August 21 - 23, 2019
Marriott Georgetown, Washington, DC

Day Three: Friday, August 23, 2019

7:50 am - 8:25 am Networking Breakfast

8:25 am - 8:30 am Chairperson's Opening Remarks

8:30 am - 8:40 am Thoughtexchange Market Question: What are some things organizations must do more of to transform and remain competitive?


When it comes to the lack of women in technology fields, the focus often turns to what about technology fields keeps women from participating and what can be done to encourage women to join the cyber security and other information technology professions. With the ongoing digital transformation within society, the number of unfilled cybersecurity positions is only going to increase.  What can be done to encourage, attract, mentor and train, as well advance future leaders in the technology landscape?

In this session: 
  • Addressing the gender gap in C-suite technology roles
  • A look at data surrounding women’s representation in IT
  • Effective ways to support workforce diversity and inclusion
Michele Thomas, Chief Information Security Officer at NHTSA

Michele Thomas

Chief Information Security Officer
NHTSA

Jothi Dugar, Chief Information Security Officer at NIH Clinical Center

Jothi Dugar

Chief Information Security Officer
NIH Clinical Center

Kirsten Davies, Chief Information Security Officer at Estée Lauder Companies

Kirsten Davies

Chief Information Security Officer
Estée Lauder Companies

Stephanie Derdouri, Director of Risk, Governance and Awareness at Fannie Mae

Stephanie Derdouri

Director of Risk, Governance and Awareness
Fannie Mae

Spending on cybersecurity technologies involves engaging the board of directors and the rest of the C-Suite in settings where there are competing organizational priorities.   

In this session, explore:
  • How to present  the right metrics in a compelling manner to increase budgets and lessen the potential impact of a breach
  • Shaping  the discussion and budget to build a program with stakeholder priorities
  • Focusing on protecting people and processes while mitigating risk
  • Translating how a cyber attack could impact healthcare setting 
  • Exploring risk tolerance and increasing funding to lessen impact
Holly Greaves, Chief Financial Officer at U.S. Environmental Protection Agency

Holly Greaves

Chief Financial Officer
U.S. Environmental Protection Agency

Chris Wolski, Chief Information Security Officer at Herman Miller, Inc.

Chris Wolski

Chief Information Security Officer
Herman Miller, Inc.

9:50 am - 10:20 am Business Meetings

10:20 am - 10:50 am Business Meetings

10:50 am - 11:20 am Business Meetings

11:20 am - 11:50 am The Holistic Integrative Medicine (H.I.M) Approach to Cyber

Change is inevitable, and one is desperately needed in the complex world of Cyber and the CISO’s role in an organization. By exploring a “whole-istic” Integrative Medicine approach to Cyber, organizations can benefit from looking at Cyber with a new change in perspective vs the same old techniques. A Whole360 approach to Cyber entails diving into the “mind-body-energy” connections as they pertain to the business and Cyber worlds.  The Science of Diversity, Implicit Bias, Women in Cyber, and the Psychology behind the Security all fit together as pieces of the puzzle that needs to be brought to light and explored.
 In this session examine:
  • Exploring the Science of Diversity & Implicit Bias in Cyber
  • The art of women in the Cyber Workforce
Exploring how Pieces of the puzzle all fit together (Diversity, Women, Psychology, Cybersecurity, Healthcare)
Jothi Dugar, Chief Information Security Officer at NIH Clinical Center

Jothi Dugar

Chief Information Security Officer
NIH Clinical Center

11:50 am - 12:20 pm Evaluation Criteria for Cloud Access Security Brokers (CASBs)

Cloud computing is ubiquitous and forms the foundation for digital transformation to facilitate business change. Cloud technologies introduce dissolving perimeters, service delivery via software, and a sophisticated threat landscape. This session will discuss the selection criteria for one of the many security controls - Cloud Access Security Broker (CASB). Hear about drivers, selection criteria, and how to effectively evaluate CASBs.

Les Correia, Director Global Risk & Security at Estée Lauder Companies

Les Correia

Director Global Risk & Security
Estée Lauder Companies

12:20 pm - 12:35 pm Chairperson’s Closing Remarks