Chief Information Security Officer Champions Online delivers content you cannot find anywhere else, delivered by North America's leading CISOs and Information Security leaders.
Sharing their successes, failures, and lessons learned in a bitesize and interactive format, this is your chance to get up-to-speed with the latest and greatest innovations.
Simply sign-up, logon and learn.
Are you ready to accelerate your information security journey?
Hear from brand new speakers and access never-before-heard perspectives from our elite lineup of thought leaders, including:
Virtual Roundtable 1A: How and when are you pen testing?
Lauren Heyndrickx, VP, CISO, Ralph Lauren
Virtual Roundtable 1B: How have you structured your security team for best result?
Jacqueline “Jack” Powell, CISO, AVP IT Security and Risk Management, Allianz Life
Endré Walls, EVP & CISO, Customers Bank
Tsega Thompson, Director, IT Security & Compliance, Atlantis Paradise Island
Keynote Presentation: Are You a Trusted Vendor? 10 Things Every Customer Wants to Know
What can you do to be a more trusted vendor? That’s the question this session seeks to answer. Besides answering security questionnaires, what other ways can you demonstrate that you are a trusted vendor? Could you reduce the length and amount of questionnaires you receive by aggregating enough security, privacy, compliance, and reliability details into a single “profile” to deliver to inquiring customers? As is often the case, undergoing a security evaluation can take a significant amount of time, slowing your sales teams down and delaying a customer’s ability to work with you. Security questionnaires (and the work that goes into answering them) are often the biggest time-consuming components of evaluations. Eliminating security questionnaires altogether is highly unlikely, but by taking a proactive approach to security evaluations, you can build trust through transparency, showing your customers that you take their most pressing concerns seriously. So, what 10 things do your customers want to know about your trust program?
Dan Harms, Consulting Manager, OneTrust GRC
Panel Discussion: From Prevention to Recovery: Exploring the Reality of Ransomware Attacks in 2021 and Beyond
Nik Whitfield, Chairman and Chief Seer, Panaseer
Darrell Bateman, CISO, City Bank Texas
Raj Badhwar, SVP & CISO, Voya Financial
David Levine, VP Corporate & Information Security, CSO, Ricoh
Jenny Menna, VP, Business Cybersecurity Risk, Humana
Keynote Presentation: A CISO’S Guide to Talking to Vendors
It’s like dating… and both sides can better communicate to be more successful
Rick Doten, VP, Information Security, Centene and CISO, Carolina Complete Health
Speaker Meet & Greet
Virtual Roundtable 2A: Have you been asked to do more with less?
Caroline Reyes, Director of Information Security, Intermex
Raj Badhwar, SVP & CISO, Voya Financial
Benjamin Corll, VP, Cyber Security and Data Protection, Coats
Virtual Roundtable 2B: What is the ideal
marriage of security and privacy for data security?
Lydia Payne-Johnson, Director of IT Security, Identity Management and Risk, The George Washington UniversityKathleen Mullin, Former CISO, Healthmap Solutions LLC
Panel Discussion: People Have the Power: Ensuring All Employees Have the Tools to Keep the Company Secure
As we all know, an individual CISO or security team is not enough to keep your system safe – hear how our panel of experts have made certain that security is a priority for all.
Peter Rosario, CISO, USI Insurance Services
David Sheildlower, VP & Chief Information & Privacy Officer, Turner Construction Company
Pat Benoit, VP, Global Cyber Governance Risk & Compliance/BISO, CBRE
Colleen Pratts, Director of Cybersecurity, Governance and Services, Quanex Building Products Corporation
Keynote Presentation: Fearless, Unshakable, Determined - Fighting FUD with FUD
The first step in your journey towards becoming secure is believing that you can be successful. Many of us are conditioned to believe we need to be cynical in order to be secure. In George's award-winning book, Well Aware, he demonstrates that the opposite is true...to be more secure we need to be inspired to be able to do the work that it will take to get there. George will provide a roadmap on how to use the science behind habits that can help make security possible for anyone
Attendees will be able to:
George Finney, CSO, Southern Methodist University
Panel Discussion: Weighing the Benefits and Challenges of a Zero Trust Framework- Is it the Right Choice for You?
Hear the panel’s take on their experiences and experiments in integrating Zero Trust
George Viegas, CISO, Chapman University
Gary Gooden, CTSO, Seattle Children’s
Quincey Collins, CSO, Sheppard Mullin Richter & Hampton LLP
Seema Sewell, Assistant CISO, Maricopa County
Speaker Meet & Greet
OneTrust Vendorpedia™ is the largest and most widely-used technology platform to operationalize third-party risk. The offering enables both enterprises and their vendors with technology solutions that include: the Third-Party Risk Exchange, a community of shared (and pre-completed) vendor risk assessments with 70,000+ participating vendors; Questionnaire Response Automation, a tool that helps organizations answer incoming security questionnaires; and Third-Party Risk Management software, a platform to streamline the entire vendor lifecycle, from onboarding to offboarding. More than 7,500 customers of all sizes use OneTrust, which is powered by 75 awarded patents, to offer the most depth and breadth of any third-party risk, security, and privacy solution in the market. OneTrust Vendorpedia offers purpose-built software designed to help organizations manage vendor relationships with confidence, including and integrates seamlessly with the entire OneTrust platform, including – OneTrust Privacy Management Software, OneTrust DataDiscovery™, OneTrust DataGovernance™, OneTrust GRC, OneTrust Ethics, OneTrust PreferenceChoice™, OneTrust ESG, and OneTrust DataGuidance™.
Panaseer is the first Continuous Controls Monitoring (CCM) platform for enterprise cybersecurity. CCM is solving one of the biggest challenges in cybersecurity today –control failure. Enterprises do not know if their security controls are providing full protection at any given moment in time. Panaseer’s CCM platform uniquely correlates data from all security tools to identify and measure missing assets and control gaps so that organisations can optimise security controls, tools, processes, and personnel.
Salt Security protects the APIs that form the core of every modern application. The Salt Security API Protection Platform is the industry’s first patented solution to automatically and continuously identify and protect internal, external, and third-party APIs. Deployed in minutes, the Salt platform leverages a big data engine and AI/ML to learn the granular behavior of a company’s APIs and their exposed data, stop attackers, and provide remediation insights to improve API security posture. The Salt platform requires no agents and no configuration, tuning, or customization to protect APIs across their full lifecycle - build, deploy, and runtime.
Salt's customers span industries such as financial services, high tech, and retail and include Ally Bank, Finastra, City National Bank, Equinix, Armis, Carrefour, Payoneer, and TripActions. In 2020, Salt Security was named a SINET 16 Innovator and a Gartner Cool Vendor in API Strategy for its ability to stop attackers during the reconnaissance phase, preventing a breach.
Big Data Analytics News offers information, case studies, insights on big data, Data science, Analytics, Hadoop News, blockchain, Fintech and artificial intelligence.
Big Data Analytics News is a niche place for information about Big Data. The site consists information on business trends, big data use cases, big data news to help you learn what Big Data is and how it can benefit organizations of all sizes. We promise to keep this landing place fresh with new and interesting information. The site’s goal is to provide you with a wide range of information that will enable you to learn all aspects associated with the Big Data space. We hope that you find our website interesting and informative – and that you will come back and visit on a regular basis.
The site is the industry’s online resource for exclusive stuff on Big Data. This site is dedicated to providing the latest news on Big Data Analytics, Internet of Things (IoT), Artificial Intelligence (AI), Machine Learning, Blockchain, Business intelligence, NoSql, Hadoop, MapReduce, Hive, HBase, MongoDB, Cassandra, R programming, Predictive Analytics and etc.
For more information visit: bigdataanalyticsnews.com
The Business of InfoSec is a global community designed to inspire and support the senior executives focused on data security, identity access management, cyber/risk insurance & IoT security and much more.
On our new platform, Business of InfoSec, we have curated a wealth of thought-leading insights, via video podcasts, in-depth articles, reports, and interviews. Find out how other senior security and risk leaders are tackling the challenges we’re facing today and adapting to ever-evolving threats.
For a limited time, subscribing to Business of InfoSec is free, so make sure to do so today for complimentary access to exclusive insights you just can’t find anywhere else.
Datanami is the news portal dedicated to providing the latest insights, analysis and information surrounding emerging trends, advances and solutions in big data. The portal illuminates cutting edge technologies including networking, storage and applications, and their impact upon business, industry, government, and research. The publication examines the avalanche of unprecedented amounts of data and the effects the high-end data explosion is having across the IT, enterprise, and commercial markets. https://www.datanami.
EnterpriseAI further sharpens and expands upon the already extensive coverage originating from its predecessor, EnterpriseTech, on machine/deep learning, advanced modeling/simulation, high performance data analytics and the technologies that enable them, including; high performance data centers, cloud computing, high performance storage, AI silicon and AI frameworks – spanning all relevant verticals. With its focus trained on decision-makers, technologists and thought leaders across the technology spectrum, EnterpriseAI deliver
HPCwire is the #1 news and information resource covering the fastest computers in the world and the people who run them. With a legacy dating back to 1987, HPC has enjoyed more than three decades of world-class editorial and topnotch journalism, making it the portal of choice selected by science, technology and business professionals interested in HPC, AI and data-intensive computing. For topics ranging from late-breaking news and emerging technologies in HPC, to new trends, expert analysis, and exclusive features, HPCwire delivers it all and remains the HPC community’s most reliable and trusted resource. Visit https://www.hpcwire.com/
Identity Management Institute (IMI)® is the first and leading global certification organization dedicated to identity governance, risk management, and compliance. IMI was founded in 2007 to help redefine identity management in order to address all identity risks, and support the professionals in the field to effectively collaborate and manage the identity risks facing their employees, customers, and organizations. As such, IMI has created training and certification programs, an active online community with some of the largest discussion groups comprised of thousands of global experts, as well as a leading identity management blog on the Internet.
RTInsights is the go-to resource for business executives and IT professionals leading their organizations' digital transformation and innovation direction. We provide independent, expert-driven content, including news and thought-leading analysis, that helps our community stay on top of the latest trends and guides them in developing, implementing, and deploying successful projects.
1. Learn from the most successful leaders in the information security world, and explore the strategic issues that matter to you. We have years of experience in creating events that deliver valuable insights.
2. Enjoy the convenience of an online event. There’s no need to spend time & money on travel, no time out of the office, and you can fit the short webinars around your schedule.
3. Interact with the information security community’s leading executives. Our technology and live broadcasts mean you can put your specific pain points & questions to our expert speakers, and get direct, actionable answers.
4. Can't attend all the sessions live? Catch up later at the time most convenient to you, On-Demand. Approved recordings will be shared with all registrants, post-event.
5. All for free! There’s no fee to register and no travel costs. All you need is access to the internet, from anywhere in the world, on any device!
Across 2 days we broadcast a combination of virtual roundtables and webinar sessions directly to your desk. Throughout the week you will benefit from our insightful sessions, delivered by outstanding information security executives, covering your most pertinent challenges.
CISO Champions Online uses the latest browser-based technology meaning you won't need to download any software to join the event. Simply ensure you have a wifi connection and a web browser such as Chrome, Safari, Edge or Internet Explorer.
Yes, all approved sessions will be made available on-demand after the event to registrants. You must sign-up to receive access to the recorings.
Terms & Conditions
The following Terms and Conditions (“Terms”) apply to you or your proxy in relation to your registration for this Corinium Global Intelligence (“Corinium”) offer. The definition of “registration” for purposes of these Terms will include all anyone who completes the above form. By entering your contact details, you agree to these Terms.
Disclosure of your information
You agree that we have the right to share such portions of your personal information as may be appropriate with selected third parties including:
- Business partners
- Sub-contractors for the performance of any contract we enter into with either them or you.
- Professional organizations involved in the provision of services for the event contracted for, such as, for example Swoogo.
- Sponsors - we may share your information with event sponsors who may contact you in relation to special offers, products and services related to your role within your company. You may also opt-out at any time by emailing email@example.com
The personal information shown and/or provided by you will be held in a database. It may be used to keep you up to date with developments in your industry. Sometimes your details may be obtained or made available to third parties for marketing purposes. If you do not with your details to be used for this purpose, please email us at firstname.lastname@example.org