- This event has passed so registration is closed.
June 2019 Cyber Executive Forum Speaker Lineup
Ready to Explore Registration Options?
Guest registration is available to new and returning guests
June 2019 Cyber Executive Forum
Please note that the table is scrollable (left and right swipe) on mobile devices.
Time | Session | Speaker |
---|---|---|
7:30 AM to 8:45 AM | Registration and Breakfast |
|
8:45 AM to 9:00 AM | Opening Comments and Welcome Address |
|
9:00 AM to 10:00 AM | Intersection of Privacy & SecurityTrevor Hughes will kick off the day’s event by providing a “30,000 foot view” of the intersection of privacy and security—what the differences are but how the similarities make having knowledge of privacy a crucial requirement for InfoSec pros. The constantly shifting landscape of US state privacy regimes make this an even more complex environment to negotiate. Buckle up! |
|
10:00 AM to 10:30 AM | Networking Break |
|
10:30 AM to 11:15 AM | Third Party Risk: Lions & Tigers & Bears…Oh My!Diana Kelley leads a fireside chat with Edna Conway about the looming risk of our growing digital third party ecosystem. They will have a frank discussion on exactly what a value chain is and who is in the third party ecosystem that comprises it. Diana will explore Edna’s views on the key security threats and impacts for the information and communications technology (ICT) value chain, practical approaches and technologies to address those threats and impacts, and public-private efforts on cyber supply chain risk management. |
|
11:15 AM to 12:00 PM | Machine Learning: Addressing the Disillusionment to Bring Actual Business Benefit‘Machine learning’ is one of those cringy phrases, almost (if not already) taboo in the world of high-tech SaaS. Applying true machine learning to an organization’s product(s), however, can have real benefit for the business, their clients, and the industry as a whole. From credit card fraud investigations to the way that a car is built, machine learning has permeated our everyday life without a common understanding of what it is and how to implement it. |
|
12:00 PM to 1:00 PM | Lunch |
|
1:00 PM to 1:45 PM | Embracing AI for Cyber DefenseOnline crime cost the world more than half a trillion dollars in 2018, recent data breaches and attacks have managed to influence elections, and even our energy grids face the threat of cyber-attack. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks on a daily basis. These attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done. |
|
1:45 PM to 2:45 PM | Security is About Breach; Privacy is About CreepyOmer Tene will give a privacy expert’s view on the fundamental differences between privacy and security, and how the Venn Diagram between these two disciplines has shifted towards more commonality. As privacy laws take security explicitly into mind, security practitioners will need to know more. |
|
2:45 PM to 3:15 PM | Networking Break |
|
3:15 PM to 4:45 PM | Discovering Synergies Between the CISO & CPO – Exploring the Relationship Between Privacy and Cybersecurity |
|
4:45 PM to 5:00 PM | Sponsor Prize Drawing |
|
5:00 PM to 8:00 PM | Opening Reception & Dinner: Instituting a Data Privacy and Data Protection Program from ScratchThe steps needed to institute an effective data privacy and protection program will be discussed. Understanding regulations, privacy acts, HIPAA, GDPR, discovery of what you have, where it is, Shadow IT, where is it, how to control it. Classifying the data, what you need to protect, Access Control who has access to it, Restricting Access, Stopping it from leaving, Cloud Access Security Brokers (CASB), Splunk, and Data Loss Prevention (DLP). |
|
5:00 PM to 6:00 PM | Closing Reception |
|
Register Now for the June 2019 Cyber Executive Forum
Beginning Tuesday, February 1 everyone age five years or older will be required to show proof of two doses of the COVID vaccine, except for those who have received one dose of the Johnson & Johnson vaccine, or a negative PCR, molecular, or antigen test within 72 hours at restaurants, bars, conferences and other businesses.
ISSA Cyber Executive
ISSA Cyber Executive Members only register here
Existing ISSA Cyber Executive Members attend for free
ISSA Cyber Executive
ISSA general members register here
Members may get one guest attendance, pending approval
ISSA Cyber Executive
First-Time Guests
Complimentary meeting registration (attendance is subject to approval)
Not a Member of ISSA's Cyber Executive Yet?
Join today and get free access to the Cyber Executive Forum as well as other exclusive benefits.