Chief Information Security Officer

1 Day Meeting

2017 Chief Information Security Officer (CISO) Leadership Forum

Chicago, IL - May 04, 2017

Overview

EXPLORE THE LATEST TRENDS AND TECHNOLOGICAL CAPABILITIES IMPACTING THE INFOSEC LANDSCAPE

Argyle Forum is bringing together leading InfoSec, IT, and Risk executives for our annual CISO Summit in Chicago. Throughout a full day of content and networking, we will focus on the most pressing issues that InfoSec professionals are facing moving into 2017, with an agenda geared specifically towards CISOs, CSOs, Security VPs, and Directors in a leadership role.  Topics will include:

  • Properly preparing for an inevitable multi-cloud future
  • Strategizing recovery plans and solutions from an organizational cyberattack
  • Discovering emerging security capabilities and how leading organizations are managing the adoption process
  • Exploring new ways to secure the mobile network
  • Understanding how emerging regulatory changes will impact global business operations
  • Conducting comprehensive and regular information security risk assessments
  • Building a workforce for the future of InfoSec

Our keynote addresses, fireside chats, and panel sessions, and interactive group discussions will give you the perspective and actionable takeaways that only a room of the best minds in Chicago can provide. Speakers at our 2016 Chicago Forums included John Dolce, CISO and Director at American Medical Association; Bob Eichler, Head of Information Security at Cancer Treatment Centers of America; Aman Raheja, CISO at BMO Harris Bank; Richard Rushing, CISO at Motorola Mobility and more.

We look forward to bringing together another fantastic faculty in 2017, and to hosting you alongside our community of Fortune 500 CISO leaders hailing from Chicago and beyond.

Request Invite to this Event

We will get back to you shortly

Event RSVP





-

Speakers

If you'd like to recommend a speaker, please email speakerinquiry@argyleforum.com

Fred Kwong

Fred Kwong

Chief Information Security Officer

Delta Dental

Tim Bengson

Tim Bengson

Vice President, Global Cyber Security & Risk Management

Kellogg's

Michael Cruger

Michael Cruger

Regional Sales Manager

Vidder

Daren Glenister

Daren Glenister

Field Chief Technology Officer

Synchronoss

John Iatonna

John Iatonna

Senior Vice President, Information Security

Edelman

David Komendat

David Komendat

Vice President & Chief Security Officer

Boeing

Ricardo Lafosse

Ricardo Lafosse

Chief Information Security Officer

Cook County

Seth McCallister

Seth McCallister

Chief Information Security Officer

Hub International

Michael McKee

Michael McKee

CEO

ObserveIT

Matthew Memming

Matthew Memming

Chief Information Security Officer

Navistar International

Jim Motes

Jim Motes

Vice President, Information Security

Kohler Co.

Aman Raheja

Aman Raheja

Chief Information Security Officer

BMO Harris Bank

Jill Rhodes

Jill Rhodes

Chief Information Security Officer (CISO) and Vice President

Option Care

Aurelie Richard

Aurelie Richard

Senior Vice President, People Strategy, Global Human Resources

Schneider Electric

Richard Rushing

Richard Rushing

Chief Information Security Officer

Motorola Mobility

Raghbir Sandhu

Raghbir Sandhu

SR. Security Architect

Kellogg's

Jeremy Wittkop

Jeremy Wittkop

Chief Technology Officer

InteliSecure

Agenda

This event will feature insights from top executives, including

Download Agenda
8:00am - 9:00am
Breakfast
9:00am - 9:10am
Opening Remarks featuring Argyle Host Fred Kwong

Fred Kwong
Chief Information Security Officer 
Delta Dental

9:10am - 9:45am
Keynote Presentation featuring Boeing: "Starting your Insider Threat Program, it's not as easy as you might think"

What does it take to build an effective insider threat program within your company? Do you have the right support, people, culture and emotional resilience to be successful? We will share many of the lessons learned…both good and bad…in our journey to create an industry leading Insider Threat Program. 

Dave Komendat
Vice President & Chief Security Officer
The Boeing Company

9:45am - 10:05am
Thought Leadership Spotlight featuring Synchronoss: "The State of Enterprise Mobility"

Daren Glenister
Field Chief Technology Officer
Synchronoss

10:05am - 10:30am
Networking Break
10:30am - 10:50am
Thought Leadership Spotlight featuring ObserveIT: "Best Practices for Building an Insider Threat Program"

The greatest cybersecurity threat an organization faces is no longer the malicious outsider hacking from beyond network firewalls. It is the insiders – the contractors, vendors, privileged users and business users - whose actions create the most risk. Whether intentional or malicious, you need to quickly identify and eliminate insider threat risk. Attend this session to learn best practices for building and maintaining an effective insider threat program.


Michael McKee
CEO
ObserveIT

10:50am - 10:55am
Session Introduction featuring Vidder

Michael Cruger
Regional Sales Manager 
Vidder

10:55am - 11:40am
Panel Discussion: "Proactively Securing the Business Today for a Better Tomorrow"

Session topics include, but are not limited to:

  • Best practices for improving the entire application life cycle, alleviating common security concerns associated with the cloud
  • New skillsets necessary to differentiate the organization with data
  • Balancing all of these demands with potential threats to corporate data
  • Pinpointing top weaknesses that increase risk
  • Detecting and combatting advanced threats
  • The transformation of the CISO in relation to cyber threats

Moderator:

Jill Rhodes
Chief Information Security Officer (CISO) and Vice President 
Option Care

Panelists:

Fred Kwong
Chief Information Security Officer 
Delta Dental

Ricardo Lafosse
Chief Information Security Officer 
Cook County

Raghbir Sandhu
Chief Security Architect 
Kellogg's

Jeremy Wittkop
Chief Technology Officer 
InteliSecure

 

11:40am - 12:00pm
Networking Break
12:00pm - 12:35pm
Keynote Presentation featuring Kohler Co.: "A Community Approach to Cyber Security"

Years ago, CISOs were struggling to find budget dollars to implement necessary control measures throughout their enterprise and were often forced to make tough decisions about where to invest their limited security dollars.  Today, company executives and boards are far more attuned to cyber security risks and have increased security budgets resulting in many security departments having access to funds for implementing a more comprehensive security program.  Unfortunately, this can often be an inaccurate measure of a corporation’s security posture. Granted, there may be a collection of controls, countermeasures, and procedures in place to detect and prevent threats, but there is another critical factor to consider; Are there adequate numbers of trained resources available to implement the strategy and ensure all the functions and features are enabled?  How many associates are monitoring and/or responding to alerts and logs generated by these systems?  Basically, it comes down to resources and as we all know, there is a critical shortage of cyber security professionals.

This immediate need for qualified security personnel won’t wait the five or more years it will take to develop adequate numbers of qualified security staff.  Many security teams are overtasked and failing to perform all the duties necessary to accomplish their operational objectives.  Teams have severe gaps in training and experience.  The very best in each security organization will often be overwhelmed by their formal workloads and the informal mentoring they do to support other team members.  This puts retention of the most talented individuals at risk but there’s little room for security management to maneuver away from these scenarios.

This discussion will focus on a community approach to meeting this critical challenge to protecting corporate operations, intellectual property, and critical systems.  We will discuss how security executives might seek out their peers and establish a Mutual Security Support Agreement to engage their peers during a security crisis and effectively augment their own security team at no additional cost A Mutual Security Support Agreement is simply a formal document stating that each “member” is entitled to receive information, security resources and assistance in the event of a security request from other members.  We will also discuss other benefits of a Mutual Security Support Agreement in areas of training, joint team exercises, and skill development.

Intended Audience

  • Information security leaders
  • Business leaders

Take Aways

  • Familiarity with a shift in how we think about security staff augmentation
  • Understand how this approach can offset the ever-increasing risk to your organization
  • Handout of a Mutual Security Support Agreement template for attendees use

 

Jim Motes
Vice President, Information Security 
Kohler Co.

12:35pm - 1:35pm
Lunch
1:35pm - 2:20pm
Panel Discussion: "Securing and Closing the Gap on IT Talent"

Session topics include, but are not limited:

  • Laying the groundwork for IT & HR to collaborate in your business  
  • Best practices and lessons learned for establishing this collaborative relationship
    • Partnering with different functions outside of IT to develop the skills of existing teams
    • Addressing training and development challenges for these new skills 
    • Creating organizational changes around employee engagement to create long-term development of talent and align business objectives
    • Efforts impacting retention rate
  • Hiring differently with regards to the millennial generation
    • Organizations adapting to better accommodate millennials in terms of the tools that they expect

Moderator:

John Iatonna
Senior Vice President, Information Security 
Edelman

Panelists: 

Tim Bengson
Vice President, Global Cyber Security & Risk Management
Kellogg's

Seth McCallister
Chief Information Security Officer 
Hub International

Matthew Memming
Chief Information Security Officer 
Navistar International

Aurelie Richard
Senior Vice President, People Strategy, Global Human Resources
Schneider Electric

2:20pm - 2:40pm
Networking Break
2:40pm - 3:15pm
Keynote Presentation featuring Motorola Mobility: "Fast Crime, Friendenemies and the Borg The State of CyberSecurity 2017"

So if we take a look at the past and use it to judge what our future will be, the cybersecurity ocean is a dark, and scary place.  We are just a small boat, being pushed about by the waves of attacks, and new threats, with no navigation system or lighthouse to guide us, We just drift about seemingly waiting for the pirates to board our ship.

 

Not such a nice picture but this is where we are heading,  So how can we change our directions, are our businesses or organizations rudderless ships to be pushed about by the waves of cybercrime.  The good news is that we do not need to drift about anymore, we can move in any direction we wish.

We will have to learn to live with the storm, but what is is a little rain and the wind.  Batten Down the Hatches, and hold on, is the new normal. We discover the speed is critical, and so many of the ways we have done things in the past, need to be redesigned, we need to take away the simple tasks and simplify the complex. Information is our strength so we should use it.

We have more tools, people, and support than we have ever had in the history of security, so use it NOW!

 

Richard Rushing
Chief Information Security Officer 
Motorola Mobility

3:15pm - 3:50pm
Keynote Presentation featuring BMO Harris Bank: "The Weakest Link in Information Security Programs"

Try asking around the room, “What is the weakest link in your organization that could expose you to a potential significant security incident?” You will likely get answers that run the gamut:  technology weaknesses (such as legacy systems, missing patches, etc.); process weaknesses (such as lack of security engagement in SDLC); and human factors (such as clicking on phishing emails). How do you prioritize what the organization should tackle first that could be more consequential than others? Further, how do you consider external threats, compliance requirements, business impact and investment? In this session we will discuss how you identify the opportunities, prioritize and then act upon these weak links.

Aman Raheja
Chief Information Security Officer 
BMO Harris Bank

3:50pm - 4:00pm
Closing Remarks featuring Argyle Host Fred Kwong

Fred Kwong
Chief Information Security Officer 
Delta Dental

4:00pm - 5:00pm
Closing Reception

Sponsors

Interested in sponsoring an event ?

Speak to one of our dedicated sponsorship teams sponsorship@argyleforum.com

Sponsorship Information

This event will feature insights from top executives, including

  • Thought Leadership Spotlight & App Partner

  • Thought Leadership Spotlight Partner

  • Panel Partner

  • Session Introduction Partner

  • Senior Supporter & App Partner

  • Senior Supporter Partner

  • Senior Supporter Partner

  • Senior Supporter Partner

  • Senior Supporter Partner

  • Senior Supporter Partner

  • Senior Supporter Partner

  • Senior Supporter Partner

  • Senior Supporter Partner

Advisory Board

We are proud to share with you the following Argyle Industry Influencers. Their contributions to Argyle help keep the programs we offer our membership current and relevant, so we can continue delivering you premiere experiences, content development, and membership engagement.