The Future of Cybersecurity

CISO Think Tank

June 2, 2022 - Chicago, IL
June 2, 2022


All times Central Time
12:30 PM-1:00 PM
Welcome & Registration

1:00 PM-1:35 PM
Keynote Panel
Data Drives Transformation

Data is a key enabler for all of the CIO’s plans to transform and should be at the heart of any organizational strategy. All of the digitization in our world today means we have enormous amounts of data available, and data has now become the number one business asset for every organization. The utilization of data has grown exponentially giving organizations the ability to better understand customers, research key trends, and much more. Enterprises are heading towards an environment of uncertainty and ambiguity that requires continuous flexibility, innovation and investment or reinvestment in data and analytics strategies.

1:40 PM-2:35 PM
Zero Trust Network

A zero trust approach to security has been steadily gaining steam for the last several years. The importance of this approach reached a new level with the May 2021 White House executive order requiring federal agencies to shift to this architecture by fall 2024.
Ransomware continues to grow and clearly as remote work became the new norm, and e-commerce increased. Leaders need to establish a mature level of cyber resilience to better handle ransomware and other potential data breaches. Luckily, zero trust can play a critical part in that strategy as more and more businesses are realizing that to build customer trust they must establish zero tolerance for trust in their security strategy. Will Zero Tolerance for Trust redefine the state of security as government and private industry scrutinize their trusted relationships more, and re-evaluate the ‘who, what, why’ in 2022 more than any other year?

2:35 PM-2:50 PM
Networking Break

2:50 PM-3:35 PM
Fireside Chat
What’s AI Doing for You?

The terms "Artificial Intelligence" and "Advanced Machine Learning" are often thought of interchangeably. While there is a relationship between AI and AML, to say they are the same thing is an oversimplification and misclassification. Rather, one begets the other with AI being the basic principle upon which AML is developed. As AI begins to mature and migrate away from purely advanced mathematical operations into decision making paradigms, AML steps forward as the predictive ability of machines to process vast quantities of data. As data and analytics becomes foundational to the way every business operates, AI and AML will become foundational capabilities.

3:40 PM-3:55 PM
Is It Time to Rethink our DLP strategies?

Data Loss Prevention (DLP) has always been a concern for businesses. DLP solutions are growing in popularity as enterprises look for ways to reduce the risk of sensitive data leaking outside the company. In earlier days, the focus was on the protection of physical documents. This could be accomplished by penetrating physical perimeters or theft of documents from couriers. While these tactics may continue today, the growth of the Internet has increased the magnitude and likelihood of data theft. With cloud apps widely distributed and employees working from everywhere, data protection is more difficult than ever giving DLP a reputation for being an enormous, multi-year undertaking for security departments, however many CISOs believe that it shouldn’t. A DLP program should be a manageable, progressive process, if organizations focus on a progressive approach. Understanding the differences between content awareness and contextual analysis is essential to comprehend any DLP solution in its entirety. So why are many organizations still reluctant to adopt DLP programs?

In partnership with

3:55 PM-4:10 PM
Networking Break

4:10 PM-4:25 PM
The Great Talent Void

While new technology and solutions can help CIOs make better decisions for an organization, nothing will take the place of a highly talented workforce. CIOs need to be great recruiters of talent but even more importantly, be able to grow the skills and capabilities of their existing team. Competitive compensation is important in talent retention but so is a work environment where individual growth and development are top of mind.

In partnership with

4:30 PM-5:25 PM
Guarding the Doors: Navigating 3rd Party Risk

As organizations expand their third-party ecosystem, many are challenged with executing core activities that are critical to operations, risk profiles, and compliance posture without compromising the quality of data collection, evaluation, and mitigation measures increasingly outsourcing business activities to 3rd-party vendors. It is critical for an organization to be vigilant when selecting the right 3rd-party vendor with the appropriate security posture, as many vendors are hosting, processing and transmitting sensitive regulatory information with unrestrained access to our IT assets. At the highest level, third-party incidents can result in reputational damage, non-compliance, or even criminal activity, which can negatively impact earnings and shareholder value. To address this challenge, many organizations are investing in technology to support vendor risk management. Technology isn’t the entire answer to managing third-party risk, however the right technology or collection of technologies, coupled with optimal processes, can enable organizations to bridge the gap.

5:25 PM-5:30 PM
Closing Remarks

5:30 PM-6:30 PM
Cocktail Hour

In Partnership With