Why You Should Attend!



Argyle Executive Forum is bringing together leading InfoSec, IT, and Risk executives for our annual CISO Summit in New York City. Throughout a full day of content and networking, we will focus on the most pressing issues that InfoSec professionals are facing moving into 2017, with an agenda geared specifically towards CISOs, CSOs, Security VPs, and Directors in a leadership role. Topics will include:

  • Properly preparing for an inevitable multi-cloud future - fully and securely embracing the cloud
  • Strategizing recovery plans and solutions from an organizational cyberattack – transitioning from recovery to resilience
  • Discovering emerging security capabilities and how leading organizations are managing the adoption process
  • Exploring new ways to secure the mobile network, particularly when traditional security measures are no longer effective
  • Understanding how emerging regulatory changes will impact global business operations, and how to best prepare
  • Proactive procedures: Conducting comprehensive and regular information security risk assessments
  • Building a workforce for the future of InfoSec - attaining, training, and retaining talent through in-demand skillset development and mentoring opportunities

 

Our keynote addresses, fireside chats, and panel sessions, and interactive group discussions will give you the perspective and actionable takeaways that only a room of the best minds in New York City can provide. Speakers at our 2016 NYC Forums included Franklin Donahoe, CISO at Mylan; John Gevertz, Global Chief Privacy Officer at ADP; Keith O'Sullivan, VP, Global Information Security (CISO) at Time Inc.; David Peach, CISO at The Economist Group; Sri Dronamraju, SVP & Chief Information Risk Officer at MassMutual; Chris Nims SVP & CISO at AOL; and more.

We look forward to bringing together another fantastic faculty in 2017, and to hosting you alongside our community of Fortune 500 CISO leaders hailing from the heart of New York City and beyond.

This event will feature insights from top executives, including:

If you'd like to recommend a speaker, please email Rhonda Le at rle@argyleforum.com.

Speaker
Thomas Braun Chief, Architecture & Security, Office of Information and Communications Technology
United Nations
View Bio »
Speaker
Margarita Costa Matos Vice President
Bank of America
View Bio »
Speaker
David Damato Chief Security Officer
Tanium
View Bio »
Speaker
Nicole Eagan CEO
Darktrace
View Bio »
Speaker
Yair Frankel Senior Vice President, Security & Architecture
Bank of America
View Bio »
Speaker
Arlette Hart Chief Information Security Officer
FBI
View Bio »
Speaker
Brad Keller Senior Director 3rd Party Strategy
Prevalent
View Bio »
Speaker
Shuk Khader Chief Information Security Officer
Keurig Green Mountain
View Bio »
Speaker
Brian Lozada CISO
Zocdoc
View Bio »
Speaker
Parveen Malik AVP Information Security & Compliance Implementation, Global
State Street Corporation
View Bio »
Speaker
Brett Morgan Senior Sales Executive
InAuth
View Bio »
Speaker
Keith O'Sullivan Vice President, Global Information Security (CISO)
Time Inc.
View Bio »
Speaker
Stacey Olive Executive Director, Talent Acquisition
The New York Times Company
View Bio »
Speaker
Dan Reynolds Vice President, Chief of Security and Information Architecture
Omnicom Group
View Bio »
Speaker
Julie Smith Senior Application Security Analyst
McGraw-Hill Global Education Holdings
View Bio »
Speaker
Brian Smith-Sweeney Chief Information Security Officer
Columbia University Medical Center
View Bio »
Speaker
Robert Sobers Director of Inbound Marketing
Varonis
View Bio »
Speaker
Patrick Torney Vice President IT Risk Data Protection and M&A
General Electric Company
View Bio »
Speaker
Derek Vadala Managing Director and Chief Information Security Officer
Moody's
View Bio »
  • 7:55am - 8:55am Breakfast
  • 8:55am - 9:00am Argyle Executive Forum Opening Remarks
  • 9:00am - 9:05am Session Introduction
    read more »

    Brett Morgan
    Senior Sales Executive
    InAuth

  • 9:05am - 9:40am Fireside Chat: “Securing and Closing the Gap on Cyber Security Talent”
    read more »

    Join Keith O'Sullivan, Vice President, Global Information Security (CISO) of Time Inc., Stacey Olive, Executive Director, Talent Acquisition of The New York Times Company, and Julie Smith, Senior Application Security Analyst of McGraw-Hill Global Education Holdings in an interactive session discussing how to build a quality cyber security team, the lack of cyber security, how to fix the gender gap, and steps to increase the number of women in technology, specifically InfoSec.

    Featuring:    

    Stacey Olive
    Executive Director, Talent Acquisition
    The New York Times Company

    And

    Julie Smith
    Senior Application Security Analyst
    McGraw-Hill Global Education Holdings

    Interviewed by:

    Keith O’Sullivan
    Vice President, Global Information Security (CISO)
    TIME Inc.

  • 9:45am - 10:05am Thought Leadership Spotlight: "A Smarter Approach to Third-Party Vendor Risk Management"
    read more »

    Governing and managing third and fourth-party relationships continues to be more complex and significant given all of the new regulations, technologies and standards. Organizations want to protect themselves and their customers from third-party vendor threats, but their current approaches are leaving too many gaps in their program.

     In this session, attendees will learn:

    • Current industry trends on third-party risk
    • Steps to consider when ready to implement an effective third-party vendor risk program
    • How to reduce both the time and cost in managing your third-party relationships through a collaborative ecosystem

    Brad Keller, JD, CTPRP
    Sr. Director 3rd Party Strategy
    Prevalent Networks

  • 10:05am - 10:30am Coffee Break
  • 10:30am - 11:15am Panel Discussion: “Building an Effective Security Strategy”
    read more »

    Session topics include, but are not limited:

    • What are top emerging risks that are stemming from new digital channels?
    • How are you implementing a proactive vs. reactive InfoSec strategy?
    • How are you leveraging data to enable enhanced visibility and control?
      • How are you harnessing data to understand threats in real time?
    • What are some best practices for proactively identifying potential breaches and threats?
    • Discuss how to build a capable team with proper skills and agile structure
    • Where do you start when communicating a well-defined action plan to other areas of the business?
      • What some best practices for cross department collaboration and education?

    Moderator:

    Thomas Braun
    Chief Architecture & Security, Office of Information and Communications Technology
    United Nations
     
    Panelists:

    Shuk Khader
    Chief Information Security Officer
    Keurig Green Mountain

    Brian Lozada
    Chief Information Security Officer
    Zocdoc

    Derek Vadala
    Managing Director and Chief Information Security Officer
    Moody's

  • 11:20am - 11:40am Thought Leadership Spotlight: "Today’s Threat Landscape - The more things change, the more they stay the same"
    read more »

    News headlines repeat that the cyber threat landscape is constantly changing. But is it really? Over the past decade, David has led more than 10,000 hours of incident response engagements, spanning more than 100 investigations. This experience has provided him with a first hand view of the threat landscape. In this discussion, David will review the changes in our modern threat landscape. He will also identify ways leadership can look past the hype and focus on those components of the threat landscape that rarely change, in order to build a more sustainable and resilient cyber security program.

    David Damato
    Chief Security Officer
    Tanium

  • 11:40am - 12:00pm Coffee Break
  • 12:00pm - 12:45pm Panel Discussion: “Combatting Malvertising, Ransomware, and the Rise of Cyber Threats”
    read more »

    Session topics include, but are not limited to:

    • Discussing  heavily targeted industries for ransomware
    • How organizations are taking precautionary measures
    • Examining the evolution of the CISO role in relation to the rise of cyber threats
    • Taking a look at the latest developments within the ransomware and malvertising space
    • Pinpointing top weaknesses that are impacting the organizations
    • Best practices for detecting and combatting advanced threats

    Moderator:

    Brian Smith-Sweeney 
    Chief Information Security Officer 
    Columbia University Medical Center 

     
    Panelists:

    Parveen Malik
    Assistant Vice President, Information Security & Compliance Implementation, Global
    State Street Corporation

    Dan Reynolds
    Vice President, Chief of Security and Information Architecture
    Omnicom Group

    Robert Sobers
    Director of Inbound Marketing
    Varonis

    Patrick Torney
    Vice President IT Risk Data Protection and M&A
    General Electric Company
     

  • 12:45pm - 1:45pm Lunch
  • 1:45pm - 2:05pm Thought Leadership Spotlight: "New Technology Outlook for Cyber Defense"
    read more »

    In 2016, we saw Trust Attacks impact democracy. Ransomware and Mirai Botnet machine-based attacks moved too fast for humans to keep up. 350,000 US cyber defense posts stood unmanned due to a skills shortage. When it comes to protecting your organization, the days of telling the board "we've got this" are over.

    Cyber security has turned into an arms race—machines fighting machines on the battleground of corporate networks. This new dynamic demands a disruption in cyber defense. Traditional security approaches are too entrenched in perimeter protection, rules and signatures, and post-incident response to give defenders an advantage.

    Despite the eye-rolling hyperbole surrounding machine learning, there are reasons why it is the disruption we need. Winning algorithms and our own organizational complexity may be the best form of cyber defense

    Nicole Eagan
    Chief Executive Officer
    Darktrace

  • 2:05pm - 2:40pm Keynote Session: "InfoSec’s Three Roles for Innovation: Enabler, Facilitator and Protector"
    read more »

    Getting innovation and information security to align can be a challenge. On the one hand innovation requires dynamics and free thinking while information security emphasizes stability and common practices. Our experience has shown innovation can be highly effective when business, technology and governance teams all take responsibility in the innovation process. We will talk about challenges with innovating in risk adverse organizations and discuss lessons learned to enhance the collaborative environment. We’ll discuss how CISOs may structure their organization to be better suited to play an active role in the innovation process while still protecting their organization.  

    Margarita Costa Matos
    Vice President
    Bank of America

    Yair Frankel
    Senior Vice President 
    Bank of America

  • 2:40pm - 2:55pm Coffee Break
  • 2:55pm - 3:30pm Keynote Session: "CyberSecurity: Where Do We Go From Here?"
    read more »

    A perspective on the future of CyberSecurity, and recommendations on setting the right priorities. Tomorrow’s CyberSecurity will bring a challenging landscape, with the balance between access and capabilities playing against privacy and security concerns. Our world is changing with big data, IOT, Cloud, mobility, and other innovations changing the way we work. How do organizations prioritize and make sure that scarce resources are addressing the most pressing challenges? Together we can drive forward and make our cyber future a little safer.

    Arlette Hart
    Chief Information Security Officer 
    FBI

  • 3:30pm - 3:35pm Argyle Executive Forum Closing Remarks
  • 3:35pm - 4:35pm Cocktail Reception

What will be discussed? Explore security hot topics and challenge areas such as:

Security and innovation

Evaluate what technologies will have the biggest impact on the business world in the year ahead, and reflect on the reality of IT security becoming a business enabler. Our speakers will discuss:

  • Tracking the improvement of wireless networks
  • Choosing the best devices to support internally
  • Cutting costs through cloud technology
  • Taking stock of risks imposed by the mobile channel

Building an Effective Security Strategy

Review the major changes the field of IT has experienced over the past few years, the driving forces behind them, and the barriers they present. Get briefed on:

  • Driving long-term business initiatives
  • Overcoming barriers to a solid mobile strategy
  • Aligning risk management with business priorities
  • Developing a successful incident response plan for security incidents

The Evolution of IT

Discuss the importance of having accurate information on customers and prospects in real time, and how the rise of apps, data management tools and practices like hosting have added made the business of protecting enterprise information more complex. Gain insight into:

  • Enriching the customer experience with real-time data
  • Staying alert to prevent theft of data and/or funds
  • Overcoming barriers to implementing multichannel integration
  • Evaluating security risks mobile devices present and how to respond

Transparency and security

Define how the concepts of identity and access management are building and shaping new security perimeters, and hear how successful organizations are managing identities in applications. Learn how top CIOs and CISOs are:

  • Lowering costs and risks related to security
  • Achieving success through data management
  • Defining the key benefits of SSO
  • Protecting enterprise data across the organization

Still have questions? We have answers.

I want to attend, but what if I'm unsure of my schedule and need to cancel my participation?

Just let us know. We understand that schedules change! However, we always have a waiting list for this event, and if you don't cancel, we will assume you are still attending and your spot will go unused. If you must, cancel at least 48 hours prior to the event to make room for others!

What if I can't be OOO for a whole day, or need to come late?

We have wifi and private rooms available for attendees to take calls and spend some quiet time on emails, as well as access to printing. Have a morning meeting you can't miss? No problem. This event was designed for busy executives - we get it.

I'd like to bring some colleagues. Do I need to register them online?

Events are more fun with friends, and we'd be happy to host your team. You can have them register online, or send us their names, titles and email addresses and we will take care of it for you!

I don't see the event venue listed. Where will the meeting be held?

To maintain exclusivity, we don't release the venue address until the registration process has been completed. All logistical details will be shared once you have requested a pass and been approved.

The "2017 Chief Information Security Officer (CISO) Leadership Forum" in New York is proudly sponsored by:

About Image
  • "Not only are the speakers relevant and experts in their fields, but I was able to make some great connections at the meetings as well."

    The Chief Technology Officer at PC Richard and Son on the quality of past Argyle CIO Forums.

  • "Argyle's meetings are well balanced in terms of panels and presentations and networking opportunities with local business leaders."

    A Head of Emerging Business and Technology at Ericsson on attending Argyle CIO events.

  • "The meetings that Argyle Executive Forum runs are truly enjoyable and well put together....I'm looking forward to the next forum."

    A VP of Information Systems at Garmin International on attending Argyle events.

Traveling for the event? Stay at one of our recommended hotels nearby:

Please note the below is the preferred hotel of Argyle Executive Forum. Please specify that you are part of the Argyle group when booking sleeping rooms in order to receive a discounted rate of $199.00 per night, taxes not included.

Venue

The Fitzpatrick Grand Central


141 E. 44th Street
New York, NY 10017
Telephone: (800) 367-7701
Website