Chief Information Security Officer

CYBERSECURITY LEADERSHIP FORUM - San Francisco

Apr 2020

Overview

The Argyle Group presents the CYBERSECURITY LEADERSHIP FORUM – San Francisco event, an intimate gathering of CISOs and senior-level IT & cybersecurity executives in search of peer-to-peer discussions and deep-dive examination of techniques and technologies the space is sourcing and implementing to shield their organization against the ever-increasing array of threats, with an emphasis on advanced threat defense, endpoint protection, cloud security, security analytics and intelligence, data protection, and emerging trends in identity and access management.

By attending this exclusive event, you will better understand:

  • How to effectively communicate requirements to stakeholders in order to protect the integrity of your data and privacy protection strategies
  • Responding to business risks in real-time with integrated risk management
  • How to develop actionable strategies to protect your organizations from existing and emerging threats

Join us for this day of deep dive discussions regarding the above and more – as well as our CIO LEADERSHIP FORUM - San Francisco event taking place the day before on Wednesday, March 18.  Attend one or both events and walk away with actionable steps that will enable you to take your organization to the next level with its overall digital and data security strategies.

Join Us at this Event

Enter your mobile number to receive updates and reminders regarding this event.

Who Should Attend

Speakers

If you'd like to recommend a speaker, please email speakerinquiry@argyleforum.com

Enrique Alvarez

Enrique Alvarez

Special Agent, Cyber Branch

FBI

Ananth Appathurai

Ananth Appathurai

SVP, Strategic Partnerships & Ecosystem

Code 42

Amit Bhardwaj

Amit Bhardwaj

Chief Information Security Officer

Lumentum

Elvis Chan

Elvis Chan

Supervisory Special Agent

Federal Bureau of Investigation

Brian Costello

Brian Costello

Vice President Data Access Strategy and Strategic Solutions

Envestnet, Inc.

W. Reece Hirsch

W. Reece Hirsch

Partner, Co-Head Privacy and Cybersecurity

Morgan, Lewis & Bockius LLP

Roderick Kaleho

Roderick Kaleho

Product Development & Delivery Lead Technology Governance, Risk, & Controls | Global IT

Cargill

Tolgay Kizilelma

Tolgay Kizilelma

CISO

University of California, Merced

Natasha G. Kohne

Natasha G. Kohne

Partner, Co-Head Privacy and Data Protection

Akin Gump

Sathish Kuppuswamy

Sathish Kuppuswamy

Chief Security Architect, Cybersecurity Leader

PG&E

Ken Malcolmson

Ken Malcolmson

Chief Security Advisor, Americas Cybersecurity Solutions Group

Microsoft

Madjid Nakhjiri

Madjid Nakhjiri

Jump Security Lead & Advanced Platform Security

Uber

Donna M. Peterson

Donna M. Peterson

Supervisory Special Agent (SSA)

FBI

Sasi Pillay

Sasi Pillay

Vice President and Chief Information Officer

Washington State University

Agenda

Download Agenda
7:45am - 8:45am
Networking Breakfast
8:45am - 8:50am
Argyle Opening Remarks
8:50am - 9:20am
KEYNOTE PRESENTATION: Google's Advice On Building Security Into Your Mobile Software Development Life-cycle

What does it mean to build a secure product? How do you ensure your product is designed securely before writing the first line of code or picking the first component? And how do you prove it to leadership and external entities such as auditors or regulators? We will discuss how to produce secure products, get executive buy in, generate artifacts for compliance and more. I will be giving an overview of common vulnerabilities that security researchers find in top apps on Google Play and show how to find them, and how to fix them.

9:20am - 9:55am
Table Talks

Join us for these intimate group peer-to-peer Table Talk discussions, whereas topics of discussion will be based upon the topics you indicated you would like to discuss further, as per your answers in Argyle’s pre-event insight survey. In these off-the-record exchanges of ideas, session attendees will have the opportunity to share their greatest challenges, pain points, and real-world decision-making efforts & solutions to said obstacles.

9:55am - 10:15am
THOUGHT LEADERSHIP: From minutes to milliseconds - strategies for success

Ransomware, sophisticated attackers, destructive worms, and more - organizations need to respond to a tremendous volume of emerging threats in real-time, without overwhelming their security professionals. This session will explore some of the strategies and tactics that we see making a real difference in the success – or failure – of organizations’ defensive postures.

Ken Malcolmson
Chief Security Advisor
Microsoft

10:15am - 10:40am
Networking Break
10:40am - 11:10am
KEYNOTE PRESENTATION

Session description coming soon...

Sasi Pillay
Vice President and Chief Information Officer
Washington State University

11:10am - 11:30am
THOUGHT LEADERSHIP: Effectively Communicated Cybersecurity Prevention & Awareness

Every organization relies heavily on its cybersecurity and IT leadership to help identify and report cyber threats.  They also lean on you and your teams to properly train them on how to best prevent attacks before they happen.  That said, being able to simplify technological jargon and protocols into business terms employees can easily understand is essential.

In this session, topics of discussion will include, yet will not be limited to:

  • Emphasizing the importance of password strength and protection
  • Developing smart habits and limiting shared information with outside sources
  • Devising cyberattack prevention plans

Natasha G. Kohne
Partner, Co-Head Privacy and Data Protection
Akin Gump

11:30am - 12:15pm
PANEL DISCUSSION: Data Protection from Insider Threats

As CISOs and senior-level cybersecurity and technology executives, you and your teams spend extensive time and money preparing for external threats – but what about insider threats?  Insider threats is the fastest growing risk organizations face today and in today’s workplace because people and data are on the move like never before. Job tenure is declining and the ways in which data moves is increasing at an unprecedented pace. The reality is - prevention is no longer enough.

In this session, topics of discussion will include:

  • Implementing security measures to quickly identify and respond to insider threats to data
  • Understanding high risk users and how to create an insider threat program to protect your organization   
  • Changing the perception of your security team as the 'no' police to the protectors of collaboration

Moderator:

Tolgay Kizilelma
Chief Information Security Officer
University of California, Merced

Panelists: 

Amit Bhardwaj
Chief Information Security Officer
Lumentum

Ananth Appathurai  
Code 42

Roderick Kaleho
Director Security & Risk - IAM, Automation
Cargill

Sathish Kuppuswamy
Chief Security Architect, Cybersecurity Leader
PG&E

12:15pm - 1:15pm
Networking Lunch

 

1:15pm - 1:45pm
KEYNOTE PRESENTATION:California's New Reasonable Security Laws

California has long been on the cutting edge of privacy and data security law, and that is more true than ever in 2020. This session will provide an overview of two important new California data security laws that turn upon the meaning of “reasonable security” – the California Internet of Things Security Law and the California Consumer Privacy Act, including:

  • The critical role of reasonable security in defending CCPA security breach class action lawsuits
  • How reasonable security must be applied in granting CCPA consumer privacy rights
  • The clear, and not so clear, requirements of the IoT security law

W. Reece Hirsch
Partner, Co-Head Privacy and Cybersecurity
Morgan, Lewis & Bockius LLP

1:45pm - 2:15pm
KEYNOTE PRESENTATION: Maximizing Your Relations with the FBI to Assist in Cybersecurity

Effectively working with the FBI as collaborative partners in the prevention, identification, and reporting of cyber threats and attacks is critical to your organization’s data protection strategies.  The FBI certainly has the resources and knowledge to assist organizations in cyberattacks.  However, sometimes it’s not easy to fully understand the breadth of involvement they can offer your team.

In this session, key takeaways will include, yet will not be limited to:

  • How to best utilize the FBI’s resources and intelligence infrastructure
  • Areas in which the FBI can assist in cybercrime prevention and response
  • Important contacts with the FBI and other supporting intelligence agencies

Enrique Alvarez
Special Agent
Federal Bureau of Investigations (FBI)

2:15pm - 2:40pm
Networking Break
2:40pm - 3:25pm
ROUNDTABLE DISCUSSION: Is There a Future in Federal Regulations?

Presently, cybersecurity and privacy regulations are limited to a state-level and there aren’t any federal regulations in place at this time. Unfortunately, if regulations continue to develop on a state-level and every state creates their own laws, this may result in a mess of regulations across the country. 

In this session, we will conduct a very lively group discussion regarding this hot topic and it’s feasibility in the future, as well as discuss the below:

  • Would federal regulations provide consistency and eliminate guidelines confusion?
  • Pros & cons of federal regulations
  • Government involvement- balancing privacy vs. security

Donna M. Peterson
Supervisory Special Agent
FBI

3:25pm - 4:10pm
PANEL DISCUSSION: Top Cybersecurity Regulations - the What, How & When?

Having a deep understanding of the cybersecurity regulations currently in place and the specific information that is being extracted through breaches is of course a top priority for you and your teams.  A short list of the regulations you may actively stay abreast of  include data collection practices and the responsibility of protecting all collected data against cyberattacks including viruses, phishing, and information theft.

By attending this session, your key takeaways will include:

  • Better understanding of the current cybersecurity laws and regulations
  • Solutions that ease the burden of compliance and help organizations understand the necessary regulations
  • The importance of protecting all confidential information from cyberattacks

Moderator:

W. Reece Hirsch
Partner, Co-Head Privacy and Cybersecurity
Morgan, Lewis & Bockius LLP

Panelists: 

Madjid Nakhjiri
Jump Security Lead & Advanced Platform Security
Uber

Brian Costello
Vice President Data Access Strategy and Strategic Solutions
Envestnet, Inc.

4:10pm - 4:20pm
Argyle Closing Remarks
4:20pm - 5:20pm
Closing Network Cocktail Reception

Stay with us to unwind with your colleagues over cocktails and great conversation. We'll also be holding a prize drawing, and you must be present to win!

Sponsors

This event will feature insights from top executives, including

  • Thought Leadership Spotlight & App Partner

  • Senior Supporter Partner

  • Senior Supporter Partner

Interested in sponsoring an event?

Speak to one of our dedicated sponsorship teams sponsorship@argyleforum.com

Sponsorship Information

Advisory Board

We are proud to share with you the following Argyle Industry Influencers. Their contributions to Argyle help keep the programs we offer our membership current and relevant, so we can continue delivering you premiere experiences, content development, and membership engagement.