October 27-29, 2019 | Sheraton Grand at Wild Horse Pass, Phoenix, AZ

“An exceptional conference experience through cutting edge content, peer-to-peer information sharing, and ready to implement solutions.”


7:30 AM - 8:30 AM        

Networking Breakfast

8:25 AM - 8:30 AM          

Day 3 Kick off & Morning Welcome:

Speaker: Philip McKay, CEO, nGage Events

8:30 AM - 9:00 AM          

Executive Spotlight: Nordstrom

Speaker: Irwan Tjan, Chief Information Security Officer, Nordstrom

Description: A CISO's perspective on business alignment - a talk of how that has evolved, when does security need to "bend" for the business, and when the business needs to support security. How this would play into when security events occur in a company and how the alignment becomes more critical at that point.

9:15 AM - 11:20 PM

1:1 Meeting Zone

Description: 1:1 Meetings between Suppliers and Delegates

11:30 PM - 1:00 PM

Awards Luncheon with Conference Closing Q&A

1:00 PM - 5:00 PM          


Day 1 - Sunday, September 23, 2018

2:00 PM - 5:00 PM        

Check In & Badge Pick-up

2:00 PM - 4:30 PM

Sponsor set up in Meeting Zone

4:30 PM - 4:40 PM          

Welcome and Introduction to IT Security Leadership Exchange

Speaker: Philip McKay, CEO, nGage Events

4:40 PM - 5:25 PM

End User Keynote Presentation: Automating Security Controls Using Models and Security Orchestration

Speaker: Kurt Lieber, VP and CISO, Aetna

Description: Many organizations have adopted machine learning and data analytics to help them identify security anomalies.  However, mere identification isn’t good enough in a world where Petya and other modern attacks can take down 15,000 servers in a single organization in under two minutes.  To combat these new types of malware, organizations need to be looking at Model Driven Security Orchestration where the security responses to emerging threats and attacks are automated and driven at machine speed.   In this presentation, Aetna will provide an overview of our security orchestration program, including what worked, what didn’t and lessons learned.

5:30 PM - 6:15 PM  

Executive Spotlight: McKesson: Time Famine, Data Fog and Data Asphyxiation

Speaker: Spencer Mott, Chief Information Security Officer, McKesson Corporation

Description: "Time Famine", "Data Fog" and "Data Asphyxiation" are terms used to describe the phenomenon whereby an individual (in our case, a security professional) becomes overwhelmed with information (about how to do their jobs) whereupon "time" is a diminishing commodity. It is not merely the dizzying increase in the volume of information or "well-meaning advice" (e.g. from vendors, managers, regulators, board members, governance committees, peers, think-tanks, press articles, frameworks etc.) it is also the combination of omnipresence and fragmentation. Security professionals are being constantly bombarded with unrelated bits and pieces, perhaps a poke from a friend one moment, the latest Greek tragedy the next; add to that the overwhelming plethora of security technologies each one supposedly a must-have piece of the security puzzle. Information overload can make people feel anxious and powerless: scientists have discovered that multitaskers produce more stress hormones and mistakes. Second, overload can reduce creativity. It's a different problem to one of simply prioritizing time, it's an issue of whom to listen to and, who to turn to and the criticality of those decisions as the (information security) strategy and an operational plan/run is being developed.

This session will provide:

1. An analysis of the cause and effect of Information Overload, (which may lead to stress) and how to recognize the phenomenon

2. How to process and prioritize inbound information and build "trusted (human) networks with a view to achieving "Super-forecasting" capabilities

3. Understand the critical role of time allocation and explore a practical model

4. How to establish a program "Compass" and be equipped and empowered when dealing with conflicting interests

5. Identify personas in your stakeholder community and know how to leverage support networks.

6. The role of machines in noise reduction

6:15 PM - 8:30 PM          

Welcome Reception & Dinner

Day 2 - Monday, September 24, 2018

7:00 AM - 8:00 AM        

Networking Breakfast

7:30 AM - 8:30 AM

Day 2 Kick Off & Morning Welcome:

Speaker: Philip McKay, CEO, nGage Events

8:30 AM - 9:15 AM          

CISO Panel: Complexity of the Current Day CISO

Moderator: John Masserini, CISO, Millicom

Panelists: Anil Katarki, CISO, Perspecta | Tina Thorstenson, CISO, Arizona State University | Kurt Lieber CISO, Aetna

Description: Technology keeps evolving and security gets more and more complicated.  Emerging technologies like AI, machine learning and blockchain or compliance issues like GDPR are not making it any easier in a 24/7 world.  Since heading back to university isn’t really an option, the panel will discuss how they keep abreast of these dynamic changes and how are they aligning them to achieve business objectives.  This interactive discussion will also engage the CISO audience to share their personal experiences and provide a range of perspectives to help CISOs be a more agile and effective leader and communicator within their organizations.

9:20 AM - 9:50 AM  

Sponsor Keynote Presentation: Qualys

Speaker: Felix Jimenez, Enterprise Technical Account Manager, Qualys | Brian Canaday, Threat and Prevention Services, CSAA Insurance Group, a AAA Insurer

10:00 AM - 12:00 PM

Use Case Boardroom Presentations

Description: 25 minute breakout sessions. Suppliers and delegates discuss challenges faced, strategy, implementation, outcome, and the future.

12:00 PM - 1:00 PM

Networking Lunch

1:00 PM - 1:25 PM          

Fireside Chat: Sponsored by Securonix: Addressing Digital Business Risk with a Big Data and Analytics-Driven Approach

Speaker: Umesh Yerram, VP, Chief Data Protection Officer, AmerisourceBergen Corporation

Description: In today’s digital world, cybersecurity is a top priority and concern. However, organizations struggle with massive volumes of data, legacy tools, and a shortage of skilled resources. Detecting advanced cyber threats is about as simple as locating a needle in a haystack. In order to successfully combat this challenge, organizations need to take a modern approach to security monitoring – utilizing big data and behavior analytics helps to collect and analyze complex data sets at scale with minimal human expertise.In this session, AmerisourceBergen Corporation provides an overview of its security monitoring approach which utilizes the power of Hadoop and machine learning, discusses best practices adopted by its SOC to analyze and respond to threats, and shares key lessons learned in the process.


1:30 PM - 2:15 PM        

CISO Panel: How to achieve reasonable incident detection and feed that into an incident management system...Aligning Info Sec to the Business Goals

Moderator: Joey Johnson, CISO, Premise Health

Panelists: John Whiting, CISO, DDB WorldWide | Michael Dierickx, CISO, Panasonic | Bradley Schaufenbuel | VP – Chief Information Security Officer, Paylocity

2:25 PM - 3:20 PM

Use Case Boardroom Presentations

Description: 25 minute breakout sessions. Suppliers and delegates discuss challenges faced, strategy, implementation, outcome, and the future.

3:30 PM - 5:35 PM          

1:1 Meeting Zone

Description: 1:1 Meetings between Suppliers and Delegates

5:35 PM - 7:00 PM

Free Time

7:00 PM - 9:30 PM

Networking Dinner

Day 3 - Tuesday, September 25, 2018

2019 Agenda Coming Soon!


Fall 2018 Agenda

October 27-29 | Sheraton Grand Wild Horse Pass | Phoenix, AZ