top of page

DAY 1

MONDAY, JUNE 28TH

11:00AM - 11:45AM EASTERN

 

[INTERACTIVE SESSION] 

Future of the CISO Role

The future of the CISO role is relationship focused and business aligned.  Historically, the role has been setup as either a dead end or a scapegoat.  However, with growing awareness of the concerns around security and privacy as well as the skills gap within the industry, the role will need to evolve.  Providing your organization with strategic advantage that is business aligned is of critical importance.  The most successful CISOs will have identified and mastered a relationship focused mindset as vital to their ability to be an effective leader in the information security space.  While it is possible to maintain the status quo and survive, be encouraged to take advantage of the opportunity to develop in the current environment and solidify your position as a trusted advisor who fully understands the business they are charged with protecting and promoting.  

Rob H Pic.png

Rob Hornbuckle

CISO

Allegiant Air

allegiant.png

11:45AM - 12:00PM EASTERN

 

[INTERACTIVE NETWORKING BREAK] 

Hometown & First Job Skill That You Use Today

Gray Mitchell.jpeg

Gray Mitchell

CISO & VP Of Advisory Services

IDMWORKS

IDMWORKS.png

12:00PM - 12:45PM EASTERN

 

[INTERACTIVE SESSION] 

Levers of Human Deception: The Science and Methodology Behind Social Engineering 

No matter how much security technology we purchase, we still face a fundamental security problem: people. This discussion will explore the different levers that social engineers and scam artists pull to make us more likely to do their bidding.

Join Perry Carpenter, KnowBe4's Chief Evangelist and Strategy Officer, as he provides fun and engaging examples of mental manipulation in everyday life: from the tactics used by oily car dealers, to sophisticated social engineering and online scams. Additionally, we’ll look at how to ethically use the very same levers when educating our users.

clip_image001.jpg

Perry Carpenter

Chief Evangelist and Strategy Officer

KnowBe4

KnowBe4-Logo-Color-LG-TWOCOLOR copy.jpg

12:45PM - 1:15PM EASTERN

 

[30 MINUTE BREAK] 

1:15PM - 2:00PM EASTERN

 

[INTERACTIVE SESSION] 

Cybersecurity Maturity Model Certification (CMMC): How Security and Maturity Go Hand in Hand

Covered Defense Information (CDI)?

What is it?

What are the various flavors/some examples?
How do we handle it securely?


DFARS 252.204-7012 Compliance
How does it impact you?
What is the process used to comply?


Cybersecurity Maturity Model Certification (CMMC)
How does it differ from DFARS/171 compliance and how is it similar?
How does one achieve a CMMC certification for a particular level?

Garrett Smiley.jpeg

Garrett Smiley

Chief Information Security Officer

Serco

serco.jpg

2:00PM - 2:15PM EASTERN

 

[INTERACTIVE NETWORKING BREAK] 

Favorite Vacation Spot

Ricardo headshot (3).JPG

Ricardo Lafosse

Chief Information Security Officer

The Kraft Heinz Company

kraft Heinz Logo.png

2:15PM - 3:00PM EASTERN

 

[INTERACTIVE SESSION] 

Why You Need Artificial Intelligence for Email Security

Phishing attacks are skyrocketing and bearing the brunt of this is the SOC. Artificial Intelligence is a well-traveled buzzword, and it is indeed crucial that it's used to stop advanced email attacks. However, AI is only as good as its dataset, which is why it's crucial to use AI to identify unseen patterns in the richest data set. By doing so, 50% more attacks can be locked, freeing up time and resources for the SOC, and preventing a business from succumbing to a devastating attack. Learn why some AI is all sizzle, and why some AI, like Avanan's, is the real deal.

GilNewHeadshot-1.png

Gil Friedrich

CEO

Avanan

avanan-logo-dark-teal-HiRes.png

3:00PM - 3:15PM EASTERN

 

[INTERACTIVE NETWORKING BREAK] 

Best Thing I Ever Ate, Food Network Inspired

AHEAD-Logo-WEB.png

3:15PM - 4:00PM EASTERN

 

[INTERACTIVE SESSION] 

The CISO Role in Public Policy

At the end of the day, no matter the security law or regulation, the CISO has to enforce it. With that in mind, CISOs should look for opportunities to get involved in forming and informing those laws and regulations. Join Tim Callahan, Global Chief Security Officer of Aflac in this roundtable discussion about the CISOs role in Public Policy.

Head Shot Tim Callahan - 2021.jpg

Tim Callahan

SVP, Global Chief Information Security Officer

Aflac

4C_pos Aflac Logo.png

DAY 2

TUESDAY, JUNE 29TH

11:00AM - 11:45AM EASTERN

 

[INTERACTIVE SESSION] 

Strengthening Identity as the Digital Perimeter with Zero Trust and Software Defined Perimeter

This session will discuss how Zero Trust and SDP can complement Identity and promote sharing of first principles and best practices. We will touch upon macro factors such as the NIST Zero Trust Framework  and the recent presidential Zero Trust executive order. We will also review how these three core technologies can add business value such as: minimize risk of intellectual property loss, lower the risk of a data breach, strengthen enterprise security, facilitate compliance with privacy regulations, build automated unified on-boarding and off-boarding processes and strengthen privacy.

Arun DeSouza.jpg

Arun DeSouza

Chief Information Security & Privacy Officer

Nexteer Automotive

Nexteer_automotive_logo.png

11:45AM - 12:00PM EASTERN

 

[INTERACTIVE NETWORKING BREAK] 

Two Truths and a Lie

michael elmore.jpeg

Michael Elmore

Chief Information Security Officer

GSK Consumer Healthcare

gsk.jpeg

12:00PM - 12:45PM EASTERN

 

[INTERACTIVE SESSION] 

The Challenges of Data Security in a Modern Multi-Jurisdictional World

Policy, Technology and People Considerations for maintaining your data sovereignty while maintaining compliance.

 

Data privacy legislation began with a single law in the German state of Hessia in the early 1970s.  Fast forward to 2021 and there are now dozens, if not hundreds of unique privacy legislations and it can seem like a new one emerges almost every day as industries,  states and countries release their own.    When you combine this regulatory upheaval with modern IT infrastructure capabilities like virtualization and multi-cloud it can almost seem overwhelming.

 

In this session, we will discuss the regulatory journey – past, present and future.   Learn from each other’s experiences how to identify and manage these challenges around the globe -  what has worked, and what hasn’t.

speaker_pic.png

Chuck White

CTO and Founder

Fornetix

fornetix-black-transparent.png

12:45PM - 1:15PM EASTERN

 

[30 MINUTE BREAK] 

1:15PM - 2:00PM EASTERN

 

[INTERACTIVE SESSION] 

Autonomous Cyber AI: Redefining Enterprise Security

In this new era of cyber-threat, characterized by both slow and stealthy attacks and rapid, automated campaigns, static and siloed security tools are failing. Organizations need to urgently rethink their strategy – to ensure their people and critical data are protected, wherever they are. Powered by Autonomous Cyber AI, today’s self-learning defenses are capable of identifying and neutralizing security incidents in seconds – not hours. 

Marcus Fowler.jpeg

Marcus Fowler

Director of Strategic Threat

Darktrace

Logo, PNG, transparent for light backgro

2:00PM - 2:15PM EASTERN

 

[INTERACTIVE NETWORKING BREAK] 

Sports Talk

Benjamin Corll.jpeg

Benjamin Corll

VP, Cyber Security & Data Protection

Coats

Coats logo.png

2:15PM - 3:00PM EASTERN

 

[INTERACTIVE SESSION] 

Making Lemonade from Lemons: Using the Hard-won Lessons Learned Through the Pandemic to Drive Success

The global pandemic has changed so much, so fast. From the way we work and live, to the approach we take to running our businesses and the threats we face, the combination of digital transformation and the pandemic has put you at the epicenter of a major shift. But the lemons you’ve been given have an opportunity to transform into something amazing. Join this session and hear about some of the key challenges faced by organizations like yours, with expert industry insights and sharing of your peer’s “secret ingredients” for making better lemonade!

Steve Neville.jpeg

Steve Neville

Global Director, Market Strategy

Trend Micro

TM_logo_red_2c_print.jpg

3:00PM - 3:15PM EASTERN

 

[INTERACTIVE NETWORKING BREAK] 

Bucket List Item

profile.jpeg

Christopher Zell

Chief Information Security Officer

The Wendy's Company

WendysCompany.jpg

3:15PM - 4:00PM EASTERN

 

[INTERACTIVE SESSION] 

Strike a Balance of Risk, Cost & Value in OT Cyber Protection

More and more cyber attacks are targeting Operational Technologies’ networks and systems.   Protecting critical infrastructure is more important than ever.   Join this session to engage in lively and interactive discussion about the challenges and successes of implementing a  OT-focused cybersecurity program that meets the risk tolerance of your organization.   Discuss how to strike the right balance between risk, cost and value!

Screen Shot 2021-05-11 at 3.04.45 PM.png

Tammy Klotz

Chief Information Security Officer

Covanta

COVANTA with tagline-HiRes.jpg

DAY 2 | ONCON ICON AWARDS

TUESDAY, JUNE 29TH AT 8PM - 9PM EASTERN

AWARDS CEREMONY AGENDA:

7:30pm Eastern
Awards Ceremony Waiting Room Opens & 30 Minute Countdown Begins *Refer to the meeting link in the calendar invite.

 

7:55pm Eastern
Webcams Are Encouraged To Be Turned On At This Time

 

8:00pm Eastern
Awards Ceremony Start & Opening Remarks

 

Awards Presenters: 

  1. Tim Callahan | SVP, Global Chief Information Security Officer | Aflac

  2. Benjamin Corll | VP, Cyber Security & Data Protection | Coats

  3. Kip James | VP, Chief Information Security Officer, Global Information Security | TTEC

  4. Terence Runge | CISO | Reltio

  5. Joseph Johnson | Chief Information Security Officer | Premise Health

  6. Michael Elmore | Chief Information Security Officer | GSK Consumer Healthcare

  7. Fred Kwong | Chief Information Security Officer | Delta Dental

  8. Gray Mitchell | CISO & VP Of Advisory Services | IDMWORKS

  9. Garrett Smiley | Chief Information Security Officer | Serco

  10. Tammy Klotz | Chief Information Security Officer | Covanta

  11. Ricardo Lafosse | Chief Information Security Officer | Kraft Heinz

 

9:00pm Eastern
Awards Ceremony Conclusion. *We will try to conclude the awards ceremony as close to 9pm as possible, but it is possible that we conclude before or after 9pm Eastern. 

 

bottom of page