Powered by

13 - 15 Sep • America • Online

Building a Positive Security Culture Across the Business

Days

Hours

Mins

Secs

Security Digital Summit

With an increase in online activity due to the pandemic, CISOs are facing a barrage of new challenges.

Join 70+ senior Security leaders on business-critical challenges and disruptive technology and drive your industry forward collaboratively.

70

Attendees

100%

Senior Executives

9 Hrs

Industry Insights
image/svg+xml Watch video

Why Attend

Connect with 70+ senior Security leaders for a curated agenda focused on tackling your current business critical challenges and driving industry forward. Our summits are designed to help you:

Build new connections with likeminded senior leaders

Stay current with emerging business trends

Understand the impact new technology can make

De-risk new projects by gaining a broad range of insights

Accelerate key projects through meaningful new partnerships

Downloadable and actionable takeaways

Event agenda

Day one
Day two
Day three

09:00 - 09:20

09:00 - 09:20

Opening Remarks

Intro & Challenger Panel

3 Roundtable moderators

09:20 - 09:50

09:20 - 09:50

Keynote

Mission Focused Security

As the CISO for your organization, you’ll have your projects and deliverables in your head, and your cyber team will recognize the importance – but how do you translate that to the board?

Mark Odom CISO, Jefferson Health

09:55 - 10:35

09:55 - 10:35

Workshop

Supply Chain Attacks; The Good, The Bad, and the Ugly

Build and Sign process - ensuring integrity throughout this process

Scott Holt Director, Security Solution, CMD

10:35 - 10:45

10:35 - 10:45

Insight Break

10:45 - 11:45

10:45 - 11:45

Roundtables

Track 1: Underground or in the Cloud: The Reality of Risk Being Omnipresent

Risk, by its very definition, is something deemed uncontrollable – and it’s fast become realized by organizations the need to invest heavily in security.

Siva VRS GM & Global Practice Head of Security, Wipro
Shawn Kirk Global Head of Security, Identity and Compliance Specialized Sales, AWS

Track 2: Data Pirates & How to Protect your Treasure

The volumes of data we accumulate transcends departments within the organization of the 21st century and shows no signs of slowing down.

Mike Britton Chief Information Security Officer, Abnormal Security

Track 3: What You Need to Know “Now” about Modern Application Development (MAD)

Today, software-driven organizations must continue to innovate, and due to the pressures of digital transformation, they are beginning to agree that their software development models, and release frequencies, can no longer keep pace

Peter Chestna CISO North America, Checkmarx

11:50 - 12:20

11:50 - 12:20

Closing Keynote

Ransomware: The Virtual Pandemic

In 2020, ransomware attacks were more expensive than the average cyber-attack, costing organizations around $4.44 million – and the maliciousness of the crime means we need to take them far more seriously than the average data breach.

Chuks Ojeme Global Chief Information Security and Compliance Officer, Brenntag

09:00 - 09:10

09:00 - 09:10

Opening Remarks

09:10 - 09:40

09:10 - 09:40

Workshop

Understanding Your Insider Risk, and the Value of Your Intellectual Property

The term insider refers to known users (or systems) with authorized access to your organization's systems, applications, and data.

Derek Brink VP & Research Fellow, Aberdeen

09:45 - 10:25

09:45 - 10:25

Interactive Panel

Leveraging Data and Modeling to Understand Ransomware and Financial Exposure

The list of high-profile ransomware victims is long and growing. So are the costs to recover from these crimes.

Stephen Boyer CTO & Co-Founder, BitSight Technologies

10:25 - 10:35

10:25 - 10:35

Insight Break

10:35 - 11:35

10:35 - 11:35

Roundtables

Track 1: Underground or in the Cloud: The Reality of Risk Being Omnipresent

Risk, by its very definition, is something deemed uncontrollable – and it’s fast become realized by organizations the need to invest heavily in security.

Siva VRS GM & Global Practice Head of Security, Wipro
Shawn Kirk Global Head of Security, Identity and Compliance Specialized Sales, AWS

Track 2: Data Pirates & How to Protect your Treasure

The volumes of data we accumulate transcends departments within the organization of the 21st century and shows no signs of slowing down.

Mike Britton Chief Information Security Officer, Abnormal Security

Track 3: What You Need to Know “Now” about Modern Application Development (MAD)

Today, software-driven organizations must continue to innovate, and due to the pressures of digital transformation, they are beginning to agree that their software development models, and release frequencies, can no longer keep pace

Peter Chestna CISO North America, Checkmarx

11:40 - 12:10

11:40 - 12:10

Closing Keynote

Using Research to Reprogram the Cyber Kobayashi Maru

The fundamental problem of cybersecurity is the asymmetry between the attacker and the defender.

Vaibhav Garg Cybersecurity Research & Public Policy , Comcast

09:00 - 09:10

09:00 - 09:10

Opening Remarks

09:10 - 09:40

09:10 - 09:40

Keynote

Lessons from Fintech to Elsewhere

In 2017, PwC ran a “Global Fintech Report”, and found 82% of financial institutions expect to partner with a FinTech firm within the next five years. Well, that time is soon and we’ve seen a meteoric growth – and with that we have seen a similarly expansive growth in the need for cybersecurity in this sector.

09:45 - 10:25

09:45 - 10:25

Workshop

Security Automation - how to Breach the Talent Gap?

With the increased importance in security, it’s now more crucial than ever that talent accrued by the CISO is exceptional

Dr. Pablo Breuer Executive Director, Enterprise Security Architecture Morgan Stanley
Sujeet Bambawale CISO, 7-Eleven

10:25 - 10:35

10:25 - 10:35

Insight Break

10:35 - 11:35

10:35 - 11:35

Roundtable Review

Peter Chestna CISO North America, Checkmarx
Siva VRS GM & Global Practice Head of Security, Wipro
Shawn Kirk Global Head of Security, Identity and Compliance Specialized Sales, AWS
Mike Britton Chief Information Security Officer, Abnormal Security

11:40 - 12:10

11:40 - 12:10

Closing Keynote

Building a positive security culture across the business

With an increase in online activity due to the pandemic, CISOs are facing a barrage of new challenges.

Rinki Sethi VP and CISO, Twitter

Event Highlights

Immerse yourself in the most advanced virtual event platform, blending the convenience and reach of digital with the interaction of physical events. Experience the new way to network with peers with interactive features including:

Audience Interaction

Engage with a virtual live audience just as you would at a physical event and create meaningful conversations.

Live Polling

The ultimate live polling and gamification tools, keeping your audience engaged.

Audience Q&A

Enabling our team to help you control your session experience.

Interactive Quizzes

Interactive quizzes to gamify your session

Thought Leadership

Content and insight from industry experts when it matters most

FAQs

Still have a question contact us below

Previous attendees include