2018 Chief Information Security Officer (CISO) Leadership Forum
Why You Should Attend!#ArgyleCISO
Argyle Executive Forum is bringing together leading InfoSec, IT, and Risk executives for our annual CISO Forum in San Francisco. Throughout a full day of content and networking, we will focus on the most pressing issues that InfoSec professionals are facing moving into 2018. With an agenda geared specifically towards leaders in InfoSec, IT and Risk, topics discussed will include:
- Properly preparing for an inevitable multi-cloud future - fully and securely embracing the cloud
- Strategizing recovery plans and solutions from an organizational cyberattack – transitioning from recovery to resilience
- Discovering emerging security capabilities and how leading organizations are managing the adoption process
- Exploring new ways to secure the mobile network, particularly when traditional security measures are no longer effective
- Understanding how emerging regulatory changes will impact global business operations, and how to best prepare
- Building a workforce for the future of InfoSec - attaining, training, and retaining talent through in-demand skillset development and mentoring opportunities
Our keynote presentations, fireside chats, panel sessions and networking breaks will encourage candid discussions with your peers focused on these topics and more. We look to hosting you alongside our community of Fortune 500 CISO leaders hailing from San Francisco and beyond!
This event will feature insights from top executives, including:
If you'd like to recommend a speaker, please email Natasha Guzman at email@example.com.
Darktrace View Bio »
Eloy Avila has spent the last fourteen plus years in the software technology industry, most recently in cyber security at Imperva leading their global solutions engineering team. Prior to his time in the software industry, Eloy was involved in research and the building of ultra-efficient electric vehicles. Based out of San Francisco, Eloy works closely with the research and development team and oversees the strategic direction of Darktrace’s technology. Eloy holds a B.S. in Electrical Engineering from Stanford University, CA.
ebates View Bio »
Gopal Bhat is currently serving as the Vice President of Technology Operations and CISO at Ebates, a cashback shopping network helping its members to discover and experience brands in rewarding ways. Gopal has built and managed security, engineering and infrastructure teams at companies in the e-commerce, gaming and security space including AVG, Electronic Arts and Ebay prior to joining Ebates.
Trend Micro View Bio »
Eduardo E. Cabrera is a trusted advisor and a proven cybersecurity leader. He is responsible for analyzing emerging cybersecurity threats to develop innovative and resilient enterprise risk management strategies for Fortune 500 clients and strategic partners. Before joining Trend Micro, he was a 20-year veteran of the United States Secret Service with experience leading information security, cyber investigative, and protective programs in support of the Secret Service integrated mission of protecting the nation’s critical infrastructure and its leaders.
Recently, he served as the Secret Service CISO where he was responsible for establishing and maintaining a global information security and data privacy program to protect Secret Service data information assets and systems. He led a team of Information System Security Officers and Compliance Specialists to develop and deploy continuous risk assessment and mitigation programs and policies critical to protecting the Secret Service enterprise.
Mr. Cabrera started his career in the Secret Service in Miami, Florida where he worked on and led major cyber crime investigations against criminal groups that targeted financial and retail sectors. He moved on to Washington D.C. to proudly serve on the Presidential Protective Division for President George W. Bush and then transitioned to the Secret Service Criminal Investigative Division. There he led cyber forensic operations in support of Secret Service large-scale data breach investigations and served as the Secret Service Advisor to the National Cybersecurity & Communications Integration Center (NCCIC). At the NCCIC, he was responsible for identifying, analyzing, and sharing malicious data breach indicators derived from active Secret Service investigations and worked closely with Department of Treasury, the Financial Services Sector Coordinating Council (FSSCC), and the Financial Services Information Sharing and Analysis Center (FS-ISAC) to create public/private threat intelligence sharing strategies and programs to combat data breaches targeting the financial sector.
He is a guest lecturer at New York University Polytechnic Institute, Computer Science and Engineering Department and was a contributing subject matter expert on law enforcement; cyber security strategy and policy; and computer forensics and network intrusion incident response for the 2014 Risk and Responsibility in a Hyperconnected World; 2012 Homeland Security Advisory Council Task Force on Cyber Skills Report; and 2012 Insider Threat Study: Illicit Cyber Activity Involving Fraud in the U.S. Financial Services Sector. He is a Certified Information Systems Security Professional (CISSP) and a Certified Information Systems Auditor (CISA).
Stanford Children’s Health View Bio »
Mr. Auston Davis is the CISO at Stanford Children’s Health. He also services as an Adjunct Professor teaching Cryptology and Computer Security at San Jose state University. He is an award-winning leader and information security professional commanding more than 19 years of experience. He has worked in multiple industries to include: government, military, healthcare, high tech and higher education sectors to include 7 years at Stanford University. Auston is a proud 23-year veteran of the United States Air Force and Air Force Reserves. He retired in December 2013 after serving for several years as a Special Agent-in-Charge with the United States Air Force Office of Special Investigations (AFOSI) specializing in Counter-Intelligence and Computer-Crime Investigations as an Individualized Mobilized Augmentee (IMA) reservist.
ServiceNow View Bio »
Mark Dayson is a Senior Advisory Solutions Architect with the Security & Risk Solutions Consulting Practice at ServiceNow. Prior to joining ServiceNow, Mark served as both lead sales engineer and solutions consultant at Indeni, SF Bay Area-based tech-startup offering IT operations automation and network monitoring solutions. Prior to joining Indeni, he worked at RSA as a sales engineer and professional services consultant with a primary focus on RSA’s Archer GRC and IT Security Operations management solutions. Mark began his career as a lead embedded systems software engineer before moving into a project controls and management role for a government contractor under the NNSA and Department of Energy. He holds a master’s degree in Business Administration from the University of Phoenix and a bachelor’s degree in Computer Engineering from the University of Nevada - Las Vegas.
Stanford University View Bio »
Michael completed his undergraduate and graduate degrees in computer science and physics at MIT. While there, he founded an electronic medical records company and later served as CTO of the acquiring organization. Michael then devoted a year to teaching undergraduate and graduate computer science courses as a Visiting Instructor at Miami University in Ohio before relocating to the Bay Area, where he led the information security program at SRI International in Menlo Park for the next 11 years. Michael joined Stanford University in May of 2012 and ascended to the Chief Information Security Officer role in November 2013.
Varonis View Bio »
Stephen Frethem has worked in the IT Industry since 2000 and in the security space for the previous six. A recovering virtualization engineer, Stephen has spent time at some of the largest organizations including Target, US Bank, Honeywell, and UHG to name a few. Stephen's current position is at Varonis as a Senior Sales Engineer serving the Twin Cities area helping companies secure their unstructured data from insider threats.
Maxim Integrated Products View Bio »
Matt Hollcraft is Chief Cyber Risk Officer with Maxim Integrated, a $13B semiconductor manufacturer specializing in power management, with headquarters in San Jose, California. He leads a global organization managing technology risk and architecture, cybersecurity operations and technology-related audit and compliance. Matt’s career spans more than 20 years across government, financial services and high-tech industries and includes roles in financial crime investigation, privacy and executive corporate management.
City and County of San Francisco View Bio »
Michael Makstman is the City Chief Information Security Officer for the City and County of San Francisco. Michael leads the cybersecurity division, located in the Department of Technology, and serves City departments by securing sensitive data and technology assets, assessing and managing security risk, and thwarting attempted cyberattacks. The cybersecurity team is also tasked with actively monitoring systems, creating cybersecurity policies that empower departments and commissions and promoting cybersecurity best practices within the City departments.
Prior to joining the City and County of San Francisco, Michael served Kaiser Permanente as the Director of Technology Risk Strategy and Governance. He has over 15 years of experience leading and building security teams in both private and government sectors. Michael is a Co-Chair of the Ethics Committee and is a Fellow of the Information Systems Security Association (ISSA), the largest international organization of information security professionals. He earned his Bachelor’s at DePaul University and graduated with a Master’s in Computer Science from the University of Illinois at Urbana-Champaign.
Info-Tech Research Group View Bio »
Wesley McPherson is a Research Director at Info-Tech Research Group. Wesley has focused his career on digital transformation, data driven transformation and cyber security.
Wesley’s major areas of research and advisory experience have been on security strategy development, CISO enablement and risk management.
During his time at Info-Tech, Wesley has conducted primary and secondary research, built interactive data analysis tools and developed quantification methods for IT performance and risk exposure. Wesley works directly with IT professionals to understand their issues; to help identify appropriate solutions; and develop validation processes to ensure effective implementation.
Wesley holds an Honours Specialization in Business Administration from the Richard Ivey School of Business where he focused his studies on predictive analytic strategy and management science. Wesley holds a GSEC certification and has spoken at various IT conferences.
Beckman Coulter View Bio »
Wido Menhardt is a seasoned technology executive with a passion for taking technology ideas from scratch to market, and to then scale them to volume deployment. He serves as Vice-President R&D for Clinical Informatics Technologies at Beckman Coulter, where he drives commercialization of disruptive computing technologies such as IoT, Common Platform, AI, Data Analytics and Cloud Transformation.
Throughout his career, Dr. Menhardt has been involved in healthcare innovations, in areas ranging from imaging technology, image guided surgery and virtual reality, to artificial intelligence, data analytics and platform technology, in the context of start-ups and in assignments in established multinationals. He also has a passion for frugal and reverse innovation in emerging markets.
Having lived in Europe, India and North America, Dr. Menhardt has a passion for diversity and inclusion, and serves on Beckman Coulter’s D&I council.
Beckman Coulter View Bio »
Mr. Nichols has over 20 years of experience in the Healthcare Information Technology industry. In his current role, he leads the Global Product Privacy and Security program at Beckman Coulter and across other Danaher Operating Companies. Focusing on privacy and security by design for Danaher’s medical devices, diagnostics, life sciences, water quality, product identification and dental product portfolio’s. Mr. Nichols is the chairman for the Danaher Global Product Privacy and Security Council and sits on multiple advisory boards inside out and outside of Danaher. Prior to Beckman Coulter/Danaher, Mr. Nichols was the Senior Director of Healthcare Information Services and HIPAA Security Officer for CHMB, an Allscripts partner and national electronic health records hosting provider. He has served as Director of IT and HIPAA Security Officer for multiple large health systems in California. Mr. Nichols holds certifications as a Healthcare Information Security and Privacy Practitioner and a Certified HIPAA Privacy Security Expert.
DataEndure View Bio »
Shahin has more than 2 decades leading technology teams and is the current Chief Technology Officer at DataEndure, a technology integrator and MSSP. He joined DataEndure in 2016 to further build out its digital resilience strategy and capabilities, and is responsible for the technology roadmap, security, sales engineering, partner relations and the program office.
Shahin has an uncommon blend of experience in P&L, M&A, negotiations, operations, process reengineering, engineering and strategic planning in diverse industries including telecommunications, outsourcing, manufacturing, service providers and software development.
Prior to joining DataEndure, Shahin was the CTO at CenterBeam and RiverMeadow and held leadership roles at EarthLink, AppShop and EDS.
Fugue View Bio »
Josh Stella is Co-founder and CEO of Fugue, the cloud infrastructure automation and security company. Fugue identifies security and compliance violations in cloud infrastructure and ensures they are never repeated.
Previously, Josh was a Principal Solutions Architect at Amazon Web Services, where he supported customers in the area of national security. He has served as CTO for a technology startup and in numerous
Mechanics Bank View Bio »
Selim is the Chief Information Security Officer at Mechanics Bank. With over 15 years of experience in Information Security, he has worked in multiple industries including Financial Services, Government, Defense and Health Care. Prior to joining Mechanics Bank, Selim held several roles within the IT Security department of an IT Services & Solutions global leader followed by an IT Security Manager position at Deloitte. Through extensive experience with heterogeneous networks, strict regulatory and availability requirements for over 250 clients worldwide , he has acquired hands-on expertise with various security technologies.
Selim is Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), ISO 27001 Lead Auditor / Lead Implementer, ISO 22301 Lead Auditor / Lead Implementer and holds multiple Industry standard security technology certifications.
TiVo View Bio »
Hemanta Swain is currently working as Information Security Officer at TiVo Corp, headquartered in San Jose, California; a global leader in entertainment technology and creator of Digital Video Recorder, and holds 6000+ patents worldwide. He leads a global team of security professionals to manage Cybersecurity, Regulatory Compliance, Privacy & Risk Management initiatives across the company. Hemanta has 20+ years IT experience including 15+ years of Cybersecurity & Risk Management expertise. Hemanta has performed multiple roles at TiVo. Prior to joining TiVo, Hemanta performed various security technical leadership role for companies like GE and Wipro.
Hemanta holds multiple Industry standard technology certifications including Certified Information Security Manager (CISM) & Certified Information Systems Security Professional (CISSP).
8:00am - 9:00am Breakfast
9:00am - 9:10am Argyle Opening Remarks featuring Argyle Host
read more »
Director, Global Product Privacy and Security
9:10am – 9:45am Keynote Presentation featuring Stanford Children’s Health: "Automated Response in a resource strapped World "
read more »
This presentation will focus on discussing practical use cases wherein automation/scripting has been implemented to respond to realized and potential threats.
Stanford Children’s Health
9:45am – 10:05am Thought Leadership Spotlight featuring TrendMicro: "The Ever-Evolving Threat Landscape – Reducing Risk from Cybercrime to Cyber Espionage"
read more »
The threat landscape is constantly evolving from global ransomware outbreaks such as WannaCry and Notpetya to international cyberespionage campaigns distilling cyber propaganda such as Pawn Storm/APT28. Learn what makes these attacks successful to better understand how you need to defend your networks, data and users. Only by having a deep understanding of the threats you face and the vulnerabilities you have, can you successfully reduce the risk your organizations face.
Chief Cybersecurity Officer
10:05am – 10:30am Networking Break
10:30am – 11:20am Panel Discussion: "Security Innovation: Unifying Proactive & Reactive"
read more »
Session topics include, but are not limited to:
- What are some insider threats that are top of mind for you at your organization?
- How do you pinpoint top weaknesses that increase risk within the company?
- Discuss the importance of implementing both a proactive & reactive strategy within your organization?
- How do you drive innovation while mitigating risk, ensuring continuous compliance & maintaining security?
- How do you leverage tools like the cloud to promote efficiency while maintaining a secure digital environment?
- What are primary threats to the business in the cloud, and what practices & controls are necessary for compliance?
- What’s the best method to plan and prevent insider threats and cyberattacks?
- How do you balance demands that are potential threats to corporate data within your organization
Director, Global Product Privacy and Security
Senior Systems Engineer
Chief Cyber Risk Officer, Office of the General Counsel
Maxim Integrated Products
Sr. Director and Information Security Officer
11:20am – 11:40am Thought Leadership Spotlight featuring Service Now
read more »
Senior Advisory Solutions Architect
11:40am – 12:00pm Networking Break
12:00pm – 12:50pm Panel Discussion: “Hacking the Boardroom”
read more »
Session topics will include but are not limited to:
- Top emerging risks stemming from the Cloud
- Methods to proactively understand and manage threats/risks in real time in the Cloud
- Enabling efficiency and productivity through reliable security best-practices
- Compellingly communicating security concepts to the executive team
- Best practices for cross department collaboration and education
- What does it mean when we claim the internet has been “weaponized”
- What are your top 3 predictions for what we should guard against?
- Should I really be concerned about nation state sponsored cyber-attacks?
- It seems cyber-attacks are increasing in frequency, but also in the massive damage they cause. It seems we’re losing the battle. Comments?
- What are the most significant areas for cyber-security vendors to protect?
Stanford Children’s Health
Vice President of Technology Operations and CISO
SVP and Chief Information Security Officer
12:50pm – 1:10pm Thought Leadership Spotlight featuring InfoTech: “Security Scientists: Applying Scientific Mindset to Measuring your Security Program"
read more »
Every security professional is being asked “are we secure?” This is an inherently flawed question and not the right question that should be asked. There is immense pressure from Boards, CEOs, regulators, and customers on security leaders to effectively manage, measure and communicate what their security program is doing. In this co-presentation by Info-Tech Research Group and Colorado Springs, you will learn what are things that can be measured and how. In specific the cons, pros and use cases of security assessments, vulnerability assessments, penetration tests, and security audits will be explored. In addition to measurement methodologies, road mapping and communication tactics will be discussed to ensure that once you know where you are you can do something about.
Info-Tech Research Group
1:10pm – 2:10pm Lunch
2:10pm – 2:45pm Keynote Session featuring Stanford University: "Going Passwordless @ Stanford"
read more »
In realizing our long-term vision of strong user authentication coupled with endpoint security posture enforcement at Stanford, we are now deploying the final component: client certificates that identify both the user and the device. We'll explain the underlying systems, while highlighting the lessons we learned along our five year journey. You'll hear a rare story of dramatically improving security and user experience simultaneously, and will learn how you can replicate this success.
2:45pm – 3:00pm Networking Break
3:00pm – 3:35pm Keynote Presentation featuring Beckman Coulter: "Taking healthcare apps into the cloud – overcoming concerns about privacy, security, availability…"
read more »
In many verticals, the cloud has enabled companies to reduce cost of ownership and increase time to market. In healthcare, however, there are organizational concerns about privacy (PHI), security (data breaches), availability (eg for mission critical devices) and general regulatory compliance. In this talk we will describe some of these concerns, and how we were able to address them using deep voice-of-customer, specific guidance documents from the FDA, and an enhanced privacy and security posture and strategy.
VP Clinical Informatics
*This session will be off the record.
3:35pm – 4:10pm Keynote Presentation featuring City and County of San Francisco: "Beyond the Workplace – Cybersecurity Awareness for the City"
read more »
Should cybersecurity awareness and cyber-safe practices be reserved only for city workers? Does the mission of the cybersecurity team stop at the doors of City offices? These questions fuel an extension of the mission for San Francisco cybersecurity team. As digital technology transforms the way City residents, visitors and business interact with City services, cyber safety becomes a central issue in people’s daily lives.
In his key note address, Mike Makstman provides an overview of how the City cybersecurity team is extending cybersecurity mission, and how cybersecurity professionals can contribute to ensuring that all people in the City know how to be safe in our new, digital world.
City and County of San Francisco
4:10pm – 4:15pm Argyle Closing Remarks
4:15pm – 5:15pm Closing Reception
What will be discussed? Explore security hot topics and challenge areas such as:
Security and innovation
Evaluate what technologies will have the biggest impact on the business world in the year ahead, and reflect on the reality of IT security becoming a business enabler. Our speakers will discuss:
- Tracking the improvement of wireless networks
- Choosing the best devices to support internally
- Cutting costs through cloud technology
- Taking stock of risks imposed by the mobile channel
Building an Effective Security Strategy
Review the major changes the field of IT has experienced over the past few years, the driving forces behind them, and the barriers they present. Get briefed on:
- Driving long-term business initiatives
- Overcoming barriers to a solid mobile strategy
- Aligning risk management with business priorities
- Developing a successful incident response plan for security incidents
The Evolution of IT
Discuss the importance of having accurate information on customers and prospects in real time, and how the rise of apps, data management tools and practices like hosting have added made the business of protecting enterprise information more complex. Gain insight into:
- Enriching the customer experience with real-time data
- Staying alert to prevent theft of data and/or funds
- Overcoming barriers to implementing multichannel integration
- Evaluating security risks mobile devices present and how to respond
Transparency and security
Define how the concepts of identity and access management are building and shaping new security perimeters, and hear how successful organizations are managing identities in applications. Learn how top CIOs and CISOs are:
- Lowering costs and risks related to security
- Achieving success through data management
- Defining the key benefits of SSO
- Protecting enterprise data across the organization
Still have questions? We have answers.
I want to attend, but what if I'm unsure of my schedule and need to cancel my participation?
Just let us know. We understand that schedules
we always have a waiting list for this event,
and if you don't
cancel, we will assume you are still attending
and your spot will
go unused. If you must, cancel at least 48 hours
prior to the
event to make room for others!
What if I can't be OOO for a whole day, or need
to come late?
We have wifi and private rooms available for
attendees to take
calls and spend some quiet time on emails, as
well as access to
printing. Have a morning meeting you can't miss?
No problem. This
event was designed for busy executives - we get
I'd like to bring some colleagues. Do I need to
Events are more fun with friends, and we'd be happy to host your team. You can have them register online, or send us their names, titles and email addresses and we will take care of it for you!
I don't see the event venue listed. Where will
the meeting be
To maintain exclusivity, we don't release the
venue address until
the registration process has been completed. All
details will be shared once you have requested a
pass and been
The "2018 Chief Information Security Officer (CISO) Leadership Forum" in San Francisco is proudly sponsored by:
"Not only are the speakers relevant and experts in their fields, but I was able to make some great connections at the meetings as well."
The Chief Technology Officer at PC Richard and Son on the quality of past Argyle CIO Forums.
"Argyle's meetings are well balanced in terms of panels and presentations and networking opportunities with local business leaders."
A Head of Emerging Business and Technology at Ericsson on attending Argyle CIO events.
"The meetings that Argyle Executive Forum runs are truly enjoyable and well put together....I'm looking forward to the next forum."
A VP of Information Systems at Garmin International on attending Argyle events.
Traveling for the event? Stay at one of our
The below hotels are recommended by Argyle Executive Forum. Please note that we do not have a corporate rate. For details on where the event will take place, please contact your Argyle relationship manager.