
Houston CISO Executive Summit
June 26, 2019 | The Post Oak Hotel at Uptown Houston
June 26, 2019
The Post Oak Hotel at Uptown Houston
Collaborate with your peers
Get together with your peers to tackle top business challenges through peer-driven content and discussions at the Houston CISO Executive Summit.
Join your peers to discuss the most critical issues impacting CISOs today:
Strategies for a risk-aligned, resilient organization
Developing and investing in the security workforce of tomorrow
Creating business value and supporting agile business operations
Houston CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.
Governing Body Co-Chairs

Mike Coogan
Waste Management
Senior Director, Cybersecurity

Angelique Grado
MRC Global
CISO

Paul Huttenhoff
CenterPoint Energy, Inc.
CISO

Steve Neiers
Chevron Corporation
GM, Info. Risk Strategy & Mgmt.

Derek Rude
Weatherford International
Director, IT Security

Genady Vishnevetsky
Stewart Information Services Corporation
CISO
Agenda
June 26, 2019
7:00am - 7:45am Registration & Breakfast
7:45am - 8:30am Keynote
What’s Trust Got to Do With It?
Hosted by Rapid7

David Horsager
CEO and Best-Selling Author
Trust Edge
Trust is both a fundamental business issue and the biggest asset of a company. Without trust, companies lose reputations, relationships, and revenue. With trust, organizations enjoy greater creativity, productivity, and results. Through extensive research and experience, David Horsager learned what it takes to gain — and keep — the “Trust Edge.”
Join this session as Horsager outlines:
- The keys to building morale, sales, and customer loyalty
- His Eight-Pillar Framework for building trust in an organization
- Creating successful leaders and organizations centered on the tenants of trust
8:30am - 9:00am Networking Break
9:00am - 9:50am Breakout Session
Deploying Emerging Technology
Hosted by Palo Alto Networks
Gretchen Myers
Security Technologies Team Lead
Chevron
Emerging technologies that enable business innovation and growth require fast, frequent change from the enterprise. How can you balance the implementation of these technologies with legacy ecosystems? Gretchen Myers from Chevron shares an innovative framework they’ve developed that reduces uncertainty during deployment.
In this session, you’ll learn how Chevron:
- Uses a unique technology qualification process
- Measures success when deploying emerging technology
- Adapts to emerging threats
9:00am - 9:50am Breakout Session
Security – A Team Sport
Hosted by Trend Micro Incorporated
Stephanie Franklin-Thomas
CISO
Motiva Enterprises
Annessa McKenzie
VP of IT & CSO
Calpine
René Smeraglia
JSC - Chief Information Security Officer
NASA Johnson Space Center
Information security is commonly viewed as a problem that security professionals alone need to solve. But CISOs can change that misconception. Hear a panel of peers share ways to connect security back to the organization’s mission, make security personal and break down barriers to collaboration.
Explore how to:
- Foster a cohesive culture of security
- Create a communication strategy that ties security to organizational success
- Shape internal security champions across departments
9:00am - 9:50am Executive Boardroom
Dissecting Recent Breaches and Ensuring Cyber Resiliency
Hosted by Onapsis, Inc.
Mario Chiock
Fellow
Schlumberger
Christopher Kar
Information Security Advisor
Fort Bend Independent School District

Alex Horan
Director of Product Management
Onapsis
In April 2019, the Department of Homeland Security issued an alert citing "New Exploits for Unsecure SAP Systems" after new exploits, termed "10KBlaze" were publicly released. While protecting endpoint access, phishing, and network monitoring is important, nothing else matters if your core business applications are not a primary strategic component.
In this session, we will explore:
- Why and how ERP applications are actively under attack
- How cloud, mobile and digital transformations are expanding the attack surface
- Steps you can take to ensure cyber resiliency and mitigate risk
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact Linda Luty at Linda.Luty@evanta.com or 971-978-5021.
9:50am - 10:20am Networking Break
10:20am - 11:10am Breakout Session
The Evolution of Cybersecurity Risk Ratings
Hosted by SecurityScorecard

Jasson Casey
CTO
SecurityScorecard
Cyber risk ratings have steadily evolved over the last six years, shifting from scoring approaches using off the shelf vulnerability scanners to frameworks built with machine learning. Jasson Casey shares the evolution of developing scores – including initial ideas, setbacks and breakthroughs.
in this session, learn:
- The composition of a cyber security risk rating
- How an enterprise IT team’s behavior manifests itself to the outside world
- How behavior translates to cyber security risk for the business
10:20am - 11:10am Breakout Session
Securing Across the Lines of IT and OT
Hosted by SecureAuth
Dan Rozinski
Manufacturing & Engineering Technology Fellow
Dow Inc.
The blurred boundaries between IT and OT demand a more integrated, collaborative cybersecurity strategy. Join Dan Rozinski as he shares his journey managing security across these borders at Dow.
In this session, he will explore:
- The convergence of IT and OT
- Ways to develop a programmatic approach to cybersecurity
- Communication and organizational strategies to drive a cyber safe culture
10:20am - 11:10am Executive Boardroom
Cyber-Risk Management – New Approaches for Reducing Your Cyber-Exposure
Hosted by Tenable
Mick Kohler
Interim CISO
Sysco

Genady Vishnevetsky
CISO
Stewart Information Services Corporation

Kevin Flynn
Senior Product Manager
Tenable
When it comes to reducing cyber exposure, overcoming vulnerability overload is critical. Find out how to improve your vulnerability management efforts so you can close your cyber exposure gap and focus on what matters most to your business.
During this peer discussion, you will explore how to:
- Translate raw vulnerability and threat intelligence data into business insights
- Benchmark your organization’s cyber exposure to guide decision making
- Use threat intelligence to move the most dangerous vulnerabilities up your priority list
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact Linda Luty at Linda.Luty@evanta.com or 971-978-5021.
11:10am - 11:40am Networking Break
June 26, 2019
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.