CISO Charlotte Summit | March 6, 2018 | Charlotte, NC, USA

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Tuesday, March 6, 2018 - CISO Charlotte Summit

7:30 am - 8:30 am

Registration and Networking Breakfast

 

8:35 am - 8:45 am

Welcome Address and Opening Remarks

 

8:45 am - 9:30 am

Keynote Presentation

The Criticality of Data in an Evolving Landscape

We know there are industry discussions around a wide variety of data topics. For a CIO, this means navigating an evolving data landscape and various dimensions. Join me as we take a look from the outside in at the criticality of data, our customers and emerging trends. 

Takeaways: 

  • An evolving data landscape. Challenges and opportunities in a regulatory environment. 
  • Emerging trends. Perspective on our customers and innovation.  
  • The criticality of data to our businesses and rapid change ahead.

 

9:35 am - 10:05 am

Vendor Showcase

 

10:10 am - 10:40 am

Vendor Showcase

 

10:45 am - 11:00 am

Morning Networking Coffee Break

 

11:05 am - 11:35 am

Executive Exchange

 

Thought Leadership

Become a Change Agent for Business Transformation

Today's modern CIO is embarking on a digital transformation journey exploring radical hybrid IT strategies and leveraging new technologies like Cloud, Social, Mobile and Big Data. However with 'keeping the lights on' legacy IT components costing nearly 90% of a typical IT budget, how can IT make powerful advancements and lead business change?

Join this interactive session to learn how award-winning CIOs are successfully tipping the balance by liberating people, time and money from costly ongoing maintenance of their ERP systems including SAP and Oracle, to invest in strategic initiatives that create real-world competitive advantage.

 

11:40 am - 12:10 pm

Executive Exchange

 

Think Tank

Building Dynamic Security Teams - Lessons From 'The Pros'

There's no other way to say it than bluntly; Information Security is a white-hot field within Information Technology as a whole - over the last dozen years it has gone from after-thought, to scapegoat, to critical enterprise success factor. As a result, the need for capable and qualified Information Security specialists, whether front-line Analysts, mid-level Managers, or top level CISOs is at an all-time high, but personnel and skills availability is sinking to an all-time (at least in terms of supply and demand ratio) low. If you asked any manager, coach, owner of a major league franchise they would tell you a similar story about building their teams; not enough good players or coaches and skyrocketing salaries make it hard to compete. This presentation takes a look at four successful teams for guidance and leadership on how they build and sustain their teams and applies those same principles to your security team. 

Takeaways: 

  •  Learn how to create a team chemistry that leads to motivated and successful teammates
  • Create a farm system of talented security professionals to sustain and grow your team  
  • Understand the importance of defining and building critical skills to create an all-around winning culture
 

12:15 pm - 1:15 pm

Networking Luncheon

 

1:20 pm - 1:50 pm

Executive Exchange

 

Think Tank

Bridging the Talent Gap: Building the Team of Tomorrow

There is no escaping the fact that the demands on the IT department are changing. Those changes are necessitating changes in the IT department itself and nowhere is this being felt more than in the roles and responsibilities of the IT staff themselves. Complicating this transition is the fact that every IT department is undergoing to change at roughly the same time making the personnel with the requisite skillsets extremely hard to find, and perhaps even harder to retain. Savvy CIOs need to quickly identify which are the hot skills they most urgently require and then build a strategy that allows them to build (train), borrow (outsource), or buy (hire) the right people with the right capability at the right time.

Takeaways:

  • Commit to a talent-first organization which recognizes and rewards the most important asset you have " your people
  • Identify the skills most urgently in need and prioritize their acquisition
  • Determine which acquisition methods needs to be used for which skill to maximize impact and return on investment
 

1:55 pm - 2:25 pm

Executive Exchange

 

Executive Boardroom

Can technology alone prevent phishing attacks and breaches?

2016 was undoubtedly the year of ransomware. And while we saw improvements in the number of days to detect a breach, 146 days is still 146 too many. As targeted phishing attacks continue to grow in number and evolve in sophistication, organizations need to reconsider their current approach to these threats. Companies continue to invest billions of dollars in technology to shore up their defenses but it's obviously not enough. Join us to learn how the PhishMe solution combines both technology and human-driven phishing defense to help eliminate phishing breaches through greater employee resilience and better incident response.

 

2:30 pm - 3:00 pm

Executive Exchange

 

Think Tank

The Evolution of the Private Cloud

Once upon a time applications ran directly on physical hardware. Then the boxes got bigger and more capable and multiple applications were run on the same hardware. There were some resource constraints, but things in general became more efficient. Time passed, things evolved and virtualization was introduced, allowing enterprises to run even more applications even more efficiently on the same hardware. And then the cloud came on the scene, extending the virtualization model to the point that it looked like something completely different, to the point that it became true utility computing. Cloud computing is not just virtualization on a bigger scale and as CIOs prepare their organizations to dive into private clouds at an increasing rate, it is very important to understand what they are and are not, and how they differ from their forbear computer models with which we are all familiar.

Takeaways:

  • Private clouds are big and becoming bigger, but calling something a private cloud and having it actually be one are different things
  • While virtualization may be a core enabling technology of a private cloud, virtualizing an environment doesn't make it a cloud
  • True private clouds have both pros and cons in relation to other compute models; they are not the be-all and end-all and careful consideration needs to be given before pushing ahead with private cloud deployment
 

3:05 pm - 3:20 pm

Afternoon Networking Coffee Break

 

3:25 pm - 3:55 pm

Executive Exchange

 

Executive Boardroom

Identity Deception - exposing the source of evil emails!

Everywhere we look we see evil emails: at work, at home and in the news. Attempting to steal your money, your identity, your login information, sell you something or take you hostage for a hefty ransom. 

Internet criminals are taking advantage of two fundamental characteristics of the human brain: 1) we usually trust something when it's being sent by someone we know, and 2) our brain is designed to gloss over small inconsistencies. 

These criminals are also exploiting another weakness: traditional email filtering gateways. Traditionally designed to to fight spam or check for a malicious attachment, email filtering gateways have evolved slightly to determine if a URL in a given email is bad. Unfortunately, these controls are not enough to out pace today's sophisticated attacks and it's why we continue to see data breach after data breach. 

Agari will share a few recent phishing examples and trends based on real-world cases that were detected - some of these might even look familiar! 

What is needed is a new approach to this growing problem: the internet criminals are using identity deception to carry out their malicious acts. The only way to stop them is to understand the true identity of these emails.

 

4:00 pm - 4:30 pm

Executive Exchange

 

Think Tank

Disrupting Markets with Disruptive Technologies

While the combination of Social, Mobile, Analytics, and Cloud have been present and disrupting IT departments and enterprises as a whole for over two years now, in many ways organizations have still not fully embraced them, have still not fully leveraged them. These new platforms allow organizations radically new ways to go to market, allowing for broad scale deployment of systems of engagement that create dynamic relationships with clients and prospects. Finding the resources, wherewithal, and ability to fully commit to these technologies and the capabilities they create has proven to be a struggle for many, but a struggle that can be overcome by leveraging the right partners that bring the right skills and experiences to bear.

Takeaways:

  • Social, Mobile, Analytics, and Cloud are all here to stay; each one adds value to enterprises but collectively that value increases exponentially
  • The manner in which these technologies are implemented, operated, and utilized is different than the foregoing systems of record we are used to
  • Unique skills and capabilities are required to leverage the power and value of these platforms, skills and capabilities that can be in short supply
 

4:35 pm - 5:20 pm

Executive Visions

Facilitating Technology-Enabled Business Transformation

The role of the modern IT Executive is more complex than it has ever been before, not just because the technology landscape has become more complex, but also because increasingly IT execs have had to become a business-focused executive, not just a technologist. Long have we talked about the CIO and CISO getting a seat at the table but modern businesses are now demanding that their technology impresario join them and leverage his deep and rich technical acumen to allow the organization as a whole to better position itself for market-place success. To be successful, CxOs need to invest in themselves, in their personnel, and in the right technologies to allow them to position the IT department to proactively address business needs as an innovator and driver, rather than order-taker and enabler.

Takeaways:

  • IT leadership can no longer be simply technology focused, but must instead take their visibility into business process and become business focused
  • A broader business-focus does not preclude maintaining technology excellence however and indeed may demand more of it than ever before
  • Success for CxOs will be measured not in how they can enable enterprise decisions, but in how they can drive growth
 

5:20 pm - 5:30 pm

Thank You Address and Closing Remarks

 

5:30 pm - 7:00 pm

Cocktail Reception