- This event has passed so registration is closed.
October 2020 Cyber Executive Forum Speaker Lineup
Chuck Spalding
Chuck is the 9-1-1 Director for Palm Beach County, Florida. Palm Beach is the largest county east of the Mississippi, with a population greater than…
Read morePatrick Benoit
Patrick is the Global Business Information Security Officer for CBRE. He was formerly the Deputy CISO for Cheetah Digital. He has been an Executive Business…
Read moreBob Metzger
Robert Metzger, an attorney in private practice, heads the Washington, D.C. office of Rogers Joseph O'Donnell, PC, a firm that specializes in public contracts matters….
Read moreJulian Waits
Julian Waits is General Manager, Cybersecurity Business Unit at Devo Technology. He has 30+ years in senior leadership roles at technology companies, specializing in security,…
Read moreKatie Arrington
Katherine “Katie” Arrington is a member of the Senior Executive Serves and serves as the Chief Information Security Officer for Acquisition and Sustainment (CISO(A&S)) to…
Read moreDaniel Ziesmer
Daniel Ziesmer is the President of Centripetum LLC, a firm specializing in supporting the governance, risk management, and compliance (GRC) efforts of small enterprises, developing…
Read moreMichael F. Angelo
Michael F. Angelo is an ISSA Fellow and is named on the ISSA Hall of FAME. He has over 30 years of cyber security experience….
Read moreTyler Robinson
Tyler serves as the Managing Director of Network Operations at Nisos, Inc. and leads a team of high performance security professionals within the offensive security…
Read moreJohn McCumber
John McCumber is a cybersecurity executive providing targeted guidance for industry and government initiatives. He also develops and delivers consultative support for CIOs/CISOs in the…
Read moreTomm Larson
Tomm Larson currently serves as the Cyber Security Awareness Lead for Idaho National Laboratory. He has worked in cyber security for almost 20 years. He…
Read moreCandy Alexander
Ms. Alexander has over 30 years of experience in the cybersecurity profession, receiving multiple international industry recognition awards. She has held several positions as CISO…
Read moreDan Waddell
Dan has over 25 years of experience in information technology and cybersecurity, with over 20 of those years in management. His roots in IT started…
Read moreReady to Explore Registration Options?
Guest registration is available to new and returning guests
October 2020 Cyber Executive Forum
Please note that the table is scrollable (left and right swipe) on mobile devices.
Time | Session | Speaker |
---|---|---|
9:50 AM to 10:00 AM | Welcome |
|
10:00 AM to 10:45 AM | National 9-1-1: Becoming Public’s Safety Achilles HeelWhen we think about cybersecurity it usually through the lens of data networks and systems. Our 9-1-1 emergency systems leave us vulnerable as citizens, organizations, and as a country. Recent attacks on the system originating in the Middle East are proof that we need to address these vulnerabilities. Chuck will walk you through the national 9-1-1 voice infrastructure, pointing out these vulnerabilities, and providing insight on how to mitigate these to attacks. |
|
11:00 AM to 11:45 AM | Security Leaders Must Be Part of the Sales TeamThe best security leaders will contribute greatly to business success, directly and indirectly for their company and customers. They ensure that other leaders in their company have the necessary information to make the best decisions for the business. Their experience and intent are valuable assets for marketers and salespeople to use to their advantage with prospects and customers. All security leaders must contribute to increasing or enhancing revenue and reducing risk. These two value-adds are fundamental to the role of every security leader. |
|
12:15 PM to 12:35 PM | Lunch & Learn |
|
12:45 PM to 1:45 PM | Executive Roundtables – Achieving Security Visibility in the Era of Cloud ShiftWhile organizations undertake digital transformation and shift to the cloud, security teams are handcuffed by limited visibility. 69% of survey respondents of the Devo SOC Performance report cite limited visibility into the attack surface as the primary cause of team ineffectiveness. Join us to discuss the trends that are causing security visibility gaps while increasing the likelihood of data breaches. Discuss potential solutions and what you have been implementing to increase cybersecurity effectiveness. |
|
12:45 PM to 1:45 PM | Executive Roundtables – Flexing Your Risk Management MusclesSure, cybersecurity is often our forte, but don’t be surprised if your renowned risk management skills are requested and put to the test to deal with the growing litany of issues confronting organizations of all types this year and throughout 2021. In this roundtable we’ll pick some topics, but you’ll drive the discussion. We’ll select issues that are sure to confront and confound businesses and organizations, and we’re asking you to help layout the groundwork for determining how you dispassionately assess the risks. In this roundtable we’ll set politics aside to deal with some of the biggest questions that are inevitably forthcoming:
|
|
12:45 PM to 1:45 PM | Executive Roundtables – Productivity and Morale During a PandemicWhen we first started the Covid-19 Pandemic companies so little impact to productivity and in some cases claimed productivity had in cases increased. We are not hearing that leaders are seeing the productivity declining and they are finding it challenging to keep their teams motivated and engaged. Join this roundtable to discuss tactics to ensure your teams can remain productive and what you as the leader have a responsibility that you may have not had to previously be thinking about. |
|
2:00 PM to 2:45 PM | Molding Your Cyber Workforce: Don’t Rely on the PunditryIn this engaging presentation, John McCumber will review the recent literature and media portrayals of the challenges hiring and retaining top cybersecurity talent. He will explain why you cannot trust most of what you have been reading and explain how you can better filter this data to extract what is important for you and your organization. Come and learn the concrete steps you can immediately use to better acquire, train, and grow your cybersecurity workforce. Don’t listen to the pundits. Most are wrong! Learn why. |
|
3:00 PM to 4:00 PM | Executive Roundtables – What certifications do you actually need – and why are they important?With the deluge of certification requirements for both your company and its supply chain, what is important? Consider the following – in the last week you may have been asked if your company was ISO 27001, ISO 15408, FEDramp, STIGs, CMMC, SP800-17mumble.. and the list goes on and on. Given that you can consume 100% of your time and 1000% of your money and time on certifications, the real question ‘What is really important |
|
3:00 PM to 4:00 PM | Executive Roundtables – Post Pandemic Clean up and Lessons LearnedDuring the Covid-19 pandemic, what processes were implemented at your organization to support everyone working remotely which you now need to review? Are there areas where you now need to be looking at tightening security? What changes did you make that are going to be “permanent?” Lastly, what lessons were learned that you wish you’d know prior to 2020? Joined this discussion to share take-aways for you and your teams. |
|
3:00 PM to 4:00 PM | Executive Roundtables – Driving Behavior Change with your Security Awareness TrainingStudies show that 80% of organizations allocate only two hours or less per year for security awareness. Given this, how are you making sure you can maximize your time with users to ensure behavior change? Join this roundtable to share proven strategies around where to focus your efforts, keeping users engaged, benchmarking, making it fun! and more. |
|
4:15 PM to 5:00 PM | “Deliver Uncompromised:” DoD CMMC, NIST SP 800-171 and the new FASCThe recently released DoDD 5000.01 (“The Defense Acquisition System”) recognizes that Security, cybersecurity, and protection of critical technologies at all phases of acquisition are the foundation for uncompromised delivery and sustainment of warfighting capability.” This was the core thesis of the August 2018 MITRE “Deliver Uncompromised” Report. The speakers will review what has been accomplished, what is underway and what lies ahead in DoD efforts to act on the “DU Report recommendations. CMMC is a key starting point. If adversaries can penetrate contractor networks and steal sensitive unclassified information from the DIB, defense systems can be compromised even before delivery or at any time in their lifecycle. On the horizon for CMMC are other objectives. The new Federal Acquisition Security Council (FASC) Interim Final Rule points to coordinated activity by DoD and other federal agencies to address foreign source threats and take on the challenge of supply chain security, including hardware and software assurance. |
|
5:15 PM to 6:00 PM | Things to Consider Before Adopting Zero TrustRonald Reagan was known to utter the famous phrase “Trust but Verify” when dealing with the Soviet Union in the 1980s. That phrase has also entered into conversations within information security departments when discussing how to protect sensitive data. Today, with a threat landscape that changes daily if not hourly, the concept of “Never Trust, Always Verify” has become increasingly important to embrace. A Zero Trust Framework can support this concept if deployed effectively. This talk will cover some things to consider before adopting zero trust such as culture, technology, people and processes to help ensure a holistic approach. |
|
6:00 PM to | Closing Remarks |
|
Register Now for the October 2020 Cyber Executive Forum
Beginning Tuesday, February 1 everyone age five years or older will be required to show proof of two doses of the COVID vaccine, except for those who have received one dose of the Johnson & Johnson vaccine, or a negative PCR, molecular, or antigen test within 72 hours at restaurants, bars, conferences and other businesses.
ISSA Cyber Executive
ISSA Cyber Executive Members only register here
Existing ISSA Cyber Executive Members attend for free
ISSA Cyber Executive
ISSA general members register here
Members may get one guest attendance, pending approval
ISSA Cyber Executive
First-Time Guests
Complimentary meeting registration (attendance is subject to approval)
Not a Member of ISSA's Cyber Executive Yet?
Join today and get free access to the Cyber Executive Forum as well as other exclusive benefits.
October 2020 Cyber Executive Forum Event Sponsors
Interested in getting your message in front of a targeted audience? Click on the link to explore sponsorship opportunities.