The Future of IT and Cybersecurity

CISO & CIO Think Tank

October 19, 2023 - Atlanta, GA

Visionaries & Speakers

Michael Owens

BISO

Equifax

Think Tank Speaker

Dr. Michael Owens is an innovative, collaborative, and distinguished leader with over 25 years of experience in startup, corporate, government, and military organizations. A transformation leader and sought-after speaker, Michael frequently keynotes on topics related to cybersecurity, cyberwarfare, and national security matters. As a cybersecurity executive, he has been at the vanguard of some of the most complex issues dealing with breach mitigation/recovery, threat intelligence sharing, and diversity within the tech and cyber industry. Michael is the president and CEO of the U.S. Global Center of Cyber Policy, where he leads the organization in providing federal, state, and local governments with non-partisan thought leadership and expert information and analysis on cybersecurity, cybercrime, and cyberwarfare trends, strategies, and policies from a domestic and international perspective. Prior to this, Michael led the Global Cybersecurity, Cybercrime, and Critical Infrastructure Program for EY within the Forensics, Investigations & Dispute division. In that role, he was responsible for the global strategic direction and standardization of threat intelligence, cybersecurity assessments, audits, and incident response services. Before this, Michael worked at Cisco Systems leading the Advanced Services, Public Sector service delivery team. During this time, he led cybersecurity, wired and wireless networks, and IT strategy engagements for government agencies in the U.S. southeast across and New York. Michael has extensive international and geopolitical experience with projects completed in over 100 countries. As an entrepreneur, Michael pioneered the practice of SMB MSP and fractional CIO/CISO services. Michael is an eight-year veteran of the United States Marine Corps and a current member of the US Marine Corps Cyber Auxiliary. He is a member of the World Affairs Council of Atlanta, a Political Partner with the Truman National Security Project, and serves on the State Advisory Committee for the US Global Leadership Coalition, the Evanta/Gartner Atlanta CISO Governing Body, and the Leadership Board of the Cybersecurity Collaboration Forum. Michael's educational background includes a bachelor’s from North Carolina A&T State University, a master’s degree from Georgia Institute of Technology, a doctorate from California Intercontinental University, and advanced certificates and executive programs from the U.S. Army War College and Harvard University. He resides in Mableton, Georgia with his two children.

Ben Halpert

CSO

Castle Black

Think Tank Speaker

Ben Halpert is a man on a mission: to educate and empower today’s digital citizens. By day, he is the CSO at Castle Black providing individuals cybersecurity, online privacy, and digital hygiene services with 24/7 human support. By night, he champions cyber safety and ethics education throughout society via the 501(c)3 nonprofit Savvy Cyber Kids he founded. Ben has presented at the World Economic Forum, NACD directorship training, RSA Conference, TEDxSaintThomas, TEDxKids@Vilnius, GISEC Global, InfoSec World, SecureWorld, IEEE, ACM, CSO50, CIO/CISO Summits, and many other events. In addition to his numerous publications, Ben has been featured in the New York Times, Wired, Bloomberg, BBC, Kiplinger, Good Morning America, Good Day Atlanta, CNN HLN, Fox News, RogersTV, among others.--

Charles Andry

Chief Architect

Jackson Healthcare

Think Tank Speaker

Cybersecurity visionary and leader who has built a highly effective and respected information security program within a healthcare enterprise. Leverages several years of leadership in the design, implementation and maintenance of enterprise-wide IT and Cybersecurity systems to foster a culture of continual improvement and learning. Expert technical manager specializing in security and software quality assurance methodologies. Adept at driving business and technology solutions through strategic planning, design, and implementation while ensuring compliance with regulatory and security requirements. Strong background in Data Center, data protection, project management, business continuity and disaster recovery, incident response, risk mitigation, process improvement, training development and delivery, and policy management. Manages the security operations center, governance, risk, & compliance, security education, incident response, and enterprise information security advisory services.

Adolph Barclift

Former CISO

Five Star Bank

Think Tank Speaker

Adolph Barclift serves as the Chief Information Security Officer for Five Star Bank based in Rochester New York. He leads their information security and compliance functions. His responsibility includes data security operations, vulnerability management, fraud detection and regulatory compliance across heterogeneous operational environments. He has more than 20 years experience in information systems solution delivery, information security and data visualization.

Tamika Bass

Director, Head of Cybersecurity

Gannett Fleming

Think Tank Speaker

Highly qualified IT Security Analyst & Adjunct Professor with 15+ years experience specializing in business continuity, disaster recover, IT security, and knowledge transfer. Applies methods for assessing and mitigating risk, analyzing impacts, and managing incidents. IT security experience including security auditing, governance risk and compliance, ITGRC implementation and business continuity planning.Highly qualified IT Security Analyst & Adjunct Professor with 15+ years experience specializing in business continuity, disaster recover, IT security, and knowledge transfer. Applies methods for assessing and mitigating risk, analyzing impacts, and managing incidents. IT security experience including security auditing, governance risk and compliance, ITGRC implementation and business continuity planning.

Emily Austin

Security Research Manager, Senior Researcher

Censys

Think Tank Speaker

Emily leads the security research team at Censys, where she and her team study security threats and other interesting Internet phenomena. Previously, she was a security engineer focused on threat hunting, detection, and incident response. She is interested in the application of data science and analytics techniques to problems in security, and in the past has worked on projects related to anti-abuse, fraud, and malicious web app traffic detection.

Adolph Barclift

Former CISO

Mergence Global

Think Tank Speaker

Adolph Barclift serves as the Chief Information Security Officer for Five Star Bank based in Rochester New York. He leads their information security and compliance functions. His responsibility includes data security operations, vulnerability management, fraud detection and regulatory compliance across heterogeneous operational environments. He has more than 20 years experience in information systems solution delivery, information security and data visualization.

October 19, 2023

Agenda

All times Eastern Time

9:30 AM-10:15 AM

Registration


10:15 AM-11:15 AM

Morning Networking


11:00 AM-11:15 AM

Opening Remarks


11:10 AM-11:55 AM
Vision Keynote Panel

Bridging the Gap Between IT and the Business

Bridging the gap between business and technology is not easy and requires discipline and balance between technology, people, and the business. For so many organizations today, technology is the business. Technology needs to be understood as a critical enabler in every part of the organization from the front line to the back office. It creates new value by crunching data to deliver new insights, it spurs innovation, and it disrupts traditional business models.

For business and technology leaders alike, new actions and behavioral changes can help their organizations make this shift. CIOs must take responsibility for problems, they should convey that when technology fails, many people typically share responsibility.


11:55 AM-12:00 PM

Cyversity Mentorship


12:15 PM-1:15 PM

Lunch & Networking


1:15 PM-1:30 PM
Disruptor

Detecting Imposters and Rogue Insiders in SaaS Applications

The combination of rogue insiders and external attackers makes SaaS application detection a massive pain point for enterprises, particularly within core business applications. External attackers leverage stolen credentials to impersonate an insider and connect to applications, while at the same time insiders are not sufficiently monitored. Such examples could include a fraudster’s takeover via social engineering, or incorrect implementation by an employee, or a doctor accessing celebrity patient medical data, or a salesperson downloading a report of all customers before switching to work for a competitor. Even after the enterprise receives a complaint or is otherwise suspicious, detection of these breaches usually consists of manual sifting through tons of log data from multiple sources. In this session we will explore the growing challenge of SaaS application detection, explain why current detection solutions are usually ineffective, and share solutions using real customer examples.

In partnership with:

1:25 PM-2:10 PM
Panel

Supply Chain

Supply chain attacks pose a significant risk to organizations that rely on third-party vendors or
suppliers. These attacks can lead to data breaches, theft of intellectual property, and disruptions
to the supply chain. To address this threat, companies are implementing new supply chain-
specific security tools and processes. For example, they are performing risk assessments,
implementing controls to mitigate vulnerabilities, and requiring vendors and suppliers to comply
with specific security standards. Additionally, some companies are exploring the use of
blockchain technology to track goods and prevent fraud.
Overall, securing the supply chain requires a coordinated effort from all stakeholders. By
implementing best practices and innovative solutions, companies can better protect their data
and systems from cyber threats.
In partnership with:

2:15 PM-2:30 PM
Disruptor

Leveraging Artificial Intelligence for SaaS Discovery

In today's interconnected business world, companies rely on SaaS applications as the operating system of business, which can pose significant cybersecurity risks. This makes it critical for companies to have effective security measures in place to properly secure their entire SaaS environment. Failure to do so can result in data breaches, financial losses, and reputational damage. To mitigate this risk, companies must ensure they are monitoring not only the SaaS applications that are managed and known to the IT team, but their entire SaaS environment. Application discovery provides a comprehensive view into the entire SaaS ecosystem, including what managed applications have access to data, connected third-party apps, and even shadow apps, as well as who has enabled them, and the level of access they’ve been granted. Using a combination of graph algorithms, anomaly detection, NLP, and GenAI tools, solutions leveraging AI can provide a complete picture of interactions and activities across users. This insight can be used to pinpoint common causes of a breach such as misconfigurations, overly permissioned users, and compromised accounts. In this session, we’ll explore the importance of investing in SaaS discovery, how AI can add the context needed to protect against common causes of breaches, and how organizations can secure their SaaS from the most common risks that can lead to a breach in 2023 and beyond.

In partnership with:

2:30 PM-2:50 PM

Networking Break


2:50 PM-3:35 PM
Panel

The Promising Future of Artificial Intelligence (AI): Opportunities and Challenges Ahead

The potential of Artificial Intelligence (AI) is vast, as it is now being utilized across all industries. With the combination of machine learning, AI has made significant improvements in the field of cybersecurity. Automated security systems, natural language processing, face detection, and automatic threat detection are some examples of how AI is revolutionizing cybersecurity. However, AI is also being used to create intelligent malware and attacks, which can bypass the most up-to-date security protocols, making it a double-edged sword. On the positive side, AI-enabled threat detection systems have the ability to predict new attacks and immediately notify administrators in case of a data breach.


3:35 PM-3:45 PM

Closing Remarks & Raffle Giveaway


3:45 PM-4:45 PM

Cocktail Hour


In Partnership With