Philadelphia CISO Executive Summit
June 4, 2019 | Hilton Philadelphia at Penn's Landing
June 4, 2019
Hilton Philadelphia at Penn's Landing
Collaborate with your peers
Get together with your peers to tackle top business challenges through peer-driven content and discussions at the Philadelphia CISO Executive Summit.
Join your peers to discuss the most critical issues impacting CISOs today:
Strategies for a risk-aligned, resilient organization
Developing and investing in the security workforce of tomorrow
Creating business value and supporting agile business operations
Philadelphia CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.
Governing Body Co-Chairs
Todd Bearman
TE Connectivity
CISO
Jim Connelly
Lockheed Martin
VP & CIO
Mark Eggleston
Health Partners Plans
VP, CISO & CPO
Dawn-Marie Hutchinson
GlaxoSmithKline
CISO, Pharmaceuticals and R&D
Anahi Santiago
Christiana Care Health System
CISO
Dave Snyder
Independence Blue Cross
Chief Information Security Leader
Alden Sutherland
AmerisourceBergen
CISO
Jay Weinstein
L3Harris
Senior Director Enterprise Networks & Security, CISO
Reginald Williams
Chemours
Chief Information Security Officer
Agenda
June 4, 2019
7:00am - 7:45am Registration & Breakfast
7:45am - 8:30am Keynote
Think Exponentially — Tomorrow is Today
Hosted by Palo Alto Networks
Marjan Mohsenin
Futurist & Senior Director of Strategic Relations
Singularity University
In the coming decades, the confluence of exponentially accelerating technologies is fundamentally changing business, society and us. Marjan Mohsenin introduces frameworks for understanding what exponential growth really means. Learn the different mindset, skill sets and leadership required for successfully navigating this incredible time of change and address the importance of moving from linear to exponential thinking.
In this session, you will:
- Gain a macro view of exponentials and convergences
- Create a toolset to start thinking exponentially
- Understand opportunities in disruption, plus the risks of not changing
8:30am - 9:00am Networking Break
9:00am - 9:50am Breakout Session
Doing Everything Right and Still Getting Hacked
Hosted by Fortinet, Inc.
James Cabe
Senior Cyber Researcher
Fortinet, Inc.
Why do organizations still get breached when they are performing pen tests, auditing networks, following compliance, and implementing the latest security technologies that take advantage of anomalous behavior models, artificial intelligence, and machine learning?
This talk will examine:
- Real-world breach examples
- How cybersecurity failed to keep attackers away
- What could have been done to keep attackers out
9:00am - 9:50am Breakout Session
Zero Trust Evolution
Hosted by Attivo Networks
Randy Marchany
CISO
Virginia Tech
As companies embrace new technologies, they are forced to adopt a new approach to network security. The zero trust model approaches security architecture from the inside out, protecting data across multiple systems and devices.
In this session, you’ll uncover:
- Vulnerabilities of traditional perimeter-based security
- Strategies to integrate zero trust into your existing defenses
- Techniques to achieve a stronger security posture
9:00am - 9:50am Executive Boardroom
Cloud Innovation – Embracing a Startup Mentality
Hosted by IBM
Tracey Brand - Sanders
Business Information Security Officer
Prudential Financial, Inc.
Mark Eggleston
VP, CISO & CPO
Health Partners Plans
Patrick Vowles
Product Marketing Manager - Security
IBM
Speed – we are all moving faster these days. Thanks to cloud technologies, we can now try new ideas almost immediately with minimal impact to the budget. Do you have an agile workplace? More important, is your business secure?
Don’t miss this peer-driven discussion that will help you:
- Cover all the bases when it comes to protecting business systems and processes that live in the cloud
- Discover how you can implement new ideas and concepts
- Benchmark where you are in your cloud migration journey
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact Brandon Bean @ 503-972-4037 or brandon.bean@evanta.com.
9:50am - 10:20am Networking Break
10:20am - 11:10am Breakout Session
Think Differently about Data — Succeed at Threat Hunting & IR
Hosted by ExtraHop
Chris Lehman
SVP, Worldwide Sales
ExtraHop
Two pillars of a successful and proactive SOC are threat hunting and incident response. The use of network traffic analysis can help improve performance in these two areas, if you can trust the data.
In this session, you will learn:
- Current attack practices, including abuse of legitimate traffic and encryption
- How hunters hide from attackers to avoid counter IR maneuvers
- Ways to make analysts faster and more effective at validating and responding to threats
- Options for empowering cross-training and on-the-job training to increase analysts' skills
- Clarity on how gaining visibility into cloud and encrypted traffic
10:20am - 11:10am Breakout Session
Cyber Security Education — Salient Strategies for Educating the Masses and the Board
Mark Eggleston
VP, CISO & CPO
Health Partners Plans
We can do better when it comes to educating our workforce. The rift between business users and IT educators seems to be expansive. Join Mark Eggleston as he shares how he has created an engaging and enterprise program to reduce risk, impart knowledge and of course educate stakeholders on the value of cyber.
You’ll learn:
- An easy to use framework complete with examples you can take home that day
- Lessons learned for working with the executive level and your entire workforce
10:20am - 11:10am Executive Boardroom
Managing the Convergence of Global Data Protection Regulation
Hosted by PKWARE, Inc.
Miller Newton
President and CEO
PKWARE, Inc.
Roger Caslow
Cybersecurity Leader & CISO
SUEZ
Adrian Giboi
CISO
Solenis
Information security leaders navigate an increasingly complex matrix of national and foreign data privacy regulations. GDPR caused organizations to scramble to meet data protection directives and reassess risk management through new compliance reporting requirements and potential exposure to financial penalties. Now California has its own Privacy Act set to come into effect, and it’s one of potentially many different pieces of forthcoming regulation and policy. How can organizations create a unified data protection and compliance strategy that meets conflicting requirements?
In this session, discuss:
- The current landscape of data privacy regulation around the world
- Best practices for managing risk associated with data protection frameworks
- Standards and metrics for measuring data protection risk
- Data classification strategies to aid compliance, regardless of regulation
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact Brandon Bean - brandon.bean@evanta.com .
11:10am - 11:40am Networking Break
June 4, 2019
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.