- This event has passed so registration is closed.
Learn. Engage. Socialize.
The cyber executive forum is a unique, intimate learning experience designed exclusively for C-level cyber professionals. Attendance is by invitation only.
- Interactive expert-led talks and panels Listen to experts who provide knowledge and experience on topics in cybersecurity, leadership, and wellness.
- Roundtable sessions Gather with peers from leading organizations and various industries to discuss relevant topics inspired by the latest topics and research in small-group sessions.
- Peer conversations. Join peer-to-peer discussions organically throughout the forum. Discover how C-level security executives discover ways to tackle the challenges you face every day.
- Social engagements Enjoy and build new business relationships with peers as they engage in welcome receptions and special evening events.
Each forum provides new concepts and actionable ideas to bring back to your organization to help you achieve critical business results.
CEUs / CPE Credits
By attending a full day at the Cyber Executive Forum, you will receive 8 Continuing Education Units or Continuing Professional Education Credits.
Attendees
The Cyber Executive Forum is “By Invitation Only” and all attendees are pre-screened & approved in advance.
CEUs / CPE Credits
By attending a full day at the Cyber Executive Forum, you will receive 8 Continuing Education Units or Continuing Professional Education Credits.
Attendees
The Cyber Executive Forum is “By Invitation Only” and all attendees are pre-screened & approved in advance.
August 2023 Cyber Executive Forum Speaker Lineup
Candy Alexander
Ms. Alexander has over 30 years of experience in the cybersecurity profession, receiving multiple international industry recognition awards. She has held several positions as CISO…
Read moreDr. Shawn P. Murray
Shawn Murray is a Principal Scientist with the United States Missile Defense Agency and is an officer in the US Civil Air Patrol.Previous assignments include…
Read moreJim Reavis
For many years, Jim Reavis has worked in the information security industry as an entrepreneur, writer, speaker, technologist and business strategist. Jim’s innovative thinking about…
Read moreJanelle Hsia
Janelle Hsia is a trusted advisor for strategic and tactical decision-making within organizations of all sizes. She focuses on privacy and security while bringing a…
Read moreJimmy Sanders
Jimmy Sanders, head of information security at Netflix DVD. Jimmy has spent the better part of two decades securing data and systems from cyber threats…
Read moreDutch Schwartz
Dutch Schwartz is a cloud security strategist for one of the world’s leading cloud service providers. He currently leads the security strategy, revenue planning and…
Read moreMarc Thompson
Marc Thompson became a managing partner of ITPG in December 2001. In this role, Marc managed multiple cyber security associations, including (ISC)2 which delivered the…
Read moreTammy Moskites
Tammy is the CEO and Founder of CyAlliance. She is a strategic advisor, seed investor and “Alliance” builder for companies, vendors and startups by leading,…
Read moreDavid Maxwell
David Maxwell is BlueCat’s VP of Security, responsible for security and compliance. He was previously Chief Security Officer at InfoSec Global, Director of Threat Intelligence…
Read moreStefano Zenaro
I received a Ph.D. degree in Computer Engineering from Politecnico of Milano, where I am currently an Associate Professor. My research interests include malware analysis,…
Read moreSravish Sridhar
Sravish is a successful 3-time startup founder with an entrepreneurial passion to build and support companies that bring meaningful innovation and change to society. Four…
Read moreRenee Guttmann-Stark
Internationally known cybersecurity thought leader and pioneer with demonstrated success in delivering world-class global security programs for Fortune 100 companies. Drive innovative cybersecurity organizations to…
Read moreReady to Explore Registration Options?
CISO Executive members attend at no charge (generous options are available for other members as well as guests).
Cyber Executive Forum August 5
Time | Session | Speaker |
---|---|---|
6:00 PM to 9:00 PM | 2023 Awards CeremonyJoin us as we recognize this year’s award winners and welcome new Senior Members, Fellows, and Distinguished Fellows. And on behalf of the ISSA Education Foundation, we’ll also be awarding some scholarships. |
|
Cyber Executive Forum August 6
Time | Session | Speaker |
---|---|---|
5:00 PM to 6:00 PM | 2023 Awards Gala Reception |
|
9:00 AM to 9:10 AM | Welcome |
|
9:10 AM to 9:30 AM | Breakfast – TrustCloud : Upgrade GRC into a Profit Center: 5 Lessons from CISOs and GRC Leaders Who’ve Made it HappenSecurity, risk and compliance professionals never have enough budget, resources and time to do their jobs well. They are often told that they just have to protect their businesses and “make it work.” In this talk, we’ll explore 5 transformative strategies employed by CISOs and GRC leaders to highlight how their GRC program is a profit center for their business, enabling them to get more budget and become strategic with their management team and Board of Directors. By proving how your GRC, security and privacy investments accelerates revenue and supports sales wins, presenting how your strategy reduces and protects the business against financial loss and liability, and showcasing how you’ve reduced the overall cost of implementing your GRC program by using modern tools that use AI and API driven programmatic workflows, you can upgrade GRC into a profit center. |
|
9:30 AM to 10:15 AM | 50 shades of dataIts all about the data. Whether it's Data Subject Request or Data Breach the amount of effort, cost and impact on a company's reputation depend on the quantiy and the type of personal data involved. The more data, the larger the consequences. This presentation is a practical approach to privacy and data protection that includes strategies to help you get to stay compliant wih the evolving privacy regulations. |
|
10:15 AM to 10:30 AM | Break |
|
10:30 AM to 11:30 AM | PanelCybersecurity Strategies and Programs of Tomorrow-Where is tech bringing us, and how does that impact our strategy and/or program? |
|
11:30 AM to 12:15 PM | Executive Roundtable 1Let's have a discussion on these predictions and determine: 1. Are these on target? 2. If not, what are our predictions? 3. If we agree, what do we do about them? |
|
12:15 PM to 1:15 PM | Lunch and Learn : BlueCatLearn how you can use Mitre's ATT&CK framework to do gap analysis on your environment, what you should and shouldn't ask vendors about it, and how it differs from other enumerations like CVE and CWE. CVE will be 25 years old next year - but that doesn't mean Cybersecurity has been "solved". As we add tools to our environment to improve visibility and detection, and hold our vendors accountable for vulnerabilities and weaknesses, we still face the challenge of developing our staff so they can improve their skills and recognize risks. |
|
1:15 PM to 1:45 PM | Roundtable ReadoutsGroup Discussion – Participants will be asked to form two groups for the roundtable, one strategic and one tactical. |
|
1:45 PM to 2:15 PM | Generative AI: the Next Frontier for Cybersecurity and the CloudIn this talk, Cloud Security Alliance CEO Jim Reavis shares his thoughts around the viral adoption of AI solutions such as ChatGPT, how he anticipates malicious actors using it, how cybersecurity will be transformed by it and what is truly different, necessitating innovations in best practices. Jim will outline recommendations for an industry call to action to tame and leverage Generative AI to benefit all. |
|
2:15 PM to 2:45 PM | Getting from Point A to Point B in Your CareerLearning Objective #1: Have Confidence in Your Own Personal Journey With over 30 years in Security and Technology and a Career CISO, Tammy Moskites, CEO and Founder of CyAlliance has much to share about leadership, the journey and resilience. Tammy will review the importance of having a plan in place for your career goals. She will dig into different avenues in getting from Point A to Point B in your career. She will also dig deeper into How to Use and How to Implement her development objective program, "G.O.A.L.s for Success", in your personal and professional worlds to get you where you want to be in your career Tammy will also discuss how you can leverage the same techniques to your personal journey. She will highlight the importance of what you can be doing mentally, emotionally, and physically to help you focus where you want to be in your career. It is not just about being in charge – it is finding the road to where you want to be now and in the future. It is a journey. This is not just for the beginner - but just as impactful for the CISO! |
|
2:45 PM to 3:30 PM | Executive Round Table 2Let's have a discussion on these predictions and determine: 1. Are these on target? 2. If not, what are our predictions? 3. If we agree, what do we do about them? |
|
3:30 PM to 3:45 PM | Break |
|
3:45 PM to 4:15 PM | Roundtable Readouts |
|
4:15 PM to 4:30 PM | Closing remarks/raffle |
|
4:30 PM to 5:30 PM | Closing reception |
|
Sold out!
Make sure you check out the next Cyber Executive Forum.
Register early to avoid disappointment.
ISSA Cyber Executive Member Registration
ISSA Cyber Executive Members are invited to attend all Cyber Executive Forums at no charge. Click on the button below to register now.
Not a Member of ISSA's Cyber Executive Yet?
Join today and get free access to the Cyber Executive Forum as well as other exclusive benefits.