The 14th Chief Information Security Officer Exchange

March 22 - 24, 2020 | Omni Los Angeles, Los Angeles, CA

Day 3: Tuesday, March 24th

7:30 am - 8:00 am Networking Breakfast

8:00 am - 8:05 am Chairperson's Recap of Day Two

8:05 am - 8:35 am An Integrated Approach to Close Reporting Gaps with Top Executives

Understanding your organization’s risk profile helps you to see where you may be exposed to potential risks and threats. While this may sound ominous, awareness of your vulnerable areas helps you to decrease liability and keep your organization healthy. Developing an effective holistic cyber risk program proceeds from a top-management overview of the enterprise and its multilayered risk landscape. As top executives attest, these three specific gaps are urgently needed to support fast, fact-based cyber risk management; structured reporting, clarity, and real-time data.

In this session, you will learn:
•Discuss holistic cybersecurity approach address these failings and their implications for governance, organizational structures, and processes
•Importance of reducing technical jargon and providing clear implications of risk levels for business processes
•Consistent and accurate definition of risk appetite for the organization as a whole, prioritized and revised as appropriate

8:35 am - 9:15 am Evolution of Your Kill Switch in a Synchronized Network Ecosystem

A theoretical contingency plan has no value. No plan is better than a bad one. IT-crime is at its height, and a lot of companies are increasing their cybersecurity budget to get ready for the worst-case scenario. Everyone gets hacked. One hundred percent security doesn't exist, and many companies still act as if complete security were standard, and not just a best-case scenario. This perception makes the company extra vulnerable and creates panic when an attack occurs or finally discovered.

In this session, attendees will learn:
•Focus on resilience and the ability to swiftly counteract a cyber-attack internally and externally to customers and other stakeholders
•How a Kill Switch protects critical infrastructures and buys you time to assess accurately 
•Importance for IoT devices, apps, and operating systems to be included in the plan to manage back-office essential functions

9:15 am - 9:30 am Thoughtexchange Market Questions

9:30 am - 10:00 am Business Meetings

10:00 am - 10:30 am Business Meetings

10:30 am - 11:00 am Business Meetings

11:00 am - 11:15 am Networking Break

11:15 am - 11:45 am Cybersecurity is at the Heart of National Security

In the three years since the last election, cybersecurity threats have only become a larger issue. Data breaches continue to impact private companies and all levels of government. Ransomware attacks are crippling multiple cities and companies with major financial and operational impacts. In addition, critical infrastructure networks that support oil, gas, and electric utilities, are under attack. Some estimates say that data breaches are on track to cost companies $2.1 trillion by the end of 2019. For the next administration, cybersecurity is certain to become an even more urgent, complex national imperative. It may become the defining national imperative of the next administration.

In this session, attendees will learn:
•Cybersecurity polices, priorities, and investment strategies make the most sense for the whole government
•Explore the need to establish a cabinet-level position for cybersecurity
•Hear how we could improve intelligence-sharing about cybersecurity threats between the public and private sectors? 
•Delve into spending federal money to assist states in modernizing their systems, especially for critical services, to ensure their resiliency be a priority

11:45 am - 12:15 pm Chairperson's Closing Remarks