IN-PERSON

Phoenix CISO Executive Summit

October 11, 2019 | Pointe Hilton Tapatio Cliffs Resort

October 11, 2019
Pointe Hilton Tapatio Cliffs Resort

Collaborate with your peers

Get together with your peers to tackle top business challenges through peer-driven content and discussions at the Phoenix CISO Executive Summit.

Join your peers to discuss the most critical issues impacting CISOs today:

Investing in your people and the right technologies

Innovating with advanced technologies and new delivery models

Influencing business stakeholders and enterprise outcomes

Phoenix CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Mike Goodwin

PetSmart
CIO

Mike Lettman

US Department of Homeland Security
Cyber Security Advisor (CSA) Arizona- Cybersecurity and Infrastructure Security Agency

Jason Lish

Advisor Group
CISO

Spencer Mott

McKesson Corporation
Former CISO

Todd Redfoot

GoDaddy.com
Chief Privacy & Risk Officer

Justin Replogle

Honeywell Aerospace
VP, IT

J.R. Sloan

State of Arizona
Interim CIO

Tina Thorstenson

Arizona State University
Deputy Chief Information Officer, IT Governance, Policy & Information Security CISO

Agenda


October 10, 2019

October 11, 2019

October 12, 2019

6:00pm - 8:30pm  Governing Body Welcome Reception

Governing Body Welcome Reception

Tim Roemer headshot

Tim Roemer

CISO

State of Arizona

Enjoy a networking dinner with the Phoenix Governing Body, facilitated by the CISO for Arizona, Tim Roemer. Unpack how collaboration and teamwork are moving us forward in 2020.

11:40am - 12:20pm  Lunch & Comments

12:20pm - 12:50pm  Keynote

The Mandate for Secure Cloud Transformation

Manoj Apte headshot

Manoj Apte

Chief Strategy Officer

Zscaler

Daniel Shuler headshot

Daniel Shuler

CISO

Phoenix Children's Hospital

The new way of work is remote, mobile-first, and cloud-based. Employees expect instant, secure access to applications, information, and resources. Meanwhile, threats proliferate, VPNs lag, hardware costs rise, and little is truly secure. Hub-and-spoke networks employing castle-and-moat security are no longer tenable, and leaders that cling to legacy architectures put enterprises at risk. Daniel Shuler joins Manoj Apte on stage to present Secure Cloud Transformation, a practical cyber security approach that prioritizes security and user performance to align with today’s way of working.

In this session, we'll discuss how enterprise IT leaders can:

  • Improve customer digital experience while safeguarding sensitive information
  • Increase user performance while minimizing risk
  • Drive revenue and scalability while controlling costs

12:50pm - 1:20pm  Networking Break

1:20pm - 2:10pm  CIO & CISO Featured Session

AI - Marketing Hype vs. Reality

Keith Rayle headshot

Keith Rayle

Strategist

Fortinet, Inc.

Join Keith Rayle from Fortinet for a brief history and workings of artificial intelligence (AI), to include current and future phases of AI deployment for solving problems. This discussion will examine the use of AI in security tools implementations.

Join this session to learn:

  • Strategies for deploying AI-based solutions
  • Cybercriminal uses of AI and what to expect from future attacks
  • Management potential using AI-based architectures

1:20pm - 2:10pm  CISO Executive Boardroom

The Next Great Security Challenge — Securing SD-WAN

Negisa Taymourian headshot

Negisa Taymourian

Senior Product Marketing Manager

Cisco Umbrella

Lester Godsey headshot

Lester Godsey

CISO

City of Mesa, AZ

Lanita Collette headshot

Lanita Collette

CISO

University of Arizona

The market consideration and adoption of software-defined WAN (SD-WAN) represents the largest networking transformation in recent history. Organizations are turning to SD-WAN to improve connectivity, reduce costs, and simplify management at their branch office locations. But what about security?

In this boardroom, you will discuss:

  • Embracing change — the pros and cons
  • Addressing weaknesses within branch offices and roaming users
  • Keeping security top of mind for business leaders

Executive boardrooms are private, closed-door discussions that encourage attendee participation and are limited to 15 attendees (seating priority is given to CIOs and CISOs). To reserve your seat, please contact: Led Rhodes at 503-972-4431 or Led.Rhodes@evanta.com.

7:00am - 7:45am  Registration & Breakfast

7:45am - 8:00am  Opening Comments

8:00am - 8:30am  Keynote

Driving Digitization — Aligning Business and Blockchain

Sathish Muthukrishnan headshot

Sathish Muthukrishnan

Chief Digital & Information Officer

Honeywell Aerospace

Blockchain presents an enormous opportunity for business-focused CIOs, but moving from hype-cycle concept to practical reality requires a deeper understanding of the technological possibilities and profound business impact. Join Sathish Muthukrishnan, Chief Digital and Information Officer for Honeywell Aerospace to uncover how a digital business paradigm created a new revenue source in just four months.

In this keynote, you’ll discover:

  • Customer perspectives that focused business objectives
  • Elements of the high-performing team that loves a challenge
  • Digitization strategies that brought lasting business

8:30am - 9:00am  Networking Break

9:00am - 9:50am  CISO Featured Session

From Zero Trust to Zero Touch with Intelligent Security

Bob Scuderi headshot

Bob Scuderi

Head of Solutions Engineering NALA

BlackBerry

Organizations are challenged to strike a balance between security teams who want a Zero Trust approach and employees who desire seamless Zero Touch access. Bridging that gap is Artificial Intelligence and a Zero Trust Architecture.

This session dives into:

  • Why the view of endpoints impacts how they’re secured and managed
  • How adaptive security and artificial intelligence can protect all endpoints
  • The ultimate goal of increasing security while acknowledging other factors

9:00am - 9:50am  CISO Executive Boardroom

Eliminate Vulnerability Overload with Predictive Prioritization

Jason Stead headshot

Jason Stead

CISO

Choice Hotels International, Inc.

Robert Huber headshot

Robert Huber

Chief Security Officer

Tenable

Michael Manrod headshot

Michael Manrod

CISO

Grand Canyon University

When it comes to reducing cyber risk, overcoming vulnerability overload is critical. Find out how predictive prioritization will improve your vulnerability management efforts so you can focus on what matters most to your business. 

During this peer-discussion you will explore:

  • How to use threat intelligence to move the most dangerous vulnerabilities up your priority list
  • The resources required to effectively assess your environment and prioritize your efforts in a predictive manner
  • Practices that will help you take appropriate actions to make your organization more secure
  • How to make your staff more efficient by drastically reducing the number of high priority vulnerabilities they need to remediate

Executive boardrooms are private, closed-door discussions that encourage attendee participation and are limited to 15 attendees (seating priority is given to CIOs and CISOs). To reserve your seat, please contact: Led Rhodes at 503-972-4431 or Led.Rhodes@evanta.com.

9:50am - 10:20am  Networking Break

10:20am - 11:10am  CISO Featured Session

Analytics and the Evolution of Cyber Risk Ratings

Marc Moesse headshot

Marc Moesse

Vice President, Product Management

SecurityScorecard

Cyber risk ratings have steadily evolved over the last six years, shifting from scoring approaches using off the shelf vulnerability scanners to frameworks built with machine learning. Marc Moesse shares the evolution of developing scores – including initial ideas, setbacks and breakthroughs.

In this session, learn:

  • The composition of a cyber security risk rating
  • How an enterprise IT team’s behavior manifests itself to the outside world
  • How behavior translates to cyber security risk for the business

10:20am - 11:10am  CISO Executive Boardroom

The Future of Incident Management – Automated Threat Response

Tim Roemer headshot

Tim Roemer

CISO

State of Arizona

Don Devine headshot

Don Devine

Sr. Director, Information Security

Aspect Software

As companies mature, security teams spend most of their day fighting fires and can’t devote the time to set standard response processes or spot patterns that reduce rework. Join this interactive conversation on how to:

  • Develop integrated incident management structures and strategies
  • Balance standardized incident response for high-quantity attacks and customized response for sophisticated, one-off attacks
  • Leverage scalable workflows and machine learning to vanquish challenges

Executive boardrooms are private, closed-door discussions that encourage attendee participation and are limited to 15 attendees (seating priority is given to CIOs and CISOs). To reserve your seat, please contact: Led Rhodes at 503-972-4431 or Led.Rhodes@evanta.com.

11:10am - 11:40am  Networking Break

2:10pm - 2:30pm  Networking Break

2:30pm - 3:20pm  CISO Featured Session

Digital Risk Explosion - Managing Risk in a Hyper-Outsourcing World

Kelly White headshot

Kelly White

CEO

RiskRecon

Digital transformation has dramatically transformed the enterprise risk surface, automating a vast array of processes while outsourcing a vast array of systems and services. Through this frenetic reshaping, few organizations truly understand the nature of their new risk reality and how to successfully manage it.

In this interactive discussion we will:

  • Discuss emerging threats and regulations
  • Explore the true nature of the enterprise cyber risk surface
  • Discuss threats and regulations driving organizations to better manage their extended enterprise
  • Share insights on how to better manage third-party risk (hint: good data!)

3:20pm - 3:40pm  Networking Break

3:40pm - 3:50pm  Closing Comments

3:50pm - 4:20pm  Keynote

Fostering Strategic Alignment

Max (LJ) Chan headshot

Max (LJ) Chan

CIO

Avnet

Kathy McElligott headshot

Kathy McElligott

EVP, CIO & CTO

McKesson Corporation

Dan Saltich headshot

Dan Saltich

CIO

Shamrock Foods

The CIO is the tip of the spear when it comes to driving impact throughout the business. Yet, with this leadership comes the burden of responsibility of widespread initiative implementation and ensuring their vision encompasses the needs of stakeholders across the enterprise. Join the top CIOs in Arizona to learn how they are delivering maximum impact and lasting change that meets everyone’s needs.

In this keynote, you’ll hear about:

  • Communication and collaboration strategies that aligned CIOs as true business partners
  • Culture shifts that embodied an agile workplace
  • Modernizing IT and analytics to drive business outcomes

4:20pm - 5:00pm  Closing Reception & Prize Drawing

8:00am - 2:00pm  Social Experience

Proofpoint Golf at Lookout Mountain Golf Club

 There's nothing like playing 18 holes among the vivid beauty of the Sonoran desert and lush Phoenix North Mountains. Come enjoy breakfast and a round of golf at Lookout Mountain Golf Club which is a nine-time winner of the Golf Digest Four Star Award, recognized as one of America's Best Golf Course and has been chosen as one of Arizona's Top 10 Golf Courses. Register today to reserve your spot and club rentals!

October 10, 2019

October 11, 2019

October 12, 2019

Location


Your Community Partners


National Thought Leaders
Keynote Sponsor
National Sponsors
Global Thought Leader

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Led Rhodes

Senior Program Manager

503-972-4431

led.rhodes@evanta.com