VIRTUAL

Detroit CISO Virtual Executive Summit

November 16, 2020 | 8:00am - 1:15pm EST

November 16, 2020 | 8:00am - 1:15pm EST

Collaborate with your peers

Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the Detroit CISO Virtual Executive Summit.

Join your peers to discuss the most critical issues impacting CISOs today:

Strategies for a risk-aligned, resilient organization

Developing and investing in the security workforce of tomorrow

Creating business value and supporting agile business operations

Governing Body Co-Chairs

Martin Bally

Fiat Chrysler Automobiles
CISO

Brent Cieszynski

Blue Cross Blue Shield
VP & CISO

Earl Duby

Lear Corporation
VP & CISO

Daren Fairfield

Whirlpool Corporation
CISO

Russ Gordon

BorgWarner
Chief Information Security Officer

Fred Killeen

General Motors
Chief Information Security Officer

Tabice Ward

DTE
Director & CISO

Erik Wille

Penske
Head of Information Security

Agenda


November 16, 2020

8:00am - 8:45am  EST Virtual Summit Keynote

From Gatekeeper to Door Opener – Cybersecurity as Business Enabler

Jay Chaudhry headshot

Jay Chaudhry

CEO, Chairman & Founder

Zscaler

Mauricio Guerra headshot

Mauricio Guerra

CISO & Director, Global Information Security

Dow

In this session, Zscaler CEO Jay Chaudhry and Mauricio Guerra, CISO at The Dow Chemical Company, will discuss how IT is evolving to become the driver of enterprise agility and scalability. Once known as “the department of no,” IT’s focus has turned to enabling business objectives, such as guiding the move to work-from-anywhere, securing cloud-first strategies to minimize business risk, and simplifying and modernizing infrastructure to increase efficiency and reduce costs.

Chaudhry and Guerra will share their experiences leading enterprise digital transformation, including:

  • How to retire technical debt to gain a competitive advantage
  • The evolution of the CISO’s role from rack-stacker to growth-enabler
  • Collaborative best practices for transforming apps, infrastructure, and security

8:45am - 9:00am  EST Break

9:00am - 10:00am  EST Virtual Summit Boardroom

The Sprawling Endpoint – IAM, BYOD and More

Travis Bray headshot

Travis Bray

Director, Global Information Security

Magna Powertrain Inc.

Brent Cieszynski headshot

Brent Cieszynski

VP & CISO

Blue Cross Blue Shield

For large swaths of 2020, work would grind to a halt without the ability for employees to remotely access critical systems and information. With business’s survival on the line, many CISOs must set a strategy that securely enables the future of remote work.

Join this virtual boardroom to discuss:

  • Finding the balance between security controls and a rapid pivot to digital business
  • Effective security awareness training for a remote workforce
  • Common pitfalls in securing large numbers of remote users

9:00am - 10:00am  EST Virtual Summit Boardroom

Security Awareness in the Modern Era

Homyar Naterwala headshot

Homyar Naterwala

Head of Cyber Security

GE Capital

For many information security leaders, it’s not technology, but people, that form the weakest link in the organization’s defenses. Even personal social media habits can put a large enterprise at risk, and at a time when more employees are working remote, security awareness training must be top-of-mind more than ever before.

Join this virtual boardroom to discuss:

  • Effective strategies for security awareness training, including generational differences
  • How to hold users accountable
  • Gaining buy-in to roll out robust training programs across the organization

9:00am - 10:00am  EST Virtual Summit Boardroom

Bringing Cloud Back Down to Earth

Jim Darrow headshot

Jim Darrow

Director, IT

Detroit Tigers

Erik Wille headshot

Erik Wille

Head of Information Security

Penske

Justin Weissert headshot

Justin Weissert

Vice President for Professional Services

CrowdStrike

CISOs face a constant tension between enterprise agility and enterprise security, and in today’s world, this dynamic often plays out in the context of cloud services. How can CISOs gain a centralized view over cloud security posture and workloads?

Join this session to discuss:

  • Methodical approaches to securing cloud-based technologies, workloads and products
  • Ways to standardize cloud environments
  • Strategies to ensure compliance

10:00am - 10:45am  EST Virtual Summit Keynote

Harnessing the Power of Cloud Security Innovation

Zahira Gonzalvo headshot

Zahira Gonzalvo

SVP, Chief Information Security & Privacy Officer

Flagstar Bank

Earl Duby headshot

Earl Duby

VP & CISO

Lear Corporation

Amir Khan headshot

Amir Khan

Corporate CISO

IBM

Whether you are just moving into the cloud, researching more options within the public cloud, or building your own private cloud, most leaders agree that this is the future of infrastructure as a service. But can CISOs have it all – both increased productivity and cost benefits within a secure cloud?

During this peer-discussion you will explore:

  • Automation, orchestration, AI and machine learning cloud strategies
  • Nuances for hybrid on- and off-premise systems
  • Ways to incorporate the cloud into a fully articulated security strategy

By registering for this session, this serves as your authorization to Evanta or its vendor to provide your contact information to IBM to follow up on your interaction and participation. IBM’s use of your contact information is governed by the IBM Privacy Policy. If you need more information on how IBM is using your personal data you may refer to the IBM Privacy Statement. To withdraw your marketing consent and unsubscribe to receiving emails click on the unsubscribe button at this address: ibm.biz/marketingoptout.

10:45am - 11:00am  EST Break

11:00am - 12:00pm  EST Virtual Summit Boardroom

Navigating the Application and Network Threat Landscape

Arun DeSouza headshot

Arun DeSouza

Chief Information Security & Privacy Officer

Nexteer

Kristopher Curylo headshot

Kristopher Curylo

Director, Interim Lead, Business Enablement Security Office

Ally

Vivek Patel headshot

Vivek Patel

VP of Technical Services

Radware

Organizations are increasingly operating in an agile digital model where data flows seamlessly between on-premise networks, applications and cloud services. Yet that coherent user experience masks a complex attack surface, where security leaders must tackle a spectrum of vulnerabilities while preserving agile business operations.

 Join this session to discuss:

  • The latest threat landscape for networks and applications
  • How CISOs are navigating the balance of business agility and security controls
  • Best practices for monitoring threats across complex networks

11:00am - 12:00pm  EST Virtual Summit Boardroom

Balancing Act — The Present and Future of Compliance

Russ Gordon headshot

Russ Gordon

Chief Information Security Officer

BorgWarner

Scott Sadlocha headshot

Scott Sadlocha

VP & CISO

United Wholesale Mortgage

Adapting to current and upcoming data governance regulations to maintain compliance is a moving target that CISOs must continue to hit. Are you prepared to manage ongoing policy changes and stay ahead of a constantly changing regulation landscape?

Join your peers for a candid discussion that covers:

  • The implications of new compliance laws
  • What data privacy regulations are on the horizon
  • How to stay ahead of the compliance curve

11:00am - 12:00pm  EST Virtual Summit Boardroom

Security Analytics – Turning Signal Noise into Actionable Harmony

Jaclyn Miller headshot

Jaclyn Miller

CSO

Secure-24

Carl Wiegand headshot

Carl Wiegand

Vice President, Information Security & Risk

Amway

Augusto Barros headshot

Augusto Barros

VP of Solutions

Securonix

There is no shortage of data available to the security function, but insights – the signals of a real threat that demands action — are a different story. CISOs who can derive meaningful findings from their environments can better detect threats with fewer resources — a difficult, ongoing challenge as organizations become increasingly digital and complex.

Join your peers to discuss:

  • How emerging technologies and evolving digital businesses are challenging security analytics
  • Best practices for monitoring user behavior and other dynamic risks
  • How to reduce the noise created by the growing number of threat detection technologies and data volume

12:00pm - 12:45pm  EST Virtual Summit Keynote

Future Ready Now: Strengthen Your Workload Security Posture

Martin Bally headshot

Martin Bally

CISO

Fiat Chrysler Automobiles

Brent Cieszynski headshot

Brent Cieszynski

VP & CISO

Blue Cross Blue Shield

Chris Corde headshot

Chris Corde

Vice President, Product Management

VMware

How you deliver infrastructure and applications is changing drastically. Movement to public cloud infrastructure, adoption of container frameworks, and living in a hybrid world requires new approaches to security. Because of that, it is more important than ever for security leaders to have a well-defined strategy in place to secure workloads.

Join this keynote to explore:

  • Steps to simplify security and IT operations
  • How to increase visibility across cloud workloads
  • Benefits of “built-in” security and the impact on SOC

12:45pm - 1:15pm  EST Networking

Community Discussion With WomSA

Erik Wille headshot

Erik Wille

Head of Information Security

Penske

Ranu Parmar headshot

Ranu Parmar

President and Co-Founder

WomSa

Zahira Gonzalvo headshot

Zahira Gonzalvo

SVP, Chief Information Security & Privacy Officer

Flagstar Bank

Join this informative networking break to hear from WomSA (the Women’s Security Alliance) and your peers as they share practical and actionable strategies to empower women in cybersecurity. Then break for some fun and informal networking with your peers to wrap-up the day.

November 16, 2020

Your Community Partners


Key Partners
Program Partners

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Kenzie Howard

Program Manager

971-978-5041

kenzie.howard@evanta.com