Agenda

All curriculum for the Leadership Exchange is developed and delivered by the CISO community. We are currently conducting research with the Twin Cities Leadership Board to finalize the agenda.

Below is a list of agenda themes identified by the community which will be reflected on the final program. Please check back for updates!

Tuesday, October 22, 2024
8:00 AM - 9:00 AM
 
 
9:00 AM - 9:40 AM

Understanding the current threat landscape and your attack surface is crucial to preparing for today’s most significant risks. CISOs must keep their organizations ready to handle rising threats, building a strong security culture capable of outpacing threat actors. This panel discussion will reflect on how CISOs and technology partners prepare for today’s most significant risks and argue for adopting an innovative mindset that embraces the steady accumulation of small advancements.

  • Adapting strategy to emerging technology trends
  • Driving effective communication with business leaders to accomplish innovation
Abdeslam Mazouz
9:55 AM - 10:40 AM

More than ever, artificial Intelligence is a pervasive part of business workflows. Employees, customers, and vendors alike have learned to harness the speed and power of machines to strengthen their capabilities. Leaders must balance the advantages of AI with the need for measured and intuitive interactions with a people and process. This breakout session will address:

  • Lessons learned from AI initiatives
  • Key data privacy concerns for AI initiatives
Dave Gold

Evaluating risk, building security cultures, and implementing innovative technologies is second nature to cybersecurity leaders, but these key won’t protect your organization when a third or fourth party’s incident impacts your business. Join this roundtable discussion to gain insight on:

  •     Developing insights into third party security practices
  •     Partnering with critical vendors to improve security outcomes
  •     Fostering awareness with the leadership team to reduce impact
Greg Matthias
10:40 AM - 11:05 AM
 
 
11:05 AM - 11:50 AM

In today’s evolving threat landscape, where the frequency of breaches and costs of these attacks have increased, data protection and preservation are central to cybersecurity planning. Join this roundtable for a robust discussion on the challenges and best practices to improve the organization’s data resiliency. Explore how to:  

  • Identify and classify the organization’s most critical data   
  • Design processes and technologies to restore data quickly   
  • Measure and demonstrate that your data strategy works  
Paul Steen Mea Clift

With the increasing complexity of attacks, tooling, and security processes, organizations must simplify their approach to cybersecurity. This small group discussion will address ways security leaders can think differently about building a cybersecurity program, including:

  • Adopting new technologies to drive simplicity
  • Adapting to increasing prevalence SaaS utilization
  • Creating more powerful connection between IT and IS teams.
Marc Throne Nick Tobkin Jason Trunk
11:50 AM - 1:00 PM
 
 
1:00 PM - 1:30 PM

Improving your organization's cybersecurity program requires more than having the right technical skills. High performing security leaders know how to translate their organization’s biggest challenges into a compelling story that drives security results across the business. In this panel discussion, experienced executives share insights on what it means to be a high performing leader and how to build the skills CISOs need to get better engagement with their organization.

  • Adapting leadership approach to constantly evolving industry
  • Improving core leadership skills   
Tina Meeker Aunudrei Oliver
1:30 PM - 1:40 PM
 
 
1:40 PM - 2:05 PM
 
 
2:05 PM - 2:50 PM

CISOs are increasingly asked to lead and partner with various teams to ensure compliance with an increasingly diverse set of privacy and data protection laws. This boardroom is an opportunity for peer-driven discussion of the challenges and best practices to challenges and best practices working collaboratively, rolling out new tools and frameworks, and satisfying company data strategies. Explore: 
•    Lessons learned from working to managing the evolving regulatory environment
•    Balancing privacy and cybersecurity initiatives  and resources
•    Identifying areas of challenge
•    When to build, when to buy, and strategies for securing budget   

Brandi Bennett

Identity access management is a critical element of security program innovation, laying the groundwork for organizational agility, innovation, and a consistent security posture. Discuss IAM implementation and maturation with your peers, exploring:     

  • Next gen technology governing the identity and access lifecycle   
  • Challenges addressing threat actors evolving attacks on identity 
  • Developing new metrics on the effectiveness of your IAM architecture  
Angie Klein
3:10 PM - 3:40 PM

As the U.S. approaches the 2024 Presidential elections, we are once again facing the very real threat of cyber attacks and, in some cases associated disinformation campaigns, conducted by foreign countries against the U.S. Russia, of course, is again, one of the most aggressive players in this battle space.  In his presentation, Mr. Corn will discuss the origins of the Russian cyber threats to the U.S. and highlight how the Russians actively work to exploit the Human factor to advance their technical espionage operations against the U.S. 

Glenn Corn Parham Eftekhari
4:20 PM - 5:00 PM