Day 3: Tuesday, March 26th
8:00 am - 8:45 am Networking Breakfast
8:45 am - 8:50 am Chairperson's Opening Remarks
8:50 am - 9:30 am Diversity in IT: Addressing Culture and Skills Shortfalls
Cyber criminals make no distinction related to gender, race, religion, age or sexual orientation as they penetrate networks and steal and destroy data. A truly effective information security strategy includes a diverse team to best understand the variety of potential attacks and threat landscapes. When it comes to the lack of diverse teams in technology fields, the focus often turns to what about the tech space keeps people from participating and what can be done to encourage more people to join the cybersecurity and other information technology professions. With the ongoing digital transformation within society, the number of unfilled cybersecurity positions is only going to increase. In light of the global shortfalls in qualified workers, different approaches have become urgent and necessary. Diversity of thought, perspectives and ideas have increasingly become key ingredients to combating an increasingly complex cyber threat landscape.
What can be done to encourage, attract, mentor and train, as well advance future leaders in the technology landscape?
In this session examine:
•Addressing the gender gap in C-suite technology roles
•Widening talent searches outside of IT
•Effective ways to support workforce diversity and inclusion
Gary EppingerGlobal VP, CISO and Privacy Officer
9:30 am - 10:00 am Deep Dive Session
Earlier in the exchange, you had the opportunity to choose a critical topic areas as identified by the Thoughtexchange tool. Smaller groups were formed to develop an action plan for improvement. During this session, there will be the opportunity to deep dive in small groups and create specific action plans and next steps.
10:00 am - 10:05 am Transition
10:05 am - 10:35 am Business Meetings
10:35 am - 11:05 am Business Meetings
11:05 am - 11:10 am Transition
11:10 am - 11:55 am Deep Dive into Navigating Budgets and Reducing Risk
Deep Dive into Navigating Budgets and Reducing Risk
Regulations and recent cyber hacks are part of the landscape as requirements continue to grow for more security controls. In this session, explore how to present the right data in a compelling manner to increase budgets and lessen the potential impact on the business of a breach.
•Shaping the discussion and budget to build a program with business-prioritized capabilities
•Focusing on protecting the enterprise, processes and mitigating risk
•Translating how a cyber attack could impact business
•Exploring risk tolerance and increasing funding to lessen impact
Nemi GeorgeSenior Director. Information Security
Pacific Dental Services