Boston CISO Executive Summit
November 6, 2018 | Ritz-Carlton Boston
November 6, 2018
Ritz-Carlton Boston
Collaborate with your peers
Get together with your peers to tackle top business challenges through peer-driven content and discussions at the Boston CISO Executive Summit.
Join your peers to discuss the most critical issues impacting CISOs today:
Strategies for a risk-aligned, resilient organization
Developing and investing in the security workforce of tomorrow
Creating business value and supporting agile business operations
Boston CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.
Governing Body Co-Chairs
Kevin Brown
Boston Scientific
CISO
Brian Haugli
Panduit
Former CISO
Larry Jarvis
Iron Mountain
CISO
Taylor Lehmann
Tufts Medical Center
CISO, Wellforce
Michael McNeil
Philips Healthcare
Global Product Security & Services Officer
Holly Ridgeway
Citizens Bank
Chief Security Officer
Agenda
November 6, 2018
7:00am - 7:45am Registration & Breakfast
7:45am - 8:30am Keynote
Innovating Through Transition and Change
Hosted by Security Risk Advisors
Stephen R. Katz
World's First CISO
Taylor Lehmann
CISO, Wellforce
Tufts Medical Center
Change is everywhere – in your evolving security career, in the threat of a breach and in the career that looms after you hang up your CISO hat. These constant transitions from one phase to the next, whether personal or professional, provide a revolving door of opportunities to innovate, improve business outcomes or even just identify that next phase of your career.
In this session, Steve Katz shares his insight on:
- Ways to proactively prepare for the next step of your security career.
- What to do when you feel your job is in jeopardy.
- His lessons learned from transitioning from CISO to business leader.
8:30am - 9:00am Networking Break
9:00am - 9:50am Breakout Session
Predict and Prepare for Tomorrow’s Security Needs
Hosted by Cylance
Christian Hamer
University CISO
Harvard University
Katie Stebbins
VP, Economic Development
University of Massachusetts Boston
Mark Sutton
VP, CISO
Bain Capital
Talent needs are like security threats—plentiful, complex and ever evolving. This can make it tough to predict talent demands and know when (and how) to reskill existing talent.
Join this panel discussion to learn how to:
- Identify and plan for future hiring needs.
- Reskill talent to evolve with the security landscape.
- Hire the right people.
9:00am - 9:50am Breakout Session
Automating Your Data Defense
Hosted by PKWARE, Inc.
Matt Little
Chief Product Officer
PKWARE, Inc.
As the speed, scope and volume of cyberattacks grows, organizations are expected to mount a defense on top of a talent shortage and a skills gap. Survival requires the automation of data security processes.
In this session, discuss how to:
- Identify the organization’s most critical data assets
- Implement a successful automation strategy
- Overcome the challenges of automating security
9:00am - 9:50am Executive Boardroom
Secure the Possibilities of a Mobile-Cloud World
Hosted by MobileIron
Esmond Kane
Deputy CISO
Partners HealthCare
Lorna Koppel
Director of Information Security/CISO
Tufts University
James Plouffe
Strategic Technologist, CISSP
MobileIron
There’s an app for everything these days—from approving expenses in the grocery store line to looking up key customer information in the field. Employees are more productive than ever in today’s mobile-cloud world, which means data—and the risks of compromising it—is plentiful.
In this session, learn:
- What risks are created through mobile-cloud technologies
- Ways organizations are using mobile-cloud apps through the business
- How to craft a security strategy that protects data no matter where it is.
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).
To reserve your seat, please contact:
Rebecca Buchanan at 971-717-6645 or Rebecca.Buchanan@evanta.com.
9:00am - 9:50am Executive Boardroom
Machine Identity – A Critical Security Concern
Hosted by Venafi
Phil Calvin
SVP Technology Risk Management and Risk Data Analytics
Citizens Bank
Bill Roberts
VP, IS-CISO
Hologic, Inc.
Jeff Hudson
CEO
Venafi
Session details pending.
9:50am - 10:20am Networking Break
10:20am - 11:10am Breakout Session
How to Balance the Cost of Compliance
Hosted by Palo Alto Networks
Brian Finch
Partner & Co-Chair, Cybersecurity & Global Security Practice Group
Pillsbury Winthrop Shaw Pittman LLP
Holly Ridgeway
Chief Security Officer
Citizens Bank
CISOs throughout the country are feeling the effects of strict compliance regulations—whether they’re influenced by EU’s GDPR requirements or California’s new data privacy laws. After all, being compliant is costly, time consuming and, at times, confusing.
In this session, engage in a discussion about:
- Understanding new compliance requirements
- Future compliance regulations
- Balance the mountain of compliance overhead.
10:20am - 11:10am Breakout Session
AI and Machine Learning — Potential Successes and Security Risks
Hosted by Fortinet, Inc.
James Cabe
Principal Systems Engineer
Fortinet, Inc.
Security vendors, infosecurity specialists and cybersecurity professionals claim to use artificial intelligence and machine learning to defend customers against the most advanced threats in cybersecurity. But if you ask how these technologies work, answers can be vague or misleading.
In this session, you will learn how:
- The mechanics of artificial intelligence and machine learning work, exploring how different techniques can be used to detect malware, malicious domains, phishing emails and other threats.
- How technologies can potentially fail
- How attackers can use technologies to infiltrate poorly designed or implemented systems.
10:20am - 11:10am Executive Boardroom
Evaluating Your Information Security Program
Hosted by Tevora
Joe Burgoyne
Director, Product Sec. & Privacy
Philips Healthcare
Stephen Pyne
Director, Information Security
Eze Software Group
Ray Zadjmool
CEO & Founder
Tevora
A comprehensive information security program can significantly limit an organization’s exposure to risk. To address security concerns and needs, CISOs must continually assess their program and make improvements.
Join peers to discuss:
- Possible gaps and risks in your information security program
- Understanding current and desired levels of maturity
- Establishing KPIs to measure progress.
10:20am - 11:10am Executive Boardroom
DevSecOps – The Agile Approach to Security
Hosted by GitLab
Julie Fitton
VP, Digital Product Security
Stanley Black & Decker
Lorna Koppel
Director of Information Security/CISO
Tufts University
Cindy Blake
Global Sr. Security Evangelist
GitLab
Security from the start and better collaboration are the keys to effectively reducing risks posed to an organization. With DevSecOps methods and principles, security controls can help organizations react faster to attacks.
In this session, learn:
- How DevSecOps changes the security team mindset
- The benefits of a DevSecOps approach
- How to implement DevSecOps in your organization
11:10am - 11:40am Networking Break
November 6, 2018
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.