The Future of IT

CIO Think Tank

March 9, 2023 - Chicago, IL

Visionaries

Lonnie Washington City Colleges of Chicago
Lonnie Washington

Executive Director Infrastructure Services

City Colleges of Chicago

Think Tank Speaker

Responsible for managing infrastructure services for City Colleges of Chicago. City Colleges of Chicago, officially known as Community College District 508, is one of the nation's largest community college districts and the largest in Illinois. About 5,000 thousand faculty and staff help prepare 80,000 students each year to enter the workforce, pursue higher education and advance their careers. The District serves students on seven campuses and five satellite sites. It also oversees two restaurants and five child care centers.

Ben Halpert CISO Horizon
Ben Halpert

Founder & CEO

CISO Horizon

Think Tank Speaker

By day, he is a Fractional CISO and Cybersecurity Advisor for multiple companies building, running, and optimizing cybersecurity programs. By night, he champions cyber safety and ethics education throughout society via the 501(c)3 nonprofit Savvy Cyber Kids he founded. Ben has presented at the World Economic Forum, NACD directorship training, RSA Conference, TEDxSaintThomas, TEDxKids@Vilnius, GISEC Global, InfoSec World, SecureWorld, IEEE, ACM, CSO50, CIO/CISO Summits, and many other events. In addition to his numerous publications, Ben has been featured in the New York Times, Wired, Bloomberg, BBC, Kiplinger, Good Morning America, Good Day Atlanta, CNN HLN, Fox News, RogersTV, among others.

James Christiansen Netskope
James Christiansen

VP CSO

Netskope

Think Tank Speaker

James Christiansen is Netskope’s vice president of cloud security transformation and leader of the Chief Strategy Office. He is focused on enhancing the sales staff reach into Netskope’s global clients and helping drive thought leadership in cloud security transformation. James brings extensive expertise as a global leader in information security. Prior to joining Netskope, he was vice president CISO at Teradata where he led the global security, physical, and information security teams. Previously, James was vice president of information risk management at Optiv, chief information risk officer for Evantix, and CISO at Experian Americas, General Motors, and Visa International. As a sought-after expert speaker on security, James has been featured at numerous prestigious events, including the Business Roundtable, Research Board, American Bar Association, American Banker, the RSA Conference, BankInfoSecurity, ISSA, ISACA, HIMSS, and MIS Training Institute. He has also been featured in The New York Times and quoted as an expert in USA Today, The Wall Street Journal, Reuters, United States Cybersecurity Magazine, Bloomberg, and Healthcare IT News. James is a patent inventor and has received three innovation awards in cyber security, GRC, and cloud computing. He is the author of the Internet Survival Series and contributing author of CISO Essentials, as well as numerous industry papers.

March 9, 2023

Agenda

All times Central Time

10:30 AM-11:15 AM

Welcome & Registration


11:15 AM-12:00 PM
Panel

Security is a Team Sport. Break Down the Silos

Building trust and reliance across technology and security teams is key to defending the enterprise.  As security stacks incorporate Security Service Edge (SSE) to sustain the SASE journey, the partnership between CIOs, CISOs, and their teams is more important than ever.

Join this panel to learn about:

  • Best practices for IT and security collaboration
  • Communicating the importance of SSE to your CEO and Board
  • Improving internal stakeholder relationships to fuel business outcomes

12:00 PM-1:00 PM

Lunch & Innovation Showcase


12:45 PM-1:05 PM
Disruptor

Detecting Imposters and Rogue Insiders in SaaS Applications

The combination of rogue insiders and external attackers makes SaaS application detection a massive pain point for enterprises, particularly within core business applications. External attackers leverage stolen credentials to impersonate an insider and connect to applications, while at the same time insiders are not sufficiently monitored. Such examples could include a fraudster’s takeover via social engineering, or incorrect implementation by an employee, or a doctor accessing celebrity patient medical data, or a salesperson downloading a report of all customers before switching to work for a competitor. Even after the enterprise receives a complaint or is otherwise suspicious, detection of these breaches usually consists of manual sifting through tons of log data from multiple sources. RevealSecurity’s CRO, Mark Fullbrook, will explore the growing challenge of SaaS application detection, explain why current detection solutions are usually ineffective, and share solutions using real customer examples.

In partnership with:
RevealSecurity

1:10 PM-1:55 PM
Panel

Overcome Any Ransomware Attack with Cyber Resilience Leadership

Given the rise in attacks, the growing sophistication of these incidents and the potential financial impact, morale and burnout of Cybersecurity Teams is increasing. According to Gartner, a key stressor of the work is that often teams are playing a game they can’t win. But there are opportunities for teams to be recognized for putting “points on the board” rather than just blocking opponents. Cyber Resilience Jiu-JitCISO Leadership is the way to get there.


2:00 PM-2:45 PM
Panel

Security Controls: Measuring Efficacy for the Business Growth

The industry is spending record amounts on cybersecurity tooling, but somehow CISOs still are at times left scrambling to respond to the vulnerabilities like Log4j. Assuming that these types of critical and far-reaching events are inevitable, how can CISOs further improve their organization’s preparedness for future cyberattacks?

This panel will discuss potential strategies for determining the critical security controls - both technology and behavioral - that can minimize cyber-risks and give the organization the competitive advantage to grow and innovate. We will explore frameworks for measuring the efficacy of cybersecurity investments, and KPIs that show the board the investment is safeguarding the company's digital infrastructure for the long term.

In partnership with:
Uptycs

2:45 PM-3:05 PM

Networking Break


3:05 PM-3:50 PM
Panel

Scaling Operations & Security Teams with Observability

IT and security leaders struggle filling roles and finding the right skills in today’s market, while burnout pushes more workers out of critical fields. A core challenge for these teams is dealing with the onslaught of data. Observability data pipelines reduce the effort needed to onboard new data sources, extract the signal from the noise in high volume sources, and break down data silos.

In partnership with:
Cribl, Inc.

3:50 PM-4:10 PM

Networking Break


4:10 PM-4:55 PM
Panel

Bridging the Gap Between IT and the Business

Bridging the gap between business and technology is not easy and requires discipline and balance between technology, people, and the business. For so many organizations today, technology is the business. Technology needs to be understood as a critical enabler in every part of the organization from the front line to the back office. It creates new value by crunching data to deliver new insights, it spurs innovation, and it disrupts traditional business models.

For business and technology leaders alike, new actions and behavioral changes can help their organizations make this shift. CIOs must take responsibility for problems, they should convey that when technology fails, many people typically share responsibility.


4:55 PM-5:05 PM

Closing Remarks & Raffle Giveaway


5:05 PM-6:05 PM

Cocktail Hour


In Partnership With