IN-PERSON

Philadelphia CISO Executive Summit

June 4, 2019 | Hilton Philadelphia at Penn's Landing

June 4, 2019
Hilton Philadelphia at Penn's Landing

Collaborate with your peers

Get together with your peers to tackle top business challenges through peer-driven content and discussions at the Philadelphia CISO Executive Summit.

Join your peers to discuss the most critical issues impacting CISOs today:

Strategies for a risk-aligned, resilient organization

Developing and investing in the security workforce of tomorrow

Creating business value and supporting agile business operations

Philadelphia CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Todd Bearman

TE Connectivity
CISO

Jim Connelly

Lockheed Martin
VP & CIO

Mark Eggleston

Health Partners Plans
VP, CISO & CPO

Dawn-Marie Hutchinson

GlaxoSmithKline
CISO, Pharmaceuticals and R&D

Anahi Santiago

Christiana Care Health System
CISO

Dave Snyder

Independence Blue Cross
Chief Information Security Leader

Alden Sutherland

AmerisourceBergen
CISO

Jay Weinstein

L3Harris
Senior Director Enterprise Networks & Security, CISO

Reginald Williams

Chemours
Chief Information Security Officer

Agenda


11:40am - 12:50pm  Keynote

Enabling Secure IT Transformation to the Cloud

Todd Bearman headshot

Todd Bearman

CISO

TE Connectivity

Jay Chaudhry headshot

Jay Chaudhry

CEO, Chairman & Founder

Zscaler

Cloud and mobility are emptying the data center and the internet is becoming the new corporate network. But how do you secure a network you don’t control? Join Todd Bearman, CISO at TE Connectivity, and Jay Chaudhry, founder and CEO of Zscaler, as they discuss how security transformation can reduce business risk and restore control in an increasingly cloud-first world.

They’ll discuss:

  • Why security must become network- and device-agnostic
  • Lessons from the TE Connectivity security transformation journey
  • How to move from legacy security to a modern cloud-first architecture

12:50pm - 1:20pm  Networking Break

1:20pm - 2:10pm  Breakout Session

Five Questions on AI That CISOs Should Answer

Sam Olyaei headshot

Sam Olyaei

Sr Principle Analyst Risk & Security Mgmt Programs

Gartner

No one can escape the wave of artificial intelligence marketing. The promise of increased security and better automation is appealing to CISOs, but sets the wrong expectations. Being too optimistic about artificial intelligence's impact could hurt the security organization.

This session will highlight:

  • How artificial intelligence might impact security and risk management
  • What to expect in coming months and years
  • How to adapt to the changes

1:20pm - 2:10pm  Breakout Session

Securing Sensors in Our Connected World

Reginald Williams headshot

Reginald Williams

Chief Information Security Officer

Chemours

Cheryl Flannery headshot

Cheryl Flannery

Sr. Director, Security, Governance, Risk Management

Pfizer

The digital world is increasingly driven by interconnected devices, and personal devices especially are becoming more prominent. Join your peers for this interactive discussion on how CISOs can navigate this connected world and embrace the responsibility of keeping it secure.

Come together to discuss:

  • Challenges of IOT/IIOT security
  • Best practices with emerging technologies
  • Which sensors need to be considered and which don’t

1:20pm - 2:10pm  Executive Boardroom

Cyber-Risk Management – New Approaches for Reducing Your Cyber-Exposure

Kevin Flynn headshot

Kevin Flynn

Senior Product Manager

Tenable

Matt Cerny headshot

Matt Cerny

Sr. Manager, Infrastructure, Security & Governance

Integra LifeSciences

Dave Snyder headshot

Dave Snyder

Chief Information Security Leader

Independence Blue Cross

When it comes to reducing cyber exposure, overcoming vulnerability overload is critical. Find out how to improve your vulnerability management efforts so you can close your cyber exposure gap and focus on what matters most to your business.

During this peer discussion, you will explore how to:

  • Translate raw vulnerability and threat intelligence data into business insights
  • Benchmark your organization’s cyber exposure to guide decision making
  • Use threat intelligence to move the most dangerous vulnerabilities up your priority list

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact your event Program Manager, Brandon Bean, at brandon.bean@evanta.com.

7:00am - 7:45am  Registration & Breakfast

7:45am - 8:30am  Keynote

Think Exponentially — Tomorrow is Today

Marjan Mohsenin headshot

Marjan Mohsenin

Futurist & Senior Director of Strategic Relations

Singularity University

In the coming decades, the confluence of exponentially accelerating technologies is fundamentally changing business, society and us. Marjan Mohsenin introduces frameworks for understanding what exponential growth really means. Learn the different mindset, skill sets and leadership required for successfully navigating this incredible time of change and address the importance of moving from linear to exponential thinking.

In this session, you will:

  • Gain a macro view of exponentials and convergences
  • Create a toolset to start thinking exponentially
  • Understand opportunities in disruption, plus the risks of not changing

8:30am - 9:00am  Networking Break

9:00am - 9:50am  Breakout Session

Doing Everything Right and Still Getting Hacked

James Cabe headshot

James Cabe

Senior Cyber Researcher

Fortinet, Inc.

Why do organizations still get breached when they are performing pen tests, auditing networks, following compliance, and implementing the latest security technologies that take advantage of anomalous behavior models, artificial intelligence, and machine learning?

This talk will examine:

  • Real-world breach examples
  • How cybersecurity failed to keep attackers away
  • What could have been done to keep attackers out

9:00am - 9:50am  Breakout Session

Zero Trust Evolution

Randy Marchany headshot

Randy Marchany

CISO

Virginia Tech

As companies embrace new technologies, they are forced to adopt a new approach to network security. The zero trust model approaches security architecture from the inside out, protecting data across multiple systems and devices.

In this session, you’ll uncover:

  • Vulnerabilities of traditional perimeter-based security
  • Strategies to integrate zero trust into your existing defenses
  • Techniques to achieve a stronger security posture


9:00am - 9:50am  Executive Boardroom

Cloud Innovation – Embracing a Startup Mentality

Tracey Brand - Sanders headshot

Tracey Brand - Sanders

Business Information Security Officer

Prudential Financial, Inc.

Mark Eggleston headshot

Mark Eggleston

VP, CISO & CPO

Health Partners Plans

Patrick Vowles headshot

Patrick Vowles

Product Marketing Manager - Security

IBM

Speed – we are all moving faster these days. Thanks to cloud technologies, we can now try new ideas almost immediately with minimal impact to the budget. Do you have an agile workplace? More important, is your business secure?

Don’t miss this peer-driven discussion that will help you:

  • Cover all the bases when it comes to protecting business systems and processes that live in the cloud
  • Discover how you can implement new ideas and concepts
  • Benchmark where you are in your cloud migration journey

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact Brandon Bean @ 503-972-4037 or brandon.bean@evanta.com.

9:50am - 10:20am  Networking Break

10:20am - 11:10am  Breakout Session

Think Differently about Data — Succeed at Threat Hunting & IR

Chris Lehman headshot

Chris Lehman

SVP, Worldwide Sales

ExtraHop

Two pillars of a successful and proactive SOC are threat hunting and incident response. The use of network traffic analysis can help improve performance in these two areas, if you can trust the data.

In this session, you will learn:

  • Current attack practices, including abuse of legitimate traffic and encryption
  • How hunters hide from attackers to avoid counter IR maneuvers
  • Ways to make analysts faster and more effective at validating and responding to threats
  • Options for empowering cross-training and on-the-job training to increase analysts' skills
  • Clarity on how gaining visibility into cloud and encrypted traffic

10:20am - 11:10am  Breakout Session

Cyber Security Education — Salient Strategies for Educating the Masses and the Board

Mark Eggleston headshot

Mark Eggleston

VP, CISO & CPO

Health Partners Plans

We can do better when it comes to educating our workforce. The rift between business users and IT educators seems to be expansive. Join Mark Eggleston as he shares how he has created an engaging and enterprise program to reduce risk, impart knowledge and of course educate stakeholders on the value of cyber.

You’ll learn:

  • An easy to use framework complete with examples you can take home that day
  • Lessons learned for working with the executive level and your entire workforce

10:20am - 11:10am  Executive Boardroom

Managing the Convergence of Global Data Protection Regulation

Miller Newton headshot

Miller Newton

President and CEO

PKWARE, Inc.

Roger Caslow headshot

Roger Caslow

Cybersecurity Leader & CISO

SUEZ

Adrian Giboi headshot

Adrian Giboi

CISO

Solenis

Information security leaders navigate an increasingly complex matrix of national and foreign data privacy regulations. GDPR caused organizations to scramble to meet data protection directives and reassess risk management through new compliance reporting requirements and potential exposure to financial penalties. Now California has its own Privacy Act set to come into effect, and it’s one of potentially many different pieces of forthcoming regulation and policy. How can organizations create a unified data protection and compliance strategy that meets conflicting requirements?

In this session, discuss:

  • The current landscape of data privacy regulation around the world
  • Best practices for managing risk associated with data protection frameworks
  • Standards and metrics for measuring data protection risk
  • Data classification strategies to aid compliance, regardless of regulation

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact Brandon Bean - brandon.bean@evanta.com .

11:10am - 11:40am  Networking Break

2:10pm - 2:30pm  Networking Break

2:30pm - 3:20pm  Breakout Session

Getting Creative on Talent

Anahi Santiago headshot

Anahi Santiago

CISO

Christiana Care Health System

 As the gap grows for information security positions, we must think of creative solutions rather than sit around and wait for the perfect candidate to come along. Join Anahi Santiago discuss creative ways her department implemented to start the path to a solution.

  • Explore ideas around insourcing
  • Be a part of the solution
  • Creative ways to train up to those lacking the specific skill set needed

2:30pm - 3:20pm  Executive Boardroom

Harnessing the Power of Behavioral Analytics

Sudhir Udipi headshot

Sudhir Udipi

Senior Director, Systems Architecture, CISSP, GCNA, GCFA

Securonix

Reginald Williams headshot

Reginald Williams

Chief Information Security Officer

Chemours

Dave Snyder headshot

Dave Snyder

Chief Information Security Leader

Independence Blue Cross

Behavioral analytics may help IT predict and understand consumer trends, but they can help CISOs understand potential threats—and catch them before they wreak major havoc. So how do you harness analytics to capture the best data?
Join this session to discuss:

  • Using behavior analytics as a framework for effective detection and response to advanced threats
  • Identifying potential insider threats, privilege misuse and cyber threats
  • How to take a risk based approach to prioritize threats that need immediate action

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact your event Program Manager, Brandon Bean, at brandon.bean@evanta.com.

2:30pm - 3:20pm  Executive Boardroom

Getting Ahead of the Audit —Cutting Through the Questionnaire

Donna Ross headshot

Donna Ross

Senior VP & Chief Information Security Officer

Radian Group, Inc.

It is now much easier to determine what’s important, dangerous and a real risk to your cybersecurity posture. Using a common framework leads to more effective conversations on risk with your security teams, board members, business partners, insurers and regulators.

Join this roundtable to explore:

  • Managing third- and fourth-party risk in today’s hyper-connected environment
  • Prioritization, justification and validation of IT security investments to underpin business digital transformation
  • Supporting audit and compliance tracking and finding a truly standard tool

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact your event Program Manager Brandon Bean brandon.bean@evanta.com.

3:20pm - 3:40pm  Networking Break

3:40pm - 4:20pm  Keynote

Privacy & Security — How do we Share?

Kim Gray headshot

Kim Gray

Global Chief Privacy Officer

IQVIA

Dawn-Marie Hutchinson headshot

Dawn-Marie Hutchinson

CISO, Pharmaceuticals and R&D

GlaxoSmithKline

As CISOs, we are all grappling with the unknowns of privacy and regulations as changes are occurring on a regular basis. Join Kim Gray and Dawn-Marie Hutchinson as they share their insights.

Gain perspective on:

  • What it means to have your data localization prioritized
  • Third-party & mergers and acquisition risks
  • Exploring cloud data movement

4:20pm - 5:00pm  Closing Reception & Prize Drawing

Location


Your Community Partners


National Thought Leaders
Keynote Sponsor
Local Sponsors

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Brandon Bean

Business Development Manager

503-972-4037

brandon.bean@evanta.com