CISO Seattle Summit | June 13, 2017 | The Westin Seattle - Seattle, WA, USA

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Tuesday, August 22, 2017 - CISO Seattle Summit

7:30 am - 8:30 am

Registration and Networking Breakfast

 

8:30 am - 8:40 am

Welcome Address and Opening Remarks

Presented by:

Michael Schutzler, CEO, Washington Technology Industry Association

 
 

8:45 am - 9:15 am

Share:

Keynote Presentation

Analytics & Cloud Together: Accelerating Innovation in the New Cognitive Era

Leading companies are disrupting the status quo by using data to inform business strategy and create new business models that fuel growth. CIOs have the power to uncover the insight that drives disruption and speeds transformation. Learn how leading IT organizations are maximizing the use of open source and cloud technologies alongside on-premises investments to accelerate innovation. And understand how CIOs are embracing new cloud-enabled consumption models while helping ensure data privacy, security and sovereignty.

Takeaways:

  • Integrating analytics into key applications and systems can enable people throughout an organization to access and act on insights when and where it matters most. 
  • Take advantage of more sources to enable better decisions. IT must create an environment with easy access to all types of data - structured and unstructured - from internal sources and those outside the organization. 
  • Data science teams are answering the toughest questions by leveraging open source development platforms and tools to build models more quickly and easily.

Sponsored by:

IBM View details

 
 
 

9:20 am - 9:45 am

Executive Exchange

 

Share:

Thought Leadership

Become a Change Agent for Business Transformation

Today's modern CIO is embarking on a digital transformation journey exploring radical hybrid IT strategies and leveraging new technologies like Cloud, Social, Mobile and Big Data. However with 'keeping the lights on' legacy IT components costing nearly 90% of a typical IT budget, how can IT make powerful advancements and lead business change?

Join this interactive session to learn how award-winning CIOs are successfully tipping the balance by liberating people, time and money from costly ongoing maintenance of their ERP systems including SAP and Oracle, to invest in strategic initiatives that create real-world competitive advantage.

Sponsored by:

Rimini Street View details

 
 
 

9:50 am - 10:15 am

Executive Exchange

 

Share:

Thought Leadership

Identity and the New Age of Enterprise Security

From a technology standpoint, as a society the world of business has gone through two distinct stages in the evolution of its information security focus. The first addressed network based protection and preventative controls such as firewalls and anti-malware. The second looked at data-centric and detective controls such as encryption and intrusion/extrusion monitoring. Since breaches continue to occur at a record pace, what is need new is clearly a new evolution, one that pushes towards individual focused security through granular user monitoring and management as provided by solutions such as Identity and Access Management. While IAM isn't a new technology field, it is one whose time has come and CISO need to begin investing in modern-day, light-weight, easy to implement IAM solutions now to stay ahead of the curve, and reduce enterprise threats. 

Takeaways: 

  • The breach onslaught demonstrates that existing security solutions are incapable of defending current threats 
  • Enterprises need to begin looking at security from an activity perspective rather than an artifact perspective 
  • IAM provides activity insight, and therefore threat awareness, no other platform can equal

Sponsored by:

RSA View details

 
 
 

10:20 am - 10:30 am

Morning Networking Coffee Break

 

10:35 am - 11:00 am

Executive Exchange

 

Share:

Think Tank

Planning for a MultiCloud Future

The promise of the cloud is almost beyond compare; infinite computing resources, unmatched reliability and uptime, instantaneous service availability, simplistic self-service and provisioning, and the low-low prices of a buy by the drink model. These are the reasons behind the rush to the cloud that we are currently experiencing, but the wholesale adoption does bring a downside " as more and more capability is moved to the cloud, more and more cloud providers are utilized since, for the most part, each provider offers only a limited suite of services. The MultiCloud environment that creates a new set of challenges that IT leaders need to overcome, notably resiliency, interoperability/integration, and security and compliance through careful planning and the lessons learned from building complex on premise distributed systems.

Takeaways:

  • As enterprises move to the cloud, MultiCloud environments will increasingly become the norm, not the exception
  • Consistent planning and thoughtful architecture will be essential to efficient and effective cloud deployments
  • IT leaders do not need to be alarmed, they've been down the complex environment path before, but they do need to be careful

Presented by:

James Rubert, Enterprise Chief Cloud Architect, Boeing

 
 

11:05 am - 11:30 am

Executive Exchange

 

Share:

Thought Leadership

Achieving Cybersecurity at IoT and Cloud Scale

With the growth of IoT and Cloud, the attack surface that enterprises must protect is expanding dramatically. Unique regulatory requirements by industry vertical are also placing extra pressure on Security Officers and their teams. How can CISOs effectively respond? First and foremost, taking an architectural approach, one that includes network segmentation, will create the best chance of solving Enterprise security holistically and for the long term. Key capabilities must include visibility of all security elements and the communications these systems and devices generate and, even more importantly, automation of operations and response. With the current cybersecurity skills gap that many enterprises experience today, the ability to quickly and effectively audit, recommend and automatically fix the entire network security architecture is critical. 

Takeaways:  

  • Technology evolution and innovation is exponentially expanding the attack surface. 
  • To keep up, enterprises must take an architectural approach to network security that includes visibility and automation.  
  • With limited resources, the ability to quickly and effectively audit, recommend and repair network security is crucial.

Sponsored by:

Fortinet View details

 
 
 

11:35 am - 12:00 pm

Executive Exchange

 

Share:

Thought Leadership

Usable and Effective Security for Empowered Users, Cloud, Mobile and BYOD

IT platforms today are more secure than they were 10 years ago but the risk of data breaches is higher today. It's because your IT has changed (cloud, BYOD, etc.) but your security hasn't evolved. In the meanwhile, attackers are targeting end users directly through phishing. 95% of all breaches involve compromised end user credentials. 75% of all breaches involve compromised end user devices. How can you take a modern approach to reducing the risk of data breaches? 

Attend this session to learn:

  • How usable security is the most effective security in practice 
  • How to win the hearts of your users and business with multi-factor authentication 
  • Why a single platform can replace several mobile, cloud and authentication products 
  • How companies such as Facebook are securing BYOD, users and cloud apps using Duo

Sponsored by:

Duo Security View details

 
 
 

12:05 pm - 12:30 pm

Executive Exchange

 

Share:

Think Tank

Building Dynamic Security Teams

There's no other way to say it than bluntly; Information Security is a white-hot field within Information Technology as a whole " over the last dozen years it has gone from after-thought, to scapegoat, to critical enterprise success factor. As a result, the need for capable and qualified Information Security specialists, whether front-line Analysts, mid-level Managers, or top level CISOs is at an all time high, but personnel and skills availability is sinking to an all-time (at least in terms of supply and demand ratio) low. There simply isn't enough expertise in existence to go around, or enough education occurring to create it. In this environment, senior Information Security leaders have to get creative in their pursuit of the people, performance, and passion necessary to address this capability shortfall. 

Takeaways: 

  • Learn how to build grass-roots programs that cultivate a farm full of potential security experts through internal and collaborative programs 
  • Find out how to leverage key organizational traits to generate buzz and interest where none existed before 
  • Understand the relevance of certs vs. experience and how to evaluate and validate the value of candidates

Presented by:

Ravila White, Deputy Strategic Programs - Enterprise Security Architecture, Optum

 
 

12:35 pm - 1:35 pm

Networking Luncheon

 

1:40 pm - 2:05 pm

Executive Exchange

 

Vendor Showcase


 

2:10 pm - 2:35 pm

Executive Exchange

 

Share:

Thought Leadership

Strategic and Secure Mobility

Is mobility a cost? Or is it a key part of your strategy for business success? Many businesses are leveraging mobility to generate real and measurable returns and to increase their competitiveness. How? Join CDM Media and BlackBerry as we explore ways in which companies can strategically manage their mobility investments.  

In our session we'll look at security - again from a strategic viewpoint. Security covers a wide range of issues in the modern enterprise. While protection of data is at the forefront, security involves many other aspects and issues from secure collaboration to the security and protection of employees in an increasingly tumultuous world. We'll deal not only with securing mobility, but how the strategic use of mobility can make you more secure.

Sponsored by:

BlackBerry View details

 
 
 

2:40 pm - 3:05 pm

Executive Exchange

 

Executive Boardroom

Engage to Win: Transforming Customer Engagement from the Bottom Up

Today's consumers are demanding consistently exceptional experiences from the brands they engage with. The ability to deliver these exceptional experiences has become the single most important differentiator for every enterprise. 

But how do enterprises create these experiences when there is ever-growing complexity that innovators need to deal with? Rapid change is not only a key driver behind today's digital transformation projects, but it's the defining characteristic of who will win the customer experience race. An Engagement Database - one that drives more meaningful customer relationships from the bottom up - is the key to unlocking data's potential to drive the most meaningful customer experiences. 

In this presentation, attendees will learn how to: 

  • Unleash the full potential of their data 
  • Create the experiences today's consumers expect 
  • Transform customer engagement to deliver competitive advantage

Sponsored by:

Couchbase View details

 
 

Share:

Executive Boardroom

The Connected, Digital Workplace

In an environment of BYOD, distributed workforces, flexible work-styles and democratization of IT, how can IT executives support an environment of connection and collaboration throughout the enterprise, while adhering to information security requirements? In this session, Sterling Bailey from Jive Software will take you through some of the common challenges faced by executives and how some of the top companies in the world are tackling them to solve real-world problems while improving the employee and customer experience.

Sponsored by:

Jive Software View details

 
 
 

3:10 pm - 3:35 pm

Executive Exchange

 

Share:

Think Tank

The Privacy of IOT

As the Internet of Things becomes more widespread, consumers must demand better security and privacy protections that don't leave them vulnerable to corporate surveillance and data breaches. The most dangerous part of IoT is surrendering your customer's privacy, bit by bit, without realizing it, because they are unaware of what data is being collected and how it is being used. As mobile applications, wearables and other Wi-Fi-connected consumer products replace 'dumb' devices on the market, consumers will not be able to buy products that don't have the ability to track them. It is normal for consumers to upgrade their appliances, and it most likely does not occur to them that those new devices will also be monitoring them.  

Takeaways: 

  • Companies need to be more transparent. 
  • Unwanted Public Profile: You've undoubtedly agreed to terms of service at some point, but have you ever actually read through an entire document?  
  • Eavesdropping: Hackers could actually use a connected device to virtually invade a person's home.  
  • Consumer Confidence: Each of these problems could put a dent in consumers' desire to purchase connected products, which would prevent the IoT from fulfilling its true potential.

Presented by:

Michael Cockrill, CIO, State of Washington View details

 
 
 

3:40 pm - 3:55 pm

Afternoon Networking Coffee Break

 

4:00 pm - 4:25 pm

Executive Exchange

 

Share:

Think Tank

Strategic Planning - Lessons Learned at REI

IT organizations are under tremendous pressure to serve their company. As companies work through continued pressure to be more competitive, strive to be more responsive to customers, find new channels for financial growth, and comply with increasing government regulations, IT has its own challenges. IT is under pressure to manage old and emerging technologies and stay in front of business-led technology decisions all while continuously maturing the IT function to be better positioned in the company's strategic planning process. 

Takeaway:

There is no silver bullet to make an IT organization successful however there are some success stories worth sharing. Learn of the deliberate changes in REI's IT organization to manage these pressures and improve it's positioning with the company's strategic planning process.

Presented by:

Gabriel Morgan, Sr. Director of Enterprise Architecture and Business Analysis, REI View details

 
 

Share:

Think Tank

Your Board wants to hear from you. Now what?

For several years, security professionals identified the importance and need for Corporate Boards to receive the story from security directly from the CISO. First problem, not every organization had a CISO. Second problem, many CISOs could only communicate with their Board through a proxy, like the CIO or CFO or through a canned compliance-level briefing. In the healthcare industry, these conditions were even more prevalent. During the last 2-3 years, in healthcare, the headlines began to announce data breaches involving millions of medical records. The federal government has negotiated settlements of millions of dollars in fines. One of the intentional consequences is governing boards of healthcare organizations are increasingly motivated to learn more and provide more influence on their organization's security management. This is true outside of healthcare as well. All Boards understand or are beginning to understand their responsibilities around preventing and properly handling data breaches. That understanding begins with more involvement with their CISO. However, now that CISOs in healthcare and elsewhere have seemingly got their wish to have a direct and frequent avenue to their Boards, what is effective to tell them? What do CISOs need to ask from their Boards? In this session, Sean Murphy, a healthcare CISO, will share some lessons learned and describe the journey he is on with his Board as that relationship grows. This is designed as a collaborative, participative forum and audience participation is encouraged to share ideas, frustrations, and common understanding. 

Takeaways: 
  • Describe what has led up to current Corporate Boards' interest in cybersecurity
  • Examine several examples of Board-appropriate content (metrics and maturity) and delivery 
  • Consider options to provide education and continued learning for the Board 
  • Navigate the communication with the Board when they ask, ?What do you need??

Presented by:

Sean Murphy, Vice President, Chief Information Security Officer, Premera Blue Cross View details

 
 
 

4:30 pm - 5:15 pm

Share:

Executive Visions

Facilitating Technology-Enabled Business Transformation

The role of the modern IT Executive is more complex than it has ever been before, not just because the technology landscape has become more complex, but also because increasingly IT execs have had to become a business-focused executive, not just a technologist. Long have we talked about the CIO and CISO getting a seat at the table but modern businesses are now demanding that their technology impresario join them and leverage his deep and rich technical acumen to allow the organization as a whole to better position itself for market-place success. To be successful, CxOs need to invest in themselves, in their personnel, and in the right technologies to allow them to position the IT department to proactively address business needs as an innovator and driver, rather than order-taker and enabler.

Takeaways:

  • IT leadership can no longer be simply technology focused, but must instead take their visibility into business process and become business focused
  • A broader business-focus does not preclude maintaining technology excellence however and indeed may demand more of it than ever before
  • Success for CxOs will be measured not in how they can enable enterprise decisions, but in how they can drive growth

Moderated by:

Michael Schutzler, CEO, Washington Technology Industry Association

 

Panelists:

Vanessa Pegueros, CISO, Docusign View details

 
 

Chip Suttles, Vice President Technology, Seattle Seahawks

 

Brian Laughlin, Director Technical Fellow, Technical Architecture/Strategic Planning, Boeing View details

 
 

Chris Borkenhagen, SVP IT, Concur View details

 
 
 

5:20 pm - 5:30 pm

Thank You Address and Closing Remarks

Presented by:

Michael Schutzler, CEO, Washington Technology Industry Association

 
 

5:30 pm - 7:00 pm

Cocktail Reception