Detroit CISO Executive Summit
November 13, 2018 | The Cobo Center
November 13, 2018
The Cobo Center
Collaborate with your peers
Get together with your peers to tackle top business challenges through peer-driven content and discussions at the Detroit CISO Executive Summit.
Join your peers to discuss the most critical issues impacting CISOs today:
Strategies for a risk-aligned, resilient organization
Developing and investing in the security workforce of tomorrow
Creating business value and supporting agile business operations
Detroit CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.
Governing Body Co-Chairs
Rich Armour
General Motors Company
CISO
Martin Bally
Diebold | Nixdorf
VP & CSO
Derek Benz
Ford Motor Company
CISO
Brent Cieszynski
Blue Cross Blue Shield of Michigan
VP & CISO
Earl Duby
Lear Corporation
CISO
Russ Gordon
BorgWarner
CISO
Mauricio Guerra
DowDuPont
Director of Global Information Security
Tabice Ward
DTE Energy
Director & CISO
Erik Wille
Penske Automotive
Head of Information Security
Agenda
November 13, 2018
7:00am - 7:45am Registration & Breakfast
7:45am - 8:30am Keynote
Lear and Mcity’s Battles Against Vehicle Cyberthreats
Hosted by PwC
Andre Weimerskirch
VP Cyber Security, Mcity Cybersecurity Group Chair
Lear Corporation
All automotive stakeholders face challenges to develop secure vehicles and components. The latest threat research from the University of Michigan’s Mcity project can support your own cybersecurity threat assessment program.
Andre Weimerskirch covers the latest from connected and automated vehicle cybersecurity from his experience at Lear and Mcity:
- A review of the current cyberthreat landscape as it applies to connected and automated vehicles
- Guidance from the recently developed Mcity Threat Identification Model and Lear’s risk assessment model
- Overview of the big cybersecurity challenges and solution approaches
8:30am - 9:00am Networking Break
9:00am - 9:50am Breakout Session
Product Incident Response
Hosted by Cylance
Martin Bally
VP & CSO
Diebold | Nixdorf
In an era when almost every electronic device gathers and stores potentially sensitive information, organizations face the daunting task of securing their devices with the same vigor they would use to secure their internal networks. Join Martin Bally to learn how Diebold | Nixdorf is extending its security footprint to manage and monitor a swath of connected products worldwide, including:
- Visualization techniques to evaluate a global threat landscape
- Ways to integrate product security into an incident response framework
- Techniques to gain buy-in across the organization for an expanded program
9:00am - 9:50am Breakout Session
AI and Machine Learning — Potential Successes and Security Risks
Hosted by Fortinet, Inc.
James Cabe
Principal Systems Engineer
Fortinet, Inc.
Security vendors, infosecurity specialists and cybersecurity professionals claim to use artificial intelligence and machine learning to defend customers against the most advanced threats in cybersecurity. But if you ask how these technologies work, answers can be vague or misleading.
In this session, you will learn how:
- The mechanics of artificial intelligence and machine learning work, exploring how different techniques can be used to detect malware, malicious domains, phishing emails and other threats
- Technologies can potentially fail
- Attackers can use technologies to infiltrate poorly designed or implemented systems.
9:00am - 9:50am Executive Boardroom
CISO as a Human Translator — Translating Security Risk into Business/Board Speak
Hosted by Cisco Systems, Inc.
Shawn Campbell
CISO
Ciena Healthcare Inc
Geeta Kapoor
Director of Cybersecurity (CISO)
Federal-Mogul Powertrain, Inc.
Stewart Tan
Consulting Principal Director
Cisco Systems, Inc.
The role of the CISO has fast evolved beyond its traditional operational functions of monitoring, repelling and responding to cyber threats to that of one who can enable the business. More specifically, enable the business to take secure risks. As a growing number of boards are making the topic of cybersecurity a central part of their discussions, the need for CISOs to provide them with visibility into and to clearly articulate how risk is being managed in well-defined business terms (board speak) has become fundamental. Join this roundtable discussion to share ideas and strategies on how to effectively communicate risk and other key related factors with your board.
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).
To reserve your seat, please contact:
Nathan Schulz at 971-717-6675 or Nathan.schulz@evanta.com
9:50am - 10:20am Networking Break
10:20am - 11:10am Breakout Session
Engage, Enlist and Optimize Your Security Stakeholders
Christy Wheaton
CISO
Meritor
Security leaders are constantly looking for the next step forward toward a better security posture. Yet what does it take to effectively analyze and act on the most important and complex asset of all — people? Christy Wheaton shares her methodology to develop a concrete action plan for key security stakeholders, covering:
- Engaging your security “team”— beyond your direct reports
- How to measure and plot stakeholder engagement
- Strategies to optimize engagement and improve overall security posture
10:20am - 11:10am Breakout Session
A Deep Dive into the DNA of Modern IoT Attack Botnets
Hosted by Radware
Ron Winward
Security Evangelist
Radware
The majority of modern IoT-based attack botnets have uniquely common DNA; they use part of the Mirai code in their framework. While device exploitation techniques remain innovative, the attack vectors themselves are typically reused, making it possible for CISOs to outsmart these botnets.
Join this session to take a meaningful look at IoT attack botnets. You’ll learn about:
- The different attack vectors in IoT botnets
- How attack vectors replicate
- What changes have been implemented in new IoT attack botnets
10:20am - 11:10am Executive Boardroom
Achieving Next-Level Security Through Automation
Hosted by ServiceNow
Piero DePaoli
Senior Director, Security Business Unit
ServiceNow
Rajiv Das
Chief Security Officer & Deputy Director
State of Michigan
Kevin McLaughlin
Global Security Officer & Deputy CISO
Stryker Corporation
Security teams face a significant challenge in tackling the routine tasks necessary to monitor threats to their organization. What would it mean to free up these staff resources to focus on more strategic challenges? Join your peers to discuss the role of automation in cybersecurity, including:
- How does your organization view automation in the context of talent shortages?
- What are the types of tasks in your security program are you automating, considering automating, or never automating?
- How do you measure current and future efficiency as you deploy automation?
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).
To reserve your seat, please contact:
Nathan Schulz at 971-717-6675 or Nathan.schulz@evanta.com
11:10am - 11:40am Networking Break
November 13, 2018
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.