The Future of Cybersecurity

CISO Think Tank

June 4, 2024 - San Francisco, CA

Past and Present Visionaries

Cassie Crossley

VP, Supply Chain Security, Cybersecurity & Product Security Office

Schneider Electric

Think Tank Speaker

Leading global product and systems security initiatives, software supply chain security, third party security, internal and external partnerships, secure development lifecycle training, governance, strategy, programs, policies, risk management, communication, change management, audit, assessments, and certification. Previous positions within Schneider Electric: * Vice President, Deputy Product Security Officer for the global Schneider Electric Product & Systems Security Office * CISO Office: Security Governance Program Director * Quotation CPQ Program Director using Oracle CPQ (BigMachines). CPQ - Configure, Price, Quote. * Director IT Operations and Integrations * Program Director of the Oracle ERP EBS R12 upgrade * Program, project, and portfolio management Director in R&D for the video product line in the Buildings business unit

Dennis Barnes

VP Security and Infrastructure

San Francisco Fire Credit Union

Think Tank Speaker

Dennis Barnes, is a highly accomplished Information Security Officer with over 20 years of experience in IT leadership. Known for his expertise in driving enterprise IT security protection, Dennis has a proven track record of steering enterprise-wide security strategies and programs to enhance organizational security posture. He excels in translating complex technical terms into easily understandable language and is a strategic advisor to business leaders. Dennis has a history of influencing leadership buy-in on cutting-edge strategies and initiatives, and he is seasoned in solving technical security challenges, including mitigating cyber attacks. Throughout his career, Dennis has managed teams of up to 200 people and budgets of up to $75M. Holding certifications including Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Ethical Hacker (CEH), Project Management Professional (PMP), and ITIL, Dennis has a wide range of expertise in compliance frameworks such as ISO 27001, NERC CIP, NIST, PCI, HIPAA, and FIPs 140-2. In his most recent role as VP of Infrastructure and Security at San Francisco Fire Credit Union, Dennis oversees the management of IT infrastructure and security for the credit union, ensuring robust protection. Prior to this, as the Chief Information Security Officer at Cooper Compliance, Dennis deployed advanced security technologies and conducted security assessments to enhance customer environments and ensure compliance with NERC CIP regulations. He led the development of security policies and procedures, implemented user awareness training programs, and established key vendor relationships to drive security investments efficiently. With a strong commitment to excellence and a wealth of experience in information security leadership, Dennis continues to drive innovation and advance cybersecurity practices in the industry.

Steve Zalewski

Former CISO

Levi Strauss & Co.

Think Tank Speaker

Mr. Zalewski currently provides CISO, security consulting and security advisory services. These include: • International cybersecurity advisor and trainer. • Executive advisory board member for security startups, providing guidance on security market direction and product requirements. • CISO advisory board member for venture capital firms internationally. • vCISO for companies requiring temporary or part-time CISO expertise. Services also include guidance and solutions to address incident response, security program design, security assessment, security due-diligence, vendor/supplier due-diligence, security architecture review, board reporting and other key security leadership requirements. Operational experience in Healthcare, Utilities and International Retail verticals. Key Strengths: •Organizational Management •Strategic Planning & Execution •Enterprise Security Architecture/Strategy •Executive and BOD Security Governance/Reporting •Cybersecurity Incident Response •Security Risk & Compliance Management Additionally, I co-hosts the CISOSeries Defense-in-Depth Podcasts and am a frequent speaker and panel moderator at industry events.

Stephen Chen

CTO

Nucompass Mobility

Think Tank Speaker

Stephen Chen is an entrepreneurial technologist with a demonstrated track record of developing innovative solutions that strategically align business objectives with cutting-edge technology. His expertise spans a range of domains, including data science, software engineering, cybersecurity, and digital marketing. With a rich background encompassing defense, commercial, and nonprofit sectors, Stephen brings a diverse skill set and operational excellence to the table. His unique blend of experience instills the discipline of large organizations into startups while reintroducing the agility of startups to larger enterprises. In addition to his corporate endeavors, Stephen has garnered significant exposure in board and advisory roles, particularly in the nonprofit and educational sectors. He has served as a board member and currently holds an advisory position for Here To Serve, a nonprofit dedicated to supporting families facing childhood cancer. Stephen maintains an active involvement in local schools, exemplified by his advisory council for the cyber security program at California State University, Chico.

Anand Dutta

Global Head Solutions CoE, Presales & Alliance – Cybersecurity & Risk Management Practice

Tech Mahindra

Think Tank Speaker

- Anand is a seasoned Techno-commercial professional with around 2 decades of experience in leading Presales, Solutioning, Alliances, strategy functions for Triple digit Million $ business Practices working with Large System Integration organization. - At Tech Mahindra, Anand is responsible for leading 3 global functions like Presales, Solution CoE competency & Alliance channels for the Cyber Security Practice. - Prior to joining Tech Mahindra, Anand has held leadership positions with L&T Infotech (LTI), Dimension Data, Ricoh, Wipro at various responsible lead roles across Presales, Channels, Delivery and BD functions. - Has experience of managing BD &; GTM strategies for System Integration, Managed Services, Consulting services targeting Government &; Large Enterprise customers globally. - Played lead roles in identifying, Onboarding and building strategic partnerships with Key Alliances for Cloud, Info Security and Infra across multiple geos. - Has in-depth expertise on Technical presales and solutioning across Infrastructure, Network, Cloud & Info Security solution architecting. - Has played pivotal roles in Building New Practice Units and competencies. Education: - Holds a Master’s degree in Business Management (MBA) from Narsee Monjee (NMIMS), Mumbai - Bachelors degree (B.Tech) in Computer Science Engineering from Kurukshetra University. - PRINCE2 & PMP certified Project Management professional. - Six Sigma Black belt &; ITIL Intermediate certified. - Certified from INSEAD in Business Strategy and Financial Acumen. Family: - Comes from a Bengali family based in Delhi. - Wife Sharmistha is a Home Maker. - Has Two kids - Son Anirban and Daughter Snigdha. - Deep appreciation for Music and a trained Singer and Tabla player. - Likes Travelling &; cooking whenever gets a chance.

June 4, 2024

Agenda

All times Pacific Time

8:30 AM-9:00 AM

Registration


9:00 AM-9:30 AM

Morning Networking


9:30 AM-9:40 AM

Opening Remarks


9:40 AM-10:05 AM
Vision Voices Keynote

Cyber Security Evolution of Artificial Intelligence (AI): Friend or Foe?

The potential of Artificial Intelligence (AI) is vast, as it is now being utilized across all industries. With the combination of machine learning, AI has made significant improvements in the field of cybersecurity. Automated security systems, natural language processing, face detection, and automatic threat detection are some examples of how AI is revolutionizing cybersecurity. However, AI is also being used to create intelligent malware and attacks, which can bypass the most up-to-date security protocols, making it a double-edged sword. On the positive side, AI-enabled threat detection systems have the ability to predict new attacks and immediately notify administrators in case of a data breach.


10:10 AM-10:35 AM
Keynote

Building Cyber Fortitude: CISO Strategies for Resilient Cybersecurity

In the realm of building cyber resilience, organizations confront increased risk exposure amidst bold moves and evolving external challenges. Despite investments in technology and data, risk leaders, including CISOs, express difficulty in keeping pace with the persistent threat of cyber crises. However, in today's business landscape, discussions of digital transformation or reinvention are inseparable from considerations of cybersecurity. Looking ahead, stakeholders, from the board to frontline cybersecurity operations, pose critical questions about resiliency. This includes inquiries about the adequacy of efforts to safeguard the company and its customers in the face of cyber attacks. The focus shifts to identifying opportunities to minimize the impact on business and shareholder value through effective threat response. Embracing cybersecurity as a whole-of-business endeavor, organizations are urged to align themselves with business owners, adapting to changes in the cyber landscape and fortifying resilience against disruptions. Building confidence in the cybersecurity program becomes paramount in navigating the dynamic and challenging cyber landscape effectively.

In partnership with:

10:35 AM-10:55 AM

Coffee Break


10:55 AM-11:10 AM
Vision Voices

Insider Threats

Despite advancements in technology, human error remains one of the most significant causes of data breaches. Whether it's due to a bad day or intentional misconduct, a single vulnerability can lead to the theft of millions of pieces of sensitive information and even jeopardize an entire organization. According to a report by Verizon on data breaches, approximately 34 percent of all attacks can be directly or indirectly attributed to employees. Therefore, it is crucial to create a culture of awareness within the organization to safeguard data in every way possible. This involves educating employees on data security best practices and implementing stringent measures to prevent insider threats. By taking a proactive approach to data protection, organizations can mitigate risks and safeguard their reputation while maintaining the trust of their stakeholders.


11:15 AM-12:00 PM
Panel

Gen AI - The Hype, The Story & Cybersecurity

GenAI, a revolutionary innovation in the world of artificial intelligence, has garnered immense attention and hype in recent years. Its story is one of rapid evolution and limitless potential, as it promises to transform industries, enhance decision-making processes, and revolutionize the way we interact with technology. However, amid the excitement, the role of cybersecurity becomes paramount. With GenAI's ever-expanding capabilities, the need for robust cybersecurity measures is essential to safeguard against potential risks and vulnerabilities. As we continue to unlock the possibilities of GenAI, the fusion of its incredible power with stringent cybersecurity practices will be the key to a safer and more promising future.


12:00 PM-1:00 PM

Lunch & Networking


1:00 PM-1:15 PM
Disruptor

Fortifying Cyber Security Together: A CISO's Call to Increase Cyber Transparency

In the evolving landscape of cybersecurity, the imperative to increase transparency takes center stage, driven by new laws and regulations mandating prompt reporting of cyber breaches. A notable example is the SEC's cyber disclosure rule, necessitating companies to report incidents within 72 hours. This shift from voluntary to mandatory information-sharing not only presents challenges but also opportunities. Compliance empowers organizations to construct more comprehensive defenses and actions against cyber risks. Regulatory guardrails provide confidence, allowing companies to explore, experiment, and compete securely. To stay ahead, a tech-enabled approach embedding cybersecurity across the enterprise is crucial. Looking forward, collaboration with the C-suite, particularly the Chief Risk Officer and General Counsel, is vital. Crafting a consistent narrative, setting priorities, and adapting to new cyber risk management practices become essential. Moreover, understanding board expectations, simplifying complex cyber regulations, and extending cybersecurity measures to external reporting teams are key considerations for navigating the regulatory landscape effectively.


1:20 PM-2:05 PM
Panel

Data Empowerment: A CISO's Guide to Unlocking Strategic Value Safely

CISOs are challenged to redefine their role not only as guardians of security but also as enablers of responsible and innovative data utilization. This directive emphasizes the importance of striking a balance between data protection and leveraging the full potential of organizational data assets. CISOs must collaborate with stakeholders to establish robust data governance frameworks, ensuring compliance with privacy regulations while facilitating the ethical and strategic use of data. By unlocking the value of data, CISOs contribute to the organization's competitiveness, innovation, and overall digital transformation. This session explores strategies for CISOs to harness the power of data responsibly, thereby positioning cybersecurity as an integral driver of business success in the data-driven era.


2:10 PM-2:25 PM
Vision Voices

Guarding the Cloud: Navigating the Rising Tide of Cloud Vulnerabilities and Cyber Threats in 2024

Cloud computing services have become a cornerstone of modern business operations, providing organizations with the agility and scalability needed to thrive in the digital age. However, in 2024, the threat of cloud vulnerabilities will continue to grow as more companies adopt cloud services. Cybercriminals are constantly finding new ways to exploit vulnerabilities in cloud infrastructure, which can result in data breaches, unauthorized access, and financial losses. To mitigate the risks of cloud-related security incidents, businesses must prioritize implementing robust security measures such as multi-factor authentication, encryption, and regular penetration testing. Additionally, businesses must develop comprehensive incident response plans that take into account the unique challenges of cloud-based attacks. By taking these steps, businesses can protect themselves and their customers from the growing threat of cloud vulnerabilities in the digital age.


2:25 PM-2:45 PM

Networking Break


2:45 PM-3:00 PM
Disruptor

Quantum Computing and IoT Security: A Dual Challenge for CISOs

As quantum computing edges closer to reality, organizations face a paradigm shift in cybersecurity. This session explores the potential impact of quantum computing on existing encryption methods, emphasizing the need for proactive measures by CISOs to fortify digital defenses. With the looming threat of quantum decryption rendering conventional security protocols vulnerable, CISOs must strategize for the post-quantum era. Simultaneously, the rapid proliferation of Internet of Things (IoT) devices amplifies the attack surface, intensifying the significance of robust IoT security. CISOs are tasked with safeguarding interconnected devices, data integrity, and user privacy. This abstract underscores the dual challenge of quantum computing's transformative potential and the imperative for enhanced IoT security, urging CISOs to spearhead adaptive strategies that secure organizations in this evolving digital landscape.


3:05 PM-3:20 PM
Vision Voices

Cyber Hygiene 2024: Building a Secure Future in the Digital Era

In the digital age, practicing good cyber hygiene is essential to maintaining the security and integrity of personal and business data. However, in 2024, the lack of basic cyber hygiene practices will continue to be a major cause of cyber incidents. Cybercriminals exploit these vulnerabilities to gain unauthorized access to sensitive information, steal data, and launch damaging cyber-attacks. It's crucial for individuals and businesses to prioritize basic cyber hygiene practices, such as using strong passwords, regularly updating software, and backing up data. Additionally, individuals and businesses must educate themselves and their employees on cybersecurity best practices and the latest threats to stay ahead of the evolving threat landscape. By taking these proactive steps, individuals and businesses can protect themselves from cybercriminals who prey on poor cyber hygiene practices.


3:25 PM-4:00 PM
Fireside Chat

Ransomware and Cyber Readiness

Ransomware attacks are in the headlines, affecting businesses and individuals in all sectors. Through 2024, these attacks have continued to grow, resulting in significant financial losses, data theft, and reputational damage. Even businesses that have achieved a level of cybersecurity compliance remain at risk unless they have understood what impact a ransomware attack really means in the context of their business.

The good news? When you have identified how to protect your business from a ransomware attack you have already defined what needs to be done to reduce your total cyber risk exposure across all levels of attack. Ransomware might be the most reported attack, but is nowhere near the most expensive or damaging cyber attack you might face.


4:00 PM-4:10 PM

Closing Remarks & Raffle Giveaway


4:10 PM-5:30 PM

Cocktail Networking


In Partnership With