The Future of Cybersecurity

CISO Think Tank

June 8, 2023 - Boston, MA

Visionaries

Grace Beason

Director of GRC

Guidewire Software Inc

Think Tank Speaker

Accomplished Security, Risk & Compliance Manager with a proven track record of working in the information technology and services industry with expertise in information security and privacy. Strong operations leader skilled in Security, Risk & Compliance of next generation Cloud, IoT and legacy IT services. Broad client base of Fortune 100 and international government sectors. Effective leader with global and industry specific regulatory frameworks. Primary industries include: IT/ Cloud Services, Financial Services, Healthcare, Public Sector, Technology/ Telecom, Media and Entertainment.

Wes Kussmaul

CIO

Reliable Identities

Think Tank Speaker

Reliable Identities is a unit of The Authenticity Institute, Inc., a spinoff of Delphi Internet Services Corporation. Founded in 1981, Delphi earned its claim as "The Company That Popularized The Internet" by harnessing the popular curiosity that had grown around the early Internet during the time when its usage had been limited to researchers and academics. Delphi was the first to capitalize on the lifting of the ban on commercial activity on the Net. The Authenticity Institute had been launched as an independent spinoff of Delphi, and was not part of the News Corporation acquisition. The company served magazine publishers and business clients by designing, building and managing their own private-label online services. During the next twelve years The Authenticity Institute provided business planning, design, engineering, hosting, management and promotion services for Digital Equipment Corporation, William F. Buckley's National Review, BioTechniques, Hardcopy, International Business, Business Digest, and many other companies and magazines. In 1998 The Authenticity Institute sold its hosting business to NTT Verio in order to focus its resources on meeting the need for reliable identities of participants in online spaces. Three years later the first component of the Quiet Enjoyment Infrastructure, the VIVOS® Enrollment Workstation, was introduced. In 2002 The Authenticity Institute became a signatory to the International Telecommunication Union's World e-Trust Initiative, whose goal is to bring the benefit of PKI-based authenticity to the online world.

lorraine spadaro

CIO

Global Partners LP

Think Tank Speaker

Global Partners LP is an American energy supply company ranked 361 in the 2018 Fortune 500. The company is organized as a master limited partnership, and its operations focus on the importing of petroleum products and marketing them in North America.

Jim Haynie

Director, Information Technology

Oasis Systems

Think Tank Speaker

Oasis Systems, LLC provides information technology, cyber security and network management, systems engineering, enterprise software and applications, and professional services for the Department of Defense and federal agencies in the United States. It offers acquisition program management services, such as policy compliance, acquisition strategy development, milestone documentation support, RFP development, source selection technical support, program integration and control, foreign disclosure, test and evaluation, financial management and budget analysis, earned value management, schedule management, risk management, information assurance, contract administration, lifecycle logistics, configuration/data management, product support, and quality assurance.

Derek Donahue

Regional Sales Director, North East/Eastern Canada

Forward Networks

Think Tank Speaker

Derek Donahue has over 20 years of experience helping companies manage complex enterprise networks, including leadership positions at Gigamon and Big Switch Networks (acquired by Arista). Now at Forward Networks, Derek enables Fortune 500 businesses to make their networks more reliable, agile, and secure with Forward's revolutionary digital twin technology.

Robert Clougherty Ph.D.

CIO

Drew University

Think Tank Speaker

Experienced Vice President Of Technology and Provost with a demonstrated history of working in the higher education industry. Skilled in Educational Technology, Adult Education, Academic Advising, Grant Writing, and Higher Education Leadership. Unique strength is my ability to integrate technology and higher education. Primary Strengths: --Organization Building: I have created a college from scratch; two institutes; traditional degree programs; online degree programs; a mobile app; and a company to deploy the app. --High Technology Proficiency: Fluent and versed in most contemporary technologies, with a focus in EdTech; previous experience includes the development of a mobile app; director of two technology-based institutes; and clear understanding of the theories and values that drive technologies. --Expertise in Learning: 35 years working in both Higher Education and EdTech; served in roles at all levels of diverse learning organizations; have worked with multiple learning modalities. --Intellectual Ability: Current work is focusing on technologically supported curriculum development and deep learning and virtual reality in learning.

Sanjay Srivastava

Global CDO

Genpact

Think Tank Speaker

Sanjay Srivastava is Chief Digital Strategist at Genpact and chairs the Executive Technology Board – a think tank of F500 CIO, CDO and CTOs - driving digital transformation at the intersection of frontier technology, data fabrics, operating models, and process design. Genpact is a global provider of professional services for digital transformation and serves over a third of the F200. Previously, Sanjay has been a CDO, CEO, GM, entrepreneur and engineer. As CDO, Sanjay built out Genpact’s solutions in AI, Data, Analytics, Automation software, and Technology services, and led Genpact’s AI-based platform, Cora. Before that, as an entrepreneur Sanjay built four startups - in edge networking, data center automation, predictive software, and enterprise SaaS that were each then acquired by Akamai, BMC, SunGard (now FIS), and Genpact, respectively. He also held operating leadership roles at Hewlett Packard, Akamai, and SunGard, overseeing product management, global sales, and various product and services P&Ls. Sanjay is deeply rooted in the innovation ecosystem at Masa Group Ventures where he is a board advisor to several AI startups and a tech incubator, and a limited partner in digital-focused venture funds. He serves on the MMA CDO Board, is a member of the Digital 50, BCG’s Digital Transformation Network, and CNBC’s Technology Executive Council, and mentors at Intel Ignite and at the Creative Destruction Lab at the University of Washington, Seattle. He has lectured on Data and Digital at the Haas and Kellogg business schools at UC Berkeley and Northwestern University, and at IIM and IIT in India, and he is on the faculty at World50. He was named by IDG as a Top 10 Digital Transformation Influencer to Follow and as ORBIE Seattle’s 2023 Large Enterprise CIO Finalist. Sanjay earned his graduate degree at the University of Minnesota, Minneapolis and his undergraduate degree at the Indian Institute of Technology, Kharagpur and studied at the executive education programs at Northwestern University's Kellogg School and at Stanford University. Sanjay blogs regularly at [/digitally](https://www.linkedin.com/newsletters/6747238973573357568/).

DAN BENJAMIN

CEO & CO-FOUNDER

Dig Security

Think Tank Speaker

Dan Benjamin is the Co-Founder and CEO of Dig Security, a leading cloud data security company that helps organizations discover, monitor, protect, and govern their cloud data stores through a unified policy engine. Dig’s mission is to provide the data security stack for modern enterprises, protecting data wherever it lives inside an organization. Dan is an entrepreneur with over a decade of industry experience founding and leading startup companies, and has held leadership roles at Fortune 100 companies, including cloud and security leadership roles at Microsoft and Google. During this time, he noticed a gap in public cloud data security solutions, leading him to co-found Dig Security, a company dedicated to helping customers instantly identify cloud security issues to prevent breaches and attacks through real-time data detection and response. Dan is also a former member IDF (8200), an Israeli Intelligence Corps unit of the Israel Defense Forces.

Kevin Papadopoulos

Principal, Director of Investment Technology & CISO

Longfellow Investment Management Co

Think Tank Speaker

Mr. Papadopoulos is currently a Principal and the Director of Information Technology & CISO for Longfellow Investment Management (LIM). Prior to joining LIM in 2017, Kevin served as a senior application engineer at GMO. His responsibilities included supporting trading applications, improving system functionality, and coordinating with third-party vendors. Previously, he was an application manager at State Street Global Advisors, responsible for implementing order management systems as well as supporting the operational needs of the fixed income and cash trading desk. He was also involved in multiple initiatives to assure quality, improve efficiency, and achieve automation across various workflows. Kevin earned a Bachelor of Science in Business Administration with a dual focus in Management and MIS from Northeastern University and is currently pursuing an MBA/MFS degree at Boston College. He received a LEAN Facilitator certification from MoreSteam University and a LEAN Master Recognition from State Street. In addition, he earned the Cybersecurity: Managing Risk in the Information Age certificate from Harvard’s Office of the Vice Provost for Advances in Learning. Kevin is a member of various Computer Science boards and serves as an adjunct Professor for Computer Science and Cybersecurity courses in local Colleges.

Chris Eng

Chief Research Officer

Veracode, Inc.

Think Tank Speaker

Chris Eng is Chief Research Officer at Veracode. A founding member of the Veracode team, he is responsible for all research initiatives including applied research and product security, as well as advising on product strategy and M&A. Chris is a frequent speaker at industry conferences and serves on the review board for Black Hat USA. He is also a charter member of MITRE's CWE/CAPEC Board. Bloomberg, Fox Business, CBS, and other prominent media outlets have featured Chris in their coverage. Previously, Chris was technical director at Symantec (formerly @stake) and an engineer at the National Security Agency.

Tomas Persson

CISO

Omegapoint

Think Tank Speaker

A seasoned professional in security, risk, and privacy.

June 8, 2023

Agenda

All times Eastern Time

9:30 AM-10:15 AM

Registration


10:15 AM-11:00 AM

Morning Networking


11:00 AM-11:05 AM

Opening Remarks


11:10 AM-11:35 AM
Keynote

Generative AI and Digital Transformation: Unleashing Innovation and Shaping the Future

This Keynote explores the intersection of generative AI and digital transformation, highlighting the practical use case applications for businesses and the role of CIOs in leveraging their potential. Generative AI empowers organizations to enhance creativity, engage customers, overcome data limitations, optimize autonomous systems, and improve communication through automated content creation and language services. As part of the broader digital transformation journey, CIOs recognize generative AI as a transformative tool that drives innovation, fosters agility, and shapes the future of their organizations. By embracing generative AI as a strategic component of digital transformation, businesses can unlock new possibilities and gain a competitive edge in the rapidly evolving technological landscape.


11:40 AM-12:25 PM
Panel

The Promising Future of Artificial Intelligence (AI): Opportunities and Challenges Ahead

The potential of Artificial Intelligence (AI) is vast, as it is now being utilized across all industries. With the combination of machine learning, AI has made significant improvements in the field of cybersecurity. Automated security systems, natural language processing, face detection, and automatic threat detection are some examples of how AI is revolutionizing cybersecurity. However, AI is also being used to create intelligent malware and attacks, which can bypass the most up-to-date security protocols, making it a double-edged sword. On the positive side, AI-enabled threat detection systems have the ability to predict new attacks and immediately notify administrators in case of a data breach.

In partnership with:

12:25 PM-1:30 PM

Networking Lunch


1:30 PM-1:45 PM
Disruptor

Tackling Data Security in the Multi-Cloud Era

This year, the amount of data in public clouds has surpassed that residing on-prem. As such, enterprises no longer maintain full visibility, control, and governance of their data – for which they pay a steep price. 

In this session, Dan Benjamin, Co-Founder and CEO of Dig Security, will explain how organizations must approach data security in the multi-cloud era. 

With the cost of data breaches reaching all-time highs, protecting customer information has become the number one challenge for modern organizations. 

Dan will highlight the key capabilities organizations should look for in a cloud data security solution, including data security posture management (DSPM), real-time data detection and response (DDR), and cloud data loss prevention (cloud DLP). 

He will also dive deeper into three areas impacted by the mass migration of data to the cloud: privacy

  • to address regulatory compliance capabilities; governance
  • to determine who’s entitled to data access and sharing privileges and to define data ownership, accountability, and collaboration; and security
  • to protect locations where sensitive data typically resides.
In partnership with:

1:50 PM-2:35 PM
Vision Keynote Panel

Bridging the Gap Between IT and the Business

Bridging the gap between business and technology is not easy and requires discipline and balance between technology, people, and the business. For so many organizations today, technology is the business. Technology needs to be understood as a critical enabler in every part of the organization from the front line to the back office. It creates new value by crunching data to deliver new insights, it spurs innovation, and it disrupts traditional business models.

For business and technology leaders alike, new actions and behavioral changes can help their organizations make this shift. CIOs must take responsibility for problems, they should convey that when technology fails, many people typically share responsibility.


2:35 PM-3:00 PM

Networking Break


3:00 PM-3:15 PM
Disruptor

How to Ensure a Reliable, Predictable, and Secure Network With a Digital Twin

A network digital twin, based on a mathematical model, is a necessary tool to modernize mission-critical networks and to reduce cybersecurity risk.

It provides vendor-agnostic insight into network behavior, offers detailed visualization and verifies that the network is behaving according to the operator's intent. Functionality like search, modeling, and intent checks help engineering teams reduce MTTR, avoid outages, verify security posture, and ensure policy compliance across all network environments -- on-prem, cloud, and multi-cloud.

Derek Donahue will discuss how Fortune 500 businesses use a digital twin to make their network reliable, agile, and secure.

In partnership with:

3:20 PM-4:05 PM
Panel

Third-Party Exposure

In today's interconnected business world, companies rely on vendors and suppliers for various services, which can pose significant cybersecurity risks. Third-party exposure is a major concern, as companies can be held liable for any data breaches or security incidents that occur due to the actions of their third-party providers. In 2023, this risk is expected to increase as companies continue to outsource work to third-party providers. This makes it more critical for companies to have effective security measures in place to properly secure third-party access.

Failure to do so can result in data breaches, financial losses, and reputational damage. To mitigate this risk, companies must prioritize implementing comprehensive security measures that include vendor risk assessments, due diligence, contractual requirements, and ongoing monitoring. Additionally, companies must ensure that their third-party providers adhere to cybersecurity best practices and standards. By taking these proactive steps, companies can better protect themselves from the risks associated with third-party exposure in 2023 and beyond.


4:05 PM-4:10 PM

Closing Remarks & Raffle Giveaway


4:10 PM-5:10 PM

Cocktail Hour