Agenda 2021

CSO's FUTURE OF CYBERSECURITY AND TRUST SUMMIT

Event Dates: July 20-22

What’s happening, and when

All sessions and resources are available on-demand and accessible in the virtual event platform.

Haven’t Registered Yet? Sign Up Here

Already Registered? Login To The Event Here

1:00 - 1:50 PM

Why We Should All Be Worried

Nicole Perlroth, Cybersecurity Reporter at The New York Times, and author of This Is How They Tell Me The World Ends

One of the most coveted tools in a spy’s arsenal, a zero day has the power to silently spy on an iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid. For decades — under cover of classification levels and non-disclosure agreements — the United States government became the world’s dominant hoarder of zero days. U.S. government agents paid top dollar — first thousands of dollars, and later millions — to hackers willing to sell their lock-picking code and their silence. Then the United States lost control of its hoard and the market. Now those zero days are in the hands of hostile nations and mercenaries who don’t care if your vote goes missing, your clean water is contaminated, or our nuclear plants melt down. Join leading cybersecurity journalist Nicole Perlroth as she takes us down the dark path that brought us where we are today.

Interviewed by: Bob Bragdon, SVP/Managing Director Worldwide, CSO, IDG Communications, Inc. 

1:50 - 2:15 PM

Open Security: Moving from a Patchwork of Solutions to a Critical Platform

Jason Keirstead, Distinguished Engineer and CTO of Threat Management, IBM Security

Security leaders today are stressed with too much to do, too many security tools, too much complexity, too many alerts, and not enough skills. The challenge is that the tools providing the cybersecurity technology we rely on, don’t talk to each other. The reasons why vary – vendors are not incented enough to do so; there are competitive concerns; the APIs or standards sometimes don’t exist, or if they do, don’t work well. There is, however, one direction that the cybersecurity industry is starting to move in together to solve these challenges, and that direction is “open”.

2:15 - 2:35 PM

Networking Break and Live Group Discussion on The Road to Representation-Hiring, Retention and Promotions

Andy Ellis, Former CSO, Akamai Technologies
Bob Bragdon, SVP/Managing Director Worldwide, CSO, IDG Communications, Inc.

Making inroads on building a more representatively diverse workforce isn’t easy, but not impossible. Join Andy Ellis, Former CSO, Akamai Technologies, for a frank discussion about what to measure, how to measure and why retention, hiring and promotions are critical to success.  Bring your questions and advice to share.  Seating is limited and first-come, first-served!

2:35 - 2:55 PM

Digital Trust, and Why It Matters

Jim Alkove, Chief Trust Officer, Salesforce

“Trust” is defined as “a reliance on the integrity, strength, ability, surety, etc., of a person or thing; confidence.” As security has matured and aligned with the business, a growing focus on trust has become a priority for those organizations and their security teams. But trust needs to be more than a concept to deliver true business value. It must applied both externally (with customers, partners, suppliers, and investors) and internally (with employees). It must encompass business trust, digital trust, and people trust. It also requires a stable of the organization’s leaders committed to delivering on its promise. Understanding how it comes together is different for every organization, but for Salesforce it’s a corporate imperative. Join us for a wide ranging discussion on the role of trust, the tools necessary to make a SaaS partnership secure, and how the culture of an organization informs its approach to trust.

Interviewed by: Bob Bragdon, SVP/Managing Director Worldwide, CSO, IDG Communications, Inc. 

2:55 - 3:25 PM

Cybersecurity Outcomes: Don’t Lose Focus

Helen Patton, Advisory CISO, Cisco
Wade Baker, Partner & Co-Founder, Cyentia Institute

Security programs can fail for many reasons, but one common culprit is quite simple: losing focus. Are certain practices derailing the effectiveness of our security programs? Based on a survey of 4,800 security and IT professionals, we explore the practices that are surprisingly least impactful, and those that are highly effective across key outcomes. Learn how to apply these findings to your security strategy and engage with the C-Suite and Board to ensure alignment. You’ll leave this session with an extra boost of insight and confidence to help you focus on what matters most.

3:25 - 3:32 PM

Demo: Ransomware Detection and More

Philip Schleper, Systems Engineer, Commvault

Join Commvault and learn how the company approaches security, with a drill-down into its built-in security assessment tools; automatic ransomware detection and alerting; and auditing and reporting. Additionally, you’ll see how the role-based access controls in the Commvault Command Center enable self-service, while providing isolation for multi-tenant deployment.

3:32 - 4:00 PM

The State of OT Security: Trends and Strategies for the Future

Dawn Cappelli, VP and CISO, Rockwell Automation

With 24,000 employees and customers in more than 100 countries, Rockwell Automation is a global leader in industrial automation and digital transformation. As industries rely more and more on operational technology (OT), they can be vulnerable if they don’t consider critical security strategies. Join us to learn more about the state of OT security, and where it’s headed.

Interviewed by: Bob Bragdon, SVP/Managing Director Worldwide, CSO, IDG Communications, Inc. 

4:00 - 4:50 PM

A Business Perspective on Today’s Threat Environment

Jim Cooper, Chief Technologist, Futurist, Technology Evangelist, HP Inc.
Dave Maynor, Principal, Black Lotus Labs Research and Analysis Team, CenturyLink
Joseph Menn, Author, Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World; Technology Projects Reporter, Thomson Reuters

The risk to businesses and their technologies has changed dramatically over the last decade, with bad actors now undermining the trust an organization builds in the marketplace. How does today’s threat environment translate to what it actually means for businesses? What are the key risks, and how should organizations address them? Join us as our panel of experts discuss what organizations are doing wrong, what attackers are doing right, and the risks that concern them the most.

Moderated by: Bob Bragdon, SVP/Managing Director Worldwide, CSO, IDG Communications, Inc.

4:55 - 5:25 PM

Preparing for the Next Generation of Ransomware Attacks

JJ Cranford, Product Marketing Manager, Cybereason

The sophistication of ransomware has increased, while the bar is lowering for bad actors to deploy and operate successful attacks. Join us to understand: the anatomy of a modern ransomware attack from initial foothold to encryption of sensitive data; the connection between the HAFNIUM attack on Microsoft Exchange servers and modern ransomware tactics; and how Cybereason technology can fully prevent, detect and remediate sophisticated ransomware operations.

Ransomware in Focus: How AI Surgically Contains the Threat

Brianna Leddy, Director of Analysis, Darktrace

In the immediate aftermath of a ransomware attack, executives too often face a difficult dilemma: either pay a ransom, or shut down critical systems and services. In today’s increasingly complex digital ecosystems, the collateral damage that ensues from ransomware attacks can be broad-ranging and destructive, with organizations taking days, weeks, or even months to recover. But what if there was another way out – a way to surgically contain ransomware in its earliest stages, without disrupting normal business operations? Join this presentation to learn how Self-Learning AI is helping thousands of organizations fight back against ransomware.

Insights on OT/IT cybersecurity from Israel’s former CISO for Joint Military Forces

Daniel Bren, CEO and Co-founder, OTORIO

Watch IDG/CSO’s SVP Bob Bragdon in this interview of Daniel Bren, co-founder and CEO of OTORIO and former CISO for Israel’s Joint Military Forces. The OTORIO organization combines innovative technology, deep research and OT cyber expertise to deliver industrial-native OT cyber solutions. Daniel provides insights on topics including lessons learned from the Colonial Pipeline attack and other malicious cyber activity; the threat landscape for OT environments and how it is evolving; how CISOs have broadened their responsibilities to include OT environments; and more.

Interviewed by: Bob Bragdon, SVP/Managing Director Worldwide, CSO, IDG Communications, Inc. 

5:25 - 5:55 PM

Managing Trust with Clouds, AI and Quantum Computing

Raj Badhwar, SVP, CISO, Voya

Voya provides health, wealth and investment solutions that enable nearly 15 million individual, workplace and institutional clients to achieve their financial wellness goals. Establishing stakeholder trust across the organization’s complex ecosystem that that includes future-facing technologies — like clouds, AI and quantum computing — requires unique and evolving strategies. Join us to learn how they’re building an environment of trust with their customers and partners.

Interviewed by: Bob Bragdon, SVP/Managing Director Worldwide, CSO, IDG Communications, Inc. 

Managing an Ecosystem of Risk, Security and Trust

Rob Suárez, VP, CISO, BD (Becton, Dickinson and Company)

With more than 70,000 employees, BD is one of the largest global medical technology companies in the world and is advancing the world of health by improving medical discovery, diagnostics and the delivery of care. At BD, security spans a spectrum from enterprise IT, to products, manufacturing and services. Join us as we discuss how to manage the greatest risks in this environment, and what’s required to manage an ecosystem of trust across many stakeholders.

Interviewed by: Bob Bragdon, SVP/Managing Director Worldwide, CSO, IDG Communications, Inc. 

For Any Industry, These Are the Tough Lessons in Resilience Learned from Retail

Rich Agostino , SVP & CISO, Target Corporation

Minneapolis-based Target Corporation serves guests at nearly 1,900 stores and at Target.com. Of all of the industries impacted severely by the pandemic, retail was one hit most drastically. Yet Target was one of those businesses that was able to transform swiftly in order to operate under these challenges. Join us to hear what Target learned as a business, and what their CISO learned about security in that environment.

Interviewed by: Bob Bragdon, SVP/Managing Director Worldwide, CSO, IDG Communications, Inc. 

On Demand

On Demand Sessions Available (July)

Session descriptions listed in “On Demand Sessions” tab above.

Closing the Skills Gap with Smarter Cybersecurity Hiring and Team Development
Chris Green, Head of PR and Communications EMEA, (ISC)2
Stephen Khan, Chair, ClubCISO
Kunjal Tanna, Director, LT Harper
Interviewed by: Michael Hill, UK Editor, CSO, IDG Communications, Inc.

How to Achieve Least Privilege at Cloud Scale with Cloud Infrastructure Entitlement Management (CIEM)
Maya Neelakandhan, Head of Customer Success and Support, CloudKnox Security

How to Stop Attackers from Owning Your Active Directory
Carolyn Crandall, Chief Security Advocate, Attivo Networks
Tony Cole, Chief Technology Officer, Attivo Networks

How to Create Cyber Resilience for Digital Operations
Christopher Morales, CISO and Head of Security Strategy, Netenrich

How DevSecOps is Critical to a Successful Cloud Strategy
Sathish Muthukrishnan, Chief Information, Data and Digital Officer, Ally Financial

How to Use Cyber Asset Management to Build a Strong Security Program
Akash Ganapathi, Principal Solutions Architect/Team Lead, JupiterOne

Top Strategies for Securing Your Transformation to the Cloud
Jason Mitchell, SVP Engineering, Centrify

Ransomware in Focus: How AI Surgically Contains the Threat
Brianna Leddy, Director of Analysis, Darktrace

How can you be ready for the cyber-attack that’s heading your way?
Don Foster, Global Vice President, Sales Engineering, Commvault

Measuring Security & Building Trust: Digital Transformation Insights from Leaders
Ritesh Patel, Security Principal, bp
Ronald Ulko, Director of Security Enablement, Synack
Aisling MacRunnels, Chief Business and Growth Officer, Synack

How to Gain Holistic Visibility with Security
Presented by Elastic

How to Operationalize GRC
Rob Ellis, Senior Vice President of Sales, Reciprocity Labs

Experian Customer Story
Palo Alto Customer Story: Experian

Three Strategies to Ensure Cybersecurity and Resilience for Hybrid Microsoft Identities
Robert Bobel, Founder and Chief Executive Officer, Cayosoft

Trusting the Un-trustable: How to Remotely Verify the Integrity and Identity of Edge-to-Cloud Software
Andrew Jessup, Director of Product Management, Security Engineering, Hewlett Packard Enterprise

Preparing for the Next Generation of Ransomware Attacks
JJ Cranford, Product Marketing Manager, Cybereason

How to Integrate Security as a Front End Feed to Your GRC
Nick Pavlichek, Product Manager, OneTrust

1:00 - 1:35 PM

When IT Security Includes Operational Technology: Lessons Learned for All Industries

Jennifer L Watson, CISO, Celanese

Celanese Corporation is a global chemical leader in the production of differentiated chemistry solutions and specialty materials used in most major industries and consumer applications. With IT and OT environments exposed to risk, the organization must build a unique ecosystem to secure and defend against attacks. Join us for this session to learn how they manage security complexity and velocity to minimize risks.

Interviewed by: Bob Bragdon, SVP/Managing Director Worldwide, CSO, IDG Communications, Inc. 

1:35 - 1:55 PM

Focus on Zero Trust: The Roles of Context, Collaboration and Visibility

Jason Keenaghan, Zero Trust Strategy Leader, IBM

With so many enterprises moving to multi-cloud architectures, understanding the role that Zero Trust plays to help manage and safeguard your assets becomes more critical. In this Industry Partner interactive Q&A session, we’ll examine governance, configuration, control, policies, and automation. The key is to look at Zero Trust as an integrated, three-step process: insight, enforcement, and detect / respond where Zero Trust becomes a business enabler, providing safety, flexibility and agility.

Interviewed by: Charles Pelton, Contibuting Editor, CSO, IDG Communications, Inc.

1:55 - 2:15 PM

Networking Break and Live group discussion on The Evolution of Operational Technology Risk

Jennifer L Watson, CISO, Celanese
Bob Bragdon, SVP/Managing Director Worldwide, CSO, IDG Communications, Inc.

As IT and Operational Technologies converge, so do the many risks this presents to all sorts of organizations. Bring your questions to this live group discussion featuring Jennifer L Watson, CISO at Celanse. Seating is limited and first-come, first-served!

2:15 - 2:40 PM

An Insider’s View of Working With Security Startups: Strategies, Tips and Advice

Andy Ellis, Former CSO, Akamai Technologies

Security is an area of technology that has been very comfortable adopting point, best-of-breed solutions to address isolated challenges — and many of those solutions come from small startup companies. That said, working with startup solution providers is different than working with more established, traditional providers. What’s the best way to work with startups? What are the red flags? Join us for this session with a former CSO and now venture executive who can give you advice and strategies on leveraging start-ups for mutual advantage.

Interviewed by: Bob Bragdon, SVP/Managing Director Worldwide, CSO, IDG Communications, Inc. 

2:40 - 3:00 PM

Key Findings from a Cisco Study: Poised for Success – Successful Security Programs

Nancy Cam-Winget, Cisco Fellow, Cisco

An independent survey commissioned by Cisco examined three core component parts: enabling the business; managing risk; and operating efficiently. In this Industry Partner interactive Q&A session, we’ll explore what makes security programs succeed – and sometimes stumble. We’ll look at how to build a strong security culture, and how to resolve the growing tension between encryption and privacy. The takeaway for allying these tensions: visibility enabled by data analytics, machine learning, and artificial intelligence.

Interviewed by: Charles Pelton, Contributing Editor, CSO, IDG Communications, Inc.

3:00 - 3:30 PM

Securing the IT and Physical Supply Chain

Mike Towers, CISO, Takeda Pharmaceuticals

Takeda Pharmaceuticals is a global, values-based, R&D-driven biopharmaceutical leader committed to discover and deliver life-transforming treatments. Throughout many industries, cybercriminals are taking advantage of fragile supply chains — from manufacturing to delivery — and threaten to disrupt the limited capacity they have. Join us to learn what supply chain security means to Takeda, and get tips and strategies on how to secure your physical and IT supply chain.

Interviewed by: Bob Bragdon, SVP/Managing Director Worldwide, CSO, IDG Communications, Inc. 

3:30 - 3:50 PM

How to Transform Security from a Barrier to an Accelerator of Innovation

Sunil James, Senior Director, Security Engineering, Hewlett Packard Enterprise

CIOs are evolving IT architectures toward more dynamic computing paradigms, including the public and private cloud (and often both). However, these leaders and their IT departments must deliver demonstrably secure experiences for customers and employees. Join us for this discussion exploring how to talk with your CIO about advancing IT ecosystems with confidence. The key: develop a Zero Trust security architecture and find new ways to automate, measure, and verify from the edge to the cloud.

Interviewed by: Charles PeltonContributing Editor, CSO, IDG Communications, Inc.

3:50 - 4:25 PM

How Boards Think About Security, and What Drives Their Decisions

Myrna Soto, Corporate Director/Board Member, CMS Energy, Spirit Airlines, Popular Inc, and Trinet

Sitting atop most organizations – and certainly all publicly-traded ones — is a board of directors. And whether you interact with your board directly or not, it’s important to understand how board members think about information security and what drives their decisions. Join us for this session with a board member to learn how to work with the board, what their expectations are, and how to work with them in this era of ransomware and supply chain attacks.

Interviewed by: Bob Bragdon, SVP/Managing Director Worldwide, CSO, IDG Communications, Inc. 

4:25 - 4:45 PM

How to Stop Attackers from Owning Your Active Directory

Carolyn Crandall, Chief Security Advocate, Attivo Networks
Tony Cole, Chief Technology Officer, Attivo Networks

Active Directory is a high value target based on its ability to grant elevated permission and escalate attacks. It’s inherently vulnerable, constantly changing, and organizations trying to protect it in traditional ways are find themselves highly exposed to ransomware attacks. Join us for an overview of top attack tactics — and how new tools can: automate the finding of exposures; data cloak Active Directory objects’ and detect and derail live attacks.

Measuring Security & Building Trust: Digital Transformation Insights from Leaders

Ritesh Patel, Security Principal, bp
Ronald Ulko, Director of Security Enablement, Synack
Aisling MacRunnels, Chief Business and Growth Officer, Synack

Organizations and security professionals across industries are taking proactive measures to strengthen their defenses and protect their most important asset – trust. Join us for this session where industry leaders discuss how they measure security risk and discuss digital transformation trends and the testing needed to navigate these transitions securely.

Top Strategies for Securing Your Transformation to the Cloud

Jason Mitchell, SVP Engineering, Centrify

With 80% of organizations predicted to migrate toward cloud, hosting and colocation services by 2025, new attack surfaces will arise and create greater security vulnerabilities. Yet just in the last year, recent studies report that 70% of organizations experienced a public cloud security incident. What can you do to safeguard your infrastructure and services both during and after cloud migration? Join us to discuss what IT and security leaders are finding most effective for managing a secure transformation to the cloud.

4:45 - 5:10 PM

How To Approach Secure Access Service Edge, or SASE

Lucian Constantin, Senior Writer, CSO Online, IDG Communications, Inc.;
Michael Cooney, Senior Editor, Network World, IDG Communications, Inc.

As enterprises build up their mobile, edge and cloud deployments, they’re being challenged to deliver a more efficient, scalable network-security architecture. Secure access service edge (SASE) is the convergence of security and networking in a cloud-delivered model. Join us to learn what’s driving demand for SASE and how SASE providers’ capabilities differ. We’ll also discuss what happens to legacy network and security products as SASE is deployed and which skills companies need to get started.

Moderated by: Ann Bednarz, Assistant Managing Editor, Features, Network World, IDG Communications, Inc.

Preparing for XDR: What CISOs Should Be Doing Now

Jon Oltsik, Senior Principal Analyst, ESG

XDR is one of security’s buzziest acronyms — and for good reason. XDR, which stands for eXtended Detection and Response, promises to provide more timely and accurate threat detection by gathering and processing data from an integrated set of security tools. But it’s early days yet and the market is changing rapidly, with different vendors offering not only different approaches but different definitions of XDR. Join us for some much-needed guidance for CISOs who are looking to start their XDR journey.

Interviewed by: Amy Bennett, Executive Editor, CIO.com, IDG Communications, Inc.

The Journey to Trust-Centric Security

Omar Khawaja, CISO, Highmark Health

With more than 35,000 employees covering the insurance needs of more than 6 million members in Pennsylvania, Delaware, West Virginia and New York, Highmark Health is an independent licensee of the Blue Cross Blue Shield Association. What are the elements needed to make a security program more trust-centric. How do you know if your program is approaching trust-centricity? Join us as we discuss the journey to trust-centric security at Highmark, and how you can take this methodical approach for your organization.

On Demand

On Demand Sessions Available (July)

Session descriptions listed in “On Demand Sessions” tab above.

Closing the Skills Gap with Smarter Cybersecurity Hiring and Team Development
Chris Green, Head of PR and Communications EMEA, (ISC)2
Stephen Khan, Chair, ClubCISO
Kunjal Tanna, Director, LT Harper
Interviewed by: Michael Hill, UK Editor, CSO, IDG Communications, Inc.

How to Achieve Least Privilege at Cloud Scale with Cloud Infrastructure Entitlement Management (CIEM)
Maya Neelakandhan, Head of Customer Success and Support, CloudKnox Security

How to Stop Attackers from Owning Your Active Directory
Carolyn Crandall, Chief Security Advocate, Attivo Networks
Tony Cole, Chief Technology Officer, Attivo Networks

How to Create Cyber Resilience for Digital Operations
Christopher Morales, CISO and Head of Security Strategy, Netenrich

How DevSecOps is Critical to a Successful Cloud Strategy
Sathish Muthukrishnan, Chief Information, Data and Digital Officer, Ally Financial

How to Use Cyber Asset Management to Build a Strong Security Program
Akash Ganapathi, Principal Solutions Architect/Team Lead, JupiterOne

Top Strategies for Securing Your Transformation to the Cloud
Jason Mitchell, SVP Engineering, Centrify

Ransomware in Focus: How AI Surgically Contains the Threat
Brianna Leddy, Director of Analysis, Darktrace

How can you be ready for the cyber-attack that’s heading your way?
Don Foster, Global Vice President, Sales Engineering, Commvault

Measuring Security & Building Trust: Digital Transformation Insights from Leaders
Ritesh Patel, Security Principal, bp
Ronald Ulko, Director of Security Enablement, Synack
Aisling MacRunnels, Chief Business and Growth Officer, Synack

How to Gain Holistic Visibility with Security
Presented by Elastic

How to Operationalize GRC
Rob Ellis, Senior Vice President of Sales, Reciprocity Labs

Experian Customer Story
Palo Alto Customer Story: Experian

Three Strategies to Ensure Cybersecurity and Resilience for Hybrid Microsoft Identities
Robert Bobel, Founder and Chief Executive Officer, Cayosoft

Trusting the Un-trustable: How to Remotely Verify the Integrity and Identity of Edge-to-Cloud Software
Andrew Jessup, Director of Product Management, Security Engineering, Hewlett Packard Enterprise

Preparing for the Next Generation of Ransomware Attacks
JJ Cranford, Product Marketing Manager, Cybereason

How to Integrate Security as a Front End Feed to Your GRC
Nick Pavlichek, Product Manager, OneTrust

1:00 - 1:30 PM

How to Improve Visibility Into Operating Environments

Roland Cloutier, CSO, TikTok

With a mission to inspire creativity and bring joy, TikTok is a leading destination for short-form mobile video. CISO Roland Cloutier has worked at organizations built on legacy environments as well as cloud-native organizations. Join us for this interview to learn how those differing levels of inherent complexity change the way security is addressed, what security teams should be doing to improve visibility into their operating environments, and how to exhibit trust to those outside an organization.

Interviewed by: Bob Bragdon, SVP/Managing Director Worldwide, CSO, IDG Communications, Inc. 

1:30 - 1:50 PM

Latest Trends in Securing Cloud Operations

M.K. Palmore, Vice President, Field CSO – Americas, Palo Alto Networks

CIOs and CISOs continue to play a crucial role in ensuring cloud assets operate smoothly and securely, and as the pace of transformation accelerates, security leaders must run even faster to keep up. Join this fireside chat and get up speed on the latest trends in securing cloud operations, plus how to ensure security is at the forefront of deployments and when to balance on-prem and cloud in an era of remote work.

Moderated by: Julia King, Contributing Editor, CSO

1:50 - 2:10 PM

Networking Break

2:10 - 2:45 PM

Strategic Tips for Multi Cloud Security, Vulnerability Management, and Incident Response

Jason Keenaghan, Zero Trust Strategy Leader, IBM
Wendy Nather, Head of Advisory CISOs, Cisco

With so many enterprises adopting multi-cloud approaches to their infrastructure, the need to increase visibility, define the right governance structures, and prepare for any security challenge has become more important than ever. In this multi-vendor panel we discuss how to approach and manage complex security challenges from the perspectives of people, processes, data, the application, and the platform. The session will look at assessment and how to handle both known and unknown vulnerabilities.

Interviewed by: Charles Pelton, Contributing Editor, CSO, IDG Communications, Inc.

2:45 - 3:20 PM

Closing the Skills Gap with Smarter Cybersecurity Hiring and Team Development

Clar Rosso, CEO, (ISC)2
Stephen Khan, Chair, ClubCISO
Kunjal Tanna, Director, LT Harper

With more than 3 million cybersecurity roles estimated to be unfilled across the globe, organizations and security leaders must evolve hiring and team development strategies to incorporate smarter, more forward-thinking approaches. Organizations have the power to not only more efficiently secure the cybersecurity talent they need but also better train and successfully keep skilled team members for the long term. In this session, a panel of global experts will define what smarter recruitment and team retainment means for organizations.

Interviewed by: Michael Hill, UK Editor, CSO, IDG Communications, Inc.

3:20 - 3:40 PM

How Are Organizations Building Digital Trust?

Joe Nocera, Cyber & Privacy Innovation Institute Leader, PwC US

How do tech, security, privacy and risk leaders approach stakeholder trust? PwC surveyed executives of mid-size to very large companies across US sectors and found that – to increase stakeholder trust — businesses are ramping up investments in cybersecurity, information governance, consumer privacy, and enterprise resilience. What are the corporate characteristics that go into building a trustworthy organization? What are the risks from third-parties, and what should businesses be doing to reduce their risk exposure from them? Join us for answers to these questions and more.

Interviewed by: Bob Bragdon, SVP/Managing Director Worldwide, CSO, IDG Communications, Inc. 

3:40 - 4:10 PM

Zero Trust: Defending Against Cybersecurity Threats in a World of Widened Attack Surfaces

Joanna Burkey, Chief Information Security Officer, HP Inc.

Enterprises are under siege from a variety of external cybersecurity attacks and internal threats, forcing organizations to implement new technologies and processes to safeguard corporate assets. Cybersecurity chiefs remain critical to defense, but attack vectors have broadened significantly amid the pandemic, as perpetrators seek to catch companies off-guard with ransomware. Meanwhile, remote work has amplified the corporate network, presenting CISOs with additional risks as employees unwittingly flout cyber hygiene. Join us to learn how – internally — HP, Inc. leverages a balanced, Zero Trust model that leans on modern tools, practices and diverse talent to defend against emerging threats.

Interviewed by: Clint Boulton, Senior Writer, CIO.com, IDG Communications, Inc.

On Demand

On Demand Sessions Available (July)

Session descriptions listed in “On Demand Sessions” tab above.

Closing the Skills Gap with Smarter Cybersecurity Hiring and Team Development
Chris Green, Head of PR and Communications EMEA, (ISC)2
Stephen Khan, Chair, ClubCISO
Kunjal Tanna, Director, LT Harper
Interviewed by: Michael Hill, UK Editor, CSO, IDG Communications, Inc.

How to Achieve Least Privilege at Cloud Scale with Cloud Infrastructure Entitlement Management (CIEM)
Maya Neelakandhan, Head of Customer Success and Support, CloudKnox Security

How to Stop Attackers from Owning Your Active Directory
Carolyn Crandall, Chief Security Advocate, Attivo Networks
Tony Cole, Chief Technology Officer, Attivo Networks

How to Create Cyber Resilience for Digital Operations
Christopher Morales, CISO and Head of Security Strategy, Netenrich

How DevSecOps is Critical to a Successful Cloud Strategy
Sathish Muthukrishnan, Chief Information, Data and Digital Officer, Ally Financial

How to Use Cyber Asset Management to Build a Strong Security Program
Akash Ganapathi, Principal Solutions Architect/Team Lead, JupiterOne

Top Strategies for Securing Your Transformation to the Cloud
Jason Mitchell, SVP Engineering, Centrify

Ransomware in Focus: How AI Surgically Contains the Threat
Brianna Leddy, Director of Analysis, Darktrace

How can you be ready for the cyber-attack that’s heading your way?
Don Foster, Global Vice President, Sales Engineering, Commvault

Measuring Security & Building Trust: Digital Transformation Insights from Leaders
Ritesh Patel, Security Principal, bp
Ronald Ulko, Director of Security Enablement, Synack
Aisling MacRunnels, Chief Business and Growth Officer, Synack

How to Gain Holistic Visibility with Security
Presented by Elastic

How to Operationalize GRC
Rob Ellis, Senior Vice President of Sales, Reciprocity Labs

Experian Customer Story
Palo Alto Customer Story: Experian

Three Strategies to Ensure Cybersecurity and Resilience for Hybrid Microsoft Identities
Robert Bobel, Founder and Chief Executive Officer, Cayosoft

Trusting the Un-trustable: How to Remotely Verify the Integrity and Identity of Edge-to-Cloud Software
Andrew Jessup, Director of Product Management, Security Engineering, Hewlett Packard Enterprise

Preparing for the Next Generation of Ransomware Attacks
JJ Cranford, Product Marketing Manager, Cybereason

How to Integrate Security as a Front End Feed to Your GRC
Nick Pavlichek, Product Manager, OneTrust

Agenda subject to change.

Register Now