Southern California CISO Executive Summit
June 4, 2019 | Hilton Los Angeles Universal City
June 4, 2019
Hilton Los Angeles Universal City
Collaborate with your peers
Get together with your peers to tackle top business challenges through peer-driven content and discussions at the Southern California CISO Executive Summit.
Join your peers to discuss the most critical issues impacting CISOs today:
Strategies for a risk-aligned, resilient organization
Developing and investing in the security workforce of tomorrow
Creating business value and supporting agile business operations
Southern California CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.
Governing Body Co-Chairs
Bently Au
AEG Worldwide
VP, CISO
Nikolay Chernavsky
PennyMac Mortgage Investment Trust
SVP & CISO
Matt Crouse
Taco Bell
CISO
Lara Divi
Dine Brands Global
VP, CISO
Arthur Lessard
Universal Music Group
SVP & CISO
Dan Meacham
Legendary
Vice President, Security & Operations
Nick Reva
Snap Inc.
Security Engineering Lead
Marty Simmons
Kite Pharma
Director, IT Security & Compliance
Terrence Weekes
Jack in the Box, Inc.
CISO
Agenda
June 4, 2019
7:00am - 7:45am Registration & Breakfast
7:45am - 8:30am Keynote
The Next Century of Cybersecurity
Hosted by Exabeam
Ben Hammersley
Author & Futurist
Ben Hammersley
Today’s breakneck pace of technological disruption is only matched by the flood of sensitive data flowing to the digital realm, and information security leaders are a lighthouse in the storm. What’s next for the CISO, and what’s next for the threat landscape they face? Will new technologies completely rewrite what it means to be a CISO? Join Futurist Ben Hammersley as he shares his meditation on the future of cybersecurity:
- What should the CISO be preparing for to brace for unprecedented change?
- What technologies are on the horizon that will revolutionize data protection?
- What’s next for the bad guys?
8:30am - 9:00am Networking Break
9:00am - 9:50am Breakout Session
Corporate Transitions — Navigating Disruptive Cyber Waters
Hosted by Egnyte
Richard Greenberg
Information Security Officer
Los Angeles County Department of Public Health
Bruce Phillips
SVP, Chief Information Security Officer
Williston Financial Group
Shyama Rose
CISO
Avant
Marty Simmons
Director, IT Security & Compliance
Kite Pharma
One thing we know for sure, change is constant in our professional worlds. From M&A and company splits to reorgs and business identity changes – how can you keep your organization secure during these shifts? How do you keep disruption to a minimum? In this session, you will:
- Learn how to create an effective digital growth strategy that supports business goals
- Identify the implications and impacts of change and risk
- Discover how to address vulnerabilities
9:00am - 9:50am Breakout Session
Mission Impossible — So Many Risks, So Little Time
Hosted by Fortinet, Inc.
Ladi Adefala
Senior Security Strategist
Fortinet, Inc.
Emerging risks can be unpredictable and disruptive. Fifth Generation (5G) mobile communications, extended reality, smart speakers, drones all offer incredible benefits but they also come with unexpected risks. These are truly the unpredictable unknowns. Anticipating these blind spots can appear impossible in light of the accelerated pace of technology innovations. In this session, you’ll:
- Learn about emerging risks
- Identify impact and implications of these risks
- Discover strategies to address them
9:00am - 9:50am Executive Boardroom
Patterns and Anti-Patterns for Practical Applications of AI
Hosted by IBM
Bently Au
VP, CISO
AEG Worldwide
Nick Reva
Security Engineering Lead
Snap Inc.
Doug Lhotka
Executive Cybersecurity Architect
IBM
Deep Learning. Machine Learning. Artificial Intelligence. These trends can deliver immense dividends, but they also invite new risks. How can CISOs prepare to reap the rewards while also thwarting potential attackers? Join this session to learn how to:
- See beyond the hype and understand the benefits of AI
- Use AI to create both long- and short-term business benefits
- Prevent potential attackers from exploiting the vulnerabilities of new technologies
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs). To reserve your seat, please contact Kody Paine at +1 971-222-2377 or Kody.Paine@evanta.com.
9:00am - 9:50am Executive Boardroom
Modern Approaches to Protecting Your Third-Party Ecosystem
Hosted by CyberGRX
Steve Schwartz
Director, IT Security
Lionsgate
Mark Van Holsbeck
IT Risk & Security CISO
Avery Dennison
Fred Kneip
CEO
CyberGRX
It's no secret that hackers are opportunistic. They are constantly looking for the weakest link and are quick to capitalize on one as soon as it's spotted. This boardroom will discuss:
- Third-party cyber risk best practices
- New strategies for third-party cyber risk management (TPCRM) and how they work
- How to scale your third-party risk management (TPRM) program to evolve with your ecosystem
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs). To reserve your seat, please contact Kody Paine at +1 971-222-2377 or Kody.Paine@evanta.com.
9:50am - 10:20am Networking Break
10:20am - 11:10am Breakout Session
From Zero to 100 — Yamaha’s Race to Cyber Strength
Hosted by WhiteHat Security
Glenn Coles
GM & CIO
Yamaha Motor Corporation, U.S.A.
Douglas Gaboya III
Senior Manager and CISO
Yamaha Motor Corporation, U.S.A.
Yamaha Motor Corporation, U.S.A. was admittedly late to the game when it came to cybersecurity, but the creation of a captive finance company with lots of PII required the organization to step on the gas. Discover how the enterprise’s CIO and CISO quickly and efficiently:
- Put together a program of people, processes and technology
- Leveraged vendors and tools to jump straight into to the latest and greatest cloud-type solutions
- Built a SOC, which has no on-premise staff but provides 24-7 coverage, on a shoestring budget
10:20am - 11:10am Breakout Session
Real World Strategies for a Proactive SOC
Hosted by ExtraHop
Jeff Costlow
Deputy CISO
ExtraHop
Two pillars of a successful and proactive SOC are threat hunting and incident response. The use of network traffic analysis can help improve performance in these two areas, if you can trust the data. In this session, you will learn:
- Current attack practices, including abuse of legitimate traffic and encryption
- How hunters hide from attackers to avoid counter IR maneuvers
- Ways to make analysts faster and more effective at validating and responding to threats
- Options for empowering cross-training and on-the-job training to increase analysts' skills
- Clarity on how gaining visibility into cloud and encrypted traffic
10:20am - 11:10am Interactive Session
Wear the Black Hat in a Cybersecurity Escape Room
Hosted by Veracode
Jennifer Fusco
Cyber Security Analyst
Boston Scientific
As a security executive, you know how many disparate pieces of information can together leave you vulnerable to hackers. Framed photos. Letters from family. Personal documents tucked away in a drawer. For 50 minutes, you’ll try on the black hat, assuming the role of a hacker trying to access an organization’s most sensitive data.
The catch—you only have 40 minutes to gather all the correct intel to gain access to the data, and you’re limited to the clues around the room.
In this session, be prepared to:
- Hack a Facebook account using information left behind on employees’ desks
- Identify which sensitive documents commonly found on employees’ desks can be used to access important accounts
- Learn a new way to gamify insider threat training
*Please note: This interactive session is limited to 10 attendees.
10:20am - 11:10am Executive Boardroom
Managing the Convergence of Global Data Regulations
Hosted by PKWARE, Inc.
Lara Divi
VP, CISO
Dine Brands Global
Terrence Weekes
CISO
Jack in the Box, Inc.
Matt Little
Chief Product Officer
PKWARE, Inc.
Information security leaders navigate an increasingly complex matrix of national and foreign data privacy regulations. GDPR caused organizations to scramble to meet data protection directives and reassess risk management through new compliance reporting requirements and potential exposure to financial penalties. Now California has its own Privacy Act set to come into effect, and it’s one of potentially many different pieces of forthcoming regulation and policy. How can organizations create a unified data protection and compliance strategy that meets conflicting requirements? In this session, discuss:
- The current landscape of data privacy regulation around the world
- Best practices for managing risk associated with data protection frameworks
- Standards and metrics for measuring data protection risk
- Data classification strategies to aid compliance, regardless of regulation
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs). To reserve your seat, please contact Kody Paine at +1 971-222-2377 or Kody.Paine@evanta.com.
10:20am - 11:10am Executive Boardroom
Translate Complex Cybersecurity Issues into Simple Business Context
Hosted by BitSight Technologies
Steve Tran
CISO
MGM Studios
Alan Deeter
Director, Enterprise Sales West
BitSight Technologies
It is much easier now to determine what’s important, dangerous and real in your third party ecosystem. Yet, as hacks continue to threaten data and business continuity, the old school of thought around securing the enterprise is no longer relevant. This boardroom will explore:
- Layering traditional tools and new strategies to define goals and deploy resources
- Communicate to the board through a holistic risk lens
- Developing clear business cases connecting business profitability to risk reduction
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs). To reserve your seat, please contact Kody Paine at +1 971-222-2377 or Kody.Paine@evanta.com.
11:10am - 11:40am Networking Break
June 4, 2019
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.