Agenda
All curriculum for the Leadership Exchange is developed and delivered by the CISO community. We are currently conducting research with the Twin Cities Leadership Board to finalize the agenda.
Below is a list of agenda themes identified by the community which will be reflected on the final program. Please check back for updates!
Tuesday, October 22, 2024 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
8:00 AM - 9:00 AM | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
9:00 AM - 9:40 AM | Understanding the current threat landscape and your attack surface is crucial to preparing for today’s most significant risks. CISOs must keep their organizations ready to handle rising threats, building a strong security culture capable of outpacing threat actors. This panel discussion will reflect on how CISOs and technology partners prepare for today’s most significant risks and argue for adopting an innovative mindset that embraces the steady accumulation of small advancements.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
9:55 AM - 10:40 AM | More than ever, artificial Intelligence is a pervasive part of business workflows. Employees, customers, and vendors alike have learned to harness the speed and power of machines to strengthen their capabilities. Leaders must balance the advantages of AI with the need for measured and intuitive interactions with a people and process. This breakout session will address:
| Evaluating risk, building security cultures, and implementing innovative technologies is second nature to cybersecurity leaders, but these key won’t protect your organization when a third or fourth party’s incident impacts your business. Join this roundtable discussion to gain insight on:
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
10:40 AM - 11:05 AM | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
11:05 AM - 11:50 AM | In today’s evolving threat landscape, where the frequency of breaches and costs of these attacks have increased, data protection and preservation are central to cybersecurity planning. Join this roundtable for a robust discussion on the challenges and best practices to improve the organization’s data resiliency. Explore how to:
| With the increasing complexity of attacks, tooling, and security processes, organizations must simplify their approach to cybersecurity. This small group discussion will address ways security leaders can think differently about building a cybersecurity program, including:
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
11:50 AM - 1:00 PM | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1:00 PM - 1:30 PM | Improving your organization's cybersecurity program requires more than having the right technical skills. High performing security leaders know how to translate their organization’s biggest challenges into a compelling story that drives security results across the business. In this panel discussion, experienced executives share insights on what it means to be a high performing leader and how to build the skills CISOs need to get better engagement with their organization.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1:30 PM - 1:40 PM | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1:40 PM - 2:05 PM | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
2:05 PM - 2:50 PM | CISOs are increasingly asked to lead and partner with various teams to ensure compliance with an increasingly diverse set of privacy and data protection laws. This boardroom is an opportunity for peer-driven discussion of the challenges and best practices to challenges and best practices working collaboratively, rolling out new tools and frameworks, and satisfying company data strategies. Explore: | Identity access management is a critical element of security program innovation, laying the groundwork for organizational agility, innovation, and a consistent security posture. Discuss IAM implementation and maturation with your peers, exploring:
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
3:10 PM - 3:40 PM | As the U.S. approaches the 2024 Presidential elections, we are once again facing the very real threat of cyber attacks and, in some cases associated disinformation campaigns, conducted by foreign countries against the U.S. Russia, of course, is again, one of the most aggressive players in this battle space. In his presentation, Mr. Corn will discuss the origins of the Russian cyber threats to the U.S. and highlight how the Russians actively work to exploit the Human factor to advance their technical espionage operations against the U.S. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
4:20 PM - 5:00 PM |