What’s Happening, and When

The agenda features best-in-class keynotes, conversations, and workshops that prepare you for the future of work in the coming year.

All times listed on the agenda are Eastern Standard Time.

How Should We Anticipate Unknown Threats? Creating a Proactive Organization for Swift Response

Anticipation. It’s one of the U.S. Army’s eight principles of sustainment, along with integration, responsiveness, simplicity, economy, survivability, continuity, and improvisation. On the information security battlefield, CISOs and their organizations face growing needs to better anticipate threats. The downside if they don’t? Dwell time grows — and with it — exponential damage to revenue, operations, and reputation. Join us as information security and business experts discuss how to define risk tolerance, share anticipatory risk strategies for business, and how CISOs and security leaders can enable them for success in their organizations.

1:00pm - 1:45pm

Preparing for Key Threats that Matter

Ransomware, vulnerabilities, and bad actors including nation states threaten to disrupt the business landscape. What’s on the horizon, and how can you prepare? Join us for expert insights on how berst to prepare your organization.

1:45pm - 2:05pm

Is Your Organization Prepared to Fix Its Reputation?: An Interactive Workshop

Caroline Beckmann, Senior Director, Trident DMG

Breaches and intellectual property theft are becoming more commonplace, and for each incident, an organization experiences not only financial harm, but reputational damage. Join us for this workshop to learn how you can prepare your organization to move quickly when reputational damage strikes.

 

2:15pm - 2:40pm

Industry Executive Perspective from Google

Join us as an expert from Google shares ideas on how organizations can engage their workforce for productivity and innovation. (Session in development.)

2:40pm - 3:05pm

Anticipating Rising Threats

Deneen DeFiore, Vice President & CISO, United Airlines

As one of the largest airlines in the world, United Airlines faces — and manages — rising threats every day. Join us to learn how they mitigate risks in an environment of unknown and rising threats.

3:05pm - 3:19pm

Industry Executive Demo

Join us for a demo from an industry recognized company.

3:20pm - 3:45pm

Log4j, Open Source, and Why It’s a Big Deal

Ever since the Apache Software Foundation revealed a huge vulnerability in its Log4j Java logging library, organizations have been scrambling to secure their technology and prevent hackers from exploiting it. Beyond the time and work lost to address this specific vulnerability, it raises bigger questions about how to deal with unknown risks in open source tools. Join us to learn the latest on Log4j, and how to prepare your organization moving forward.

Why Time is Money with Incident Response

Martin Bally, Global CISO, Stellantis

What happens between an incident and your organization’s response? Dwell time grows — and with it — exponential damage to revenue, operations and reputation. Join us as we discuss strategies to minimize time from incident to response.

Managing Talent Amid a Cybersecurity Workforce Deficit

Tim Byrd, CISO, TIAA
Khalilah Scott, Founder, TechSecChix
Jeff Weber, Executive Director of the Technology Practice, Robert Half

As the frequency and severity of cyberattacks increases, organizations are having to fight attacks with a diminished workforce. Some estimates put the number of open jobs in the millions, and executives have said the increased workloads on current employees are causing burnout. Join us to assess current employment market for cybersecurity professionals, explore short- and long-term solutions for leaders looking to hire and retain security talent, and learn how to use this time as an opportunity to add diversity to your teams.

3:45pm - 4:05pm

Industry Executive Perspective from IBM

Join us as an IBM executive shares best practices and innovation for information security. (Session in development.)

4:05pm - 4:30pm

The Evolving Role of Cyber Insurance

A key strategy for organizations to mitigate risk is to transfer it, and cyber insurance offers organizations important ways to soften the impact of a significant attack and breach. But as attacks have become more prevalent, the insurance landscape has evolved. Join us for an update on this important area of business

IDC’s Predictions for the Future of Trust

To align traditional security and risk solutions with customer success, brand, and reputation, IDC predicts that by 2025, 35 percent of organizations will replace net promoter score-like metrics with trust indices in RFPs. Join us as IDC reveals why this, and other predictions, are important for CISOs in 2022.

4:30pm - 4:45pm

Industry Solution Perspectives

Join us as solution providers share how new innovations can improve your organization’s information security posture.

4:45pm - 5:05pm

Industry Executive Perspective from Interos

Join us as an expert from Interos provides guidance on how you can improve your InfoSec environment. (Session in development.)

5:05pm - 6:05pm

Building Award-Winning Trust with InfoSec

Join us as IDC interviews executives from winners of its Best in Future of Trust awards. You’ll gain insights on their award-winning work in creating secure information security environments.

Curating the InfoSec Toolbox, and How to Master It: Choosing Wisely in the Always-Changing Security Superstore

Whether best-of-breed, or platform-based, many of today’s organizations use just a fraction of the security capabilities from the tools and services available to them, thereby diluting the value of their investment. At the same time, new tools, services, and capabilities continue to emerge that lower the value of existing investments — or render them obsolete. Smart organizations use strategies to maximize security investments, including rationalization, utilization, optimization, and savvy analysis. Join us as information security experts share proven strategies.

1:00pm - 1:45pm

Making Sense of the Security Provider Landscape

Jay Leek, Managing Partner & Co-Founder, SYN Ventures

As security solutions evolve, emerge, and disrupt incumbent players, buying organizations face challenges in vetting what’s right for their business. Join us for guidance from one of the industry’s leading watchers of enterprise security tech

2:00pm - 2:25pm

Assessing the Security Landscape: A Q&A with Google

Join us for this one-on-one interview with Google about their assessment of the current security and risk landscape.

2:45pm - 3:00pm

Industry Executive Demo

Join us for a demo from an industry recognized company.

3:00pm - 3:25pm

Building a Technology Rationalization Program

DJ Goldsworthy, VP & Global Practice Lead, Aflac

Whether best-of-breed, or platform-based, many organizations use just a fraction of the security capabilities in the tools and services available to them, thereby diluting the value of their investment. At the same time, new tools, services and capabilities continue to emerge that lower the value of existing investments — or render them obsolete. Smart organizations use strategies to maximize security investments, including rationalization, utilization, optimization, and savvy analysis. Join us to learn how a security rationalization program works.

Mergers and Acquisitions for Security: An Insider’s View

Rick Grinnell, Founder and Managing Partner, Glasswing Ventures

It’s been a big year for mergers and aquisitions in the security space. Join us as our panel of experts discusses the M&A activity they’re seeing, and trends that could impact buyers of security technologies.

Achieving Secure Collaboration: 5 Steps to Take Now

Irwin Lazar, President & Principal Analyst, Metrigy

Enterprise collaboration has drastically changed in the last two years as messaging and video often replace phone and email, and as new applications rapidly enter the market. Achieving secure collaboration means establishing a proactive approach to identify and mitigate risk. Join us to learn the keys to successfully enabling internal — and cross-company collaboration – securely. We’ll cover the expanding collaboration security landscape beyond phones and email, along with the needs for a centralized policy enforcement point, to extend security to remote employees, and to leverage emerging capabilities including software-defined perimeter, zero trust, and secure access service edge (SASE).

3:25pm - 3:45pm

Best Security Practices: A Q&A with IBM

Join us for this one-on-one interview with IBM where we look at best security practices.

3:45pm - 4:10pm

You Bought the Tool, So What Next? Top Questions Every CISO Should Ask

Whether your organization bought a new security tool, or it’s available through an acquisition by your provider, there are important questions every CISO should ask. Are we using everything we can? Will we measure its performance over time? Join us as we share important questions every CISO should ask when new tech is added to the security stack.

4:25pm - 4:28pm

Quick-Pitch from Netenrich

Join us for a quick-pitch from Netenrich.

4:28pm - 4:31pm

Quick-Pitch from Nullable / Aware

Join us for a quick-pitch from Nullable / Aware.

Agenda subject to change.