We’ve answered a few FAQs to get you started. Still have questions? Please don’t hesitate to reach out!
The Best Solution Providers
Meet one-on-one with the partners best suited to tackle your unprecedented challenges.
Over 30 Speakers
Learn from the leaders driving manufacturing innovation in an ever-changing climate.
Since it isn’t quite safe to treat you to a high class hotel, enjoy some high class swag.
Using the same data-driven matching logic as our in-person events, we take the legwork out of finding new partners. Meet directly with companies vetted specifically for you to confidently tackle your challenges, within your budget and time frame. There is a minimum of 6 meetings, and no maximum.
The challenge of digital is no exotic location, no 5-star dining, and no face time. But we do have a quite brilliant system to reward you with SWAG. Take all 6 solution provider meetings and we’ll thank you generously. Climbing the ranks is hard; you’re well-deserving of an exceptional experience, no matter the limitations.
Watch it when it’s released, or later on demand. Your experience is up to you.
10:00 am - 11:00 am
Aflac’s threat intelligence program provides decisive operational insight into what threat actors are doing right now and how threats are trending over time. By combining deep visibility into threat actor techniques with automation supported by millions of data points that are integrated into an adaptive security framework, Aflac’s systems and environments are significantly more resilient to attacks. Learn how a clear understanding of your adversaries’ motivations, methods and capabilities, enable you to make effective decisions regarding how you prioritize your efforts and investments to protect your organization.
Please Join the Director, IT Security Education & Consulting of Harvard University, Sandy Silk in this Executive Interview where she will discuss how to recruit strong IT candidates and give great insight on setting employees up to success.
8:00 am - 9:00 am
The future of the CISO role is relationship focused and business aligned. Historically, the role has been setup as either a dead end or a scapegoat. However, with growing awareness of the concerns around security and privacy as well as the skills gap within the industry, the role will need to evolve. Providing your organization with strategic advantage that is business aligned is of critical importance. The most successful CISOs will have identified and mastered a relationship focused mindset as vital to their ability to be an effective leader in the information security space. While it is possible to maintain the status quo and survive, be encouraged to take advantage of the opportunity to develop in the current environment and solidify your position as a trusted advisor who fully understands the business they are charged with protecting and promoting.
9:00 am - 10:00 am
The role of the CIO has been on a steady rise for the past several years. As the way people work continues to change, the demands from today’s global, mobile, and distributed workforce are also rapidly evolving. We’re at a point in time where the CIO is now front and center to defining the digital culture of an organization with a mega-trend at play that I like to call, ‘Systems of Experience.’ During my talk, I will focus on the role of the CIO amidst this shifting tide and what it takes to create a digital culture to support the future of work.
A data-driven approach allows transforming data into powerful insights to guide the development and growth of successful digital products. This presentation will show a practical approach of how your company can create a growth strategy to evolve digital products, building a strong connection between product and business. Discover methods and practices to foster, strengthen and scale the data-driven culture in your company.
Visibility to lateral movement and the ability to neutralize the attacker without them knowing. Reduction of mean time to detection with quantifiable results, often for hours or days to minutes, so there is less time in the network to cause damages. Prevention of privilege escalation and lateral movement for visibility of attackers in the network, reduction of the attack surface, and prevention of attackers from succeeding
Please Join the Senior Director of Product Management for Synopsys Software Integrity Group, Meera Rao in this Executive Interview where she will discuss how software developers can become better partners to CISOs in terms of reducing risk and improving security.
Please Join the CISO of Los Angeles County Fire Department, Allen Ohanian in this Executive Interview where he will discuss the latest trends and patterns for phishing and ransomware attacks. He will address which sectors are victimized the most and why.
The threat landscape has completely changed. In the last twelve months we have seen supply chain attacks, an increase in ransomware (with an explosion of cryptocurrency value), and a dedication from attackers against industrial control and IoT system. The remote workforce is expected to continue to be a target in 2021 along with corporate assets that are finically and politically motivated by attackers. We are working, communicating, and interacting in ways that are different taking advantage of remote applications and connectivity technologies. Attackers know this as well. They are targeting your VPNs, remote desktop systems, growing more advanced with phishing attacks, targeting home-based IoT systems, remote conferencing applications, and gaming systems. The talk will explore hacker tools, techniques, Darknet markets, and DeepWeb exploits attackers are using to attack, exploit, and breach organizations around the globe.
11:00 am - 12:00 pm
MacGyver is renowned for improvising and finding a simple yet elegant solution to the problem at hand. There is no reason you can’t do the same with your business transformation. Join Bizagi’s Rachel Brennan for this quick, engaging, 20-minute session to learn the top tips and tricks to keep in your pocket to ensure you can handle whatever world 2.0 has in store for your business.
8:00 am - 9:00 am
Innovation is all about creating measurable, quantifiable, and demonstrable value to both your customer and business. It is your ability to build the right product, for the right market, build it right with the right tools, processes and resources, and build it fast so you do not miss the market window. This presentation will teach 20 lessons in 20 years of practice and introduce the innovation ecosystem and provide valuable lessons from practice to help you establish an effective culture of innovation to reward the right behavior with a maniacal focus on the customer.
11:00 am - 12:00 pm
Now that we have all been working from home for a few months, how has your security program held up? Are you still using the same metrics? Have you shifted anything? If your program was built on a framework and started with the basics, remote workers shouldn’t change much. Join me as we discuss the key points of a successful security program and how to gain buy-in and budget even during an economic downturn.
While operations, deployment, and quality are key focus areas of DevOps, continuous improvement of application performance and reliability once deployment is done can fall into a lower priority. That’s where a Site Reliability Engineering team can provide a critical set of eyes and hands to focus on improvement after deployment. Ensuring the right strategy for how DevOps and SRE work together and build off of each other’s core strengths and focuses.
While the cloud offers the promise of flexibility and agility, it adds complexity to the day-to-day operations of traditional network and security professionals. Migration of traditional applications to the public cloud and the development of cloud-native applications through devops further fragments already complicated infrastructures. Traditional security and network teams need to work together with emerging cloud operations to secure this new reality. Security policy management provides a solution that offers visibility and control into these complex hybrid environments, ensuring security while maintaining business agility.
Netsparker has, and always will be a DAST-first solution. We strongly believe that the versatility of modern dynamic tools bring advantages that extend far beyond the typical vulnerability scanning functionality. The inclusion of DAST induced IAST functionality in Netsparker provides the best of both worlds by maintaining the advantages of a DAST solution while gaining the ability to go deeper than ever before to identify and verify more vulnerabilities with access to the application code.In this presentation, you will learn how Netsparker helps your organization automate and scale web application security with the added benefit of IAST scanning capabilities in order for your team to reach the depths of your application security.
Rapidly evolving consumer preferences and the shift to digital channels has created a wealth of value creation opportunities for those that can capture them ahead of the rest. Join us and explore how to implement a model that is helping leading CIOs accelerate their digital programs, by leveraging agile processes, adding a Nearshore™ component, embracing more agile ways to source, while focusing the efforts on value streams that put customer needs at the center.
Security program improvement should be tied to security risk which changes frequently. This session will cover the reasons security risk is fluid and the benefits to approaching security program improvement through small incrementation changes (I.e. Kaizen). This proposed approach turns compliance driven change and traditional approach of program maturity on its side.
If we’ve learned anything in the past year, it’s that the term “insider threat” brings on new meaning when employees go remote. And even though the vast majority of these threats are unintentional, and a result of lack of due diligence versus malice, they are threats none the less and must be addressed. How do we address, educate and plan to expect the unexpected in our employees’ home workplace environments? In this session I’ll answer this fundamental question, specifically addressing:• Considerations for all connected at home devices, from desktop printers to listening devices like Alexa and how to protect against related threats.• Educating employees on the differences between at home and corporate networks and what they need to do, on a regular basis, to ensure connections are secure. • Tips for ensuring employees are accountable and following security protocols. I’ll also share tips from rolling out remote work for Ricoh USA, Inc. employees along with considerations for managing hybrid and agile workplaces where some employees remain remote and others are in the office.
World is on the cusp of the Fourth Industrial Revolution or Industry 4.0. It is quite different than the prior three Industrial Revolutions —steam & water power, assembly lines, and computerization, as it will challenge the enterprises on not only their business operations but also on how efficiently they adapt to the evolving human behaviors. This revolution is expected to impact all industries, disciplines, economies and ultimately societies. In this new era of revolution, only those enterprises or people will survive and thrive who will adapt to Industry 4.0 by correctly adopting the Digital Transformation strategies and the technologies such as Artificial Intelligence, Robotics, IOT, Cloud, Digital Twin, Augmented Reality, etc.
Please Join the Senior Director- Infrastructure, Operations and Cybersecurity, Andrew Nuxoll in this Executive Interview where he will discuss the keys to retaining Cybersecurity talent.
What is “IT”? It’s not simply Information Technology. It is everything. How can you transform one part of the enterprise and not others? Do we stop with the supply chain? What about the customer experience? Transforming “IT” isn’t simply about IT and OT, it is about have the honesty to realize that for this thing to work, IT has to change.
Please Join the CIO of Wrench Group, Robert Sheesley in this Executive Interview where he will discuss how to lead a Digital Transformation and how to navigate through the challenges and surprises along the way.
CISO VISIONS is invitation-only for security executives. Exclusivity lets us cater to your specific challenges and keep you in the company of the leaders driving progress in your field.
We only work with the best in class. All solution providers are thoroughly vetted, and matched to you based on your specific challenges and current projects.
CISO VISIONS Virtual Summit is the digital counterpart to the invitation-only summit for security executives. CISO VISIONS bridges you to the most efficient solutions and information for your crowning priorities.
CISO VISIONS Virtual Summit is unique in its ability to connect you to qualified solution providers. They’re more than willing to underwrite the cost of your attendance in exchange for access to such an exclusive audience.
Your virtual pass includes:
– All sessions and their recordings
– 6 or 8 one-on-one meetings with vetted solution providers, specifically matched to you
$300 or $500 in swag upon meeting completion
Based on the details of your registration, we carefully select at least 6 best-fit solution providers for you to meet with. Each meeting is 30 minutes long and focused on solving a specific priority you have a listed. Once completed, you’re eligible to receive a swag package. All meetings will take place on Zoom and all logistics are handled for you!
We are looking for executives with genuine needs for new solutions and buying influence or authority. Invitations are extended to C-level executives, SVPs, VPs, Directors and Managers within all functions of Security and Information Technology
Yes! But only for your one-on-one meetings. The summit sessions, however, will all be available to you on demand to watch at your leisure, anytime, any place.
There’s a lot of reasons to attend! For starters, CISO VISIONS Virtual Summit is the only online event customized to help you with your current challenges. You’ll learn from industry veterans and connect to the solutions you need. Your time is valuable and sticking to your budget is more important than ever. CISO VISIONS is designed to help you maximize your time and money for the best possible results.