The Future of IT & Cybersecurity

CXO Think Tank

March 23, 2023 - Houston, TX

Visionaries

Ben Halpert Castle Black
Ben Halpert

CSO

Castle Black

Think Tank Speaker

Ben Halpert is a man on a mission: to educate and empower today’s digital citizens. By day, he is the CSO at Castle Black providing individuals cybersecurity, online privacy, and digital hygiene services with 24/7 human support. By night, he champions cyber safety and ethics education throughout society via the 501(c)3 nonprofit Savvy Cyber Kids he founded. Ben has presented at the World Economic Forum, NACD directorship training, RSA Conference, TEDxSaintThomas, TEDxKids@Vilnius, GISEC Global, InfoSec World, SecureWorld, IEEE, ACM, CSO50, CIO/CISO Summits, and many other events. In addition to his numerous publications, Ben has been featured in the New York Times, Wired, Bloomberg, BBC, Kiplinger, Good Morning America, Good Day Atlanta, CNN HLN, Fox News, RogersTV, among others.--

Arthi Vasudevan Baker Hughes
Arthi Vasudevan

Sr. Product Manager, Cybersecurity

Baker Hughes

Think Tank Speaker

Arthi leads the cybersecurity product line at Nexus Controls, a Baker Hughes business, laying the technical and commercial strategy to provide end-to-end cybersecurity solutions to industrial customers. Over the last 14 years, she has led multiple impactful projects in mining, marine and energy industries in the areas of electrical and control system design, new product development, cybersecurity, project management, Lean Six Sigma, cost-out and lifecycle management. Arthi holds Bachelor’s and Master’s degrees in Electrical Engineering (EE), and an MBA from Rice University. She is the recipient of Houston Business Journal’s “Women Who Mean Business” award, and ALLY Energy’s GRIT award. She is also the upcoming author of a children’s book on cybersecurity called “Cyberama.”

Mark Fullbrook RevealSecurity
Mark Fullbrook

CRO

RevealSecurity

Think Tank Speaker

Experienced Chief Revenue Officer with a demonstrated history of working with the most promising tech investors and founders in delivering hyper growth. Passionate about building sales teams that overachieve, but just as passionate about seeing my teams succeed in the rest of their lives too. I’m a sales nerd with a specific interest in identifying how technology can remove friction from the sales process, drive efficiencies and allow sales to thrive whilst delivering highly predictable revenue. Thankful to have worked and learnt from some of the worlds leading authorities in sales. Driven by the fact that you can’t become the next big thing, by doing the same thing as the last big thing. You have to innovate…

March 23, 2023

Agenda

All times Central Time

10:30 AM-11:00 AM

Welcome & Registration


11:00 AM-11:15 AM

Opening Remarks


11:15 AM-11:30 AM

The Castle at Home

Technology executives are laser-focused on operating and securing the critical aspects of their business. Continuity, compliance, and risk management cannot come at the expense of high performance. When faced with the same responsibility for their family, security and privacy compromises unfortunately get made. They are simply stretched too thin.

Partners, children, and parents are reusing passwords that have already been part of a data breach. Security and privacy settings on Instagram, TikTok, Facebook, Snapchat, Venmo, LinkedIn, and WhatsApp are not met with the same rigor as AWS, Salesforce or DocuSign in the enterprise. MFA adoption is low.

Learn how a proactive consumer Cyber Health company is delivering cybersecurity, privacy, and digital hygiene to all.


11:35 AM-12:20 PM
Vision Keynote Panel

Creating Transformation Through Data & Analytics

If digital transformation is a journey, then data is the fuel that transports your company from here to there. Comprehending and creating insight from data is transformational. Being able to gather and analyze data to generate a competitive edge, creates new opportunities and promotes innovation. However, to support a pipeline of up-to-date and competitive modern data and analytics, a sound foundation and architecture must be constructed.


12:20 PM-1:20 PM

1:20 PM-1:35 PM
Disruptor

Detecting Imposters and Rogue Insiders in SaaS Applications

The combination of rogue insiders and external attackers makes SaaS application detection a massive pain point for enterprises, particularly within core business applications. External attackers leverage stolen credentials to impersonate an insider and connect to applications, while at the same time insiders are not sufficiently monitored. Such examples could include a fraudster’s takeover via social engineering, or incorrect implementation by an employee, or a doctor accessing celebrity patient medical data, or a salesperson downloading a report of all customers before switching to work for a competitor. Even after the enterprise receives a complaint or is otherwise suspicious, detection of these breaches usually consists of manual sifting through tons of log data from multiple sources. RevealSecurity’s CRO, Mark Fullbrook, will explore the growing challenge of SaaS application detection, explain why current detection solutions are usually ineffective, and share solutions using real customer examples.

In partnership with:
RevealSecurity

1:40 PM-2:20 PM
Fireside Chat

Cloud Security

According to Gartner 79% of companies have experienced at least one cloud data breach during the pandemic. Remote work is here to stay, and the concept of securing a perimeter has essentially ended. Traditional application security measures are broken. The need to innovate faster and shift to cloud-native application architectures isn’t just driving complexity, it’s creating significant vulnerability blind spots also.

Under the thumb of the pandemic, enterprises and IT leaders had to look for tech solutions that were resilient and agile to empower the remote workforce. To sustain business continuity plans, organizations shifted workloads to the cloud. As much as cloud adoption offers flexibility and productivity, it also exposes organizations to cyber threats and data breaches. So the question remains if moving to the cloud is the right thing to do and if so how to protect it from the new risks given that most organizations believe that application security should be completely automated to keep pace with dynamic clouds and rapid software development practices.


2:20 PM-2:35 PM

Networking Break


2:35 PM-3:20 PM
Panel

Security Controls: Measuring Efficacy for the Business Growth

The industry is spending record amounts on cybersecurity tooling, but somehow CISOs still are at times left scrambling to respond to the vulnerabilities like Log4j. Assuming that these types of critical and far-reaching events are inevitable, how can CISOs further improve their organization’s preparedness for future cyberattacks?

This panel will discuss potential strategies for determining the critical security controls - both technology and behavioral - that can minimize cyber-risks and give the organization the competitive advantage to grow and innovate. We will explore frameworks for measuring the efficacy of cybersecurity investments, and KPIs that show the board the investment is safeguarding the company's digital infrastructure for the long term.

In partnership with:
Uptycs

3:25 PM-4:10 PM
Fireside Chat

What’s AI Doing for You?

The terms "Artificial Intelligence" and "Advanced Machine Learning" are often thought of interchangeably. While there is a relationship between AI and AML, to say they are the same thing is an oversimplification and misclassification. Rather, one begets the other with AI being the basic principle upon which AML is developed.

As AI begins to mature and migrate away from purely advanced mathematical operations into decision making paradigms, AML steps forward as the predictive ability of machines to process vast quantities of data. As data and analytics becomes foundational to the way every business operates, AI and AML will become foundational capabilities.


4:10 PM-4:15 PM

Closing Remarks & Raffle Giveaway


4:15 PM-5:15 PM

Cocktail Hour


In Partnership With