Arrival, registration & breakfast networking
Introduction from the Network Group & Chairperson
A brief introduction to the event software, SNS — this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximizing networking opportunities. The software designs a personalized agenda & enables attendees to arrange one-to-one meetings with each other. This will be followed by a welcome from the chairperson.
Data Security: Understanding Data-Driven Controls
- Discuss encryption and data safeguards
- DPIA/PIAs and the need to understand where your data resides
- Being prepared for AI initiatives-Data retention and governance
Richard Mendoza, Senior Director, Data Privacy & Regulatory Compliance, Anywhere Real Estate
Attack Surface Management
- What is attack surface management and why should you care
- Challenges organizations face today with exposure of assets
- Benefits of leveraging attack surface management solutions
- Best practices for continued success
Michael Carpenter, Head of Cyber Security, BASF
Technology Risk Evolution & Challenges
- Defining what a future state looks like; balancing productivity, risk and investment
- Choosing the core technology implementations best suited to achieve the desired future state
Ahsan Sheikh, Head of Cyber Security, Data & IT Risk, Societe Generale
Victor Thkifati, Director – Operational Risk & Compliance Lead for Data, Technology & Business Continuity Risk, Societe Generale
Coffee break & networking
Keynote Session 1
Understanding the Importance of Security Awareness Training
Michael Pilch, ISO, University of Delaware
Keynote Session 3
Leadership Strategies to Support Talent Development & Retention Policies
Tamika Bass, Director, Cyber Security, Gannett Fleming
11:00 – 13:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- Regulatory Management
Networking lunch
Understanding the Human Aspect of Cyber Security in order to Mitigate the Risk of a Breach
- Overview of human element in all threats/mitigations
- Importance of training on a realistic level
- Role of AI in increasing the effectiveness of attacks by less sophisticated actors
Jonathan Homer, VP Chief Security Officer, CPS Energy
Data Security: Understanding how Data-Driven Controls Enable Organizations to Dynamically Adapt to Emerging Cyber Threats
- Learn how data-driven controls enable you to adapt to emerging cyber threats by leveraging real-time data analytics
- Discover how the integration of data-driven controls enhances the efficiency of incident detection
Bhargava Gorty, Senior Director Application Security & Data Protection, Columbia University
Redesigning & Evolving your Cyber Security Strategy to Try & Stay Ahead of Hackers or at Least Keep up with Them
- The essential components underpinning your overall security posture and business agility
- What are the best practices for building an efficient roadmap?
Afzal Khan, Global CISO, BioReference
Next Generation of Email Phish Filtering
- How are employees targeted with phishing attacks and what vulnerabilities are being exposed?
- How can we harmonize organizational protocol with the mitigation of human error?
- What training protocols have worked well? And are there any more tools at our disposal to encourage vigilance?
Keith Dempsey, CISO, ArisGlobal
Coffee break & networking
Open Forum Think Tank
Cyber Resilience
Chuck Golliday, CISO, ELLKAY
Keynote Session 5
Regulatory Compliance Strategy
Tom Pageler, CISO, Tao Motors
15:25 – 17:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- Regulatory Management
Panel: The Human Factors of Cyber Security
- Best strategies to reduce human-induced risks
- Creating effective cyber training
- Prioritizing people solutions to improve cyber resiliency
Irene Thong, Chief Security Officer, Printpack
Jonathan Homer, VP Chief Security Officer, CPS Energy
Jonathan Chan, Head of Global IT & Security, Episource
Ernest Smiley, CISO, Kingdom Capital
Oleg Gudym, CISO, Securiport