to remain engaged, energized, and focused during turbulent times
- Methods to reduce stress at work and how to not let the stress overlap into personal lives
9:00am - 9:30am Networking Break
9:30am - 10:15am Breakout Session
What If The Browser Was Designed For The Enterprise?
Hosted by Island
Mike Fey
CEO and Co-Founder
Island.Io
The application enterprises use the most is the browser. In fact, it has become our primary work environment, but the browser we most often use was built for consumers. So, we have surrounded it with an endless, complex and expensive stack that overwhelms your security teams and interrupts end users. But what if the browser was designed for the enterprise? What could that do for security, productivity and work itself?
Join this session to discover how an enterprise browser can:
- Protect critical SaaS and internal web applications
- Streamline and secure third-party contractor access and BYOD strategies
- Give you last-mile control to protect users’ activity with critical applications and underlying data
9:30am - 10:15am Breakout Session
Life After Breach
Hosted by HackEDU
Shamoun Siddiqui
VP, CISO
Neiman Marcus
There are two types of organizations — those that have been breached and those that will be. Data breaches may be inevitable and do not correlate with the maturity of cyber security programs. Financial services and defense organizations that spent hundreds of millions of dollars on building the most mature security programs still get breached. So what happens after a breach? Is there still life after a data breach?
Join Shamoun Siddiqui, VP, CISO, Neiman Marcus as he discusses:
- Leading and navigating your company through a data breach and what to do to prepare for it
- Communicating risk to the Board and building their confidence in your security program
- Challenges and best practices in managing major security events
9:30am - 10:15am Executive Boardroom
Deter Breaches and Build Resilience Within the Cloud
Hosted by ExtraHop
Mark Bowling
Vice President, Security Response Services
ExtraHop
Dewakar Garg
Sr. Director of Information Security & Compliance
Mavenir
Asif Effendi
Security Leader
Baker Hughes
While cloud providers will protect the security of the cloud itself, CISOs are often responsible for securing their infrastructure within the cloud. Attackers are aware of the visibility gaps in multi-cloud and hybrid environments. After they slip past perimeter defenses, they will work their way toward carrying out a costly breach or extortion, undetected until it’s too late.
Join this session to discuss:
- Key ways to reduce cyber risk and dwell time while building resilience
- The advanced attack techniques that bad actors rely on and how to spot them
- Strategies to increase the speed of detection and mitigation within cloud environments
9:30am - 10:15am Executive Boardroom
The Ongoing Fight to Secure Business Email
Hosted by Abnormal Security
Mike Britton
CISO
Abnormal Security
Paul Reyes
CISO, VP of Cyber Security, Risk, & Compliance
Vistra Corp
Mike Priest
CISO
Globe Life
Despite their efforts, from phishing simulations to security awareness campaigns, CISOs from organizations big and small keep falling short when it comes to stopping Business Email Compromise (BEC) attacks. But, if everyone has an email security program, why are the losses associated with BEC still climbing?
Join this session to discuss:
- What is working, or not working, with existing processes and technology?
- How do we solve the “human factor” in the equation?
- Best practices for preventing loss related to a BEC attack?
10:15am - 10:45am Networking Break
10:20am - 10:45am Peer-to-Peer Meetings
Peer-to-Peer Meetings
Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.
10:45am - 11:30am Breakout Session
Taming the Beast: Identities and Access-Based Threats in your Cloud Infrastructure
Hosted by Ermetic
Toby Buschini
Vice President of Worldwide Sales
Ermetic
Anand Singh
SVP, CISO
Alkami
Dan Luera
Hosting Architect
Tyler Technologies
Marlo Bell
Azure Platform / Security Principle Architect
ExxonMobil
Cloud identities and entitlements are no longer something you can ignore. With the explosion in the numbers of human and service identities across cloud environments such as AWS, Azure, and Google Cloud, uncontrolled access permissions are one of your largest attack surfaces and determine your blast radius in case of a breach. Excessive entitlements - defined intentionally or unwittingly - can lead to accidental or malicious use, exposure of sensitive data, and more.
Join this panel session to discuss:
- Why identities are the new security beast to tame in cloud infrastructure environments
- Why monitoring and restricting permissions must be core to every security program
- Fresh views on using automation to remediate risk
10:45am - 11:30am Breakout Session
The Foolproof Way to Solving The Great Resignation
Hosted by Balbix
Patrick Benoit
VP, Global Cyber GRC / BISO
CBRE
The truth is, there's not one. The phenomenon that is the Great Resignation, and the worries that surround it - talent and skills shortages, hiring and retention dilemmas, etc. - all have left CISOs scratching their heads looking for a solution. In this interactive session, you'll join CISOs that might be thinking similarly (or differently) about the daily scenarios you face when navigating through the Great Resignation.
Join this interactive session in small groups to debate and collaborate on team building scenarios including:
Keeping the right people – thinking beyond just retention
Mentoring a multigenerational workforce – creating operational excellence
Exploring employee potential – diversifying skill sets
10:45am - 11:30am Executive Boardroom
Modernizing Advanced Threats Through Automation
Hosted by Hunters
Andrew Bryan
Head of Field Engineering, Hunters.ai
Hunters.ai
Robert Pace
VP, CISO
Invitation Homes LP
Sonya Wickel
CISO & Sr. Director, Compliance
Triumph Group
Between skills shortages and the escalating sophistication of threats, security teams are looking beyond SIEM to overcome data volume, complexity, and false positives. CISOs need new approaches to data ingestion and retention, and automation of threat detection/response for increased SOC efficiencies.
Join this session to discuss:
- How SOCs are leveraging automation to improve their threat detection and incident response practices
- How to cover the entire attack surface at a predictable, manageable cost for better security outcomes
- Ways to incorporate MITRE-ATT&CK and MITRE-D3FEND framework into threat detection and response
10:45am - 11:30am Executive Boardroom
Securing Sprawl – Mitigating Risk
Hosted by Noname Security
Matt Tesauro
Distinguished Engineer
Noname Security
Jeff Kirby
CISO
Interstate Batteries
Parrish Gunnels
SVP, IT Risk Management Director/CISO
Sunflower Bank
As business and technology teams drive cloud adoption and implement modern application architectures, the security vulnerabilities of the sprawling IT stack multiply as visibility dwindles. Now is the time to explore new applications and API security strategies to proactively reduce risk, secure the environment, and capitalize on cloud-native capabilities to meet these challenges.
Join this boardroom to discuss:
- Establishing effective vulnerability management and application security programs
- Moving from a reactive to a proactive security posture
- API governance and security challenges and opportunities
10:45am - 11:30am Executive Boardroom
Zero Trust – Hype or Hope?
Hosted by IBM
KC Condit
CISO
G6 Hospitality
Matt Cass
Partner
IBM Security
Ashok Kakani
Director of Security
Voya Financial
An organization's ability to achieve successful digital transformation is in large part enabled by the security team. Distributed, loosely connected infrastructure and tools, coupled with the demand for almost any-to-any connectivity, complicates the mission. Regularly defined as being delivered by a single "silver bullet" point solution, the term zero trust is now often held in poor regard. It is however, a highly effective conceptual framework, and perhaps even a cultural shift, that many organizations have been working with for several years.
Join this interactive boardroom to discuss:
- The broader definition of what a zero trust framework is
- The foundational control required to build a zero trust program
- Strategies for improving the user experience and proving value to get organization-wide acceptance
11:30am - 11:40am Break
May 16, 2022
May 17, 2022
Location
Venue & Accommodation
Marriott Allen Hotel and Convention CenterParking
The Marriott Dallas Allen Hotel utilizes a mobile device payment system for parking, which allows parkers the convenience of paying for their parking on their phone and not wait in line at a gate when departing the garage. Please be sure to follow the instructions below when you arrive at the property, which are also posted on signs throughout the parking lot. The daily parking rate is $10 per vehicle. Electric charging stations are also available.
Text D2 to 214-466-2159
You will receive a link where you can select either Day Parking over Overnight Parking.
Day Parking (non-overnight guest):
1. Complete the required fields including name, license plate, etc.
2. The next screen will prompt them for departure date (same day) and time (time can be estimated). If Day Parkers are traveling to the hotel over multiple days, they will need to register their license plate each day. Validation line should remain blank.
3. On this screen, Day Parkers can enter credit card information for payment.
Overnight Parking:
1. Complete the required fields including name, license plate, departure date/time, etc.
2. Your parking charges will be added to your guest room reservation.
Health & Safety Local Guidelines
To ensure the well-being of participants, partners, and associates, we will continue to monitor and adhere to government, venue, and health agency guidelines.
As a part of our commitment to create the safest possible environment, we are requiring all participants, partners, and associates to be fully vaccinated to participate in in-person programs, in addition to confirming adherence to our program attendance requirements before their arrival. Please refer to our COVID-19 Health and Safety Policy for up-to-date local guidelines.
A block of rooms has been reserved at the Marriott Allen Hotel and Convention Center at a reduced conference rate. Reservations should be made online or by calling 469-675-0800. Please mention Dallas Executive Summit to ensure the appropriate room rate.
Deadline to book using the discounted room rate of $154 USD (plus tax) is April 29, 2022.
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.