chief information security officer

1 Day Meeting

2014 Chief Information Security Officer (CISO) Leadership Forum

May 06, 2014

Overview

Argyle Executive Forum’s 2014 Chief Information Security Officer Leadership Forum will explore the evolution of the Chief Information Security Officer role and discuss best practices and strategies for the security organization to help drive the business forward and have a profound impact on the local and global business climate.

Argyle Executive Forum is bringing together CISOs, CIOs, CTOs, and direct reports from a variety of industries. Using a discussion-based format, our 2014 Chief Information Security Officer Leadership Forum in San Francisco will focus on several areas including: “Effective strategies for Fighting Cyber Crime,” “The Evolution of the CISO and Predictions Going Forward,” “Assessing Security in the Cloud Environment,” “Vendor Risk Management,” and “The Risk of BYOD and the Mobile Workforce.”

Join Us at this Event

Event RSVP





-

Who Should Attend

Speakers

If you'd like to recommend a speaker, please email speakerinquiry@argyleforum.com

Bashar Abouseido

Bashar Abouseido

Vice President, Information Security Risk Management (CISO)

Charles Schwab

Rich Campagna

Rich Campagna

VP Products

Bitglass

Vincent Campitelli

Vincent Campitelli

Vice President of Information Security & Risk Management

McKesson

Bob Cheong

Bob Cheong

Chief Information Security Officer

Los Angeles World Airports

Walter Curd

Walter Curd

Vice President and Chief Information Officer

Maxim Integrated Products

Mike Ellis

Mike Ellis

CEO

ForgeRock

Frank Greco

Frank Greco

Director of Technology

Kaazing

Richard Greene

Richard Greene

President

Seculert

Greg Headley

Greg Headley

VP of EPG Sales

AvePoint

Elimu Kajunju

Elimu Kajunju

Chief Privacy Officer & Senior Compliance Director

UnitedHealth

Cory Louie

Cory Louie

Head of Trust, Safety & Security

Dropbox

Tom McCreary

Tom McCreary

Information Security and Privacy Officer

CalPERS

Sri Muthu

Sri Muthu

Vice President, Technology & Operations Executive

Wells Fargo

Richard Noguera

Richard Noguera

Head of Information Security

The Gap

Michele Robinson

Michele Robinson

State Chief Information Security Officer

State of California

Richard Rushing

Richard Rushing

Chief Information Security Officer

Motorola Mobility

Stephen Scharf

Stephen Scharf

Global Chief Information Security Officer

Experian

Eric Schou

Eric Schou

Director of Product Marketing

HP ArcSight

Chandar Venkataraman

Chandar Venkataraman

Chief Product Officer

Druva

Kevin Walker

Kevin Walker

Vice President, Assistant CISO

Wal-Mart Stores

Agenda

Download Agenda
7:45am - 8:45am
Breakfast
8:45am - 8:50am
Argyle Executive Forum Opening Remarks
8:50am - 8:55am
Introducing Elimu Kajunju:
Frank GrecoDirector of TechnologyKaazing
8:55am - 9:30am
"What every security professional needs to know about privacy"
Elimu KajunjuChief Privacy Officer & Senior Compliance DirectorUnitedHealth 9:35am – 9:55am

Thought Leadership Spotlight Presented by Dropbox

"Evaluating the security of a service: Is it enterprise-ready?"There are numerous security considerations when evaluating a third party service, including compliance, infrastructure, features, privacy and overall security assurance and trust. How can you sort through the most important questions and determine which areas to prioritize for your particular needs? In this talk we'll share lessons learned from Dropbox's evolution to offering both a consumer and an enterprise service.Cory LouieHead of Trust, Safety & SecurityDropbox
9:55am - 10:25am
Coffee Break
10:25am - 11:15am
Panel Discussion
“Evolution of Security: Securing the Organization While Embracing New Innovations”

Session topics include, but are not limited to: 

Major security issues that are intrinsic to business growth in areas of Mobile, Social and Cloud 
  • How to deliver a seamless end-user experience to a growing, user base, while balancing corporate and regulatory compliance policies?
  • Which new mobile devices will remain viable tools for business users?
  • What new technologies will have the biggest impact on business in the year ahead?
  • What are the key benefits of cloud computing for a business? Does it effectively cut costs? Improve productivity?
  • How does your cloud strategy impact business initiatives in every aspect of the business – customers, engagement and execution?
  • Looking Forward: Should IT Security be made into a business enabler?
  • Where has wireless network technology made the most improvements in the last year?
  • How does your organization choose which mobile devices and platforms to support?
  • What security issues do mobile devices present and how are IT departments responding to them?
Moderator:Sri MuthuVP, Technology & Operations ExecutiveWells FargoPanelists:Rich CampagnaVP ProductsBitglassWalter CurdVice President and Chief Information OfficerMaxim Integrated ProductsGreg HeadleyVP of EPG SalesAvepointStephen ScharfGlobal Chief Information Security OfficerExperian
11:20am - 11:40am
Thought Leadership Spotlight Presented by Seculert
“You Can’t Stop What You Can’t See” Richard GreenePresidentSeculert
11:40am - 12:00pm
Coffee Break
12:00pm - 12:35pm
Fireside Chat
Kevin WalkerVice President, Assistant CISOWal-Mart StoresInterviewed by:Richard NogueraHead of Information SecurityThe Gap*Please note, this session is off the record
12:40pm- 1:00pm
Thought Leadership Spotlight Presented by Druva
"How to Defend Your Data in the Wild"Protecting data for your entire company is a heavy responsibility. There’s the employee who leaves his laptop in the airport. And the former employee who still has access to corporate data from her personal device. Or the ever-present danger of litigation. You’re accountable for a wide range of scenarios that put your corporate data at risk.How can you learn from the experiences of others to ensure that you’re prepared for every threat to your corporate data in the wild?  What are the best practices for keeping your prized corporate assets out of harm’s way?Chandar VenkataramanChief Product OfficerDruva
1:00pm - 2:00pm
Lunch
2:00pm - 2:20pm
Thought Leadership Spotlight Presented by ForgeRock
"Identity Relationship Management: Using identity to empower CISOs everywhere"Identity and Access Management (IAM) was traditionally designed for internal, perimeter-based enterprise. However, the world has significantly changed. Today’s CIOs and CISOs are being asked to shift investments from lowering operational costs to driving top-line revenue. Solutions must be stateless and link all types of devices, applications and things. In this session we will discuss the new model for identity -- Identity Relationship Management -- and its impact on the modern enterprise.Mike EllisCEOForgeRock
2:25pm - 3:10pm
Panel Discussion
“The Art of Risk: Understanding the Evolution of Risk and Cyber Attacks”Session topics include, but are not limited to:  
  • What does cyber security mean when managing risk in the enterprise? 
  • Shifting Economics of Cybercrime 
  • CISO – What does it mean in today’s world? 
  • How to distinguish the fine lines of cyber policy 
  • Differences and similarities of traditional and enterprise risk management 
  • Defending against increasingly complex cybercrime. Differences and similarities of traditional and enterprise risk management
Moderator:Eric SchouDirector of Product MarketingHP ArcSightPanelists:Bashar AbouseidoVice President, Information Security Risk Management (CISO)Charles SchwabVincent CampitelliVP IT Risk ManagementMcKessonTom McCrearyInformation Security and Privacy OfficerCalPERSMichele RobinsonState Chief Information Security OfficerState of California*Please note, this session is off the record
3:10pm - 3:30pm
Coffee Break
3:30pm - 4:05pm
"Cyber Operation with Security Intelligence"
  • Auditing with Cyber Security Framework
Cyber Operation with real-world threatsBest Practice & Technical Control for Insider ThreatIntelligence Reporting with IP Reputation Correlation Bob CheongChief Information Security OfficerLos Angeles World Airports*Please note, this session is off the record
4:10pm - 4:45pm
"2014 Transcendence in IT Security"
With the every increasing number of threats, severity of  risks, with your perimeter looking like swiss cheese we have created the perfect storm. Now where ever you turn you see it like APT, HeartBleed, Cyberrcrime, BYOD, Spying, and much more.This is not the same internet that it was a few years ago, We have been bypassed, leapfrog, or caught napping in the security space by the bad guys and our friends. Now we will be always be reacting to the risks and threats never planning. The only hope is to transcend our current situation in both new and old ways.  To get one step  ahead of the bad guys and too stay ahead. We will look at where to focus and what makes the biggest impact.  How security must jump the gap that exists before it widens more.Richard RushingChief Information Security OfficerMotorola Mobility
4:45pm - 4:50pm
Argyle Executive Forum Closing Remarks
4:50pm - 5:50pm
Closing Reception

Sponsors

This event will feature insights from top executives, including

  • Thought Leadership Spotlight Partner

  • Thought Leadership Spotlight Partner

  • Thought Leadership Spotlight Partner

  • Thought Leadership Spotlight Partner

  • Panel Partner

  • Panel Partner

  • Panel Partner

  • Session Introduction Partner

  • Senior Supporter Partner

  • Senior Supporter Partner

  • Senior Supporter Partner

  • Senior Supporter Partner

  • Senior Supporter Partner

  • Senior Supporter Partner

  • Supporter Partner

Interested in sponsoring an event?

Speak to one of our dedicated sponsorship teams sponsorship@argyleforum.com

Sponsorship Information