CSO Conference is where you see what success looks like and learn from the best. Come for an all-new agenda that speaks to the top-of-mind security challenges, technical innovations, and leadership strategies in building high-performing teams.
All times listed on the agenda are Mountain Time.
For nearly a decade, ZeroTrust has been bandied about as a marketing term, used and abused by many. As we enter an era of AI-assisted offense, we can no longer default to open and connected standards and IT stacks. Instead, we must embrace ZeroTrust and only enable what the business needs, when it needs it, in architecting IT services. It’s time for the plumbing to commoditize, for the attack surface to shrink and for fine grained authorization to scale, allowing businesses to truly leverage the power of the connected world, becoming the order of the day. This is what will ultimately make the greatest strides in cyber defense, future readiness and resilience in a world of accelerating disruption in AI, QC, Robotic, Nano, Synthetic Manufacturing, Synthetic Biology and more.
In this session, we will cover:
• Basic principles of ZeroTrust
• Current and expected technology disruption
• Advanced topics in a structured, open discussion format and an AMA session
Bring your ideas, your critical thinking, your tough questions and more. Chatham House Rules apply. *Pre-registration required.
As email attacks grow more sophisticated, organizations increasingly rely on a complex array of technologies to minimize business disruption. While AI has significantly enhanced our ability to manage the scale and velocity of these threats, it is not without its limitations. But what happens when our cybersecurity solutions fall short? Is the failure due to technological flaws, inadequate resources, or simply a mismatch between the technology and the challenge at hand?
Many organizations, overwhelmed by the multitude of cybersecurity tools they manage, often neglect the crucial task of auditing these solutions. This roundtable discussion will explore the pain points around email security, examine the landscape of AI in email security, the vital role that human expertise still plays, and how we can effectively balance the two to optimize our defense strategies. *Pre-registration required.
Join a discussion topic that best meets your needs. Facilitated by our partner subject matter experts, take a deep-dive into ideas, common questions, and proven solutions in an interactive, peer-sharing environment.
GRC Engineering with Adobe
The Art & Science of Using AI to Make Data Security Easy with Cyera
Securing Data in Motion: Mobile Security Challenges for Remote Workers in the Cloud with Lookout
Join us for an exciting evening at the Welcome Reception, sponsored by Zscaler, where the excitement of Monday Night Football meets networking and camaraderie! As the Arizona Cardinals take on the Los Angeles Chargers at 6:00 PM, enjoy the game on a large LED screen while savoring delicious food and refreshing beverages. Connect with fellow industry leaders in a lively atmosphere as we kick off an exciting week.
Join us for a networking breakfast at the CSO Conference. Connect with industry leaders, share insights, and fuel up for a day of innovation and success. Start your morning right with great food and even greater connections.
While deployed in Iraq, a blast from a roadside bomb caused Melissa Stockwell to lose her left leg above the knee. She was awarded the Bronze Star Medal and the Purple Heart, but she also found a new mission as a Paralympian. Melissa – a triathlon competitor in the 2024 Paralympic Games in Paris – now shares her belief in the power of choice. No person or organization can avoid obstacles in life, whether they come in the form of bombs or cyberattacks. But we can control our response. Join us for an inspirational and motivational talk on chasing remarkable goals.
As cyber threats become more sophisticated and pervasive, enterprises need to adopt an agile approach to networks and security that promotes innovation and mitigates risk. AI/ML and zero trust are the key enablers of this transformation, offering visibility, control, and automation across users, workloads, IoT/OT devices, and business partners.
In this session you will learn:
– How AI will be used to fight AI and how generative AI will contribute to increased numbers of ransomware attacks
– How the growth of zero trust segmentation will happen in parallel with the rise of firewall-free enterprises, and Zero Trust SD-WAN will begin to replace traditional SD-WAN
– How AI/ML add defensive and analytics capabilities that drive IT and business success
Grab a coffee or iced beverage, enjoy the fresh air, and connect with award-winning CISOs and sponsoring partners. You’ll also have an opportunity to meet and take a photo with Paralympian Melissa Stockwell.
Learn about this year’s award-winning projects at a tour of digital poster presentations. Ask questions and dig into the technical and management details of these innovative projects, as well as network with peers who are interested in similar initiatives. This self-directed experience means you can focus your time on projects that are most relevant for you.
Learn about this year’s award-winning projects at a tour of digital poster presentations. Ask questions and dig into the technical and management details of these innovative projects, as well as network with peers who are interested in similar initiatives. This self-directed experience means you can focus your time on projects that are most relevant for you.
Join us for an engaging lunch where you can connect with newfound contacts! Take a seat and savor your meal while networking with peers. Don’t miss the opportunity to meet our sponsors and discover how their innovative solutions can benefit you.
CSO Online serves enterprise security decision-makers and users with the critical information they need to stay ahead of evolving threats and defend against criminal cyberattacks. With incisive content that addresses all security disciplines from risk management to network defense to fraud and data loss prevention, CSO offers depth and insight to support key decisions and investments for IT security professionals. Regional Executive Editor Andrew Flynn will kick off the afternoon with a quick overview of CSO’s editorial mission.
Governance, Risk, and Compliance (GRC) serves as a critical discipline within organizations, enabling the fulfillment of business expectations and fostering growth, while ensuring compliance with leading industry frameworks and standards. As companies navigate intricate global regulatory landscapes and face growing cybersecurity concerns, the need for a unified and holistic approach to GRC and Security is now more important than ever. By implementing a unified security-first framework, organizations can effectively manage security risks while prioritizing compliance to industry standards at the same time. In response to the evolving landscape of regulatory and security framework requirements, Adobe has created its own open-source Common Controls Framework (CCF) version 5.0 to help streamline and accelerate compliance efforts for organizations across all sizes and sectors. Join this session to learn more about how to build a security-driven compliance program.
In the wake of high-profile and highly damaging ransomware attacks at Change Healthcare and CDK Global, the spotlight is shining on the need for backups and other data protection plans. What does a business continuity plan look like, and what other high-level questions do you need to ask before diving in?
Multifactor authentication is recognized as an important layer of security to ward off credential thefts and malware attacks. Yet not all organizations have adopted it, and not all vendors require it to use their products – to their detriment in recent breaches. This session will dig into the reasons behind MFA reluctance, the difficulties of third-party governance, and the ways that security leaders can bolster their defenses.
Gain insights on the challenges of Application Security and how Generative AI is going to impact software development. The session will share critical findings and recommendations from Veracode’s State of Software Security research, demonstrating how GenAI further amplifies the risks associated with application stacks. The session will cover practical steps on how to adopt GenAI safely and overcome the velocity and adoption challenges it brings to the software development life cycle and overall organizational ecosystem.
Grab a coffee or iced beverage, enjoy the fresh air, and connect with award-winning CISOs and sponsoring partners.
Leveraging AI to transform your data security program so that it enables your business to innovate and grow is today’s reality. Historically though, data security has been the least mature domain in all of security, but due to new innovations now is the time that it can become security’s most mature program. This discussion, led by Jason Clark, Chief Strategy Officer at Cyera, will walk through how and why.
Clearly, GenAI has created a seminal moment in technology markets. But what’s the actual impact of genAI on cybersecurity? Join us to hear the latest IDC research and analysis to inform your security strategy.
Join us for a networking breakfast at the CSO Conference. Connect with industry leaders, share insights, and fuel up for a day of innovation and success. Start your morning right with great food and even greater connections.
Are the techniques of a mentalist all that different from the tricks a threat actor uses to social engineer an attack? No one has better insight into the overlap than Gary S, Chan, a sitting CISO who is also a mentalist. Informative as well as entertaining, Chan will combine game theory, math, and other elements to deliver an important and unforgettable message for security leaders.
Despite the advanced technology deployed to combat business phishing attacks, data indicates that over 90% of successful cyberattacks that harm revenue and reputation begin with a good employee inadvertently falling for a phishing scam. Not all phishing attempts are detected by technology. Dave sheds light on some surprising AI-related facts and focuses on risk mitigation strategies that aim to prevent you and your company from becoming headline news due to a security breach.
Under pressure from the U.S. Cybersecurity and Infrastructure Security Agency, some 65 tech companies have agreed to seven security best practices to put security at the forefront of the software development. Will they make a difference? Join this panel of security leaders who can assess the potential impact of the pledge, holding software providers accountable, and where they still need to improve.
Grab a coffee or iced beverage, enjoy the fresh air, and connect with award-winning CISOs and sponsoring partners. You’ll also have an opportunity to meet and take a photo with CISO & security mentalist Gary S. Chan.
Learn about this year’s award-winning projects at a tour of digital poster presentations. Ask questions and dig into the technical and management details of these innovative projects, as well as network with peers who are interested in similar initiatives. This self-directed experience means you can focus your time on projects that are most relevant for you.
Learn about this year’s award-winning projects at a tour of digital poster presentations. Ask questions and dig into the technical and management details of these innovative projects, as well as network with peers who are interested in similar initiatives. This self-directed experience means you can focus your time on projects that are most relevant for you.
Join us for an engaging lunch where you can connect with newfound contacts! Take a seat and savor your meal while networking with peers. Don’t miss the opportunity to meet our sponsors and discover how their innovative solutions can benefit you.
Get the first look at the findings of Foundry’s 2024 Security Priorities Study, which identifies the security projects organizations are focused on in the coming year. The research looks at the issues that will demand the most time and strategic thinking for IT and security teams.
The CISO’s job revolves around preparing for an event they hope never happens, whether that’s a ransomware attack, legal issues like a class-action suit, or personal liability stemming from a SEC complaint. Actions and practices today – from having a clearly defined role, training your team in how they communicate, and productively managing stress – will help in the face of a crisis. Learn from the hard-earned wisdom and insights of a CISO who still, even now, thinks of the role as a “fantastic job.”
The public now knows more about the frequency and severity of data breaches following implementation cyber disclosure rules from the SEC. One year after their introduction, this panel will assess the state of disclosure. What can CISOs collectively learn about the disclosure? How do we better prepare? And what needs to change to create a better system for all?
Grab a coffee or iced beverage, enjoy the fresh air, and connect with award-winning CISOs and sponsoring partners.
Drop in for unstructured conversation with one of IDC’s top security analysts. This is an opportunity to delve deeper into the themes and ideas from Dickson’s keynote presentation or to get insight on your own challenges – all in a casual environment.
No CISO stays in the chair forever. That makes thinking about succession a crucial task. Join us for an insider’s look at how to think about succession planning, including evaluating potential candidates both within and outside of your organization, the professional skills and experiences they need to have, and how to communicate the plan. This session will be helpful for sitting CISOs as well as those who aspire to the role.
To close our conference, we’ll respond to what’s on your mind. Attendees will choose the focus on this session in a vote on Tuesday, and we will announce the results Wednesday morning. Then this panel of experienced and thoughtful CISOs will share their collective wisdom in a candid conversation. Want to hear more about AI and security? Is it time for a frank discussion about careers and how CISOs can get the respect they deserve? Or perhaps a new industry development will have everyone buzzing. Let’s go there.
Raise a glass to toast the 2024 honorees.
Celebrate security excellence at this elegant dinner and award ceremony. The 2024 CSO Awards presentation will honor the winning organizations for their use of innovative security to deliver business value, followed by the induction of our newest members into the CSO Hall of Fame.
Celebrate the newest class of honorees with sweet treats and plenty of photo ops as we close out the CSO Conference.