SecurIT: Where CIOs and CISOs come to Manage Risk
Wednesday, June 21, 2017
8:00 am - 9:00 amRegistration & Networking Breakfast
9:00 am - 9:10 amWelcome and Opening Remarks
Bob Bragdon, Publisher, CSO

9:10 am - 9:55 amDefining Risk in 2017
Elizabeth Hackenson, CIO & SVP, Technology & Services, AES Corp.
Scott Goodhart, VP & CISO, AES Corp.
Bob Bragdon, Publisher, CSO

What is top of mind in information security and other areas of risk in 2017? How has the landscape changed in the past year, and what factors on the horizon are likely to change through the end of the decade? Join CSO SVP and Publisher Bob Bragdon for new research and a conversation with the top IT and information security executives at AES, a Fortune 200 global power company, as they share their top risk concerns and mitigation priorities.

View Presentation

9:55 am - 10:15 amData Destruction in the IoT Era
Sameer Sait, VP, IT & CSO, Arrow
Protecting your company’s data is mission critical. The rapid proliferation of connected devices creates new forms of media as well as new locations where data is stored. Most new devices require specialized methods of erasure not yet commercially available. In addition, privacy regulations are broadening in scope and accountability, creating additional risk to an organization. To counteract this exponential growth in IoT devices, Arrow’s CSO will discuss standards and practices to mitigate these risks.

View Presentation

10:15 am - 10:45 amRefreshment & Networking Break
10:45 am - 11:30 amBuilding a World Class Security Program
Mark Maybury, VP & CSO; Director, NIST National Cybersecurity FFRDC, MITRE Corp.

In a world fraught with cyber risk and insider threats, organizations must continually evaluate the tools and techniques they use to manage risk. What does a best in class security program look like today? We'll hear how a leading organization has built its security practice and understand where it focuses resources as it balances priorities and different types of risks.

View Presentation
11:30 am - 12:00 pmManaging the IT/Security Relationship
Rodrigo Loureiro, CISO, Laureate International Universities
Ben Sizemore, CIO, First Guaranty Mortgage Corp.
Bob Bragdon, Publisher, CSO

Security is top of mind for both CIOs and CISOs/CSOs. Yet working together to instill a culture where each part of the organization works with the others to build in security best practices is not easy. Despite the sophistication of today’s enterprises, the security organization can still be the last to know about projects where controls were overlooked — while UX specialists bemoan anything that slows down responsiveness or impedes the customer experience. In this discussion with executives from both sides of the fence, we’ll look at the friction points between IT and security and discuss best practices for overcoming them – and building a proactive, collaborative and security-minded culture.

12:00 pm - 1:15 pmLuncheon with Table Discussions
Topics to include:

Data Destruction Policies for IoT, hosted by Arrow
Migrating to the Cloud, hosted by Unisys
Authenticating Consumers & Citizens, hosted by iovation
Protecting Sensitive Corporate Data from Mobile Risks, hosted by Lookout
Using AI for next-generation Cyber Security, hosted by Darktrace
Visibility and Security in the Cloud, hosted by Ixia

1:15 pm - 2:00 pmWinning Strategies for IoT and New Business Ventures
Lisa Tuttle, CISO, SPX Corp.

In today’s digital age, many organizations will find themselves affected by IoT and business transformation to launch new data-driven business ventures. These innovations place companies in the crosshairs of new and evolving security exploits and business risks. SPX Corporation is a manufacturing company on that journey, as it adds sensors to equipment and develops new software to manage data. Join CISO Lisa Tuttle to learn how a modern enterprise is managing the risk of IoT and becoming a software provider – with all the technology, cultural change and education that involves.

View Presentation
2:00 pm - 2:20 pmPublisher’s Panel: Securing the Evolving IT Environment
Sean O'Connor, VP Cyber Technologies, Darktrace
Mark Loucks, Senior Data Scientist, Principal Practice Director, Unisys
Bob Bragdon, Publisher, CSO

In this fast-paced session, industry expert panelists will weigh in with their views on the latest security news and how it is affecting customers in this new era of threats. Citing specifics from their customer engagements, the panel will talk about the problems their customers are facing and how they are addressing those. They will also share their thoughts on enterprise security in the future when IT environments are rife with IoT, AI, augmented reality, and of course, even more data.

2:20 pm - 3:05 pmThe Threat from Within: How to Minimize Insider Threats
Jeff Berkin, SVP & CSO, CACI International

Research estimates that nearly 50 percent of data breach incidents originate with insiders. Whether accidental or malicious, insider threats highlight the need for improved security awareness, better monitoring programs and more. What are the latest approaches to managing insider threats across phishing, social engineering and rogue employees? Join us as CSO Jeff Berkin shares the latest techniques that can protect your organization from the inside out.

View Presentation
3:05 pm - 3:25 pmRefreshment and Networking Break
3:25 pm - 4:00 pmManaging Third-Party Risk in the IT Supply Chain
Andy Purdy, CSO, Huawei Technologies USA

Organizations rely on third parties for a range of critical functions and IT technologies. Such partners are essential to your business yet introduce supply chain risks that can impact your organization’s risk posture. How should third-party, supply chain risk be considered in your organization’s management of risk? How can you evaluate and mitigate the risk from third parties, including in technology development and the IT supply chain? Join CSO Andy Purdy to discuss this important issue.

View Presentation

4:00 pm - 4:45 pmBuilding Credibility with Senior Business Leadership: A CIO/CISO Panel
Jeff Berkin, SVP & CSO, CACI International
Derrick A. Butts, CIO, Truth Initiative
Andy Purdy, CSO, Huawei Technologies USA
Chad Sheridan, CIO, Risk Management Agency, Department of Agriculture/USDA
Bob Bragdon, Publisher, CSO

Key to building a strong security program is the support of senior leadership. IT and security executives need their buy-in to get funding and build a culture of security. What are the best ways to help executives and the board understand the risks to the business? Which conversations do you need to be part of, and how do you make sure you’re invited? We’ll explore these questions and more.

4:45 pm - 4:50 pmClosing Remarks
4:50 pm - 5:30 pmNetworking Cocktail Reception