CISO Dallas Summit | October 24, 2019 | The Adolphus Hotel - Dallas, TX, USA

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Thursday, October 24, 2019 - CISO Dallas Summit

8:00 am - 8:45 am

Registration & Networking Breakfast

 

8:45 am - 8:55 am

Welcome Address & Opening Remarks

Presented by:

Franklin Donahoe, CEO and Managing Member, Donahoe Advisory Group

 
 

8:55 am - 9:25 am

Keynote Presentation

All Eyes on You

Security breaches are the most intimidating threats for CISOs and security executives. Because of that, upper level management, shareholders and even consumers are focusing now more than ever on the security department. With that, CISOs need to see this as an opportunity to work closely with business stakeholders to incorporate cybersecurity strategy with their organization's business initiatives. This is an ideal opportunity to address skill shortages and increase professional development of the internal security workforce.

Takeaways:

  1. How the CISO's role has changed
  2. The latest security threats and how they can positively impact your team
  3. How to measures your teams shortcomings and areas for improvement
 

9:30 am - 10:00 am

Share:

Keynote Presentation

Mobile-centric Zero Trust Security Framework

Passwords are no longer sufficient protection against breaches because users are accessing information from a variety of untrusted devices, apps, networks, locations and services. So, in the reality of today's security world how does an organization protect itself? One answer is with a Zero Trust approach and framework to security. But with numerous theories about Zero Trust, how do you ensure that you've taken the right approach? in this session, discover how to: 

Takeaways: 

  • Drive business innovation with mobile productivity by giving employees the ability to use mobile, cloud and endpoints 
  • Enforce corporate security without impacting the user experience 
  • Redefine enterprise security strategies to address a perimeter-less environment

Sponsored by:

MobileIron View details

 
 

Presented by:

Alex Mosher, Global VP Solutions, MobileIron View details

 
 
 

10:05 am - 10:30 am

Executive Exchange

 

Share:

Think Tank

Regulations Mean Change

More complex regulations, such as the General Data Protection Regulation (GDPR), have came into play due to the rise of data breaches forces. As data today is viewed as a such an asset, it is also a tremendous liability. Understanding that, organizations has to consider both while they implement technologies that will both innovative their business, but also be cost effective.

Takeaways:

  1. Understand the latest regulations, such as GDPR
  2. How to tell business stakeholders that data protection can be a key differentiator for your organization
  3. The steps needed to take to be regulatory compliant

Presented by:

Puneet Nanda, Head of Information Security & Compliance, Verizon

 

Think Tank

The Future of Autonomous Things

Today, we are seeing more Autonomous Things technology than ever before. As a result, functions formerly performed by humans are being replaced with AI. This technology's automation goes beyond the automation by using AI to deliver innovative behaviors that interact more efficiently and effectively with their surroundings and with their end-users.

Takeaways:

  1. Cover the latest innovations in autonomous and networked entities for 2019
  2. Learn how these innovations will shape the different industries and business landscapes
  3. Discuss the potential compromises to privacy and safety in the future of AI

Presented by:

Nayan Patel, Director of IT, Baptist Health View details

 
 
 

10:30 am - 10:40 am

Morning Networking Coffee Break

 

10:45 am - 11:10 am

Executive Exchange

 

Executive Boardroom

Fireside Chat: Gaining an Aerial View of all Interactions on your Network

Network security has seen a resurgence in activity attempting to solve challenges detecting and responding to threats in the network. Some are focused on security analytics as a core business while others are pivoting from the network performance monitoring space into network detection and response. 

Increased complexity and frequency of attacks along with overreliance on prevention controls means the need for detection and response has never been greater. Join us as we discuss how network detection and response deliver an aerial view in your infrastructure.

Sponsored by:

Vectra AI, Inc View details

 
 

Presented by:

Chris Morales, Head of Security Analytics, Vectra AI, Inc View details

 
 

Share:

Executive Boardroom

Next-Gen Cloud Security Architectures for the Cloud-First Future

As businesses rely more on cloud apps, they must refocus security from defending perimeters to following users regardless of location. This session will discuss the advantages of cloud security solutions based on a Cloud 2.0 architecture built on containers and micro services and how they can more seamlessly transition security from appliances.

Takeaways: 

  1. How vendor cloud architectures differ and how those differences can impact your organization 
  2. Difference between monolithic cloud architectures and clouds built on containerization and micro services
  3. Best practices when migrating from security appliances to cloud security

Sponsored by:

iboss View details

 
 
 

11:15 am - 11:40 am

Executive Exchange

 

Think Tank

The Solution for Your Legacy System's Security: The Cloud

Over the lifespan of an organization, CIOs/CISOs have developed and implemented technologies that have been key to the organization's success. However, CISOs and their security teams today find themselves stuck ensuring that legacy systems are secure. The solution is cloud-delivered security products that are more agile with the ability to implement new detection methods and services faster than on-site solutions.

While cloud security is an ideal solution, it is important to know that using the cloud is more than moving legacy management servers to the cloud.

Takeaways:

  1. Review the status of legacy system security
  2. What cloud solutions are the best fit for their business
  3. What are the main needs in regards to system's scale, data telemetry, staff growth, machine learning, API-based access, and more
 

11:45 am - 12:10 pm

Executive Exchange

 

Share:

Executive Boardroom

The Journey from Spreadsheets to Integrated Risk Management (That's Right-Sized for Your Company!)

Risk, in all forms and types, has been the buzz word in today's environment. The question is: how to you move from a compliance-focused spreadsheet and manual program to a risk-based approach that your executive team and board of directors care about? This is not an overnight journey but there are tangible strategies you can implement to get your team focused on measuring what matters in your cybersecurity and data privacy programs: namely the risks that affect key business objectives. 

 Takeaways: 

  1. Learn how to transform your compliance baseline into a risk-based assessment approach 
  2. "So what?" how to show impact to business objectives from cybersecurity and data privacy risks 
  3. Risk scoring mechanisms that can effectively measure technology risks

Sponsored by:

SureCloud View details

 
 

Presented by:

Kathleen Randall, EVP North America, SureCloud View details

 
 

Harrison Tedder-King, Senior Account Manager - U.S., SureCloud View details

 
 

Share:

Executive Boardroom

Understanding Digital Transformation - From Basic Steps to Transformational Outcomes

Digital transformation is an important initiative and while most organizations know they need to transform, the how and what can differ dramatically. Foundational steps, like building out a modern application platform, may seem miniscule - but ignoring this important step is the top reason most Digital Transformation initiatives stall or fail. With that in mind, Insight can help organizations build the framework to extend their groundbreaking initiative - from machine learning to AI, IoT and much more. Our team will share our experiences along the many steps in organizations' digital transformation journeys to help you imagine what's possible. 

Situation:

  • TT optimization challenges still loom - but, some year-over-year progress has been made.
  • 51% of organizations have either stalled or abandoned transformation initiatives

  Complication:

  • Aged infrastructure hinders transformation
  • Transformational progress is impacted by cloud strategy
  • Organizations continue to struggle with choosing best-fit cloud platforms for workloads 

Resolution:

  • Single platform approach is not an optimal environment - contrary to conventional wisdom
  • Presents the opportunity to be proactive, go on the offense and make your datacenter an optimized platform for delivering business value 

Takeaways: 

  1. Digital transformation is critical to your business and IT Transformation is the foundation
  2. Hybrid platforms is the fundamental reality, and highly dependent on the use case
  3. Transformational initiatives can have a dramatic impact on operations, client engagement, and delivery of services
  4. Understand how to leverage groundbreaking technologies - from machine learning to AI, IoT and much more to advance your transformational strategies

Sponsored by:

Insight Cloud + Data Center Transformation View details

 
 
 

12:15 pm - 12:40 pm

Executive Exchange

 

Share:

Thought Leadership

ENABLING A BUSINESS-FIRST NETWORK: Moving from Software-defined to a Self-driving Wide Area Network

The Silver Peak Unity EdgeConnect? SD-WAN platform enables enterprises to shift to a business-first networking model where the network enables the business. Advancements in AI and machine learning enable EdgeConnect to continuously adapt to deliver real-time response and eliminate the impact of network disruptions. EdgeConnect unifies SD-WAN, firewall, segmentation, routing, WAN optimization and application visibility and control in a single platform. EdgeConnect is business-driven so business priorities are reflected in the way the network behaves to deliver the highest quality of experience.

Sponsored by:

Silver Peak Systems View details

 
 

Presented by:

Eddie Curl, Enterprise Account Manager, Silver Peak Systems View details

 
 
 

12:40 pm - 1:50 pm

Working Lunch & Panel

CXO's Got Talent: Finding, Growing & Retaining the Best People

While new technology and solutions can help CXOs make more, faster and better decisions for an organization, nothing will take the place of a highly talented workforce. CXOs need to be great recruiters of talent but even more importantly growing the skills and capabilities of their team providing engaging and challenging opportunities for people. 
Competitive compensation is important for retaining great talent but so is a work environment where individual growth and development are front of mind and not an afterthought.

3 key takeaways:

  1.  Identifying strategic, actionable, and measurable, ways to address progress around talent and diversity
  2. Once we find the top talent and get them within the company, how do we challenge them to stay
  3. How we can go from not only attracting and retaining our talent, but having our talent grow and mature themselves into future leaders


Moderated by:

Jodi Watkins, Chief Commercial Officer, GTN Technical Staffing & Consulting View details

 
 
 

1:55 pm - 2:20 pm

Executive Exchange

 

Share:

Thought Leadership

3 Best Practices for Application Security (and Bonus Tip)

Applications are the lifeblood of the enterprise, but as the threats multiply, as applications move to the cloud, as legacy applications need to be maintained, and as organizations seek competitive advantage with new technologies and faster release cycles, it's easy to see that application security can be a thankless, endless and challenging job. 

Imperva has distilled three best practices (and a bonus tip) that help enterprises of any size vastly improve and simplify application security, accelerate threat detection and operationalize application security in a dynamic world where change is the only constant.

Sponsored by:

Imperva View details

 
 

Presented by:

Greg Wolford, Solutions Architect, Imperva View details

 
 
 

2:25 pm - 2:50 pm

Executive Exchange

 

Share:

Think Tank

Enterprise Analytical Platform, why it is important to get right and how to keep it simple.
  • How do we deliver quickly knowing that "speed wins"? 
  • How do we design a foundation we can build upon?  
  • How can we pick the right technology? 
  • How do we do it all at the same time?

Presented by:

Vivian Shade, VP of Business Analytics, OldCastle BuildingEnvelope View details

 
 
 

2:55 pm - 3:20 pm

Executive Exchange

 

Executive Boardroom

FINDING THE RIGHT SECURITY PARTNER: THE DIFFERENCE BETWEEN MDR AND MSSP

In todays world of increasing cyber threats, selecting the best security partner for your organization can be challenging. With innovative services such as Managed Detection and Response changing the way organizations respond to threats, it's important to understand the difference between traditional MSSPs and MDR providers. This presentation will focus on the realities of using MSSP technologies versus MDR and provide selection recommendation guidelines for CISOs.  

Takeaways: 

  • Vendors can respond to incidents proactively or reactively 
  • Not all MDR vendors are the same 
  • Use a proof of concept to authenticate vendor claims 
  • Validate the vendors regulatory experience

Sponsored by:

eSentire View details

 
 
 

3:20 pm - 3:30 pm

Afternoon Networking Coffee Break

 

3:35 pm - 4:00 pm

Executive Exchange

 

Share:

Executive Boardroom

Scaling Multicloud and Hybrid Cloud Usage without Sacrificing Data Security and Compliance

Analysts claim that 50% of today's public cloud data and workloads will migrate to private clouds in the next two years. But, don't worry about the public cloud behemoths because their average CAGR continues above 20%. However, the result is that cloud data is spreading across multiclouds and increasingly migrating to private clouds that offers the Enterprise more control. This acceleration in lift and shift of workloads creates data security and compliance risks as well as management complexities. In this discussion, we'll share trends and best practices for enabling data portability without compromising security, compliance, and operational efficiencies. 

Take Aways: 

  • Sharing trends seen by analysts and your peers on multicloud adoption and challenges  
  • Discussion of best practices for leveraging native cloud data security services effectively to maintain compliance and control  
  • Methodology for efficiently applying data and access security techniques that allow for secure lift and shift between public and private clouds

Sponsored by:

Thales eSecurity, Inc. View details

 
 

Presented by:

Ricardo Torrijos, Senior Director of Sales Engineering, Thales eSecurity, Inc. View details

 
 
 

4:05 pm - 4:30 pm

Executive Exchange

 

Share:

Executive Boardroom

Keeping ALL endpoints continuously patched and compliant â?" quickly and cost effectively

IT security and operations teams struggle to keep Unix, Linux, Mac and Windows servers and end user devices continuously patched and compliant with security and regulatory mandates. They also strive for faster time-to-remediation during incidents. Using HCL BigFix, IT operations and security teams can instantly report to executives, board members and high-value supply chain partners that all systems are continuously patched and compliant, resulting in increased productivity and cost savings.

Sponsored by:

HCL BigFix View details

 
 

Presented by:

Mark Phinick, Vice President of BigFix Sales, HCL BigFix View details

 
 
 

4:35 pm - 5:00 pm

Executive Exchange

 

Think Tank

Success Secrets for Real World Digital Transformations

Being Digitally Successful Requires Successfully Delivering your Transformation Initiatives: Here are the Thing You Need to Do to Improve Your Chances of Success. Successful transformation initiatives require upgrades to an organizations processes and culture in addition to adopting of digital technology. In this session Bill Haser provides experiences and insights based on real world examples on how to be successful with your digital transformation. 

Takeaways:

  1. Picking the right projects
  2. Picking the right delivery methodology
  3. Picking the right team
  4. Addressing project holistically including process design, organization change management, and technical competency.
  5. Key management tasks

Presented by:

Bill Haser, Former CIO, Individual

 
 

5:00 pm - 5:15 pm

What's the Next Stop On the Transformation Journey?

Our Governing Board will summarize the learnings from the day and discuss the path forward for building an ongoing community of CISOs where common issues can be addressed and success stories can be shared.

Takeaways:

  1. Building an ongoing community with your peers can be an invaluable resource for tackling the digital transformation projects ahead of you
  2. Sharing stories of success (and failures) is not reserved to a one-day CISO Summit, but should be shared on a regular basis with your peers

Moderated by:

Bill Haser, Former CIO, Individual

 
 

5:15 pm - 6:30 pm

Summit Happy Hour