CISO Forum | 2024

Virtual CISO Conference

In Person at Ritz-Carlton, Half Moon Bay – June 25-26, 2024

Virtual Summit – November 14, 2024

Designed for senior level security leaders to discuss, share and learn innovative information security and risk management strategies, Securityweek’s CISO Forum, will host the in-person flagship summit at the Ritz-Carlton, Half Moon Bay on June 25-26, 2024 and virtual edition on November 13, 2024.

The forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise. (SecurityWeek’s CISO Forum has been running since 2014 as a live event at the Ritz-Carlton, Half Moon Bay.)

Visit www.cisoforum.com for more

Sponsorship Information

2024 Diamond Sponsor

Okta
Platinum Sponsors

Tanium

Palo Alto Networks

Gold Sponsors

Wiz

VeracodeProcess Unity

Veeam

ReversingLabs

Immersive Labs

time iconNovember 13, 2024 11:00

Not Your Grandparents AI: New Age of Cybersecurity and IT Management

Join us for an engaging and insightful journey through the evolution of AI, from the pioneering days of Turing to today's cutting-edge generative models. In "Not Your Grandparent's AI: New Age of Cybersecurity and IT Management," we explore how AI is revolutionizing IT operations and cybersecurity, transforming our approaches to data analysis, threat detection, and endpoint management. We'll delve into:

  • the emotional rollercoaster of technology adoption
  • the new risks posed by generative AI how to balance
  • the need for speed and real-time data with security imperatives

This discussion will equip you with a deeper understanding of the current landscape and future trajectory of AI in our industry. Come discover how to harness AI's potential while navigating its challenges.

speaker headshot

Tim Morris
Tanium, Chief Security Advisor

time iconNovember 13, 2024 11:30

Avoid Migrating Legacy Issues to the Cloud: The Cloud Optimization Framework (COF)

What's the number one challenge organizations face today in managing cybersecurity threats in the cloud? Is it the rapid evolution of malware and zero-day threats, or is it the way we're structured to handle these issues? At Palo Alto Networks, we’ve developed a best practices framework specifically for cloud environments. This approach allows us to move past the common pitfalls that may have carried over into the cloud and to establish policies and procedures that can effectively address these challenges. Join this session to explore:

  • What’s gone wrong in cloud security, particularly with organizational silos and outdated policies/procedures
  • The best practices to overcome these issues
  • How to realistically implement meaningful change
speaker headshot

Ben Nicholson
Global Practice Lead, Prisma Cloud by Palo Alto Networks

time iconNovember 13, 2024 12:00

Hunting in High Definition to Amplify SecOps

With an evolving threat landscape, the art of threat hunting has also advanced. In this session, we’ll dive into the art of threat hunting, anomaly detection, forensic investigations, and more, presenting a comprehensive approach to bolstering security operations. Explore the concept of amplifying security operations by harnessing the power of high-definition data analysis. Key strategies highlighted include innovative concepts such as Chained Detections and multi-directional hunts, all powered by AI. This methodology involves connecting seemingly unrelated artifacts and events to unveil hidden patterns, identify potential threats, and proactively mitigate risks before they escalate. Join us as we explore the forefront of cybersecurity operations and discover how the art of hunting in high definition can amplify your security operations.

speaker headshot

Albert Caballero
SentinelOne, Field CISO

time iconNovember 13, 2024 12:30

Identity Security: New Threats. New Paradigms.

As the threat landscape continues to intensify, relying on traditional models to secure identities is a losing proposition. It’s time to challenge conventional thinking and apply new security models to defend against identity-based cyberattacks. In today's world, characterized by the proliferation of identities and the double-edged sword of AI, every organization must embrace a set of new paradigms to secure every user - human and machine.

speaker headshot

Nick McCrorey
CyberArk, VP, Security Strategic Advisory

time iconNovember 13, 2024 12:30

Data-First TPRM: Revolutionize Third-Party Assessments with an Exchange

Third-Party Risk Management (TPRM) jobs like onboarding, continuous monitoring, or 4th party risk evaluation require a lot of data that many organizations struggle to obtain. Until now. ProcessUnity’s Global Risk Exchange delivers the industry’s most advanced third-party risk data for you to harness for increased efficiency and effectiveness, ushering in a completely new way of tackling common TPRM challenges. Join us for an in-depth look at ProcessUnity’s Global Risk Exchange. In this session we’ll explore how the Global Risk Exchange leverages real-time data, advanced analytics, and Artificial Intelligence to deliver a more efficient, effective, and proactive TPRM process. Discover the key benefits of adopting a data-first strategy and how it can position your organization for success in an increasingly complex risk landscape. Key Takeaways:

  • Tips to identify and overcome the greatest challenges in managing third-party risk assessments.
  • Unique ways to embed third-party risk data into procurement due diligence, onboarding, ongoing monitoring, and emerging threat scenarios.
  • Introduction to the Exchange model for TPRM.
speaker headshot

Sophia Corsetti
ProcessUnity, Product Marketing Manager

time iconNovember 13, 2024 13:00

How to Build an Effective Cyber Drilling Program

Today, most cyber threats target your people with potentially disastrous consequences. Join Immersive Labs as we discuss how to implement an effective cyber and micro drills program to prepare your organization for the latest attacks. Our experts will share best practices for giving your teams the knowledge, skills, and judgment they need to prevent and respond to cyber threats.

speaker headshot

Jamie Knobles
Immersive Labs, Manager, Solutions Consulting

time iconNovember 13, 2024 13:00

The importance of CISAs Stop Ransomware Guidelines and How to Meet Them

In this session, Brad Linch, Director of Enterprise Strategy at Veeam, will go through what CISA's stop ransomware Guidelines are, and how organizations can better prepare against cyberattacks. Successful cyberattacks are a result of a series of compounding failures. Simply being better prepared can go a long way.

speaker headshot

Brad Linch
Veeam, Director of Technical Strategy

time iconNovember 13, 2024 13:45

CISO Playbook: Nailing Your Next Board Meeting

Translate security concepts into business language and nail your next board presentation. Learn from experienced security leaders who have successfully earned their seat at the boardroom table. You’ll gain actionable insights on how to effectively communicate your security strategy in ways that resonate with the board and hear candid advice from seasoned CISOs. We’ll explore:

  • Aligning with Board Expectations: Where CISOs should focus their time and attention during board meetings. Learn how to tailor your messaging for maximum impact.
  • Simplifying Technical Concepts: Learn strategies to break down complex security topics into digestible, business-focused narratives that resonate with non-technical board members.
  • Understanding how board members think: Uncover how to work with the board and senior leadership to align on risk tolerance and prepare for worst-case scenarios, ensuring the business is resilient in the face of security incidents.
  • Positioning security as a Business Enabler: Gain practical tips for demonstrating the ROI of security initiatives.
  • This is your opportunity to elevate your boardroom strategy.

speaker headshot

Ryan Kazanciyan
Wiz, CISO

speaker headshot

Emily Heath
Cyberstarts, General Partner

speaker headshot

Jeremy Smith
Avery Dennison, VP, Information Security Officer

time iconNovember 13, 2024 13:45

AI in the Software Supply Chain: How to Navigate New Threats While Balancing Innovation and Security

Generative AI, LLMs, and open source machine learning models provide a competitive edge for development teams and enterprises at large. Gartner has predicted that by 2025, 70% of enterprises will have operationalized AI architectures. However, with this adoption comes novel threat vectors within the software supply chain, affecting both software producers and enterprise software buyers. In this presentation, we will outline considerations that organizations must take when integrating AI into the software they build and buy, along with how to safeguard against threats that can be exploited by AI. This session will cover:

  • The adoption of developer AI copilots and open source ML models and how they can be a vehicle for malware, tampering, and malicious behaviors
  • How to remove the barriers to adopting advanced AI/ML capabilities without sacrificing due diligence
  • How to minimize your exposure to AI-powered software exploits

speaker headshot

Dan Petrillo
ReversingLabs, VP, Product Marketing

speaker headshot

Joe Coletta
ReversingLabs, Sr. Product Marketing Manager

time iconNovember 13, 2024 14:15

Practical CISO Strategies for Navigating M+A Deals

This session will be based on my takeaways from advising private equity investors and corporate sellers on cybersecurity risks and preservation of valuations in over 250+ M&A deals. I will share 5 most useful strategies CISO’s can use when going through mergers, acquisitions, and divestitures. Including the right time to get involved, how to conduct/prepare for cybersecurity due diligence, limitations of technical tests, challenges, and more.

speaker headshot

John Hauser
EY Parthenon, Principal, M&A Cybersecurity and Data Privacy

speaker headshot

Dheeraj Gurugubelli
EY-Parthenon, Senior Director, Cybersecurity and Data Privacy Practice

time iconNovember 13, 2024 15:00

PANEL: The Economics of Cyber: Balancing Innovation, Spending, and Vendor Lock-in

This panel will explore the growing trend of platformization in cybersecurity, where companies shift towards integrated, all-in-one solutions from major vendors. The discussion will feature leading CISOs sharing insights on how this shift is changing enterprise spending patterns and influencing startup innovation and venture capital investments. 

The panel will also address the pros and cons of vendor consolidation, including M&A  trends among established players, and examine the strategic trade-offs between integrated platforms and specialized solutions in today’s SaaS-dominated landscape.

speaker headshot

Nick Vigier
Oscar Health, CISO

speaker headshot

Jason Kikta
Automox, CISO

speaker headshot

Fernando Montenegro
Omdia, Industry Analyst

speaker headshot

Ryan Naraine
SecurityWeek, Editor-at-Large

time iconNovember 13, 2024 15:45

PANEL: Building Influence and Trust: Effective Stakeholder Engagement for CISOs

speaker headshot

Chris Brown
New Cyber Executive, CISO & Executive Coach

speaker headshot

Justin Dellaportas
Syniverse, CISO

speaker headshot

Luiz Eduardo
HPE Aruba Networking, CTO, Security

time iconNovember 13, 2024 13:30

BREAK

Please visit our sponsors in the Exhibit Hall and explore their resources. They're standing by to answer your questions.

time iconNovember 13, 2024 16:30

Networking and Exhibit Hall Connections

Please visit our sponsors in the Exhibit Hall and explore their resources. They're standing by to answer your questions.

Solutions Theater (On-demand)

time iconNovember 13, 2024 11:00

[ON-DEMAND] Staying Ahead with AI—Without the Risks: How Securing AI Becomes a Game-Changer

With the rapid growth of AI-driven innovation, many organizations are feeling the pressure to give developers free rein in AI development. However, this can lead to dangerous security blind spots. In this session, we'll explore the critical pitfalls and emerging security risks that are already impacting AI projects today. You'll gain insights into the top attack vectors targeting AI systems and we'll explore best practices and strategies to safeguard your AI development process without stifling innovation. Join us to ensure your AI initiatives remain secure in a rapidly evolving threat landscape.

time iconNovember 13, 2024 11:00

[ON-DEMAND] Experience Unified SecOps with the Singularity Platform

Addressing threats across different attack surfaces is a huge challenge for organizations. The existence of data silos and disconnected tools result in analysts conducting manual investigations without complete visibility and context. To better safeguard organizations, security teams need comprehensive protection across the entire enterprise. The SentinelOne Singularity™ Platform is the first AI security platform to provide enterprise- wide visibility and protection, bringing all enterprise data together in a unified data lake to reduce risk and help protect businesses. In this real-world scenario, experience how the unified Singularity Platform enables security teams to seamlessly detect, triage, investigate, and remediate cybersecurity attacks with AI-driven techniques and automation

time iconNovember 13, 2024 11:00

[ON-DEMAND] Spectra Assure for Software Supply Chain Security

Software represents the largest under-addressed attack surface in the world, and classic AppSec tools cannot address the full scope of threats impacting the software supply chain. ReversingLabs Spectra Assure rapidly deconstructs large, complex software packages and detects threats and exposures that lead to sophisticated, widespread, and costly attacks. Have more trust in your software by empowering software producers and buyers to eliminate coverage gaps, prioritize alerts, enforce custom policies, streamline remediation, and validate build integrity.

time iconNovember 13, 2024 11:00

[ON-DEMAND] Immersive Labs Demo

Build a More Cyber Resilient Organization from Store Room to Board Room With one Platform

time iconNovember 13, 2024 11:00

[ON-DEMAND] 5 Minute Demo of Third-Party Risk Management

ProcessUnity for Third-Party Risk Management (TPRM) protects companies and their brands by reducing risk from third parties, vendors and suppliers. TPRM expands the scope of risk management to encompass any external party that could pose a risk to an organization, including vendors, contractors, partners and suppliers.

2024 Agenda is Coming Soon

Designed for senior level security leaders to discuss, share and learn innovative information security and risk management strategies, SecurityWeek’s CISO Forum, will host the in-person flagship summit at the Ritz-Carlton, Half Moon Bay on June 25-26, 2024 and virtual edition on November 13, 2024.

Throughout this virtual event, sessions will have a strong focus on participation from CISOs in panel discussions along with talks from industry experts, analysts and other end users, and thought leadership, strategy and technical sessions.

Through a cutting-edge platform, attendees will be able to interact with speakers and sponsors, and visit networking lounges, subject-specific discussion areas, and sponsor booths in a virtual expo hall.

Event Details