Wednesday, November 30, 2022
ISE® WEST WELCOME DINNER
Securing Sensitive Data Without Slowing Down Your Business
5:30pm - 8:30pm CT
Pappas Bros. Steakhouse
10477 Lombardy Lane
Dallas, TX 75220
Registration
Ryan Reynolds
Senior VP, Head of Cyber Risk Oversight
U.S. Bank
Biography
As enterprises across the spectrum collect, process and store sensitive data in the cloud, security teams are being forced to adapt their processes and technologies at a feverish pace. Data is the lifeblood of an organization, and the freedom and agility afforded by cloud technologies has made data creation - to better understand and engage customers, gain a competitive technological advantage, and develop new revenue opportunities - accelerate to the point where 90% of the world's data has been created in the past two years. Yet despite the rise in data breaches and tightening regulations, the distributed ownership of data makes it all but impossible to know what data is in the cloud, let alone how to secure it. Join us for an insightful discussion on how cloud data can be automatically discovered and classified, and how novel technology allows security teams to secure the data itself, with real-time detection and response to reduce their attack surface, automate risk remediation, and ensure operational preparedness, thus improving your 360° security posture and staying one step ahead of data regulations and risks. We will also explore how security teams can be empowered to free the rest of the business to harness the value of their data, securely.
Thursday, December 1, 2022
9:30 AM: ISE® Continental Breakfast (Invitation Only)
Location: Ft. Worth Foyer
The exclusive VIP Continental Breakfast kicks off the day by connecting sponsors, nominees, and executive attendees in a relaxed morning atmosphere over coffee and light breakfast items.
11:00 AM: ISE® Signature Luncheon (Invitation Only)
Location: Prive
From CEO Fraud to Vendor Fraud: The Changing Nature of Business Email Compromise
Travis Farral
VP & CISO
Archaea Energy
Biography
Security awareness training has worked to some extent, with most employees now realizing that their CEO is not likely to email them in the middle of the day for gift cards. But business email compromise is still a major problem—just not in the same way. Join this session to hear:
- How attacker tactics have shifted in the past few years
- Why this type of social engineering is so difficult to stop
- And our predictions for where attackers will move in the new year
Attendees are eligible to earn 1 CPE for this event.
12:50 PM: Welcoming Remarks and Introductions
Location: Ft. Worth Ballroom
Marci McCarthy
CEO and President
T.E.N.
Biography
T.E.N.'s CEO & President will welcome guests, provide an overview of the program agenda and event purpose, and introduce the speakers and sponsors of the ISE® West Summit and Awards 2022. Marci will be the emcee of the summit and will moderate the ISE® Fireside Chats and T.E.N. Tech Talks.
1:00 PM: Keynote Address
Location: Ft. Worth Ballroom
Don’t Think Just Do…My Story of Creating One of the Industry’s Leading Non-Profits
Devon Bryan
Global Chief Information Security Officer
Carnival Corporation
Biography
“Don’t Think, Just Do…" ……my story of creating one of the leading non-profits tackling the underrepresentation of women and minorities in the field of cybersecurity…
1:20 PM: ISE® Fireside Chat - One Burning Question
Moderated By: Marci McCarthy
Location: Ft. Worth Ballroom
Trusted Digital Experiences – Is Security as a Differentiator Without Sacrifice Just Wishful Thinking?
Sujeet Bambawale
Vice President and Chief Information Security Officer
7- Eleven
Biography
Jon Brickey
SVP, Cybersecurity Evangelist
Mastercard
1:35 PM: ISE® Nominee Showcase Presentation #1
Location: Ft. Worth Ballroom
Simple Plan with Execution Precision: Data Classification & Enterprise Onboarding and Transition
Robert Pace
VP, Information Security & CISO
Invitation Homes
ISE® West Executive Award Finalist 2022
ISE® West People's Choice Award Winner 2023
ISE® Central-West Executive Award Finalist 2024
Biography
To improve its data classification processes for the growing amounts of documents created and accessed during the execution of business, Invitation Homes established a strategic approach to data classification. The project established a user-friendly and security-sound process to apply data classification upon document creation and accessing historical documents. To streamline the onboarding, offboarding and job role change process of users, Invitation Homes created an efficient and scalable process for onboarding and transitions. The project increased the efficiency of onboarding, offboarding and job role changes in a way that reduced errors and delays in provisioning, while enhancing the compliance posture.
1:45 PM: T.E.N. Tech Talk
Moderated By: Marci McCarthy
Location: Ft. Worth Ballroom
The Makings of a Chief Product Security Officer (CPSO)
Vince Arneja
Chief Product Officer
GrammaTech
Biography
Jason Christman
Vice President, Chief Product Security Officer
Johnson Controls, Inc.
Biography
Product security executives are responsible for the security of cyber-physical products. They are the individuals who ensure the software inside these devices is secure and not vulnerable to cyberattacks. This is a relatively new role, which is growing in lockstep with expanding markets for smart and autonomous systems and increasing government focus on secure software development.
With an increased emphasis on maintaining the safety and security of embedded software across virtually all industries, organizations are challenged with determining the hallmarks of an effective CPSO and how the CPSO interacts with the larger organization—from development to security and at the executive level. Further, because not every organization developing software-centric products needs a focused product security executive, what type of product companies are hiring CPSOs -- and why.
2:00 PM: ISE® Tabletop Conversations
Location: Ft. Worth Ballroom
Investigation and Impersonation: How Social Engineering Impacts Businesses
Kathleen Mullin
Chief Information Security Officer
Cancer Treatment Centers of America, Inc.
Biography
Navigating the Convergence of Cybersecurity, Enterprise Risk Management and Compliance
Kevin Dunn
Senior Vice President, CIO, CISO
U.S. Retirement and Benefits Partners
Biography
Ransomware is Now RansomOps...Resilience is the New Security
Trina Ford
Chief Information Security Officer
iHeartMedia
Biography
2:20 PM: ISE® Nominee Showcase Presentation #2
Location: Ft. Worth Ballroom
ServiceTitan Smart Trust Center
Cassio Goldschmidt
Chief Information Security Officer
ServiceTitan
Biography
As a provider of all-in-one software for residential, HVAC, plumbing, electrical, garage doors, and other home services companies, ServiceTitan is well aware of the concerns, risks, and dangers posed by hackers, who aren’t a whole lot different from Wild West outlaws. The ServiceTitan Smart Trust Center is a public-facing portal that provides an easy way for customers to obtain information related to privacy, security, and compliance as well as to subscribe to security notifications.
2:30 PM: ISE® Fireside Chat - One Burning Question
Moderated By: Marci McCarthy
Location: Ft. Worth Ballroom
No Longer the Department of No! Security is a Partner for the Business
Mike Britton
CISO
Abnormal Security
Biography
Dennis McDonald
Chief Information Security Officer
Jack Henry and Associates
Biography
2:45 PM: Break
3:00 PM: T.E.N. Tech Talk
Moderated By: Marci McCarthy
Location: Ft. Worth Ballroom
Data-Centric Security is the New Data Protection
Adam Maslow
Vice President IT Security and Infrastructure, Fry Cook & Cashier
Raising Cane's
Fred Spencer
VP and Chief Information Security Officer
Everest Re
ISE® West People's Choice Award Winner 2022
Biography
3:15 PM: T.E.N. Tech Talk
Moderated By: Marci McCarthy
Location: Ft. Worth Ballroom
Why Cybersecurity Leadership and Effective Cyber Resilience Programs are Critical to Delivering Services to Our Communities
Thomas Ray
CISO
City of Berkeley
ISE® West Executive Award Finalist 2022
Biography
3:25 PM: Exabyte Sponsor Showcase
Location: Ft. Worth Ballroom
Redefining Cloud Email Security with a Modernized Approach to Stopping Attacks
Scott Deluke
Enterprise Solutions Architect Director
Abnormal Security
Biography
Credential phishing. Executive impersonation. Ransomware. These inbound email attacks are still a major problem… But they’re not our only problem. Join Abnormal Security to discover how threat actors are moving to email platform attacks and how you can stop them with a behavioral AI approach to detecting anomalies.
3:40 PM: ISE® Fireside Chat - One Burning Question
Moderated By: Marci McCarthy
Location: Ft. Worth Ballroom
Crossing the Red Line: Inaction or Taking Action in the Face of A Ransomware Attack
Trina Ford
Chief Information Security Officer
iHeartMedia
Biography
Ross Wells
Information Security Officer - Castrol
BP
Biography
3:55 PM: ISE® Nominee Showcase Presentation #3
Location: Ft. Worth Ballroom
Zero Trust
Alex Arango
Head of Cyber Threat Management, Deputy CISO
Mercury Financial
Biography
Jason Smola
Enterprise Security & Infrastructure Architect, Deputy CIO
Mercury Financial
Biography
Traditional network models operate on the assumption that everything inside the network should be implicitly trusted. However, due to a lack of controls governing intra-network communication, users – and even worse, malicious actors – are able to move laterally and potentially exfiltrate sensitive data. The Zero Trust Program was implemented to eliminate the traditional security risks by enforcing a ‘Least Privilege Access’ model, thereby enabling Mercury Financial to secure its technology environment with the core principle of ‘Never Trust, Always Verify.’
4:05 PM: T.E.N. Tech Talk
Moderated By: Marci McCarthy
Location: Ft. Worth Ballroom
Mobile as a Threat Vector: A Critical Part of The Cybersecurity Landscape
Richard Rushing
Chief Information Security Officer
Motorola Mobility
Biography
Dan Solero
AVP, Cybersecurity
AT&T
Biography
4:20 PM: ISE® Nominee Showcase Presentation #4
Location: Ft. Worth Ballroom
Developer Driven Security Remediation
James Chiappetta
Senior Vice President, Cybersecurity
Blackstone
Biography
Austin Paradis
Analyst, Blackstone Technology & Innovations
Blackstone
Biography
Blackstone’s Security team has enhanced their security remediation capabilities by creating a more developer-focused, central self-service reporting, remediation, and automation platform that allows for clearer prioritization and action of security issues. By centrally attributing, correlating, and de-duplicating security alerts from multiple scanning tools that span the Software Development Lifecycle (SDLC), the Developer-Driven Security Remediation project puts developers in the driver’s seat for remediating security alerts from the team's portfolio of tools in a single place.
4:30 PM: ISE® Fireside Chat - One Burning Question
Moderated By: Marci McCarthy
Location: Ft. Worth Ballroom
Breaking Trust: Shades of Crisis Across the Software Supply Chain
Kevin Dunn
Senior Vice President, CIO, CISO
U.S. Retirement and Benefits Partners
Biography
Be it third-party software updates, application installers, pre-installed malware on connected devices or compromised code placed into firmware or hardware components, compromising the software supply chain enables attackers to deliver malicious code in the guise of trusted programs. This can be a terribly effective technique to both spread an attack widely and target well-secured systems. The risks are particularly acute for government organizations as well as infrastructure and manufacturing industries. With business operations and continuity, reputation, and the bottom line on the line, supply-chain risk management has never been more important. The escalation in number of breaches as well as regulatory compliance obligations means organizations must do more to effectively manage third-party risk.
4:45 PM: Break
5:00 PM: ISE® VIP Reception
Location: Austin 3
ISE® Nominees, sponsors and special guests will have the opportunity to network in a private setting.
6:00 PM: Sponsor Pavilion and Dinner Buffet
Location: Ft. Worth Foyer
Guests enjoy gourmet dinner while networking and meeting the sponsors.
7:30 PM: ISE® West Awards Gala
Location: Ft. Worth Ballroom
Marci McCarthy
CEO and President
T.E.N.
Biography
Devon Bryan
Global Chief Information Security Officer
Carnival Corporation
Biography
Honoring and celebrating the award nominees, this exciting occasion brings together top security executives to recognize the individuals and the project teams who have made a significant and positive impact on their organizations through exemplary performance. Don't miss the Passport for Prizes drawing and a chance to win outstanding gifts from our sponsors!
9:00 PM: Champagne & Dessert Reception
Location: Ft. Worth Foyer
Enjoy champagne and dessert while celebrating the winners, nominees and project teams.