DAY 1
MONDAY, JUNE 28TH
11:00AM - 11:45AM EASTERN
[INTERACTIVE SESSION]
Future of the CISO Role
The future of the CISO role is relationship focused and business aligned. Historically, the role has been setup as either a dead end or a scapegoat. However, with growing awareness of the concerns around security and privacy as well as the skills gap within the industry, the role will need to evolve. Providing your organization with strategic advantage that is business aligned is of critical importance. The most successful CISOs will have identified and mastered a relationship focused mindset as vital to their ability to be an effective leader in the information security space. While it is possible to maintain the status quo and survive, be encouraged to take advantage of the opportunity to develop in the current environment and solidify your position as a trusted advisor who fully understands the business they are charged with protecting and promoting.
11:45AM - 12:00PM EASTERN
[INTERACTIVE NETWORKING BREAK]
Hometown & First Job Skill That You Use Today
12:00PM - 12:45PM EASTERN
[INTERACTIVE SESSION]
Levers of Human Deception: The Science and Methodology Behind Social Engineering
No matter how much security technology we purchase, we still face a fundamental security problem: people. This discussion will explore the different levers that social engineers and scam artists pull to make us more likely to do their bidding.
Join Perry Carpenter, KnowBe4's Chief Evangelist and Strategy Officer, as he provides fun and engaging examples of mental manipulation in everyday life: from the tactics used by oily car dealers, to sophisticated social engineering and online scams. Additionally, we’ll look at how to ethically use the very same levers when educating our users.
12:45PM - 1:15PM EASTERN
[30 MINUTE BREAK]
1:15PM - 2:00PM EASTERN
[INTERACTIVE SESSION]
Cybersecurity Maturity Model Certification (CMMC): How Security and Maturity Go Hand in Hand
Covered Defense Information (CDI)?
What is it?
What are the various flavors/some examples?
How do we handle it securely?
DFARS 252.204-7012 Compliance
How does it impact you?
What is the process used to comply?
Cybersecurity Maturity Model Certification (CMMC)
How does it differ from DFARS/171 compliance and how is it similar?
How does one achieve a CMMC certification for a particular level?
2:00PM - 2:15PM EASTERN
[INTERACTIVE NETWORKING BREAK]
Favorite Vacation Spot
2:15PM - 3:00PM EASTERN
[INTERACTIVE SESSION]
Why You Need Artificial Intelligence for Email Security
Phishing attacks are skyrocketing and bearing the brunt of this is the SOC. Artificial Intelligence is a well-traveled buzzword, and it is indeed crucial that it's used to stop advanced email attacks. However, AI is only as good as its dataset, which is why it's crucial to use AI to identify unseen patterns in the richest data set. By doing so, 50% more attacks can be locked, freeing up time and resources for the SOC, and preventing a business from succumbing to a devastating attack. Learn why some AI is all sizzle, and why some AI, like Avanan's, is the real deal.
3:00PM - 3:15PM EASTERN
[INTERACTIVE NETWORKING BREAK]
Best Thing I Ever Ate, Food Network Inspired
3:15PM - 4:00PM EASTERN
[INTERACTIVE SESSION]
The CISO Role in Public Policy
At the end of the day, no matter the security law or regulation, the CISO has to enforce it. With that in mind, CISOs should look for opportunities to get involved in forming and informing those laws and regulations. Join Tim Callahan, Global Chief Security Officer of Aflac in this roundtable discussion about the CISOs role in Public Policy.
DAY 2
TUESDAY, JUNE 29TH
11:00AM - 11:45AM EASTERN
[INTERACTIVE SESSION]
Strengthening Identity as the Digital Perimeter with Zero Trust and Software Defined Perimeter
This session will discuss how Zero Trust and SDP can complement Identity and promote sharing of first principles and best practices. We will touch upon macro factors such as the NIST Zero Trust Framework and the recent presidential Zero Trust executive order. We will also review how these three core technologies can add business value such as: minimize risk of intellectual property loss, lower the risk of a data breach, strengthen enterprise security, facilitate compliance with privacy regulations, build automated unified on-boarding and off-boarding processes and strengthen privacy.
11:45AM - 12:00PM EASTERN
[INTERACTIVE NETWORKING BREAK]
Two Truths and a Lie
12:00PM - 12:45PM EASTERN
[INTERACTIVE SESSION]
The Challenges of Data Security in a Modern Multi-Jurisdictional World
Policy, Technology and People Considerations for maintaining your data sovereignty while maintaining compliance.
Data privacy legislation began with a single law in the German state of Hessia in the early 1970s. Fast forward to 2021 and there are now dozens, if not hundreds of unique privacy legislations and it can seem like a new one emerges almost every day as industries, states and countries release their own. When you combine this regulatory upheaval with modern IT infrastructure capabilities like virtualization and multi-cloud it can almost seem overwhelming.
In this session, we will discuss the regulatory journey – past, present and future. Learn from each other’s experiences how to identify and manage these challenges around the globe - what has worked, and what hasn’t.
12:45PM - 1:15PM EASTERN
[30 MINUTE BREAK]
1:15PM - 2:00PM EASTERN
[INTERACTIVE SESSION]
Autonomous Cyber AI: Redefining Enterprise Security
In this new era of cyber-threat, characterized by both slow and stealthy attacks and rapid, automated campaigns, static and siloed security tools are failing. Organizations need to urgently rethink their strategy – to ensure their people and critical data are protected, wherever they are. Powered by Autonomous Cyber AI, today’s self-learning defenses are capable of identifying and neutralizing security incidents in seconds – not hours.
2:00PM - 2:15PM EASTERN
[INTERACTIVE NETWORKING BREAK]
Sports Talk
2:15PM - 3:00PM EASTERN
[INTERACTIVE SESSION]
Making Lemonade from Lemons: Using the Hard-won Lessons Learned Through the Pandemic to Drive Success
The global pandemic has changed so much, so fast. From the way we work and live, to the approach we take to running our businesses and the threats we face, the combination of digital transformation and the pandemic has put you at the epicenter of a major shift. But the lemons you’ve been given have an opportunity to transform into something amazing. Join this session and hear about some of the key challenges faced by organizations like yours, with expert industry insights and sharing of your peer’s “secret ingredients” for making better lemonade!
3:00PM - 3:15PM EASTERN
[INTERACTIVE NETWORKING BREAK]
Bucket List Item
3:15PM - 4:00PM EASTERN
[INTERACTIVE SESSION]
Strike a Balance of Risk, Cost & Value in OT Cyber Protection
More and more cyber attacks are targeting Operational Technologies’ networks and systems. Protecting critical infrastructure is more important than ever. Join this session to engage in lively and interactive discussion about the challenges and successes of implementing a OT-focused cybersecurity program that meets the risk tolerance of your organization. Discuss how to strike the right balance between risk, cost and value!
DAY 2 | ONCON ICON AWARDS
TUESDAY, JUNE 29TH AT 8PM - 9PM EASTERN
AWARDS CEREMONY AGENDA:
7:30pm Eastern
Awards Ceremony Waiting Room Opens & 30 Minute Countdown Begins *Refer to the meeting link in the calendar invite.
7:55pm Eastern
Webcams Are Encouraged To Be Turned On At This Time
8:00pm Eastern
Awards Ceremony Start & Opening Remarks
Awards Presenters:
-
Tim Callahan | SVP, Global Chief Information Security Officer | Aflac
-
Benjamin Corll | VP, Cyber Security & Data Protection | Coats
-
Kip James | VP, Chief Information Security Officer, Global Information Security | TTEC
-
Terence Runge | CISO | Reltio
-
Joseph Johnson | Chief Information Security Officer | Premise Health
-
Michael Elmore | Chief Information Security Officer | GSK Consumer Healthcare
-
Fred Kwong | Chief Information Security Officer | Delta Dental
-
Gray Mitchell | CISO & VP Of Advisory Services | IDMWORKS
-
Garrett Smiley | Chief Information Security Officer | Serco
-
Tammy Klotz | Chief Information Security Officer | Covanta
-
Ricardo Lafosse | Chief Information Security Officer | Kraft Heinz
9:00pm Eastern
Awards Ceremony Conclusion. *We will try to conclude the awards ceremony as close to 9pm as possible, but it is possible that we conclude before or after 9pm Eastern.