Day 3: Wednesday, December 6th

8:00 AM - 8:40 AM Networking Breakfast

8:40 AM - 8:50 AM Chairperson’s Opening Remarks


8:50 AM - 9:30 AM Utilizing Big Data and Predictive Analytics to Navigate Risk

Enterprise risk assessment and modelling using predictive analytics is a major tool for insurance, financial services and government. The availability of big data and the tools used to process data from multiple sources has led to a more comprehensive understanding of customers’ risk for actions ranging from defaulting on debt to suffering a major medical incident. Using these tools and techniques to their fullest capacity will save enterprises money and time in the long run by avoiding less-desirable outcomes.

In this session:

•Introducing the newest innovations for more precise assessment
•Utilizing broad-base risk modelling to identify and define a customer profile
•Exercising prudence in selecting data sets to avoid discriminatory analysis

9:30 AM - 10:00 AM Business Meetings

10:00 AM - 10:30 AM Business Meeting


10:30 AM - 11:00 AM Harnessing and Harvesting Talent to Retain Strong Security Teams

Developing an effective talent strategy prevents turnover and drives consistent performance. In an area of zero unemployment, its crucial to attract, develop and retain talent. Talent development including training, hiring, retaining, awareness training, and training specific to function are all part of the organization’s security mission. The lack of skilled people to fill current openings is a well-known fact.

This session will discuss developing cybersecurity executives throughout their careers:

• Helping equip the next generation to understand what cybersecurity professionals are and what they do including the right recruitment practices
• Equipping hiring managers to develop the right team for the enterprise
• Inspiring and motivating cyber security professionals
• Innovative ways to close the IT security skills gap

Closing Workshop

11:00 AM - 11:45 AM Examining the Security Risks in Vendor Services and Relationships

Robust vendor vetting and management are key when any services are outsourced. As the cyber security executive, this adds the responsibility of proactively identifying risks, as well as verifying and overseeing that business partners and suppliers meet regulatory and compliance requirements throughout the life of the relationship.

This session will explore the extended risk and attack vectors associated with vendor staff, products and services that originate outside of an enterprise’s defensive perimeter and offer best practices for assessing vendor compliance, including:

•Considerations for access inside the defensive perimeter
•Featuring compliance requirements in RFPs
•Codifying security assessments in the procurement process
•Access technologies for vendor identification, validation and data encryption
•Measuring and monitoring compliance over time

11:45 AM - 11:45 AM Chairperson’s Closing Remarks