Chief Information Security Officer

1 Day Meeting

CYBERSECURITY LEADERSHIP FORUM - San Francisco

Mar 19, 2020

Overview

The Argyle Group presents the CYBERSECURITY LEADERSHIP FORUM – San Francisco event, an intimate gathering of CISOs and senior-level IT & cybersecurity executives in search of peer-to-peer discussions and deep-dive examination of techniques and technologies the space is sourcing and implementing to shield their organization against the ever-increasing array of threats, with an emphasis on advanced threat defense, endpoint protection, cloud security, security analytics and intelligence, data protection, and emerging trends in identity and access management.

By attending this exclusive event, you will better understand:

  • How to effectively communicate requirements to stakeholders in order to protect the integrity of your data and privacy protection strategies
  • Responding to business risks in real-time with integrated risk management
  • How to develop actionable strategies to protect your organizations from existing and emerging threats

Join us for this day of deep dive discussions regarding the above and more – as well as our CIO LEADERSHIP FORUM - San Francisco event taking place the day before on Wednesday, March 18.  Attend one or both events and walk away with actionable steps that will enable you to take your organization to the next level with its overall digital and data security strategies.

Join Us at this Event

Enter your mobile number to receive updates and reminders regarding this event.

Who Should Attend

Speakers

If you'd like to recommend a speaker, please email speakerinquiry@argyleforum.com

Jon Markoff

Jon Markoff

Head of Android Enterprise and Security Developer Relations

Google

Enrique Alvarez

Enrique Alvarez

Special Agent, Cyber Branch

FBI

Amit Bhardwaj

Amit Bhardwaj

Chief Information Security Officer

Lumentum

Jadee Hanson

Jadee Hanson

CISO & Vice President, Information Systems

Code 42

Roderick Kaleho

Roderick Kaleho

Product Development & Delivery Lead Technology Governance, Risk, & Controls | Global IT

Cargill

Vijaya Kaza

Vijaya Kaza

Chief Security Officer and Head of Trust Engineering & Data Science

Airbnb

Tolgay Kizilelma

Tolgay Kizilelma

CISO

University of California, Merced

Sathish Kuppuswamy

Sathish Kuppuswamy

Chief Security Architect, Cybersecurity Leader

PG&E

Ken Malcolmson

Ken Malcolmson

Chief Security Advisor, Americas Cybersecurity Solutions Group

Microsoft

Madjid Nakhjiri

Madjid Nakhjiri

Jump Security Lead & Advanced Platform Security

Uber

Sasi Pillay

Sasi Pillay

Vice President and Chief Information Officer

Washington State University

Jutta Williams

Jutta Williams

Sr. Technical Program Manager for Data Protection

Facebook

Agenda

Download Agenda
7:45am - 8:45am
Networking Breakfast
8:45am - 8:50am
Argyle Opening Remarks
8:50am - 9:20am
KEYNOTE PRESENTATION: Google's Advice On Building Security Into Your Mobile Software Development Life-cycle

What does it mean to build a secure product? How do you ensure your product is designed securely before writing the first line of code or picking the first component? And how do you prove it to leadership and external entities such as auditors or regulators? We will discuss how to produce secure products, get executive buy in, generate artifacts for compliance and more. I will be giving an overview of common vulnerabilities that security researchers find in top apps on Google Play and show how to find them, and how to fix them.

Jon Markoff
Head of Android Enterprise and Security Developer Relations
Google

9:20am - 9:55am
Table Talks

Join us for these intimate group peer-to-peer Table Talk discussions, whereas topics of discussion will be based upon the topics you indicated you would like to discuss further, as per your answers in Argyle’s pre-event insight survey. In these off-the-record exchanges of ideas, session attendees will have the opportunity to share their greatest challenges, pain points, and real-world decision-making efforts & solutions to said obstacles.

9:55am - 10:15am
THOUGHT LEADERSHIP: From minutes to milliseconds - strategies for success

Ransomware, sophisticated attackers, destructive worms, and more - organizations need to respond to a tremendous volume of emerging threats in real-time, without overwhelming their security professionals. This session will explore some of the strategies and tactics that we see making a real difference in the success – or failure – of organizations’ defensive postures.

Ken Malcolmson
Chief Security Advisor
Microsoft

10:15am - 10:40am
Networking Break
10:40am - 11:10am
KEYNOTE PRESENTATION: Re-Frame and Re-Think Information Security

In this Session, Vijaya will provide her insight and various ideas to help you and your organization look at information security in a non-traditional light. Thinking along these lines will help you create security roadmaps that promote innovation and drive differentiation, increase security, and communicate effectively with your stakeholders. 

Key takeaways from this presentation include:

  • Re-thinking cybersecurity as a product
  • Understanding key values
  • Evaluating the product life cycle of cybersecurity

 

Vijaya Kaza
Chief Information Security Officer
Airbnb

11:10am - 11:30am
THOUGHT LEADERSHIP: Effectively Communicated Cybersecurity Prevention & Awareness

Every organization relies heavily on its cybersecurity and IT leadership to help identify and report cyber threats.  They also lean on you and your teams to properly train them on how to best prevent attacks before they happen.  That said, being able to simplify technological jargon and protocols into business terms employees can easily understand is essential.

In this session, topics of discussion will include, yet will not be limited to:

  • Emphasizing the importance of password strength and protection
  • Developing smart habits and limiting shared information with outside sources
  • Devising cyberattack prevention plans
11:30am - 12:15pm
PANEL DISCUSSION: Data Protection from Insider Threats

As CISOs and senior-level cybersecurity and technology executives, you and your teams spend extensive time and money preparing for external threats – but what about insider threats?  Insider threats is the fastest growing risk organizations face today and in today’s workplace because people and data are on the move like never before. Job tenure is declining and the ways in which data moves is increasing at an unprecedented pace. The reality is - prevention is no longer enough.

In this session, topics of discussion will include:

  • Implementing security measures to quickly identify and respond to insider threats to data
  • Understanding high risk users and how to create an insider threat program to protect your organization   
  • Changing the perception of your security team as the 'no' police to the protectors of collaboration

Moderator:

Tolgay Kizilelma
Chief Information Security Officer
University of California, Merced

Panelists: 

Amit Bhardwaj
Chief Information Security Officer
Lumentum

Jadee Hanson 
Chief Information Security Officer & Vice President, Information Systems
Code 42

Roderick Kaleho
Director Security & Risk - IAM, Automation
Cargill

Sathish Kuppuswamy
Chief Security Architect, Cybersecurity Leader
PG&E

12:15pm - 1:15pm
Networking Lunch

 

1:15pm - 1:45pm
KEYNOTE PRESENTATION: Hindsight in 2020: Lessons Learned in Cybersecurity

Michael Duff will discuss his soon-to-be published book, Hindsight in 2020: Lessons Learned in Cybersecurity, a collection of succinct reflections on what's working and what's not working in enterprise infosec, examining preventative and compensatory controls, incentives, and culture.

1:45pm - 2:15pm
KEYNOTE PRESENTATION: Maximizing Your Relations with the FBI to Assist in Cybersecurity

Effectively working with the FBI as collaborative partners in the prevention, identification, and reporting of cyber threats and attacks is critical to your organization’s data protection strategies.  The FBI certainly has the resources and knowledge to assist organizations in cyberattacks.  However, sometimes it’s not easy to fully understand the breadth of involvement they can offer your team.

In this session, key takeaways will include, yet will not be limited to:

  • How to best utilize the FBI’s resources and intelligence infrastructure
  • Areas in which the FBI can assist in cybercrime prevention and response
  • Important contacts with the FBI and other supporting intelligence agencies

Enrique Alvarez
Special Agent
Federal Bureau of Investigations (FBI)

2:15pm - 2:40pm
Networking Break
2:40pm - 3:25pm
ROUNDTABLE DISCUSSION: Is There a Future in Federal Regulations?

Presently, cybersecurity and privacy regulations are limited to a state-level and there aren’t any federal regulations in pace at this time.  Unfortunately, if regulations continue to develop on a state-level and every state creates their own laws, this may result in a mess of regulations across the country. 

In this session, we will conduct a very lively group discussion regarding this hot topic and it’s feasibility in the future, as well as discuss the below:

  • Would federal regulations provide consistency and eliminate guidelines confusion?
  • Pros & cons of federal regulations
  • Government involvement, including FBI intervention
3:25pm - 4:10pm
PANEL DISCUSSION: Top Cybersecurity Regulations - the What, How & When?

Having a deep understanding of the cybersecurity regulations currently in place and the specific information that is being extracted through breaches is of course a top priority for you and your teams.  A short list of the regulations you may actively stay abreast of  include data collection practices and the responsibility of protecting all collected data against cyberattacks including viruses, phishing, and information theft.

By attending this session, your key takeaways will include:

  • Better understanding of the current cybersecurity laws and regulations
  • Solutions that ease the burden of compliance and help organizations understand the necessary regulations
  • The importance of protecting all confidential information from cyberattacks

Panelists: 

Madjid Nakhjiri
Jump Security Lead & Advanced Platform Security
Uber

Gopal Bhat
Former CIO and CISO
Rakuten Rewards

4:10pm - 4:20pm
Argyle Closing Remarks
4:20pm - 5:20pm
Closing Network Cocktail Reception

Stay with us to unwind with your colleagues over cocktails and great conversation. We'll also be holding a prize drawing, and you must be present to win!

Sponsors

This event will feature insights from top executives, including

  • Thought Leadership Spotlight & App Partner

  • Panel & App Partner

  • Senior Supporter Partner

Interested in sponsoring an event?

Speak to one of our dedicated sponsorship teams sponsorship@argyleforum.com

Sponsorship Information

Advisory Board

We are proud to share with you the following Argyle Industry Influencers. Their contributions to Argyle help keep the programs we offer our membership current and relevant, so we can continue delivering you premiere experiences, content development, and membership engagement.