AI and ML: Using Emerging Technologies to Reinforce Security Defense Efforts

CISO Council

October 28, 2021

Speakers

Kumar Saurabh LogicHub
Kumar Saurabh

CEO

LogicHub

CISO Council Speaker

Kumar has 15 years of experience in the enterprise security and log management space leading product development efforts at ArcSight and SumoLogic. He has a passion for helping organizations improve the efficacy of their security operations, and personally witnessed the limitations of existing solutions in helping SOC analysts detect threats buried deep within mountains of alerts and events. This frustration led him to co-found LogicHub™ to empower cyber analysts by building intelligence automation, not just analytics.

Most recently Kumar was Co-founder and Vice President of Engineering at Sumo Logic. Previously, he was the data architect at Mint.com which was acquired by Intuit. Kumar was also one of the early engineering leads for the analytics and solutions team at ArcSight, and saw the company grow from zero revenue to IPO. Kumar earned his M.S. in Computer Science from Columbia University and B.S. in Computer Science from IIT Kharagpur.

Sujeet Bambawale 7-Eleven
Sujeet Bambawale

CISO

7-Eleven

CISO Council Speaker

It is an honor and a privilege to serve as the Chief Information Security Officer of an iconic global brand that has a deep, cherished, always-on connection into communities everywhere. Information Security at 7-Eleven focuses on maintaining and enhancing an industry-leading, comprehensive and cohesive security fabric around our business value drivers in a customer-obsessed manner. The 7-Eleven Information Security organization brings together the various technical domains within Information Security with the force multipliers of Governance, Risk and Compliance as well as Data Protection to facilitate unified accountability and expedient action.

I came to 7-Eleven from Symantec's Consumer Business Division where I had the honor of driving a global security engineering portfolio. Prior to joining Symantec via the LifeLock acquisition, I spent 5 years at NetApp, and over 10 years with Intuit; after working with the information security and risk management teams at Ernst & Young and KMPG. I have been responsible for leading key security initiatives that helped integrate security into the culture of the company and extend the brand into global markets. It has been a great honor to lead NetApp's ISO27001 recertification, speak at NetApp's conferences in Berlin and Tokyo and be a recipient of Intuit's Innovation Award. At Ernst & Young and KPMG; I was responsible for developing risk mitigation strategies primarily for Fortune 500 clients in the financial and technology sector.

My focus is on maturing the organization's security posture by driving execution to a well-socialized and accepted security strategy that benefits internal and external stakeholders through a pragmatic mix of building cross-organizational relationships and developing people managers. I have a Masters degree in Electronics Engineering and am a Certified Chief Information Security Officer (C|CISO), a Certified Information Security Manager (CISM) as well as Certified in the Governance of Enterprise IT (CGEIT). Most recently, I was fortunate to learn about organizational leadership at global scale, with a focus on innovation and cybersecurity; from my professors and colleagues at the Haas Business School in UC Berkeley.

I support the local and global security community by contributing to non-profit security organizations in a leadership capacity, offering mentorship and being an executive sponsor for key initiatives like Women in Technology, hiring veterans and academic programs designed to help kids & young adults stay safe online.

Ray Austad Farmers Insurance Group
Ray Austad

Director, Information Security & Risk Management

Farmers Insurance Group

CISO Council Speaker

Ray Austad began his IT and Information Security career in Higher Education and Non-Profit, and pivoted over to financial enterprise after 18 years. Commencing his career with Zurich Farmers Insurance’s Group Information Security as a Business Information Security Officer. In 2014 he joined the Farmers Insurance Group Business Unit to lead Cloud and Application Security, Vulnerability Management, and Incident Response. In 2020 Ray took a different view of Cybersecurity and risks to business by moving over to Farmers Risk Management team. As Director Information Security and Risk Management, the next chapter started with being able to evaluate the organization with a new and intriguing lens. The first quarter was allocated to learning more about Enterprise Risk Management and adjusting to a role of business assurance, opposed to operational execution. The second quarter changed the organization and our personal lives with the pandemic, and provided new, unforeseen challenges. However this offered new opportunities to calculate organization and supplier risks, and view business resiliency differently. Heading into the third quarter, the focus will be on continued improvements with information security risk baselines, collaboration with our operational and business partners to monitor pandemic impacts, and evaluate new and emerging risks.

Rupom Mohammad BNP Paribas Canada
Mohammad Rupom

VP, Cyber Risk Intelligence

BNP Paribas Canada

CISO Council Speaker

Experienced leader, manager, coach and developer of talent with a proven ability to lead through influence. Mentoring the team members to help them grow by innovating new ideas solving problems by negotiating the roadblock. Work as a seasoned technical leader to grow the team from the start up level to a competitive state by taking proactive actions such as, supervising the projects through the agility, being the subject matter expert to provide high quality cyber security and intelligence through prioritizing the business need while keeping an eye on the analytic details, initiate the threat hunting capabilities. Develop relationships across the company with security leads/leaders in a cross-functional and collaborative environment to advance the classified work, develop transparency and trust, and make recommendations to advance the company's cyber security posture. Identifies new opportunities that can showcase the capabilities of the team to the audience and make the team champion organization wide as well as to the clients.

Richard Rushing Motorola Mobility a Lenovo Company
Richard Rushing

CISO

Motorola Mobility a Lenovo Company

CISO Council Speaker

Mr. Richard Rushing is the Chief Information Security Officer for Motorola Mobility LLC.; Richard participates in several corporate, community, private, and government Security Council’s and working groups setting standards, policies, and solutions to current and emerging security issues. As Chief Information Security Officer for Motorola Mobility, he has led the security effort by developing an international team to tackle the emerging threats of mobile devices, targeted attacks, and cyber-crime. He organized developed and deployed practices, tools and techniques to protect the intellectual property across the worldwide enterprise. A much-in-demand international speaker on information security Richard has presented at many leading security conferences and seminars around the world.

Igor Volovich Cyber Strategy Partners
Igor Volovich

Security Strategist

Cyber Strategy Partners

CISO Council Speaker

Igor Volovich is the founder and chief strategist at Cyber Strategy Partners, a Washington, DC‐area cybersecurity leadership and strategy advisory practice focusing on enterprise risk management, cyber defense, governance, and compliance, and national critical infrastructure protection, serving large-scale multinationals, public sector agencies, and emerging segments such as Smart Cities, Internet‐of‐Things (IoT), Industrial-Internet-of-Things (IIoT), and Smart Grid.

Mr. Volovich has recently served as Senior Advisor, Enterprise Security Architecture and Strategy, Office of the CISO at the United States Postal Service, advising senior executive leadership on cyber risk management strategies, program development, capability maturity improvements, and governance and compliance for the Postal enterprise including IT and OT environments, creating and guiding transformative initiatives across the cybersecurity program.

Previously, Mr. Volovich served as the Chief Strategy Officer at Romad Cyber, an emerging-stage endpoint security startup, where he led product and market strategy efforts leading to two consecutive Security Shark Tank® wins for innovation and product strategy, and development of $30M in net-new enterprise business.

Mr. Volovich served as the Chief Information Security Officer (CISO) and Vice President of Global Information Security at Schneider Electric, a $32‐billion 185,000‐staff industrial automation and energy management multinational, leading the firm’s information security functions in the Americas region. Prior to joining Schneider through a merger, Mr. Volovich served as the Chief Information Security Officer (CISO) and Vice President of Information Security and Cyber Risk Management of Invensys plc, a global $5B market leader in the fields of industrial process control, automation, and safety systems (ICS/DCS/SCADA).

Before entering private practice, Mr. Volovich served as a senior member of the Corporate Incident Response and Intrusion Detection Team at Microsoft’s Trustworthy Computing (TwC) organization, where he was responsible for the architecture and management of security controls deployed in protection of Microsoft’s global information assets, as well as internal investigations and incident response functions.

 

Additionally, Igor has volunteered as a STARS Mentor at MACH37 (mach37.com), the nation’s first cyber-focused startup accelerator operated in partnership with Virginia’s Center for Innovative Technology (cit.org) and CIT GAP Funds, advising founders and leaders of emerging cyber technology firms on product development, market positioning, and business strategy.

 

Mr. Volovich has worked with and advised some of the world’s leading firms including United States Postal Service, Schneider Electric, Invensys, Microsoft, MSN, IBM, Altria/Philip Morris, Standard & Poors, AT&T Wireless, Freddie Mac, FINRA, Estée Lauder, US Department of Defense, US Department of Labor, British Telecom, Pep Boys, Toyota Financial, Aviva, Asurion, as well as tech startups such as Romad Cyber, TeraBeam Networks, eCharge, and LivingSocial.

 

Mr. Volovich holds the CISSP designation from ISC², Certified in Risk Controls (CRISC), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA) designations from the Information systems Audit and Control Association (ISACA), and the Certified Information Privacy Professional (CIPP) certification from the International Association of Privacy Professionals (IAPP).

 

Mr. Volovich is a member of ISC², ISACA, InfraGard, NIST Cloud Forensics Working Group, US DHS ICS‐CERT, Alliance for Gray Market and Counterfeit Abatement (AGMA Global), and the Airborne Law Enforcement Association (ALEA). In addition to his professional work, Mr. Volovich volunteered as a Flight Officer with Virginia Airborne Search and Rescue Squad, serving the Northern Virginia and DC area communities, attaining the rank of Lieutenant, and serving as Chair of the Membership Committee and a Fundraising Committee member.

October 28, 2021
Council
Navigating 3rd Party Risk
Filling the Talent Void
The Greatest Fears?
Technology Supply Chain
Being Effective…. Securely
AI and ML: Using Emerging Technologies to Reinforce Security Defense Efforts
Patch Management and Endpoint Protection
Data Security: Cloud Computing, Mobility and Regulations

Attend this event

Not available on October 28, 2021?

View other dates for the CISO Council

Agenda

All times Pacific Standard Time (PST)

3:00 PM-4:15 PM

AI and ML: Using Emerging Technologies to Reinforce Security Defense Efforts

The improvements in Artificial Intelligence (AI) and Machine Learning (ML) are a double edged sword. It has the capability to improve upon security decision making and incident pattern recognition while also enabling hackers to create malware. Thus it is critical for CISOs to adopt these technologies to stay ahead of advanced threats and improve the recognition of exploits and weaknesses within their networks.


In Partnership With