The Future of Cybersecurity

CISO Think Tank

October 17, 2023 - Dallas, TX

Visionaries & Speakers

Robert Pace
CISO
Invitation Homes

Think Tank Speaker

Robert is the Vice President, Information Security and CISO for Invitation Homes. He is responsible for leading the Information Security program for Invitation Homes. Responsibilities include establishing a sound security strategy, governance, operations, service delivery, business integration and end-user awareness training. Robert’s career spans over 20 years in leading global teams in the delivery of IT Security operations. Robert has been influential in the leadership, design of security operations and delivery at First American Payment Systems, Dell Services, Williamson-Dickie Mfg. Co., Bell Helicopter, Textron and Ameritech. Robert also has significant consulting experience obtained while working at PricewaterhouseCoopers. Robert has a Bachelor of Science Degree from Michigan State University and a Master of Science Degree from Walsh College of Business and Accountancy. Robert has completed the Executive Leadership Program at Thunderbird - Gavin School of International Management. He is a Certified Information Systems Security Professional (CISSP), a Certified Information Security Manager (CISM), Certified Chief Information Security Officer (C|CISO), ITILv3 and a Certified Six-Sigma Green Belt.
Patrick Benoit
Global CISO
Brink's inc

Think Tank Speaker

Patrick is the Global Head of Cyber Governance, Risk, and Compliance / Business Information Security Officer for CBRE. He was formerly the Deputy CISO for Cheetah Digital. He has been an Executive Business Partner at Experian; a Customer Delivery Executive and Service Delivery Leader at Dell; and owned a technology consulting company. He is a highly effective Business Leader with a mastery of Technology and Security. He is also a Writer, Speaker, and a continuous Mentor/Advisor and Learner. Patrick works across all technology and security domains and is experienced at building technology and security programs from the ground up. Patrick has owned his own technology consulting company, led software development and infrastructure organizations, and worked with all levels of executive leadership in technology, operations, and security. He holds certifications as C/CISO, CISM, CRISC, CISSP, CCP, PMP, ITIL Expert, and Lean Six Sigma Black Belt. Patrick earned a Master of Science degree in Economics from the University of Texas at El Paso and a Bachelor of Science degree in Technology from Cameron University after serving as an enlisted soldier and commissioned officer for nearly 6 years in the Army. In his spare time, he is a commercial pilot and flight instructor. He studies and teaches Aikido, rides motorcycles, and is an avid reader of Chinese Philosophy. His favorite teaching is “From Chaos Comes Greatness,” from the Chinese Book of Changes (I Ching). He has two grown sons, four granddaughters, and a grandson. He lives and works in the Dallas-Fort Worth area.
Mahesh Reddy
CISO
Prime Healthcare

Think Tank Speaker

CISO and Director of Telecommunications in the healthcare industry. Skilled in Healthcare Information Technology (HIT), Security, Management, Business Strategy, Vendor Management, Software development. Strong information technology professional with a Master's degree focused in Information Technology (Security) from Central Queensland University, Melbourne Campus.
John Tryon
Deputy CISO
Health Care Service Corporation

Think Tank Speaker

Information Services Security Leader with over twenty-five years combined experience in pharmaceutical, healthcare and consumer products industries providing leadership in the strategy, design and development of Global Enterprise Information Risk Management and Compliance Services.
James Lapalme
VP & GM Identity Business Unit
Entrust

Think Tank Speaker

James Lapalme is the VP/GM of the Identity business unit at Entrust for past five year. With over 25 years global IT security experience having managed teams in China, France, Netherlands, USA, Canada, Brazil, UK & Singapore. A highly experienced individual in SaaS, cybersecurity, blockchain/Decentralized, Cryptography & Identity. Prior to Entrust, James was at a variety of tier 1 vendors and start-ups, including Irdeto, Leonovus, Nortel & CloudLink.
October 17, 2023

Attend this event

Not available on October 17, 2023?
View other dates for the Think Tank

Agenda

All times Central Time
9:30 AM-10:00 AM
Registration

10:00 AM-10:30 AM
Morning Networking

10:30 AM-10:35 AM
Opening Remarks

10:35 AM-11:20 AM
Vision Keynote Panel
Bridging the Gap Between IT and the Business

Bridging the gap between business and technology is not easy and requires discipline and balance between technology, people, and the business. For so many organizations today, technology is the business. Technology needs to be understood as a critical enabler in every part of the organization from the front line to the back office. It creates new value by crunching data to deliver new insights, it spurs innovation, and it disrupts traditional business models.

For business and technology leaders alike, new actions and behavioral changes can help their organizations make this shift. CIOs must take responsibility for problems, they should convey that when technology fails, many people typically share responsibility.

Patrick Benoit
Global CISO
Brink's inc
Patrick is the Global Head of Cyber Governance, Risk, and Compliance / Business Information Security Officer for CBRE. He was formerly the Deputy CISO for Cheetah Digital. He has been an Executive Business Partner at Experian; a Customer Delivery Executive and Service Delivery Leader at Dell; and owned a technology consulting company. He is a highly effective Business Leader with a mastery of Technology and Security. He is also a Writer, Speaker, and a continuous Mentor/Advisor and Learner. Patrick works across all technology and security domains and is experienced at building technology and security programs from the ground up. Patrick has owned his own technology consulting company, led software development and infrastructure organizations, and worked with all levels of executive leadership in technology, operations, and security. He holds certifications as C/CISO, CISM, CRISC, CISSP, CCP, PMP, ITIL Expert, and Lean Six Sigma Black Belt. Patrick earned a Master of Science degree in Economics from the University of Texas at El Paso and a Bachelor of Science degree in Technology from Cameron University after serving as an enlisted soldier and commissioned officer for nearly 6 years in the Army. In his spare time, he is a commercial pilot and flight instructor. He studies and teaches Aikido, rides motorcycles, and is an avid reader of Chinese Philosophy. His favorite teaching is “From Chaos Comes Greatness,” from the Chinese Book of Changes (I Ching). He has two grown sons, four granddaughters, and a grandson. He lives and works in the Dallas-Fort Worth area.

11:25 AM-11:50 AM
Keynote
Cloud Vulnerabilities

Cloud computing services have become a cornerstone of modern business operations, providing organizations with the agility and scalability needed to thrive in the digital age. However, in 2023, the threat of cloud vulnerabilities will continue to grow as more companies adopt cloud services. Cybercriminals are constantly finding new ways to exploit vulnerabilities in cloud infrastructure, which can result in data breaches, unauthorized access, and financial losses. To mitigate the risks of cloud-related security incidents, businesses must prioritize implementing robust security measures such as multi-factor authentication, encryption, and regular penetration testing. Additionally, businesses must develop comprehensive incident response plans that take into account the unique challenges of cloud-based attacks. By taking these steps, businesses can protect themselves and their customers from the growing threat of cloud vulnerabilities in the digital age.


11:50 AM-12:50 PM
Lunch & Disruptor Showcase

12:35 PM-12:50 PM
Lunch & Disruptor Showcase
The Road to an Optimal Zero Trust Strategy

Disappearing perimeter, expanding attack surface, inevitable breaches, and the acceleration of digital transformation pose an increasingly complex challenge for organizations of all sizes. The Zero Trust framework provides a blueprint to secure data and networks in today’s multi-cloud environment, but the path to get there remains fragmented and challenging. 

Join us to discuss

  • Why establishing trusted Phishing Resistant identities across users, devices, apps, and workloads is critical to a strong foundation for an optimal Zero Trust strategy 
  • Use Case Strategies against a Zero Trust Framework
  • How you can build a roadmap to implement an optimal Zero Trust framework for your organization, to protect against threats today and in a Post Quantum (PQ) future 

In partnership with

12:50 PM-1:35 PM
Panel
Third-Party Exposure

In today's interconnected business world, companies rely on vendors and suppliers for various services, which can pose significant cybersecurity risks. Third-party exposure is a major concern, as companies can be held liable for any data breaches or security incidents that occur due to the actions of their third-party providers. In 2023, this risk is expected to increase as companies continue to outsource work to third-party providers. This makes it more critical for companies to have effective security measures in place to properly secure third-party access. Failure to do so can result in data breaches, financial losses, and reputational damage. To mitigate this risk, companies must prioritize implementing comprehensive security measures that include vendor risk assessments, due diligence, contractual requirements, and ongoing monitoring. Additionally, companies must ensure that their third-party providers adhere to cybersecurity best practices and standards. By taking these proactive steps, companies can better protect themselves from the risks associated with third-party exposure in 2023 and beyond.


1:40 PM-1:55 PM
Disruptor
Making Pivotal Power Moves with AI/ML in Software Security

In today's landscape where cybersecurity threats evolve rapidly, AI/ML offers a game-changing approach to security. Ensure your organization's resilience in the face of ever-evolving cyber threats with an automated power shift. From their remarkable threat detection capabilities to their predictive analysis and adaptability to emerging threats, discover how you can pivot with AI/ML to empower your security measures. 


In partnership with

1:55 PM-2:15 PM
Networking Break

2:15 PM-3:00 PM
Panel
Social Engineering: New in 2023

Social engineering attacks are a growing concern for businesses and individuals alike, as cybercriminals continue to use advanced techniques to trick people into divulging sensitive information or performing actions that can lead to data breaches. In 2023, these attacks are expected to become even more sophisticated, making it increasingly challenging for individuals and businesses to identify and prevent them. To protect themselves, individuals and businesses must be vigilant and aware of these tactics. They must also implement comprehensive security measures, such as security awareness training, anti-phishing software, two-factor authentication, and access controls. Additionally, businesses must establish policies and procedures for responding to social engineering attacks, including incident response plans, data backup and recovery, and regular security assessments. By taking these proactive steps, businesses and individuals can better protect themselves from the risks associated with social engineering attacks in 2023 and beyond.


3:05 PM-3:40 PM
Fireside Chat
The Promising Future of Artificial Intelligence (AI): Opportunities and Challenges Ahead

The potential of Artificial Intelligence (AI) is vast, as it is now being utilized across all industries. With the combination of machine learning, AI has made significant improvements in the field of cybersecurity. Automated security systems, natural language processing, face detection, and automatic threat detection are some examples of how AI is revolutionizing cybersecurity. However, AI is also being used to create intelligent malware and attacks, which can bypass the most up-to-date security protocols, making it a double-edged sword. On the positive side, AI-enabled threat detection systems have the ability to predict new attacks and immediately notify administrators in case of a data breach.


3:40 PM-4:00 PM
Networking Break

4:00 PM-4:45 PM
Panel
Ransomware

Ransomware attacks are becoming increasingly prevalent and sophisticated, affecting businesses and individuals in all sectors. In 2023, these attacks are expected to continue to grow, resulting in significant financial losses, data theft, and reputational damage. Businesses should implement comprehensive security measures, including regular backups, employee training, and endpoint security, to minimize the risk of a ransomware attack. Additionally, it's important to have a response plan in place to minimize the impact of an attack if it does occur.


4:45 PM-4:50 PM
Closing Remarks & Raffle Giveaway

4:50 PM-6:00 PM
Cocktail Hour

In Partnership With