ISE® West Schedule of Events 2022

Wednesday, November 30, 2022

ISE® WEST WELCOME DINNER
Securing Sensitive Data Without Slowing Down Your Business

November 30, 2022
5:30pm - 8:30pm CT
Pappas Bros. Steakhouse
10477 Lombardy Lane
Dallas, TX 75220
Registration
Ryan Reynolds

Ryan Reynolds
Senior Vice President | Director, Security Incident Management
U.S. Bank
Biography

As enterprises across the spectrum collect, process and store sensitive data in the cloud, security teams are being forced to adapt their processes and technologies at a feverish pace. Data is the lifeblood of an organization, and the freedom and agility afforded by cloud technologies has made data creation - to better understand and engage customers, gain a competitive technological advantage, and develop new revenue opportunities - accelerate to the point where 90% of the world's data has been created in the past two years. Yet despite the rise in data breaches and tightening regulations, the distributed ownership of data makes it all but impossible to know what data is in the cloud, let alone how to secure it. Join us for an insightful discussion on how cloud data can be automatically discovered and classified, and how novel technology allows security teams to secure the data itself, with real-time detection and response to reduce their attack surface, automate risk remediation, and ensure operational preparedness, thus improving your 360° security posture and staying one step ahead of data regulations and risks. We will also explore how security teams can be empowered to free the rest of the business to harness the value of their data, securely.

Thursday, December 1, 2022

9:30 AM: ISE® Continental Breakfast (Invitation Only)

Location: Ft. Worth Foyer

The exclusive VIP Continental Breakfast kicks off the day by connecting sponsors, nominees, and executive attendees in a relaxed morning atmosphere over coffee and light breakfast items.

11:00 AM: ISE® Signature Luncheon (Invitation Only)

Location: Prive

From CEO Fraud to Vendor Fraud: The Changing Nature of Business Email Compromise

Travis Farral

Travis Farral
VP & CISO
Archaea Energy
Biography

Security awareness training has worked to some extent, with most employees now realizing that their CEO is not likely to email them in the middle of the day for gift cards. But business email compromise is still a major problem—just not in the same way. Join this session to hear:

  • How attacker tactics have shifted in the past few years
  • Why this type of social engineering is so difficult to stop
  • And our predictions for where attackers will move in the new year

Attendees are eligible to earn 1 CPE for this event.

12:50 PM: Welcoming Remarks and Introductions

Location: Ft. Worth Ballroom
Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

T.E.N.'s CEO & President will welcome guests, provide an overview of the program agenda and event purpose, and introduce the speakers and sponsors of the ISE® West Summit and Awards 2022. Marci will be the emcee of the summit and will moderate the ISE® Fireside Chats and T.E.N. Tech Talks.

1:00 PM: Keynote Address

Location: Ft. Worth Ballroom

Don’t Think Just Do…My Story of Creating One of the Industry’s Leading Non-Profits

Devon  Bryan

Devon Bryan
Global Chief Information Security Officer
Carnival Corporation
Biography

“Don’t Think, Just Do…" ……my story of creating one of the leading non-profits tackling the underrepresentation of women and minorities in the field of cybersecurity…

1:20 PM: ISE® Fireside Chat - One Burning Question

Moderated By: Marci McCarthy
Location: Ft. Worth Ballroom

Trusted Digital Experiences – Is Security as a Differentiator Without Sacrifice Just Wishful Thinking?

Bambawale_Sujeet

Sujeet Bambawale
Vice President and Chief Information Security Officer
7- Eleven
Biography

Brickey_Jon

Jon Brickey
SVP, Cybersecurity Evangelist
Mastercard

1:35 PM: ISE® Nominee Showcase Presentation #1

Location: Ft. Worth Ballroom

Simple Plan with Execution Precision: Data Classification & Enterprise Onboarding and Transition

Pace_Robert

Robert Pace
VP, Information Security & CISO
Invitation Homes
Biography

To improve its data classification processes for the growing amounts of documents created and accessed during the execution of business, Invitation Homes established a strategic approach to data classification. The project established a user-friendly and security-sound process to apply data classification upon document creation and accessing historical documents. To streamline the onboarding, offboarding and job role change process of users, Invitation Homes created an efficient and scalable process for onboarding and transitions. The project increased the efficiency of onboarding, offboarding and job role changes in a way that reduced errors and delays in provisioning, while enhancing the compliance posture.

1:45 PM: T.E.N. Tech Talk

Moderated By: Marci McCarthy
Location: Ft. Worth Ballroom

The Makings of a Chief Product Security Officer (CPSO)

Vince Arneja

Vince Arneja
Chief Product Officer
GrammaTech
Biography

Jason Christman

Jason Christman
Vice President, Chief Product Security Officer
Johnson Controls, Inc.
Biography

Product security executives are responsible for the security of cyber-physical products. They are the individuals who ensure the software inside these devices is secure and not vulnerable to cyberattacks. This is a relatively new role, which is growing in lockstep with expanding markets for smart and autonomous systems and increasing government focus on secure software development.

With an increased emphasis on maintaining the safety and security of embedded software across virtually all industries, organizations are challenged with determining the hallmarks of an effective CPSO and how the CPSO interacts with the larger organization—from development to security and at the executive level. Further, because not every organization developing software-centric products needs a focused product security executive, what type of product companies are hiring CPSOs -- and why.

2:00 PM: ISE® Tabletop Conversations

Location: Ft. Worth Ballroom

Investigation and Impersonation: How Social Engineering Impacts Businesses

Kathleen Mullin

Kathleen Mullin
Chief Information Security Officer
Cancer Treatment Centers of America, Inc.
Biography

Navigating the Convergence of Cybersecurity, Enterprise Risk Management and Compliance

Kevin Dunn

Kevin Dunn
Chief Information Officer / Chief Information Security Officer
U.S. Retirement and Benefits Partners
Biography

Ransomware is Now RansomOps...Resilience is the New Security

Trina Ford
Senior Vice President, Chief Information Security Officer
AEG
Biography

2:20 PM: ISE® Nominee Showcase Presentation #2

Location: Ft. Worth Ballroom

ServiceTitan Smart Trust Center

Cassio Goldschmidt

Cassio Goldschmidt
Chief Information Security Officer
ServiceTitan
Biography

As a provider of all-in-one software for residential, HVAC, plumbing, electrical, garage doors, and other home services companies, ServiceTitan is well aware of the concerns, risks, and dangers posed by hackers, who aren’t a whole lot different from Wild West outlaws. The ServiceTitan Smart Trust Center is a public-facing portal that provides an easy way for customers to obtain information related to privacy, security, and compliance as well as to subscribe to security notifications.

2:30 PM: ISE® Fireside Chat - One Burning Question

Moderated By: Marci McCarthy
Location: Ft. Worth Ballroom

No Longer the Department of No! Security is a Partner for the Business

Mike Britton

Mike Britton
CISO
Abnormal Security
Biography

Dennis McDonald

Dennis McDonald
Business Information Security Officer
Jack Henry and Associates
Biography

2:45 PM: Break

3:00 PM: T.E.N. Tech Talk

Moderated By: Marci McCarthy
Location: Ft. Worth Ballroom

Data-Centric Security is the New Data Protection

Adam Maslow

Adam Maslow
Vice President IT Security and Infrastructure, Fry Cook & Cashier
Raising Cane's

Fred Spencer

Fred Spencer
VP and Chief Information Security Officer
Everest Re
Biography

3:15 PM: T.E.N. Tech Talk

Moderated By: Marci McCarthy
Location: Ft. Worth Ballroom

Why Cybersecurity Leadership and Effective Cyber Resilience Programs are Critical to Delivering Services to Our Communities

Thomas Ray

Thomas Ray
CISO
City of Berkeley
Biography

3:25 PM: Exabyte Sponsor Showcase

Location: Ft. Worth Ballroom

Redefining Cloud Email Security with a Modernized Approach to Stopping Attacks

Scott Deluke

Scott Deluke
Enterprise Solutions Architect Director
Abnormal Security
Biography

Credential phishing. Executive impersonation. Ransomware. These inbound email attacks are still a major problem… But they’re not our only problem. Join Abnormal Security to discover how threat actors are moving to email platform attacks and how you can stop them with a behavioral AI approach to detecting anomalies.

3:40 PM: ISE® Fireside Chat - One Burning Question

Moderated By: Marci McCarthy
Location: Ft. Worth Ballroom

Crossing the Red Line: Inaction or Taking Action in the Face of A Ransomware Attack

Trina Ford
Senior Vice President, Chief Information Security Officer
AEG
Biography

Ross Wells

Ross Wells
Information Security Officer - Castrol
BP
Biography

3:55 PM: ISE® Nominee Showcase Presentation #3

Location: Ft. Worth Ballroom

Zero Trust

Alex Arango

Alex Arango
Head of Cyber Threat Management, Deputy CISO
Mercury Financial
Biography

Jason Smola

Jason Smola
Enterprise Security & Infrastructure Architect, Deputy CIO
Mercury Financial
Biography

Traditional network models operate on the assumption that everything inside the network should be implicitly trusted. However, due to a lack of controls governing intra-network communication, users – and even worse, malicious actors – are able to move laterally and potentially exfiltrate sensitive data. The Zero Trust Program was implemented to eliminate the traditional security risks by enforcing a ‘Least Privilege Access’ model, thereby enabling Mercury Financial to secure its technology environment with the core principle of ‘Never Trust, Always Verify.’

4:05 PM: T.E.N. Tech Talk

Moderated By: Marci McCarthy
Location: Ft. Worth Ballroom

Mobile as a Threat Vector: A Critical Part of The Cybersecurity Landscape

Richard Rushing

Richard Rushing
Chief Information Security Officer
Motorola Mobility
Biography

Dan Solero

Dan Solero
AVP, Cybersecurity
AT&T
Biography

4:20 PM: ISE® Nominee Showcase Presentation #4

Location: Ft. Worth Ballroom

Developer Driven Security Remediation

James Chiappetta

James Chiappetta
Senior Vice President, Cybersecurity
Blackstone
Biography

Austin Paradis

Austin Paradis
Analyst, Blackstone Technology & Innovations
Blackstone
Biography

Blackstone’s Security team has enhanced their security remediation capabilities by creating a more developer-focused, central self-service reporting, remediation, and automation platform that allows for clearer prioritization and action of security issues. By centrally attributing, correlating, and de-duplicating security alerts from multiple scanning tools that span the Software Development Lifecycle (SDLC), the Developer-Driven Security Remediation project puts developers in the driver’s seat for remediating security alerts from the team's portfolio of tools in a single place.

4:30 PM: ISE® Fireside Chat - One Burning Question

Moderated By: Marci McCarthy
Location: Ft. Worth Ballroom

Breaking Trust: Shades of Crisis Across the Software Supply Chain

Kevin Dunn

Kevin Dunn
Chief Information Officer / Chief Information Security Officer
U.S. Retirement and Benefits Partners
Biography

Be it third-party software updates, application installers, pre-installed malware on connected devices or compromised code placed into firmware or hardware components, compromising the software supply chain enables attackers to deliver malicious code in the guise of trusted programs. This can be a terribly effective technique to both spread an attack widely and target well-secured systems. The risks are particularly acute for government organizations as well as infrastructure and manufacturing industries. With business operations and continuity, reputation, and the bottom line on the line, supply-chain risk management has never been more important. The escalation in number of breaches as well as regulatory compliance obligations means organizations must do more to effectively manage third-party risk.

4:45 PM: Break

5:00 PM: ISE® VIP Reception

Location: Austin 3

ISE® Nominees, sponsors and special guests will have the opportunity to network in a private setting.

6:00 PM: Sponsor Pavilion and Dinner Buffet

Location: Ft. Worth Foyer

Guests enjoy gourmet dinner while networking and meeting the sponsors.

7:30 PM: ISE® West Awards Gala

Location: Ft. Worth Ballroom
Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Devon  Bryan

Devon Bryan
Global Chief Information Security Officer
Carnival Corporation
Biography

Honoring and celebrating the award nominees, this exciting occasion brings together top security executives to recognize the individuals and the project teams who have made a significant and positive impact on their organizations through exemplary performance. Don't miss the Passport for Prizes drawing and a chance to win outstanding gifts from our sponsors!

9:00 PM: Champagne & Dessert Reception

Location: Ft. Worth Foyer

Enjoy champagne and dessert while celebrating the winners, nominees and project teams.