The Future of Cybersecurity

CISO Think Tank

June 4, 2024 - San Francisco, CA

Visionaries

Cassie Crossley Schneider Electric
Cassie Crossley

VP, Supply Chain Security

Schneider Electric

Think Tank Speaker

Leading global product and systems security initiatives, software supply chain security, third party security, internal and external partnerships, secure development lifecycle training, governance, strategy, programs, policies, risk management, communication, change management, audit, assessments, and certification. Previous positions within Schneider Electric: * Vice President, Deputy Product Security Officer for the global Schneider Electric Product & Systems Security Office * CISO Office: Security Governance Program Director * Quotation CPQ Program Director using Oracle CPQ (BigMachines). CPQ - Configure, Price, Quote. * Director IT Operations and Integrations * Program Director of the Oracle ERP EBS R12 upgrade * Program, project, and portfolio management Director in R&D for the video product line in the Buildings business unit

Steve Z (Filler) Levi Strauss & Co.
Steve Zalewski

Former CISO

Levi Strauss & Co.

Think Tank Speaker

Mr. Zalewski currently provides CISO, security consulting and security advisory services. These include: • International cybersecurity advisor and trainer. • Executive advisory board member for security startups, providing guidance on security market direction and product requirements. • CISO advisory board member for venture capital firms internationally. • vCISO for companies requiring temporary or part-time CISO expertise. Services also include guidance and solutions to address incident response, security program design, security assessment, security due-diligence, vendor/supplier due-diligence, security architecture review, board reporting and other key security leadership requirements. Operational experience in Healthcare, Utilities and International Retail verticals. Key Strengths: •Organizational Management •Strategic Planning & Execution •Enterprise Security Architecture/Strategy •Executive and BOD Security Governance/Reporting •Cybersecurity Incident Response •Security Risk & Compliance Management Additionally, I co-hosts the CISOSeries Defense-in-Depth Podcasts and am a frequent speaker and panel moderator at industry events.

Stephen C (Filler) Nucompass Mobility
Stephen Chen

CTO

Nucompass Mobility

Think Tank Speaker

Stephen Chen is an entrepreneurial technologist with a demonstrated track record of developing innovative solutions that strategically align business objectives with cutting-edge technology. His expertise spans a range of domains, including data science, software engineering, cybersecurity, and digital marketing. With a rich background encompassing defense, commercial, and nonprofit sectors, Stephen brings a diverse skill set and operational excellence to the table. His unique blend of experience instills the discipline of large organizations into startups while reintroducing the agility of startups to larger enterprises. In addition to his corporate endeavors, Stephen has garnered significant exposure in board and advisory roles, particularly in the nonprofit and educational sectors. He has served as a board member and currently holds an advisory position for Here To Serve, a nonprofit dedicated to supporting families facing childhood cancer. Stephen maintains an active involvement in local schools, exemplified by his advisory council for the cyber security program at California State University, Chico.

Affan Syed Tech Mahindra
Affan Syed

Practice Head-Cyber Security & Risk Management Services-Americas Enterprise

Tech Mahindra

Think Tank Speaker

Affan is the practice head and Field CISO of TechM’s global security practice overseeing the Americas. As the business head, he oversees TechM’s client-facing security program delivery, structures security engagements, RFPs, SLAs, strategic vendor relationships and cost optimization, while managing a P&L revenue of USD $50+ million. Affan also partners with various lines of business, sales, marketing, engineering & technology leaders for CxO workshops & SME panel discussions impacting revenue growth. He has served multiple clients in consumer, government, financial services, healthcare, insurance, life sciences, media & technology industries. He is experienced with delivering hands-on advisory service engagements in the areas of information technology, digital transformation, and cyber risk management. He is actively involved in highlighting key security issues to board level executives, supporting it with relevant data and relatable metrics that help them to make informed decisions. In his prior role with Cognizant, he was the CISO with Cognizant’s Enterprise Risk and Security Services (ERSS) Healthcare strategic business unit, where he focused on creating the SBU cyber strategy, running operations & governance engagements and ensuring that they aligned with the broader security objectives of Cognizant in terms of tools and processes. With two decades of practice serving in over 100+ cyber security engagements of myriad scales, Affan brings in a wealth of experience managing cyber security projects and programs from various industries he has worked into prospective clients as they navigate, and seek to influence appropriately, a very active regulatory environment and an evolving cyber threat landscape.

June 4, 2024

Agenda

All times Pacific Time

8:30 AM-9:00 AM

Registration


9:00 AM-9:45 AM

Morning Networking


9:45 AM-9:55 AM

Opening Remarks


10:05 AM-10:35 AM
Keynote

Next Gen AI Integrated Cybersecurity

In an era where cyber threats are constantly evolving, traditional security measures are no longer sufficient to protect sensitive data and critical infrastructure. This keynote presentation will explore the transformative potential of next-generation AI integrated cybersecurity solutions. By leveraging advanced artificial intelligence, machine learning, and automated risk assessment, these cutting-edge systems provide unparalleled threat detection, response capabilities, and proactive defense mechanisms.

Attendees will gain insights into how AI can revolutionize cybersecurity by automating complex tasks, identifying patterns and anomalies in real-time, and enabling swift, data-driven decision-making. The presentation will cover practical applications, from enhancing Security Information and Event Management (SIEM) systems to optimizing Security Operations Centers (SOCs) with AI-driven analytics.

In partnership with:
Tech Mahindra

10:40 AM-11:35 AM
Keynote Panel

Gen AI - The Hype, The Story & Cybersecurity

GenAI, a revolutionary innovation in the world of artificial intelligence, has garnered immense attention and hype in recent years. Its story is one of rapid evolution and limitless potential, as it promises to transform industries, enhance decision-making processes, and revolutionize the way we interact with technology. However, amid the excitement, the role of cybersecurity becomes paramount. With GenAI's ever-expanding capabilities, the need for robust cybersecurity measures is essential to safeguard against potential risks and vulnerabilities. As we continue to unlock the possibilities of GenAI, the fusion of its incredible power with stringent cybersecurity practices will be the key to a safer and more promising future.


11:35 AM-11:55 AM

Coffee Break


11:55 AM-12:10 PM
Vision Voices

Insider Threats

Despite advancements in technology, human error remains one of the most significant causes of data breaches. Whether it's due to a bad day or intentional misconduct, a single vulnerability can lead to the theft of millions of pieces of sensitive information and even jeopardize an entire organization. According to a report by Verizon on data breaches, approximately 34 percent of all attacks can be directly or indirectly attributed to employees. Therefore, it is crucial to create a culture of awareness within the organization to safeguard data in every way possible. This involves educating employees on data security best practices and implementing stringent measures to prevent insider threats. By taking a proactive approach to data protection, organizations can mitigate risks and safeguard their reputation while maintaining the trust of their stakeholders.


12:15 PM-12:35 PM
Vision Voices

A Year of AI in Memes

For over a year, I’ve been documenting the memes about AI within my corner of the social media echo chamber. For my job, of course.
Memes are a reflection of cultural sentiment. Like any other piece of art, interpretation is in the eye of the beholder. For this session, I’ll do what one should never: allow strangers (you) to peek into my iPhone screenshots folder. Together, we will look at a lot of memes in an attempt to understand: how have we been feeling about AI? Where might we be headed, really? We may not uncover the answers, but we will at least scratch the itch to doom scroll. And I’ll try my best to not spend our entire time together uncontrollably laughing.
Now and forever: please send memes. 

12:40 PM-12:55 PM
Disruptor

Business Opportunities and Security Challenges in Gen AI Applications

This presentation delves into the business opportunities and security challenges posed by generative AI applications, particularly AI chatbots. The session includes a demo on hacking a popular chatbot, highlighting associated risks with AI. We will also discuss the broader impact of AI usage on CISOs' responsibilities and future job descriptions.


12:55 PM-1:45 PM

Lunch & Networking


1:45 PM-2:30 PM
Panel

Data Empowerment: A CISO's Guide to Unlocking Strategic Value Safely

CISOs are challenged to redefine their role not only as guardians of security but also as enablers of responsible and innovative data utilization. This directive emphasizes the importance of striking a balance between data protection and leveraging the full potential of organizational data assets. CISOs must collaborate with stakeholders to establish robust data governance frameworks, ensuring compliance with privacy regulations while facilitating the ethical and strategic use of data. By unlocking the value of data, CISOs contribute to the organization's competitiveness, innovation, and overall digital transformation. This session explores strategies for CISOs to harness the power of data responsibly, thereby positioning cybersecurity as an integral driver of business success in the data-driven era.


2:35 PM-2:50 PM
Vision Voices

Guarding the Cloud: Navigating the Rising Tide of Cloud Vulnerabilities and Cyber Threats in 2024

Cloud computing services have become a cornerstone of modern business operations, providing organizations with the agility and scalability needed to thrive in the digital age. However, in 2024, the threat of cloud vulnerabilities will continue to grow as more companies adopt cloud services. Cybercriminals are constantly finding new ways to exploit vulnerabilities in cloud infrastructure, which can result in data breaches, unauthorized access, and financial losses. To mitigate the risks of cloud-related security incidents, businesses must prioritize implementing robust security measures such as multi-factor authentication, encryption, and regular penetration testing. Additionally, businesses must develop comprehensive incident response plans that take into account the unique challenges of cloud-based attacks. By taking these steps, businesses can protect themselves and their customers from the growing threat of cloud vulnerabilities in the digital age.


2:55 PM-2:35 PM
Fireside Chat

Ransomware and Cyber Readiness

Ransomware attacks are in the headlines, affecting businesses and individuals in all sectors. Through 2024, these attacks have continued to grow, resulting in significant financial losses, data theft, and reputational damage. Even businesses that have achieved a level of cybersecurity compliance remain at risk unless they have understood what impact a ransomware attack really means in the context of their business.

The good news? When you have identified how to protect your business from a ransomware attack you have already defined what needs to be done to reduce your total cyber risk exposure across all levels of attack. Ransomware might be the most reported attack, but is nowhere near the most expensive or damaging cyber attack you might face.


3:35 PM-3:45 PM

Closing Remarks & Raffle Giveaway


3:45 PM-4:45 PM

Cocktail Networking


In Partnership With