Houston CISO Virtual Executive Summit
December 9, 2020 | 8:00am - 4:00pm CST
December 9, 2020 | 8:00am - 4:00pm CST
Collaborate with your peers
Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the Houston CISO Virtual Executive Summit.
Join your peers to discuss the most critical issues impacting CISOs today:
Strategies for a risk-aligned, resilient organization
Developing and investing in the security workforce of tomorrow
Creating business value and supporting agile business operations
Governing Body Co-Chairs
Mike Coogan
Waste Management
Senior Director, Cybersecurity
Angelique Grado
MRC Global
CISO
Paul Huttenhoff
CenterPoint Energy
CISO
Steve Neiers
Chevron
GM, Info. Risk Strategy & Mgmt. (CISO)
Derek Rude
Weatherford
Director, IT Security
Genady Vishnevetsky
Stewart Title Company
CISO
Agenda
December 9, 2020
11:00am - 12:00pm CST Virtual Summit Boardroom
Using Identity for Intelligent Defense to Enable the Remote Workforce
Hosted by SailPoint
Eric Seagren
Chief Information Security Officer
Oceaneering International
Stuart Wagner
Director, IT Sec. & Compliance
Enterprise Products Partners
Frank Briguglio
Global Public Sector Identity Governance Strategist
SailPoint Technologies Holdings Inc
For many organizations in the coronavirus era, work would grind to a halt without the ability for employees to remotely access critical systems and information. With business’s survival on the line, many CISOs must set a strategy that securely enables this explosion of digital work.
Join this virtual roundtable as we discuss:
- Best approaches to the secure delivery of access and automated governance controls
- Establishing complete 360-degree visibility and governance across all privileged and non-privileged accounts
- Eliminating over-entitled users, and identifying high-risk profile identities violating access policies
11:00am - 12:00pm CST Virtual Boardroom
Security Analytics – Turning Signal Noise into Actionable Harmony
Hosted by Securonix
Brad Hollingsworth
Director of Cyber Security
Mattress Firm
Scott Smith
Chief Information Security Officer
City of Bryan
Augusto Barros
VP of Solutions
Securonix
There is no shortage of data available to the security function, but insights – the signals of a real threat that demands action — are a different story. CISOs who can derive meaningful findings from their environments can better detect threats with fewer resources — a difficult, ongoing challenge as organizations become increasingly digital and complex.
Join your peers to discuss:
- How emerging technologies and evolving digital businesses are challenging security analytics
- Best practices for monitoring user behavior and other dynamic risks
- How to reduce the noise created by the growing number of threat detection technologies and data volume
11:00am - 12:00pm CST Virtual Summit Boardroom
Protecting Active Directory and Defeating Ransomware
Hosted by Attivo Networks
Tony Cole
CTO
Attivo Networks
Christopher Kar
Information Security Advisor
Fort Bend Independent School District
Derek Rude
Director, IT Security
Weatherford
The majority of corporate ransomware attacks stem from the compromise of Active Directory. Protecting AD has become increasingly complex with pervasive access and a multitude of objects with varying privilege levels and domain control. Monitoring and keeping this environment secure has become a significant challenge and comes with dire consequences when that control is lost to an attacker.
Join this boardroom to discuss:
- How to conceal valuable enterprise resource information and gain insights to reduce the attack surface
- How to control, provide disinformation, and alter what the attacker sees as a means to slow and deter attacks
- Gather Tactics, Techniques, and Procedures (TTPs) and company-specific threat intelligence for remediating exploited systems and fortifying defenses
12:00pm - 12:30pm CST Networking
Key Takeaways Discussion
Hosted by Duo Security
Dave Lewis
Global Advisory CISO
Duo Security
Join your peers for a unique opportunity to engage in freeform virtual discussion on the Shindig meeting platform. Attendees will be able to follow up with presenters, discuss best practices with their peers and form small groups to continue topics from the day.
8:00am - 8:45am CST Virtual Summit Keynote
Mitigating the Human Risk
Hosted by Fortinet, Inc.
Renee Tarun
Deputy CISO/Vice President Information Security
Fortinet
The human element remains a huge challenge in a cohesive information security strategy, as they pose as potential risk as either an accidental or malicious insider. Employees, vendors and even customers all have a role to play when clicking one malicious link can put the organization at serious risk. The CISO must instill discipline, responsibility and buy-in across a huge swath of users – no easy task, especially in a remote working world.
Join this session to learn:
• How today’s situation informs security awareness training needs and objectives
• Training techniques and solutions that work at scale
• How to measure success and hold users accountable
8:45am - 9:00am CST Break
9:00am - 10:00am CST Virtual Summit Boardroom
Future Forward — Investing in the Security Workforce of Tomorrow
Hosted by Rapid7
René Smeraglia
JSC - Chief Information Security Officer
NASA Johnson Space Center
Pete Self
Director IT Security and Compliance
StandardAero
Jeffrey Gardner
Practice Advisor of Detection & Response
Rapid7
In a field often described as having “negative unemployment,” CISOs are in a constant battle to hire and retain the talent they need to keep their organizations secure. How can CISOs develop and invest in their teams to pave the way for the security workforce of tomorrow?
Join this interactive conversation on:
- Different approaches to building the talent pipeline
- How to develop security talent and keep them engaged
- Strategies to effectively leverage a remote security workforce
9:00am - 10:00am CST Virtual Summit Boardroom
Bringing Cloud Back Down to Earth
Hosted by CrowdStrike
Anthony Caruso
CyberSecurity Advisor
Apache Corporation
Mario Chiock
Fellow
Schlumberger
Brandon Finney
Director
CrowdStrike
CISOs face a constant tension between enterprise agility and enterprise security, and in today’s world, this dynamic often plays out in the context of cloud services. How can CISOs gain a centralized view over cloud security posture and workloads?
Join this session to discuss:
- Methodical approaches to securing cloud-based technologies, workloads and products
- Ways to standardize cloud environments
- Strategies to ensure compliance
9:00am - 10:00am CST Virtual Summit Boardroom
The Future of Network Security – SASE Implementation
Hosted by Palo Alto Networks
Jason Georgi
Global Field Chief Technology Officer for Prisma Access
Palo Alto Networks
Dr. Tim Proffitt
Managing Director, Information Security
Insperity
Diego Souza
Director - Deputy Global Chief Information Security Officer
Cummins
Information security is in a sprint to match the velocity of digital transformation at organizations. Driven by a number of factors such as remote work and bring-your-own device, CISOs face the puzzle of implementing access controls in a way that works well with borderless organizations, without slowing down the business.
In this session, you will discuss:
- Common friction points between IT and security for enabling remote work and digital transformation
- Ways to efficiently deploy security controls without slowing down work
- The strategic measure and application of SASE to give session protection
10:00am - 10:45am CST Virtual Summit Keynote
Defending Your Data in a Remote Working World
Hosted by Proofpoint
Mark Adams
Senior Manager, IT Security and Compliance/ CISO
Superior Energy
Mary Dickerson
AVP/AVC IT Security, CISO
University of Houston System
Ryan Kalember
EVP, Cybersecurity Strategy
Proofpoint
It’s one of the oldest maxims in cybersecurity – you can’t protect what you can’t see. And with organizations shifting to remote work and the traditional enterprise network going dark in more ways than one, new thinking is required to protect the data that matters to your organization. After all, data doesn’t just leave on its own – a compromised account, malicious insider, or simply negligent user is almost always involved.
In this session you will learn:
- How to adapt your security architecture to give you visibility in a remote work and cloud-oriented landscape
- The ways in which remote work and the move to the cloud has changed the nature of threats to data
- Approaches to better detect and respond to risky user actions with sensitive data
10:45am - 11:00am CST Break
2:30pm - 4:00pm CST Virtual Peer-to-Peer Meetings
Peer-to-Peer Meetings
Meet virtually for in-depth conversations with your colleagues
Conducting business virtually makes it more challenging to meet and network with like-minded peers. During this time of disruption and uncertainty, it’s become even more critical to collaborate with peers who are facing the same challenges.
Now, we are bringing you the opportunity to set up 1-to-1 meetings in a private, virtual setting with community peers directly after the Virtual Executive Summit.
- Peer-to-Peer meetings are 25 minutes in length, giving you the chance for more personal interaction and in-depth conversation with your fellow Houston CISO Virtual Executive Summit peers.
- All conversations are private and will not be recorded
- Meet up to 3 peers based on your shared interests or priorities
Participant Testimonials
- ‘If I came just for the peer to peer meetings, my time was well spent. This is truly your USP.’ Stuart Hughes, CDIO at Rolls Royce
- ’The peer to peer mtgs were maybe the BEST part of this mtg’ Edward Wagoner, Executive Director, Digital, JLL
- ‘Best idea ever; I had such productive sessions with all three of my peers’ Dd Budiharto Sr. Director of Cybersecurity, Baker Hughes
How to Participate
Available if you sign up and select peer meetings prior to the summit. To join your meetings or download meeting calendar invites, please reference the instructions that were emailed to you from evanta@delegateselect.com.
December 9, 2020
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.