Dallas_homepage-2019

DALLAS 2019 AGENDA

7:15am – 8:30am

8:30am – 8:50am
Registration

Welcome and Opening Remarks

heastings.jpg
Mary Lou Heastings
CEO
Executive Alliance Inc.
Bio

8:50am – 9:20am

The High Stakes of Security
Richard-Warner

Richard Warner 
Former PBS Host and Georgia Radio Hall of Fame Inductee

Bio

Former host of Georgia Business on PBS and executive security strategist, Richard Warner revealed the statistics that were conglomerated from industry leading whitepapers and illustrated the takeaways gleaned from the research.

9:20am – 9:45am

Evolution of the CISO

mike tiddy_150.png

Mike Tiddy

CISO

BNSF Railway Company

Bio
Cynthia Watson
Cynthia Watson
SVP CISO
First Financial Bankshares, Inc.
Bio

Company decisions are being driven by technologies that foster increased productivity and bring growth to the bottom line, which in turn presents opportunities for leadership teams to re-invent and transform their businesses.  How does the CISO of today become the CISO of tomorrow, with capabilities to navigate through change and disruptions that impact their business?

9:45am – 10:15am

Network Data: Powering the Modern SOC

Bollom_150

Charlie Bollom

Vice President of Sales

ExtraHop, Platinum Sponsor

Bio

Data is a blessing and a curse. Get the right data, in the right amount, at the right time, and you are in the driver’s seat. The wrong data, too little data, too much data, or the wrong timing, and you are in the hot seat. The explosion of data and its byproduct, network traffic, create structural problems for the SOC.

In this session, attendees will learn how taking a different approach to data – one that emphasizes speed, fidelity, and the elimination of data silos – can enable more successful threat hunting and incident response. Topics covered include the impact of TLS 1.3 and encryption on data and its ripple effect on security operations, as well as best practices for threat hunting. The session will also delve into how network traffic analysis can serve as the foundation of more effective security practices, data-driven decisions, and a mature, proactive SOC.

10:15am – 10:50am

Break and Networking in the Sponsor Pavilion

10:50am – 11:10am

The Year Ahead

benoit

Patrick Benoit

Deputy CISO

Cheetah Digital

Bio

As the breadth and complexity of information security threats continue to increase, security leaders are increasing their focus on building an organization that is able to detect, analyze, take action, recover, and communicate.  As part of this focus, developing a risk resilience environment, with input from the business units, will take center stage. Join In this interview session, CISOs will share insights on their strategies and supporting plans to continue to build a resilient environment for their companies.

11:10am – 11:40am

Navigating through Cloud Security

Vancil_150

Todd Vancil

Vice President, Americas Systems Engineering

Symantec, Platinum Sponsor

Bio

Understand how advanced security tools and techniques can help you take back control of your cloud apps, cloud data and rogue users.

  • Learn how to protect sensitive data and intellectual property inside and outside your perimeter,

  • See what cloud apps are being used and how to easily protect all cloud apps, not just the most popular ones

  • Get rid of manual auditing and quickly discover sensitive assets stored in the cloud

11:40am – 11:50am

What’s Next?

This Interactive polling session with executives in attendance. focuses on priorities, execution and adding value.

11:50am – 12:10pm

Mitigating the Resurgence of Ransomware Attacks with Identity Governance

Blaylock_150

Donovan Blaylock

Technology Evangelist

SailPoint, Gold Sponsor

Bio

Ransomware… To different extents we are all familiar with this term. Today I’d like to focus on how we have seen Identity Governance used as a part of an enterprise’s overall Security architecture to help mitigate the risk and breadth of different kinds of ransomware attacks. 

 

12:10pm – 12:30pm

The X Factor in an “A” Team

Mindset…this team knows it can deliver.  What does it take to find and build a team that is invested, persistent, and knows how to overcome major challenges thrown its way? In an interview setting, CISOs will share their insights into the traits that make up “A” team members, why they are great problem solvers, and how to keep these employees motivated and challenged.

12:30pm – 1:35pm

Lunch and Networking

1:35pm – 1:55pm

What is Cryptojacking? How to Prevent your Network from Being Exploited

marshall_150

David Marshall

Resales Solutions Architect

Allot Communications, Gold Sponsor

Bio

Crypto-jacking, the hijacking of IT resources for the purpose of covert crypto-mining, made its first appearance in September of 2017. Since then it has surpassed many other cybercrimes such as ransomware and as such is of primary concern. 

The right approach to protecting against this threat and indeed others, is a layered approach that implement protections at all phases of a successful crypto-jacking attack; infiltration, infecting end-points with crypto-mining software, mining and exfiltration of the cryptocurrency. No end-point is safe crypto-jacking has been uncovered on computers, smartphones and IoT devices, including physical security devices.

1:55pm – 2:10pm

Senior Management’s Toughest Questions

In an interactive polling session, executives in attendance will weigh in on what their senior team is asking and holding them accountable for.

2:10pm – 2:20pm

What is “Zero Trust” and How Can I Get There?

cox_150-1

Allan Cox

Principal Solutions Engineer

CyberArk, Silver Sponsor

Bio

The term “Zero Trust” has been making the rounds since Forrester coined it as a new way to think about our security architecture. The premise is we should not trust anything inside or outside our networks and verify everything and anything trying to connect to the networks. So, what does “Zero Trust” really mean to our organizations? 

2:20pm – 2:45pm

Scaling the Organization

With limited resources available, CISOs are looking in new directions on how they can continue to keep pace with the demand from their companies.  The focus of this session is on innovation, productivity, and other ways for security organizations to work smarter. 

2:45pm – 2:55pm
Past the Perimeter: Earned Access Through A Zero-Trust Model
Cantwell_150

Matthew Cantwell

Enterprise Sales

Duo Security,  Silver Sponsor

Bio

In this talk you will learn:

  • Why the traditional perimeter-focused security model won’t meet the needs of most modern organizations
  • How a zero-trust security model can overcome these challenges
  • How you can incorporate this approach into your existing architecture without starting from scratch.
2:55pm – 3:30pm

Break and Networking

3:30pm – 4:30pm

Executive Roundtable Discussions

Facilitated by executives, breakout sessions with your peers on topics determined by attendees during registration.

Dunn

Topic #1: Measuring Security as a Business Value

Kevin Dunn

SVP and Chief Information Officer / CISO

U.S. Retirement & Benefits Partners

Bio
babu

Topic #2:  The Zero Trust Security Model

Dorai Babu

Director of Security

The Travelers Companies

Bio
Asif

Topic #3: Examining the Threat Landscape

Asif Effendi

Director of Security

Baker Hughes, a GE Company

Bio
shah_150
Topic #4:  Developing Talent for the Future
Jaimin Shah
Information Security Officer
Greystar
Bio
baum_150

Topic #5: Security Analytics & Threat Intelligence – Are We There Yet?

Clay Baum

Information Security Officer

Origin Bank 

lytle_150

Topic #6: Adaptive Security – Innovating for the Future

Joel Lytle

Director of Information Security

Jackson Walker LLP

RAM_150

Topic #7: Blockchain

Dr. Ram Dantu

Director, Center for Information and Cyber Security

University of North Texas (UNT)

Bio
4:30pm – 4:45pm

Closing Remarks

4:45pm – 5:45pm 
Reception and Networking with Prize Drawings