2018 Chief Information Security Officer (CISO) Leadership Forum
Why You Should Attend!#ArgyleCISO
Join the nation’s leading information security executives for a day of cutting-edge content, insightful panel discussions and networking opportunities.
Explore the Emerging Trends and Capabilities Driving Industry
Threats evolve at blinding speed, becoming more difficult to detect and more damaging when they successfully infiltrate corporate defenses. It’s imperative for experts in the field to engage with thought leaders and colleagues to collectively evaluate and address new and developing risk.
Argyle Executive Forum is bringing together leaders in InfoSec to address the emerging threats, and the new capabilities and processes being deployed by the nation’s top InfoSec executives to address them.
Programming is designed for and by InfoSec executives and thought leaders in diverse industries. The agenda features presentations and panels on a range of topics including how to stay ahead of rapidly evolving cyber threats, maintaining GDPR compliance, recruiting top talent in information security, and the role of automation in combatting cyber threats.
You’ll participate in in-depth discussions on important topics at the cutting edge of Information Security, including:
- Emerging cyber threats and new security measures for mobile networks
- Managing adoption of increasingly sophisticated security capabilities
- Preparing for the multi-cloud future and the security measures required
- Crafting recovery plans and prevention measures for organizational cyberattacks
- Recruiting, hiring, and retaining the InfoSec workforce of the future
Join us for a day of cutting-edge content with networking opportunities throughout. Discuss the issues of today and tomorrow and grow your network with fellow InfoSec executives.
This event will feature insights from top executives, including:
If you'd like to recommend a speaker, please email Natasha Guzman at email@example.com.
Los Angeles Department of Water and Power Energy Services View Bio »
David Alexander is the Chief Information Security Officer at Los Angeles Department of Water and Power, the nation’s largest municipal utility, where he continues to evolve a comprehensive Information Security Program. With over 20 years of IT and power operations experience, Mr. Alexander has levied his extensive technical and business operation experience to apply sound IT Security practices while meeting the demanding business requirements of the power industry. He is also responsible for the development and coordination of LADWP’s strategic and tactical IT security planning initiatives to reduce risks, respond to incidents, and limit exposure to liability that may result in financial and image loss to the utility.
Darktrace View Bio »
Parker Ashley is a Director at Darktrace, the world’s leading AI company for cyber defense. With an extensive background in science, data analytics, and solutions software, he specializes in next-gen cyber technology, working alongside executives and security teams to help them defend their business networks. Parker has helped companies of all sizes and in all industries, including some of the world's largest healthcare and financial firms, deploy the Enterprise Immune System, the only AI technology capable of detecting and autonomously responding to early-stage cyber-threats. Leading a team from the Darktrace's San Francisco HQ, and now in Los Angeles, Parker has helped the company experience a 3x increase in US customers in the 3+ years he has been with Darktrace. Parker attended USC and is based out of Darktrace’s Los Angeles office.
Thales e-Security View Bio »
Brad Beutlich, Vice President at Thales eSecurity, is an information security professional who has worked with numerous US based companies over the past 20 years, providing security solutions ranging from end-point, to data security. The last 10 years he has worked for Thales eSecurity providing security solutions that protect customer data, financial transactions and IoT device manufacturing. Brad holds a BS in Electrical Engineering Technology from Bradley University, and is an award-winning writer and speaker on numerous security topics. His passion as a historian is on brass-era (pre 1913) automobiles, of which he owns a 120-year-old car that runs on steam. As an avid skier, he hits the slopes on the weekends when possible. Brad resides with his wife and three children in Southern California.
Trend Micro View Bio »
Eduardo E. Cabrera is a trusted advisor and a proven cybersecurity leader. He is responsible for analyzing emerging cybersecurity threats to develop innovative and resilient enterprise risk management strategies for Fortune 500 clients and strategic partners. Before joining Trend Micro, he was a 20-year veteran of the United States Secret Service with experience leading information security, cyber investigative, and protective programs in support of the Secret Service integrated mission of protecting the nation’s critical infrastructure and its leaders.
Recently, he served as the Secret Service CISO where he was responsible for establishing and maintaining a global information security and data privacy program to protect Secret Service data information assets and systems. He led a team of Information System Security Officers and Compliance Specialists to develop and deploy continuous risk assessment and mitigation programs and policies critical to protecting the Secret Service enterprise.
Mr. Cabrera started his career in the Secret Service in Miami, Florida where he worked on and led major cyber crime investigations against criminal groups that targeted financial and retail sectors. He moved on to Washington D.C. to proudly serve on the Presidential Protective Division for President George W. Bush and then transitioned to the Secret Service Criminal Investigative Division. There he led cyber forensic operations in support of Secret Service large-scale data breach investigations and served as the Secret Service Advisor to the National Cybersecurity & Communications Integration Center (NCCIC). At the NCCIC, he was responsible for identifying, analyzing, and sharing malicious data breach indicators derived from active Secret Service investigations and worked closely with Department of Treasury, the Financial Services Sector Coordinating Council (FSSCC), and the Financial Services Information Sharing and Analysis Center (FS-ISAC) to create public/private threat intelligence sharing strategies and programs to combat data breaches targeting the financial sector.
He is a guest lecturer at New York University Polytechnic Institute, Computer Science and Engineering Department and was a contributing subject matter expert on law enforcement; cyber security strategy and policy; and computer forensics and network intrusion incident response for the 2014 Risk and Responsibility in a Hyperconnected World; 2012 Homeland Security Advisory Council Task Force on Cyber Skills Report; and 2012 Insider Threat Study: Illicit Cyber Activity Involving Fraud in the U.S. Financial Services Sector. He is a Certified Information Systems Security Professional (CISSP) and a Certified Information Systems Auditor (CISA).
Stanford Children’s Health View Bio »
Mr. Auston Davis is the CISO at Stanford Children’s Health. He also services as an Adjunct Professor teaching Cryptology and Computer Security at San Jose state University. He is an award-winning leader and information security professional commanding more than 19 years of experience. He has worked in multiple industries to include: government, military, healthcare, high tech and higher education sectors to include 7 years at Stanford University. Auston is a proud 23-year veteran of the United States Air Force and Air Force Reserves. He retired in December 2013 after serving for several years as a Special Agent-in-Charge with the United States Air Force Office of Special Investigations (AFOSI) specializing in Counter-Intelligence and Computer-Crime Investigations as an Individualized Mobilized Augmentee (IMA) reservist.
MicroStrategy View Bio »
Mr. Eansor is an accomplished, results-driven professional with over 20 years of experience helping clients achieve their goals leveraging enterprise software to enable success. Greg's proven track-record includes software solutions ranging from SaaS and Cloud-based solutions, ERP, Analytics, Content Management, Supply Chain Management, CRM, OVP, DAM and IP Management. His current endeavors include leading MicroStrategy's Southern California regional client sales and success teams. His group is responsible for helping existing clients achieve the most from their MicroStrategy analytics solutions, as well as identifying opportunities to grow the South West regions client base.
Farmers Insurance View Bio »
Mikhael is Director of Information Security & Risk Management for Farmers Insurance. He is also an Advisor for Safe-T Executive Advisory Committee. In the past decade he has taken on number of information security roles including engineering, teaching, writing, research and management. His sector experience includes insurance, defense, healthcare, nonprofit/education and technology/Internet, seeing first-hand the variance in information security culture and program maturity. Felker received his M.S. in information security policy and management from Carnegie Mellon University and B.S. in computer science from UCLA. He has over 50+ publications and has been a speaker for RSAC, CSA, ISSA, ISACA, ISC2 and OWASP events.
Los Angeles County Department of Public Health View Bio »
Richard Greenberg, CISSP is the Information Security Officer for the Los Angeles County Department of Public Health. Previous positions include Director of Surveillance and Information Systems, Chief of Security Operations, Director of IT, and Project Manager for various companies/agencies.
Richard brings over 25 years of management experience and has been a strategic and thought leader in IT and Information Security for both the private and public sectors. His Project Management, Security Management and Operations, and Policy and Compliance experience has helped shape his broad perspective on creating and implementing Information Security Programs in organizations.
Richard, a Fellow at ISSA, was recently honored as an Honor Roll recipient by ISSA International. He has been selected as a finalist for both the (ISC)2 Americas Information Security Leadership Award in the Senior Information Security Professional category and the Los Angeles Business Journal CIO of the Year in Security.
Richard is the Chair of the Annual Healthcare Security and Privacy Forum in LA. He has been a Chair of several ISSA LA Security Summits, and all five of the AppSec California conferences. He has also served as the OWASP AppSec USA Conference Co-Chair and has been a member of the ISSA International Conference Committee.
Richard is the President of the ISSA and OWASP Los Angeles Chapters. He has worked diligently to bring together the various Southern California IT and InfoSec organizations to enhance their collaboration efforts, to help reach new IT and InfoSec professionals. He and his chapter have been a recipient of the OWASP Chapter of the year.
Richard has been a published author and has spoken on Information Security individually and on panels, most recently at Shellcon in September and at the ISSA CISO Forum in May. He is also a Security Evangelist, helping to spread the word about secure application development and general security awareness.
ICU Medical, Inc. View Bio »
Speaker bio coming soon...
Entertainment Partners View Bio »
Speaker bio coming soon...
Korn Ferry View Bio »
Michael Miora currently serves as Sr. Vice President and Chief Information Security Officer (CISO) of Korn Ferry, a global public company with over 150 offices in 100 countries. At Korn Ferry, he has led in the acquisition and implementation of new and modern technologies to harden the environment, detect possible intrusions and remediate possible intrusions quickly and effectively.
Over the past 30 years, Miora has designed secure, survivable and highly robust systems for Industry and Government, including our security agencies many of our largest corporations. Certified as one of the original CISSP-ISSMP professionals, Miora also gained the prestigious designation as a Fellow of the Business Continuity Institute (FBCI), a limited and exclusive honor.
Michael was the founder of InfoSec Labs, a specialty boutique security consulting firm at the forefront of security leadership and has also served as the director of the security consulting organization for the National Computer Security Association (NCSA). He is also a contributor to the Computer Security Handbook, by Wiley & Sons and serves as Adjunct Professor at Norwich University.
ICU Medical View Bio »
With over two decades of information security and technology experience, Doug Murray joined ICU Medical in August 2018 to lead and mature the information security, IT quality assurance and IT audit programs. As the Chief Information Security Officer and Director of IT GRC, he is responsible for ICU Medical’s global information assurance programs.
Doug’s information security and technology career spans multiple industries including aerospace, automotive, financial/banking, insurance, health care, real estate and telecommunications/power utilities. Besides his extensive experience in information security, his background also includes IT governance, risk and compliance; information systems audit; systems development, network administration/engineering, IT operations and IT infrastructure.
Doug has a Bachelor’s of Science degree in Business/Management Information Systems from Pepperdine University and holds the following designations: CISSP, CISA, CISM, CRISC.
Ivanti View Bio »
Speaker bio coming soon...
StubHub View Bio »
Hanna is a seasoned information technology & security leader with over 20 years of experience. She brings a passion for building and coaching cross-functional teams to superior levels, and for implementing strategic solutions that build trust, enable resilience and incorporate core principles that drive transformation and simplify business processes. She believes that building the right security program is not accomplished through force, but through advisement and education that is focused on strategic leadership, organizational transformation, and balancing the best security practices with business needs.
Hanna is currently leading the global security operations at StubHub. She has been described by her coworkers as a “force of nature”. She is extremely passionate about building high-performance teams that help the business accomplish critical tasks. Hanna helps senior executives harness the power of technology by embedding security into the corporate DNA to effectively manage technology risks.
ServiceNow View Bio »
Experience: 2.5 yrs at ServiceNow, previous experience includes running the vulnerability management program at FEMA, technical team lead conducting vulnerability and threat assessments for the U.S. Gov. Intelligence Community, Federal Consultant for cyber security compliance
Expertise: Vulnerability Management and Security Incident Response
Achievements: Within 6 weeks, reducing customer’s vulnerability response time by 60%; processing, prioritizing, and assigning a majority of vulnerabilities within 24hrs of implementation; elevated CMDB maturity by automatically mapping IP’s to configuration items via scan data from vulnerability scans
Current Projects: Driving process efficiencies. Automating enterprise vulnerability and security incident response to decrease average time to identify, remediate, contain, and eradicate vulnerabilities and threats
InteliSecure View Bio »
As Chief Technology Officer, Jeremy leads a team that investigates and ensures the integrity and functionality of every custom solution designed for its clients. Jeremy also focuses on evaluating potential new offerings for InteliSecure customers, developing solutions that address the new and ever-changing security risks to the enterprise.
He previously served as director of sales engineering at InteliSecure where he was responsible for building and leading the solution engineering team to support InteliSecure’s robust portfolio of Managed Security Services, Consulting Services, Technical Services and Product Solutions.
Prior to joining InteliSecure, Jeremy served as a field service technician and maintenance mechanic team lead with General Dynamics. With experience in private industry and as a field service technician/armor crewmember with the U.S. Army, Jeremy brings a unique perspective to today’s evolving security threats.
Jeremy holds a Bachelor of Science in Information Technology from Colorado State University.
Molina Healthcare View Bio »
Timothy C. Zevnik, CIPP/US, CIPP/G, is the Vice President Compliance & Corporate Privacy Official for Molina Healthcare Inc., a national managed care organization based in Long Beach, California. He joined the company in 2001 and served as the HIPAA program manager until he was promoted to the director position in 2006. In 2003, he was named the company’s first privacy official, a role he still retains. Mr. Zevnik has over 20 years of experience in the health care industry. Prior to his work at Molina he held several management and analyst positions at PacifiCare of California, and was an analyst at Safeguard Health Enterprises. He specialized in regulatory compliance and ensured that company operations complied with state and federal laws in a cost-effective manner. Mr. Zevnik earned his Bachelor of Arts from the University of California Santa Cruz and earned his Master of Business Administration from the University of California Irvine. Mr. Zevnik is a member of the International Association of Privacy Professionals and is a Certified Information Privacy Professional.
8:00am - 9:00am Breakfast
9:00am – 9:10am Opening Remarks featuring Argyle Host
read more »
Chief Information Security Officer
Stanford Children’s Health
9:10am – 9:15am Session Introduction featuring MicroStrategy
read more »
Director Account Success & Acquisition
9:15am – 9:50am Keynote Presentation: "Automated Response in a resource strapped World"
read more »
This presentation will focus on discussing practical use cases wherein automation/scripting has been implemented to respond to realized and potential threats.
Chief Information Security Officer
Stanford Children’s Health
9:50am – 10:10am Thought Leadership Spotlight featuring ServiceNow: "Security Automation and Orchestration: The CISO’s Secret Weapon to Excel at the Ordinary"
read more »
While it’s fun to explore the latest cutting-edge technology for protecting and detecting threats, the breaches of the last several years have shown us that security teams are still overwhelmed with ordinary work. Keeping up with basic hygiene, such as patching vulnerabilities, is still hard. Connecting security and IT processes, as well as best-of-breed security products, through automation and orchestration is how to get your security teams to excel at the ordinary. This can help your teams find the most important things to work on first, eliminate mundane work, and retain your top security talent. This presentation will discuss how organizations can use automation and orchestration in a risk-free way to dramatically improve security response programs.
Senior Security and Risk Practice Advisor
10:10am – 10:35am Networking Break
read more »
10:35am – 10:40am Session Introduction featuring Ivanti
read more »
10:40am – 11:30am Panel Discussion: "Hacking the Boardroom"
read more »
Session topics include, but are not limited to:
- What are some vulnerabilities posed by recent business developments, including migration to the Cloud and adoption of IoT devices?
- Discuss some methods to proactively manage threats and risks in real time across the modern digital business.
- What are some policies and security best-practices that can enable efficiency and productivity across companies?
- Describe some challenges and tips for compellingly communicating security concepts to the executive team and board.
- What are some predictions for the types of threats and attacks that will pose the largest risk to companies in the coming years?
- What would you say is the most significant ways that cyber-security vendors need to be prepared to protect businesses and support security team?
Director, Information Security & Risk Management
Los Angeles Department of Water and Power Energy Services
VP, Sales Western US and Canada
Global CISO and Head of IT GRC
11:30am – 11:50am Thought Leadership Spotlight featuring Trend Micro: "Reducing Cyber Risk of Intelligent Transportation Systems"
read more »
In today’s connected world of smart devices and smart cities, Intelligent Transportation Systems (ITS) are still in their infancy. By identifying and addressing the cybersecurity risks faced by ITS’ in the early development stages, we have the opportunity to influence both legislative and technological developments, which could affect our lives and businesses. This presentation will reveal the results of a timely research project and recommend guidelines that could be used in protecting the ITS ecosystem against cyberattacks – including both technology discussions for IT security teams and policy discussions for key decision-makers.
Chief Cybersecurity Officer
11:50am – 12:10pm Networking Break
12:10pm – 12:55pm Panel Discussion: “Taking a Holistic Approach to Data Loss Prevention”
read more »
Session topics include, but are not limited to:
- How do you define which data assets are most crucial to the success & health of your organization?
- How do you prioritize what information to protect once identified within the organization?
- What processes do you have in place following a data breach?
- Are there ways to identify how exposed organizations are before utilizing a DLP program?
- With regards to Data Loss Prevention, how are you updating the training & building for the work force?
Senior Manager-Information Security
ICU Medical, Inc.
SVP & CISO
Sr. VP & CISO
Chief Technology Officer
VP Compliance & Corporate Privacy Official
12:55pm – 1:55pm Lunch
1:55pm - 2:30pm Keynote Presentation: "The Non-Digital Side of Security Transformation"
read more »
With all the attention being placed on digital transformation in security, organizations can’t lose sight of the most important element in any business successful transformation: the human asset. To adequately mitigate risks to their data and infrastructure, companies must build situational awareness, enhance response speed and increase efficiency, all while reducing the overall cost of prevention and response. This can only be accomplished by breaking the traditional model of segregating security teams from others, and embedding security functions into all operational teams. This shift can be disruptive to the company initially, as cultural and organizational changes must occur, but ultimately leads to a safer and more efficient enterprise.
Head of Global Security Operations
2:30pm – 2:45pm Networking Break
2:45pm - 3:20pm Roundtable Discussion: "SecDevOps It’s Not a “Unicorn”"
read more »
Join us for an interactive discussion as we hear from a seasoned hands on CISO with real world best practices for integrating functional and non-functional requirements into the DevOps workflow. After a brief presentation, get involved as the audience participates in roundtable discussions and presents their own experiences and solutions.
Senior Vice President and Chief Information Security Officer
3:20pm - 3:55pm Keynote Presentation: "Breaches Are Everywhere. What’s a Good Security Leader to Do?!"
read more »
Healthcare organizations have historically been behind in having a solid Information Security Program. In the not too distant past we have heard the mantra from the Boardroom, "we are not a target, we are not a bank or financial institution!" Those days are gone. All personal records have become the targets for cyber-criminals. Phishing attacks are proliferating and going after our workforce, Ransomware has taken several victims. Breaches are on the news seemingly weekly, as organizations are struggling to secure their data.
In this talk, I will share strategies to combat the rise of cybercrime, and how to make your networks more secure. I will discuss administrative, technical, and physical security controls. Have you initiated a balanced Security Awareness Program? Are you regularly running scans of both your network and your applications? Are you monitoring your network to detect unusual activity? What about when that dreaded intrusion into your network occurs? Do you know what to do?
Best practices cannot be "best" unless they employ best privacy and security practices. Come learn if you are doing this and ensure that you indeed protect your confidential information. Don't allow your company/organization to become the next victim of a breach.
Information Security Officer
Los Angeles County Department of Public Health
3:55pm - 4:00pm Closing Remarks featuring Argyle Host
4:00pm - 5:00pm Closing Reception
*Schedule and timing is subject to change
What will be discussed? Explore security hot topics and challenge areas such as:
Discuss the ever-changing security landscape, cloud-first enterprise initiatives, and the IT tools at your disposal to protect against and prepare for cyber threats. Speaker topics include:
- Enhancing the security of mobile networks where traditional methods no longer work
- Fully and securely embracing the cloud as the transition to multi-cloud becomes a reality
- The newest security capabilities and technologies and how companies are adopting
Discover how others are mitigating evolving cyberthreats in their organizations, using automation, AI, and preemptive planning to address potential issues. Speaker topics include:
- Developing a clearly defined incidence response plan, and what to do post attack
- Aligning risk management with business priorities across all sectors of your company
- How to identify and prepare for new potential cyber threats and their impact on your business
Information security is now a global concern, with new regulations in Europe and beyond requiring a shift in policy. Discuss the impact of changes like GDPR to large companies with global reach. Speaker topics include:
- The impact of recent regulatory changes in Europe on InfoSec functions
- Emerging regulations domestically and abroad and how to prepare
- The opportunity to transform elements of your organization through compliance
Still have questions? We have answers.
I want to attend, but what if I'm unsure of my schedule and need to cancel my participation?
Just let us know. We understand that schedules
we always have a waiting list for this event,
and if you don't
cancel, we will assume you are still attending
and your spot will
go unused. If you must, cancel at least 48 hours
prior to the
event to make room for others!
What if I can't be OOO for a whole day, or need
to come late?
We have wifi and private rooms available for
attendees to take
calls and spend some quiet time on emails, as
well as access to
printing. Have a morning meeting you can't miss?
No problem. This
event was designed for busy executives - we get
I'd like to bring some colleagues. Do I need to
Events are more fun with friends, and we'd be happy to host your team. You can have them register online, or send us their names, titles and email addresses and we will take care of it for you! request a pass.
I don't see the event venue listed. Where will
the meeting be
To maintain exclusivity, we don't release the
venue address until
the registration process has been completed. All
details will be shared once you have requested a
pass and been
The "2018 Chief Information Security Officer (CISO) Leadership Forum" in Los Angeles is proudly sponsored by:
"Not only are the speakers relevant and experts in their fields, but I was able to make some great connections at the meetings as well."
The Chief Technology Officer at PC Richard and Son on the quality of past Argyle CIO Forums.
"Argyle's meetings are well balanced in terms of panels and presentations and networking opportunities with local business leaders."
A Head of Emerging Business and Technology at Ericsson on attending Argyle CIO events.
"The meetings that Argyle Executive Forum runs are truly enjoyable and well put together....I'm looking forward to the next forum."
A VP of Information Systems at Garmin International on attending Argyle events.
Request a Pass
DON'T MISS OUT! SECURE YOUR PLACE TODAY.
Register to Attend
Reserve a complimentary ticket
*EXECUTIVES AT THE DIRECTOR-LEVEL AND ABOVE FROM ORGANIZATIONS WITH OVER 100MM IN REVENUES ONLY
Traveling for the event? Stay at one of our
Please note the below is the preferred hotel of Argyle Executive Forum. Please specify that you are part of the Argyle group when booking sleeping rooms in order to receive a 15% discount off the Best Available Rate per night. For details on where the event will take place, please contact your Argyle relationship manager.