CIO Atlanta Summit | April 19, 2022 | Four Seasons Hotel Atlanta - Atlanta, GA, USA

agenda

Registration & Networking Breakfast

8:30 AM - 9:00 AM

Welcome Address

9:00 AM - 9:10 AM

Keynote: CXO Leadership in the Age of Disruption

9:10 AM - 9:40 AM
Leading in the age of a global pandemic, the great resignation, quantum computing, drone delivery, social media, autonomous vehicles, cyber warfare, blockchain, and geopolitical upheaval is no easy task. Learn what it takes to lead global teams in today’s ever changing environment.

Ben Halpert

CISO/Director of Information Security

Groupon

Sponsor Keynote: IBM

9:45 AM - 10:10 AM

Let’s Create in the new era of digital transformation

 

Technology and transformation have always gone hand-in-hand, but the pace of transformational change accelerated over the last 2 years in every organization. IBM Americas Technology & Consulting Marketing Director Jacqui Galow will get our creative juices flowing as she shares stories and best practices sourced from thousands of IBM digital transformation engagements with the “new creators” — the change agents and forward thinkers in every organization — including yours. She’ll cover a wide-range of areas, from cybersecurity to AI and data-driven transformations, how to use hyper-automation to make your business supersonic and give you the tools to get creative to solve your organization’s biggest challenges. Welcome to today's IBM.

Break

10:10 AM - 10:20 AM

CIO: Hiring and retention in the current market conditions

10:20 AM - 10:45 AM
How to attract/retain talent with the right technology skills and/or helping existing employees develop them in the current dynamic employment market, and in a hybrid work environment.

Kalicharan Durgampudi

Chief Technology Officer

Zelis

CISO: Alignment and Value – Communicating Your Cyber Program to the C-Suite and Board

10:20 AM - 10:45 AM

While cyber is recognized as a critical source of enterprise risk by boards and members of the C-suite, CISOs often struggle to align their message to the expectations of key stakeholders. This discussion will focus on bridging this gap to enable more constructive cybersecurity discussions with those whose buy-in is critical to a successful program. Understanding the oversight obligations of the board, and the business risk and return focus of the C-suite is foundational to closing this gap.

Takeaways

- Looking Outside – educating and informing on risk and threats in the context of the business and its risk appetite

- Looking Inside – understanding and communicating the strength and effectiveness of your cybersecurity program

- Looking Ahead – cybersecurity’s role in the strategic business planning process

Kevin Gowen

CISO

Synovus

Executive Boardroom The Proper Care and Feeding of Non-Human Identities

10:50 AM - 11:15 AM
Managing the life cycle of standard accounts with identity governance and administration (IGA) tools has become straightforward and routine. Most organizations struggle with managing life cycles for all the other accounts that present greater levels of risk for the organization. This presentation covers the challenges of managing these non-standard account life cycles, surveys the options and ultimately makes the case for how to address these challenges with non-human identities.

Brian Iverson

Chief Product Officer

Tuebora

CIO: “We Can’t Stay Here!” - Leading change initiatives in 2022

11:20 AM - 11:45 AM
In this presentation, Walt will share lessons learned from 30 plus years of implementing enterprise change and share with you his seven “Cs” of effective change leadership.

Walt Carter

Chief Digital Officer

Homestar

CISO Think Tank: Revisionist Cybersecurity: Questioning Common Security Recommendations

11:20 AM - 11:45 AM

Hear from Steve as he re-examines some popular security recommendations that aren’t as good as you think, some that are misunderstood. and even some ideas that will make you less secure.  Perhaps you’ve even been guilty of repeating the same (mis)guidance.

Steve Pugh

Chief Information Security Officer

Intercontinental Exchange

Executive Boardroom-Rise of machines: The new identity threat

11:50 AM - 12:15 PM

The number of machines of all types – from Kubernetes, to cloud, to IoT – is on the rise. Every machine requires an identity – TLS, SSH, and code signing keys and certificates – that control encryption, authentication, and code execution. However, compromise, misuse, and fraud of machine identities are prime attack vectors for hackers. Errors are creating debilitating outages and resulting in millions of dollars in lost revenue and impacted customer satisfaction and trust. For all these reasons and more, Gartner has named Machine Identity Management a top cyber trend for 2021.

 

Attend this session to learn:

· Errors, outages, and incidents happen every day when machine identities fail

· The top machine identity attacks targeting your organisation and software supply chain

· How to use the machine identity threat model built on standard ATTACK

· Three things your organisation can do today to stay #fastsecure with Machine Identity Management

Kevin Bocek

VP, Security Strategy & Threat Intelligence

Venafi

Fireside Chat: The Role of the CISO

12:20 PM - 12:45 PM

Join Max Garcia and J.D Miller for a fireside chat diving deep into the roles of the CISO. 

Max Garcia

CISO, Financial Services Division

Innovation Partner: DevSecOps - Is your source code secure? Are your secrets exposed?

12:50 PM - 1:00 PM

Secrets exposure and leaks - Why is this happening, what’s the risk, how to avoid it.

Secrets including API tokens, passwords and other infrastructure credentials are the keys to your systems. Yet storing secrets inside git repositories including GitHub, GitLab, Bitbucket happens more often than security teams would like. Many organizations have tried to solve this issue by investing in centralized secrets management solutions and policies but the detection component has been overlooked and exposure remains. In this session, you will learn how a solid automated secrets detection solution can help you secure your organization by reducing your level of exposure to secrets sprawl, empowering both your engineering and security teams to identify these policy breaks in real-time, and drastically facilitating their remediation efforts.

Daniel Walsh

Account Executive

GitGuardian

Networking Lunch

1:00 PM - 1:50 PM

Digital Transformation is Built on a Foundation of APIs - But are your APIs Secure?

1:50 PM - 2:00 PM

APIs are the core building block of every enterprise’s digital strategy, yet they are also the number one attack surface for hackers. Traditional security and management approaches are failing everyday as the scale and reach of API attacks increases. The time is now right for enterprises to consider a new end-to-end continuous approach to protecting their APIs. In this talk you will learn how Global 2500 enterprises are embracing a positive security model combining shift-left and shield-right methodologies to protect their APIs throughout the API lifecycle.

1. APIs are Growing BUT so are the Attacks

2. Traditional security solutions and approaches are proving insufficient

3. There is another way - 42Crunch

4. Examples of high profile clients

5. Be sure to talk to us during the day here

Jonathan Speigner

42Crunch

CISO Panel

2:05 PM - 2:40 PM
Join Ben, Olivia, Martin and Steve for this invigotating panel alongside moderator, J.D. Miller.

Steve Dotson

CISO

Acoustic

Ben Halpert

CISO/Director of Information Security

Groupon

Martin Fisher

CISO

Northside Hospital

Olivia Rose

CISO and VP of IT & Security

Amplitude

Thought Leadership AWS

2:45 PM - 3:10 PM

Common Cloud Security Risks and How to Avoid Them

This discussion will be focused on the most common reasons customers contact AWS concerning their cloud security.  AWS Security Specialist, Chris Mercer, will share methods and best practices you can use within your organization to help secure your cloud environment.

 

Chris Mercer

Solutions Architect, Security & Compliance Specialist

AWS

CISO: A Ransomeware Tale

3:15 PM - 3:40 PM

Cybersecurity is a strategic business enterprise risk. Stealing intellectual property and threatening to download it on the dark web is just the latest iteration of cybercrime that keeps the C-suite up at night. It is all but inevitable that your organization will face a cyber incident due to our reliance on data and technology.  Join Justin Daniels, a technology and cybersecurity attorney, as he weaves for you a data breach tale that is now commonplace in 2022. This session will stress the need for good communication as the decision makers faces tough business decisions based on incomplete facts under time pressure.

Justin Daniels

Technology & Cybersecurity Counsel

Executive Boardroom: Milliseconds Matter in the World of Cyber Defense

3:45 PM - 4:10 PM
In the world of ransomware, supply chain poisoning, zero-day attacks, and unknown vulnerabilities, milliseconds matter. Attackers can get access and manipulate workloads within minutes or even seconds. Our current tools allow attackers to dwell for hours, days, weeks, and months. There must be a better way. Powerful tools are needed to help organizations stop being reactive and start being proactive. Adoption of new security tools and frameworks can make a big difference. Enterprises should not have to settle for response if protection can be achieved. Join this session to learn how you can proactively protect your workloads from ransomware or other zero-day attacks in milliseconds and stop reacting to them after the fact. Patch your vulnerabilities at your own tempo without opening yourself up to costly breaches.

Anthony Binge

Regional VP, East

Virsec Systems

Executive Boardroom: Dispel

4:15 PM - 4:40 PM

Post-COVID Cybersecurity Attacks

Cybersecurity technologies to identify, protect, detect, respond and recover are extremely important, but not sufficient. HumanOS upgrade is required to safely use the Internet and It is not only about training and awareness. Join this session to learn more about how to protect your enterprise from the way your users behave online and how this can impact system vulnerabilities. Humans are the weakest and strongest links in Cybersecurity.

Ian Schmertzler

President

Dispel

Closing Panel: Digital Transformation

4:45 PM - 5:10 PM
Join Andrey, Chintan and Dipesh for an invigorating panel on Digital Transformation moderated by J.D Miller.

Dipesh Shah

CIO

Cresa

Chintan Patel

CIO

Hydrobuilder Holdings

Andrey Morochko

Senior Director - Architecture

GE

Closing Remarks

5:10 PM - 5:15 PM

Summit Happy Hour

5:15 PM - 6:30 PM