2017 Chief Information Security Officer (CISO) Leadership Forum
Why You Should Attend!#ArgyleCISO
Argyle Executive Forum is bringing together leading InfoSec, IT, and Risk executives for our annual CISO Summit in New York City. Throughout a full day of content and networking, we will focus on the most pressing issues that InfoSec professionals are facing moving into 2017, with an agenda geared specifically towards CISOs, CSOs, Security VPs, and Directors in a leadership role. Topics will include:
- Properly preparing for an inevitable multi-cloud future - fully and securely embracing the cloud
- Strategizing recovery plans and solutions from an organizational cyberattack – transitioning from recovery to resilience
- Discovering emerging security capabilities and how leading organizations are managing the adoption process
- Exploring new ways to secure the mobile network, particularly when traditional security measures are no longer effective
- Understanding how emerging regulatory changes will impact global business operations, and how to best prepare
- Proactive procedures: Conducting comprehensive and regular information security risk assessments
- Building a workforce for the future of InfoSec - attaining, training, and retaining talent through in-demand skillset development and mentoring opportunities
Our keynote addresses, fireside chats, and panel sessions, and interactive group discussions will give you the perspective and actionable takeaways that only a room of the best minds in New York City can provide. Speakers at our 2016 NYC Forums included Franklin Donahoe, CISO at Mylan; John Gevertz, Global Chief Privacy Officer at ADP; Keith O'Sullivan, VP, Global Information Security (CISO) at Time Inc.; David Peach, CISO at The Economist Group; Sri Dronamraju, SVP & Chief Information Risk Officer at MassMutual; Chris Nims SVP & CISO at AOL; and more.
We look forward to bringing together another fantastic faculty in 2017, and to hosting you alongside our community of Fortune 500 CISO leaders hailing from the heart of New York City and beyond.
This event will feature insights from top executives, including:
If you'd like to recommend a speaker, please email Rhonda Le at email@example.com.
United Nations View Bio »
Thomas Braun currently heads the Information Security and Architecture Section in the Office of Information and Communications Technology of the United Nations. Based at its headquarter in New York his team is responsible for setting and maintaining the Organization’s enterprise architecture and information security frameworks and overseeing their global implementation. Prior to joining the United Nations he was a founding member of the network security team at Cornell University in Ithaca, NY, and served as the first Information Security Officer of the World Trade Organization in Geneva, Switzerland.
Bank of America View Bio »
Margarita Costa Matos is Vice President at Bank of America, focusing on implementing architecture design governance processes and strategic planning. She has worked in financial services for the past 14 years fulfilling a variety of roles in technology spanning across application management, project management and process management. She earned her computer science degree from New York University and her computer engineering degree from Stevens Institute of Technology.
Tanium View Bio »
David Chief Security Officer at Tanium. As Chief Security Officer, David provides strategic product direction over module development for the Tanium Platform and manages the company’s internal security program. David brings a wealth of security expertise to Tanium, spanning incident response and forensics, vulnerability assessments, security program development, security operations, and network and security architecture. Prior to Tanium, David most recently served as Managing Director at Mandiant, a FireEye company, where his team led incident response and post-breach remediation efforts at over 100 Fortune 500 companies. At Mandiant, David was also instrumental in developing new incident response services capabilities and establishing consulting offices both domestically and internationally. Prior to Mandiant, David led security-consulting teams at PwC as part of its Washington Federal Practice and held IT roles at Raytheon focused on the management of internal and government networks. David frequently shares his expertise and insights at industry events and with the media.
Darktrace View Bio »
As Chief Executive Officer of Darktrace, Nicole Eagan has positioned the company as an international leader in cyber defense. Nicole was named ‘Woman of the Year’ at the 2016 Cyber Security Awards for successfully introducing disruptive machine learning technology to the global market. Her extensive career as a technology executive includes over 25 years of commercial and marketing experience. An expert in developing and executing strategies for high-growth businesses, Nicole has secured Darktrace $65 million in Series C funding from KKR and led the company to 600% year-on-year growth. Under her leadership, Darktrace’s innovative approach to cyber security has won over 20 awards, including World Economic Forum Technology Pioneer. The company is headquartered in San Francisco, CA and Cambridge, England and now has more than 360 employees working across 23 countries.
Bank of America View Bio »
Yair Frankel is a Senior Vice President for Global Banking and Markets Technology at Bank of America. Yair is an established thought leader in several technology areas and has lead transformative projects spanning application security, anti-malware, cryptography, cloud, grid computing, payments, threat intel, security incident management, and network security. Well known for bringing pragmatic and innovative solutions, he brings diverse approaches and problem solving from holding senior positions at financial institutions, FinTechs and government/industrial labs. Yair is a regularly speaker at Security and CIO events. He has published over 70 peer reviewed publications and has multiple patents covering mobile devices, networking, public key infrastructure, financial transactions and biometrics.
FBI View Bio »
Arlette Hart is the Federal Bureau of Investigation’s Chief Information Security Officer. She is responsible for insuring appropriate information security protocols are in place, that data and networks are protected, so they can be used where and when FBI employees and partners legitimately need them. This requires a walking a fine line between sharing and securing information technology assets and data.
In her role as CISO Ms. Hart builds coalitions across the FBI, with government partners, and with private industry to shape the direction of cyber security and drive innovation. She is the executive in charge of the Bureau’s Operational Cyber Security Program. Ms. Hart directs FBI information assurance capabilities, ensures baseline compliance and ongoing monitoring for external and internal threats. Ms. Hart brings technology management and deployment skills to drive effective security architecture from the perimeter to the host. Her areas of expertise include the advanced persistent threat, insider threat, intelligence, technical discovery, investigation, and assessment and mitigation of compromise. She joined the Bureau 2010, after working with the FBI as a contractor for several years. Ms. Hart has a Bachelors’ Degree from Geneva College and earned a Master’s Degree from Georgetown University.
Prevalent View Bio »
Brad Keller has been developing and leading risk management programs for more than 25 years. During this time Brad has developed and implemented vendor and business risk management programs at several financial institutions that have substantially improved risk management while also passing federal regulatory scrutiny.
Focusing on the risk of doing business online, he has implemented leading edge programs for the identification and mitigation of identity theft and online fraud. He has testified on behalf of the financial services industry at Congressional hearings on customer privacy issues; and, is a frequent member of financial industry led initiatives that address issues related to risk management, anti-phishing, online fraud, customer privacy, and authentication issues.
Today Brad is the Senior Director of Third-Party Practice Lead at Prevalent, where he focuses on the delivery of Prevalent’s third party risk management and assessment solutions, and the consulting to support those solutions.
Prior to joining Prevalent, he was a Senior Vice President with The Santa Fe Group focusing on the management of the Shared Assessments Program. At Shared Assessments he led the development of Shared Assessments tools, training, and the risk management professional certification program.
Brad graduated with honors from the University of Missouri with a B.S.degree in Finance and received his J.D. with honors from St. Louis University School of Law. He is admitted to practice law in Oklahoma.
Keurig Green Mountain View Bio »
Shuk Khader has more than 25 years of experience in Cyber Security, and Information Risk Management across multiple verticals, which include Finance, Consumer Goods, Telecommunications, and Infrastructure. A passionate, insightful, and a true thought-leader in the information security space, Shuk is keen on understanding and balancing the business drivers of security and risk management.
Shuk was ranked 48th overall in 2012 among all Security Executives and Chief Security Officer by Execrank.com. Shuk has proven track record of successfully building very effective and efficient Information Security Programs for two large corporations from the grounds up.
Prior to his current role at Keurig as the CISO responsible for the overall global information security and compliance function, Shuk spent over 14 years at Avon as their CISO. Shuk also served as the Information Security Officer for the Asset Management Services Group at JPMorgan. He also worked at Nynex (Verizon now), and for a couple of consultant firms prior to that. He holds a master’s degree in System Science and is an active member on the Governing Body of the NY & Boston CISO executive summits.
Zocdoc View Bio »
Speaker bio coming soon...
State Street Corporation View Bio »
Subject matter expert, speaker, trainer of Information Security Management, Risk, Governance, and Cloud Security. Accomplished as Senior Management with a 20-year profession track record of successfully assessing information security risk and designing information security program for financial, health care, technology institution and corporations including State Street Corporation, EMC2, Jackson Labs, Cable & Wireless and Shell Oil.”
InAuth View Bio »
Brett Morgan serves as Senior Account Executive for InAuth, where he is responsible for leading the company’s efforts to evangelize their innovative mobile security suite to Fortune 500 companies. Morgan brings two decades of experience based on key leadership roles with other Fortune 500 companies, including Digital Insight, Intuit and NCR, where he specialized in client advocacy and executing account strategy.
Time Inc. View Bio »
Keith is currently the Global head of information Security for Time Inc. In this capacity, Keith leads the strategic Information Security direction for one of the largest branded media companies in the world. The Time Inc brand reaches more than 140 million people each month across multiple print and digital platforms. Keith has over 15 years’ of Information Security experience and is a thought leader in his field. Keith’s expertise and knowledge spans many Information Security disciplines including emerging defense in-depth technologies, innovative cloud security solutions and Cyber Intelligence surrounding insider threats. Keith’s industry leadership supports innovative DevSecOps models and building diverse security teams in many industries including media, publishing, insurance, consulting and technology.
The New York Times Company View Bio »
Speaker bio coming soon...
Omnicom Group View Bio »
Daniel has over 25 years of security and technology experience spanning both military and commercial verticals. Daniel has worked for Omnicom Media Group since 2002 in multiple capacities of IT management, Security and Architecture disciplines. Daniel’s background involves work in government, financial, insurance, manufacturing and advertising business sectors.
Daniel holds the CISSP, CISM, and CISA certifications as well as a host of several other technical certifications. While a senior manager, Daniel still believes in getting in the trenches with his teams providing leadership from the front and direct mentoring. Being a hands on and a lead from the front individual contributes to his continued successes.
McGraw-Hill Global Education Holdings View Bio »
Julie is currently the Senior Application Analyst of information Security for McGraw-Hill Education. Her primary responsibilities include establishing strong security practices and partnerships across development, operations, and technology groups; advancing existing framework to enable greater PCI compliance; and spearheading application & network assessments, testing, and research.
Columbia University Medical Center View Bio »
Brian Smith-Sweeney was appointed Chief Information Security Officer at Columbia University Medical Center in 2015. He feels incredibly fortunate to have been able to turn something he loves into a 20-year career. Brian enjoys speaking publicly, especially about infosec, and is passionate about data-driven decision making, FUD busting, and building communities.
Brian works with an amazing, diverse, and dedicated team of security professionals at CUMC. With their help he sets direction and provides overall security leadership for the Medical Center with a focus on threat management and HIPAA compliance. Prior to joining the Medical Center Brian held a variety of roles at New York University including Assistant Director of Global Security Operations, heading up a program that spanned twelve countries, and before that he worked as an IT consultant and security professional in both the public and private sector.
Brian has been an active member of the higher education security community and has worked on the Internet2 SALSA-CSI2 working group, the REN-ISAC Transitional Board, and the REN-ISAC Microsoft Analysis Team which he chaired. He has also been a regular contributor to the Educause Security Professionals Conference and chaired the 2015 program committee.
But those are just his hobbies - his real job is as a husband, and a father and personal chef to three awesome kids.
Varonis View Bio »
Rob Sobers is a director at cybersecurity firm Varonis. He has been writing and designing software for over 20 years and is co-author of the book Learn Ruby the Hard Way, which has been used by millions of students to learn the Ruby programming language. Prior to joining Varonis in 2011, Rob held a variety of roles in engineering, design, and professional services.
General Electric Company View Bio »
With more than 15 years of experience in technology, Patrick’s career has encompassed a broad range of IT leadership and execution including hardware, software (PaaS), SDLC, IT Operations, Audit, IT Security and Risk, Project Management, and Business Process Management all while promoting change and measurable outcomes. He has worked with business leaders from areas of Business Operations, Finance and Operational Risk, as well as having to present to various levels of an organization, including Board Level leadership and government regulators (Federal Reserve Bank of NY as an example). In his current role, Patrick is responsible for strategic initiatives including Security Mergers and Acquisitions and leading company wide Data Level Protection.
Patrick is married with 3 kids, is a passionate gamer and geek, enjoys cooking and wine, and resides in Fairfield CT.
Moody's View Bio »
Derek Vadala is the Chief Information Security Officer for Moody’s Corporation, a global financial institution servicing the capital markets, providing credit ratings, research, tools and analysis that contribute to transparent and integrated financial markets. With approximately 10,000 people worldwide, Moody’s maintains a presence in 30+ countries and reported revenue of $3.3 billion in 2014.
Derek oversees Moody’s global Information Risk and Security program where he leverages his leadership and technology expertise to help the organization appropriately balance risk and security. His responsibilities include security strategy, architecture, incident response and operations. Derek has over 15 years of IT and security management experience, is a graduate from the University of San Francisco and has written for O’Reilly Media.
7:55am - 8:55am Breakfast
8:55am - 9:00am Argyle Executive Forum Opening Remarks
9:00am - 9:05am Session Introduction
read more »
Senior Sales Executive
9:05am - 9:40am Fireside Chat: “Securing and Closing the Gap on Cyber Security Talent”
read more »
Join Keith O'Sullivan, Vice President, Global Information Security (CISO) of Time Inc., Stacey Olive, Executive Director, Talent Acquisition of The New York Times Company, and Julie Smith, Senior Application Security Analyst of McGraw-Hill Global Education Holdings in an interactive session discussing how to build a quality cyber security team, the lack of cyber security, how to fix the gender gap, and steps to increase the number of women in technology, specifically InfoSec.
Executive Director, Talent Acquisition
The New York Times Company
Senior Application Security Analyst
McGraw-Hill Global Education Holdings
Vice President, Global Information Security (CISO)
9:45am - 10:05am Thought Leadership Spotlight: "A Smarter Approach to Third-Party Vendor Risk Management"
read more »
Governing and managing third and fourth-party relationships continues to be more complex and significant given all of the new regulations, technologies and standards. Organizations want to protect themselves and their customers from third-party vendor threats, but their current approaches are leaving too many gaps in their program.
In this session, attendees will learn:
- Current industry trends on third-party risk
- Steps to consider when ready to implement an effective third-party vendor risk program
- How to reduce both the time and cost in managing your third-party relationships through a collaborative ecosystem
Brad Keller, JD, CTPRP
Sr. Director 3rd Party Strategy
10:05am - 10:30am Coffee Break
10:30am - 11:15am Panel Discussion: “Building an Effective Security Strategy”
read more »
Session topics include, but are not limited:
- What are top emerging risks that are stemming from new digital channels?
- How are you implementing a proactive vs. reactive InfoSec strategy?
- How are you leveraging data to enable enhanced visibility and control?
- How are you harnessing data to understand threats in real time?
- What are some best practices for proactively identifying potential breaches and threats?
- Discuss how to build a capable team with proper skills and agile structure
- Where do you start when communicating a well-defined action plan to other areas of the business?
- What some best practices for cross department collaboration and education?
Chief Architecture & Security, Office of Information and Communications Technology
Chief Information Security Officer
Keurig Green Mountain
Chief Information Security Officer
Managing Director and Chief Information Security Officer
11:20am - 11:40am Thought Leadership Spotlight: "Today’s Threat Landscape - The more things change, the more they stay the same"
read more »
News headlines repeat that the cyber threat landscape is constantly changing. But is it really? Over the past decade, David has led more than 10,000 hours of incident response engagements, spanning more than 100 investigations. This experience has provided him with a first hand view of the threat landscape. In this discussion, David will review the changes in our modern threat landscape. He will also identify ways leadership can look past the hype and focus on those components of the threat landscape that rarely change, in order to build a more sustainable and resilient cyber security program.
Chief Security Officer
11:40am - 12:00pm Coffee Break
12:00pm - 12:45pm Panel Discussion: “Combatting Malvertising, Ransomware, and the Rise of Cyber Threats”
read more »
Session topics include, but are not limited to:
- Discussing heavily targeted industries for ransomware
- How organizations are taking precautionary measures
- Examining the evolution of the CISO role in relation to the rise of cyber threats
- Taking a look at the latest developments within the ransomware and malvertising space
- Pinpointing top weaknesses that are impacting the organizations
- Best practices for detecting and combatting advanced threats
Chief Information Security Officer
Columbia University Medical Center
Assistant Vice President, Information Security & Compliance Implementation, Global
State Street Corporation
Vice President, Chief of Security and Information Architecture
Director of Inbound Marketing
Vice President IT Risk Data Protection and M&A
General Electric Company
12:45pm - 1:45pm Lunch
1:45pm - 2:05pm Thought Leadership Spotlight: "New Technology Outlook for Cyber Defense"
read more »
In 2016, we saw Trust Attacks impact democracy. Ransomware and Mirai Botnet machine-based attacks moved too fast for humans to keep up. 350,000 US cyber defense posts stood unmanned due to a skills shortage. When it comes to protecting your organization, the days of telling the board "we've got this" are over.
Cyber security has turned into an arms race—machines fighting machines on the battleground of corporate networks. This new dynamic demands a disruption in cyber defense. Traditional security approaches are too entrenched in perimeter protection, rules and signatures, and post-incident response to give defenders an advantage.
Despite the eye-rolling hyperbole surrounding machine learning, there are reasons why it is the disruption we need. Winning algorithms and our own organizational complexity may be the best form of cyber defense
Chief Executive Officer
2:05pm - 2:40pm Keynote Session: "InfoSec’s Three Roles for Innovation: Enabler, Facilitator and Protector"
read more »
Getting innovation and information security to align can be a challenge. On the one hand innovation requires dynamics and free thinking while information security emphasizes stability and common practices. Our experience has shown innovation can be highly effective when business, technology and governance teams all take responsibility in the innovation process. We will talk about challenges with innovating in risk adverse organizations and discuss lessons learned to enhance the collaborative environment. We’ll discuss how CISOs may structure their organization to be better suited to play an active role in the innovation process while still protecting their organization.
Margarita Costa Matos
Bank of America
Senior Vice President
Bank of America
2:40pm - 2:55pm Coffee Break
2:55pm - 3:30pm Keynote Session: "CyberSecurity: Where Do We Go From Here?"
read more »
A perspective on the future of CyberSecurity, and recommendations on setting the right priorities. Tomorrow’s CyberSecurity will bring a challenging landscape, with the balance between access and capabilities playing against privacy and security concerns. Our world is changing with big data, IOT, Cloud, mobility, and other innovations changing the way we work. How do organizations prioritize and make sure that scarce resources are addressing the most pressing challenges? Together we can drive forward and make our cyber future a little safer.
Chief Information Security Officer
3:30pm - 3:35pm Argyle Executive Forum Closing Remarks
3:35pm - 4:35pm Cocktail Reception
What will be discussed? Explore security hot topics and challenge areas such as:
Security and innovation
Evaluate what technologies will have the biggest impact on the business world in the year ahead, and reflect on the reality of IT security becoming a business enabler. Our speakers will discuss:
- Tracking the improvement of wireless networks
- Choosing the best devices to support internally
- Cutting costs through cloud technology
- Taking stock of risks imposed by the mobile channel
Building an Effective Security Strategy
Review the major changes the field of IT has experienced over the past few years, the driving forces behind them, and the barriers they present. Get briefed on:
- Driving long-term business initiatives
- Overcoming barriers to a solid mobile strategy
- Aligning risk management with business priorities
- Developing a successful incident response plan for security incidents
The Evolution of IT
Discuss the importance of having accurate information on customers and prospects in real time, and how the rise of apps, data management tools and practices like hosting have added made the business of protecting enterprise information more complex. Gain insight into:
- Enriching the customer experience with real-time data
- Staying alert to prevent theft of data and/or funds
- Overcoming barriers to implementing multichannel integration
- Evaluating security risks mobile devices present and how to respond
Transparency and security
Define how the concepts of identity and access management are building and shaping new security perimeters, and hear how successful organizations are managing identities in applications. Learn how top CIOs and CISOs are:
- Lowering costs and risks related to security
- Achieving success through data management
- Defining the key benefits of SSO
- Protecting enterprise data across the organization
Still have questions? We have answers.
I want to attend, but what if I'm unsure of my schedule and need to cancel my participation?
Just let us know. We understand that schedules
we always have a waiting list for this event,
and if you don't
cancel, we will assume you are still attending
and your spot will
go unused. If you must, cancel at least 48 hours
prior to the
event to make room for others!
What if I can't be OOO for a whole day, or need
to come late?
We have wifi and private rooms available for
attendees to take
calls and spend some quiet time on emails, as
well as access to
printing. Have a morning meeting you can't miss?
No problem. This
event was designed for busy executives - we get
I'd like to bring some colleagues. Do I need to
Events are more fun with friends, and we'd be happy to host your team. You can have them register online, or send us their names, titles and email addresses and we will take care of it for you!
I don't see the event venue listed. Where will
the meeting be
To maintain exclusivity, we don't release the
venue address until
the registration process has been completed. All
details will be shared once you have requested a
pass and been
The "2017 Chief Information Security Officer (CISO) Leadership Forum" in New York is proudly sponsored by:
"Not only are the speakers relevant and experts in their fields, but I was able to make some great connections at the meetings as well."
The Chief Technology Officer at PC Richard and Son on the quality of past Argyle CIO Forums.
"Argyle's meetings are well balanced in terms of panels and presentations and networking opportunities with local business leaders."
A Head of Emerging Business and Technology at Ericsson on attending Argyle CIO events.
"The meetings that Argyle Executive Forum runs are truly enjoyable and well put together....I'm looking forward to the next forum."
A VP of Information Systems at Garmin International on attending Argyle events.
Traveling for the event? Stay at one of our
Please note the below is the preferred hotel of Argyle Executive Forum. Please specify that you are part of the Argyle group when booking sleeping rooms in order to receive a discounted rate of $199.00 per night, taxes not included.