
Washington, DC CISO Virtual Executive Summit
December 1, 2020 | 8:00am - 1:15pm EST
December 1, 2020 | 8:00am - 1:15pm EST
Collaborate with your peers
Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the Washington, DC CISO Virtual Executive Summit.
Join your peers to discuss the most critical issues impacting CISOs today:
Leading through disruption
The future of the CIO and CISO
Embracing accelerated change
Governing Body Co-Chairs

Sam Abbate
Northrop Grumman
Vice President and Chief Information Officer

Jim Connelly
Lockheed Martin
Vice President & Chief Information Officer

Mike Gordon
Lockheed Martin
VP & CISO

André Mendes
Department of Commerce
CIO

Shamim Mohammad
CarMax Inc
SVP & CIO
Christopher Porter
Fannie Mae
CISO
Agenda
December 1, 2020
11:00am - 12:00pm EST Virtual Summit Boardroom
Achieving an Effective Cloud Strategy
Hosted by Salesforce

Chris Radich
VP, Digital Strategy
Salesforce

Jamie Holcombe
Chief Information Officer
United States Patent & Trademark Office

David Shive
CIO
General Services Administration
As organizations evolve to keep pace with a digital world, successful cloud strategies elude many IT departments. Dealing with high operational costs and a talent shortage are just some of many reasons that cloud solutions are often a bigger undertaking than they first appear.
This session will focus on:
- Discovering the right road map for your organization
- Winning trust during transition
- Avoiding common pitfalls
11:00am - 12:00pm EST Virtual Summit Boardroom
Security Operations – Empowering Teams with Automation
Hosted by Secureworks

Ken Deitz
CISO
SecureWorks

Anil Katarki
CISO & Director Cyber Security Services
Perspecta

Tunde Oni-Daniel
Vice President, SMD & Head of Security Architecture, Engineering & Operations
OneMain Financial

Jesse Whaley
AVP, CISO
Amtrak
Automation in the world of information security allows teams to move more swiftly in the face of persistent threats while stitching together best-in-class tools that get the job done. This allows smaller teams to do more, but rather than eliminating the need for security talent, such technologies are freeing up bandwidth for analysts and others to engage in the meaningful work that requires a human touch.
Join this session to learn:
- How automation and orchestration are playing a role in today’s security stack
- Areas where your peers refuse to automate, and why
- The future of security automation, including under malicious actors
12:00pm - 12:45pm EST Virtual Summit Keynote
Leading Through Disruption
Hosted by IBM

Beth Dunphy
Director, BISO & Privacy Leader
IBM Corporation

Mark Booth
CIO
Perdue Farms

Nicolas Leshock
CIO
General Dynamics
The timeline for adopting strategic technology and security trends rapidly increased in recent months, and now CIOs and CISOs are on the forefront of leading innovative business opportunities.
Join this session for a discussion on:
- Dynamic leadership in a volatile world
- Remastering your brand in times of transition
- Practical examples of adaptive strategy in action
By registering for this session, this serves as your authorization to Evanta or its vendor to provide your contact information to IBM to follow up on your interaction and participation. IBM’s use of your contact information is governed by the IBM Privacy Policy. If you need more information on how IBM is using your personal data you may refer to the IBM Privacy Statement. To withdraw your marketing consent and unsubscribe to receiving emails click on the unsubscribe button at this address: ibm.biz/marketingoptout.
12:45pm - 1:15pm EST Networking
Community Networking

Jamie Holcombe
Chief Information Officer
United States Patent & Trademark Office
Join the community networking session for an opportunity to informally connect with your peers. Through the free-form Shindig virtual platform, attendees can connect organically in one-on-one discussions or small groups.
8:00am - 8:45am EST Virtual Summit Keynote
Tomorrow’s Cyberthreats – Staying One Step Ahead
Hosted by Cybereason

Israel Barak
CISO
Cybereason

Sanjeev Addala
Chief Information Digital Officer
AES Corporation

Ryan Boulais
CISO
AES Corporation
At a time when customer trust is paramount and private data is precious, a major breach can be catastrophic for any organization. Effective security is an essential part of effective business strategy, yet security leaders face an ever-growing challenge to guide their enterprise through the evolving threat landscape.
Join this virtual keynote to explore:
- Strategies for addressing the emerging threat landscape
- The role today’s CIOs and CISOs play in guiding business strategy to mitigate risk
- Communication strategies for educating users about security – and holding them accountable
8:45am - 9:00am EST Break
9:00am - 10:00am EST Virtual Summit Boardroom
Cloud IAM - Enlightenment or Inferno?
Hosted by DivvyCloud by Rapid 7

Brian Johnson
SVP, Cloud Security Practice
DivvyCloud

Joseph Dyer
CISO
ICF

Vikas Mahajan
VP & CISO
American Red Cross
Strong IAM is one key to preventing data breaches and limiting the blast radius, should a security incident occur. But cloud IAM presents a new set of constructs for organizations to build and manage. Is this the most comprehensive identity and access control out there, or yet another layer of complexity added to your program?
In this session, you will discuss:
- Why managing cloud IAM is so complex
- The challenges cloud IAM creates for IT and cybersecurity professionals
- How leading organizations are governing cloud IAM to reduce risk and the chance of a data breach
9:00am - 10:00am EST Virtual Summit Boardroom
Measuring and Communicating Risk - What Really Counts?
Hosted by ReliaQuest

John Burger
CISO and Vice President of Infrastructure
ReliaQuest

Scott Daitzman
Chief Information Security Officer
NVR

Jeremy Dold
Business Information Security Officer
Liberty Mutual

Richard Friedberg
Chief Security Officer
Blackbaud
Leading information security executives know that the language of technology doesn’t always resonate outside of IT. “Risk” is the vocabulary of the business, yet measuring and discussing this all-important concept in an actionable way remains a unique challenge.
Join this session to learn:
- Actionable risk metrics, both for use inside the security function and with outside stakeholders
- How the language and awareness of information security risk has evolved
- Techniques to automate collection of meaningful security metrics
10:00am - 10:45am EST Virtual Summit Keynote
Protecting People, the New Perimeter
Hosted by Proofpoint

Lucia Milica
Global Resident CISO
Proofpoint

Mike Gordon
VP & CISO
Lockheed Martin

Randy Vickers
CISO
United States House of Representatives
As 2020 changes the way we live and work, cyber criminals are adapting as well. Join us as we examine the biggest challenges security leaders face, and why a people-centric approach to security is everyone’s biggest opportunity to stop attackers and protect their organization.
Join this keynote for a discussion on:
- Why social engineering dominates among today’s cyber threat actors
- How remote work and the move to the cloud has changed the nature of threats
- The ways their organizations are building controls to better understand and protect people
10:45am - 11:00am EST Break
December 1, 2020
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.