May 23, 2023

North America West Summit

9:00 AM CT - 5:00 PM CT

Event Overview

ISMG Summits feature carefully curated agendas delivering a Keynote Address from an Industry Luminary, Case-Based Learning, Networking and more. The Summits are geo-targeted, industry-specific, and topic-driven events designed for security leaders.
 
ISMG’s agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.

Venue

Meydenbauer Centre

11100 NE 6th St, Bellevue, WA 98004, USA

Highlight Topics

  • Enhancing Your Security Posture
  • Third Party Risk Management
  • Cyber Governance
  • 5G Network Security and Business Opportunities
  • Zero Trust

Gary Phipps

Vice President Strategy & Business Transformation, GRCP CTPRP, CyberGRX

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Matanda Doss

Executive Director, Cybersecurity and Technology Controls, Commercial Bank JPMorgan Chase & Co.

Greg Thompson

VP, CISO, ManuLife

Aaron Bostick

CISO, ThriveDX

Eric Sanchez

CISO, Kyowa Kirin Pharmaceutical

Colin Barry

Director, Cyber Threat Intelligence Expedia Group

Michael Bray

CISO, The Vancouver Clinic

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

Agenda

You can now view or download a PDF version of the attendee guide.

Registration & Breakfast

Ralph Johnson

State CISO, Washington Technology Solutions (WaTech)

Visionary Leadership: Insights from State CISO Ralph Johnson

From his early days in technology management to his current role as the State CISO of Washington state’s Washington Technology Solutions, Ralph has encountered a multitude of challenges and learned valuable lessons along the way.

 

Through his insightful anecdotes and experiences, Ralph will provide a fresh perspective on how to tackle security on a state-wide scale, navigate the transition from technology management to leadership, and embrace the evolving landscape of cybersecurity. He will share specific examples and actionable takeaways that you can apply to your own security practices, making this session a must-attend for anyone in the cybersecurity field.

 

Don’t miss this opportunity to learn from one of the most respected and accomplished CISOs in the industry. Join us for an inspiring and informative session that will leave you with a deeper understanding of the transformation of cybersecurity and how you can succeed in this ever-changing landscape.

In this session, he will discuss

  • How he tackled security on a state-wide scale,
  • Navigated the transition from technology management to leadership, and the
  • Lessons he learned over his 18-year career as a CISO

Eric Anderson

Director of Enterprise Security, Adobe

Trust No One: Building a Seamless Path to Zero-Trust Networking

We also need to ensure we are doing our best to effectively reduce risk at every possible touchpoint in our user and device ecosystem. In this fireside chat, Adobe’s Director of Enterprise Security Eric Anderson will discuss the benefits of adopting a zero-trust approach to network security as well as share his perspectives on its evolution as we continuously adapt our strategies to match the changing threat landscape.

Jeannie Warner

Director of Product Marketing, Exabeam

How to Build an Insider Threat Program

Looking for specific needles like insider threats in this complex haystack has special requirements that encompass both searching historic data and seeing evolving credential behavior changes as they happen.

Whether from downsizing or expanding the business, employees, vendors, contractors, and more are moving in and out of your environment. And often, it is during turbulent times that insider threats go unobserved as everything  changes so quickly. Insider threat initiatives require a new, more focused approach.

This presentation will explore:

  • The common scenarios that indicate you need an insider threat team, how to build a mission statement, and tools
  • Four attributes of a successful insider threat program
  • How behavioral analytics baseline “normal” behavior of users and devices – showing risk faster 
  • An automated investigation experience that replaces manual routines and effectively guides new insider threat teams

Networking & Exhibition Break

Stephen Dougherty

Special Agent, U.S Secret Service

Yoshiko Marinko

Special Agent, U.S. Secret Service

Solution Room Secret Service Panel- Latest Trends in BEC

Solutions Showcase

11:00 Am –11:20 AM PT

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Culture Change: How to Instill a Mindset of Responsible Defense

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

11:00 Am – 11:20 AM PT

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Culture Change: How to Instill a Mindset of Responsible Defense

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

11:00 AM – 11:20 pM PT

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Culture Change: How to Instill a Mindset of Responsible Defense

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

Collin Barry

Director, Cyber Threat Intelligence, Expedia Group

Aaron Bostick

CISO, ThriveDX

Eric Sanchez

CISO, Kyowa Kirin Pharmaceutical

Jerry Cochran

Deputy CIO – Cybersecurity & DigitalOps, Pacific Northwest National Laboratory

Scott Roberts

CISO, Coinbase Cloud

Joshua Hillsberry

CISO, Washington Department of Revenue

Varsha Agarwal

Head of Information Security, Prosper Marketplace

Sean Murphy

CISO and SVP, BECU

Michael Bray

CISO, The Vancouver Clinic

Anatomy of a Business Email Compromise Attack and their Mutations (And why they continue to be successful today)

What is a Solution Room?

The Solution Room is a highly engaging and interactive conference session that aims to provide cybersecurity leaders with peer-to-peer support and subject matter expertise to tackle their most pressing challenges. Through a combination of small group discussions, expert moderators, and support from U.S. Secret Service Agents, attendees will work through the lifecycle of a Business Email Compromise (BEC) attack.

What does participation in the Solution Room look like?

To enhance your learning experience, we invite you to join one of the ten tables for this collaborative session. Each table will be moderated by a knowledgeable CyberEdBoard member, and a U.S. Secret Service Agent will be present to provide valuable insights into law enforcement partnerships during a compromise. 

To kick off the session, Tom Field, Senior Vice President of Editorial at ISMG, will set the stage with a fictitious Business Email Compromise (BEC) scenario. Each group will receive identical sets of questions and work collaboratively to find the answers. As the exercise progresses, new information will be revealed, adding unexpected twists and turns to the scenario. Through this dynamic approach, participants will be challenged to apply critical thinking skills and work as a cohesive team to effectively respond to the evolving situation. Our goal is to provide a stimulating and engaging learning experience that equips you with the skills and knowledge needed to handle real-world BEC scenarios.

Partnering with the US Secret Service 

The U.S. Secret Service brings extensive experience and expertise in investigating and preventing BEC attacks, and participants will have the unique opportunity to learn from the experts during the workshop. They will gain a deeper understanding of the anatomy of a BEC attack, including its mutations, and how to identify, disrupt, and prosecute cybercriminals involved in such schemes.

The Solution Room offers a valuable learning experience for cybersecurity leaders seeking to enhance their knowledge and skills in combating BEC attacks.

Lunch & Exhibition

Sean Murphy

CISO and SVP, BECU

Michael Bray

CISO, The Vancouver Clinic

Joshua Hillsbery

CISO, Washington Department of Revenue

Scott Roberts

CISO, Coinbase Cloud

Innovation and Collaboration: Unlocking the Potential of the Modern CISO

With potentially slower business activity, CISOs have the chance to improve existing security programs and sharpen their communications to effectively translate security-speak to management decision makers.

In this session, our expert group of CISOs will share their perspectives on what lies ahead and how to communicate budget needs and the evolving threat environment to management. They will assess the opportunities in a “down cycle” to improve existing programs, discuss effective communication to decision makers in management, and decipher the biggest challenges for building and maintaining a successful security team.

Attendees will gain insights into the latest best practices for cybersecurity, learn strategies for communicating security needs to management, and hear from experienced CISOs on how to build and maintain successful security teams. This session is a must-attend for any CISO, security professional, or business leader looking to strengthen their organization’s defenses in the face of evolving cyber threats.

Peter Klimek

Director of Technology, Office of the CTO, Imperva

Prepare and Protect: The Evolving API Threat Landscape

Not only do they offer a pathway for hackers to access vast amounts of sensitive data, but security teams often struggle to keep up with the pace of API development in their organization. This session will offer the three most common risks businesses face when deploying APIs and the strategies security teams can use to stay ahead.

 

  • Discover the most common API attacks Imperva sees across its cloud security network and how to defend against them
  • Learn how to uncover deprecated APIs and other common API implementation pitfalls
  • Hear ways to protect your mobile APIs from fraud and abuse

Mark Bowling

Chief Risk and Information Security Officer, ExtraHop

Detecting the Bear: Why Detection Matters

Join ExtraHop Chief Risk, Security, and Information Security Officer Mark Bowling to discuss the importance of detection and perception in your security environment, including an interactive fireside chat with ISMG’s Tom Field.

Networking & Exhibition Break

Aravind Swaminathan

Global Co-Chair Cybersecurity and Data Privacy, Orrick, Herrington & Sutcliffe LLP

Varsha Agarwal

Head of Information Security, Prosper Marketplace

Personal Liability in Cyber- What CISOs need to Know to Mitigate Risk

How confident are you in determining the right roles, processes, policies, standards, and metrics to guarantee the efficient and effective use of information for your organization to reach its goals?

Join this panel to learn how to build a comprehensive data governance valuation program – regardless of whether your organization has a data governance officer or not:

  • Misconceptions about data governance;
  • Best practices to build a data governance valuation program;
  • Why communication is key to ensure efficient and effective use of information.

Don’t miss your chance to attend this dynamic impactful event

#ISMGSummit

@ISMG_News

Our Sponsors

The Summit Experience

CPE Credits

Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.

Future Events

January 16, 2025

AI-Driven Insights for Asset Visibility and Streamlined Patch Management

January 22, 2025

Mitigate Risks Through Asset Discovery and Compliance Monitoring

January 28, 2025

Are You Ready for DORA? Strengthening Resilience and Achieving Compliance by 2025

January 30, 2025

The Anatomy of Cyber Resilience: What It Is, What It Isn't, Why It Matters, and How to Achieve It

February 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI

Future Events

January 16, 2025

AI-Driven Insights for Asset Visibility and Streamlined Patch Management

January 22, 2025

Mitigate Risks Through Asset Discovery and Compliance Monitoring

January 28, 2025

Are You Ready for DORA? Strengthening Resilience and Achieving Compliance by 2025