Where
San Francisco
Discussing key topics from the evolving landscape of threats in areas that pertain to Cloud Security, Automation, Response and Resilience, Data Breaches, Insider Threats and harnessing the power of AI, the CISO Summit gives you the opportunity to meet leading decision-makers under one roof at one time, to be part of the discussions that are shaping the future of security and to network and develop contacts that will strengthen your business.
The program is driven by our senior-level Advisory Board including representatives from TNT, Henley Business School, Fox Networks Group, US Department of Defense and Wyndham Group.
The CISO Summit brings together leaders from across the public, large enterprises & mid-market sectors to provide you with a strategic and practical toolkit to help drive transformation including:
Cloud Security - Industry Shift from Detection to Remediation and Prevention
Your Most Important Asset: Data - Is It Really Secure?
90% of the world's data was created in the last two years, and securing this explosion of data is a top priority for enterprise leaders. In a recent Forrester Research study commissioned by Cyera, security leaders said they expect the most transformational business benefits to come from automating data security, specifically risk assessments, data discovery, and classification. Additionally, 71% of security leaders said legacy technologies and manual processes inhibit business success. Join this opening keynote to discuss the importance of embracing automation and rapid time as critical tactics for securing your organization’s most important asset.
"Topics will include"
1. The struggle to meet security goals while enabling the business to become more data driven, and take advantage of advanced technologies
2. How cloud, automation, and generative AI are changing the way businesses communicate and collaborate about sensitive data
3. New approaches to data security that make compliance and governance easier, and keeps pace with today’s hyper growth
Technology and Leadership: Delivering Future Security Threat Prevention
Embracing Fear and Overcoming Mistakes
CISOs are always looking for new ways to improve their organization's security posture. However, when it comes to adopting new technologies, they must balance the benefits the innovative approaches offer the company with existing resource constraints and unintended security consequences for the business. Although conventional solutions might have proven to work well in the past, advancements in tech - e.g., massive adoption of Cloud, CI/CD, and AI - often render existing security tooling inadequate. Are innovative solutions too immature for CISOs' comfort, even if they can help the business? Would it be better to continue with the "tried and true" despite diminishing returns?
In this session, moderated by Amer Deeba, CEO of Normalyze, CISOs Noah Davis, Rori Boyce-Werner, Patrick Benoit, Bill Chen and Oluwadamilola Obamehinti share their perspectives on when and how CISOs can embrace the uncertainty of innovation to support business goals.
The next generation of modern identity security: accelerated
Every organization today is moving faster than ever before. At the same time, identity security is in a state of constant evolution and rapid growth to meet the endless changes happening across your enterprise. Changes to how you do business. Changes to the types of technologies that fuel your business. And even changes to your identity population itself. As these changes accelerate across your business, your approach to identity must evolve to match this newfound velocity. Join this session to learn how companies worldwide are pivoting their approach to identity security, and – importantly – the next generation of identity security: accelerated. can help drive your business forward.
1. Game-Changers in DevSecOps: Strategies for Speed, Security, and Success
2. Taming your Unknowns: Using Data Privacy Frameworks to Monitor Generative AI
3. Can the security stack be simplified safely?
4. Let's talk SaaS: Controlling SaaS Complexity With Business Stakeholders
5. Elevating Tech Beyond the Stack: Unifying SOC, Risk, and Strategy
6. The Future of AI in Security
7. Could a Security Data Lake Really Save 80% of my SIEM Costs?
8. Modern Software Supply Chain Attacks: Vulnerabilities are Not The Problem
I just wanted to say congratulations on a great event and thank you all for your help, especially Kate and Tiffany who have spent time in advance and at the event with me to help me get the most out of the days here.I have really enjoyed the event, and made some good new contacts as well as insights into common challenges we are all facing in the CIO community. It’s been run superbly so thank you, and I look forward to the future events.
I thought the quality and mix of contributions and the engagement from the audience was excellent. It felt more like an interactive team exercise in some respects, than a sit back and listen conference, and for me was more enjoyable and genuinely helpful for that. Similar folks, passionate about their brands and their work, but with different best practice to share – very collaborative, which I personally like. So all good and thanks for the chance to take part. It’s always a drain on time, which none of us have, but it was worth it.
Participate in this Summit on our unique platform, learn from industry leaders, and network with peers. The benefits of attending are unmatched. Complimentary to qualified professionals and their team.
Copyright © 2021 GB intelligence inc
- all rights reserved