IN-PERSON

Houston CISO Executive Summit

December 7, 2021 | Hyatt Regency Houston

December 7, 2021
Hyatt Regency Houston

Collaborate with your peers

Get together with Houston's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Accelerating security to match the pace of digital business initiatives

Managing the risk created from a landscape of new core technologies

Achieving sustainability for the CISO role without compromising outcomes

Houston CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Mike Coogan

Waste Management
Senior Director, Cybersecurity

Angelique Grado

TechnipFMC PLC
VP & CISO

Derek Rude

Weatherford
Director, IT Security

Genady Vishnevetsky

Stewart Title Company
CISO

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Houston CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


December 6, 2021

December 7, 2021

6:00pm - 8:30pm  Governing Body Welcome Reception

Governing Body Welcome Reception

Exclusive to Governing Body members and select guests, this dinner is a can’t-miss opportunity to connect with your peers prior to tomorrow’s Executive Summit. Please join your colleagues for an evening of good food, wine, and lively networking.

7:30am - 8:15am  Registration & Breakfast

8:15am - 9:00am  Keynote

Executive Presence for Lasting Leadership

Chris Ulrich headshot

Chris Ulrich

Body Language Expert & Political Consultant

Any given gesture — a nod, a point of the finger — unconsciously communicates powerful ideas and feelings that have tangible consequences. Top executives are generally proficient in their ability to interact with others, but the stakes are raised during high-level negotiations, reporting to the board, inspiring and empowering senior managers or dealing with tricky internal matters.

Join body language expert Chris Ulrich as he shares:

  • Why every movement and action is magnified in high-level situations
  • Tools and techniques to build rapport quickly
  • How executives can communicate more effectively

9:00am - 9:15am  Break

9:15am - 10:00am  Breakout Session

Right-Sizing Risk: How to Talk to the Board About Cybersecurity

Al Lindseth headshot

Al Lindseth

SVP, Risk Management & IT

Plains GP Holdings

As enterprises grow increasingly reliant on technology for every aspect of operations, CISOs have found themselves in a completely new operations center: the boardroom. Headline-grabbing breaches can draw a lot of attention from business stakeholders and board members, but staying focused on the likely scenarios offers the best protection. 

In this session, Al will share strategies for discussing security and technology priorities at the board level and how to:

  • Put risk in perspective and focus on your plan for recovery
  • Understand the gaps in your program and come with a plan to fill them
  • Focus on business risk/reward by mapping core security priorities to business objectives
  • Create a roadmap to “Yes” by prioritizing business performance without sacrificing security

9:15am - 10:00am  Executive Boardroom

Becoming More Active Through Passive Security

Desiree Lee headshot

Desiree Lee

Field CTO

Armis

Christopher Kar headshot

Christopher Kar

Information Security Advisor

Fort Bend Independent School District

As critical assets continue to expand and evolve, there is an increased need for better visibility to proactively manage your risk posture. How can CISOs inspire out-of-the-box thinking while designing cybersecurity strategies that will enhance visibility into their systems?

Come together to discuss:

  • Techniques to track asset inventory, including both managed and unmanaged devices
  • How passive security can increase bandwidth
  • Where to identify risk, threats, gaps and vulnerabilities within the enterprise

9:15am - 10:00am  Executive Boardroom

Hard Keys — Easy Phishing Solution?

Trey Guinn headshot

Trey Guinn

Field Technologist

Cloudflare

John McLeod headshot

John McLeod

CISO

National Oilwell Varco

Scott Smith headshot

Scott Smith

Chief Information Security Officer

City of Bryan

Phishing is the entry point for nearly every compromise we read about today and like it or not, eventually, humans will click on the wrong links. Join this boardroom to discuss hardware security keys as one tool against this persistent threat.

In this session, you will learn:

  • The current strategic landscape for managing risk with security keys
  • Decision-making considerations for implementing hard keys and methods to implement them with on-premise, SaaS applications and non-native architecture
  • Tips for the CISO to drive executive alignment

9:15am - 10:15am  Workshop

Office Hours with Chris Ulrich

What does your body language say about you? What shifts might you make to change how others perceive you? Join this special one-on-one session exclusively for Governing Body members with body-language expert, Chris Ulrich for candid feedback on your in-person and online body language. Sessions are 20-minutes and pre-registration is required.

 In this unique, private session, you’ll receive:

  • One-on-one consultation with a premier expert
  •  Live analysis of your unique body language cues
  • Personalized executive presence improvements 

10:00am - 10:30am  Networking Break

10:30am - 11:15am  Breakout Session

Protect Your Data or Pay the Price?

Chris Wolski headshot

Chris Wolski

CISO

Port of Houston Authority

The risk of attacks are top-of-mind for all organizations today as threat actors become more sophisticated and their impact increasingly detrimental. Cybersecurity professionals must have the right strategy and tools in place to prevent, detect and respond quickly to breaches to avoid reputational risk or paying a hefty sum.

Join this benchmarking session to discuss:

  • Taking ransomware protection to the next level
  • Strategies to defend against bad actors
  • Challenges and best practices in managing major security events

10:30am - 11:15am  Executive Boardroom

The Untold Truth on Threat Landscape

Jared Phipps headshot

Jared Phipps

SVP Worldwide Engineering

SentinelOne

Nibin Philip headshot

Nibin Philip

Vice President, Chief Information Security Officer

Landry's Inc.

John Driggers headshot

John Driggers

VP, Cybersecurity

Schlumberger

Every day we hear that the threat landscape has evolved and that organizations need to make changes to their security solutions, but what has progressed? As we assess the current landscape, what changes do we actually require and what can be done about it?

In this boardroom we dissect:

  • What is happening currently in the threat landscape
  • Changes that are critical versus nice to have
  • Looking ahead to next-level threats

10:30am - 11:15am  Executive Boardroom

Keeping the Cloud Clean

Rick Peters headshot

Rick Peters

CISO Operational Technology, North America

Fortinet

Brad Hollingsworth headshot

Brad Hollingsworth

Director of Cyber Security

Mattress Firm

Eric Mims headshot

Eric Mims

Director, Enterprise IT Security, Information Security Officer

University of Houston System

As the world continues to shift, the most common security challenges faced in the cloud stem from misconfigurations, the need for continuous compliance, and an exploding set of cloud infrastructure services. Whether you are migrating to cloud or building up cloud-native applications, getting basic hygiene right is the first step to building in the cloud with confidence.

Join this session to discuss:

  • Best practices for securing your infrastructure, applications, and data across hybrid and multi-cloud environments
  • How to operate your cloud environment without misconfigurations
  • The most common attacks and how do you protect your business from application security threat

10:30am - 11:30am  Workshop

Office Hours with Chris Ulrich

What does your body language say about you? What shifts might you make to change how others perceive you? Join this special one-on-one session exclusively for Governing Body members with body-language expert, Chris Ulrich for candid feedback on your in-person and online body language. Sessions are 20-minutes and pre-registration is required.

 In this unique, private session, you’ll receive:

  • One-on-one consultation with a premier expert
  •  Live analysis of your unique body language cues
  • Personalized executive presence improvements 

11:15am - 11:25am  Networking Break

11:25am - 12:40pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:45am - 1:15pm  Lunch Service

12:40pm - 1:00pm  Break

1:00pm - 1:35pm  Keynote

Balancing Act — The Present and Future of Compliance

Anil Markose headshot

Anil Markose

Director - Information Security

Amazon Web Services

Over 130 countries have implemented legislation to secure data and privacy and an additional 19 countries have draft legislation in progress. Even with increasing regulatory expectations, digital innovation and migration to the cloud are occurring at unprecedented speed, which results in cloud-native companies quickly bringing more customer-facing services to the market.

Join this session to learn about:

  • How security compliance expectations in a digital and agile world are changing
  • Lessons learned from AWS’s journey in addressing compliance at scale in a digital business
  • How to start this journey, if you have not already


1:35pm - 1:50pm  Break

1:50pm - 2:35pm  Breakout Session

Cyber Security is the Job of Everyone

Mario Chiock headshot

Mario Chiock

Fellow

Schlumberger

Mike Reynolds headshot

Mike Reynolds

Director, IT Security - CISO

SpeedCast

Research shows that by 2022, there will be 1.8 million unfilled cyber security positions. As companies evolve toward digital business and bimodal setups, these skills are becoming more difficult to find and more expensive to hire. Growing the security talent pool will require CISOs to get creative in how they develop and deploy talent – like building an extended team of champions!

Join this session to discuss:

  • What an extended cyber-security team is and its benefits
  • How to implement an extended cyber-security team in your organizational structure
  • How to build a pipeline of future cybersecurity talent
  • How to use the extended cyber-security teams to bridge with the business

1:50pm - 2:35pm  Executive Boardroom

Cutting Through the Clutter to Unify Cybersecurity and Prioritize Response

Amit Patel headshot

Amit Patel

SVP of Global Sales

Cyware

Neel Adhikari headshot

Neel Adhikari

Global Security Program Management

Solvay North America, Inc.

Organizations have finally hit cybersecurity data overload. Most threat intelligence isn’t relevant and as the cyber tech stack in the enterprise has ballooned, most SecOps teams simply have too much data and too many disconnected products to manage.

Join this session to discuss:

  • How organizations are gaining better security outcomes with hyper-connected solutions and data sources
  • New approaches to extend the efficiency and enhance the productivity of SecOps teams
  • How to design your cybersecurity automation roadmap to align with the transformation of today’s digital business

1:50pm - 2:35pm  Executive Boardroom

Taking a Strategic Approach to Third-Party Risk

Sharon Lippe headshot

Sharon Lippe

Global IT Security Manager

Huntsman

Craig Wood headshot

Craig Wood

Director of Infrastructure and Security

Tricon Energy

Deron McElroy headshot

Deron McElroy

Chief of Cybersecurity Services

Cybersecurity and Infrastructure Security Agency

For many businesses, third-party vendors have become an important source of strategic advantage and business value. Yet outsourcing is not without its risks. As these external partnerships become increasingly complex, the need for a new strategic approach to vendor risk management is clear.

Join this session to discuss:

  • Ways to partner across the c-suite on third-party risk efforts
  • New approaches for managing third, fourth, and even fifth-party partners
  • Strategies that will help you make the best choices for your organization

2:35pm - 3:05pm  Networking Break

3:05pm - 3:40pm  Closing Reception & Prize Drawing

December 6, 2021

December 7, 2021

We look forward to seeing you at an upcoming in-person gathering


Location


Venue & Accommodation

Hyatt Regency Houston
MORE INFORMATION

A block of rooms has been reserved at the Hyatt Regency Houston at a reduced conference rate. Reservations should be made online or by calling 713-654-1234. Please mention G-XEVG to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $219 USD (plus tax) is November 15, 2021.

Your Community Partners


CISO Thought Leader
Key Partners
Program Partners

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Tyler Ward

Program Manager

971-230-3500

tyler.ward@evanta.com