-
Building a World-Class AppSec Program
Jeremy Brooks, Information Security Architect, Aaron’s, Inc.
Eric Simmons, Information Security Manager & Application Security Lead, Aaron’s, Inc.
Eric Simmons, Information Security Manager and Application Security Lead at Aaron’s, and Jeremy Brooks, Information Security Architect at Aaron’s, led a CSO50 award-winning project to rethink application security for efficiency and speed. Partnering with QA, development, and DevOps, they built a platform enabling integration of application security across Aaron’s technologies. Join us to learn how they now deliver faster feedback to development teams with self-service processes and automation.
Interviewed by: Derek Hulitzky, VP, Content Development & Strategy, IDG Communications, Inc.
-
Creating a Global Cybersecurity Assurance Program with Ongoing Value
Angela Burnette, Global Cybersecurity Assurance Manager, Global Security Program Development, Aflac
Stacia Dickerson, Director, Global Security Program Development, Aflac
Stacia Dickerson, Director, Global Security Program Development at Aflac, and Angela Burnette, Global Cybersecurity Assurance Manager at Aflac, helped the Aflac lead a CSO50 award-winning quest to discover unknown gaps in Aflac’s security program and to mature the control environment. To solve for this, Aflac built a Cybersecurity Assurance Program (CAP) at the global level. Join us to learn how the program — developed against the NIST Cybersecurity Framework — adds ongoing value to Aflac.
Interviewed by: Derek Hulitzky, VP, Content Development & Strategy, IDG Communications, Inc.
-
Today’s Attack Surface is Exploding. Are You Ready?
Tony Cole, CTO, Attivo Networks
Today’s attack surface is rapidly changing, security teams are facing an increasing visibility challenge, and new guidance from the Treasury and Department of Justice involves possible sanctions violations through ransomware payments. Join us for this session as Tony Cole, CTO at Attivo Networks, and Bob Bragdon, SVP and Managing Director of CSO, discuss how Attivo Networks is helping security professionals tackle these threats.
Interviewed by: Bob Bragdon, SVP/Managing Director Worldwide, CSO
-
Identity and Access Management at the Forefront of Digital Transformation
Dave Wilner, Chief Revenue Officer, Auth0
Many companies are investing in digital transformation in 2020 and beyond — particularly in the face of a pandemic that’s forced us to adapt the way we work and interact. As companies accelerate their digital transformation timelines, many find that identity access management is essential to the speed of their success. Join us for this session to learn how four companies — Babylon, Siemens, and Kiva — approach transformation, and how they’re managing identity in their journeys.
-
Using Security Innovation to Protect the Dynamic Workforce
Nicole Eagan, Founder, Chief AI & Strategy Officer
Nabil Zoldjalali, Director of Cloud Security
The future of work remains unpredictable, and organizations are rethinking their security approach to achieve much-needed adaptability and resilience. Whether it’s clouds and SaaS, to email, to IoT and beyond, join us for this session to learn how the Darktrace Immune System protects the dynamic workforce with AI augmentation, autonomous response, and unified visibility.
-
Measuring Risk in 2020: Findings from the Enterprise of Things Security Report
Shawn Taylor, Customer Evangelist, Senior Systems Engineer, Forescout Technologies
Shawn Taylor, Customer Evangelist and senior systems engineer at Forescout Technologies, is an expert on the Forescout Device Cloud — the world’s largest repository of connected device data. Join us for this session to hear how Forescout Research Labs analyzed the risk posture of more than 8 million devices to reveal the greatest points of risk across today’s enterprise. You’ll hear about the ten riskiest device types, riskiest device functions across verticals, and how to mitigate and remediate these risks.
-
Data: The Risk We All Share
Stephen Cavey, Co-Founder, Ground Labs
In the world of growing compliance regulation, constant risk, and remote workforces, a solid data management strategy is critical to success. When an organization fails to understand and secure data, it fundamentally puts your organization at risk of not only fines, but lost customer, employee and shareholder trust. Join us for this session as Stephen Cavey explores the benefits and pitfalls of enterprise data.
-
Enabling Self-Healing Endpoints in a Work From Home World
Dan Wolff, Director, Product Management & Marketing, HCL Big Fix
As more people work from home and anxiety mounts, expect organizations can expect cyberattacks of all kinds to take advantage. If an organization were asked to continuously patch all of its endpoints across the enterprise, how many tools would be needed and how would you mange endpoints off of the corporate network? Join us for this session to learn how with These issues can be handled smoothly with the right tools, the right processes, and an automated, self-healing endpoint environment.
-
North Dakota’s K-20W Initiative: Every Student, Every School, Cyber Educated
Shawn Riley, CIO, ND Information Technology
Shawn Riley is CISO for the ND Information Technology Department serving the State of North Dakota’s government agencies. Its CSO50 award-winning K-20W initiative (kindergarten through PhD and workforce) called “Every Student, Every School, Cyber Educated” is setting students up for success with a focus on computer science and cybersecurity education and training. Join us to learn how this model for other states reflects a whole-of-government approach to helping students and businesses succeed.
Interviewed by: Derek Hulitzky, VP, Content Development & Strategy, IDG Communications, Inc.
-
Improving Team Satisfaction and Skills with Creative Penetration Testing
Michael Kenney, Lead Information Security Engineer, Penn Medicine
Michael Kenney is Lead Information Security Engineer at Penn Medicine where they’ve created their CSO50 award-winning ‘Penn Test Security Challenge’ that leverages gamification penetration testing exercises to add value. By building skills in a creative way, the program develops staff to effectively assess internal technologies so they can mitigate vulnerabilities before they occur. Join us for this session to learn how hacker and exploitation gaming improves staff satisfaction and skills.
Interviewed by: Derek Hulitzky, VP, Content Development & Strategy, IDG Communications, Inc.
-
Leveraging Blockchain to Mitigate Breaches in Real Time
Lou Senko, CIO, Q2 Software, Inc.
Lou Senko is CIO of Q2 Software where his team created a CSO50 award-winning data governance and protection technology – the first of its kind — for banking and lending. Powered by blockchain-based data-security, TrustView works to mitigate breaches in real time and safeguards account holders’ most critical data: financial information. Join us for this session to learn how — with TrustView technology — data simply won’t exist when it’s found, rendering it useless to unauthorized entities.
Interviewed by: Bob Bragdon, SVP/Managing Director Worldwide, CSO
-
Scaling Global Security Capabilities Across Borders
Tima Soni, Chief, Cybersecurity Section, United Nations International Computing Centre
Tima Soni is CISO at the United Nations International Computing Centre where her team built a CSO50 award-winning common security services hub for the United Nations family of agencies. Originating a few years ago as a continuous security improvement suite of tools for a handful of agencies, its success led the center to scale it to a comprehensive global solution serving 30 agencies and growing. Join us to hear about their comprehensive set of capabilities and cyber security solutions.
Interviewed by: Derek Hulitzky, VP, Content Development & Strategy, IDG Communications, Inc.