San Francisco CISO Executive Summit
December 3, 2018 | InterContinental San Francisco
December 3, 2018
InterContinental San Francisco
Collaborate with your peers
Get together with your peers to tackle top business challenges through peer-driven content and discussions at the San Francisco CISO Executive Summit.
Join your peers to discuss the most critical issues impacting CISOs today:
Strategies for a risk-aligned, resilient organization
Developing and investing in the security workforce of tomorrow
Creating business value and supporting agile business operations
San Francisco CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.
Governing Body Co-Chairs
Colin Anderson
Levi Strauss & Co.
Global CISO
Krishnan Chellakarai
Gilead Sciences, Inc.
CISO
George DeCesare
Kaiser Permanente
SVP, Chief Technology Risk Officer
Peter Liebert
State of California
Commander, Cyber Operations
Steve Martino
Cisco
Senior VP & Chief Information Security Officer
Agenda
December 3, 2018
7:00am - 7:45am Registration & Breakfast
7:45am - 8:30am Keynote
Designing Your Life
Dave Evans
Product Design Program at Stanford, Co-Author of 'Designing Your Life'
The question “What do I want to be when I grow up?” is one that never truly goes away. Whether you are a college grad entering the workforce, a forty year-old shifting careers, or a sixty-eight year-old trying to define an encore career, the search for a fulfilling life never stops. In this keynote, Dave Evans teaches audiences how to look at career and life planning through the lens of design. Participants are given the tools to build their way forward and to develop various life scenarios just like a designer tests multiple prototypes. This approach fosters creativity and adaptability and allows audiences to accept that there is never just one right path.
8:30am - 9:10am Networking Break
9:10am - 10:00am Breakout Session
A Plan for Automating Incident Response
Eric Etherington
CISO
Dolby Laboratories
How do you grow incident response capabilities without adding headcount? Eric Etherington, CISO of Dolby Laboratories, shares his process for developing an automated incident response program. Etherington discusses how to get comfortable with automation and make the response process more efficient. With a lean operation, Dolby is able to review all alerts – low and high – and not suffer from the common problem of prioritizing only high alerts due to staffing limitations. Etherington shares use cases for common pain points that become manageable with automation.
9:10am - 10:00am Breakout Session
Securing the Cloud Revolution
Hosted by Palo Alto Networks
Tim Prendergast
Chief Cloud Officer
Palo Alto Networks
The rapid evolution of cloud-delivered infrastructure, services, and technologies have been steadily transforming business, allowing for greater flexibility and advanced customization of the IT environment. As organizations look to the cloud, they must also manage the new risks and responsibilities in modern shared-infrastructure architectures.
In this session, examine:
- The benefits, risks and challenges of scaling cloud applications
- How the risk-minded organization evaluates the security posture of their IaaS, PaaS, and SaaS workloads and data
- How enterprise organizations should evaluate API-based security offerings
- Why automation is the one great equalizer for their security team’s growing resource challenge(s)
9:10am - 10:00am Executive Boardroom
The Practical Application of ‘Cognitive Cybersecurity’
Hosted by IBM
Yassir Abousselham
SVP, Chief Security Officer
Okta, Inc.
Amir Jabri
Information Security Manager
Accuray
Sean McHugh
Cybersecurity Executive Advisor
IBM
The sheer volume of threat intelligence and suspicious activity alerts facing security teams is daunting, yet finding that needle in the haystack can make the difference between stopping an attacker or becoming victim to the next breach. “Cognitive cybersecurity” – machine learning and the automation of human tasks and processes – can transform the security program by free staff to focus on stopping the real threats.
In this interactive discussion, explore with fellow CISOs:
- Areas of opportunity to free up resources with automation
- Common threats every organization faces that can be alleviated with ML
- Methods to get business buy-in for the next wave of technology
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).
To reserve your seat, please contact: Greg Winterrowd at 971-717-6628 or Greg.Winterrowd@evanta.com.
9:10am - 10:00am Executive Boardroom
Evaluating Your Information Security Program
Hosted by Tevora
Al Ghous
Sr. Director, Cyber Security
General Electric Company
David Tugwell
Director, Information Security
Agilent Technologies, Inc.
Ray Zadjmool
CEO & Founder
Tevora
A comprehensive information security program can significantly limit an organization’s exposure to risk. To address security concerns and needs, CISOs must continually assess their program and make improvements.
Join peers to discuss:
- Possible gaps and risks in your information security program
- Quantifying information risk into dollar terms
- Establishing KPIs to measure progress
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).
To reserve your seat, please contact: Greg Winterrowd at 971-717-6628 or Greg.Winterrowd@evanta.com.
10:00am - 10:40am Networking Break
10:40am - 11:30am Breakout Session
Pen Test Your Board Pitch — An Interactive Exercise
Thomas August
CISO
John Muir Health
Pitching to the board is a skill that must be mastered. CISOs are tasked to use visuals, communicate business value and synthesize complex information in a way that makes sense. Join this interactive session to identify the holes in your board pitch—and improve them for the next time you’re in the hot seat. In this interactive session, you will work in a group to:
- Create and deliver a board pitch
- Receive real-time feedback on your pitch
- Learn best practices and strategies for communicating with your board
10:40am - 11:30am Breakout Session
Knowing Your Unknown Unknowns
Hosted by Expanse Formerly Qadium
Tim Junio
CEO & Co-Founder
Expanse, Formerly Qadium
It only takes one weak link to expose your entire network. The explosion of Internet-connected devices, and decentralization of IT procurement and management, has created problems for every large organization in the world.
In this session, discover:
- Commonly overlooked vulnerabilities for organizations
- Cutting edge technologies and methods for network visibility
- Solutions such as Internet-scale intelligence and remote traffic capture
10:40am - 11:30am Executive Boardroom
Secure Transformation – Avoiding Risk in ERP Applications
Hosted by Onapsis, Inc.
Friedrich Wetschnig
CISO
Flex
Anand Kotti
SAP Security Expert
Onapsis, Inc.
Digital transformation is not just a buzzword, but an outline of business and operational plans to integrate and prioritize the latest digital technologies. Unfortunately, security is often second priority or not even in the scope of the transformation project.
Join this session to discuss how to:
- Make security an enabler instead of a roadblock.
- Develop a plan to secure critical ERP applications
- Ensure your organization’s ERP applications are compliant
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).
To reserve your seat, please contact: Greg Winterrowd at 971-717-6628 or Greg.Winterrowd@evanta.com.
10:40am - 11:30am Executive Boardroom
Comprehensive Security for Connected Devices
Hosted by Fortinet, Inc.
Colin Anderson
Global CISO
Levi Strauss & Co.
Nadean Shavor
Chief Security Officer
State of California Franchise Tax Board
Bhanu Prakash
Director, Systems Engineering
Fortinet, Inc.
The number and types of network-connected wireless devices and mobile applications continue to grow exponentially. How can CISOs mitigate the risk coming from new vulnerabilities and an increased attack surface?
In this roundtable, join peers to discuss:
- Challenges and best practices in managing connected devices
- How to reduce complexity across network and device management
- The balance between ease of use and robust security across devices
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).
To reserve your seat, please contact: Greg Winterrowd at 971-717-6628 or Greg.Winterrowd@evanta.com.
10:40am - 11:30am Executive Boardroom
DevSecOps – The Agile Approach to Security
Hosted by GitLab
Joel Fulton
CISO
Splunk
Kannan Perumal
Chief Information Security Officer
Applied Materials
Cindy Blake
Global Sr. Security Evangelist
GitLab
Security from the start and better collaboration are the keys to effectively reducing risks posed to an organization. With DevSecOps methods and principles, security automation can help organizations mitigate risk without impacting their Agile/DevOps velocity.
In this session, learn:
- How DevSecOps changes the security workflow
- The benefits of a DevSecOps approach
- Best practices and lessons learned to implement DevSecOps in your organization
December 3, 2018
Community Program Managers
For inquiries related to this community, please reach out to your dedicated contacts.