Agenda
All curriculum for the Leadership Exchange is developed and delivered by the CISO community. We are currently conducting research with the Chicago Leadership Board to finalize the full agenda.
Wednesday, November 20, 2024 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
8:00 AM - 9:00 AM | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
9:00 AM - 9:40 AM | Security leaders have a crucial position in their organization’s security posture. As the number and severity of cybersecurity attacks continues to increase, effective security leaders can leverage their position to create a holistic resiliency plan that addresses both technical and leadership challenges. In this fireside chat, Amy Bogac and Joe Burkard share insights on:
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
9:55 AM - 10:40 AM | In this collaborative small group discussion, local security leaders from Northwestern Mutual share insights on developing, implementing, and tracking the improvements made to their governance strategy. Discussion will address:
| Finding the right strategy to approach leveraging AI for your organization is a key component of developing long term success. In this discussion, local security leaders share insights on practical AI projects that have impacted the way their organizations do business. Learn how to:
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
10:40 AM - 11:05 AM | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
11:05 AM - 11:50 AM | Even if a CISO has the right operational technology (OT) security strategy for their organization’s risk appetite, there is no guarantee that key stakeholders will understand, support, and act on that vision. In this collaborative small group discussion, local security leaders share insights on translating their OT strategy. Learn how to:
| Evaluating risk, building security cultures, and implementing innovative technologies is second nature to cybersecurity leaders, but these key won’t protect your organization when a third or fourth party’s incident impacts your business. Join this roundtable discussion to gain insight on:
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
11:50 AM - 1:00 PM | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1:00 PM - 1:30 PM | As cybersecurity becomes an increasingly critical component to long term business success, CISOs must develop a program that adapts to emerging risks and manages the executive team’s perception of their cybersecurity program. This panel discussion brings together diverse perspectives to share insights on:
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1:40 PM - 2:05 PM | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
2:05 PM - 2:50 PM | CISOs operate from the uncomfortable position of protecting an organization that constantly takes on additional risk. Navigating this conflict requires a keen understanding of security risk, its potential impact to the enterprise, and agile communication skills to advise on risk acceptance or reduction. This small group discussion explores:
| CISOs are expected to achieve more mature security programs but often given fewer resources to do so. This boardroom is an opportunity for peer-driven discussion on your budgetary challenges and best practices to maintain a steady security state while investing in critical new initiatives. Explore:
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
3:10 PM - 3:40 PM | Security incidents can be unpredictable, and the increased complexity of an organization’s environment requires security teams to act quickly in a high-pressure situation. This session explores the challenges, best practices, and resources to prepare your team and enterprise for controlled, confident action amidst the chaos.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
4:20 PM - 5:00 PM |