December 10 - 12, 2018
The Ritz-Carlton, Amelia Island, FL

Monday, December 10, 2018

11:00 am - 11:45 am Registration

11:45 am - 12:00 pm Orientation

12:00 pm - 12:10 pm Chairperson's Opening Remarks

12:10 pm - 12:55 pm True Cyber-Resilience: Merging the Capabilities of Cybersecurity, Business Continuity, and Enterprise Resilience

The growing number of information security breaches and attacks are a top threat to business operations. Integrating incident response and continuity planning with enterprise risk management empowers well-coordinated actions in the case of an actual event. Accountability, transparency, and continuous improvement are key attributes to sound risk management. The core of information security risk management merges governance, emerging technologies, system hardening, and cultural awareness. Enterprises control readiness and must balance sustainable programs that safeguard information along with meeting the organizational business objectives.
 In this session: 
•Leveraging investments and creating a consistent cyber defense
•Emphasizing best practices with authentication, patching, vulnerability management, and penetration testing
•Improving security training and providing clear protocols of escalation
•Providing consistent and coordinated information

1:00 pm - 2:00 pm Networking Brunch



2:05 pm - 2:35 pm Keynote: Unleash Your Program's Full Potential Through Diversity

Chad Teat - CISO Floor & Decor
What common trait produces astonishing results at tech-giant Hewlett-Packard, consumer goods Kimberly-Clark, and the hyper-growth retailer Floor & Decor? Industry-defying diversity. Attacking Cybersecurity’s largest cultural issue, diversity, greatly reduces a CISO’s troubles with Cybersecurity’s largest operational issue, labor shortage.  Learn more about the status of diversity in Cybersecurity, hear examples of success and failure, and take home high-impact improvements for your program.
img

Chad Teat

CISO
Floor & Decor

2:40 pm - 3:10 pm Business Meetings

3:10 pm - 3:40 pm Business Meetings

3:40 pm - 4:10 pm Business Meetings

Master Class

4:15 pm - 5:00 pm Levers of Human Deception: The Science and Methodology Behind Social Engineering
Erich Kron - Security Awareness Advocate KnowBe4
No matter how much security technology we purchase, we still face a fundamental security problem: people. This webinar will explore the different lever that social engineers and scam artists pull to make us more likely to do their bidding.

Join Enrich Kron CISSP, Security Awareness Advocate at KnowBe4, as he provides fun and engaging examples of mental manipulation in everyday life: from the tactics used by car dealers, to sophisticated social engineering and online scams. Additionally, he'll look at how to ethically use the very same levers when educating our users.

Key Takeaways:

  • The Perception vs. Reality Dilemma
  • Understanding the OODA (Observe, Orient, Decide, Act) Loop
  • How social engineers and scam artists achieve their goals by subverting OODA Loop's different components
  • How we can defend ourselves and our organizations

img

Erich Kron

Security Awareness Advocate
KnowBe4

BrainWeave

4:15 pm - 5:00 pm When Shrinkage is Good - Reduce Incident Response from Hours to Minutes
Is your security team challenged with alert fatigue, a shortage of skilled staff, and maximizing the company’s product arsenal investment? 
Solving such challenges isn’t easy and requires a delicate balance of people, processes, and tools. Investing in a comprehensive platform that enables security operation teams to reduce MTTR, create consistent and audited incident management process, and increase analyst productivity is a step in the right direction.  
Attend this discussion to learn how a security orchestration platform can automate manual-intensive tasks and reduce response times from hours to minutes. See how the product’s machine learning suggestions can help your team become smarter with every incident and resolve complex threats faster and more accurately.  
Benefits from shrinking your time to respond for every incident include:
•Improve your overall security posture
•Enhance analyst productivity (from Tier 1-3)
•Future-proof security operations


5:00 pm - 5:15 pm Networking Break

Ignite Session : 3 Quick Fire Presentations in 30 Minutes. Talk about getting to the crux of the matter, fast!

5:15 pm - 5:25 pm Securely Share Files Beyond Your Enterprise Borders with Full Governance and Control


Ignite Session : 3 Quick Fire Presentations in 30 Minutes. Talk about getting to the crux of the matter, fast!

5:25 pm - 5:35 pm AI- Anticipating Attacks or Striking Back?


Ignite Session : 3 Quick Fire Presentations in 30 Minutes. Talk about getting to the crux of the matter, fast!

5:35 pm - 5:45 pm Yikes! I Have Too Many Security Tools and Not Enough Skilled Resources


CISO Roundtable Discussions- Engage in your choice of targeted discussions for open exchange among industry peers.

5:50 pm - 6:30 pm A. Instilling and Integrating Proactive Security Awareness
Chris Gay - CISO Southeastern Grocers
img

Chris Gay

CISO
Southeastern Grocers

CISO Roundtable Discussions- Engage in your choice of targeted discussions for open exchange among industry peers.

5:50 pm - 6:30 pm B. Right-Sizing Threat Intelligence for your Enterprise
Andy Bennett - Deputy CISO State of Texas
img

Andy Bennett

Deputy CISO
State of Texas

CISO Roundtable Discussions- Engage in your choice of targeted discussions for open exchange among industry peers.

5:50 pm - 6:30 pm C. Evolving Governance, Risk, and Compliance - Practical Insights

6:30 pm - 7:00 pm Networking Cocktails