Chief Information Security Officer
National Football League
Cybersecurity Leader, Consumer Markets and Life Sciences
Crowe
CISO
Crate & Barrel
IT Director, Deputy CISO
Lear Corporation
Director, Center for Enhanced Cybersecurity
US Government Accountability Office
Chief Information Officer
Natural Habitat Adventures
CISO
Werfen
Chief Information Security Officer
National Football League
VP, Security Operations
Walmart
Chief Privacy Officer / VP Cybersecurity Governance, Risk & Compliance
Intel
VP Cybersecurity US
Bulletproof
CRO
Bulletproof
Director, Solutions Marketing
Aviatrix
Dir. Solution Strategy
Aviatrix
These mutually agreed-upon conversations are arranged and facilitated by Executive Platforms staff to ensure attendees have valuable discussions about their top-of-mind questions, challenges, and opportunities.
Chief Information Security Officer
National Football League
VP Chief Technical Architect
AdventHealth
Chief Information Officer
AHC+ Hospitality
CISO
Bass Pro
SVP, IT & Security
Cadent, LLC
CISO
Cheniere Energy
Cybersecurity Leader, Consumer Markets and Life Sciences
Crowe
Chief Information Officer
Fort Wayne City Utilities
Interim Vice President of Information Technology and Chief Information Officer
Georgia Tech
Senior Technical Consultant
Manage Engine
CIO
Richwood Bank
Director, Office of the CISO
This session will focus on critical elements of resilient systems and how to build them. We explore the work of the President’s Council of Advisors on Science and Technology (PCAST) and tie it to Google engineering practices to provide clear examples of how to build resilient systems that run the internet. We’ll discuss 4 critical pillars of cyber resilience and the role they play in fortifying systems against cyber threats in a cyber-physical environment. We’ll discuss the interconnectedness of these pillars and how they form the foundation of a robust cyber resilience strategy.
Co-founder & CEO
Appdome
In this practical workshop, CISOs will learn from real world lessons and come away with a better understanding of:
CTO
Druva
Sr. Solution Architect - Security
Druva
Cyber threats are more prevalent than ever and security teams are faced with the daunting task of optimizing their security posture while balancing budget, risk, and operational efficiency. With even the most sophisticated security stack plagued with coverage gaps and vulnerabilities, security teams are fatigued and don’t want to add yet another security tool.
Sometimes help comes from an unexpected corner. Modern backup and data security can help IT and security come together and solve problems. Learn what a data security and protection partner like Druva can do to help strengthen your security posture and streamline your incident response and recovery workflows. We will cover:
These mutually agreed-upon conversations are arranged and facilitated by Executive Platforms staff to ensure attendees have valuable discussions about their top-of-mind questions, challenges, and opportunities.
Chief Security Officer
Community Veterinary Partners
VP and Chief Information Security Officer
McAfee
Deputy Assistant Director, Cyber Division
Federal Bureau of Investigation (FBI)
Global Chief Information Security Officer
Johnson & Johnson
DoD Principal Director for Cybersecurity/DoD Deputy CISO
Dept of Defense (DoD)
Chief Information Security Officer
National Football League
Chief Information Security Officer
National Football League
Corporate Vice President and Chief Cybersecurity Advisor
Microsoft
Director, Amazon Security
Amazon
Chief Information Security Officer
National Football League
VP & CISO
Blue Shield California
Vice President – Chief Information Security Officer (CISO)
Domino's
VP, Threat Intelligence
TD Bank
VP, Security Operations
Walmart
These mutually agreed-upon conversations are arranged and facilitated by Executive Platforms staff to ensure attendees have valuable discussions about their top-of-mind questions, challenges, and opportunities.
VP of Product
CAST
Overwhelming complexity in custom software results in costly data breaches with open source and 3rd party component vulnerabilities like the log4j incident being a major culprit. Software Composition Analysis (SCA) technology is designed to help reduce these risks. However, most traditional SCA products are designed for developers and don’t give CISOs and CIOs the visibility they need to confidently make critical decisions and take control of open source and 3rd party component risks across their entire portfolio of software applications. How do you ensure you are covering all of your applications? How do you govern these risks without slowing down your developers?
Complexity is so high, it’s no longer good enough to rely solely on developers to be vigilant. Join this session to learn how some CISOs and CIOs are taking a smarter approach to open source and 3rd party component security risk management by ‘shifting up’ observability with an open source control tower, automatically across all their applications. Get answers to questions like:
Chief Information Officer, Mars Wrigley NA
Mars Inc
Business Information Security Officer, Americas
Unilever
Chief Information Officer
Early Learning Coalition of Hillsborough County
Sr. Cybersecurity Specialist
Environmental Protection Agency
Vice President, IT
JPI
Senior Manager of IT Security & Infrastructure
Milos Tea Company
Director, Information Technology
Shepherd Electric Supply
VC and CIO
Washington University in St. Louis
CIO / CTO
Westminster Christian School
Staff Vice President
FedEx Corporation
Cybersecurity Leader, Consumer Markets and Life Sciences
Crowe
"*" indicates required fields
By completing and submitting this form, you agree to receive marketing emails from Executive Platforms Inc. You can opt-out at any time by utilizing the unsubscribe link provided at the bottom of each email. All data collected will be handled in accordance with our Privacy Policy and Terms of Use.
"*" indicates required fields
By completing and submitting this form, you agree to receive marketing emails from Executive Platforms Inc. You can opt-out at any time by utilizing the unsubscribe link provided at the bottom of each email. All data collected will be handled in accordance with our Privacy Policy and Terms of Use.