Why You Should Attend!



Argyle Executive Forum is bringing together leading InfoSec, IT, and Risk executives for our inaugural 2017 CISO Forum in Los Angeles. Throughout a full day of content and networking, we will focus on the most pressing issues that InfoSec professionals face moving into 2018, with an agenda geared specifically towards CISOs, CSOs, Security VPs, and Directors in a leadership role. Topics will include:

  • Exploring emerging security capabilities and how leading organizations are managing the adoption process
  • Properly preparing for an inevitable multi-cloud future
  • Understanding how emerging regulatory changes will impact global business operations, and how to best prepare
  • Fostering a proactive culture: conducting comprehensive and regular information security risk assessments
  • Building a workforce for the future of InfoSec: attaining, training, and retaining talent through in-demand skillset development and mentoring opportunities


Our keynote addresses, fireside chats, and panel sessions, and interactive group discussions will give you the perspective and actionable takeaways that only a room of the best minds in Los Angeles can provide.

We look forward to hosting you alongside our community of Fortune 500 CISO leaders hailing from the heart of Southern California and beyond!

This event will feature insights from top executives, including:

If you'd like to recommend a speaker, please email Hannah Gerry at hgerry@argyleforum.com.

Speaker
Parker Ashley Cyber Security Manager
Darktrace
View Bio »
Speaker
Jason Bunyea Chief Information Security Officer
Arbonne International
View Bio »
Speaker
Gabriel Cortina VP, Technology
Bunim / Murray Productions
View Bio »
Speaker
Auston Davis Chief Information Security Officer
Stanford Children’s Health
View Bio »
Speaker
Emilio Escobar Head Of Information Security
Hulu
View Bio »
Speaker
Stephen Frethem Senior Systems Engineer
Varonis
View Bio »
Speaker
Richard Greenberg Information Security Officer
Los Angeles County Department of Public Health
View Bio »
Speaker
Chris Gullett Director, Information Assurance
Allegiant Travel Company
View Bio »
Speaker
Matt Hughes Vice President, Professional and Platform Services
InteliSecure
View Bio »
Speaker
Chris Joerg Chief Information Security Officer
Cedars-Sinai Health System
View Bio »
Speaker
Darrell Jones Head, Global Information Security
Herbalife International of America
View Bio »
Speaker
Timothy Lee Chief Information Security Officer
City of Los Angeles
View Bio »
Speaker
Raja Mukerji Co-Founder & Chief Customer Officer
ExtraHop
View Bio »
Speaker
Doug Murray Principal and CISO
Hyundai
View Bio »
Speaker
Mike Murray Vice President of Security Intelligence
Lookout
View Bio »
Speaker
Madjid Nakhjiri Senior Director of Security Architecture
Samsung Strategy and Innovation Center
View Bio »
Speaker
Brendan O'Connor Security Chief Technology Officer
ServiceNow
View Bio »
Speaker
Jerry Sto.Tomas Vice President & Chief Information Security Officer
Apria Healthcare Group
View Bio »
  • 8:00am – 9:00am Breakfast
  • 9:00am – 9:05am Argyle Opening Remarks
  • 9:05am – 9:40am Keynote Presentation Featuring City of Los Angeles: "The Future of Cybersecurity"
    read more »

    As organizations race toward digital transformation to maintain competitive advantage and to satisfy evolving customer demands, CISOs must reevaluate their security strategies and risk management program to address new challenges of digital business security. This keynote will discuss the future of cybersecurity and evolving role of CISO in the age of digital transformation.

    Timothy Lee
    Chief Information Security Officer
    City of Los Angeles          

  • 9:45am – 10:05am Thought Leadership Spotlight featuring Lookout: "Those APTs You’re So Worried About are Mobile Too"
    read more »

    Mike Murray
    Vice President of Security Intelligence
    Lookout

    Enterprises take a lot of care to protect their laptops from APTs. Indeed, the endpoint detection and response (EDR) market soared to over $500 million last year (2016). But evidence indicates that the same nation-states enterprises are spending millions to keep out of their laptops are widely executing targeted attacks on mobile. And enterprises have made it easier for them because they’ve left mobile devices unprotected.

  • 10:05am – 10:30am Networking Break
    read more »

  • 10:30am – 11:20am Panel Discussion: “Combatting Malvertising, Ransomware, and the Rise of Cyber Threats”
    read more »

    Session topics include, but are not limited to:

    • Discussing heavily targeted industries for ransomware
    • How organizations are taking precautionary measures
    • Examining the evolution of the CISO role in relation to the rise of cyber threats
    • Exploring the latest developments within the ransomware and malvertising space
    • Pinpointing top weaknesses that are impacting the organizations
    • Best practices for detecting and combatting advanced threats

    Moderator:

    Emilio Escobar
    Head Of Information Security
    Hulu

    Panelists:

    Jason Bunyea
    Chief Information Security Officer
    Arbonne International

    Stephen Frethem
    Senior Systems Engineer
    Varonis

    Raja Mukerji
    Co-Founder & Chief Customer Officer
    ExtraHop

    Doug Murray
    Principal and CISO
    Hyundai Motor Group (Autoever America)    

  • 11:20am – 11:40am Networking Break
    read more »

  • 11:40am – 12:30pm Panel Discussion: "Security as a Business Enabler"
    read more »

    Session topics include, but are not limited to:

    • Top emerging risks stemming from new digital channels
    • Harnessing data to understand threats in real time
    • Enabling efficiency and productivity through reliable security processes
    • Compellingly communicating security concepts to the executive team
    • Best practices for cross department collaboration and education

    Moderator:

    Chris Joerg
    Chief Information Security Officer
    Cedars-Sinai Health System

    Panelists:

    Chris Gullett
    Director, Information Assurance
    Allegiant Travel Company

    Matt Hughes
    Vice President, Professional Services
    InteliSecure

    Madjid Nakhjiri
    Senior Director of Security Architecture
    Samsung Strategy and Innovation Center

    Brendan O'Connor
    Security Chief Technology Officer
    ServiceNow

  • 12:30pm – 1:30pm Lunch
    read more »

  • 1:30pm – 2:15pm Keynote featuring Stanford Children’s Health: "Cybersecurity Risk Management: Changing Cybersecurity from a Zero to a Hero"
    read more »

    In light of the recent rash of attacks (Equifax, WannaCry, etc.) that involved exploits of known vulnerabilities, having effective cybersecurity risk management is key. Experts are now becoming more proactive in predicting when, where, why and how attackers might strike – and despite that, many organizations still see cybersecurity as costly, inefficient, and counter-productive. In this session, we’ll explore a proven methodology to turn cybersecurity into a business enabler, and how to prioritize cybersecurity risk management as an internal business objective instead of a Cybersecurity Mandate.

    Auston Davis
    Chief Information Security Officer
    Stanford Children’s Health

  • 2:15pm – 2:50pm Fireside Chat featuring DarkTrace: "Autonomous Cyber Defense: AI and the Immune System Approach"
    read more »

    From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and respond to these threats that are already inside the network - before they turn into a full-blown crisis.
    Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.
     
    Discover why autonomous response and machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.
    In this session, learn:
    ·       How new machine learning and mathematics are automating advanced cyber defense
    ·       Why full network visibility allows you to detect and autonomously respond to threats
    ·       How smart prioritization and visualization of threats allows for better resource allocation and lower risk
    ·       Real-world examples of unknown threats detected by ‘immune system’ technology

    Gabriel Cortina
    VP, Technology
    Bunim / Murray Productions

    Interviewed by

    Parker Ashley
    Cyber Security Manager
    Darktrace



  • 2:50pm – 3:25pm Keynote Presentation featuring Hyundai: "Overcoming Shadow IT with Vendor Risk Management"
    read more »

    What’s Shadow IT?   Shadow IT refers to IT devices, software and services that are procured outside the ownership or control of IT organizations.   In this case we’re talking about the business going to outside vendors to procure these types of IT services.  When the business hires vendors to perform IT services, they’re not aware of the risk that is introduced to the organization.  Marketing tends to be the biggest offender for obvious reasons.  In this discussion, I’ll talk about:

    1. The best way to discover when, where, how and why the business procures “applications”, either custom made or off-the-shelf, outside of the organization.    
    2. What information security can do to mitigate this type of risk to the business through vendor risk management.  

    Doug Murray
    Principal and CISO
    Hyundai Motor Group (Autoever America)    

  • 3:25pm – 3:45pm Networking Break
  • 3:45pm – 4:20pm Keynote Presentation featuring the Los Angeles County Department of Public Health: "A Day in the Life of a CISO"
    read more »

    CISOs are not just the heads of information security. They have to be business leaders; they have to learn and know the business. They need to be public relations and marketing specialists, selling security to their organization’s business units. The days of technologists sharing with management the number of potential attacks from the Internet are ancient history. The C-Suite has no desire to learn to communicate with Information Security professionals. We must learn to speak the language of business. 

    CISOs must have a solid background in IT to be able to effectively communicate with the IT side of the house, collaborating on projects and discussing strategies to ensure security controls are in place and being adhered to. Effective security awareness strategies are increasingly important, as phishing attacks proliferate. One Phishing attempt can interrupt an entire morning. Applications need to be written in a secure manner, in an environment with ample security processes in place. Proposed new apps must be assessed for security at their very inception, not just prior to implementation.

    Each day in the life of a CISO will be different, as priorities change and interruptions abound. Join me as we look at atypical (if there is such a thing) day.

    Richard Greenberg
    Chief Information Security Officer
    Los Angeles County Department of Public Health

  • 4:20pm – 4:55pm Keynote Presentation featuring Apria Healthcare: "Sustaining Security Up in the Cloud"
    read more »

    Today's businesses continue to rapidly reach for the Cloud, which raises serious concerns for IT and Security departments.  Should you still be worried as more cloud providers in the market differentiate themselves by proving their best of class security?  And how about Mobility?  Mobile access to the Cloud has also changed completely.  Despite the big security improvements, the last few years, it is still important to think about the potential risks - specifically the fact that you are still responsible for access and movement of data to the cloud.  

    Jerry's presentation provides an overview of security best practices and how to incorporate them to sustain Cloud strategies in any organization.  

    Jerry Sto.Tomas
    Vice President & Chief Information Security Officer
    Apria Healthcare Group

  • 4:55pm – 5:00pm Argyle Closing Remarks
  • 5:00pm – 6:00pm Closing Reception

What will be discussed? Explore security hot topics and challenge areas such as:

Security and innovation

Evaluate what technologies will have the biggest impact on the business world in the year ahead, and reflect on the reality of IT security becoming a business enabler. Our speakers will discuss:

  • Tracking the improvement of wireless networks
  • Choosing the best devices to support internally
  • Cutting costs through cloud technology
  • Taking stock of risks imposed by the mobile channel

Building an Effective Security Strategy

Review the major changes the field of IT has experienced over the past few years, the driving forces behind them, and the barriers they present. Get briefed on:

  • Driving long-term business initiatives
  • Overcoming barriers to a solid mobile strategy
  • Aligning risk management with business priorities
  • Developing a successful incident response plan for security incidents

The Evolution of IT

Discuss the importance of having accurate information on customers and prospects in real time, and how the rise of apps, data management tools and practices like hosting have added made the business of protecting enterprise information more complex. Gain insight into:

  • Enriching the customer experience with real-time data
  • Staying alert to prevent theft of data and/or funds
  • Overcoming barriers to implementing multichannel integration
  • Evaluating security risks mobile devices present and how to respond

Transparency and security

Define how the concepts of identity and access management are building and shaping new security perimeters, and hear how successful organizations are managing identities in applications. Learn how top CIOs and CISOs are:

  • Lowering costs and risks related to security
  • Achieving success through data management
  • Defining the key benefits of SSO
  • Protecting enterprise data across the organization

Still have questions? We have answers.

I want to attend, but what if I'm unsure of my schedule and need to cancel my participation?

Just let us know. We understand that schedules change! However, we always have a waiting list for this event, and if you don't cancel, we will assume you are still attending and your spot will go unused. If you must, cancel at least 48 hours prior to the event to make room for others!

What if I can't be OOO for a whole day, or need to come late?

We have wifi and private rooms available for attendees to take calls and spend some quiet time on emails, as well as access to printing. Have a morning meeting you can't miss? No problem. This event was designed for busy executives - we get it.

I'd like to bring some colleagues. Do I need to register them online?

Events are more fun with friends, and we'd be happy to host your team. You can have them register online, or send us their names, titles and email addresses and we will take care of it for you! Email PDeFrancisci@argyleforum.com

I don't see the event venue listed. Where will the meeting be held?

To maintain exclusivity, we don't release the venue address until the registration process has been completed. All logistical details will be shared once you have requested a pass and been approved.

The "2017 Chief Information Security Officer (CISO) Leadership Forum" in Los Angeles is proudly sponsored by:

About Image
  • "Not only are the speakers relevant and experts in their fields, but I was able to make some great connections at the meetings as well."

    The Chief Technology Officer at PC Richard and Son on the quality of past Argyle CIO Forums.

  • "Argyle's meetings are well balanced in terms of panels and presentations and networking opportunities with local business leaders."

    A Head of Emerging Business and Technology at Ericsson on attending Argyle CIO events.

  • "The meetings that Argyle Executive Forum runs are truly enjoyable and well put together....I'm looking forward to the next forum."

    A VP of Information Systems at Garmin International on attending Argyle events.

Traveling for the event? Stay at one of our recommended hotels nearby:

The below hotels are recommended by Argyle Executive Forum. Please note that we do not have a corporate rate. For details on where the event will take place, please contact your Argyle relationship manager.

Venue

Omni Los Angeles Hotel at California Plaza


251 South Olive Street
Los Angeles, CA 90012
Telephone: (800) 843-6664
Website

Venue

Standard Hotel: Downtown LA


550 South Flower Street
Los Angeles, CA 90071
Telephone: (213) 892-8080
Website

Venue

W Los Angeles - Westwood


930 Hilgard Avenue
Los Angeles, CA 90024
Telephone: (877) 782-0104
Website