Where
San Francisco
Discussing key topics from the evolving landscape of threats in areas that pertain to Cloud Security, Automation, Response and Resilience, Data Breaches, Insider Threats and harnessing the power of AI, the CISO Summit gives you the opportunity to meet leading decision-makers under one roof at one time, to be part of the discussions that are shaping the future of security and to network and develop contacts that will strengthen your business.
The program is driven by our senior-level Advisory Board including representatives from TNT, Henley Business School, Fox Networks Group, US Department of Defense and Wyndham Group.
The CISO Summit brings together leaders from across the public, large enterprises & mid-market sectors to provide you with a strategic and practical toolkit to help drive transformation including:
Technology and Leadership: Delivering Future Security Threat Prevention
Security Threat Prevention can be contextualized in many ways and at many different levels. This panel discussion will explore several types of threats that security leaders face across the operational, tactical and strategic continuum of organizational management.
AI Fitness v. Readiness: Is your security program ready to tackle generative
The rampant and fast-growing use of generative AI for code development has highlighted potential gaps between developers' appetites to leverage these tools in stark comparison with security professionals' readiness to manage the security implications of their use. Join Snyk on how organizations can better prepare themselves to adopt generative AI practices, including:
- The need for governance and safeguards for how developers are using gen AI tools
- Where perspectives align and differ with regard to use of gen AI tools across different roles in organization
- Why its key for AppSec teams to have proper tooling and processes in place to ensure adherence to policies and avoid a spike in insecure code
- How CISOs can balance the use of generative AI tools from both a productivity and security standpoint
The Art & Science of Using AI to Make Data Security Easy
As a security leader you’re being asked to find ways to securely enable your business to use data to drive innovation - and become a data master. But this takes a fundamental understanding of what data exists within your environment, where it's running, its risk level, who has access to it, and how it's being used. Join Lamont Orange, Global CISO of Cyera for this interactive discussion on the tools and processes they use to discover their data attack surface, monitor, detect and respond to data threats, and ensure data compliance.
Join this session to discuss:
- Data security that keeps pace in the era of AI
- Gaining data visibility as a foundation for data governance
- Managing the evolving landscape of laws, regulations, and industry standards around data security
Working with the right tools and teams across a shared responsibility model to ensure compliance
SIEM in Flux: How to Chart a Course Through a Category in Chaos
“Are we at risk?” This question looms large for CISOs and their teams. Despite its simplicity, questions of risk remain difficult to answer due to the lack of visibility across complex digital environments. Traditional SIEM solutions, once hailed as the future of cybersecurity, now fall short, leaving organizations vulnerable and in the dark.
Join us for a provocative panel discussion designed for bold and visionary CISOs. We’ll confront the uncomfortable truths about the current state of SIEM, and explore how to turn chaos into opportunity.
Key Topics:
- From Promise to Predicament: Dissect the evolution of SIEM from a revolutionary promise into its current state of chaos. Why have these tools failed to keep up with the exponential growth of digital complexity?
- Impact of Industry Consolidations: Analyze the effects of recent mergers and acquisitions and what they mean for your security strategy.
- Revolutionizing Security Teams: Discover how forward-thinking leaders are ditching legacy systems in favor of AI-powered, cloud-native architectures that promise not just incremental improvement, but a complete transformation of security operations.
- Future-Proofing with AI: Gain insights into how AI and machine learning will shape the future of threat detection, predictive analytics, and automated responses.
Rethinking the Relationship Between Cybersecurity Teams and the People They Protect
You’ve heard it all before: the DBIR tells you people are your biggest risk, phishing simulations tell you your users fall for social engineering, and simple security measures you deploy are sometimes met with howls of protest. But what if it didn’t have to be that way?
Join this session for a fresh perspective on:
- Moving security alerts from the SOC to where users work
- Protecting end users’ perception of security controls
- Transforming security teams’ interactions with end users
Cybersecurity Strategies that Reduce Enterprise Risk
You know that responding to fast-evolving cyber threats is leaving IT, security and risk teams overtasked. While AI can help, it also adds to the challenges facing enterprise cyber security teams, and potentially introduces new vulnerabilities. How can you help scale and amplify your team’s efforts to stay ahead of complex threats?
Join this panel session: Cybersecurity Strategies that Reduce Enterprise Risk, where your peers will share their collective experiences on facing cyber challenges head-on, and discuss their perspectives on the role AI will play in meeting today’s complex threats and those to come.
Treat Your Data Like It’s Currency
You’ve heard that “data is the new oil”. More accurately, “data is your currency”. It gives you the ability to conduct business. Mismanage it and there can be serious consequences. Lose it and you lose your business.
Knowing where your most valuable assets are is foundational to any data security process. This session will examine the impact of placing appropriate controls to protect your most important business asset: your data.
1. Dark Side of Digital Trust: The Case for Crypto-Agility
2. Achieving Cyber Resilience with Commvault Cleanroom Recovery
3. Practical Insights on Reducing Attack Surfaces: Transforming Risk into Resilience
4. Unpacking the Chaos: A Roundtable on the Realities CISOs Face
5. Importance of phishing-resistant users for cyber resilience and business continuity
6. Prevent & Recover from Ransomware Attacks with Layered Security
7. DevSecOps has gone from buzzword to best practice—but best practice doesn’t mean easy.
I just wanted to say congratulations on a great event and thank you all for your help, especially Kate and Tiffany who have spent time in advance and at the event with me to help me get the most out of the days here.I have really enjoyed the event, and made some good new contacts as well as insights into common challenges we are all facing in the CIO community. It’s been run superbly so thank you, and I look forward to the future events.
I thought the quality and mix of contributions and the engagement from the audience was excellent. It felt more like an interactive team exercise in some respects, than a sit back and listen conference, and for me was more enjoyable and genuinely helpful for that. Similar folks, passionate about their brands and their work, but with different best practice to share – very collaborative, which I personally like. So all good and thanks for the chance to take part. It’s always a drain on time, which none of us have, but it was worth it.
Participate in this Summit on our unique platform, learn from industry leaders, and network with peers. The benefits of attending are unmatched. Complimentary to qualified professionals and their team.
Copyright © 2021 GB intelligence inc
- all rights reserved