Chief Information Security Officer

1 Day Meeting

2018 Chief Information Security Officer (CISO) Leadership Forum

Chicago, IL - May 08, 2018

Overview

Argyle Executive Forum is bringing together leading InfoSec, IT, and Risk executives for our annual CISO Forum in Chicago. Throughout a full day of content and networking, we will focus on the most pressing issues that InfoSec professionals are facing moving into 2018. With an agenda geared specifically towards leaders in InfoSec, IT and Risk, topics discussed will include:

  • Properly preparing for an inevitable multi-cloud future - fully and securely embracing the cloud
  • Strategizing recovery plans and solutions from an organizational cyberattack – transitioning from recovery to resilience
  • Discovering emerging security capabilities and how leading organizations are managing the adoption process
  • Exploring new ways to secure the mobile network, particularly when traditional security measures are no longer effective
  • Understanding how emerging regulatory changes will impact global business operations, and how to best prepare
  • Building a workforce for the future of InfoSec - attaining, training, and retaining talent through in-demand skillset development and mentoring opportunities

 

Our keynote presentations, fireside chats, panel sessions and networking breaks will encourage candid discussions with your peers focused on these topics and more. We look to hosting you alongside our community of Fortune 500 CISO leaders hailing from Chicago and beyond!

Request Invite to this Event

We will get back to you shortly

Event RSVP





-

Speakers

If you'd like to recommend a speaker, please email speakerinquiry@argyleforum.com

Speaker's profile image

Arun Desouza

Chief Information Security and Privacy Officer

Nexteer Automotive

Speaker's profile image

Cherisse Estes

Assistant Vice President, Information Technology Product Management

Fifth Third Bank

Speaker's profile image

Ed Giles

Senior Vice President, Security Technology Operations & Architecture

Northern Trust Corporation

Speaker's profile image

Santosh Krishnan

Chief Product Officer

Lookout

Speaker's profile image

Sean Nealon

Director, Cyber security Architecture and Operations

General Growth Properties

Speaker's profile image

Zulzani Noordin

Director of Network Security

A leading healthcare company

Speaker's profile image

Susan Nuccio

SVP, Global Information Security

JLL

Speaker's profile image

Nazia Raoof

Managing Director - Transformational Strategist / Technology Business Partner

CIBC US

Speaker's profile image

Sarah Reeser

CEO

Analytical Intel, LLC

Speaker's profile image

Richard Rushing

Chief Information Security Officer

Motorola Mobility

Speaker's profile image

Raghbir Sandhu

Sr. Security Architect

Kellogg's

Speaker's profile image

Ray Shum

Enterprise Account Manager

Ivanti

Speaker's profile image

Josh Stella

CEO

Fugue

Speaker's profile image

Bob Turner

Chief Information Security Officer (CISO)

UW-Madison

Speaker's profile image

Milan Urban

Regional Account Manager

Trend Micro

Speaker's profile image

Arlene Yetnikoff

Director of Information Security

DePaul University

Agenda

This event will feature insights from top executives, including

Download Agenda
7:45am - 8:45am
Breakfast
8:45am - 8:50am
Argyle Opening Remarks
8:50am - 9:25am
Keynote Presentation: "From FUD to Forward: A CISO's Journey"

Higher education and research is, in practice and by necessity, an open and collaborative society driven by the need to share information without hindrance.  The daily business practices have the potential to expose protected personal or healthcare information, protected and unpublished research, patentable discoveries and inventions, and large volumes of financial information.  Communicating the practices and policies may easily result in promoting fear, uncertainty and doubt, also known as FUD, to motivate users and data owners toward the “right” behaviors.  The University of Wisconsin-Madison’s Office of Cybersecurity chooses to move in the direction of partnership as they inform and involve the community of over 22,000 faculty, researchers and staff along with 43,000 students; without FUD as the centerpiece.    

In his key note address, Bob Turner provides insight into the issues of communication and community engagement the University of Wisconsin-Madison has travelled with a glimpse of the trail ahead.

Bob Turner
Chief Information Security Officer (CISO)
UW-Madison

9:25am - 9:45am
Thought Leadership Spotlight: "Why Phishing is Both Different and More Problematic on Mobile"

The traditional corporate perimeter is evaporating as the enterprise continues its fundamental shift to a mobile-enabled workplace. Now, all endpoints, but particularly mobile devices, are outside the firewall and freely accessing not just enterprise apps and SaaS, but also personal services like social media and email. In this new world, attackers take advantage of the blending of personal and enterprise accounts and the vulnerability of devices outside the firewall to gain access to corporate data and credentials via new vectors for phishing attacks, including SMS and messaging platforms like WhatsApp, Facebook Messenger, etc.

Santosh Krishnan
Chief Product Officer
Lookout 

9:45am - 10:10am
Networking Break
10:10am - 10:55am
Panel Discussion: "Security Innovation: Unifying Proactive & Reactive"

Session topics include, but are not limited to:

  • What are some insider threats that are top of mind for you at your organization?
  • How do you pinpoint top weaknesses that increase risk within the company?
  • Discuss the importance of implementing both a proactive & reactive strategy within your organization?
  • How do you drive innovation while mitigating risk, ensuring continuous compliance & maintaining security?
  • How do you leverage tools like the cloud to promote efficiency while maintaining a secure digital environment?
  • What are primary threats to the business in the cloud, and what practices & controls are necessary for compliance?
  • What’s the best method to plan and prevent insider threats and cyberattacks?
  • How do you balance demands that are potential threats to corporate data within your organization

Moderator: 

Bob Turner
Chief Information Security Officer (CISO)
UW-Madison

Panelists:

Arun Desouza
CISO and Privacy Officer
Nexteer Automotive

Sean Nealon
Senior Director, Cyber & Information Security
GGP

Zulzani Noordin
Director of Network Security
A Leading Healthcare Provider

Josh Stella
CEO
Fugue

10:55am - 11:15am
Thought Leadership Spotlight: "Data Center Attack: The Game"

In this session we will put you in the shoes of a CISO at a hospital to see if you can go back in time to prevent a data center attack from holding critical patient data hostage. See if you have the knowledge it takes to stop a data center attack, and if not, learn what defenses you need to prevent one.

You will be prompted to make decisions that will impact your security posture. Wrong choices could result in ransomware hijacking your patient data and putting lives at risk. Right choices will show you what happens with DevOps and IT work together, will allow doctors to see patient data, and the hospital will run as expected.

Milan Urban
Regional Account Manager
Trend Micro

*This session will be off the record.

11:15am - 11:35am
Networking Break
11:35am - 12:10pm
Keynote Presentation featuring Motorola Mobility

Richard Rushing
Chief Information Security Officer
Motorola Mobility

12:10pm - 1:10pm
Lunch

 

1:10pm - 1:55pm
Panel Discussion: "Women in Information Security: Breaking the Digital Ceiling"

Session topics will include but are not limited to:

  • Describe your career journey and your personal experience in your previous and current role in the industry.
  • In your experience, how have you seen women break down barriers in regards to challenges in your department and organization?
  • How do you define InfoSec excellence?
  • If we understood and valued more of the right skills needed in today’s environment, would that naturally translate to more women in InfoSec?
  • How are you partnering with HR and other departments in efforts to bring in more women into InfoSec?
  • What advice do you have for the audience to increase the number of women working and holding management positions in Infosec

Moderator:

Sarah Reeser
CEO
Analytical Intel, LLC

Panelists:

Cherisse Estes
Assistant Vice President, Information Technology Product Management
Fifth Third Bank

Susan Nuccio
SVP, Global Manager
Information Security Compliance
JLL

Nazia Raoof
Managing Director - Transformational Strategist / Technology Business Partner
CIBC US

Arlene Yetnikoff
Director of Information Security
DePaul University

 

1:55pm - 2:15pm
Networking Break
2:15pm - 2:20pm
Session Introduction featuring Ivanti

Ray Shum
Enterprise Account Manager
Ivanti

2:20pm - 2:55pm
Keynote Session: "Know, Control, Enable"

The Business often views Security as an obstacle to pursuing new opportunities -- serving as little more than business "unablers." Regulators, auditors, compliance officers, prospects, and clients constantly challenge Security to demonstrate due care in all matters related to protecting the assets of the company. Can security ever satisfy all parties? Probably not. It can enable the business while improving the security posture of the company.  With demands to patch vulnerable system, fix vulnerable code, protect sensitive data on and off network, limit access to certain websites, it's no surprise when business innovators steer clear of Risk and Information Security teams. Recent media coverage of cyber security threats and incidents supports the need for information security. Nevertheless, many perceive the information security as a necessary evil rather than a force for good.

In this key note address, Ed Giles offers that through a change in perspective and approach, information security professionals can provide a smoother more secure path to enable business innovation and profitability.

Ed Giles
Senior Vice President, Security Technology Operations & Architecture
Northern Trust

2:55pm - 3:30pm
Keynote Session: "Cybersecurity Practice Overview"

New technologies driving the digital transformation and intensifying the new risks have emerged to the business. Despite how sophisticated information security has become, the fundamental of Cyber Security Framework to integrate the People, Process, and Technology is the key to successfully protect the organization from the cyber threats and risks.

Raghbir Sandhu
Sr. Security Architect
Kellogg's

3:30pm - 3:35pm
Argyle Closing Remarks
3:35pm - 4:35pm
Closing Reception

Sponsors

Interested in sponsoring an event ?

Speak to one of our dedicated sponsorship teams sponsorship@theargyleforum.com

Sponsorship Information

This event will feature insights from top executives, including

  • Thought Leadership Spotlight & App Partner

  • Thought Leadership Spotlight & App Partner

  • Panel Partner

  • Session Introduction Partner

  • Breakout Session Partner

  • Senior Supporter Partner

  • Senior Supporter Partner

  • Senior Supporter Partner

  • Senior Supporter Partner

  • Supporter Partner

Advisory Board

We are proud to share with you the following Argyle Industry Influencers. Their contributions to Argyle help keep the programs we offer our membership current and relevant, so we can continue delivering you premiere experiences, content development, and membership engagement.

Hotels

Traveling for the event? Stay at one of our recommended hotels nearby


The following hotels are recommended by Argyle Executive Forum. Please note that we do not have a corporate rate. For details on where the event will take place, please contact your Argyle relationship manager.

Hotel Blake Chicago logo

Hotel Blake Chicago

500 South Dearborn
Chicago, IL 60605

Telephone: (312) 986-1234