CISO Dallas Summit | Nov. 2, 2023 | Dallas, TX, USA
James Binford
Director and Business Information Security Officer
Humana
James is a Director and Information Security Officer at Humana. James’ career focus is on securing Digital Transformations, modernizing security and on making the journey to cloud less painful, and he has built and practiced this skillset at Google, US Bank, Amazon Web Services and KPMG. He has an MS in Management Information Systems from Texas A&M - Central Texas and an MBA from the University of Texas at Austin.
Jeff Kirby
CISO
Interstate Batteries
A seasoned cybersecurity transformational leader with over thirty years of experience in information technology security, operations, change management, SDLC release management, disaster recovery, risk management, IT governance and compliance, PCI compliance, and innovative IT business development for $2b private retail organization, multi-million/ billion dollar Fortune 500 quick service food industry, world-class trade show industry, and creative services / marketing for bleeding edge voice services industries.
Michael Anderson
CISO & CTO
Dallas Independent School District
Michael is an accomplished executive with extensive experience in Education, Government, and the private sector, ranging from early-stage startups to publicly traded Fortune 500 organizations. He has served as a chief risk advisor for several employers, where he advised Committees, Governing Bodies, and Boards on a wide range of risk, regulatory, and privacy matters. Michael has a proven track record of building and developing risk-based programs, leaders, and teams in turnaround, steady-state, or merger and acquisition scenarios. In addition to his executive career, Michael is also an entrepreneur. He owns Your Thought Life Mindset Coaching, where he helps clients overcome mindset challenges to achieve their goals, aspirations, and dreams. Michael is the host of Your Thought Life Mindset Podcast; one of the fastest-growing podcasts in the self-development space (2023). Michael is loved by everyone who knows him. He is a former speaker of the year and is frequently invited to serve as a keynote speaker, moderator, panelist, and workshop presenter. Currently, he serves as Deputy CTO and CISO at Dallas ISD. Michael holds a master's degree in information systems and technology management and has various professional certifications. In his free time, Michael enjoys mindfulness coaching, learning and making music with two turntables and a mixer.
In this thought-provoking discussion, we delve into the crucial concerns of today's technology leaders. Discover how CIOs and CISOs navigate the evolving landscape by prioritizing talent development, fostering a sustainable approach, and fortifying enterprise security. Gain valuable insights into innovative strategies that empower organizations to attract and retain top talent, embrace environmentally conscious practices, and implement robust cybersecurity measures. Join us to stay ahead in the digital age while safeguarding your organization's success.
Key Takeaways:
James Binford
Director and Business Information Security Officer
Humana
Jeff Kirby
CISO
Interstate Batteries
Michael Anderson
CISO & CTO
Dallas Independent School District
Glenn Dally
Leadership Advisor & Architect
IBM Security
Glenn is an advocate of cyber security program’s that revolve around a custom framework that adheres to the NIST CSF and aligns with business and industry drivers. He is a champion of governance, risk, and compliance, and his information security leadership spans the areas of data security/privacy, compliance management, identity management, security awareness, cyber defense, architecture, and resiliency. Since joining IBM in April of 2020, he’s been an integral part of the CISO2CISO program; sharing experiences as part of an open discuss. He’s created the Ransomware Risk Framing Workshop and the Short Sprint IR Tabletop Exercise. As an alum of the FBI CISO Academy and active member, he can share the IBM Security point-of-view and what he is hearing from peer networks.
The current AI landscape presents an opportunity for businesses to achieve a significant breakthrough in productivity and competitiveness amidst a challenging economic environment and talent shortages. Consumers around the world have been awakened to the possibility of AI to augment their abilities and improve work. But AI for business has unique needs: governance, a modern data foundation, and intelligent automation across tools and teams that allows organizations to seize new opportunities for growth. Learn from business leaders how they are taking advantage of this convergence of new technologies, unleashing creativity, and up-leveling skills with AI and automation at scale.
Glenn Dally
Leadership Advisor & Architect
IBM Security
Marty Ray
CISO
Fossil Group
Robert Pace
CISO
Invitation Homes
Wei Dong
VP & CISO
Michael's
Raghu Gatamaneni
SVP & CISO
Triumph Finacial
This panel discussion underscores the dynamic nature of the cyber threat landscape, highlighting the importance of constant vigilance and adaptability. By embracing a proactive approach to cybersecurity, organizations can better anticipate emerging threats and effectively safeguard their digital assets.
Key Takeaways:
Marty Ray
CISO
Fossil Group
Robert Pace
CISO
Invitation Homes
Wei Dong
VP & CISO
Michael's
Raghu Gatamaneni
SVP & CISO
Triumph Finacial
Evan Anderson
Chief Offensive Strategist
Randori
Evan Anderson is the Chief Offensive Strategist at Randori. He has over 15 years of experience in red teaming, vulnerability research and exploit development and is a long-time member of the NCCDC Red Team. Prior to co-founding Randori, he worked at Kyrus Technologies supporting commercial and federal projects.
Evan Anderson
Chief Offensive Strategist
Randori
John Sapp
VP, Information Security & CISO
Texas Mutual Insurance Co.
John is a multi-award winning, cybersecurity industry visionary and strategic global Information Security executive with 30+ years of experience, knowledge and expertise. He is a thought-leader and early adopter of emerging security technologies, adept at building and optimizing enterprise cybersecurity programs, communicating in a common language with business risk context and driving risk-based decisions at every level of an organization, which includes operational/technical, senior management, and executive management inclusive of the Board of Directors. Throughout his career, John has helped multiple organizations (mid-size and large) develop a clear picture of their current cyber risk posture and cybersecurity capabilities, develop and executing a multi-year strategy to achieve the desired target state, while delivering an informed view of when, where, how and why to invest in people, process and technology to manage cyber risk.
Cyber Risk Governance has been a topic of discussion amongst CISOs, C-Level executives and Board members for more than a decade, yet remains one of the most elusive and sought after outcomes by each of those stakeholders as well as the lines of business in every industry sector. This session will outline and dive into a strategic approach for establishing effective and efficient cyber risk governance and outline the outcomes and value that can be achieved at multiple levels within an organization in a language that is consumable by the stakeholders with business risk context.
Key Takeaways:
John Sapp
VP, Information Security & CISO
Texas Mutual Insurance Co.
Jeff Blake
Global Head of Sales Engineering
Nozomi Networks
Jeff Blake is currently is the Global Head of Sales Engineering for Nozomi Networks, the Leader in OT, IoT and Critical Infrastructure Cybersecurity. Jeff has held leadership positions at security organizations including Veritas/Symantec and Splunk and is passionate about the opportunity to help secure the infrastructure of public and private organizations across the world. Jeff has degrees in Engineering and Information Technology Management and is also on the faculty at Baylor University as an Adjunct Professor of Cybersecurity at the Hankamer School of Business. He lives in Austin, Texas with his wife and twin sons.
OT Risk is on everyone’s radar now but that doesn’t make it easier to quantify or manage. While the increasing scrutiny by various stakeholders including the Government (Guidelines, CPGs, SEC regulations etc.), critical infrastructure organizations have to not only assess the impact due to potential operational disruptions but also have to deal with funding challenges or lack of appropriate insurance coverage. This talk highlights a couple of quick ways to get started on the basics of an OT Risk Management program.
Jeff Blake
Global Head of Sales Engineering
Nozomi Networks
Dave Randolph
Sr Solutions Engineer
HashiCorp
Dave Randolph
Sr Solutions Engineer
HashiCorp
James Binford
Director and Business Information Security Officer
Humana
James is a Director and Information Security Officer at Humana. James’ career focus is on securing Digital Transformations, modernizing security and on making the journey to cloud less painful, and he has built and practiced this skillset at Google, US Bank, Amazon Web Services and KPMG. He has an MS in Management Information Systems from Texas A&M - Central Texas and an MBA from the University of Texas at Austin.
As the cloud migration continues, securing data and critical infrastructure is going to require new approaches. Organizations have struggled to maintain control of critical data and ensure real-time threat intelligence, giving cloud-based threats the ability to multiply. Data buckets being misconfigured, or inadequately secured increases the risk of a breach. Being able to manually manage security for large web application infrastructures has become a thing of the past. As such, organizations are being pushed to reevaluate their approach to web application security. Key Takeaways: The drumbeat to implement critical infrastructure just keeps getting louder. What are the top 3 CISO tips to avoid certain failure? Versioning explained..and does it protect your data?
Key Takeaways:
James Binford
Director and Business Information Security Officer
Humana
Jay Wiley
Deputy CISO
M&T Bank
Cyber Threat Intelligence involves collecting, analyzing, and interpreting data to understand and mitigate potential cybersecurity threats. It provides actionable insights into the tactics, techniques, and procedures used by threat actors, enabling organizations to anticipate and respond effectively to cyber threats. By utilizing Cyber Threat Intelligence, organizations can bolster their cybersecurity posture, proactively protect their digital assets, and stay ahead of evolving threat landscapes.
Key Takeaways:
Jay Wiley
Deputy CISO
M&T Bank
Tim Treat
Head of Information and Technology Risk Management,
Texas Capital Bancshares
Can we change the way we consume technology to reduce risk and improve effectiveness of our investments? Measuring the effectiveness of IT and Cybersecurity investments continues to challenge all organizations. By adjusting how we consume, we have an opportunity to improve our time to value for technology investments and increase confidence for maintaining rigorous effectiveness of technology portfolios.
Key Takeaways:
Tim Treat
Head of Information and Technology Risk Management,
Texas Capital Bancshares
Stuart Rodgers
Head of Application Security and Assurance
BMO Harris Bank
This session will delve into the critical components of securing digital applications and managing associated risks and vulnerabilities. This discussion emphasizes the need to proactively identify, assess, and mitigate security risks within applications to protect against potential cyber threats. By implementing robust vulnerability management processes and integrating security measures into the development lifecycle, organizations can fortify their applications, ensuring a more resilient and secure digital landscape.
Key Takeaways:
Stuart Rodgers
Head of Application Security and Assurance
BMO Harris Bank
Ahmed Siddiqui
Director of Platform Security
Affirm
In this discussion, we will talk about our journey from traditional enterprise remote access model, journey towards Zero Trust and lessons learned with real-world use-cases and challenges. We will dive deeper into the definition of Zero Trust, Adaptive Access models and talk about its impact on end-users. We will frame this conversation through the lens of risk to an enterprise and balancing with the need for agility and user experience.
Session Takeways:
Ahmed Siddiqui
Director of Platform Security
Affirm
Pratibha Aphale
SVP, BISO
Goldman Sachs
Robert Pace
CISO
Invitation Homes
Ahmed Siddiqui
Director of Platform Security
Affirm
Promoting diversity, equity, and inclusion (DEI) within the Chief Information Officer (CIO) and Chief Information Security Officer (CISO) offices is paramount for organizational success. Embracing diverse perspectives at leadership levels enhances decision-making, fosters innovation, and allows for a more holistic approach to technology and security strategies.
This fireside chat will explore:
Pratibha Aphale
SVP, BISO
Goldman Sachs
Robert Pace
CISO
Invitation Homes
Ahmed Siddiqui
Director of Platform Security
Affirm