Southern California CISO Virtual Executive Summit
May 26, 2021 | 8:00am - 3:00pm PDT
May 26, 2021 | 8:00am - 3:00pm PDT
Collaborate with your peers
Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the Southern California CISO Virtual Executive Summit.
Join your peers to discuss the most critical issues impacting CISOs today:
Accelerating security to match the pace of digital business initiatives
Managing the risk created from a landscape of new core technologies
Achieving sustainability for the CISO role without compromising outcomes
Governing Body Co-Chairs
Matt Crouse
Taco Bell
CISO
Lara Divi
Dine Brands Global, Inc.
VP, CISO
Arthur Lessard
Universal Music Group
SVP & CISO
Dan Meacham
Legendary
VP, Global Security and Corporate Operations, CISO
Marty Simmons
IOVANCE Biotherapeutics
Executive Director IT Security
David Tyburski
Wynn Resorts
Chief Information Security Officer
Terrence Weekes
Jack in the Box
CISO
Steven Young
Advantage Solutions
VP Information Security & Compliance, CISO
What to Expect
Connect with your CISO community through a variety of different session formats at the upcoming Virtual Executive Summit. You'll have the opportunity to listen, engage and create lasting relationships with like-minded peers.
Meet the Speakers
Don't miss this opportunity to meet with CISO practitioners and industry thought leaders who shared their insights on the agenda. Come with questions and get ready to meet new friends in this casual session designed to foster peer connections and collaboration in the Southern California community.
Agenda
May 26, 2021
11:00am - 12:00pm PDT Virtual Summit Boardroom
Metrics that Matter: Confidence and Resilience in Your Security Program
Hosted by ReliaQuest
John Burger
CISO and Vice President of Infrastructure
ReliaQuest
Tim Richardson
Head of Information Security
Hulu
Jeremy Smith
Global Head of IT Risk & Security
Avery Dennison
CISOs say that what they need most in their security program is confidence that people, processes and technology are working and effective, and that controls are in place to ensure resiliency in the case of a major event. But how do you measure that, and how do you effectively communicate across your organization’s leadership and the board?
In this discussion, you will learn:
- Why traditional metrics fall short of communicating security risk and value
- Which metrics have meaning for both boards and security teams
- How the right metrics will benefit the business and win investment for security
11:00am - 12:00pm PDT Virtual Summit Boardroom
Next Gen Innovation Offense — Uniting DevSecOps
Hosted by Sonatype
Michelle Dufty
Sr. Vice President of Marketing
Sonatype
Matt Crouse
CISO
Taco Bell
Michael Panico
Business Area Information Security Officer
NBCUniversal
This is NOT your typical security conversation. We won’t be talking about how to play better "perimeter defense" at the end of your software supply chain. Instead, we will be talking about how to play better digital “innovation offense” as next-generation software supply chain attacks become more sinister with bad actors actively injecting malicious code into open source projects that feed the global software supply chain.
Join us to discuss:
- The prevalence of software supply chain attacks with real-world examples such as dependency confusion and how to continuously identify and remediate open source risk, without slowing down innovation
- Ways to integrate security guardrails directly within your DevOps pipeline
- The importance of uniting developers, security, and operations on the same team
11:00am - 12:00pm PDT Virtual Summit Boardroom
Hacking the Cyber Talent Squeeze
Hosted by Immersive Labs
James Hadley
CEO
Immersive Labs
Nick Reva
Technical Manager, Security Engineering
Snap
Arthur Lessard
SVP & CISO
Universal Music Group
CISOs globally are struggling with technology outpacing the availability and skill development of their talent. What does it take to create opportunities for the next generation to thrive in a security career?
Join this roundtable to discuss:
- What it takes to identify, develop, and retain diverse talent
- Strategies to measure the capabilities of your team based on talent versus tenure
- Upskilling and reallocating talent to meet changing demands
11:00am - 12:00pm PDT Virtual Summit Boardroom
Building the Identity Platform of the Future
Hosted by Auth0
Jameeka Green Aaron
CISO
Auth0
Brett Cumming
Director Information Security Officer
Skechers
John Underwood
Director, Information Security
Big 5 Sporting Goods
Digital transformation has created a convergence of users, devices, and applications that demands an identity-based security approach. With the identity perimeter exposed, CISOs need new and better ways to protect it.
Join this interactive boardroom conversation to discuss:
- Strategies to reach frictionless IAM
- How identity can protect against automated attacks
- The future of IAM including passwordless authentication
12:00pm - 12:45pm PDT Virtual Summit Keynote
A Holistic Framework for Managing Vendor Risk
Todd Friedman
CISO
ResMed
Dave Estlick
Chief Information Security Officer
Chipotle Mexican Grill
Security threats have been around for decades, but lately the nature of those threats has changed, the security of third and fourth-party partners has come to the fore as an urgent issue for enterprises. Join Chipotle CISO Dave Estlick, as he shares his insights on third-party risk management, including:
- How to build a third-party risk program that operates at the scale of the business
- New approaches for managing third and fourth-party partners
- Tools and strategies that will help you make the best choices for your organization
12:45pm - 1:15pm PDT Networking
Meet the Speakers
Don't miss this opportunity to meet with Southern California practitioners and industry thought leaders who shared their insights on the agenda. Come with questions and get ready to meet new friends in this casual session designed to foster peer connections and collaboration in the CISO community.
1:15pm - 1:30pm PDT Break
8:00am - 8:45am PDT Virtual Summit Keynote
How to Win the Arms Race for Security Operations
Hosted by Microsoft
Ken Malcolmson
Chief Security Advisor
Microsoft Corporation
The threat landscape facing the modern enterprise is only accelerating in scope and risk, as an ecosystem of well-organized bad actors assails organizations in a relentless assault. Security operations are an essential core of effective defense, but against an ever-expanding threat landscape, maintaining the advantage is no easy task.
Join this session to explore:
- The modern ideal state for the security operations center
- Leadership best practices for keeping employees engaged and alert
- Strategies to operate a high-performing next-gen SOC
8:45am - 9:00am PDT Break
9:00am - 10:00am PDT Virtual Summit Boardroom
Making The Case for Application Security
Hosted by Veracode
Sohail Iqbal
CISO
Veracode
A.J. Soria
Director of Information Security
Age of Learning
Terrence Weekes
CISO
Jack in the Box
Software has never been more business critical, and cyberattacks at the application layer have never been more frequent. Yet budgets are also getting extra scrutiny in recent months. Join this boardroom to learn how to make the case for application security, from why you need it to what good looks like. You'll leave with actionable tips and advice on:
- Getting buy-in for AppSec
- Making the case to expand a program
- Communicating AppSec success to executives & more
9:00am - 10:00am PDT Virtual Summit Boardroom
Securing the Sprawling Endpoint
Hosted by VMware Carbon Black
Lara Divi
VP, CISO
Dine Brands Global, Inc.
Michael Mongold
Sr. Director, Information Security and Chief Information Security Officer
Deckers Brands
Patrick Morley
SVP and GM Security Business Unit
VMware Carbon Black
The global health pandemic has forced CISOs into a new era of evolving challenges. With fully remote workforces and assets continuously moving to the cloud, securing endpoint protection has never been more critical. So how are CISOs deploying next-generation endpoint protection to solve these obstacles?
Join this interactive session to discuss:
- Securing critical applications even in a state of compromise
- Tactics for monitoring a sprawling attack surface
- Leveraging new technologies to quantify threats
9:00am - 10:00am PDT Virtual Summit Boardroom
Driving Business Value With Cloud Security Innovation
Hosted by IBM
Amy Claire Smith
Executive Cloud Security Architect, IBM Security
IBM
Alex Hall
Director, Information Security (CISO)
International Vitamin Corporation
Marty Simmons
Executive Director IT Security
IOVANCE Biotherapeutics
Whether you are just moving into the cloud, researching more options within the public cloud, or building your own private cloud, most leaders agree that this is the future of infrastructure as a service. But can CISOs have it all – both increased productivity and cost benefits within a secure cloud?
During this peer-discussion you will explore:
- Automation, orchestration, AI and machine learning cloud strategies
- Nuances for hybrid on- and off-premise systems
- Ways to incorporate the cloud into a fully articulated security strategy
By registering for this session, this serves as your authorization to Evanta or its vendor to provide your contact information to IBM to follow up on your interaction and participation. IBM’s use of your contact information is governed by the IBM Privacy Policy. If you need more information on how IBM is using your personal data you may refer to the IBM Privacy Statement. To withdraw your marketing consent and unsubscribe to receiving emails click on the unsubscribe button at this address: ibm.biz/marketingoptout.
9:00am - 10:00am PDT Virtual Summit Boardroom
Managing and Responding to Insider Risk
Hosted by Code42
Ananth Appathurai
Senior VP of Strategic Partnerships and Corporate Development
Code42
Jeff Blair
CISO
CAA-GBG Global Brand Management Group
Eddie Galang
Chief Information Security Officer
Port of Long Beach
Bruce Phillips
SVP, Chief Information Security Officer
Williston Financial Group
Organizations are moving faster than ever before. With employees creating, modifying, deleting, and transporting data every second, how can CISOs keep up as job hopping and turnover rates continue to rise?
Join this boardroom to discuss:
- Ways to cut through the false noise and final real risk within your organization
- How to determine the right approach to insider risk response
- Strategies to continuously monitor file activity without being invasive
9:00am - 10:00am PDT Virtual Summit Boardroom
Securing DevOps Pipelines with Identity Security
Hosted by CyberArk
Jeremy Smith
Global Head of IT Risk & Security
Avery Dennison
Steven Young
VP Information Security & Compliance, CISO
Advantage Solutions
Barak Feldman
SVP, PAM and Identity Security
CYBERARK
Benjamin Trice
Director
PwC
Businesses around the world are using DevOps to unleash innovation and accelerate digital transformation. However, recent high-profile breaches demonstrate the huge risk unprotected developer pipelines represent and the importance of securing all identities across the enterprise.
Join CyberArk, PwC & your peers to discuss:
- DevOps security challenges – and DevSecOps practices & tools to strengthen security without impairing business agility
- Best practices for successful DevSecOps – shifting security left to engage developers
- Why Identity Security should be the core of every organization’s strategy
10:00am - 10:45am PDT Virtual Summit Keynote
A Strategic Approach to Zero Trust
Hosted by Google Cloud Security
Anton Chuvakin
Head of Solution Strategy
Chronicle, a Google Company
Rick Howard
CSO, Senior Fellow, Chief Analyst
The Cyberwire
How can CISOs adapt and enable business agility without compromising security? In the wake of widespread cloud adoption and ubiquitous remote workers, traditional network and security systems have failed to keep pace.
Join this discussion to learn how others are taking a Zero Trust approach to :
- Redefine enterprise security strategies to embrace a perimeter-less environment
- Adopt context-based and identity-centric access policies
- Transparently grant users access to only the resources they need
- Dynamically adjust access based on risk level
10:45am - 11:00am PDT Break
1:30pm - 3:00pm PDT Virtual Peer-to-Peer Meetings
Peer-to-Peer Meetings
Meet virtually for in-depth conversations with your colleagues
May 26, 2021
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.