CX WEBINAR: Boosting your CX with Personalization
1 Day Meeting
Mar 19, 2020
The Argyle Group presents the CYBERSECURITY LEADERSHIP FORUM – San Francisco event, an intimate gathering of CISOs and senior-level IT & cybersecurity executives in search of peer-to-peer discussions and deep-dive examination of techniques and technologies the space is sourcing and implementing to shield their organization against the ever-increasing array of threats, with an emphasis on advanced threat defense, endpoint protection, cloud security, security analytics and intelligence, data protection, and emerging trends in identity and access management.
By attending this exclusive event, you will better understand:
Join us for this day of deep dive discussions regarding the above and more – as well as our CIO LEADERSHIP FORUM - San Francisco event taking place the day before on Wednesday, March 18. Attend one or both events and walk away with actionable steps that will enable you to take your organization to the next level with its overall digital and data security strategies.
If you'd like to recommend a speaker, please email firstname.lastname@example.org
What does it mean to build a secure product? How do you ensure your product is designed securely before writing the first line of code or picking the first component? And how do you prove it to leadership and external entities such as auditors or regulators? We will discuss how to produce secure products, get executive buy in, generate artifacts for compliance and more. I will be giving an overview of common vulnerabilities that security researchers find in top apps on Google Play and show how to find them, and how to fix them.
Head of Android Enterprise and Security Developer Relations
Join us for these intimate group peer-to-peer Table Talk discussions, whereas topics of discussion will be based upon the topics you indicated you would like to discuss further, as per your answers in Argyle’s pre-event insight survey. In these off-the-record exchanges of ideas, session attendees will have the opportunity to share their greatest challenges, pain points, and real-world decision-making efforts & solutions to said obstacles.
Attend this session to learn more about the various technical applications that can offer your organization increased data and security protection.
In this Session, Vijaya will provide her insight and various ideas to help you and your organization look at information security in a non-traditional light. Thinking along these lines will help you create security roadmaps that promote innovation and drive differentiation, increase security, and communicate effectively with your stakeholders.
Key takeaways from this presentation include:
Chief Information Security Officer
Every organization relies heavily on its cybersecurity and IT leadership to help identify and report cyber threats. They also lean on you and your teams to properly train them on how to best prevent attacks before they happen. That said, being able to simplify technological jargon and protocols into business terms employees can easily understand is essential.
In this session, topics of discussion will include, yet will not be limited to:
As CISOs and senior-level cybersecurity and technology executives, you and your teams spend extensive time and money preparing for external threats – but what about insider threats? Insider threats is the fastest growing risk organizations face today and in today’s workplace because people and data are on the move like never before. Job tenure is declining and the ways in which data moves is increasing at an unprecedented pace. The reality is - prevention is no longer enough.
In this session, topics of discussion will include:
Chief Security Architect, Cybersecurity Leader
Chief Information Security Officer
University of California, Merced
Michael Duff will discuss his soon-to-be published book, Hindsight in 2020: Lessons Learned in Cybersecurity, a collection of succinct reflections on what's working and what's not working in enterprise infosec, examining preventative and compensatory controls, incentives, and culture.
Effectively working with the FBI as collaborative partners in the prevention, identification, and reporting of cyber threats and attacks is critical to your organization’s data protection strategies. The FBI certainly has the resources and knowledge to assist organizations in cyberattacks. However, sometimes it’s not easy to fully understand the breadth of involvement they can offer your team.
In this session, key takeaways will include, yet will not be limited to:
Federal Bureau of Investigations (FBI)
Presently, cybersecurity and privacy regulations are limited to a state-level and there aren’t any federal regulations in pace at this time. Unfortunately, if regulations continue to develop on a state-level and every state creates their own laws, this may result in a mess of regulations across the country.
In this session, we will conduct a very lively group discussion regarding this hot topic and it’s feasibility in the future, as well as discuss the below:
Having a deep understanding of the cybersecurity regulations currently in place and the specific information that is being extracted through breaches is of course a top priority for you and your teams. A short list of the regulations you may actively stay abreast of include data collection practices and the responsibility of protecting all collected data against cyberattacks including viruses, phishing, and information theft.
By attending this session, your key takeaways will include:
Jump Security Lead & Advanced Platform Security
Technical Program Manager for Data Protection
Stay with us to unwind with your colleagues over cocktails and great conversation. We'll also be holding a prize drawing, and you must be present to win!
We are proud to share with you the following Argyle Industry Influencers. Their contributions to Argyle help keep the programs we offer our membership current and relevant, so we can continue delivering you premiere experiences, content development, and membership engagement.