Why You Should Attend!

Argyle Executive Forum’s 2014 Chief Information Security Officer Leadership Forum will explore the evolution of the Chief Information Security Officer role and discuss best practices and strategies for the security organization to help drive the business forward and have a profound impact on the local and global business climate.

Argyle Executive Forum is bringing together CISOs, CIOs, CTOs, and direct reports from a variety of industries. Using a discussion-based format, our 2014 Chief Information Security Officer Leadership Forum in San Francisco will focus on several areas including: “Effective strategies for Fighting Cyber Crime,” “The Evolution of the CISO and Predictions Going Forward,” “Assessing Security in the Cloud Environment,” “Vendor Risk Management,” and “The Risk of BYOD and the Mobile Workforce.”

This event will feature insights from top executives, including:

If you'd like to recommend a speaker, please email DJ Johnson at djohnson@argyleforum.com.

Bashar Abouseido Vice President, Information Security Risk Management (CISO)
Charles Schwab
View Bio »
Rich Campagna VP Products
View Bio »
Vincent Campitelli Vice President of Information Security & Risk Management
View Bio »
Bob Cheong Chief Information Security Officer
Los Angeles World Airports
View Bio »
Walter Curd Vice President and Chief Information Officer
Maxim Integrated Products
View Bio »
Mike Ellis CEO
View Bio »
Frank Greco Director of Technology
View Bio »
Richard Greene President
View Bio »
Greg Headley VP of EPG Sales
View Bio »
Elimu Kajunju Chief Privacy Officer & Senior Compliance Director
View Bio »
Cory Louie Head of Trust, Safety & Security
View Bio »
Tom McCreary Information Security and Privacy Officer
View Bio »
Sri Muthu Vice President, Technology & Operations Executive
Wells Fargo
View Bio »
Richard Noguera Head of Information Security
The Gap
View Bio »
Michele Robinson State Chief Information Security Officer
State of California
View Bio »
Richard Rushing Chief Information Security Officer
Motorola Mobility
View Bio »
Stephen Scharf Global Chief Information Security Officer
View Bio »
Eric Schou Director of Product Marketing
HP ArcSight
View Bio »
Chandar Venkataraman Chief Product Officer
View Bio »
Kevin Walker Vice President, Assistant CISO
Wal-Mart Stores
View Bio »
  • 7:45am – 8:45am Breakfast
  • 8:45am – 8:50am Argyle Executive Forum Opening Remarks
  • 8:50am – 8:55am Introducing Elimu Kajunju:
    read more »

    Frank GrecoDirector of TechnologyKaazing

  • 8:55am – 9:30am “What every security professional needs to know about privacy”
    read more »

    Elimu KajunjuChief Privacy Officer & Senior Compliance DirectorUnitedHealth 9:35am – 9:55am

    Thought Leadership Spotlight Presented by Dropbox

    "Evaluating the security of a service: Is it enterprise-ready?"There are numerous security considerations when evaluating a third party service, including compliance, infrastructure, features, privacy and overall security assurance and trust. How can you sort through the most important questions and determine which areas to prioritize for your particular needs? In this talk we'll share lessons learned from Dropbox's evolution to offering both a consumer and an enterprise service.Cory LouieHead of Trust, Safety & SecurityDropbox

  • 9:55am – 10:25am Coffee Break
  • 10:25am – 11:15am Panel Discussion
    read more »

    “Evolution of Security: Securing the Organization While Embracing New Innovations”

    Session topics include, but are not limited to: 

    Major security issues that are intrinsic to business growth in areas of Mobile, Social and Cloud 
    • How to deliver a seamless end-user experience to a growing, user base, while balancing corporate and regulatory compliance policies?
    • Which new mobile devices will remain viable tools for business users?
    • What new technologies will have the biggest impact on business in the year ahead?
    • What are the key benefits of cloud computing for a business? Does it effectively cut costs? Improve productivity?
    • How does your cloud strategy impact business initiatives in every aspect of the business – customers, engagement and execution?
    • Looking Forward: Should IT Security be made into a business enabler?
    • Where has wireless network technology made the most improvements in the last year?
    • How does your organization choose which mobile devices and platforms to support?
    • What security issues do mobile devices present and how are IT departments responding to them?
    Moderator:Sri MuthuVP, Technology & Operations ExecutiveWells FargoPanelists:Rich CampagnaVP ProductsBitglassWalter CurdVice President and Chief Information OfficerMaxim Integrated ProductsGreg HeadleyVP of EPG SalesAvepointStephen ScharfGlobal Chief Information Security OfficerExperian

  • 11:20am – 11:40am Thought Leadership Spotlight Presented by Seculert
    read more »

    “You Can’t Stop What You Can’t See” Richard GreenePresidentSeculert

  • 11:40am – 12:00pm Coffee Break
  • 12:00pm – 12:35pm Fireside Chat
    read more »

    Kevin WalkerVice President, Assistant CISOWal-Mart StoresInterviewed by:Richard NogueraHead of Information SecurityThe Gap*Please note, this session is off the record

  • 12:40pm– 1:00pm Thought Leadership Spotlight Presented by Druva
    read more »

    "How to Defend Your Data in the Wild"Protecting data for your entire company is a heavy responsibility. There’s the employee who leaves his laptop in the airport. And the former employee who still has access to corporate data from her personal device. Or the ever-present danger of litigation. You’re accountable for a wide range of scenarios that put your corporate data at risk.How can you learn from the experiences of others to ensure that you’re prepared for every threat to your corporate data in the wild?  What are the best practices for keeping your prized corporate assets out of harm’s way?Chandar VenkataramanChief Product OfficerDruva

  • 1:00pm – 2:00pm Lunch
  • 2:00pm – 2:20pm Thought Leadership Spotlight Presented by ForgeRock
    read more »

    "Identity Relationship Management: Using identity to empower CISOs everywhere"Identity and Access Management (IAM) was traditionally designed for internal, perimeter-based enterprise. However, the world has significantly changed. Today’s CIOs and CISOs are being asked to shift investments from lowering operational costs to driving top-line revenue. Solutions must be stateless and link all types of devices, applications and things. In this session we will discuss the new model for identity -- Identity Relationship Management -- and its impact on the modern enterprise.Mike EllisCEOForgeRock

  • 2:25pm – 3:10pm Panel Discussion
    read more »

    “The Art of Risk: Understanding the Evolution of Risk and Cyber Attacks”Session topics include, but are not limited to:  

    • What does cyber security mean when managing risk in the enterprise? 
    • Shifting Economics of Cybercrime 
    • CISO – What does it mean in today’s world? 
    • How to distinguish the fine lines of cyber policy 
    • Differences and similarities of traditional and enterprise risk management 
    • Defending against increasingly complex cybercrime. Differences and similarities of traditional and enterprise risk management
    Moderator:Eric SchouDirector of Product MarketingHP ArcSightPanelists:Bashar AbouseidoVice President, Information Security Risk Management (CISO)Charles SchwabVincent CampitelliVP IT Risk ManagementMcKessonTom McCrearyInformation Security and Privacy OfficerCalPERSMichele RobinsonState Chief Information Security OfficerState of California*Please note, this session is off the record

  • 3:10pm – 3:30pm Coffee Break
  • 3:30pm – 4:05pm "Cyber Operation with Security Intelligence"
    read more »

    • Auditing with Cyber Security Framework
    Cyber Operation with real-world threatsBest Practice & Technical Control for Insider ThreatIntelligence Reporting with IP Reputation Correlation Bob CheongChief Information Security OfficerLos Angeles World Airports*Please note, this session is off the record

  • 4:10pm – 4:45pm "2014 Transcendence in IT Security"
    read more »

    With the every increasing number of threats, severity of  risks, with your perimeter looking like swiss cheese we have created the perfect storm. Now where ever you turn you see it like APT, HeartBleed, Cyberrcrime, BYOD, Spying, and much more.This is not the same internet that it was a few years ago, We have been bypassed, leapfrog, or caught napping in the security space by the bad guys and our friends. Now we will be always be reacting to the risks and threats never planning. The only hope is to transcend our current situation in both new and old ways.  To get one step  ahead of the bad guys and too stay ahead. We will look at where to focus and what makes the biggest impact.  How security must jump the gap that exists before it widens more.Richard RushingChief Information Security OfficerMotorola Mobility

  • 4:45pm – 4:50pm Argyle Executive Forum Closing Remarks
  • 4:50pm – 5:50pm Closing Reception

What will be discussed? Explore security hot topics and challenge areas such as:

Security and innovation

Evaluate what technologies will have the biggest impact on the business world in the year ahead, and reflect on the reality of IT security becoming a business enabler. Our speakers will discuss:

  • Tracking the improvement of wireless networks
  • Choosing the best devices to support internally
  • Cutting costs through cloud technology
  • Taking stock of risks imposed by the mobile channel

Building an Effective Security Strategy

Review the major changes the field of IT has experienced over the past few years, the driving forces behind them, and the barriers they present. Get briefed on:

  • Driving long-term business initiatives
  • Overcoming barriers to a solid mobile strategy
  • Aligning risk management with business priorities
  • Developing a successful incident response plan for security incidents

The Evolution of IT

Discuss the importance of having accurate information on customers and prospects in real time, and how the rise of apps, data management tools and practices like hosting have added made the business of protecting enterprise information more complex. Gain insight into:

  • Enriching the customer experience with real-time data
  • Staying alert to prevent theft of data and/or funds
  • Overcoming barriers to implementing multichannel integration
  • Evaluating security risks mobile devices present and how to respond

Transparency and security

Define how the concepts of identity and access management are building and shaping new security perimeters, and hear how successful organizations are managing identities in applications. Learn how top CIOs and CISOs are:

  • Lowering costs and risks related to security
  • Achieving success through data management
  • Defining the key benefits of SSO
  • Protecting enterprise data across the organization

Still have questions? We have answers.

I want to attend, but what if I'm unsure of my schedule and need to cancel my participation?

Just let us know. We understand that schedules change! However, we always have a waiting list for this event, and if you don't cancel, we will assume you are still attending and your spot will go unused. If you must, cancel at least 48 hours prior to the event to make room for others!

What if I can't be OOO for a whole day, or need to come late?

We have wifi and private rooms available for attendees to take calls and spend some quiet time on emails, as well as access to printing. Have a morning meeting you can't miss? No problem. This event was designed for busy executives - we get it.

I'd like to bring some colleagues. Do I need to register them online?

Events are more fun with friends, and we'd be happy to host your team. You can have them register online, or send us their names, titles and email addresses and we will take care of it for you!

I don't see the event venue listed. Where will the meeting be held?

To maintain exclusivity, we don't release the venue address until the registration process has been completed. All logistical details will be shared once you have requested a pass and been approved.

The "2014 Chief Information Security Officer (CISO) Leadership Forum" in San Francisco is proudly sponsored by:

About Image
  • "Not only are the speakers relevant and experts in their fields, but I was able to make some great connections at the meetings as well."

    The Chief Technology Officer at PC Richard and Son on the quality of past Argyle CIO Forums.

  • "Argyle's meetings are well balanced in terms of panels and presentations and networking opportunities with local business leaders."

    A Head of Emerging Business and Technology at Ericsson on attending Argyle CIO events.

  • "The meetings that Argyle Executive Forum runs are truly enjoyable and well put together....I'm looking forward to the next forum."

    A VP of Information Systems at Garmin International on attending Argyle events.

Traveling for the event? Stay at one of our recommended hotels nearby:

The below hotels are recommended by Argyle Executive Forum. Please note that we do not have a corporate rate.


San Francisco Marriott Union Square

480 Sutter Street
San Francisco, CA 94108
Telephone: (866) 912-0973


Sir Francis Drake Hotel

450 Powell Street
San Francisco, CA, 94102
Telephone: (800) 795-7129


The Warwick Hotel

490 Geary Street
San Francisco, CA, 94102
Telephone: (415) 928-7900


The Westin St. Francis

335 Powell Street
San Francisco, CA, 94102
Telephone: (415) 397-7000

Continuing Education Credits:

Due to the nature of our program, Argyle events do not always receive continuing education credits. We do make efforts to apply in several states and will work with members to apply as an individual if credits are not awarded for the event. Should we receive credits, we do however inform our members.