In an era where cyber threats are constantly evolving, traditional security measures are no longer sufficient to protect sensitive data and critical infrastructure. This keynote presentation will explore the transformative potential of next-generation AI integrated cybersecurity solutions. By leveraging advanced artificial intelligence, machine learning, and automated risk assessment, these cutting-edge systems provide unparalleled threat detection, response capabilities, and proactive defense mechanisms.
Attendees will gain insights into how AI can revolutionize cybersecurity by automating complex tasks, identifying patterns and anomalies in real-time, and enabling swift, data-driven decision-making. The presentation will cover practical applications, from enhancing Security Information and Event Management (SIEM) systems to optimizing Security Operations Centers (SOCs) with AI-driven analytics.
The Future of Cybersecurity
CISO Think Tank
June 4, 2024 - San Francisco, CA
Visionaries
Cassie Crossley
VP, Supply Chain Security
Schneider Electric
Think Tank Speaker
Leading global product and systems security initiatives, software supply chain security, third party security, internal and external partnerships, secure development lifecycle training, governance, strategy, programs, policies, risk management, communication, change management, audit, assessments, and certification. Previous positions within Schneider Electric: * Vice President, Deputy Product Security Officer for the global Schneider Electric Product & Systems Security Office * CISO Office: Security Governance Program Director * Quotation CPQ Program Director using Oracle CPQ (BigMachines). CPQ - Configure, Price, Quote. * Director IT Operations and Integrations * Program Director of the Oracle ERP EBS R12 upgrade * Program, project, and portfolio management Director in R&D for the video product line in the Buildings business unit
Hemam Muthyala
CISO
SPAN
Akshay Wattal
Head of Security Engineering
Ripple
Chris Kirschke
Product Owner, GenAI Security
Albertsons Companies
Steve Zalewski
Former CISO
Levi Strauss & Co.
Think Tank Speaker
Mr. Zalewski currently provides CISO, security consulting and security advisory services. These include: • International cybersecurity advisor and trainer. • Executive advisory board member for security startups, providing guidance on security market direction and product requirements. • CISO advisory board member for venture capital firms internationally. • vCISO for companies requiring temporary or part-time CISO expertise. Services also include guidance and solutions to address incident response, security program design, security assessment, security due-diligence, vendor/supplier due-diligence, security architecture review, board reporting and other key security leadership requirements. Operational experience in Healthcare, Utilities and International Retail verticals. Key Strengths: •Organizational Management •Strategic Planning & Execution •Enterprise Security Architecture/Strategy •Executive and BOD Security Governance/Reporting •Cybersecurity Incident Response •Security Risk & Compliance Management Additionally, I co-hosts the CISOSeries Defense-in-Depth Podcasts and am a frequent speaker and panel moderator at industry events.
Shadaab Kanwal
Managing Director Digital, Data and Analytics Services
Charles Schwab
Stephen Chen
CTO
Nucompass Mobility
Think Tank Speaker
Stephen Chen is an entrepreneurial technologist with a demonstrated track record of developing innovative solutions that strategically align business objectives with cutting-edge technology. His expertise spans a range of domains, including data science, software engineering, cybersecurity, and digital marketing. With a rich background encompassing defense, commercial, and nonprofit sectors, Stephen brings a diverse skill set and operational excellence to the table. His unique blend of experience instills the discipline of large organizations into startups while reintroducing the agility of startups to larger enterprises. In addition to his corporate endeavors, Stephen has garnered significant exposure in board and advisory roles, particularly in the nonprofit and educational sectors. He has served as a board member and currently holds an advisory position for Here To Serve, a nonprofit dedicated to supporting families facing childhood cancer. Stephen maintains an active involvement in local schools, exemplified by his advisory council for the cyber security program at California State University, Chico.
Pratik Savla
Enterprise Security Strategy and Compliance Principal
Synaptics Incorporated
Cooper Chien
VP of Digital Technology
WeDriveU
Srinivas Haridas
Former Head of Data Engineering
BMO Financial Group
Alex Marzano
CIO
NexGen Power System
Jonathan Chan
Head of Global IT & Security
Episource
Anand Thangaraju
Director, Product Technology Risk
Zelle
Tas Jalali
CISO
AC Transit
Savannah Kunovsky
Managing Director, Emerging Technology
IDEO
Chirag Shah
Global Information Security Officer & DPO
Model N
Affan Syed
Practice Head-Cyber Security & Risk Management Services-Americas Enterprise
Tech Mahindra
Think Tank Speaker
Affan is the practice head and Field CISO of TechM’s global security practice overseeing the Americas. As the business head, he oversees TechM’s client-facing security program delivery, structures security engagements, RFPs, SLAs, strategic vendor relationships and cost optimization, while managing a P&L revenue of USD $50+ million. Affan also partners with various lines of business, sales, marketing, engineering & technology leaders for CxO workshops & SME panel discussions impacting revenue growth. He has served multiple clients in consumer, government, financial services, healthcare, insurance, life sciences, media & technology industries. He is experienced with delivering hands-on advisory service engagements in the areas of information technology, digital transformation, and cyber risk management. He is actively involved in highlighting key security issues to board level executives, supporting it with relevant data and relatable metrics that help them to make informed decisions. In his prior role with Cognizant, he was the CISO with Cognizant’s Enterprise Risk and Security Services (ERSS) Healthcare strategic business unit, where he focused on creating the SBU cyber strategy, running operations & governance engagements and ensuring that they aligned with the broader security objectives of Cognizant in terms of tools and processes. With two decades of practice serving in over 100+ cyber security engagements of myriad scales, Affan brings in a wealth of experience managing cyber security projects and programs from various industries he has worked into prospective clients as they navigate, and seek to influence appropriately, a very active regulatory environment and an evolving cyber threat landscape.
Janice Le
GM, Microsoft Security, Compliance, Identity & Privacy
Microsoft
June 4, 2024
Attend this event
Agenda
All times Pacific Time
8:30 AM-9:00 AM
Registration
9:00 AM-9:45 AM
Morning Networking
9:45 AM-9:55 AM
Opening Remarks
10:05 AM-10:35 AM
Keynote
Next Gen AI Integrated Cybersecurity
10:40 AM-11:35 AM
Keynote Panel
Gen AI - The Hype, The Story & Cybersecurity
GenAI, a revolutionary innovation in the world of artificial intelligence, has garnered immense attention and hype in recent years. Its story is one of rapid evolution and limitless potential, as it promises to transform industries, enhance decision-making processes, and revolutionize the way we interact with technology. However, amid the excitement, the role of cybersecurity becomes paramount. With GenAI's ever-expanding capabilities, the need for robust cybersecurity measures is essential to safeguard against potential risks and vulnerabilities. As we continue to unlock the possibilities of GenAI, the fusion of its incredible power with stringent cybersecurity practices will be the key to a safer and more promising future.
11:35 AM-11:55 AM
Coffee Break
11:55 AM-12:10 PM
Vision Voices
Insider Threats
Despite advancements in technology, human error remains one of the most significant causes of data breaches. Whether it's due to a bad day or intentional misconduct, a single vulnerability can lead to the theft of millions of pieces of sensitive information and even jeopardize an entire organization. According to a report by Verizon on data breaches, approximately 34 percent of all attacks can be directly or indirectly attributed to employees. Therefore, it is crucial to create a culture of awareness within the organization to safeguard data in every way possible. This involves educating employees on data security best practices and implementing stringent measures to prevent insider threats. By taking a proactive approach to data protection, organizations can mitigate risks and safeguard their reputation while maintaining the trust of their stakeholders.
12:15 PM-12:35 PM
Vision Voices
A Year of AI in Memes
Savannah Kunovsky
Managing Director, Emerging Technology
IDEO
12:40 PM-12:55 PM
Disruptor
Business Opportunities and Security Challenges in Gen AI Applications
This presentation delves into the business opportunities and security challenges posed by generative AI applications, particularly AI chatbots. The session includes a demo on hacking a popular chatbot, highlighting associated risks with AI. We will also discuss the broader impact of AI usage on CISOs' responsibilities and future job descriptions.
Cooper Chien
VP of Digital Technology
WeDriveU
12:55 PM-1:45 PM
Lunch & Networking
1:45 PM-2:30 PM
Panel
Data Empowerment: A CISO's Guide to Unlocking Strategic Value Safely
CISOs are challenged to redefine their role not only as guardians of security but also as enablers of responsible and innovative data utilization. This directive emphasizes the importance of striking a balance between data protection and leveraging the full potential of organizational data assets. CISOs must collaborate with stakeholders to establish robust data governance frameworks, ensuring compliance with privacy regulations while facilitating the ethical and strategic use of data. By unlocking the value of data, CISOs contribute to the organization's competitiveness, innovation, and overall digital transformation. This session explores strategies for CISOs to harness the power of data responsibly, thereby positioning cybersecurity as an integral driver of business success in the data-driven era.
Panelists
Srinivas Haridas
Former Head of Data Engineering
BMO Financial Group
Jonathan Chan
Head of Global IT & Security
Episource
Tas Jalali
CISO
AC Transit
2:35 PM-2:50 PM
Vision Voices
Guarding the Cloud: Navigating the Rising Tide of Cloud Vulnerabilities and Cyber Threats in 2024
Cloud computing services have become a cornerstone of modern business operations, providing organizations with the agility and scalability needed to thrive in the digital age. However, in 2024, the threat of cloud vulnerabilities will continue to grow as more companies adopt cloud services. Cybercriminals are constantly finding new ways to exploit vulnerabilities in cloud infrastructure, which can result in data breaches, unauthorized access, and financial losses. To mitigate the risks of cloud-related security incidents, businesses must prioritize implementing robust security measures such as multi-factor authentication, encryption, and regular penetration testing. Additionally, businesses must develop comprehensive incident response plans that take into account the unique challenges of cloud-based attacks. By taking these steps, businesses can protect themselves and their customers from the growing threat of cloud vulnerabilities in the digital age.
Anand Thangaraju
Director, Product Technology Risk
Zelle
2:55 PM-2:35 PM
Fireside Chat
Ransomware and Cyber Readiness
Ransomware attacks are in the headlines, affecting businesses and individuals in all sectors. Through 2024, these attacks have continued to grow, resulting in significant financial losses, data theft, and reputational damage. Even businesses that have achieved a level of cybersecurity compliance remain at risk unless they have understood what impact a ransomware attack really means in the context of their business.
The good news? When you have identified how to protect your business from a ransomware attack you have already defined what needs to be done to reduce your total cyber risk exposure across all levels of attack. Ransomware might be the most reported attack, but is nowhere near the most expensive or damaging cyber attack you might face.
Chair
Anand Thangaraju
Director, Product Technology Risk
Zelle
Panelists
Hemam Muthyala
CISO
SPAN
Pratik Savla
Enterprise Security Strategy and Compliance Principal
Synaptics Incorporated
Cooper Chien
VP of Digital Technology
WeDriveU