Why You Should Attend!



Argyle Executive Forum’s 2014 Chief Information Security Officer Leadership Forum will explore the evolution of the Chief Information Security Officer role and discuss best practices and strategies for the security organization to help drive the business forward and have a profound impact on the local and global business climate.

Argyle Executive Forum is bringing together CISOs, CIOs, CTOs, and direct reports from a variety of industries. Using a discussion-based format, our 2014 Chief Information Security Officer Leadership Forum in Chicago will focus on several areas including: “Effective strategies for Fighting Cyber Crime,” “The Evolution of the CISO and Predictions Going Forward,” “Assessing Security in the Cloud Environment,” “Vendor Risk Management,” and “The Risk of BYOD and the Mobile Workforce.”

This event will feature insights from top executives, including:

If you'd like to recommend a speaker, please email DJ Johnson at djohnson@argyleforum.com.

Speaker
Waqas Akkawi Chief Information Security Officer
SIRVA
View Bio »
Speaker
Greg Bee Chief Information Security Officer
Country Insurance & Financial Services
View Bio »
Speaker
Geoffrey Bibby Vice President of Corporate Marketing
Zix
View Bio »
Speaker
Colin Boyd CIO
Johnson Controls
View Bio »
Speaker
Rich Campagna VP Products
Bitglass
View Bio »
Speaker
Barry Caplin Chief Information Security Officer
Fairview Health Services
View Bio »
Speaker
John Cash Regional Director - US Central
BlackBerry
View Bio »
Speaker
Tony Coppa Vice President of Engineering
AvePoint
View Bio »
Speaker
Ryan Gallagher Sr. Director, Inside Sales
Accellion
View Bio »
Speaker
Kevin Haley Director of Product Management
Symantec
View Bio »
Speaker
John Johnson Global Security Strategist
John Deere
View Bio »
Speaker
Edward Marchewka Head of Information Security
Chicago Public Schools
View Bio »
Speaker
Derek Milroy IS Security Architect
U.S. Cellular Corporation
View Bio »
Speaker
Dave Ostertag Global Investigation Manager
Verizon
View Bio »
Speaker
Naresh Persaud Sr. Director of Security Product Marketing & Market Development
Oracle
View Bio »
Speaker
Adam Rice Chief Information Security Officer
Alliant Techsystems
View Bio »
Speaker
Shad Roberts CISO, Global Risk and Compliance, Chief Privacy Official
Army Sustainment Command
View Bio »
Speaker
Richard Rushing Chief Information Security Officer
Motorola Mobility
View Bio »
Speaker
Nathan Smolenski Chief Information Security Officer
Zurich North America
View Bio »
Speaker
Chris Sutherland U.S. Chief Information Security Officer
BMO Financial Group
View Bio »
Speaker
Marty Ward Vice President, Product Marketing
Sophos
View Bio »
Speaker
Chris Wysopal Co-Founder and Chief Technology Officer
Veracode
View Bio »
  • 7:45am – 8:45am Breakfast
  • 8:45am – 8:50am  Argyle Executive Forum Opening Remarks 
  • 8:50am – 8:55am Introducing Barry Caplin
    read more »

    Marty WardVice President, Product MarketingSophos

  • 8:55am – 9:30am “#*%! my CISO Says”
    read more »

    Many CISOs come from more of a technical, rather than a business, background.  However, we need to be able to communicate with Senior Management, business-area leaders and users who are usually not technologists.  In this talk we will look at some of the common topics CISOs need to cover and discuss how to rephrase the messages to better reach a business-oriented audience.  We will discuss: How to think about security risks in a way business personnel do; How to translate technical security topics into more business-friendly language, and; How to reach a broader audience with the information security message.

    Barry CaplinChief Information Security OfficerFairview Health Services

  • 9:35am – 9:55am  Thought Leadership Spotlight Presented by Oracle
    read more »

    “Defining Controls to Secure The New Perimeter”

     The cost of security is rising rapidly. In the next five years, security spending could increase by 60%. Most IT spending is focused on technologies that are focused on securing the network perimeter, but breaches exploit weaknesses on the inside the network perimeter. In this session, we will define the new perimeter and discuss approaches to secure businesses inside out.

    Naresh PersaudSr. Director of Security Product Marketing & Market DevelopmentOracle*Please note this session is off the record

  • 9:55am – 10:20am  Coffee Break
  • 10:20am – 11:10am  Panel Discussion
    read more »

    "Securing the Organization While Embracing New Innovations"

    Session topics include, but are not limited to:

    • What new technologies will have the biggest impact on business in the year ahead?
    • What are the key benefits of cloud computing, storage and collaboration for a business? What are some of the security challenges (i.e. DLP, open API's, etc.)? Does it effectively cut costs?
    • What are some best practices for a successful incident response plan?
    • How do you deal with issues such as loyalty and winning customers back after the breach?
    • Improve productivity? How does your cloud strategy impact business initiatives in every aspect of the business – customers, engagement and execution?
    • Looking Forward: Should IT Security be made into a business enabler?
    • How does your organization choose which mobile devices and platforms to support?
    • What security issues do mobile devices and moving your organization to the cloud present? How are IT departments responding to them?
    • How do you create a culture around security in your organization?
    Moderator:Edward MarchewkaHead of Information SecurityChicago Public Schools  Panelists:Greg BeeChief Information Security OfficerCountry Insurance & Financial ServicesRich CampagnaVP ProductsBitglass  Tony CoppaVice President of EngineeringAvePointJohn JohnsonGlobal Security StrategistJohn Deere Fred KwongHead of Privilege Access ControlFarmers Insurance Group of Companies

  • 11:15am – 11:35am   Thought Leadership Spotlight Presented by Verizon
    read more »

    "Closing in on the Security Defense Gap"

    The threat landscape has been evolving for years on end. However, the field of security defenses has been behind in keeping up with Preparing, Recognizing and Responding to the advancement of threats. This briefing will highlight the trends, gaps and some success driven approaches that are driving higher probabilities in risk mitigation. Verizon’s marquis, global research culminating into the annual Data Breach Investigations Report serves as a key point of reference in understanding the relevant attack patterns and gaps needing to be filled, which will also be discussed. 

    Dave OstertagGlobal Investigation ManagerVerizon

  • 11:35am – 11:55am Coffee Break
  • 11:55am – 12:00pm Introducing
    read more »

    “IT Transformation is the New Normal”Ryan GallagherSenior Director, Inside SalesAccellion

  • 12:00pm – 12:45pm Panel Discussion
    read more »

    “IT Transformation is the New Normal”Session topics include, but are not limited to:How does your team build a road map to drive long-term business initiatives?

    • How does your team turn InfoSec into a value added product?
    • What are some best practices for a successful incident response plan?
    • How do you deal with issues such as loyalty and winning customers back after the breach?
    • How important is it to build a flexible organization that is innovative and not reactive?
    • How to address and overcome the major barriers hampering the success of your mobile integration strategy?
    • What are best practices when aligning risk management to business priorities?
    • What major IT security changes (i.e. data use, app development practices, hosting) have occurred in the past couple of years and what is driving these changes?
    • How do you use real-time data to enrich the customer experience, drive ROI and accelerate business growth?
    Moderator:Richard RushingChief Information Security OfficerMotorola MobilityPanelists:Waqas AkkawiChief Information Security OfficerSIRVAJohn CashRegional Director - US CentralBlackBerry Derek MilroyIS Security ArchitectU.S. Cellular CorporationNathan SmolenskiChief Information Security OfficerZurich North AmericaChris WysopalCo-Founder and Chief Technology OfficerVeracode

  • 12:50pm – 1:10pm Thought Leadership Spotlight Presented by Symantec
    read more »

    Kevin HaleyDirector of Product ManagementSymantec 1:10pm – 2:10pm

    Lunch 

  • 2:10pm – 2:30pm Thought Leadership Spotlight Presented by Zix
    read more »

    Geoffrey BibbyVice President of Corporate MarketingZix

  • 2:35pm – 3:20pm “Getting to the bottom of  the mystery of APT, the who, the what, and the how to get in front of it.”
    read more »

    Open Discussion of on what is the Advanced Persistent Threat.  Who the actors are, what is their MO, and the steps an enterprise must take to get in front of them.  Discussion on the historical rise of the threat, the evolution of countermeasures, and those things that an enterprise must have if they wish to stop it.

    Adam RiceChief Information Security OfficerAlliant Techsystems 

  • 3:20pm – 3:35pm Coffee Break
  • 3:35pm – 4:10pm Edward Marchewka
    read more »

    Head of Information SecurityChicago Public Schools 

  • 4:15pm – 4:50pm “Enterprise Vulnerability Management / Security Incident Response”
    read more »

    This presentation is a detailed how-to for assessing, implementing, and maintaining a Vulnerability Management Program. This presentation is not based on theory. It is based on experience in literally dozens of environments, some that were scanning over 90,000 live hosts per month. The presentation will also cover methods for working with systems administrators and application owners to get processes in place that are sustainable and will produce results. Metrics and score-carding will be discussed with a focus on measuring what needs to be done and what work has been done.

    In addition, Security Incident Response will also be covered.  The framework presented has been used in both SMB and Enterprise environments.  Its focus is on ensuring Security Incidents are handles in a standardized, repeatable, manner.  As with the Vulnerability Management portion of the presentation, the focus is on how to effectively assess ad existing process or implement and maintain one.

    Derek MilroyIS Security ArchitectU.S. Cellular Corporation

  • 4:50pm – 4:55pm  Argyle Executive Forum Closing Remarks
  • 4:55pm – 5:55pm Closing Reception 

What will be discussed? Explore security hot topics and challenge areas such as:

Security and innovation

Evaluate what technologies will have the biggest impact on the business world in the year ahead, and reflect on the reality of IT security becoming a business enabler. Our speakers will discuss:

  • Tracking the improvement of wireless networks
  • Choosing the best devices to support internally
  • Cutting costs through cloud technology
  • Taking stock of risks imposed by the mobile channel

Building an Effective Security Strategy

Review the major changes the field of IT has experienced over the past few years, the driving forces behind them, and the barriers they present. Get briefed on:

  • Driving long-term business initiatives
  • Overcoming barriers to a solid mobile strategy
  • Aligning risk management with business priorities
  • Developing a successful incident response plan for security incidents

The Evolution of IT

Discuss the importance of having accurate information on customers and prospects in real time, and how the rise of apps, data management tools and practices like hosting have added made the business of protecting enterprise information more complex. Gain insight into:

  • Enriching the customer experience with real-time data
  • Staying alert to prevent theft of data and/or funds
  • Overcoming barriers to implementing multichannel integration
  • Evaluating security risks mobile devices present and how to respond

Transparency and security

Define how the concepts of identity and access management are building and shaping new security perimeters, and hear how successful organizations are managing identities in applications. Learn how top CIOs and CISOs are:

  • Lowering costs and risks related to security
  • Achieving success through data management
  • Defining the key benefits of SSO
  • Protecting enterprise data across the organization

Still have questions? We have answers.

I want to attend, but what if I'm unsure of my schedule and need to cancel my participation?

Just let us know. We understand that schedules change! However, we always have a waiting list for this event, and if you don't cancel, we will assume you are still attending and your spot will go unused. If you must, cancel at least 48 hours prior to the event to make room for others!

What if I can't be OOO for a whole day, or need to come late?

We have wifi and private rooms available for attendees to take calls and spend some quiet time on emails, as well as access to printing. Have a morning meeting you can't miss? No problem. This event was designed for busy executives - we get it.

I'd like to bring some colleagues. Do I need to register them online?

Events are more fun with friends, and we'd be happy to host your team. You can have them register online, or send us their names, titles and email addresses and we will take care of it for you!

I don't see the event venue listed. Where will the meeting be held?

To maintain exclusivity, we don't release the venue address until the registration process has been completed. All logistical details will be shared once you have requested a pass and been approved.

The "2014 Chief Information Security Officer (CISO) Leadership Forum" in Chicago
is proudly sponsored by:

About Image
  • "Not only are the speakers relevant and experts in their fields, but I was able to make some great connections at the meetings as well."

    The Chief Technology Officer at PC Richard and Son on the quality of past Argyle CIO Forums.

  • "Argyle's meetings are well balanced in terms of panels and presentations and networking opportunities with local business leaders."

    A Head of Emerging Business and Technology at Ericsson on attending Argyle CIO events.

  • "The meetings that Argyle Executive Forum runs are truly enjoyable and well put together....I'm looking forward to the next forum."

    A VP of Information Systems at Garmin International on attending Argyle events.

Traveling for the event? Stay at one of our recommended hotels nearby:

Discounted Hotel Rate:

 Please note the below is a preferred hotel of Argyle Executive Forum. To receive a discounted rate, please contact Nick Ditter at (312) 344-4935 and mention that your are looking for the “Argyle Executive Forum rate” when booking.

Venue

Hotel Blake Chicago


500 South Dearborn
Chicago, IL 60605
Telephone: (312) 986-1234
Website