Why You Should Attend!



Argyle is bringing together leading InfoSec, IT, and Risk executives for our annual CISO Summit in Dallas. Throughout a full day of content and networking, we will focus on the most pressing issues that InfoSec professionals are facing today, with an agenda geared specifically towards CISOs, CSOs, Security VPs, and Directors in a leadership role.  Topics will include:

  • Properly preparing for an inevitable multi-cloud future
  • Strategizing recovery plans and solutions from an organizational cyberattack
  • Emerging security capabilities and how leading organizations are managing the adoption process
  • Exploring new means to secure the mobile network
  • Understanding how emerging regulatory changes will impact global business operations
  • Building a proactive culture with regards to information security risk assessments
  • Attaining, training, and retaining talent through in-demand skillset development and mentoring opportunities

Our keynote addresses, fireside chats, and panel sessions, and interactive group discussions will give you the perspective and actionable takeaways that only a room of the best minds in Texas can provide.

We look forward to bringing together another fantastic audience in 2018, and to hosting you alongside our community of Fortune 500 CISO leaders hailing from the heart of Texas and beyond.

This event will feature insights from top executives, including:

If you'd like to recommend a speaker, please email Natasha Guzman at nguzman@argyleforum.com.

Speaker
Roy Bene VP Director of IT | Information Security Officer
Nexbank
View Bio »
Speaker
Mike Carter Head of Enterprise Applications
National Life Group
View Bio »
Speaker
Bill Daley Sr Director Enterprise Systems
Greystar Real Estate Partners
View Bio »
Speaker
Raena Dhuy Senior Solutions Architect, IAM
HID Global
View Bio »
Speaker
Tyrin Ford Director of Sales
Mimecast
View Bio »
Speaker
Stephen Frethem Director of Enablement
Varonis
View Bio »
Speaker
Tom Knight Regional Sales Director
Secureworks
View Bio »
Speaker
Santosh Krishnan Chief Product Officer
Lookout
View Bio »
Speaker
Kevin Mahoney Practice Director – Advanced Threat Protection
Fortinet
View Bio »
Speaker
William Malik Infrastructure Strategies VP
Trend Micro
View Bio »
Speaker
Ronald Mehring Vice President, Technology and Security
Texas Health Resources
View Bio »
Speaker
Phillip Merrick CEO
Fugue
View Bio »
Speaker
Scot Miller Chief Information Security Officer
Mr. Cooper
View Bio »
Speaker
Ray Murphy CISO
Navy Federal Credit Union
View Bio »
Speaker
Russell Okoth VP, IT Risk
Mr. Cooper
View Bio »
Speaker
Andy Ulrich Head of Security, Americas
Ericsson
View Bio »
Speaker
Zach Vinduska Vice President, IT Infrastructure and Security
ClubCorp
View Bio »
Speaker
Frosty Walker Chief Information Security Officer
Texas Education Agency
View Bio »
Speaker
Michael Waters Director, Control Risks & Cyber Security
Control Risks
View Bio »
Speaker
Doug Williams Director of Information Technology,
American Airlines Center
View Bio »
  • 8:00am - 9:00am Breakfast
  • 9:00am - 9:10am Opening Remarks featuring Argyle Host
    read more »

    Andy Ulrich
    Head of Security, Americas
    Ericsson

  • 9:10am - 9:15am Session Introduction featuring RSA
    read more »

    Brian Hahn
    Account Manager, Threat Detection and Incident Response
    RSA Security

  • 9:15am – 9:50am Keynote Presentation featuring Ericsson: "Duck Boats, Zika, and Zero Days: Is Safe Really Better Than Sorry?"
    read more »

    You're a psychologist -- act like one! (Note: you are probably not a psychologist.) Security is about how we handle risk, but it's a part of a bigger corporate risk landscape that considers other kinds of risk as well. We have to understand how people (like the ones who make up our boards and executive committees) THINK about risk. What's important, what do they fear, and why? Understanding risk psychology is a critical part of making sure security is considered.

    Andy Ulrich
    Head of Security, Americas
    Ericsson

  • 9:50am – 10:10am Fireside Chat featuring HID Global: "Open Sesame: Passwords are ancient and an open door for attackers"
    read more »

    No one uses “open sesame” to protect their treasures anymore, so why would you still use a password to protect your network? In addition to phishing attacks, we’ll cover other methods that adversaries use to gain access to your networks, cloud apps, and Active Directory user accounts – helping them to easily prey on the predictable users.

    Raena Dhuy
    Senior Sales Architect
    HID Global

    Michael Waters
    Director, Control Risks & Cyber Security
    Control Risks 

  • 10:10am – 10:30am Networking Break
  • 10:30am - 10:35am Session Introduction featuring Secureworks
    read more »

    Tom Knight
    Regional Sales Director
    Secureworks

  • 10:35am – 11:25am Panel Discussion: "Security Innovation: Unifying Proactive & Reactive Strategies"
    read more »

    Session topics include, but are not limited to:

    • What are some insider threats that are top of mind for you at your organization?
    • How do you pinpoint top weaknesses that increase risk within the company?
    • Discuss the importance of implementing both a proactive & reactive strategy within your organization?
    • How do you drive innovation while mitigating risk, ensuring continuous compliance & maintaining security?
    • How do you leverage tools like the cloud to promote efficiency while maintaining a secure digital environment?
    • What are primary threats to the business in the cloud, and what practices & controls are necessary for compliance?
    • What’s the best method to plan and prevent insider threats and cyberattacks?
    • How do you balance demands that are potential threats to corporate data within your organization

    Moderator: 

    Frosty Walker
    CISO
    Texas Education Agency

    Panelists: 

    Bill Daley
    Sr Director Enterprise Systems
    Greystar Real Estate Partners

    Stephen Frethem
    Director of Enablement
    Varonis

    Phillip Merrick
    CEO  
    Fugue

    Doug Williams
    Director of Information Technology
    American Airlines Center

  • 11:25am – 11:45am Thought Leadership Spotlight featuring Trend Micro: "Protecting Against a Cyberphysical Attack”
    read more »

    The Internet of Things is pervasive and increasingly intertwined with conventional IT. But IoT has its roots in Operational Technology, now nearly 50 years old. This presentation will discuss the attack surfaces Industrial Control Systems (IoT and its predecessors) have, and how to protect against attacks against this hybrid, new model of information-bearing technologies. With examples from health care, port and maritime, and electric power distribution, this talk will show good practices to manage risk. It addresses possible regulations, and closes with a model architecture for secure IT and OT.

    William Malik
    Infrastructure Strategies VP
    Trend Micro

  • 11:45am – 12:05pm Networking Break
  • 12:05pm – 12:50pm Panel Discussion: "Redefining Cyber Resilience for Email"
    read more »

    Session topics include, but are not limited to:

    • Does your organization have a back-up plan if your email system goes down from cyber-attacks, human error or technical failure?
    • How is your organization tracking outages and ensuring that you engage your vendors with the right language in the contract to cover your organization?
    • If a system outage occurs, what are some best practices to respond in the most efficient way from a technical perspective?
    • Who within my organization do you need to brief prior to, during and after an outage occurs?

    Moderator: 

    Ronald Mehring
    Vice President, Technology and Security
    Texas Health Resources

    Panelists: 

    Mike Carter
    Head of Enterprise Applications  
    National Life Group

    Tyrin Ford
    Director of Sales
    Mimecast

    Andy Ulrich
    Head of Security, Americas
    Ericsson

  • 12:50pm – 1:10pm Thought Leadership Spotlight featuring Lookout: "Why Phishing is Both Different and More Problematic on Mobile"
    read more »

    The traditional corporate perimeter is evaporating as the enterprise continues its fundamental shift to a mobile-enabled workplace. Now, all endpoints, but particularly mobile devices, are outside the firewall and freely accessing not just enterprise apps and SaaS, but also personal services like social media and email. In this new world, attackers take advantage of the blending of personal and enterprise accounts and the vulnerability of devices outside the firewall to gain access to corporate data and credentials via new vectors for phishing attacks, including SMS and messaging platforms like WhatsApp, Facebook Messenger, etc.

    Santosh Krishnan
    Chief Product Officer
    Lookout

  • 1:10pm – 2:10pm Lunch
  • 2:10pm – 2:55pm Panel Discussion: "Hacking the Boardroom"
    read more »

    Session topics include, but are not limited to:

    • Top emerging risks stemming from the Cloud
    • Methods to proactively understand and manage threats/risks in real time in the Cloud
    • Enabling efficiency and productivity through reliable security best-practices
    • Compellingly communicating security concepts to the executive team
    • Best practices for cross department collaboration and education
    • What does it mean when we claim the internet has been “weaponized”
    • What are your top 3 predictions for what we should guard against?
    • Should I really be concerned about nation state sponsored cyber-attacks?
    • It seems cyber-attacks are increasing in frequency, but also in the massive damage they cause. It seems we’re losing the battle. Comments?
    • What are the most significant areas for cyber-security vendors to protect?

    Moderator: 

    Bill Daley
    Sr Director Enterprise Systems
    Greystar Real Estate Partners

    Panelists: 

    Kevin Mahoney
    Practice Director – Advanced Threat Protection
    Fortinet

    Scot Miller
    CISO
    Mr. Cooper

    Ray Murphy
    CISO
    Navy Federal Credit Union

    Russell Okoth
    VP, IT Risk
    Mr. Cooper

  • 2:55pm – 3:10pm Networking Break
  • 3:10pm – 3:45pm Keynote Presentation featuring Texas Health Resources: "Applying Risk Management Stratification and Epidemiological Principles within the Information Security Practice"
    read more »

    During this presentation Ron will be discussing techniques Texas Health is using to continuously manage information security risk. These techniques have helped us better communicate risk, manage risk tolerance and prioritize risk treatment.

    Ronald Mehring
    Vice President, Technology and Security
    Texas Health Resources

  • 3:45pm – 4:20pm Keynote Presentation featuring ClubCorp: “Tips on how to Win, or at least lose gracefully at the CISO role”
    read more »

    Security and compliance leadership is not an easy job.  Let’s face it, this leadership area has more challenges then most.  Executives seeing security as a road block to the mission, funding requests with no ROI, far from any profit center, and with a looming threat of a breech.  It’s amazing anyone would sign up for this.  But you have.  So, let’s talk about how to win despite the odds.

    In his key note, Zach Vinduska will have an honest conversation about looking at one’s self, the security culture pitfalls, and ways to produce healthy change in organizations.  He will explore lessons learned the hard way in hopes that maybe you can gain the win and avoid the pain.

    Zach Vinduska
    Vice President, IT Infrastructure and Security
    ClubCorp

  • 4:20pm – 4:30pm Closing Remarks featuring Argyle Host
  • 4:30pm – 5:30pm Closing Reception
  • *Schedule and timing is subject to change

What will be discussed? Explore security hot topics and challenge areas such as:

Security and innovation

Evaluate what technologies will have the biggest impact on the business world in the year ahead, and reflect on the reality of IT security becoming a business enabler. Our speakers will discuss:

  • Tracking the improvement of wireless networks
  • Choosing the best devices to support internally
  • Cutting costs through cloud technology
  • Taking stock of risks imposed by the mobile channel

Building an Effective Security Strategy

Review the major changes the field of IT has experienced over the past few years, the driving forces behind them, and the barriers they present. Get briefed on:

  • Driving long-term business initiatives
  • Overcoming barriers to a solid mobile strategy
  • Aligning risk management with business priorities
  • Developing a successful incident response plan for security incidents

The Evolution of IT

Discuss the importance of having accurate information on customers and prospects in real time, and how the rise of apps, data management tools and practices like hosting have added made the business of protecting enterprise information more complex. Gain insight into:

  • Enriching the customer experience with real-time data
  • Staying alert to prevent theft of data and/or funds
  • Overcoming barriers to implementing multichannel integration
  • Evaluating security risks mobile devices present and how to respond

Transparency and security

Define how the concepts of identity and access management are building and shaping new security perimeters, and hear how successful organizations are managing identities in applications. Learn how top CIOs and CISOs are:

  • Lowering costs and risks related to security
  • Achieving success through data management
  • Defining the key benefits of SSO
  • Protecting enterprise data across the organization

Still have questions? We have answers.

I want to attend, but what if I'm unsure of my schedule and need to cancel my participation?

Just let us know. We understand that schedules change! However, we always have a waiting list for this event, and if you don't cancel, we will assume you are still attending and your spot will go unused. If you must, cancel at least 48 hours prior to the event to make room for others!

What if I can't be OOO for a whole day, or need to come late?

We have wifi and private rooms available for attendees to take calls and spend some quiet time on emails, as well as access to printing. Have a morning meeting you can't miss? No problem. This event was designed for busy executives - we get it.

I'd like to bring some colleagues. Do I need to register them online?

Events are more fun with friends, and we'd be happy to host your team. You can have them register online, or send us their names, titles and email addresses and we will take care of it for you!

I don't see the event venue listed. Where will the meeting be held?

To maintain exclusivity, we don't release the venue address until the registration process has been completed. All logistical details will be shared once you have requested a pass and been approved.

The "2018 Chief Information Security Officer (CISO) Leadership Forum: Fall Event" in Dallas is proudly sponsored by:

About Image
  • "Not only are the speakers relevant and experts in their fields, but I was able to make some great connections at the meetings as well."

    The Chief Technology Officer at PC Richard and Son on the quality of past Argyle CIO Forums.

  • "Argyle's meetings are well balanced in terms of panels and presentations and networking opportunities with local business leaders."

    A Head of Emerging Business and Technology at Ericsson on attending Argyle CIO events.

  • "The meetings that Argyle Executive Forum runs are truly enjoyable and well put together....I'm looking forward to the next forum."

    A VP of Information Systems at Garmin International on attending Argyle events.

Traveling for the event? Stay at one of our recommended hotels nearby:

Please note the below is the preferred hotel of Argyle Executive Forum. Please specify that you are part of the Argyle group when booking sleeping rooms in order to receive a discounted rate of $189 per night, taxes not included. For details on where the event will take place, please contact your Argyle relationship manager.

Venue

The Fairmont Dallas


1717 N Akard St.
Dallas, TX 75201
Telephone: (800) 441-1414
Website