In the post pandemic era, remote employment is the new status quo. Employers are forced to implement and improve the digital workplace by providing productivity tools and accessibility to company resources. In this session, we will share case studies of successful digital workplace implementations, including how to deal with the inherent security risks of expanded accessibility to company resources.
The Future of IT & Cybersecurity
CXO Summit
Speakers
Kenn Kern
CIO, CISO Special Assistant
City of New York
Amit Basu
VP, CIO & CISO
International Seaways
About Me
Peter Dentico
Managing Director Security Operations
Omnicom Group
About Me
Susan Koski
CISO
PNC
About Me
Devon Bryan
Global CIO
Carnival Corporation
About Me
Ibrahim Jackson
Founder
Ubiquitous Preferred Services
About Me
Anthony Gonzalez
CISO NA
QBE North America
About Me
Adam Fishman
Strategic Advisor to Small & Mid-Sized Businesses
AMF Advisors
About Me
Nick Diieso
Director, Global Head of Operational Risk
Citi
About Me
Leo Cunningham
Former CISO
Flo Health Inc.
About Me
Vic Ventura
Global CIO
Novolex
Scot Miller
SVP & CISO
Mr. Cooper
About Me
Laura Deaner
CISO
Northwestern Mutual
About Me
Martin Howard
EVP/IT & IS
Fortium Partners
About Me
Michael Gross
Manager, Cybersecurity Intelligence
Cleveland Clinic
About Me
Avishai Avivi
CISO
Safebreach
About Me
Anna Thomas
Director Operations & Technology Transformation
Citibank
About Me
Shamla Naidoo
Head of Cloud Strategy & Innovation
Netskope
About Me
Scott Dillon
CEO, Digital Evangelist, Board Advisor & Investor
About Me
Kathleen Hurley
CIO
Sage Inc
Cecilia Li
CIO
Urban Edge Properties
About Me
Alex Shulman
Managing Director, Cloud Security
Ernst & Young
About Me
Jim Routh
CSO, Board Member, Advisor & Investor
Transmit Security
About Me
Charles Blauner
CISO
Cyber Aegis
About Me
Viktoria Levay
Corporate Health Coach & Resilience Trainer
Nourish With Viktoria
About Me
A passionate, inspiring and engaging wellness leader/corporate coach/optimal performance expert to support organizations and their employees with stress management, mental health initiatives, communication, teamwork, leadership development, and implementation of sustainable lifestyle changes for high functional performance and productivity through ongoing training and 1:1 support. These proven methods increase team effectiveness, employee well-being, reduce absenteeism, workplace disruptions, improve employee retention and talent attraction, and save on health care costs.
Amy Aiello
Amy Aiello Photography
About Me
Michael Woodson
Director of Information Security
Sonesta International Hotels Corporation
Ben Cody
SVP Product Management
SailPoint Technologies Inc
Karl Mattson
CISO
Noname Security
About Me
Anne Marie Zettlemoyer
CSO
CyCognito
Anand Raghavan
Co-Founder & CPO
Armorblox
About Me
Ben Halpert
Founder & CEO
CISO Horizon
About Me
Aruna Ravichandran
SVP & CMO - Enterprise Networking, AI
Cisco
About Me
Doron Hendler
CEO & Co-Founder
RevealSecurity
About Me
Jason Stutt
CRO
ArmorCode
About Me
Gabi Reish
Chief Product Officer
Cybersixgill Ltd.
About Me
Todd Dekkinga
CISO
Zluri
About Me
David Geevaratne - NO LONGER W/ COMPANY!!!
SVP of Sales
Uptycs
Martin Howard
EVP/CIO
Avesis
About Me
Anthony Gonzalez
Principal, Strategic Advisor
Innervision Services LLC
About Me
Leo Cunningham
CISO
Owkin Inc
About Me
Karl Mattson
CISO
Endor Labs
About Me
Michael Gross
CEO
Engrossed Advisory
About Me
EVENT DETAILS
November 9, 2022
Agenda
8:45 AM-9:30 AM
Registration & Breakfast
10:00 AM-11:00 AM
Panel
The “New” Workspace
Panelists
Chair
Ibrahim Jackson
Founder
Ubiquitous Preferred Services
Speaker
Adam Fishman
Strategic Advisor to Small & Mid-Sized Businesses
AMF Advisors
Speaker
Martin Howard
EVP/IT & IS
Fortium Partners
Speaker
Kathleen Hurley
CIO
Sage Inc
Speaker
Aruna Ravichandran
SVP & CMO - Enterprise Networking, AI
Cisco
11:00 AM-11:35 AM
Keynote
Application Security in a DevOps, Cloud and API World
Security teams are challenged to modernize application security practices in light of accelerating shifts to DevOps delivery models and rapid adoption of cloud-native application designs. Applications built on microservices (e.g. serverless, containers, APIs) and delivered continuously are outpacing application security teams ability to secure them. CISOs need to consider new skills, new touch points and new platforms to maintain a strong security posture in light of these trends and the speed at which they are re-shaping IT.
Panelists
11:35 AM-11:50 AM
Networking Break
11:50 AM-12:45 PM
Panel
Operationalization: Bridging the Divide between Knowledge and Action
Knowledge is power, and yet, knowing is not enough. Security teams are well aware of the vital role played by threat intelligence within the modern security stack. Too often, TI is underutilized, funneled through manual processes to the desks of security analysts and researchers, and not operationalized to drive automated cybersecurity processes and actions.
Why is this knowledge lost in translation on the way to action? Is it due to the overwhelming quantities of data? Is it because of conflicting information? Is it related to concerns about false positives? If we succeeded in operationalizing sensor-driven telemetry data in vehicles to autonomously drive cars, why aren’t we as successful in operationalizing threat intelligence data to drive autonomous cybersecurity actions?
Panelists
Chair
Gabi Reish
Chief Product Officer
Cybersixgill Ltd.
Speaker
Avishai Avivi
CISO
Safebreach
Speaker
Michael Woodson
Director of Information Security
Sonesta International Hotels Corporation
Speaker
Cecilia Li
CIO
Urban Edge Properties
Speaker
Anne Marie Zettlemoyer
CSO
CyCognito
12:45 PM-1:50 PM
Fireside Chat
Lunch & Fireside Chat
BEC - FBI calls it the $43B* heist. How to tame this beast?
According to the FBI’s recent IC3 report in 2022, exposed business loss due to BEC accounts for > $43B. Why? At the heart of it, the biggest fear is not the technology, it is the potential of human error that could expose your organization to a cyberattack. The majority of CISOs agree that an employee carelessly falling victim to a BEC/phishing scam is the most likely cause of a security breach. Most also agree that they will not be able to reduce the level of employee disregard for information security. How do we guard against human error without limiting employee efficiency and productivity?
Panelists
Chair
Ibrahim Jackson
Founder
Ubiquitous Preferred Services
Speaker
Devon Bryan
Global CIO
Carnival Corporation
Speaker
Scott Dillon
CEO, Digital Evangelist, Board Advisor & Investor
Speaker
Anand Raghavan
Co-Founder & CPO
Armorblox
1:55 PM-2:50 PM
Panel
Building Security into DevSecOps
Many organizations struggle with how and where to introduce automation and integrations efficiently. Conventional approaches to application security can’t keep pace with cloud-native environments that use agile methodologies and API-driven architectures, microservices, containers, and serverless functions. Application security testing is evolving to meet the speed at which DevOps teams operate. DevSecOps teams are challenged with how to make sense of the noise their AppSec tools generate once they’ve been automated into DevOps pipelines.
Processes and tools are more fast-paced and rely on integration and automation to maintain efficiency throughout the software development life cycle. A new approach to DevSecOps is required addressing a change in the security mindset. How do CISOs achieve this without the buy-in from stakeholders?
Panelists
Chair
Jim Routh
CSO, Board Member, Advisor & Investor
Transmit Security
Speaker
Leo Cunningham
Former CISO
Flo Health Inc.
Speaker
Anthony Gonzalez
CISO NA
QBE North America
Speaker
Nick Diieso
Director, Global Head of Operational Risk
Citi
Speaker
Jason Stutt
CRO
ArmorCode
2:55 PM-3:45 PM
Panel
The Greatest Fears?
The biggest fear is not the technology, it is the potential of human error that could expose your organization to a cyberattack. The majority of CISOs agree that an employee carelessly falling victim to a phishing scam is the most likely cause of a security breach. Most also agree that they will not be able to reduce the level of employee disregard for information security. Identity security is business essential for modern enterprises, but the ability to do it effectively has moved well beyond human capacity. How do we guard against human error without limiting employee efficiency and productivity?
Panelists
Chair
Jim Routh
CSO, Board Member, Advisor & Investor
Transmit Security
Speaker
Shamla Naidoo
Head of Cloud Strategy & Innovation
Netskope
Speaker
Ben Cody
SVP Product Management
SailPoint Technologies Inc
Speaker
Anna Thomas
Director Operations & Technology Transformation
Citibank
Speaker
Scott Dillon
CEO, Digital Evangelist, Board Advisor & Investor
3:50 PM-4:05 PM
Networking Break
4:15 PM-5:10 PM
Panel
Security Controls: Measuring Efficacy for the Business Growth
The industry is spending record amounts on cybersecurity tooling, but somehow CISOs still are at times left scrambling to respond to the vulnerabilities like Log4j. Assuming that these types of critical and far-reaching events are inevitable, how can CISOs further improve their organization’s preparedness for future cyberattacks?
This panel will discuss potential strategies for determining the critical security controls - both technology and behavioral - that can minimize cyber-risks and give the organization the competitive advantage to grow and innovate. We will explore frameworks for measuring the efficacy of cybersecurity investments, and KPIs that show the board the investment is safeguarding the company's digital infrastructure for the long term.
Panelists
Chair
Ben Halpert
Founder & CEO
CISO Horizon
Speaker
Scot Miller
SVP & CISO
Mr. Cooper
Speaker
Susan Koski
CISO
PNC
Speaker
Alex Shulman
Managing Director, Cloud Security
Ernst & Young
Speaker
David Geevaratne - NO LONGER W/ COMPANY!!!
SVP of Sales
Uptycs
5:15 PM-6:10 PM
Panel
Detect Imposters and Rogue Insiders in Business Applications
The risks posed by rogue insiders and external attackers make application detection a massive pain point for enterprises, especially in regards to core business applications. Examples are a fraudster’s takeover of a checking account via social engineering, or a customer service agent modifying an insurance policy to add themselves as a beneficiary, or a salesperson downloading a report of all customers before switching to work at a competitor. This panel will explore the growing need for application detection and the challenges posed by current rule-based techniques.
Panelists
Chair
Ben Halpert
Founder & CEO
CISO Horizon
Speaker
Michael Gross
Manager, Cybersecurity Intelligence
Cleveland Clinic
Speaker
Laura Deaner
CISO
Northwestern Mutual
Speaker
Charles Blauner
CISO
Cyber Aegis
Speaker
Doron Hendler
CEO & Co-Founder
RevealSecurity
6:15 PM-6:30 PM
Disruptor
The Road to SaaS Governance: Centralize & secure application management
The acceleration of cloud adoption has reached a point where today, 39% of all applications are SaaS. Because of decentralization and a low-friction model of payment and usage, SaaS applications will continue to replace on-prem software rapidly. But with decentralization comes chaos. Governance & management around SaaS is still largely lagging behind. CIOs and CISOs currently don’t have visibility or control, leading to Shadow IT & disjointed IT (SaaS) Ops.
To help IT leaders get a hold of their SaaS stack, we’ll present a full-fledged discovery and management framework that seamlessly integrates control systems for SaaS within the modern IT technology landscape.








