2018 Chief Information Security Officer (CISO) Leadership Forum
Why You Should Attend!#ArgyleCISO
Argyle Executive Forum is bringing together leading InfoSec, IT, and Risk executives for our annual CISO Forum in New York City. Throughout a full day of content and networking, we will focus on the most pressing issues that InfoSec professionals are facing moving into 2018. With an agenda geared specifically towards leaders in InfoSec, IT and Risk, topics discussed will include:
- Properly preparing for an inevitable multi-cloud future - fully and securely embracing the cloud
- Strategizing recovery plans and solutions from an organizational cyberattack – transitioning from recovery to resilience
- Discovering emerging security capabilities and how leading organizations are managing the adoption process
- Exploring new ways to secure the mobile network, particularly when traditional security measures are no longer effective
- Understanding how emerging regulatory changes will impact global business operations, and how to best prepare
- Building a workforce for the future of InfoSec - attaining, training, and retaining talent through in-demand skillset development and mentoring opportunities
Our keynote presentations, fireside chats, panel sessions and networking breaks will encourage candid discussions with your peers focused on these topics and more. We look to hosting you alongside our community of Fortune 500 CISO leaders hailing from New York City and beyond!
Register to Attend
This event will feature insights from top executives, including:
If you'd like to recommend a speaker, please email Natasha Guzman at email@example.com.
Credit Suisse View Bio »
Internal Audit Technology, Project Management and Cyber Security Professional with over 17 years’ experience in financial services spanning public and private professional experience including Allianz Asset Management, Brown Brothers Harriman, Kohlberg Kravis Roberts and Deloitte with demonstrated value added insights to business and technology management on business, technology and cyber projects, applications and infrastructure
Varonis View Bio »
Sean Campbell joined Varonis Systems as a Systems Engineer in April 2013. He is based out of the New York metro area working with strategic enterprise accounts in a variety of verticals to manage and protect their unstructured data. Sean also leads a product SME team of 30+ other systems engineers located all around the globe. Prior to joining Varonis, Sean was a Security Analyst at Verisk Analytics in Jersey City, NJ. There he focused on security event logging, alerting, and penetration testing. His other past positions include a stint in professional baseball as a starting pitcher for the Newark Bears of Canadian American League. He holds a Bachelor’s Degree in Information Technology and Informatics from Rutgers University where he regularly returns to guest lecture a course on Information Security.
Outside of work Sean enjoys playing golf and is also a College Football Instant Replay Tech for the Big Ten Conference. He resides in Union County, New Jersey with his wife Brigitte and bulldog, Banks.
Aircastle Advisor LLC View Bio »
Bill Duenges serves as the Vice President of Infrastructure and Security for Aircastle Advisors LLC. In this role, Bill is responsible for the company’s infrastructure as well as the Security Officer for the organization. Bill’s 18 years of experience includes disaster recovery/business continuity planning, security awareness training, compliance programs, network security and risk mitigation in addition to infrastructure and support.
Bill is a Certified Information Systems Security Professional(CISSP) and a Certified Cloud Security Professional(CCSP).
Hearst Corporation View Bio »
David is the head of Corporate Information Security and Risk for the Hearst Corporation (CISO). Hearst is one of the world's largest and most diversified media and data companies with Businesses in Magazines, Newspapers, Television/Broadcast, Business Media, and Ventures including A&E channels, ESPN and in Healthcare. He is helping Hearst innovate and lead into more Cloud computing and moving content to Digital capabilities leveraging the Hearst multiple media outlets in a fast, efficient and secure manner. Prior to Hearst, David was at Intuit where he led the CyberFraud strategy and managed areas in Security Operations, including Cloud with the many product/business groups such as TurboTax, Quicken, Mint, and QuickBooks. David also spent many years at Wells Fargo Bank, where he headed up all security for Wellsfargo.com, at the time the largest on-line banking site.
InteliSecure View Bio »
Matt Hughes serves as Director of Professional Services for InteliSecure. In this role, Matt leads a global team of expert consultants and engineers focused on modern critical asset protection and information security methodologies to include Data Loss Prevention (DLP), SIEM, data classification tools, and risk mitigation strategies. InteliSecure Professional Services work within appropriate data privacy parameters (such as GDPR) to protect the critical assets and intellectual property of our clients.
Prior to joining InteliSecure, and after a 21-year career in the US Air Force, Matt was president of Mercury Intelligence Systems, a high-end software engineering, systems engineering and data analysis firm that also provided professional services to the U.S. government. Earlier, as vice president at Paragon Dynamics, Inc., Matt oversaw intelligence operations where he led the engineering, development and analysis business units that provided software, engineering and analytics to the government.
Oracle View Bio »
Dan Koloski is a software industry expert with broad experience as both a technologist working on the IT side and as a management executive on the vendor side.
Dan is a Senior Director in Oracle's Systems and Applications Management group, which produces the Oracle Management Cloud Services and Oracle Enterprise Manager family of products.
Previously, Dan was CTO and Director of Strategy for the Web BU at Empirix, which he helped spin out and sell to Oracle in 2008. Dan is co-owner of the Maine small business STAGES, the Treasurer of PortFringe and President of the Stroudwater Village Association. Dan holds a B.A. from Yale University and an M.B.A. from Harvard Business School.
Anheuser-Busch InBev View Bio »
Benjamin Lavoie is the Global Head of Technology and Innovation for Anheuser-Busch Inbev, the world’s largest beverage company, where he is responsible for Digital Transformation of the Global Supply Organization which includes making a Supply Chain consisting of over 1,000 facilities across 126 countries real-time, connected and continuously optimizing. Ben is a certified Lean Six Sigma Master Black Belt, Agile Scrum Master, Project Management Professional, Design Thinking Facilitator and Data Scientist. Prior to these roles Ben was Sr. Director for Operations in North America and also lead the Global Implementation of Lean Six Sigma for Anheuser-Busch Inbev. Ben has a Bachelor’s Degree in Chemical & Biomedical Engineering, MBA in Operations Management and Finance from Boston University and an Executive MBA certificate from Washington University on Supply Chain Management.
Realogy Corporation View Bio »
Nashira W. Layade serves as SVP, CISO at Realogy Holdings Corporation where she is responsible for establishing and maintaining the enterprise vision, strategy, and programs necessary to ensure the adequate protection of Realogy’s digital information assets and technologies. Nashira’s background includes nearly 20 years’ experience as an executive and thought leader in Information Security, Data Privacy, and Risk Management for multinational Fortune 500 firms in the Financial Services, Media & Entertainment, and Real Estate industries.
Nashira holds a Masters of Science in Telecommunication Networks from the Polytechnic Institute of New York University. She obtained a BS in Computer Science from the University of Pennsylvania and is also a proud alumna of Phillips Academy Andover. Nashira is wholeheartedly committed to the advancement of youth, especially those in urban communities. She participates in various mentoring programs, is an active member of Sigma Gamma Rho Sorority, Inc., and serves on the Board of Directors of the Seven Roses Legacy Foundation, is a former member of the Board of Managers for the Jamaica YMCA of Greater New York, and is an Executive Advisory Board Member for Forcepoint.
Wolters Kluwer View Bio »
Speaker bio coming soon...
Zocdoc View Bio »
Speaker bio coming soon...
Trend Micro View Bio »
Bill helps clients achieve an effective information security posture spanning endpoints, networks, servers, cloud, and the Internet of Things. This involves technology, policy, and procedures, and impacts acquisition/development through deployment, operations, maintenance, and replacement or retirement.
During his four-decade IT career, Bill has worked as an application programmer with the John Hancock Insurance company; an OS developer, tester, and planner with IBM; a research director and manager at Gartner for the Information Security Strategies service and the Application Integration and Middleware service, and served as CTO of Waveset, an identity management vendor acquired by Sun. He ran his own consulting business providing information security, disaster recovery, identity management, and enterprise solution architecture services for clients including Motorola, AIG, and Silver Lake Partners. Bill has over 160 publications and has spoken at numerous events worldwide.
Bill attended MIT, majoring in Mathematics. He is a member of CT InfraGard and ISACA.
Brooks Brothers View Bio »
Phillip has been innovating with computers since 1981, taking a brief hiatus to earn his BA and MA in Jurisprudence from The Queen’s College, University of Oxford. Since 1995, he has worked on ERP implementations, large-scale infrastructure technology deployments and software development. Phillip is relentless in the pursuit of efficiency through automation, and is an evangelist for utilizing compute-capacity in the cloud. Through a career spanning biotech, healthcare, manufacturing and retail, with significant focus on information security, Phillip brings perspective to finding the sweet spot for securing new and emerging technologies.
Metropolitan Museum of Art View Bio »
Speaker bio coming soon...
Hershey Entertainment and Resorts View Bio »
James Sipe is the Head of IT Security and Compliance at Hershey Entertainment and Resorts. With almost 20 years of experience in IT Security, Audit and Data Compliance he has held leadership roles at some of the world’s largest public and private international companies across multiple industries ranging from manufacturing and leasing to entertainment/hospitality to high tech. Jim has also consulted in the public and private sector internationally both as an IT Security & Compliance and IT Audit subject matter expert but also for IT guidance for organizations undergoing business related IT transformation with emerging technologies. Outside of Information Technology he previously held public office in the State of Pennsylvania for 8 years.
Jim has broad experience in the IT Security and Complaisance space including disaster recovery/BCP, application and database security, legal, regulatory and compliance programs, cloud security architecture and design, telecommunications, network security, international data governance, endpoint protection and PEN testing as well as IT Governance, IT Risk Assessments, PCI and IT forensic investigations. He has spoken nationally on IT Security risks and it's link to emerging technology, most recently at the Institute of Internal Auditors General Audit Management (GAM) conference in Dallas, Texas.
Nielsen View Bio »
Speaker bio coming soon...
DDB View Bio »
John Whiting is the (CSO) Global Chief Security Officer of DDB World Wide, a large, global advertising network with 15,000 employees at several agencies around the world. John, is an established IT and Security executive with significant experience creating and implementing company critical initiatives in the disciplines of IT Operations, enterprise web infrastructures, agile software development, information security, security risk, business development, human capital development since 1994. A seasoned Cyber / InfoSec / Privacy executive with a comprehensive synergy of business acumen, enterprise technical, operational and security / control focused experience.
John Whiting, is an established IT and Security executive with significant experience creating and implementing company critical initiatives in the disciplines of IT Operations, enterprise web infrastructures, agile software development, information security, security risk, business development, human capital development since 1994. A seasoned IT executive with a comprehensive synergy of business acumen, enterprise technical, operational and security / control focused experience.
7:45am – 8:45am Breakfast
8:45am – 8:50am Argyle Opening Remarks
8:50am – 9:25am Keynote Presentation featuring Brooks Brothers: "Tackling ‘Impossible’ Security Problems"
read more »
Some challenges seem insurmountable, and stacked together appear ‘impossible’ to overcome. How are InfoSec teams to simultaneously address flaws like Spectre and Meltdown, tackle the floodgates caused by insecure IoT implementations, satisfy GDPR expectations and teach their co-workers to have a security mindset? In this address, Phillip lays out a framework for restoring sanity to the InfoSec team while making meaningful progress mitigating big risks.
CISO and Head of Infrastructure
9:25am – 9:45am Thought Leadership Spotlight featuring Oracle
read more »
Vice President, Product Management & Business Development
9:45am – 10:10am Networking Break
10:10am – 10:55am Panel Discussion: Addressing the Growing Cyber Insider Threats and Cyberattacks
read more »
Session topics will include but are not limited to:
- What are some insider threats that are top of mind for you at your organization?
- With the business moving at a rapid pace, and cyber threats constantly emerging, how are you able to balance the two?
- How do you pinpoint top weaknesses that increase risk within the company?
- What’s the best method to plan and prevent insider threats and cyberattacks?
- How do you balance demands that are potential threats to corporate data?
- What adequate processes does your organization have in place to combat a cyberattack
Metropolitan Museum of Art
Chief Information Security Officer (CISO)
Head of Automation and OT Cyber Security
Head of Information Security
Hershey Entertainment and Resorts
Senior Vice President, Global Security & Risk Leader
11:00am – 11:20am Thought Leadership Spotlight featuring HP Aruba
11:20am – 11:40am Networking Break
11:40am – 12:00pm Thought Leadership Spotlight featuring Lookout
12:00am – 12:45pm Panel Discussion: Taking a Holistic Approach to Data Loss Prevention
read more »
Session topics will include but are not limited to:
- How do you define which data assets are most crucial to the success & health of your organization?
- How do you prioritize what information to protect once identified within the organization?
- What processes do you have in place following a data breach?
- Are there ways to identify how exposed organizations are before utilizing a DLP program?
- With regards to Data Loss Prevention, how are you updating the training & building for the work force?
Vice President Infrastructure & Security
Vice President, Chief Information Security Officer
Professional and Platform Services
VP Global Information Security
Global Chief Information Security Officer
12:50pm – 1:10pm Thought Leadership Spotlight featuring Trend Micro
read more »
William J. Malik
VP Infrastructure Strategies
1:10pm – 2:10pm Lunch
2:10pm – 2:55pm Keynote featuring Allianz Asset Management: " Control Oversight Over the Third Party Service Providers"
read more »
There has been increasing industry use of third party providers for various reasons such as cost savings, better security framework, operational efficiency etc. With the increasing sophistication of cyber threats and emerging regulatory oversight, it is necessary to revisit the oversight process over these third party providers including practical approaches to reviewing the content of SSAE 16 reports to verify that third parties vendor control environments are reasonably adequate to protect the confidentiality, integrity and availability of corporate information assets.
Vice President, Technology Audit
2:55pm – 3:15pm Networking Break
3:15pm – 3:50pm Keynote TBD
3:50pm – 3:55pm Argyle Closing Remarks
3:55pm – 4:55pm Closing Reception
What will be discussed? Explore security hot topics and challenge areas such as:
Security and innovation
Evaluate what technologies will have the biggest impact on the business world in the year ahead, and reflect on the reality of IT security becoming a business enabler. Our speakers will discuss:
- Tracking the improvement of wireless networks
- Choosing the best devices to support internally
- Cutting costs through cloud technology
- Taking stock of risks imposed by the mobile channel
Building an Effective Security Strategy
Review the major changes the field of IT has experienced over the past few years, the driving forces behind them, and the barriers they present. Get briefed on:
- Driving long-term business initiatives
- Overcoming barriers to a solid mobile strategy
- Aligning risk management with business priorities
- Developing a successful incident response plan for security incidents
The Evolution of IT
Discuss the importance of having accurate information on customers and prospects in real time, and how the rise of apps, data management tools and practices like hosting have added made the business of protecting enterprise information more complex. Gain insight into:
- Enriching the customer experience with real-time data
- Staying alert to prevent theft of data and/or funds
- Overcoming barriers to implementing multichannel integration
- Evaluating security risks mobile devices present and how to respond
Transparency and security
Define how the concepts of identity and access management are building and shaping new security perimeters, and hear how successful organizations are managing identities in applications. Learn how top CIOs and CISOs are:
- Lowering costs and risks related to security
- Achieving success through data management
- Defining the key benefits of SSO
- Protecting enterprise data across the organization
Still have questions? We have answers.
I want to attend, but what if I'm unsure of my schedule and need to cancel my participation?
Just let us know. We understand that schedules
we always have a waiting list for this event,
and if you don't
cancel, we will assume you are still attending
and your spot will
go unused. If you must, cancel at least 48 hours
prior to the
event to make room for others!
What if I can't be OOO for a whole day, or need
to come late?
We have wifi and private rooms available for
attendees to take
calls and spend some quiet time on emails, as
well as access to
printing. Have a morning meeting you can't miss?
No problem. This
event was designed for busy executives - we get
I'd like to bring some colleagues. Do I need to
Events are more fun with friends, and we'd be happy to host your team. You can have them register online, or send us their names, titles and email addresses and we will take care of it for you! request a pass.
I don't see the event venue listed. Where will
the meeting be
To maintain exclusivity, we don't release the
venue address until
the registration process has been completed. All
details will be shared once you have requested a
pass and been
The "2018 Chief Information Security Officer (CISO) Leadership Forum" in New York is proudly sponsored by:
"Not only are the speakers relevant and experts in their fields, but I was able to make some great connections at the meetings as well."
The Chief Technology Officer at PC Richard and Son on the quality of past Argyle CIO Forums.
"Argyle's meetings are well balanced in terms of panels and presentations and networking opportunities with local business leaders."
A Head of Emerging Business and Technology at Ericsson on attending Argyle CIO events.
"The meetings that Argyle Executive Forum runs are truly enjoyable and well put together....I'm looking forward to the next forum."
A VP of Information Systems at Garmin International on attending Argyle events.
Request a Pass
DON'T MISS OUT! SECURE YOUR PLACE TODAY.
Register to Attend
Reserve a complimentary ticket
*EXECUTIVES AT THE DIRECTOR-LEVEL AND ABOVE FROM ORGANIZATIONS WITH OVER 100MM IN REVENUES ONLY
Traveling for the event? Stay at one of our
Please note the below is the preferred hotel of Argyle Executive Forum. Please specify that you are part of the Argyle group when booking sleeping rooms in order to receive a discounted rate of $199 per night, taxes not included. For details on where the event will take place, please contact your Argyle relationship manager.