- This event has passed so registration is closed.
February 2020 Cyber Executive Forum Speaker Lineup
Ready to Explore Registration Options?
Guest registration is available to new and returning guests
February 2020 Cyber Executive Forum
Please note that the table is scrollable (left and right swipe) on mobile devices.
Time | Session | Speaker |
---|---|---|
9:00 AM to 10:00 AM | The Attacker's PerspectiveWith an ever-expanding attack surface, outsmarting the attacker continues to be increasingly difficult for defense. Understanding how attackers think, what motivates them to damage and how they outmanoeuvre defensive mechanisms will help switch the asymmetry. With a uniquely in-depth understanding of the attacker perspective, Assaf Mischari, Head of Research at Team8 and former CTO of the Israeli Defense Force's Technology & Intelligence Unit 8200, will present why connectivity empowers a less experienced attacker to make significant impact. Covering topics such as automation, anomaly detection, data in use, and AI, Assaf will demonstrate how understanding attacker motivations can help defense gain the upper hand. |
|
9:00 AM to 10:00 AM | Opening Comments and Welcome Address |
|
10:00 AM to 10:45 AM | Flame-Proofing Your Career (and your life): Preventing Burnout and Dealing with AdversityKaren Worstell is as well-known as a serial CISO for iconic companies across industry sectors and as a Silicon Valley technology leader. Her company, W Risk Group provides both cybersecurity consulting and immersive group coaching intensives called MOJO Maker for Women in Tech to help companies retain their female braintrust. Worstell is the host of the podcast Mission Critical on ITSPMagazine.com, and has spoken internationally on the future of cybersecurity and the criticality of an inclusive and diverse leadership team to the innovation capacity of technical organizations. |
|
10:45 AM to 11:15 AM | Networking Break |
|
11:15 AM to 12:15 PM | Evolution of the Cyberworld and its Impact on VC's, CIO's and CISO'sHow does the leading Venture Firms navigate thru the hundreds of new companies each year to find the winning investment? What is their respective investment thesis to know when it's “the next big one” that will challenge the incumbents? What is the role of today's VC's vs 5-10 years ago to ensure the success of new technology?  What do VC Firms expect to see out of a Seed or an A round investment….expectations? What would you like the audience to remember today? What is the role of new modern CIO/CISO in this process to bring in transformational start-up technologies to stay ahead of the curve? How do they evaluate risk and the impact on their teams and their own respective roles? What are the fears that a CIO/CISO must break thru in today's new cyberworld? How do you mitigate risk in the process with the teams? How do you budget for today when you have limited knowledge about tomorrow?  What is the role of new technologies a vehicle to help in recruiting new talent who want to work on the latest/newest technologies? How do you resolve technical debt and keeping avoiding the tech stack from going obsolete? What is your opinion on the recent Symantec news and how does it impact your decision making? Come learn answers to these questions and more from our panel of experts. |
|
12:15 PM to 1:30 PM | Lunch & Learn – The Insider Threat: You're Flying BlindStudies show that 90% of data loss that manifests from inside organizations goes undetected. Â What's worse, nearly 70% of organizations that were breached from the inside had a data loss prevention solution in place. Â The brutal truth – prevention solutions are not effective at stopping insider threats. Attend this session from Code42 to learn how data risk detection and response ensures you and your organization are not blindsided. |
|
1:30 PM to 2:45 PM | Executive Roundtables on Current Industry Topics |
|
2:45 PM to 3:15 PM | Networking Break |
|
3:15 PM to 4:15 PM | Storytelling for CISOs: How to Tell Great Stories That Will Enroll Others In Your Information Security VisionStorytelling is part art and part craft. Many believe you either have it or you don’t. In actuality, storytelling is very much a learnable skill. In this highly interactive talk, you will learn the reasons why executive stakeholders are most inspired by stories, and how to construct and deliver your own compelling stories that will help enroll others in your information security vision. |
|
4:15 PM to 4:30 PM | Closing Remarks |
|
4:30 PM to 5:30 PM | Closing Reception |
|
5:00 PM to 8:00 PM | Opening Reception and DinnerThe Rapid Adoption of DevOps is Changing Security as We Know It |
|
Register Now for the February 2020 Cyber Executive Forum
Beginning Tuesday, February 1 everyone age five years or older will be required to show proof of two doses of the COVID vaccine, except for those who have received one dose of the Johnson & Johnson vaccine, or a negative PCR, molecular, or antigen test within 72 hours at restaurants, bars, conferences and other businesses.
ISSA Cyber Executive
ISSA Cyber Executive Members only register here
Existing ISSA Cyber Executive Members attend for free
ISSA Cyber Executive
ISSA general members register here
Members may get one guest attendance, pending approval
ISSA Cyber Executive
First-Time Guests
Complimentary meeting registration (attendance is subject to approval)
Not a Member of ISSA's Cyber Executive Yet?
Join today and get free access to the Cyber Executive Forum as well as other exclusive benefits.