CISO Houston Summit | September 5, 2019 | Omni Houston Hotel at Westside - Houston, TX, USA

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Thursday, September 5, 2019 - CISO Houston Summit

8:00 am - 8:45 am

Registration & Networking Breakfast

 

8:45 am - 8:55 am

Welcome Address & Opening Remarks

Presented by:

Bill Haser, Former CIO, Individual

 
 

9:00 am - 10:00 am

Executive Visions Panel

The Revitalizing Change in the Role of the CXO

A CXO's role, goals and objectives have drastically changed over the years as most CXOs supervise teams and units beyond their IT department. Because of these changes in responsibilities, a CXO's success is measured in greater business metrics. As a result, the role of a CXO has become both more attractive and more demanding.

Takeaways:

  1. What are the significant changes regarding the role of the CXO?
  2. How to keep up with the changing requirements
  3. How to properly measure a CXO's success

Moderated by:

Bill Haser, Former CIO, Individual

 

Panelists:

Rob Nolan, Chief Information Security Officer, Noble Energy View details

 
 

Al Lindseth, SVP - IT and Risk, Plains All American View details

 
 

Steve Neiers, CISO, Chevron

 
 

10:05 am - 10:30 am

Executive Exchange

 

Solutions Spotlight

Deep dives into the latest and greatest technology solutions to today's business problems.

 

10:30 am - 10:40 am

Morning Networking Coffee Break

 

10:45 am - 11:10 am

Executive Exchange

 

Thought Leadership

3 Best Practices for Application Security (and Bonus Tip)

Applications are the lifeblood of the enterprise, but as the threats multiply, as applications move to the cloud, as legacy applications need to be maintained, and as organizations seek competitive advantage with new technologies and faster release cycles, it's easy to see that application security can be a thankless, endless and challenging job. 

Imperva has distilled three best practices (and a bonus tip) that help enterprises of any size vastly improve and simplify application security, accelerate threat detection and operationalize application security in a dynamic world where change is the only constant.

Sponsored by:

Imperva View details

 
 

Presented by:

Terry Ray, SVP and Imperva Fellow, Imperva View details

 
 
 

11:15 am - 11:40 am

Executive Exchange

 

Share:

Think Tank

AI-Driven Development

Due to market shifts, the need for collaboration between professional data scientists and application developers is no longer necessary. Today, professional developers can operate alone using predefined models to deliver the top, AI-enhanced solutions. These models allow for developers to utilize tools tailored to integrating AI capabilities into your organization's solution. 

Takeaways:

  1. Learn more about how to utilize predefined AI integration models
  2. Learn how to apply AI to various data sciences, application development and testing functions
  3. Understand the potential benefit of self-governing programs over large data sets

Presented by:

Vivek Thakral, Director Information Security & Artifical Intelligence, GE - Power & Water

 
 

11:45 am - 12:10 pm

Executive Exchange

 

Share:

Thought Leadership

Digital Transformation - Architecting Your Digital Edge

The digital economy is forcing enterprises to transform how they connect customers, partners, employees and operations. Today's market leaders credit their speed and business advantages to their digital platform. Equinix will discuss how an Interconnection Oriented Architecture (IOA(TM)) can redefine the digital edge, providing competitive advantage in today's market. By outlining the four key use cases that all enterprises need to solve for digital, Equinix will provide a roadmap for building a digital ready architecture.

Sponsored by:

Equinix View details

 
 

Presented by:

Bill Ellis, Senior Global Solutions Architect, Equinix View details

 
 
 

12:15 pm - 12:40 pm

Executive Exchange

 

Thought Leadership

What Knowledge Gaps Will You Face When Your Best Workers Retire?

Boomers make up nearly a third of the workforce. More than half of them are in leadership positions, and they are retiring in droves. This massive exodus of talent is an existential problem for companies.  

Most institutional knowledge about products, processes, and customers is formally documented, but is in the collective heads of the people who have done the work for years and know the intricacies of workflows. When these workers retire, they take the knowledge with them, causing a massive drain of organizational wisdom.  

Capturing this tacit knowledge from an aging workforce, and putting it to use, can make the difference between companies that thrive and ones that die off.  

This session will explore how organizations are approaching the need to preserve tacit knowledge. 

  • Is the C-suite aware of the risks involved with tacit knowledge? 
  • What initiatives can help preserve tacit knowledge? 
  • What types of expertise should be involved? 
  • How might machine learning, deep learning, and other AI help?

Sponsored by:

Lucidworks View details

 
 
 

12:40 pm - 1:30 pm

Networking Luncheon

 

1:35 pm - 2:00 pm

Executive Exchange

 

Executive Boardroom

Building the business case for ServiceDesk Automation

Many of today's businesses are implementing ITSM solutions to improve the help desk service their users receive. Implementing an ITSM platform, such as ServiceNow, is only the first step in achieving significant productivity improvements through automation. Automation experts 1E will help you understand the necessity of both workflow and task automation, in addition to the consideration and approach required to build a business case to fund it.

Sponsored by:

1E View details

 
 

Executive Boardroom

Protect Your Keys or Don't Waste Your Time Encrypting Your Data

For over 2000 years, governments, armies, businesses and lovers have been encrypting messages. For the same amount of time, the keys used to perform the encryption have been the weakest link in the chain. After 2000 years, technology has advanced such that the keys can be protected but many companies don't understand how important it really is. 

Mr. Beutlich will explain in an entertaining (and sometimes graphic) fashion why protecting the encryption key is more important than the encryption itself.

Sponsored by:

nCipher View details

 
 

Presented by:

Brad Beutlich, Vice President of Sales Western Region and LATAM, nCipher View details

 
 
 

2:05 pm - 2:30 pm

Executive Exchange

 

Share:

Think Tank

Pitfalls to Watch Out in Digitalization

We are constantly speaking about digitalization and how we are progressing toward it. The reality is it creates a number of challenges (change management, updating skills, bringing in 3rd parties, etc). CIO's to speak less about how great it is, but the current pain points we are facing and how we are overcoming them.  

Takeaways: 

  1. Ensure we have the appropriate architecture/Cyber security specialists on the 3rd party team to ensure we still have scalable/secure solutions 
  2. Strategic long term planning on what skills we want (we missed the boat on UX designers, wire framing, etc) and offshored too many developers and now unwinding those decisions

Presented by:

Ismail Dandia, IT Manager - Unconventional Shales, Shell View details

 
 
 

2:35 pm - 3:00 pm

Executive Exchange

 

Executive Boardroom

BigFix sets the standard for endpoint management and security compliance.

IT security and operations teams struggle to keep Unix, Linux, Mac and Windows servers and enduser devices continuously patched and compliant with security and regulatory mandates. They also strive for faster time-to-remediation during incidents. Using HCL BigFix, IT operations and security teams can instantly report to executives, board members and high-value supply chain partners that all systems are continuously patched and compliant, resulting in increased productivity and cost savings. CyFIR Enterprise complements BigFix by concurrently analyzing running processes on every endpoint in near real-time, without impact to business or network operations. The game changing combination of BigFix and CyFIR dramatically reduces the ?blast radius' of security incidents.

Sponsored by:

HCL BigFix View details

 
 

Executive Boardroom

Lessons from the 2018 - ISE Project of the Year

The ISEĀ® North America Project of the Year in the Commercial Category was Shell's ?Digital Transformation (IAM): Enterprise User Access Management/Shell Identity Management (EUAM|SIM)? Project. As part of a Digital Transformation initiative centered on Identity and Access Management, this project focuses on both enterprise access governance and enterprise access management. This initiative has two components: Enterprise User Access Management (EUAM) and Shell Identity Management (SIM). The project aims to automate the various security controls within Shell for all business-critical applications. This would bring all business-critical application on a common platform in terms of access management. The goal is to bring in the complete Segregation of Duties (SOD) ruleset of Shell under an automated platform to manage SOD, which is currently being done using spreadsheets or legacy tools. This will help enable automated certification campaigns for 60,000 users across the globe and insure compliance and satisfaction of audit requirements.

Sponsored by:

Saviynt View details

 
 
 

3:00 pm - 3:15 pm

Afternoon Networking Coffee Break

 

3:20 pm - 3:45 pm

Executive Exchange

 

Executive Boardroom

Guiding a Digital Transformation Journey

Digital transformation is an important initiative and while most organizations know they need to transform, the how and what can differ dramatically. Foundational steps, like building out a modern application platform, may seem miniscule -- but ignoring this important step is the top reason most Digital Transformation initiatives stall or fail. With that in mind, Insight can help organizations build the framework to extend their groundbreaking initiatives - from machine learning to AI, IoT and much more. Our team will share our experiences along the many steps in organizations' digital transformation journeys to help you imagine what's possible.

Sponsored by:

Insight Cloud + Data Center Transformation View details

 
 

Executive Boardroom

Still Using Passwords? Forget That Sh*t

The constant barrage of breaches over the last decade has made it clear that usernames and passwords - invented back in 1964 - are simply no longer secure enough. According to the 2019 Verizon Breach Investigations Report, compromised credentials are responsible for over 80% of all breaches. 

Despite attempts to make static credentials more secure by adopting two-factor authentication utilizing SMS, OTPs or hardware tokens, these added layers still leave organizations vulnerable to phishing attacks, keylogging, malware and more. 

By removing the past reliance on usernames and passwords, you can enhance your organization's security by significantly reducing your overall attack surface and virtually eliminating the risk of compromised credentials. 

Takeaways: 

  1. Learn how usernames and passwords are leaving your organization at risk. 
  2. See how how passwordless authentication removes major threat vectors. 
  3. Provide users a fast, simple and consistent authentication experience across any channel.

Sponsored by:

Trusona, Inc. View details

 
 

Presented by:

Sharon Vardi, Chief Marketing Officer, Trusona, Inc. View details

 
 
 

3:50 pm - 4:15 pm

Executive Exchange

 

Thought Leadership

Why AI is the Future of Email Security

Email is far and away the most common initial vector for cybersecurity breaches and this problem only continues to grow. In 2018 the FBI estimates over $12 billion was stolen through business email compromise. Attackers have become ever more sophisticated, shifting from broad campaigns to carefully crafted attacks that bypass traditional email security. This talk focuses on why these attacks are difficult to stop and how advances in AI, specifically in machine learning and natural language processing, can be used to prevent advanced email fraud. We will discuss real examples of attacks, analyze why traditional approaches fail, and illustrate how data science is the best approach to preventing business email compromise, advanced spear phishing, and email account compromise.

 

4:20 pm - 4:45 pm

Executive Exchange

 

Share:

Think Tank

Success Secrets for Real World Digital Transformations

Being Digitally Successful Requires Successfully Delivering your Transformation Initiatives: Here are the Thing You Need to Do to Improve Your Chances of Success. Successful transformation initiatives require upgrades to an organizations processes and culture in addition to adopting of digital technology. In this session Bill Haser provides experiences and insights based on real world examples on how to be successful with your digital transformation. 

Takeaways:

  1. Picking the right projects 
  2. Picking the right delivery methodology 
  3. Picking the right team 
  4. Addressing project holistically including process design, organization change management, and technical competency. 
  5. Key management tasks

Presented by:

Bill Haser, Former CIO, Individual

 
 

4:45 pm - 4:55 pm

What's the Next Stop On the Transformation Journey?

Our Governing Board will summarize the learnings from the day and discuss the path forward for building an ongoing community of CIOs, where common issues can be addressed and success stories can be shared.

Takeaways:

  1. Building an ongoing community with your peers can be an invaluable resource for tackling the digital transformation projects ahead of you
  2. Sharing stories of success (and failures) is not reserved to a one-day CIO Summit, but should be shared on a regular basis with your peers
 

5:00 pm - 6:30 pm

Summit Happy Hour