CISO Philadelphia Summit | April 30, 2019 | Le Meridien Philadelphia - Philadelphia, PA, USA

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Tuesday, April 30, 2019 - CISO Philadelphia Summit

8:00 am - 8:45 am

Registration & Networking Breakfast

 

8:45 am - 8:55 am

Welcome Address & Opening Remarks

Presented by:

Thomas Rajtik, FORMER GROUP CIO, DowDupont INC. View details

 
 
 

8:55 am - 9:25 am

Keynote Presentation

Bringing Down the Barriers

With the role of the CIO expanding, CIOs are being pushed to increase digital business by using IT in ways that deliver cost saving methods and increased levels of productivity, as well as new opportunities. However, many believe that current methods for these opportunities have reached their end. As a result, it is time to reconfigure these methods in new, unique ways.

Takeaways:

  1. Latest strategies or methods to increase digital business
  2. How to confront resiliency or resistance to new digital initiatives
  3. The different types of behavioral patterns or mindsets to confront

Presented by:

Neil Gomes, CDO & EVP Technology Innovation & Consumer Experience, Thomas Jefferson University and Jefferson Health View details

 
 
 

9:30 am - 10:00 am

Share:

Keynote Presentation

The State of Security Orchestration and Automation

Alert fatigue is a serious problem in terms of risk management and security analyst turnover. Ted will discuss the current climate within the SOAR space and his views on the trends and future needs of firms seeking to organize Incident Response orchestration. Machine learning and artificial intelligence can assist a security team in prioritizing their response strategy, ensuring that analysts can focus on the critical incidents that could dramatically impact their business. 

Topics covered:

  • Leveraging AI and ML to deal with alert fatigue; 
  • Defining automation and orchestration; 
  • Trends in the SOAR space

Sponsored by:

IBM View details

 
 

Chris Bontempo, VP of NA Security Mktg and Routes, IBM View details

 
 
 

10:05 am - 10:30 am

Executive Exchange

 

Share:

Think Tank

Regulations Mean Change

More complex regulations, such as the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA), have come into play due to the rise of data breaches and violations of privacy. Organizations now have to balance the value and risks associated with the data. Fortunately there is a full range of options for managing the risks in cost effective ways.

Takeaways: 

  1. Understand the demands of the latest regulations, such as GDPR and CCPA
  2. How to tell business stakeholders that data protection can be a key differentiator for your organization
  3. The key steps required for regulatory compliance.

Presented by:

Chris Shull, CISO, The Weichert Companies View details

 
 
 

10:30 am - 10:40 am

Morning Networking Coffee Break

 

10:45 am - 11:10 am

Executive Exchange

 

Share:

Thought Leadership

Managing Risk in a Digital World

As organizations extend technology deeper into their day-to-day business operations, they introduce digital risk. Digital risk refers to unwanted and often unexpected outcomes that stem from digital transformation, digital business processes and the adoption of related technologies. These outcomes may include cybersecurity risk, third-party risk, business continuity risk, data privacy risk and others. These fast-moving and elusive outcomes may be more disruptive than the operational risks that businesses have historically managed.

Sponsored by:

RSA View details

 
 

Kevin Brownstein, Senior Manager of Sales Engineering, RSA View details

 
 
 

11:15 am - 11:40 am

Executive Exchange

 

Share:

Think Tank

Why Digital Culture Matters

As we enter warp speed on our digital transformation journey, success will come to those companies who create an adaptive culture. Today, organizations need to be agile, have appetite for innovation, risk and agile experimentation. There is no standard digital culture but rather characteristics of behavior. 

Takeaways: 

  • Learn how to engage entire organization 
  • Understand how to align and reinforce desired behaviors 
  • Discuss ways to attract, develop and retain digital talent

Presented by:

Tara Matthews, Deputy Chief Information Officer, Einstein Healthcare Network View details

 
 
 

11:45 am - 12:10 pm

Executive Exchange

 

Share:

Thought Leadership

Digital Transformation - Architecting Your Digital Edge

The digital economy is forcing enterprises to transform how they connect customers, partners, employees and operations. Today's market leaders credit their speed and business advantages to their digital platform. Equinix will discuss how an Interconnection Oriented Architecture (IOA(TM)) can redefine the digital edge, providing competitive advantage in today's market. By outlining the four key use cases that all enterprises need to solve for digital, Equinix will provide a roadmap for building a digital ready architecture.

Sponsored by:

Equinix View details

 
 

Dan Eline, Head of Solutions Marketing, East Region, Equinix View details

 
 
 

12:15 pm - 12:40 pm

Executive Exchange

 

Share:

Thought Leadership

From the Front Lines: 5 Best Practices for Application Defense in Depth

Everyone knows applications are the lifeblood of the enterprise, but as the threats multiply and come at an ever-faster rate, protecting those applications becomes a massive challenge. Layer in the issues associated with moving applications to the cloud, using open source code, implementing rapid release cycles, and being forced to use legacy apps when the development team is long gone, and it's easy to see that application security can be a thankless, endless job. 

Layered security, or defense-in-depth, is an admirable goal. The problem is, how do you achieve it? We've been on the front lines for years, finding what works and what doesn't. In the process we have distilled five best practices that will help enterprises of any size tackle the thorny problem of application security in a dynamic world where change is the only constant. 

A combination of defenses at the edge, in the network and inside the applications themselves forms the core of the best practices. Layered on top are two additional practices that make all the difference: full real-time visibility with analytics, to help beleaguered security analysts quickly distinguish real threats from noise and take action based on full context; and a consumption model that allow the enterprise to quickly, easily and cost-effectively move protections to where they will do the most good. The result? Vastly improved application security, effective remediation, and a DevSecOps model that works.

Sponsored by:

Imperva View details

 
 

Jim Burtoft, Senior Security Engineer, Imperva View details

 
 
 

12:40 pm - 1:50 pm

Working Lunch & Panel

The Revitalizing Change in the Role of the CXO

A CXO's role, goals and objectives have drastically changed over the years as most CXOs supervise teams and units beyond their IT/Security departments. Because of these changes in responsibilities, a CXO's success is measured in greater business metrics. As a result, the role of a CXO has become both more attractive and more demanding.

Takeaways:

  1. What are the significant changes regarding the role of the CXO?
  2. How to keep up with the changing requirements
  3. How to properly measure a CXO's success

Moderated by:

Thomas Rajtik, FORMER GROUP CIO, DowDupont INC. View details

 
 

Panelists:

Ed Malinowski, Chief Information Officer and Chief Information Security Officer, BAYADA Home Health Care View details

 
 

Amit Singh, Executive Director IT - Digital Engagement & eCommerce, Verizon Wireless View details

 
 

Roger Caslow, CISO, SUEZ WTS View details

 
 

David Whipple, VP- CISO, Apple Leisure Group View details

 
 
 

1:55 pm - 2:20 pm

Executive Exchange

 

Think Tank

The Solution for Your Legacy System's Security: The Cloud

Over the lifespan of an organization, CIOs/CISOs have developed and implemented technologies that have been key to the organization's success. However, CISOs and their security teams today find themselves stuck ensuring that legacy systems are secure. The solution is cloud-delivered security products that are more agile with the ability to implement new detection methods and services faster than on-site solutions.

While cloud security is an ideal solution, it is important to know that using the cloud is more than moving legacy management servers to the cloud.

Takeaways:

  1. Review the status of legacy system security
  2. What cloud solutions are the best fit for their business
  3. What are the main needs in regards to system's scale, data telemetry, staff growth, machine learning, API-based access, and more

Presented by:

Seth Shestack, Deputy CISO, Temple University View details

 
 
 

2:25 pm - 2:50 pm

Executive Exchange

 

Share:

Executive Boardroom

Minimizing the Detection to Recovery Timeframe

While recent trends have shown attackers are more frequently using simple tools and tactics to make a big impact to the overall global cost of data breaches, sophisticated threat actors utilizing advanced techniques to avoid detection could potentially have the greatest impact to an organization's bottom line. While commodity threats continue to make the case for investment in preventative technologies, stricter regulations around breach notifications all but mandates increased investment in advanced detection and response capabilities. Now more than ever is minimizing the detection to response timeframe of utmost importance to ensure an organization is able to not only detect threats but contain and respond in a time frame that minimizes the potential risk of impacting their clients and suffering the business altering implications of compliance violations. As organizations begin to address this transition, knowing where to start is a challenge. We invite you to join us, as they cover the best path going forward and real-life examples of how advanced detection and response capabilities were able to thwart attackers and satisfy even the most stringent emerging regulatory requirements.

Sponsored by:

eSentire View details

 
 

Matt Smith, Senior Solutions Architect, eSentire View details

 
 

Share:

Executive Boardroom

CIOs: Lead Your Business Transformation by Turning All Your Data Into Action

Data has never been more important ? so why is it so hard to effectively leverage? While everyone is struggling with data silos and data lakes, leading CIOs are operationalizing their data to leverage advanced analytics, AI & Machine Learning capabilities to transform their business. What is the right approach for your business, and what are the factors to consider so that useable data becomes the foundation of your business, leads to improved decision making and delivers a better customer experience? How are leading companies like Bank of America, JPMorgan Chase, Eaton, Aetna, Chevron, and others integrating data across complex operational environments to enable their business transformation? All of these companies take a different approach to achieve their business goals of making data available and interactive with the full provenance, lineage and, most importantly, security needed to make use of the data. 

Takeaways: 

  • How data integration has catapulted business transformation at leading companies 
  • How to evaluate your business, and its data, to gain business advantage

Sponsored by:

MarkLogic View details

 
 

Frank Sieracki, Director Named Accounts, MarkLogic View details

 
 
 

2:55 pm - 3:20 pm

Executive Exchange

 

Share:

Executive Boardroom

Does Data Matter in Business? An interactive and humorous survey of lessons from neuroscience and Tableau's largest customers on Data Science, Executive Decision-Making, and the shift to a Data-Driven Culture

Even as data becomes vogue, and data scientists our new celebrities and heroes, there is a elephant in the middle of the room we don't want to talk about: do people ignore data? More specifically, do executives and decision-makers ignore what the data says? Learn what neuroscience says about why we ignore data, what some leading companies are doing about it, and what you can do to ensure that you're not left behind.

Sponsored by:

Tableau Software View details

 
 

Naisan Geula, Presales Senior Director, Tableau Software View details

 
 

Share:

Executive Boardroom

Changing Work Through Digital Innovation

This presentation will highlight why and how companies are changing the way they work, with examples that build on connectivity, intelligence, and flexible automation. Our examples of digital innovation will incorporate IoT, artificial intelligence, and other technologies.

Sponsored by:

Insight Cloud + Data Center Transformation View details

 
 

Kim Knickle, Senior Architect, Digital Innovation Services, Insight Cloud + Data Center Transformation View details

 
 
 

3:20 pm - 3:30 pm

Afternoon Networking Coffee Break

 

3:35 pm - 4:00 pm

Executive Exchange

 

Think Tank

The Future of Autonomous Things

Today, we are seeing more Autonomous Things technology than ever before. As a result, functions formerly performed by humans are being replaced with AI. This technology's automation goes beyond the automation by using AI to deliver innovative behaviors that interact more efficiently and effectively with their surroundings and with their end-users.

Takeaways:

  1. Cover the latest innovations in autonomous and networked entities for 2019
  2. Learn how these innovations will shape the different industries and business landscapes
  3. Discuss the potential compromises to privacy and safety in the future of AI

Presented by:

Nehal Trivedi, SVP Enterprise Platform Services, Realogy Holdings Corp.

 
 

4:05 pm - 4:30 pm

Executive Exchange

 

Share:

Thought Leadership

The Future of Work

The definition of work-life balance has changed, and the nature of work has changed. Life, family, and work are all integrated, we need software solutions that allow us the flexibility to live our lives and attract a diverse talent. Solutions that improve experience locally while allowing us to operate globally removing the friction, increasing productivity improving employee experience and in turn positively impacting the customer experience. Focused on retention and customer satisfaction.

Sponsored by:

RingCentral View details

 
 

Naveed Husain, Vice President Office of the CIO, RingCentral View details

 
 
 

4:35 pm - 5:00 pm

Executive Exchange

 

Think Tank

Establishing Trust Through Digital Ethics & Privacy

With 2018's major hacks and breaches, people are becoming increasingly concerned about how organizations in both the public and private sector are using their information. More importantly, there is serious alarm as these organizations that are not proactively addressing these concerns. 

Takeaways:

  1. How to learn from others' security mistakes
  2. Cover the broader topic of digital ethics and the trust of your customers and employees
  3. What steps your organization can take to establish trust

Presented by:

Peter Kress, SVP/CIO, Acts Life Retirement View details

 
 
 

5:00 pm - 5:15 pm

What's the Next Stop On the Transformation Journey?

Our Governing Board will summarize the learnings from the day and discuss the path forward for building an ongoing community of CIOs, where common issues can be addressed and success stories can be shared.

Takeaways:

  1. Building an ongoing community with your peers can be an invaluable resource for tackling the digital transformation projects ahead of you
  2. Sharing stories of success (and failures) is not reserved to a one-day CIO Summit, but should be shared on a regular basis with your peers

Presented by:

Thomas Rajtik, FORMER GROUP CIO, DowDupont INC. View details

 
 
 

5:15 pm - 6:30 pm

Summit Happy Hour