Cloud Security

CISO Dinner

March 28, 2022 - Atlanta, GA

Attendees Include

David Levine Ricoh Americas Corporation
David Levine

VP Corporate & CSO

Ricoh Americas Corporation

Dinner

David Levine is Vice President of Corporate and Information Security & CSO for Ricoh USA. In this role, he has responsibility for corporate security, investigations, operational security (cyber and physical), security policy, access management, eDiscovery and litigation support and HIPAA Compliance. Levine chairs Ricoh’s Security Advisory Councils and HIPPA Board of Directors, leads Ricoh’s Global Virtual Security team and is routinely engaged in customer opportunities to discuss risk and security. Levine has held a wide and diverse variety of positions during his 23-year tenure with the company, including IT engineering, project management, vendor management, Six Sigma and Technology Infrastructure and End User Services leadership, giving him a great perspective on technology, the business and security. Levine is an Atlanta Co-chair for Evanta's CISO Governing Body, a member of Argyle's CISO Advisory Board, a member of Forrester Research’s Security & Risk Leadership Board, Gartner's CISO Coalition and the FBI’s InfraGard Program. He is a quarterly contributor to CSO online. He holds a Bachelor of Arts degree in Information Systems with minors in Computer Science and Business from Eckerd College.

Deena Swatzie Truist
Deena Swatzie

SVP, Corporate Cyber Strategy Leader

Truist

Dinner

Providing industry-leading practices in cyber-risk management and compliance while implementing an effective cybersecurity program that protects against threats, advances transformation, and drives growth.

Kelvin Arcelay EVO Payments International
Kelvin Arcelay

SVP, Information Security & IT Risk Management

EVO Payments International

Dinner

Published industry expert with solid technical background, domestic and international successes delivering strategic solutions, global and culturally diverse teams, Cyber-security and process optimization. Specialties: - Customer-focused, revenue-optimization opportunities - Repeated successes optimizing service delivery strategies in multiple industries - Information Governance, Risk Management and Internal Controls - M&A Due Diligence and Integrations - Cyber-security and Internal Controls Risk ManagementPublished industry expert with solid technical background, domestic and international successes delivering strategic solutions, global and culturally diverse teams, Cyber-security and process optimization. Specialties: - Customer-focused, revenue-optimization opportunities - Repeated successes optimizing service delivery strategies in multiple industries - Information Governance, Risk Management and Internal Controls - M&A Due Diligence and Integrations - Cyber-security and Internal Controls Risk Management

Ray Strubinger Global Payments Inc.
Ray Strubinger

Director Information Security

Global Payments Inc.

Dinner

Pre-sale campaign for my upcoming book: https://www.indiegogo.com/projects/solarwinds-a-nation-state-attack-r-strubinger CISM, GCFA, GCIH, GSNA, GCTI, MBA Results oriented professional with business and technical experience gained and applied across numerous industries. Strong strategic, team building, analysis and communication skills. Skilled at developing efficient, sustainable processes and bridging the divide between technical and non-technical communities. Publications and presentations include topics on information security, digital forensics, incident response and system administration. Proficient leading, managing and building large security teams. Experienced leading the development, implementation and maturation of new or existing Information Security programs through the use of service providers and self-source resources. Able to quickly contribute value within new and unfamiliar business environments. Diverse experience in financial services, software development, digital commerce, healthcare and higher education. Masters of Business Administration & Bachelor of Science in Information Technology Experience Leadership: Strategy, Presentation, Policy, Assessment, Compliance, Sourcing, Service development, Analysis Frameworks: ISO 27001/2, 27017/18, PCI, SOC, SOX, SANS, NIST Technical: Cloud security, Digital Forensics, Incident Response, Threat Intelligence, Discovery, Data Loss Prevention, Encryption, Endpoint & Network Security

Tyler Agypt Checkmarx Inc.
Tyler Agypt

Director of Strategic Initiatives

Checkmarx Inc.

Dinner

I am a Software Engineer Manager with 10+ years of professional experience in the IT field and have succeeded in a variety of IT roles ranging from Application Development to Project Management and Sales. I am devoted to identifying the best solution for problems of all sizes/colors and enjoy being responsible for producing and delivering effective, reliable, and maintainable solutions to whomever the end customer may be. I have had the privilege of working with diverse teams and projects that have contributed to my personal development as a communicator, a leader, and a person. Specialties: Leadership, Cyber Security, Secure SDLC, Application Security, DevSecOps

March 28, 2022

Agenda

All times Eastern Time

5:30 PM-9:00 PM

Cloud Security

According to Gartner 79% of companies have experienced at least one cloud data breach during the pandemic. Remote work is here to stay, and the concept of securing a perimeter has essentially ended. Traditional application security measures are broken. The need to innovate faster and shift to cloud-native application architectures isn’t just driving complexity, it’s creating significant vulnerability blind spots also.

Under the thumb of the pandemic, enterprises and IT leaders had to look for tech solutions that were resilient and agile to empower the remote workforce. To sustain business continuity plans, organizations shifted workloads to the cloud. As much as cloud adoption offers flexibility and productivity, it also exposes organizations to cyber threats and data breaches. So the question remains if moving to the cloud is the right thing to do and if so how to protect it from the new risks given that most organizations believe that application security should be completely automated to keep pace with dynamic clouds and rapid software development practices.


In Partnership With