2024 Agenda

[agenda_chairs]
[agenda_schedule]
[agenda_speakers]
[agenda_chairs]
[agenda_schedule]

Panel Discussion: Women in Security

[agenda_speakers]
  • Creating a purpose-driven strategy that makes an impact as our organization grows and nurtures a diverse workforce
  • Understanding the leader’s role as a force to shape and demonstrate corporate culture, and to serve as a catalyst for equality and inclusion
  • Sharing typical challenges faced by corporations when trying to promote diversity in the workforce
  • Illustrating the importance of today’s leaders building up and supporting the next generation our organizations will need for the future. What does that look like on a day-to-day basis?
  • Offering examples of strong and effective mentorship programs in onboarding, cross-training, job shadowing, and continuing education that make the difference
[agenda_chairs]
[agenda_schedule]
[agenda_speakers]

[agenda_chairs]
[agenda_schedule]
[agenda_speakers]

[agenda_chairs]
[agenda_schedule]

Opening Remarks and Important Announcements

[agenda_speakers]
[agenda_chairs]
[agenda_schedule]

Chair’s Welcome Address

[agenda_speakers]
[agenda_chairs]
[agenda_schedule]

The People-Led, Tech-Powered Future of Cybersecurity

[agenda_speakers]
  • Importance of digital trust (e.g., how to earn it, how to keep it, how to grow it)
  • The Evolving Threat Landscape and How to Stay Ahead
  • Challenges and opportunities with regulation and consolidation
[agenda_chairs]
[agenda_schedule]

Fireside Chat: Navigating the Future: Scaling Secure AI Amidst Emerging Policies and Privacy Challenges

[agenda_speakers]
  • Track precedent setting emerging policy and regulatory landscapes
  • Scale AI innovation globally with a security and privacy mindset
  • Identify common privacy and security threats to AI/ ML applications
  • Harness generative AI to maximize efficiency and minimize risk
  • Make the case for privacy-enhancing technology: solutions and legal insights
[agenda_chairs]
[agenda_schedule]

Batman on a Beach, Einstein, and AI Robots

[agenda_speakers]
  • Hear the current state of security (spoiler alert it’s still bad). Understand how infrastructure, the surge in cybercrime, and attackers’ use of AI are affecting the threat landscape
  • Explore how a transition from a best-of-breed to a best-of-platform approach can streamline your portfolio, enhance visibility, and mitigate risks
  • Assess your company’s readiness for AI. Unveil its potential while also examining compliance challenges associated with this emerging technology
  • Learn how Microsoft leverages AI through Microsoft Copilot to simplify complexity, catch what others miss, and strengthen your team’s expertise
[agenda_chairs]
[agenda_schedule]

It’s Time to Rethink Network Security for Cloud

[agenda_speakers]
  • Cloud architects, CIOs and CISOs will learn how their peers are reducing the complexity and costs of network security in the cloud
  • Find out how enterprises are saving tens of thousands to millions of dollars annually by removing expensive licenses, compute, cloud data processing costs tied to using “Last Generation Firewall” architecture in the cloud
  • Learn how the convergence of cloud networking and network security brings policy inspection and enforcement into the natural path of traffic to improve performance, strengthen compliance, boost cyber resiliency, and accelerate cloud infrastructure automation projects
[agenda_chairs]
[agenda_schedule]
[agenda_speakers]
  • 10:30 am – 10:50 am: Meeting Slot 1/Networking
  • 10:55 am – 11:15 am: Meeting Slot 2/Networking
  • 11:20 am – 11:40 am: Meeting Slot 3/Networking
  • 11:45 am – 12:05 pm: Meeting Slot 4/Networking

These mutually agreed-upon conversations are arranged and facilitated by Executive Platforms staff to ensure attendees have valuable discussions about their top-of-mind questions, challenges, and opportunities.

[agenda_chairs]
[agenda_schedule]

Fireside Chat: The Best Security Offense is a Good Defense

[agenda_speakers]
  • Guarding potential new attack surfaces caused by growing digitization across operations
  • Exploring emerging concerns around attacks enabled by the growing availability of generative AI tools
  • Collaborating with everyone at the national, state, and local levels to test and trial scenarios leading up to a national event to ensure preparation
  • Constantly focusing on maximizing visibility and assessing threats
  • Working towards maximum visibility into networks and creating multiple layers of defense
[agenda_chairs]
[agenda_schedule]

Explore this year’s themed lunch discussions led by industry leaders, where executives engage in focused conversations over a meal, discussing topics they’re passionate about alongside their peers.

[agenda_speakers]
[themed_content field_id="themed_lunches"]
[agenda_chairs]
[agenda_schedule]

Building More Secure, Resilient and Safer Critical Infrastructure

[agenda_speakers]

This session will focus on critical elements of resilient systems and how to build them. We explore the work of the President’s Council of Advisors on Science and Technology (PCAST) and tie it to Google engineering practices to provide clear examples of how to build resilient systems that run the internet. We’ll discuss 4 critical pillars of cyber resilience and the role they play in fortifying systems against cyber threats in a cyber-physical environment. We’ll discuss the interconnectedness of these pillars and how they form the foundation of a robust cyber resilience strategy.

[agenda_chairs]
[agenda_schedule]

Redefining DevSecOps After SolarWinds: Lessons from a Securities Lawyer Turned Cyber Hacker

[agenda_speakers]

In this practical workshop, CISOs will learn from real world lessons and come away with a better understanding of:

  • The real meaning of SolarWinds and the SEC’s 4-day rule
  • How to define an “incident” for disclosure and remediation
  • Is there a remediation safe harbor?
  • The CISOs role in cyber disclosure do’s and don’ts
  • Using technology to claim control over cyber delivery
[agenda_chairs]
[agenda_schedule]

From Crisis to Confidence: How Data Protection Can Enhance Your Incident Response and Recovery

[agenda_speakers]

Cyber threats are more prevalent than ever and security teams are faced with the daunting task of optimizing their security posture while balancing budget, risk, and operational efficiency. With even the most sophisticated security stack plagued with coverage gaps and vulnerabilities, security teams are fatigued and don’t want to add yet another security tool.

Sometimes help comes from an unexpected corner. Modern backup and data security can help IT and security come together and solve problems. Learn what a data security and protection partner like Druva can do to help strengthen your security posture and streamline your incident response and recovery workflows. We will cover:

  • What typically occurs in each phase of a cyber attack
  • Common security coverage gaps in your data infrastructure
  • How to work better with your IT and backup teams
[agenda_chairs]
[agenda_schedule]
[agenda_speakers]
  • 3:05 pm – 3:25 pm: Meeting Slot 5/Networking
  • 3:30 pm – 3:50 pm: Meeting Slot 6/Networking
  • 3:55 pm – 4:15 pm: Meeting Slot 7/Networking

These mutually agreed-upon conversations are arranged and facilitated by Executive Platforms staff to ensure attendees have valuable discussions about their top-of-mind questions, challenges, and opportunities.

[agenda_chairs]
[agenda_schedule]
[agenda_speakers]
[themed_content field_id="focus_groups"]
[agenda_chairs]
[agenda_schedule]
[agenda_speakers]

[agenda_chairs]
[agenda_schedule]

Defending in the Era of AI

[agenda_speakers]
  • Explore how Generative AI changes the balance between attacker and defender
  • Defensive uses of AI built to protect the enterprise
  • Use cases to defend against attacker uses of AI
[agenda_chairs]
[agenda_schedule]

Designing a Holistic Cyber Incident Response Plan

[agenda_speakers]
  • Designing a holistic and pragmatic cyber resiliency strategy to manage cyber risk and drive business value
  • How to develop your strategy to ensure it is aligned with your business strategy
  • Incorporating key aspects such as legal, compliance, and risk management to enable a return on investment
  • Discussing how intelligence and the frontline experience should be leveraged within your organization
[agenda_chairs]
[agenda_schedule]

Building a Business Aligned, Risk Prioritized Cybersecurity Strategy

[agenda_speakers]
  • Importance of defining a forward looking strategy, aligned to business and risk based priorities, and leveraging your operating model to support
[agenda_chairs]
[agenda_schedule]

Achieving a Dominant CS Posture in the Digital Economy

[agenda_speakers]
  • Digital Transformation as an imperative to protect the homeland from the nation’s adversaries
  • Accelerating cloud migration to enhance war fighting effectiveness
  • Deploying a high-degree of automation to improve defensive capabilities across agencies
  • Zero Trust adoption as a federal priority and its implications for the industry at large
[agenda_chairs]
[agenda_schedule]

Chair’s Closing Address

[agenda_speakers]
[agenda_chairs]
[agenda_schedule]
[agenda_speakers]

[agenda_chairs]
[agenda_schedule]
[agenda_speakers]
[agenda_chairs]
[agenda_schedule]

Chair’s Welcome Remarks

[agenda_speakers]
[agenda_chairs]
[agenda_schedule]

Fireside Chat: The New Security Landscape in the Era of AI

[agenda_speakers]

Join us for an insightful discussion on the new AI landscape with Bret Arsenault, CVP, Chief Cybersecurity Advisor at Microsoft. This session will explore the critical aspects of securing AI and delve into the challenges and strategies organizations are facing when it comes to fortifying AI systems and will provide insights into fostering a secure AI landscape while addressing future cybersecurity challenges.

[agenda_chairs]
[agenda_schedule]

Security in the Open: Let’s Raise the Bar in Open Source Software Security

[agenda_speakers]
  • Working upstream to improve long-term outcomes
  • Releasing security tools and libraries as open source to help secure the broader ecosystem
  • Providing engineering and financial support for security improvements across the ecosystem
  • Some reflections on software supply chain, secure software development, and memory-safe languages
[agenda_chairs]
[agenda_schedule]

Panel: The Business of Global Talent

[agenda_speakers]
  • Placing diversity and inclusivity at the core of everything you do
  • Breaking new ground and finding new ways of managing the holistic talent life cycle, enabled by advanced technology
  • Forging partnerships across the business to attract a new generation of talent from outside the core cyber function
  • Using internal, external and unconventional talent pools to build and develop a sustainable global talent pipeline
[agenda_chairs]
[agenda_schedule]
[agenda_speakers]
  • 10:30 am – 10:50am: Meeting Slot 8/Networking
  • 10:55am – 11:15am: Meeting Slot 9/Networking

These mutually agreed-upon conversations are arranged and facilitated by Executive Platforms staff to ensure attendees have valuable discussions about their top-of-mind questions, challenges, and opportunities.

[agenda_chairs]
[agenda_schedule]
[agenda_speakers]
[agenda_chairs]
[agenda_schedule]

‘Shift Up’ Observability of Your Custom Software Security Risks and Beyond

[agenda_speakers]
[agenda_chairs]
[agenda_schedule]

Governing Generative AI: Safeguarding the Enterprise Without Stifling Exploration

[agenda_speakers]
  • Identify and engage key stakeholders which may include developers, researchers, policymakers, ethicists, legal experts, affected communities, and end-users
    • Establish risk tolerance through a policy with clear objectives and guiding principles guide the development, deployment, and use of generative AI systems
    • Implement mechanisms for monitoring, auditing, and enforcing compliance with established policies and promote accountability
    • Provide education and training to enhance understanding of generative AI technologies, governance principles, and ethical considerations among stakeholders
[agenda_chairs]
[agenda_schedule]

Serving Others: The Purpose Uniting Cyber Security Community

[agenda_speakers]
  • Exploring ways to create digital trust, make it everyone’s business
  • Maximizing cyber security organizational impact one capability at a time
  • Fuel a learning and innovative organization by embracing new skills, backgrounds, and perspectives
[agenda_chairs]
[agenda_schedule]

Explore this year’s themed lunch discussions led by industry leaders, where executives engage in focused conversations over a meal, discussing topics they’re passionate about alongside their peers.

[agenda_speakers]
[themed_content field_id="themed_lunches"]
[agenda_chairs]
[agenda_schedule]

Defending Global Institutions from Supply Chain Cyber Risks

[agenda_speakers]
  • Learn about FedEx’s dual role as a tech consumer and provider, focusing on the risks associated with using external vendors and the impact on operations
  • Highlight the lack of uniform security standards and the tech industry’s safety evolution, emphasizing the implications for consumers and providers
  • Outline secure software initiatives such as SBOM, efforts to adopt best practices, and enhancements to security programs aimed at influencing provider security measures
[agenda_chairs]
[agenda_schedule]

Chair’s Closing Remarks

[agenda_speakers]
[taxonomy_color_styles]