2018 Chief Information Security Officer (CISO) Leadership Forum: Fall Event
Why You Should Attend!#ArgyleCISO
Argyle Forum is bringing together leading InfoSec, IT, and Risk executives for our annual CISO Summit in Dallas. Throughout a full day of content and networking, we will focus on the most pressing issues that InfoSec professionals are facing today, with an agenda geared specifically towards CISOs, CSOs, Security VPs, and Directors in a leadership role. Topics will include:
- Properly preparing for an inevitable multi-cloud future
- Strategizing recovery plans and solutions from an organizational cyberattack
- Emerging security capabilities and how leading organizations are managing the adoption process
- Exploring new means to secure the mobile network
- Understanding how emerging regulatory changes will impact global business operations
- Building a proactive culture with regards to information security risk assessments
- Attaining, training, and retaining talent through in-demand skillset development and mentoring opportunities
Our keynote addresses, fireside chats, and panel sessions, and interactive group discussions will give you the perspective and actionable takeaways that only a room of the best minds in Texas can provide.
We look forward to bringing together another fantastic audience in 2018, and to hosting you alongside our community of Fortune 500 CISO leaders hailing from the heart of Texas and beyond.
This event will feature insights from top executives, including:
If you'd like to recommend a speaker, please email Natasha Guzman at email@example.com.
Novartis View Bio »
Speaker bio coming soon...
Texas Health Resources View Bio »
Ron Mehring serves as the chief information security officer / director, information security for Texas Health Resources, one of the largest faith-based, nonprofit health care delivery systems in the United States. The system's primary service area includes 16 counties in north-central Texas, home to more than 6.2 million people.
At Texas health Resources, Ron leads IT GRC, security architecture, security operations, and the IT BC DR program. His current initiatives are focused on improving team performance, improving resiliency management, integrating a threat-management architecture that accounts for present and emerging threats, and maturing a technology risk management program that is aligned with the strategic goals of the organization.
Ron began his career in technology for the United States Marine Corps. After 21 years of military service, Ron retired from the Marine Corps and joined the Department of Veteran Affairs where he led Compliance Assessment teams within the newly formed Oversight & Compliance group. He also served as the Department of Veterans Affairs, Deputy Director for Network & Security Operations.
Ron holds an MBA in Risk Management from NYIT and is a Certified Information Systems Security Professional (CISSP).
HMS Employer Solutions View Bio »
Scot Miller, CISSP, CISM, is the Vice President and Chief Information Security Officer for Health Management Systems (HMS). He has presented on advances in Information Security and Technology Governance at consortiums in Florida, Texas, New York, Arizona, and Connecticut, and has been quoted in national magazines and other industry symposiums. Scot built a high performing Security Architecture team from the ground up, and this past year brought HMS’s Security Incident and Event Management program to a new level - in a project which also won him a CSO50 Award from a pool of national and international candidates for innovation and meaningful impact on a business. As a result of this program, HMS saw a decline of 300% in threat incidents year-over-year, among other positive impacts.
In 2015, the HMS Holdings Corp. Board of Directors selected Scot Miller, Senior Director of Security Architecture, as winner of the 2014 Galen D. Powers Award. Scot received multiple nominations, and his selection this year honors his unwavering commitment to serving HMS and its clients at the highest level of quality and ethics for the past five years. Scot was cited for his super cross-functional collaboration, his leadership and the Strategic Knowledge Map education series, together with his contributing roles as a member of the College Recruiting Team and Emergency Warden Team. His mentorship, knowledge-sharing, and experience with those throughout the corporation allows him to impact the organization beyond the bounds of title or role.
Scot’s team is responsible for defining, analyzing, and reducing risk as it relates to HMS’s infrastructure, business systems, and data security. Previous to his duty at the Irving, TX based Healthcare IT Services organization; he was the Head of Global IT Security for Alcon Laboratories, and Chief Security Architect at MassMutual Financial Group. Scot was also the VP and CTO for the CT chapter of ISSA during 2003 and 2004.
Mr. Cooper View Bio »
Russell Okoth is the Vice President of Information Security at Mr. Cooper (formerly Nationstar Mortgage). He currently leads, Threat & Vulnerability Management, Incident Response and Penetration Testing and Data Protection programs at Nationstar Mortgage.
Russell has 18 years experience in Cybersecurity, Risk and Compliance and has offered his expertise and skills to various industry sectors such as Retail, Telecommunication, Insurance, Government and Financial. He has served in the past in various capacities of Senior Technical Advisor, InfoSec Consultant, Global Security Engineer, and Security Compliance Manager at Check Point Software, Michael’s Stores, Verizon Business, AIG, Federal Home Loan Bank of Dallas and Mr. Cooper respectively.
Ericsson View Bio »
As a young child, Andy Ulrich discovered and was delighted by the fact that, by simply pushing buttons on a telephone keypad, he could nearly instantly cause a random person half a world away to stand up and walk to their telephone. (His parents were not amused.) Thus began a lifelong interest in telecommunications and IT. His nearly 30 years of experience includes a career in the US Army, culminating in a role as the operations chief of NATO’s information security organization, and his most recent previous job as the CISO for MoneyGram. He currently heads the security program for Ericsson in the Americas from Plano, TX.
Texas Education Agency View Bio »
Frosty Walker has been the Chief Information Security Officer for the Texas Education Agency (TEA) for over three years and orchestrates the Information Security posture for the agency thus protecting the valuable resources shared with the agency by the citizens of Texas. As CISO, Frosty serves as the primary policy-making official for agencies cybersecurity matters and provides vision, expertise and long range planning around information technology security to meet the Agencies strategic priorities. Frosty has developed measurable metrics to track Information Security Posture maturity for the Agency. His information security team with Frosty’ s leadership, develops enterprise plans, standards and guidelines to address new security technology issues, threats and trends. He serves on the Statewide Information Security Advisory Committee for the Texas Department of Information Resources providing direction for the State’s Cybersecurity program. Frosty also chairs the Data Security Advisory Committee for the Texas Education communities, helping identify common information security issues and collaborating resolutions.
Prior to joining TEA, Frosty served as the Information Security Officer for the Texas Secretary of State for 10 years. Prior to working in the public sector, he spent 20 plus years with AT&T. The last 10 years with AT&T was with their legal division providing litigation support and policy compliance on cybersecurity related issues.
Frosty and his wife spend much of their spare time traveling the country, promoting cowboy traditions and helping raise funds to restore and protect some of our great American treasures. He is a licensed gun fighter in Nevada and has appeared in several movies. Frosty received his Bachelor of Arts from Texas Tech University.
8:00am - 9:00am Breakfast
9:10am – 9:45am Keynote Presentation featuring Ericsson
read more »
Head of Security, Americas
9:45am – 10:05am Thought Leadership Spotlight featuring HID Global
10:05am – 10:30am Networking Break
10:30am – 11:20am Panel Discussion: Security Innovation: Unifying Proactive & Reactive Strategies
read more »
Session topics include, but are not limited to:
- What are some insider threats that are top of mind for you at your organization?
- How do you pinpoint top weaknesses that increase risk within the company?
- Discuss the importance of implementing both a proactive & reactive strategy within your organization?
- How do you drive innovation while mitigating risk, ensuring continuous compliance & maintaining security?
- How do you leverage tools like the cloud to promote efficiency while maintaining a secure digital environment?
- What are primary threats to the business in the cloud, and what practices & controls are necessary for compliance?
- What’s the best method to plan and prevent insider threats and cyberattacks?
- How do you balance demands that are potential threats to corporate data within your organization
11:20am – 11:40am Thought Leadership Spotlight featuring Trend Micro
11:40am – 12:00pm Networking Break
12:00pm – 12:45pm Panel Discussion: Redefining Cyber Resilience for Email
read more »
Session topics include, but are not limited to:
- Does your organization have a back-up plan if your email system goes down from cyber-attacks, human error or technical failure?
- How is your organization tracking outages and ensuring that you engage your vendors with the right language in the contract to cover your organization?
- If a system outage occurs, what are some best practices to respond in the most efficient way from a technical perspective?
- Who within my organization do you need to brief prior to, during and after an outage occurs?
12:45pm – 1:05pm Thought Leadership Spotlight featuring Lookout
1:05pm – 2:05pm Lunch
2:05pm – 2:50pm Panel Discussion: Women in Information Security: Breaking the Digital Ceiling
read more »
Session topics include, but are not limited to:
- Describe your career journey and your personal experience in your previous and current role in the industry.
- In your experience, how have you seen women break down barriers in regards to challenges in your department and organization?
- If we understood and valued more of the right skills needed in today’s environment, would that naturally translate to more women in Infosec?
- How are you partnering with HR and other departments in efforts to bring in more women into InfoSec?
- What advice do you have for the audience to increase the number of women working and holding management positions in InfoSec?
2:50pm – 3:05pm Networking Break
3:05pm – 3:40pm Keynote Presentation TBA
3:40pm – 4:15pm Keynote Presentation TBA
4:15pm – 4:20pm Closing Remarks featuring Argyle Host
4:20pm – 5:20pm Closing Reception
What will be discussed? Explore security hot topics and challenge areas such as:
Security and innovation
Evaluate what technologies will have the biggest impact on the business world in the year ahead, and reflect on the reality of IT security becoming a business enabler. Our speakers will discuss:
- Tracking the improvement of wireless networks
- Choosing the best devices to support internally
- Cutting costs through cloud technology
- Taking stock of risks imposed by the mobile channel
Building an Effective Security Strategy
Review the major changes the field of IT has experienced over the past few years, the driving forces behind them, and the barriers they present. Get briefed on:
- Driving long-term business initiatives
- Overcoming barriers to a solid mobile strategy
- Aligning risk management with business priorities
- Developing a successful incident response plan for security incidents
The Evolution of IT
Discuss the importance of having accurate information on customers and prospects in real time, and how the rise of apps, data management tools and practices like hosting have added made the business of protecting enterprise information more complex. Gain insight into:
- Enriching the customer experience with real-time data
- Staying alert to prevent theft of data and/or funds
- Overcoming barriers to implementing multichannel integration
- Evaluating security risks mobile devices present and how to respond
Transparency and security
Define how the concepts of identity and access management are building and shaping new security perimeters, and hear how successful organizations are managing identities in applications. Learn how top CIOs and CISOs are:
- Lowering costs and risks related to security
- Achieving success through data management
- Defining the key benefits of SSO
- Protecting enterprise data across the organization
Still have questions? We have answers.
I want to attend, but what if I'm unsure of my schedule and need to cancel my participation?
Just let us know. We understand that schedules
we always have a waiting list for this event,
and if you don't
cancel, we will assume you are still attending
and your spot will
go unused. If you must, cancel at least 48 hours
prior to the
event to make room for others!
What if I can't be OOO for a whole day, or need
to come late?
We have wifi and private rooms available for
attendees to take
calls and spend some quiet time on emails, as
well as access to
printing. Have a morning meeting you can't miss?
No problem. This
event was designed for busy executives - we get
I'd like to bring some colleagues. Do I need to
Events are more fun with friends, and we'd be happy to host your team. You can have them register online, or send us their names, titles and email addresses and we will take care of it for you! request a pass.
I don't see the event venue listed. Where will
the meeting be
To maintain exclusivity, we don't release the
venue address until
the registration process has been completed. All
details will be shared once you have requested a
pass and been
The "2018 Chief Information Security Officer (CISO) Leadership Forum: Fall Event" in Dallas is proudly sponsored by:
"Not only are the speakers relevant and experts in their fields, but I was able to make some great connections at the meetings as well."
The Chief Technology Officer at PC Richard and Son on the quality of past Argyle CIO Forums.
"Argyle's meetings are well balanced in terms of panels and presentations and networking opportunities with local business leaders."
A Head of Emerging Business and Technology at Ericsson on attending Argyle CIO events.
"The meetings that Argyle Executive Forum runs are truly enjoyable and well put together....I'm looking forward to the next forum."
A VP of Information Systems at Garmin International on attending Argyle events.
Request a Pass
DON'T MISS OUT! SECURE YOUR PLACE TODAY.
Register to Attend
Reserve a complimentary ticket
*EXECUTIVES AT THE DIRECTOR-LEVEL AND ABOVE FROM ORGANIZATIONS WITH OVER 100MM IN REVENUES ONLY
Traveling for the event? Stay at one of our
Please note the below is the preferred hotel of Argyle Executive Forum. Please specify that you are part of the Argyle group when booking sleeping rooms in order to receive a discounted rate of $189 per night, taxes not included. For details on where the event will take place, please contact your Argyle relationship manager.