Loading Events

August Virtual Cyber Executive Forum 2020

August 14 @ 9:45 am - 5:30 pm EDT


August 14
9:45 am - 5:30 pm
Event Category:
Event Tags:

August 14, 2020

Questions? Please contact Guy Wiltse: +1 (703) 382-8205 (local/international)


9:50 AM – 10:00 AM: Welcome by Candy Alexander, President of ISSA International

10:00 AM – 10:45 AM: Smart Cities, Ruthbea Yesner, Vice President, Government Insights and Smart Cities, IDC

Smart Cities and Communities developed as a model to use advanced and emerging technologies in state and local government to for innovative ways to address big challenges such as sustainable growth and economic development and modernized municipals services. And while cities and communities have made progress over the past decade, issues around cybersecurity and maintaining digital trust with constituents has been a challenging area, as technologies rapidly advance and are used by bad actors to breach government systems, for denial of service and disruption or financial gain. At the same time, digital trust in online information is waning as misinformation, trolls, chatbots and deepfakes infiltrate social media. In the time of COVID-19, when accurate information is vital for communities, and access to critical systems from home has increased in importance, smart cities and communities understand the importance of cybersecurity. This presentation will provide a framework for digital trust, and how to look at cybersecurity in the context of COVID-19, as a way to think more strategically about cybersecurity investments.


Ms. Yesner manages the US Federal Government, the Worldwide Smart Cities and Communities and the Worldwide Education practices. She is known for her work in Smart Cities, which includes governance, innovation, partnerships and business models essential for Smart City and Community development. Key research topics include resilient infrastructure, economic development, and education digital transformation.
Ms. Yesner has authored several book chapters on Smart City development, and is a frequent speaker at events. She is the winner of the IDC James Peacock award, the company's highest honor for outstanding analysts.

11:00 AM – 11:45 AM: 2020 – The changing role of the Cyber Executive, Dr. Eric Cole, Founder and CEO, Secure Anchor

The first half of 2020 caused a lot of confusion and changes in how businesses run. Supporting a remote workforce caused a significant amount of changes focused primarily on functionality and keeping the business running. Cyber criminals quickly recognized and exploited these flaws while businesses were less focused on security. As we enter the second half of 2020 it is clear that a new normal has emerged. Significant changes have occurred and now businesses need to regroup and reassess their business with a major focus on security. This talk will cover an analysis of the new threat landscape and a clear roadmap for security leaders to follow and to allow their businesses to be successful and secure as we finish up this year.


With more than 30 years of network security experience, Dr. Eric Cole is a distinguished cyber security expert and keynote speaker who helps organizations curtail the risk of cyber threats. Dr. Cole has worked with a variety of clients ranging from Fortune 500 companies, to top international banks to the CIA. He has been the featured speaker at many security events and also has been interviewed by several chief media outlets such as CNN, CBS News, FOX News and 60 Minutes.

12:15 PM – 12:35 PM: Creating an Environment of Trust and Integrity in Uncertain Times, Amanda Laden, CEO, Amanda Laden International

We are living in unprecedented times. The world seems to have changed overnight and as leaders, we are forced to help our teams and our employees have the certainty to navigate through ambiguity and volatility. In each organization, people take their cues from the way in which leaders behave, act, and speak, and people need to feel that they can trust their leaders. In this conversation, you will learn some quick tips on how you can continue to create an environment of trust and integrity and empower your people to ride the waves of change, as well as be part of the solution.


Amanda Laden founded Amanda Laden International with a mission to instill meaningful change in corporate culture.
She has a deep insight into human behavior, business strategy, and leadership development and, combined with her no-nonsense, can-do attitude, Amanda has a unique ability to transform companies from within and reshape mindsets of top leaders for measurable change.
In addition to an MBA, Amanda holds a number of certifications in talent optimization tools such as DiSC, Five Behaviors of a Cohesive Team, and Predictive Index.
Amanda has traveled to over 45 countries, and has lead teams on 5 continents over the past 15 years, gaining in-depth knowledge and experience of global business strategy.

12:45 PM – 1:45 PM: Executive Roundtables

2:00 PM – 2:45 PM: Balancing The Tug of War: How CIOs and CISOs Can Partner for Better IT, Scott Howitt, CIO, McAfee

The rapid evolution of the digital world has driven great technology innovation as well as spawned growth in cyberthreats that range from the annoying to the catastrophic. In today’s IT environment both CIOs and CISOs are integral to the success of any organization. Historically, there has been tension between the two as they both work to balance the needs of the organization to stay on top of technology while securely implementing it.

These roles are interdependent, since the CIO relies upon the CISO for advice, guidance and risk evaluation while the CISO depends on the CIO for support and infrastructure resources. They must work together with a holistic, integrated approach that empowers every business department within the organization with a clear vision.
Information security is no longer an IT support issue, but a strategic business responsibility. Both IT executives must share common goals for security and IT operations to be successful.

In this session, McAfee CIO Scott Howitt, who was recently a CISO, will explore the tension between these key roles, how to utilize the positive and alleviate the negative effects of that tension and offer practical advice on how CIOs and CISOs can most effectively work together to ensure the needs of the organization are securely met.


Scott Howitt is Senior Vice President and Chief Information Officer (CIO) at McAfee. He is responsible for McAfee’s corporate systems, leading the Information Security and IT organizations, and for driving the company’s cloud transformation. Alignment of technology to company strategy, partnerships with product and sales teams to ignite innovation, and positive customer experiences are guiding principles on which Scott and his teams focus.

Scott joined McAfee from MGM Resorts International, where he served as Chief Information Security Officer (CISO) and CIO while leading the information security and privacy program for all 27 resorts worldwide. Prior to MGM Resorts, his leadership journey included executive roles at JCPenney, Alliance Data, and Electronic Data Systems (EDS). He was also a Commissioner on Nevada’s DHS Cyber Security Commission and was a founding member and served on the Board of the Retail and Hospitality ISAC.

Scott earned his B.A. in Physics from the University of Texas and attained his CISSP in 2005. In his free time, Scott is a voracious reader and avid hiker, and he enjoys spending time with his wife and three daughters.

3:00 PM – 4:00 PM: Executive Roundtables

4:15 PM-5:00 PM: It’s Been Ten Years. Why has nothing changed? Jim Reavis, Executive Director, Cloud Security Alliance, and Candy Alexander, Current ISSA International President

Join us for a candid discussion on why we continue to see a shortage of skilled Cyber professional and how it is fast becoming one of the least understood problems faced by businesses and the profession today.

Based on the latest research report The Life and Times of Cybersecurity Professionals 2019. A Cooperative Research Project by Enterprise Strategic Group and the International Systems Security Association (ISSA), Jim Reavis and Candy Alexander, two of our prominent leaders in the community, discuss why it was so important to forge the alliance between ISSA and CSA and how to best tackle the problem at hand.


For many years, Jim Reavis has worked in the information security industry as an entrepreneur, writer, speaker, technologist and business strategist. Jim’s innovative thinking about emerging security trends have been published and presented widely throughout the industry and have influenced many. Jim is helping shape the future of information security and related technology industries as co-founder, CEO and driving force of the Cloud Security Alliance. Jim has been named as one of the Top 10 cloud computing leaders by SearchCloudComputing.com.

Jim is the President of Reavis Consulting Group, LLC, where he advises security companies, governments, large enterprises and other organizations on the implications of new trends such as Cloud, Mobility, Internet of Things and how to take advantage of them. Jim founded SecurityPortal, the Internet’s largest website devoted to information security in 1998, and guided it until a successful exit in 2000. Jim has been an advisor on the launch of many industry ventures that have achieved a successful M&A exit or IPO. Jim is widely quoted in the press and has worked with hundreds of corporations on their information security strategy and technology roadmap. Jim has a background in networking technologies, marketing, product management and systems integration. Jim received a B.A. in Business Administration / Computer Science from Western Washington University in 1987 and formerly served on WWU’s alumni board. Jim was recognized as a WWU Distinguished Alumnus in 2015. In 2016, Jim was inducted into the Information Systems Security Association (ISSA) Hall of Fame.

5:15 PM-6:00 PM: Cyber-Supply Chain Risk Management (Cyber-SCRM) Commercial Use Cases, Emile Monette, Director Value Chain Security, Synopsys

Emile Monette, Director Value Chain Security at Synopsys, will focus on USG C-SCRM efforts related to DHS’ Continuous Diagnostics & Mitigation (CDM) Program and the recently published FAR rule implementing Section 889 (a)(1)(B) of the 2019 NDAA. https://www.gsa.gov/cdnstatic/General_Supplies__Services/CDM-APL-SCRM-Plan_0.pdf


Mr. Emile Monette is the Director of Value Chain Security at Synopsys, Inc. His expertise centers on the nexus of cybersecurity, supply chain risk management, and federal procurement.

Mr. Monette has unique experience in the fields of cybersecurity and procurement in the federal government, including service as Program Manager for cyber supply chain risk management in the Cybersecurity and Infrastructure Security Agency of the Department of Homeland Security. In that role he facilitated national efforts to address risks to the information and communications technology supply chains of federal civilian executive branch agencies, critical infrastructure, and state, local, tribal, and territorial governments. Mr. Monette also advised the Department’s senior leadership on legal, policy, and operational matters related to cyber and supply chain security. He also served as the Director of Government-wide Cybersecurity, Resilience, and Risk at the U.S. General Services Administration, Senior Advisor in the Executive Office of the President, Professional Staff Member with the U.S. House of Representatives Oversight and Government Reform Committee, and as an active duty Air Force officer. Mr. Monette also helped shape the Department of Homeland Security’s Continuous Diagnostics and Mitigation program, where he led development and implementation of a supply chain risk management program that improved the security of federal cybersecurity software procurements valued at more than $6 billion.

Mr. Monette earned a Juris Doctor from the George Washington University Law School and a Bachelor of Science, Cum Laude, from San Diego State University, and is a veteran of Operation Iraqi Freedom.

6:00 PM: Closing Remarks


ISSA Cyber Executive MembersComplimentary meeting registrationclick here to apply
First Time GuestsComplimentary meeting registrationclick here to apply
(attendance is subject to approval)
Returning GuestsComplimentary meeting registrationclick here to apply
(attendance is subject to approval)


For sponsorship opportunities, please contact Lisa O'Connell.

Interested in Getting Your Message in Front of Senior Level Cyber Security Decision Makers?

Please contact    at ISSA International headquarters by email or by phone at

Scroll to Top