SecureIT Agenda | Protecting the Enterprise: Threats, Risk and AI

All times listed on the agenda are Eastern Standard Time.

Thursday, July 11

10:30 - 10:40 am
Welcome to SecureIT

Setting the stage for the program, we unpack the theme of Protecting the Enterprise: Threats, Risk and AI.

Session in development

Moderator
Beth Kormanik Event Content Director Foundry, an IDG Inc. Company
10:40 - 11:10 am
Fancy Bear Goes Phishing: What the History of Hacking teaches us about the Future of Cybersecurity

Security professionals are constantly focused on anticipating and mitigating future threats to protect their enterprises. Today, one of the foremost concerns is the potential threats posed by artificial intelligence. However, to effectively understand and prepare for these future challenges, it is essential to first understand the past. Drawing on the insights from his new book, “Fancy Bear Goes Phishing,” Shapiro will show that by examining the rich history of hacking and the evolution of cyber threats, we can uncover invaluable lessons for the challenges ahead. The history of cyberattacks provides a powerful lens through which to predict and prepare for the sophisticated tactics that network defenders will confront.

Speaker
Scott J. Shapiro Author and Founding Director of the Yale CyberSecurity Lab
11:10 - 11:30 am
Guided Networking

Build professional connections during this lightly structured networking time.

11:30 - 11:55 am
Empowering Cyber Culture: Winning Strategies and Talent Development in Today’s Threat Landscape

In an era where digital innovation intersects with escalating cyber threats, the role of the Chief Information Security Officer transcends traditional boundaries. It has evolved into a pivotal driver of organizational resilience and competitive advantage. This panel will delve into the core strategies and practices necessary for cultivating a cyber-conscious culture that fosters innovation rather than stifles it. From positioning security as a business enabler to navigating the relentless pace of cyber threats without succumbing to burnout, seasoned CISOs will share insights and best practices for staying ahead. We will also explore methods for nurturing a pipeline of future-ready cyber leaders, addressing the critical gap at a time when the demands of the job are only growing.

Speaker
Nada Noaman Chief Information Security Officer and Senior Vice President The Estée Lauder Companies
Speaker
Liz Rodgers Chief Information Security Officer RAND
Moderator
Dan Roberts Host, Tech Whisperers Podcast; CEO, Ouellette & Associates
11:55 am - 12:15 pm
Keynote

Session in development

12:15 - 12:25 pm
Fireside Chat

Session in Development

12:25 - 12:55 pm
Hot Topic Discussion Groups

Join a discussion topic that best meets your needs. Facilitated by our partner subject matter experts, take a deep-dive into ideas, common questions, and proven solutions in an interactive, peer-sharing environment.

12:55 - 1:55 pm
Lunch and Exhibits

Pull up a chair and enjoy lunch with your new contacts! Plus meet our sponsors and learn how their solutions can help you overcome your latest challenges.

1:55 - 2:20 pm
Keynote

Session in development

2:20 - 2:40 pm
Keynote

Session in development

2:40 - 3:10 pm
Hot Topic Discussion Groups

Join a discussion topic that best meets your needs. Facilitated by our partner subject matter experts, take a deep-dive into ideas, common questions, and proven solutions in an interactive, peer-sharing environment.

3:10 - 3:30 pm
Networking Break

Enjoy some snacks in our exhibit area. Visit our sponsors to learn how their solutions can help you overcome your latest challenges.

3:30 - 3:55 pm
Keynote

Session in development

Speaker
Jon Baker Director, Center for Threat-Informed Defense MITRE Engenuity
3:55 - 4:10 pm
Fireside Chat

Session in Development

4:10 - 4:35 pm
Beware the Shiny Object: GenAI and Trust

Business can’t afford to ignore the trust implications associated with generative artificial intelligence technologies. Join us to explore issues related to the generation of realistic and potentially sensitive content, addressing concerns such as data privacy, misuse of generated content, and the need for appropriate regulations to govern the ethical deployment of generative AI. You’ll leave knowing potential solutions and best practices for mitigating privacy risks while fostering responsible development and use of generative AI technologies.

Speaker
Ryan O’Leary Research Director, Privacy and Legal Technology IDC
4:35 - 5:15 pm
Networking Reception

Wrap up the day with refreshments while making some final connections to complete your event experience.