Zero Trust With Zero Exceptions: Protect Your Piece Of The Cloud

CXO Council

October 26, 2022 - North America

Speakers

Dave Trader Presidio
Dave Trader

Field CISO

Presidio

Council Speaker

Dave Trader has been in CyberSecurity for over 20 years now.  Dave began his career as a United States Marine serving in both OIF (Operation Iraqi Freedom) and OEF (Operation Enduring Freedom) where Dave specialized in encryption as a Signals Intelligence and Communications expert. Dave is certified in over 70 different areas of CyberSecurity; most notably CISSP, CISM, and as an Ethical Hacker. Dave has an MBA with a specialty in Information Technology and a Bachelor’s Degree in Criminal Justice.  Dave is most recently a graduate of the FBI CISO Academy out of Quantico, VA. Dave also serves on the University of Detroit NSA Center of Excellence CyberSecurity Advisory Board and is a coach for the USAF Cyber Patriot Program.Prior to joining Presidio, Dave was a CISO for seven years at a technology company out of Detroit. Dave specializes in high-security environments, Incident Response, SOC Operations, and security architecture and has been a preferred cybersecurity consultant to Fortune 100 companies for securing their environments for many years.Today, Dave is the Field CISO for Presidio helping countless customers in every vertical with their cybersecurity concerns. Dave thoroughly enjoys the variety of advisory and consulting services.

Uma Mahesh Reddy Prime Healthcare Services
Uma Mahesh Reddy

CISO

Prime Healthcare Services

Council Speaker

CISO and Director of Telecommunications in the healthcare industry. Skilled in Healthcare Information Technology (HIT), Security, Management, Business Strategy, Vendor Management, Software development. Strong information technology professional with a Master's degree focused in Information Technology (Security) from Central Queensland University, Melbourne Campus.

Ken Kazinski Abbott
Ken Kazinski

Global Application Security Sr Leader

Abbott

Council Speaker

Ken Kazinski is the manager of Abbott Laboratories Attack Surface Management team and has over twenty years of experience in the field of cybersecurity. His current cybersecurity focus is in application security, which is enhanced with his substantial knowledge of system security in both government regulated and non-regulated industries. These environments have provided him with a deep contextual understanding on the impact of security in a variety of organizational environments. In his role at Abbott, Ken provides leadership, program vision, and integration guidance on attack surface areas, including Threat and Vulnerability Management, Application Security, Cloud Security, Mobility, and Brand Reputation. As an Air Force veteran with a Master of Science in Cybersecurity, Ken has used both his professional and educational experience to create critical application security programs at multiple Fortune 100 companies. Prior to joining Abbott, Ken managed application security for Johnson Controls, Power Solutions division. His professional and military experience has provided him with the opportunity to work and live in multiple countries around the world.

Matt Morton University of Chicago
Matt Morton

CISO

University of Chicago

Council Speaker

Strong record of success in information security management, IT strategy and budget planning, organizational development, and strategic technology architecture. Value creation through process improvement, organized optimization, talent development, and technology integration. Proven ability in collaboration, information security, application development management and governance structures. Over 20 years IT experience, over 10 years in information security and over 12 years in IT management roles. Experienced in leading web and application development functions and managing the delivery of systems on-time and under budget. Skilled at staff development, strategic and budget planning, project management, vendor management, process improvement, systems analysis, and technology integration. Adept at creating scalable internet architectures, managing multiple projects simultaneously. Able to bridge the gap between technical and non-technical personnel. Specialties: consulting, talent and organizational development,enterprise architecture,strategic planning, security and risk,cloud computing, networking Certifications: HCISPP, CISSP, CISM, CGEIT

Steve Zalewski Levi Strauss & Co.
Steve Zalewski

Former CISO

Levi Strauss & Co.

Council Speaker

Mr. Zalewski currently provides CISO, security consulting and security advisory services. These include: • International cybersecurity advisor and trainer. • Executive advisory board member for security startups, providing guidance on security market direction and product requirements. • CISO advisory board member for venture capital firms internationally. • vCISO for companies requiring temporary or part-time CISO expertise. Services also include guidance and solutions to address incident response, security program design, security assessment, security due-diligence, vendor/supplier due-diligence, security architecture review, board reporting and other key security leadership requirements. Operational experience in Healthcare, Utilities and International Retail verticals. Key Strengths: •Organizational Management •Strategic Planning & Execution •Enterprise Security Architecture/Strategy •Executive and BOD Security Governance/Reporting •Cybersecurity Incident Response •Security Risk & Compliance Management Additionally, I co-hosts the CISOSeries Defense-in-Depth Podcasts and am a frequent speaker and panel moderator at industry events.

Calvin Nobles Illinois Institute of Technology
Calvin Nobles Ph.D.

Chair IT & Management (Former)

Illinois Institute of Technology

Council Speaker

A recognized practitioner in human factors engineering and cybersecurity operations with 25 years of increasing responsibilities in leading security operations, advising senior executives on cyber policies, and driving enterprise-level solutions. An innovative and strategic leader with a record of delivering cyber solutions that impact national efforts; noted for driving change to achieve cybersecurity objectives.

October 26, 2022

Agenda

All times Central Time

3:00 PM-4:15 PM

Zero Trust With Zero Exceptions: Protect Your Piece Of The Cloud

In a world of economic uncertainty and sophisticated threats, businesses need to securely develop cloud applications to safeguard against exploits, malware and ransomware while delivering a positive economic impact. Protecting your core business and cloud-native applications requires security that is simple and comprehensive. This is where a strategic Zero Trust architecture helps! In this session, you’ll learn how Zero Trust principles deliver on the promise to secure your cloud applications that are the lifeblood of your business.

In Partnership With