Security
& Risk

November 8 – 9, 2022  |  Washington, D.C. & Digital Experience

Agenda

Early Access

Nov 7
  • 12:00 pm – 4:00 pm ETOn Demand Sessions

Super Monday

Nov 7
  • 12:30 pm – 4:45 pm ETForrWomen Leadership Summit
  • 2:00 pm – 3:15 pm ETZT Certification Workshop
  • 3:00 pm – 5:00 pm ETSecurity Analyst Experience (AX) Workshop
  • 4:00 pm – 5:00 pm ETExecutive Leadership Exchange (ELE)
  • 5:00 pm – 6:00 pm ETWelcome Reception

Tuesday

Nov 8
  • 10:00 am – 11:20 am ETOpening Remarks & Keynotes
  • 11:20 am – 12:00 pm ETMarketplace Break
  • 12:00 pm – 1:05 pm ETBreakout & Case Study Sessions
  • 1:05 pm – 2:05 pm ETLunch
  • 2:05 pm – 3:45 pm ETBreakout & Case Study Sessions
  • 3:45 pm – 4:30 pm ETMarketplace Break
  • 4:30 pm – 5:45 pm ETKeynote Sessions
  • 5:35 pm – 6:35 pm ETReception

Wednesday

Nov 9
  • 9:30 am – 10:50 am ETKeynote Sessions
  • 10:50 am – 11:30 am ETMarketplace Break
  • 11:30 am – 12:35 pm ETBreakout & Case Study Sessions
  • 12:35 pm – 1:35 pm ETLunch
  • 1:35 pm – 2:40 pm ETBreakout & Case Study Sessions
  • 2:40 pm – 3:20 pm ETMarketplace Break
  • 3:20 pm – 4:30 pm ETKeynote Sessions
  • 4:30 pm – 4:35 pm ETClosing Remarks

Super Monday Nov 7

12:30 pm – 4:45 pm ET

ForrWomen Leadership Summit

Advancing Women’s Leadership in Security & Risk

Join your peers for a meet-and-greet before attending sessions that provide advancement strategies for women leaders and help those same leaders support our next generation. All are welcome to join!

12:30-1:30 PM | Networking Lunch with Forrester’s Security & Risk Women Leaders

Nearly half of Forrester’s Security & Risk Analyst team is made up of women. Come meet this group of powerful leaders and hear how they are on a mission to reshape the industry.

1:30-2:00 PM | Fireside Chat: Moving Beyond “Beating the Odds"

In the last two decades, a significant amount of money and time has been spent in efforts to diversify the tech workforce. While progress is happening, it seems to move at a glacial pace. Women are still significantly underrepresented in tech as a whole, and dramatically underrepresented in tech leadership. The women who do succeed make it by beating the odds and overcoming significant obstacles in their path to success. This problem represents a risk, not just for women, but for the industry as a whole. Join Forrester’s Research Director Amy DeMartine, and Principal Analyst Katy Tynan to discuss how women can move beyond surviving despite the odds, to thriving in an ecosystem of opportunity.

Speakers:
Katy Tynan, VP, Principal Analyst, Forrester
Amy DeMartine, VP, Research Director, Forrester

2:00-2:45 PM | Group Discussion

Connect with your peers to discuss the common barriers and solutions to advancing women’s roles in cybersecurity.

2:45-3:45 PM | Build A Network Of Allies And Mentors To Lead In Cybersecurity

If you’ve ever felt out-of-place in a professional cybersecurity setting – whether at your own company, at a networking event, or at an industry conference – this panel session is for you.  We’ve assembled a fantastic panel of senior executives who’ve wrestled with feeling welcome in cybersecurity themselves, and with proven track records of recruiting, mentoring, and retaining women and other people who don’t fit the “pale guy in a hoodie” stereotype.  Here’s what you’ll take away if you join us: 

  • How the panelists have tackled the challenges and implemented the solutions surfaced in the previous working session 
  • The elements of successful mentorship and allyship that the panelists have observed from both sides of those relationships 
  • Things that you can do to help open the door wider for others who might not feel welcome – because whatever stage you’re at in your own career in cybersecurity, there will always be people at earlier stages who you can help! 

Speakers:
Laura Koetzle, VP, Group Director, Forrester
Angela Cole, Senior Federal Cybersecurity Manager, United States Department of Agriculture (USDA)
Amy S. Hamilton, Department of Energy Senior Advisor , National Cybersecurity Policy and Programs

3:45-4:45 PM | Mentor-Mentee Roundtables

Women mentoring women is what it’s all about. Whether you participate as a mentor or mentee, this will be an inspiring experience. Connect with your peers in the industry and develop meaningful relationships that will last beyond this Event.

2:00 pm – 3:15 pm ET

ZT Certification Workshop: Preparing For Your Zero Trust Transformation

In an age when cybersecurity threats are everywhere, modern networks must move beyond the static perimeter-based model. Security teams must adapt and redesign networks to improve security. Join this workshop to better understand what it takes to plan for your firm’s Zero Trust strategy. You’ll participate in interactive self-assessments and exercises to help you identify areas to focus your transformation investments. This workshop provides a live sample of Forrester’s Adopting Zero Trust Certification course. By participating, you’ll get a sneak peek into the new Certification, where you can convert your self-assessment into an informed Zero Trust roadmap, launching early 2023!

Speakers:
Heath Mullins, Sr. Analyst, Forrester
Jenna Wohead, Director, Certification, Forrester

3:00 pm – 5:00 pm ET

Workshop: How to Leverage Security Analyst Experience to Retain Talent in the SOC

Security Analysts are the backbone of your security program. Yet, they often struggle with low quality tools, ad-hoc processes, and subsequent burnout. Security Analyst Experience (AX) is a new term to describe this pain point – specifically, how analysts perceive the tools and processes they use in the SOC. In this workshop, we explain how to operationalize security Analyst Experience (AX) to improve security tooling and processes to help retain talent in the SOC. Learn: 

  • What security Analyst Experience is 
  • How Analyst Experience affects your recruiting and retention efforts 
  • How to adjust your security processes and technology to improve the Analyst Experience 

Speakers:
Allie Mellen, Senior Analyst, Forrester
Jeff Pollard, VP, Principal Analyst, Forrester

4:00 pm – 5:00 pm ET

Executive Leadership Exchange (Invite-Only)

The Executive Leadership Exchange (ELE) is an executive program for up to 75 qualified Security & Risk executives. Please visit the programs tab to learn more.

4:00-4:30 PM | Kickoff & Speed Networking

Analysts Jess Burn and Jinan Budge will kick off Security & Risk 2022 with a preview of our Forum agenda followed by a lively peer networking session designed to acquaint (or reacquaint) ELE members with each other. 

Speakers:
Jess Burn, Senior Analyst, Forrester
Jinan Budge, VP, Principal Analyst, Forrester

4:30-5:00 PM | Predictions Preview

Join us for an ELE exclusive live session reviewing our Security, Risk, and Privacy predictions for 2023. VP, Research Director, Joseph Blankenship will walk through this year’s five predictions, overarching themes we identified in the predictions, why each one matters and most importantly what security leaders should do about them

Speakers:
Alla Valente, Senior Analyst, Forrester
Heidi Shey, Principal Analyst, Forrester
Janet Worthington, Sr Analyst, Forrester
Jess Burn, Principal Advisor, Forrester
Jinan Budge, Principal Analyst, Forrester

5:00 pm – 6:00 pm ET

Welcome Reception

Join us for refreshments and light appetizers. All registered attendees are welcomed.

Tuesday Nov 8

10:00 am – 10:10 am ET

Welcome & Opening Remarks

with Stephanie Balaouras, VP, Group Director, Forrester

10:10 am – 10:40 am ET

Keynote: Securing The Future: Geopolitical Risk Will Redefine Security Strategies For The Next Decade

Globalization and international cooperation have passed their peak, thanks to global supply chain challenges and the threat of a third world war. As global powers work to protect themselves from the fallout, enterprises must prepare for how these changing global dynamics will affect their strategy and their security policies. Attend this keynote for insights into how geopolitical tension will define the next decade and how to adapt your security strategy to mitigate your risk. 

 

Speakers:
Renee Murphy, Principal Analyst, Forrester
Allie Mellen, Senior Analyst, Forrester

10:50 am – 11:20 am ET

Keynote: Privacy And The Immersive Experiences Of The Future

The metaverse does not exist yet. But the promise of a future defined by interoperable, immersive platforms is already driving companies’ investments, changing customer expectations, and shaping new engagement models. Individuals’ personal data, trusted identities, and attributes are fundamental pillars to achieve the promise of immersive digital experiences of the future. While many have plans on how to exploit sensitive personal data, only a few know how to keep them safe. Join this session to: 

  • Learn how the demand and the collection of individuals’ personal data will evolve as digital experiences become more immersive and intelligent. 
  • Assess the privacy risks of immersive experiences of the future. 
  • Design a privacy approach fit for future immersive experiences. 

Speakers:
Enza Iannopollo, Principal Analyst, Forrester

11:20 am – 12:00 pm ET

Marketplace Break

Marketplace breaks are your chance to connect with sponsors and catch up with colleagues on the show floor.

Check out our Sponsor Spotlights to learn more about the next great solution for your team. See below for the list of spotlights during this time.

Attend one session:

JupiterOne Reduced Attack Surface by 150%

When you reduce something by 100%, you essentially eliminate it. But what does it mean to reduce something by 150%? JupiterOne will share findings of the recent Total Economic Impact™ of JupiterOne study and highlight how JupiterOne’s cyber asset attack surface management (CAASM) platform provided the depth and breadth of visibility to: identify 250% more cyber assets, reduce the number of SecOps resource hours by 85%, and derive 318% return on investment.

Speakers:
Tyler Shields, Chief Marketing Officer, JupiterOne

ReversingLabs: Going Beyond Basic SBOMs - How Tampering, Secrets & Diffs Expand Software Risk Visibility

This session will go into specific details on SBOMs. Topics that will be covered are “Why do I need an SBOM?” “Who is responsible for an SBOM?” plus more.

Speakers:
Matt Rose, Field CISO, Reversing Labs

12:00 pm – 12:30 pm ET

Breakout Sessions

Tackle Risk And Compliance Head On
Seven Ransomware Business Continuity Considerations You Missed

New ransomware attack methods such as double extortion and the sheer number of attacks make businesses even more aware of the looming threat. As a result, business-continuity ransomware scenario plans are in demand, and business continuity pros are on the hot seat to plan, test, and invoke plans to save the business from embarrassment and unwarranted business downtime. During this session, we’ll cover: 

  • The new threats that business continuity plans need to anticipate. 
  • How to create a plan that takes into account more than just the recovery of services. 
  • Common missing considerations that cause long delays in restoring services. 

Speakers:
Amy DeMartine, VP, Research Director, Forrester

READ MORE +READ LESS -
Elevate Trust With Privacy, Data Security, And Identity
Redefining Data Security For The Modern Age

What is data security? What capabilities and controls are included, and from where? These are significant questions for every organization when every security technology product’s purpose is to protect your organization’s data, and more security and compliance functionality is being built into nonsecurity technologies and data platforms. This session will explore: 

  • Data security controls in the context of a Zero Trust approach. 
  • The future of data security and the anticipated challenges. 
  • Technology innovations to watch. 

Speakers:
Heidi Shey, Principal Analyst, Forrester

READ MORE +READ LESS -
Lead Through Unprecedented Change
From Compliance To Cultural Change: The Future Of Security Awareness And Training

Security awareness and training remains plagued by the legacy of compliance-driven and checkbox-oriented tools and methods. Transformational security leaders are pushing for change that reflects the importance of human-centric security and the necessity of behavioral change. The future of awareness and training won’t be about awareness and training but rather a shift to evidence-based human-risk management in the near term and, in the longer term, to outcomes that lead to behavioral change. This session will offer detailed guidance for security leaders on what they should demand from their awareness and training partners and help them predict what regulators will want in the future. Join this session to: 

  • Discover what effective awareness and training programs will look like in the next three years. 
  • Plan your investments in your awareness and training resources now. 
  • Achieve actual behavior and culture change as a result of your security awareness and training program. 

Speakers:
Jinan Budge, VP, Principal Analyst, Forrester

READ MORE +READ LESS -
Bolster Defenses With Zero Trust
Reinvent Your Vulnerability Management Program To Regain Trust

Vulnerability management is the hot potato of IT and security programs. It’s often neglected, lacks ownership, or is seen as a burdensome disruption to business. As the business adopts more technology and the drumbeat of critical vulnerability drops continues, security leaders must become strategic fortune-tellers, responsible for predicting and prioritizing vulnerabilities. During this session, we’ll explore: 

  • What key best practices you must use for vulnerability management policies.
  • How to prioritize remediation and build zero-day playbooks.
  • How to factor new technology adoption into your vulnerability management strategy. 

Speakers:
Erik Nost, Senior Analyst, Forrester

READ MORE +READ LESS -
12:35 pm – 1:05 pm ET

Case Study Sessions

Hear real world case studies showcasing the value of partnering with the right technology provider.

Attend one session:

Key Resources: Understanding Mainframe Integrity Vulnerabilities

The integrity of mainframe data and software is critical to the success of your business. Understanding mainframe integrity is a critical component of security strategies. It isn’t just about user authentication/ authorization. An appropriate analogy is locking the front door to your house but leaving your windows open. Learn what is a mainframe integrity vulnerability, why you care, what responsibilities you have with regards to integrity, what you can I do to stay compliant.

Speakers:
Ray Overby, Co-Founder & CTO, Key Resources Inc.

Reciprocity: SumTotal’s Journey From Zero to Strategic Risk Management

Is your organization strong on compliance but lacking when it comes to risk management? Join Sean McClanahan, Compliance Manager of SumTotal’s Cloud Operations (part of Cornerstone OnDemand), and Rob Ellis, SVP of Product Strategy at Reciprocity, as they discuss SumTotal’s journey from a foundational risk program to a strategic approach that ties risk to business priorities.  You’ll leave seeing risk differently, delivering better outcomes with less effort and more effectively communicating risk to the C-Suite and Board.

Speakers:
Rob Ellis, Senior Vice President of Product Strategy, Reciprocity
Sean McClanahan, Compliance Manager, SumTotal (part of Cornerstone OnDemand)

Tanium: Transformative Approach to Endpoint Management & Risk Mitigation

Hear from CIOs Jake McClean and Tom Molden on using a transformative approach to IT Operations, Risk Mitigation & Threat Response. They will cover how Tanium uses converged endpoint management to see, control, and remediate every endpoint for Tanium’s thousands of employees around the world, all while getting their weekends back and enabling a more streamlined IT and security organization.

Speakers:
Jake McClean, CIO, Tanium
Tom Molden, CIO Sales, Tanium

ThreatLocker: The Total Economic Impact™ Of ThreatLocker

In this case study, users will learn about the key challenges regarding the cybersecurity landscape that’s solved with the ThreatLocker Solution as well as the cost-benefit analysis and total economic impact it had on it’s users

Speakers:
Ryan Bowman, Director of Solutions Engineering, ThreatLocker

1:05 pm – 2:05 pm ET

Lunch & Marketplace Break

Marketplace breaks are your chance to connect with sponsors and catch up with colleagues on the show floor.

Check out our Sponsor Spotlights to learn more about the next great solution for your team. See below for the list of spotlights during this time.

Attend one session:

BeyondTrust: Integrating Privileged Access Management into Your Current Workflow and Processes

Implementing a PAM solution provides impressive features and improved security. As beneficial as this is, it can be difficult to incorporate into your current processes. Because of this PAM is often met with resistance. In this session we will: review the benefits of implementing a PAM solution, look at a typical new hire onboard and how that relates to PAM, least privilege, and session management.

Speakers:
Jason Silva, Senior Solutions Architect, BeyondTrust

HackerOne: Use Ethical Hackers to Resist Attack

Attack surfaces are expanding, spurred on by the continuous release of new digital services and business transformation. In this session, you will learn why it’s time to implement an attack resistance management strategy to find unknown risks missed by automated tools, then unlock the security expertise of ethical hackers to identify critical gaps and prioritize fixes for your exploitable assets.

Speakers:
Sean Ryan, Senior Principal Technical Product Marketing Manager , HackerOne

Illumio: Fortify your Ransomware defenses using Zero Trust Segmentation

Over the past decade, ransomware attacks have plagued organizations globally. Unfortunately, traditional perimeter-based solutions cannot keep up. Once inside, attackers have unfettered access to the network and can move laterally infecting workloads along their path. With the fast-changing security landscape and evolution of attack vectors, organizations need to change their mindset from breach prevention to breach containment. Building robust cyber resilience requires organizations to embrace Zero Trust Segmentation.

Speakers:
Aditya Krishnan, Technical Marketing Engineer, Illumio

Kyndryl: Recovery Retainer Enables Healthcare Providers to Prevent a Cybergeddon

In the months following the start of the pandemic, as ransomware groups targeted the healthcare industry, the customer experienced a ransomware incident which, prior to containment, encrypted 2500+ servers and caused a shut down of its application systems and network. Using its minimum viable company (MVC) strategy, Kyndryl lead the recovery effort ensuring restoration for a phased business resumption, minimizing impact of the attack and also helped develop processes to minimize impact of future attacks.

Speakers:
Rhonda Childress, Chief Innovation Officer, Kyndryl
John Greenough, Head of Market Relations, Security & Resiliency, Kyndryl

Government Lunch Meetup

Connect with your fellow peers in Public Sector for a private networking lunch. Guest Keynote Speaker, Robert M. Lee, CEO & Co-Founder of Dragos, will be in attendance for an exclusive Q&A prior to taking the stage.

Speakers:
Robert M. Lee, CEO & Co-Founder, Dragos

Executive Leadership Exchange (Invite-Only): Networking Lunch

Join a private lunch with fellow ELE attendees.

Speakers:
Jess Burn, Senior Analyst, Forrester
Jinan Budge, VP, Principal Analyst, Forrester
David Levine, VP, Executive Partner, Forrester

2:05 pm – 2:35 pm ET

Breakout Sessions

Tackle Risk And Compliance Head On
Finding The Single Source of Supply Chain Risk & Other Ill-Fated Quests

Two years and two global crises later, supply chains are operating in a state of continuous chaos. Beyond memes and headlines, “supply chain issues” are still responsible for shortages and delays for consumers and missed opportunities for businesses. This session will explore: 

  • What’s continuing to fuel the global supply chain crisis. 
  • How connectedness, dependencies, and systemic risks create a domino effect. 
  • What’s risk pros’ role in stabilizing the impact of supply chain disruption. 

Speakers:
Alla Valente, Senior Analyst, Forrester

READ MORE +READ LESS -
Elevate Trust With Privacy, Data Security, And Identity
The Promise And Hype Of Privacy-Preserving Technologies

Privacy-preserving technologies (PPTs) promise privacy protections to the highest standard while enabling organizations to achieve data’s full potential through sophisticated data analytics. From privacy and security professionals to data scientists and technologists, privacy-preserving technologies are the technologies that everybody is talking about. Is the hype real? Join this session to learn about: 

  • What are privacy preserving technologies (PPTs)? How do they work? 
  • What problems do PPTs solve? What problems don’t they solve?. 
  • What  PPT use cases are early adopters deploying? What lessons have they have learned? 

Speakers:
Enza Iannopollo, Principal Analyst, Forrester

READ MORE +READ LESS -
Lead Through Unprecedented Change
Communicating Value: A CISO’s Business Acumen Primer for 2023

Over the past 20 years cybersecurity has evolved from a cost center and perceived roadblock risk to a market leading capability with the power to differentiate and increase competitive advantage. This places more pressure on and provides greater opportunity for security leaders better align with business models and strategies set forth by their organizations. To do so requires a clearer line-of-sight from security investment to business performance. The biggest barrier to achieving this is one of translation – truly speaking the language of risk while articulating security’s value. This session will deliver a primer on the leading concepts that strengthen CISOs’ business acumen and substantiate their place as strategic partners. 

Join this session to:  

  • Get a valuable cheat code for translating finance and ELT terms 
  • Learn how to discuss risk using terms and context understood by the board 
  • Develop security strategies to carry market value further 

Speakers:
Christopher Gilchrist, Principal Analyst, Forrester

READ MORE +READ LESS -
Bolster Defenses With Zero Trust
CISOs Need To Flip The Script To Secure OT

From the Colonial Pipeline attack to PIPEDREAM, critical infrastructure providers are facing more public cyberattacks than they have before. They are also undergoing major digital transformation in the form of OT/IT convergence, driven by greater efficiency, increased capabilities, and potential cost savings. This change, however, is exposing critical infrastructure to increased risk of disruptive cyberattacks at a critical time. During this session, we will explore:  

  • The current state of OT/IT convergence.  
  • The threat landscape for critical infrastructure providers 
  • How to interweave IT security principles with operations technology (OT) expertise to protect OT environments. 

Speakers:
Brian Wrozek, Principal Analyst, Forrester

READ MORE +READ LESS -
Executive Leadership Exchange (Invite-Only)
Emerging Security Tech – Invest Or Ignore

We’re bringing together a panel of Forrester analysts to discuss and debate emerging security technologies and help you cut through the hype and provide guidance on what solutions you should keep your eyes on for 2023 and beyond. This session will give you an opportunity to weigh in on the short- and long-term value and viability of these technologies.

Speakers:
Jeff Pollard, VP, Principal Analyst, Forrester
Allie Mellen, Senior Analyst, Forrester
Sandy Carielli, Principal Analyst, Forrester
Andras Cser, VP, Principal Analyst, Forrester
Joseph Blankenship, VP, Research Director, Forrester

READ MORE +READ LESS -
2:40 pm – 3:10 pm ET

Case Study Sessions

Hear real world case studies showcasing the value of partnering with the right technology provider.

Attend one session:

Code42: The Impact of Cultural Drift on Data Protection

Every organization’s culture has a true north that demonstrates how secure that organizations’ data is. As security leaders, we have a choice – is it better to correct behavioral drift away from this true north at the time it happens or give it free reign to establish a new norm? Join to learn more about the critical role culture plays in building a security aware organization as new technologies bring new vectors for data exposure when behavior is unchecked.

Speakers:
Rob Juncker, CTO, Code42

Confiant: Why malvertising matters to your endpoint defense

The digital landscape has dramatically evolved over the past ten years. Phishing, malware attacks and crypto scams using ads as a vector are on the rise. Sophisticated cyber criminals are a threat to any digital user and enterprise organization. This case study will go into detail and provide insight into the detection of Mac malware attacks, malware families and notarized Mac malware.

Speakers:
Louis-David “LD” Mangin, CEO and Co-Founder, Confiant

IBM: How Bed Bath & Beyond scaled their security and risk management program with IBM Security

With nearly a thousand stores and decades as a leading retailer, Bed Bath & Beyond always has the security of its business assets and its customers’ sensitive information as a top priority. As they’ve battled the impact of COVID, as well as changes in strategic direction that are impacting many large organizations, it’s become even more critical to enhance the cybersecurity efforts via policy and standards analysis, risk quantification, and the continuous safeguarding of customers credit card data. Join us for this session, to hear about the on-going journey of building out a leading program in information security and risk management, as well as where they plan to focus on staying ahead of future threats.

Speakers:
Tameka Foster, Director, Risk Operations Center, Bed Bath & Beyond
Rebecca Dodson, Partner, Security Strategy Risk & Compliance, Americas, IBM Security

StrikeReady: Cyber Warfare: Transforming SOC through Adaptive Defense

Geopolitical issues have spilled from urban warfare into cyber warfare, adding a new challenge to security programs. Consequently, we implemented an Active Defense strategy to bolster our defense against aggressive adversaries and respond effectively, as well as transform our Security Operations Center (SOC). This yielded astonishing results, and I’d like to share the blueprint with you.

Speakers:
Wasif Khan, V.P. InfoSec Operations, CNA Insurance

ThreatConnect: Quantifying cyber risk in financial terms

Cyber risk is a continuously changing risk that companies struggle to understand and mitigate. Many companies today try to measure and communicate cyber risk with heat maps, technical metrics, or with subjective analysis. ThreatConnect and Snowflake, an RQ customer, will walk you through a case study to describe how quantified risk is being used to identify, communicate and begin to mitigate cyber risk in a data driven, defensible manner.

Speakers:
Josh Mckibben, Director of Global Security Compliance & Risk , Snowflake
Jerry Caponera, General Manager, Cyber Risk Quantification Products, ThreatConnect

Executive Leadership Exchange (Invite-Only): Early Career Pros and CISOs: Bridging the Gap

In most organizations, executives spend limited amounts of time with early career professionals, leaving most conversations and interactions to their managers. Yet every new hire represents a new opportunity for the security team to cultivate – and retain — talent. In this session, VP and Principal Analyst Jeff Pollard will debut new research on what entry level security personnel want from CISOs, and what they need CISOs to know about them. First, Jeff will share insights from research interviews with entry and early career security personnel that will help CISOs understand their unique perspective. The session will then feature an interactive discussion and peer exchange where attendees will share their best practices for setting up early career team members for success and longevity in their organizations. 

Speakers:
Jeff Pollard, VP, Principal Analyst, Forrester

3:15 pm – 3:45 pm ET

Breakout Sessions

Tackle Risk And Compliance Head On
Managing Cloud Security Risk And Compliance

Adoption of cloud infrastructure (infrastructure as a service, platform as a service, software as a service, private cloud), cloud-first IT strategy, and cloud migrations all highlight the importance of managing cloud security risk and compliance. Organizations, in their quest to control their cloud infrastructure and protect the data they host, must: 1) protect cloud platforms’ configuration and identities; 2) extend on-premises operating system-level security to cloud hypervisors and operating systems; and 3) apply robust protections to container runtimes and orchestration systems — all while maintaining regulatory compliance. In this session, you will learn about: 

  • The cloud security tooling landscape and architectural choices for cloud security. 
  • Key technical and nontechnical best practices. 
  • Forrester’s predictions for cloud security. 

Speakers:
Andras Cser, VP, Principal Analyst, Forrester

READ MORE +READ LESS -
Elevate Trust With Privacy, Data Security, And Identity
Customer Data: From Privacy Risk To Opportunity

The customer data landscape is shifting rapidly as a proliferation of privacy laws, companies such as Apple and Google, and rising consumer privacy expectations limit how much consumer data is readily available, and yet your marketing colleagues are doubling down on their efforts to capture more customer data. Join this session to learn: 

  • What market forces are leading marketers to be so data-hungry. 
  • How customer-facing experiences can help engender (or impede!) trust. 
  • How to break down departmental silos to collaborate with your marketing team. 

Speakers:
Stephanie Liu, Analyst, Forrester

READ MORE +READ LESS -
Lead Through Unprecedented Change
Cybersecurity Drives Revenue: How To Win Every Budget Battle

Whether your company continues to grow or gets caught up in macroeconomic headwinds, expect more pressure on security leaders to explain current spending and more challenges from the CFO when requesting budget increases. This session will explain how to leverage three factors that make winning budget battles easier, provide a methodology to incorporate them into your business case, and equip you with the ability to tell the story that gets you the budget you need.

Join this session to:

  • Utilize three externalities to make cybersecurity budgets a must-have investment area.
    • Intense customer requests
    • Aggressive cyber insurance mandates
    • Increase in regulatory requirements
  • Make impact and effectiveness the foundation of your business case for increased cybersecurity investment.
  • Weave a compelling narrative with storytelling that confirms this fact: Cybersecurity must be a core competency of your enterprise.

Speakers:
Jeff Pollard, VP, Principal Analyst, Forrester

READ MORE +READ LESS -
Bolster Defenses With Zero Trust
The Truth Behind ML’s Madness: How AI Is Actually Used In Detection And Response

Deobfuscating how AI and machine learning (ML) are used in security technologies today is more challenging than reverse-engineering the latest malware from Wizard Spider. But it doesn’t have to be, and knowing what’s going on under the hood can help inform your detection and response strategy. We must break free of the hype around AI to uncover how it’s actually used in security technologies and how to leverage it to the fullest in the security operations center (SOC). In this session, you will learn: 

  • What AI/ML is used for in security products. 
  • How to better leverage AI/ML in the SOC. 
  • How future advancements in AI/ML will change security (really). 

Speakers:
Allie Mellen, Senior Analyst, Forrester

READ MORE +READ LESS -
Executive Leadership Exchange (Invite-Only)
Live Peer Insights

Bring your security, risk, and privacy questions and challenges to this exclusive, analyst-facilitated discussion where security, risk, and privacy leaders will share real-time insight, best practices, and advice on a range of topics. Be prepared to give prescriptive advice while learning from the many perspectives and experiences of peers across industries. 

Speakers:
Jess Burn, Senior Analyst, Forrester
David Levine, VP, Executive Partner, Forrester

READ MORE +READ LESS -
3:45 pm – 4:30 pm ET

Marketplace Break

Marketplace breaks are your chance to connect with sponsors and catch up with colleagues on the show floor.

Check out our Sponsor Spotlights to learn more about the next great solution for your team. See below for the list of spotlights during this time.

Attend one session:

Qmulos: Empowering Real-Time Risk Insights Through Converged Continuous Compliance

We know “compliance is not security.” But why? Because we’ve been conditioned to see compliance as a set of checkboxes: No security value or insights to inform decisions, just a cost of doing business. No reason these should be separate functions, yet most enterprises struggle to derive security value from their compliance programs. As Continuous Monitoring becomes a standard requirement, static compliance won’t be an option. Learn how to evolve to Converged Continuous Compliance.

Speakers:
Igor Volovich, Vice President, Compliance Strategy, Qmulos

Rapid7: Precision, Efficiency and Speed: Key Outcomes of XDR

People continue to debate about XDR. Is it a product? An approach? Some use the XDR acronym, but aren’t clear what the capabilities are. Whatever the future holds, Rapid7 believes that XDR outcomes are something for which every organization should strive. We believe the best solutions out there incorporate SIEM capabilities, threat intelligence/digital risk protection, and automation and orchestration that help speed response times and greatly decrease your risk exposure.

Speakers:
Jeffrey Gardner, Detection & Response Practice Advisor, Rapid7

Terranova Security: The Importance of Building a Security-Aware Culture

Growing a security-aware culture is essential to keep your organization secure. Discover how you can do just that by leveraging the Security Culture Index (SCI). This feature enables you to transcend one-dimensional risk assessments with unique, data-driven ratings for your organization’s end-users. In this session, you’ll learn how end-users will benefit from SCI info, the components that fuel successful SCI implementation, and you’ll also get an overview of the Terranova Security Awareness Platform.

Speakers:
Charles Boisseau, Director of Sales – Americas & EMEA, Terranova Security

4:00 pm – 4:30 pm ET

Analyst-Led Meetups

Spend some time in these small, interactive group roundtable discussions focused on key security topics.  Forrester analysts will kick-off the discussion, but bring your topic or question to the meetup and help spark the conversation. First-come, first-served.

Attend one session:

A CISOs Guide To Leading Change

During this session, you will learn from peers how they identify, align with, and influence critical stakeholders whose support is needed to successfully execute on their cybersecurity programs. Below are the topics we will cover:

  • Who are the supporters, and detractors for your cybersecurity program, and how do you influence them?
  • How do you deal with organizational politics?
  • How do you lead your organization, and your team, through change?

Speakers:
Jinan Budge, VP, Principal Analyst, Forrester

Zero Trust In the Cloud

During this session, you will learn from your peers how they are thinking about cloud and ZT. Below are the topics we’ll explore during our conversation.

  • What is your organization’s actual threat surface in the cloud?
  • How is cloud facilitating or inhibiting your journey to Zero Trust?
  • How can you work across the organization to apply Zero Trust, to the cloud and elsewhere.

Speakers:
David Holmes, Senior Research Analyst, Forrester

Planning For Post-Quantum Encryption

During this session, you will learn from your peers how they are approaching the transition from RSA and ECC to post-quantum encryption. Below are the topics we’ll explore during our conversation.

  • Timelines for transition and where to start
  • The NIST post-quantum competition
  • Implementing cryptographic migration internally and working with third parties

Speakers:
Sandy Carielli, Principal Analyst, Forrester

AfterWords: Geopolitical Risk Will Redefine Security Strategies For The Next Decade

Ever wanted a chance to go backstage and be a part of the conversations that go on in the Green Room? Well now is your time! In this casual Q&A session, our opening keynoters, Allie Mellen and Renee Murphy, will be available to answer any questions you had coming out of their opening session.

Speakers:
Allie Mellen, Senior Analyst, Forrester
Renee Murphy, Principal Analyst, Forrester

4:30 pm – 5:00 pm ET

Guest Keynote - ICS Threats: From Pipe Dream To PIPEDREAM

Threats to industrial control systems (ICS) and critical infrastructure are nothing new. What’s changed is the pervasiveness of the ability to carry out cyber-attacks against these systems and the geopolitical environment which makes these systems prime targets by adversaries. Robert M. Lee, CEO and Co-founder of Dragos will discuss ICS threats from cascading IT attacks to today’s ICS-focused malware as well as strategies for defending modern infrastructure.

 

Speakers:
Robert M. Lee, CEO & Co-Founder, Dragos

5:05 pm – 5:35 pm ET

Keynote: Unleash Your Potential With ZTE

Amidst the cacophony of Zero Trust messaging, Zero Trust Edge has emerged as an ideal technology for security leaders to embrace. The combination of networking and security controls positions ZTE as a simple solution for multiple problems and accelerates overall ZT adoption. This session will focus on the following areas: 

  • ZTE- what it is, and what it isn’t 
  • How ZTE enables edge computing 
  • How and why to apply ZTE from an organizational perspective 

Speakers:
Heath Mullins, Sr. Analyst, Forrester

5:35 pm – 6:35 pm ET

Evening Reception

Join us for an opening night reception full of networking, fun, food and refreshments.

Wednesday Nov 9

8:30 am – 9:30 am ET

Boardroom Session with ThreatLocker: Zero Trust at the Endpoint: Fighting Ransomware

The Zero Trust framework is based on the principle of “never trust, always verify.”  Join us to learn about Zero Trust, how to adopt it for endpoints, and the technologies you need to take control of your environment in the fight against ransomware.

This session will have limited capacity and is first come, first served. Breakfast will be provided.

Speakers:
Ryan Bowman, Director of Solutions Engineering, ThreatLocker

9:30 am – 10:10 am ET

Keynote: From CISO To Chief Trust Officer: The Next Step Forward In CISO Career Paths

Sparked by the trust imperative and in response to companies moving away from business models that put them at odds with their customers, a new C-suite role has emerged: chief trust officer. It’s also the next step in the career path for CISOs. No other role in the C-suite brings the insights and empathy necessary to become an effective CTrO as the CISO. The trust imperative will force firms to accept that cybersecurity is a core competency, requiring CISOs to become CTrOs to inspire trust and secure the future. Attend this keynote to: 

  • Understand how informal customer-facing activity helped train CISOs to step in as CTrOs.  
  • Learn how the CTrO role helps CISOs escape the clutches of IT to truly become a C-level executive. 
  • Find out how other CISOs became CTrOs: some by design and some by accident.  
  • Discover the essential elements of the CTrO organization and responsibilities. 

Speakers:
Jeff Pollard, VP, Principal Analyst, Forrester

10:15 am – 10:45 am ET

Keynote Panel: Take A Zero Trust Approach To Threat Prevention, Detection, And Response

This panel, moderated by Forrester Research VP, Group Director, Laura Koetzle, will be a dynamic discussion of threat prevention, detection, and response using Zero Trust principles by security experts from technology partners. Forrester’s Zero Trust model of information security protects data and systems by denying access to applications and data by default, implementing security monitoring, and automating response actions. Attend this session to see how these capabilities work together as a comprehensive security approach.

Speakers:
Laura Koetzle, VP, Group Director, Forrester
Chris Meenan, VP Product Management, IBM
Jerry Caponera, General Manager, Cyber Risk Quantification Products, ThreatConnect
Ryan Bowman, Director of Solutions Engineering, ThreatLocker

10:50 am – 11:30 pm ET

Marketplace Break

Marketplace breaks are your chance to connect with sponsors and catch up with colleagues on the show floor.

Check out our Sponsor Spotlights to learn more about the next great solution for your team. See below for the list of spotlights during this time.

Attend one session:

Critical Start: Reduce Risk Through Increased Cybersecurity Team Productivity

As cybersecurity leaders and managers prepare for scrutiny on spending budgets due to macro inflationary pressures, organizations are looking to automation and managed services providers to realize more value from their technical security controls investments. Learn how you can reduce your organizational risk and improve your security posture by focusing on increasing the effectiveness of your security operations center through metric-driven productivity gains.

Speakers:
Chris Carlson, SVP Product, Critical Start

ThreatConnect: Using data to drive cyber risk quantification and ROI based mitigation

According to recent reports, 70% of Security and Risk Management (SRM) leaders will be deploying Cyber Risk Quantification (CRQ) solutions that are driven by statistical and machine learning techniques in the next two years. ThreatConnect RQ is the only CRQ solution that provides multiple models for calculating cyber risk in financial terms including FAIR, Semi Automated FAIR, and Machine Learning / Statistical methods. This session will provide an overview of CRQ, how and where various models apply, and how you can rapidly deploy and make actionable recommendations from CRQ using a data driven approach.

Speakers:
Jerry Caponera, General Manager, Cyber Risk Quantification Products, ThreatConnect

11:00 am – 11:30 am ET

AfterWords: From CISO to Chief Trust Officer: The Next Step Forward In CISO Career Paths

Ever wanted a chance to go backstage and be a part of the conversations that go on in the Green Room? Well now is your time! In this casual Q&A session, our opening keynote, Jeff Pollard, will be available to answer any questions you had coming out of his session.

Speakers:
Jeff Pollard, VP, Principal Analyst, Forrester

11:00 am – 12:00 pm ET

Executive Leadership Exchange (Invite-Only): Workshop - Building A Healthy Security Team Culture

For years, the cybersecurity industry has suffered from both a staff and skills shortage. Forrester has determined much of it is self-inflicted – the result of counterproductive practices for recruiting, training, and retaining people and a well-deserved reputation for fostering toxic cultures. This session will allow the participants to deep dive into these issues, and share how they can instill the behavioral norms that will reshape any team into a healthy and high-performing one.

Speakers:
Jinan Budge, VP, Principal Analyst, Forrester
Heidi Shey, Principal Analyst, Forrester

11:30 am – 12:00 pm ET

Breakout Sessions

Tackle Risk And Compliance Head On
Dodgeball, Your New Favorite Sport: Systemic Risks

Dodgeball is a humiliating sport. If you have weak arms and can’t get out of the way, you will get hit. Cybersecurity is in a dodgeball competition with systemic risks and doesn’t even know it. You, too, can dodge systemic-risk events or, better yet, mitigate those risks by catching them. During this session, we’ll cover: 

  • How cybersecurity is not immune to the humiliating sport that is systemic risks. 
  • What ball is going to hit your blindside by understanding the 2022 systemic risk ranking. 
  • How to plan for and communicate cybersecurity systemic-risk events (way to catch that ball!). 

Speakers:
Renee Murphy, Principal Analyst, Forrester

READ MORE +READ LESS -
Elevate Trust With Privacy, Data Security, And Identity
Biometrics: The Good, The Bad, And The Ugly

Biometrics usage is at a crossroads. While it provides valuable convenience and ease of use for consumers, biometrics also opens a potential hornet’s nest of privacy and compliance concerns. Organizations must also select from a wide range of biometric options, including voice, finger, face, and other emerging technologies. This session will explore: 

  • Key use cases and industries that are deploying biometrics. 
  • What regulatory forces are influencing biometrics around privacy protection. 
  • How to deploy biometrics in a privacy-centric way. 

Speakers:
Merritt Maxim, VP, Research Director, Forrester

READ MORE +READ LESS -
Lead Through Unprecedented Change
Panel Discussion: Amplify Security’s Influence And Impact With BISOs

Businesses are charging forward with innovative ways to win, serve, and retain customers, putting greater pressure on all functions to move quickly — and on the CISO to keep pace. But in large organizations with multiple business units, building and maintaining a bridge that connects business objectives with security requirements cannot fall on the CISO alone. Enter the business information security officer (BISO). Effective BISOs seamlessly transition between diplomat, therapist, translator, negotiator, and cybersecurity expert and, in doing so, enable business leaders to make security-minded, risk-informed decisions. This session will provide you valuable insights into the BISO role and best practices for empowering BISOs in your organization. 

Join this session to: 

  • Hire or develop talent with the right skill set for the role. 
  • Overcome common challenges in integrating BISOs into business units. 
  • Harness the power of effective collaboration and empower the organization to go to market on trust. 

Speakers:
Jess Burn, Senior Analyst, Forrester
Vivien Osamiluyi, Business Information Security Officer and Privacy Product Owner, Comcast
Kathy Washenberger, Executive Director Information Security/GRC, Deluxe Corporation
James Binford, Business Information Security Officer, Humana

READ MORE +READ LESS -
Bolster Defenses With Zero Trust
Implementing ZTE For All Edges In An Enterprisewide Networking Fabric

The current set of Zero Trust Edge (ZTE) vendors offer solutions to connect remote locations and workers to a cloud platform but can’t address hybrid or multicloud environments. They see cloud edge different than remote location edge. (Hint. It’s not). Traditional networking vendors can’t help either. They are too busy fighting over private data center networking infrastructure carcasses. In the shadows between ZTE vendors and traditional network vendors, a new set of vendors has emerged. But why? Using the ZTE framework highlighted in “Unleash Your Potential With ZTE” keynote, this session will explore the current state of ZTE vendors relative to the ZTE model, highlight the emerging secure multi-cloud network overlay vendors, and lay out the rationale for why these new vendors and ZTE vendors will merge to create a better ZTE vendor solution. In addition, Forrester will cover what this convergence means to business and technology leaders and how to maximize the potential from ZTE going forward.

Speakers:
Andre Kindness, Principal Analyst, Forrester

READ MORE +READ LESS -
12:05 pm – 12:35 pm ET

Case Study Sessions

Hear real world case studies showcasing the value of partnering with the right technology provider.

Attend one session:

BeyondTrust: Best Practices: Privileged Access Management Security and Privilege Protection

The term best practice is used a lot, and the definition can differ between organizations based on risk appetite and tolerance. Similarly, the term, ‘PAM’ is also often mis or overused. This session will look at how PAM is defined today, understanding how privileges are used within your organization, and some useful tips to start or mature your security model. This will help your organization move towards just-in-time and a Zero Trust security model.

Speakers:
Jason Silva, Senior Solutions Architect, BeyondTrust

CyberProof: Unexpected Benefits of Large-Scale Cloud Native Security Architectures

CyberProof transformed a global insurance company in a highly regulated market to a cloud native architecture. As an early adopter of the Microsoft security stack including the Microsoft Sentinel SIEM, CyberProof and our client overcame many challenges to meet the needs of this complex transformation while achieving many expected and unexpected benefits. As a result, we believe the cloud native security architecture is the future and the time to transform is now. Attend this session to understand why.

Speakers:
Tony Velleca, CEO, CyberProof

KnowBe4: Building a Security and Risk Conscious Culture

In this session, participants will better understand how to achieve a higher impact security culture and how to view awareness through the lens of organizational culture.

Speakers:
Joanna Huisman, SVP of Strategic Insights & Research, KnowBe4

Kyndryl: Learn Lessons from Hundreds of Ransomware Recoveries and Help Cybergeddon

Cyberattacks and ransomware incidents are increasing in frequency and complexity. Successful attacks can be swift and crippling, leading to a ‘Cybergeddon’. Recovery can often take weeks and taxes the delivery teams. Learn from experts who have led recoveries from over hundreds of ransomware and other cyber incidents over the past years, talk about their learnings and best practices for recovering from such attacks and maintaining the core purpose and integrity under duress

Speakers:
John Greenough, Head of Market Relations, Security & Resiliency, Kyndryl
Rhonda Childress, Chief Innovation Officer, Kyndryl

Onspring: Success Story Spotlight: American Family Insurance

Development in Onspring can be very rapid, but what do you do when everything around you is changing? Learn how to navigate your use of Onspring while your business, the processes, and roles continue to change. This session will also review how you can integrate Onspring with other internal technologies, and share advice on how to avoid breaking existing infrastructure and harmonize cross-functional teams.

Speakers:
John Aaholm, GRC Technology Lead, American Family Insurance

12:35 pm – 1:35 pm ET

Lunch & Marketplace Break

Marketplace breaks are your chance to connect with sponsors and catch up with colleagues on the show floor.

Check out our Sponsor Spotlights to learn more about the next great solution for your team. See below for the list of spotlights during this time.

Attend one session:

IBM: IBM Security Active Governance Services (AGS) and Xacta® Demo

Come see the power of automation in the new tailored IBM Security AGS solution that operationalizes cybersecurity compliance and ensures both time-and cost-effectiveness. In this demo you will learn how the most time-consuming tasks of compliance can be automated and streamlined such as control selection, implementation, validation, continuous monitoring, and more.

Speakers:
Evelyn Anderson, IBM Distinguished Engineer, IBM Master Inventor, IBM
Hugh Barrett, Chief Product Officer, Xacta

Orca Security: Cloud Security - How Attackers Get to your Data

You might think your storage bucket is secure because your CSPM is not flagging any misconfigurations. But does that stop an attacker from finding a path? In this session, we will review Orca’s agentless CNAPP solution and how context prioritizes risk to assets and business impact.

Speakers:
Gus Evangelakos, Director of Field Engineering, Orca Security

Reciprocity: See Risk Differently! Start with your Business Priorities!

LThe impact of risk on business priorities can be hard to see making InfoSec investments difficult to justify. Yet, it’s your responsibility to help your Executives choose the right level of investment to defensibly protect your company as it operates, grows and expands. Join Reciprocity as we discuss how a unified, real-time view of risk —framed around your business priorities—provides the contextual insight needed to clearly communicate with key stakeholders to make smart, strategic decisions.

Speakers:
Lori McKellar, Senior Director - Product Marketing, Reciprocity

Veterans Appreciation Lunch

Leading up to Veterans Day, we invite all those who have served or are currently serving our country to join us for a special appreciation lunch.

Government Lunch Meetup

Connect with your fellow peers in Public Sector for a private networking lunch.

1:35 pm – 2:05 pm ET

Breakout Sessions

Tackle Risk And Compliance Head On
Secure Software Supply Chain Essentials

The weakest link in your software supply chain is security. The NIST’s special publication, “Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations,” provides guidelines on how to strengthen the supply chain and reduce the risk to your enterprise. For security leaders, this is a great tool to get your executive team, risk management team, and the rest of the organization aligned and working toward a more secure supply chain. During this session, we’ll explore the following questions: 

  • Why do all enterprises, not just government suppliers, need to be aware of the NIST guidelines?  
  • What are the software security considerations put forward by NIST? 
  • How can you start putting the guidelines into practice? 

Speakers:
Janet Worthington, Senior Analyst, Forrester

READ MORE +READ LESS -
Elevate Trust With Privacy, Data Security, And Identity
The State Of Decentralized Digital Identities

Decentralized digital identities (DDIs, also known as self-sovereign identities) represent the next major paradigm shift in identity and access management (IAM). Privacy-conscious, end-user-centric, and extending beyond registration and authentication into credentials, authorizations, and proofs, DDI infrastructures are set to permanently change the IAM landscape. In this session, you will learn about: 

  • Use case patterns for DDIs. 
  • Key strengths and weaknesses of DDIs. 
  • The state of adoption, real-life examples, and future opportunities for DDI. 

Speakers:
Andras Cser, VP, Principal Analyst, Forrester

READ MORE +READ LESS -
Lead Through Unprecedented Change
Beyond The B.S. (Or B.A.): Buck Tradition To Hire Early-Career Security Talent

It’s time for CISOs to stop waiting on institutions for change and take on the cybersecurity staffing shortage themselves. This session, filled with real-world examples, will make the case for breaking with traditional hiring practices at the entry level and forming new collaborations to cultivate a bigger, more diverse cybersecurity talent pool, a pool that includes underrepresented minorities, women, veterans, and populations of workers with transferable skills. Join this session to:  

  • Bust outdated four-year degree requirements and move away from restrictive applicant tracking systems and screening practices. 
  • Start or support new talent development efforts in your region or industry. 
  • Cultivate the time and ability of your management team to train early-career talent. 

Speakers:
Jess Burn, Senior Analyst, Forrester
David McLeod, Vice President and Chief Information Security Officer, Cox Enterprises

READ MORE +READ LESS -
Bolster Defenses With Zero Trust
Rethinking How To Secure The Anywhere-Work Endpoint

For many, work has stopped being tied to an office — not solely because of the COVID-19 pandemic but also because of the shift to remote access. In a world where users are no longer limited to fixed locations or specific devices, the importance of traditional endpoints diminishes and is replaced by how users interact with remote data. Security leaders must adapt how they structure their endpoint security strategy to protect business information while ensuring user privacy and flexibility. In this session, we will explore:  

  • The current state of securing anywhere work. 
  • How to protect while ensuring user privacy in a “bring your own device” world. 
  • What the future of the endpoint looks like: the browser. 

Speakers:
Paddy Harrington, Senior Analyst, Forrester

READ MORE +READ LESS -
2:10 pm – 2:40 pm ET

Case Study Sessions

Hear real world case studies showcasing the value of partnering with the right technology provider.

Attend one session:

Censys: Using Censys to Discover Russian Ransomware C2 Networks

On June 24, 2022, Censys uncovered two Russian hosts leveraging a publicly-available Command and Control tool, a commercial exploit tool, direct links to two Bitcoin nodes, and ransomware kits tied to the Medusa Locker ransomware group by leveraging JARM and certificate pivoting as well as investigating historical postures of said hosts. We will walk you through this process and provide you with the playbook necessary to launch your own proactive threat hunts.

Speakers:
Matt Lembright, Director of Federal Applications, Censys

Illumio: Zero Trust Segmentation – ROI every step of the way

Segmentation projects have long suffered because traditional network centric approaches are overly complex, and are often unable to show any benefit until fully executed. Zero Trust Segmentation is different. Decoupled from the infrastructure, and focused on providing value at each step it enables agencies to progressively adopt microsegmentation to reduce the threats of ransomware and breaches, and continuously increase their cyber resilience – across data centre, endpoint and cloud. Join this session to find out how.

Speakers:
Gary Barlet, Federal Chief Technology Officer, Illumio

Interos: Supply Chain Resilience in a Time of Techtonic Geopolitical Shifts

For decades, the confluence of globalization and digitization drove supply chains toward increasing complexity, optimization, opaqueness, and insecurity. These physical and digital ties are fracturing at a rapid pace along geopolitical fault lines, powered by growing interstate hostilities, global trade wars, the Splinternet and emerging technologies, and an unprecedented pace of regulatory change. This session will detail the challenges and opportunities associated with these ‘techtonic’ shifts and how organizations can take steps toward greater resilience during significant geopolitical uncertainty. 

Speakers:
Dr. Andrea Little Limbago, VP of Research and Analytics , Interos

OneTrust: Scaling Trust by Design

Telus is on a mission to drive meaningful change — from transforming healthcare to making our food supply more sustainable to reducing our environmental footprint while connecting Canadians in need. Pam Snively has played a pivotal role in this transformation – evolving alongside the business from Chief Privacy Officer to the company’s first Chief Trust Officer. In this session she will share her journey transforming privacy, ethics, and data literacy at Telus to extend trust and make a meaningful impact.

Speakers:
Jason Sabourin, GRCP, CIPP/E, CIPM, CSPO Director, Product Management, OneTrust
Pam Snively, Chief Data & Trust Officer, TELUS

Tessian: Simplifying Email Data Loss Prevention with Behavioral Intelligence

Organizations are routinely faced with combating unknown risks and humans making mistakes that policies cannot predict. The impact can be catastrophic since investigating and mitigating these incidents drains time and resources. There is a simpler option that allows a deeper understanding into data loss prevention. Join B. Riley Financial and Tessian as we discuss how to reduce insider threat and data loss risk with a behavioral intelligence based approach.

Speakers:
Aaron J. Goodwin, Chief Information Security Officer , B. Riley Financial
Jen Gerhart, Senior Customer Success Manager, Tessian

2:40 pm – 3:20 pm ET

Marketplace Break

Marketplace breaks are your chance to connect with sponsors and catch up with colleagues on the show floor.

Check out our Sponsor Spotlights to learn more about the next great solution for your team. See below for the list of spotlights during this time.

Attend one session:

Code42 Incydr Prevents Data Loss from Insiders

Attendees will learn how Code42 Incydr, the leading Insider Risk Management solution, helps security teams detect, investigate and contain data loss. Combining the strengths of DLP, CASB, UEBA and Security Education and Awareness, Incydr stops data loss and theft without disrupting legitimate collaboration in cloud-based, hybrid work environments. This presentation addresses protection of valued IP – source code, business plans, Salesforce lists, regulated data – from moving to untrusted locations like Git, Google Drive, OneDrive and iCloud.

Speakers:
Joe Payne, President & CEO, Code42

StrikeReady: Performance-Enhancing AI-based Cyber Assistant

Ever faced with a time crunch and wanted to delegate some tasks? Or do you want to automate end-to-end without the pain of writing playbooks? Have you wondered what tools other cyber defenders use to handle certain situations? You’re not alone. StrikeReady has democratized human intelligence with the first-ever AI-based cyber assistant, CARA, so you can augment your skills, knowledge, and scale. Get to know CARA at this session.

Speakers:
Anurag Gurtu, Chief Product Officer, StrikeReady

2:50 pm – 3:20 pm ET

Analyst-Led Meetups

Spend some time in these small, interactive group roundtable discussions focused on key security topics.  Forrester analysts will kick-off the discussion, but bring your topic or question to the meetup and help spark the conversation. First-come, first-served.

Attend one session:

Real Talk: What XDR is and How and When to Leverage It

During this session, you will learn from your peers how they are approaching extended detection and response (XDR). Below are the topics we’ll explore during our conversation.

  • What is extended detection and response (XDR) beyond the buzzword?
  • What dependencies and requirements do you need to consider before leveraging XDR?
  • What are the top benefits and challenges security teams find using XDR?

Speakers:
Allie Mellen, Senior Analyst, Forrester

Balancing IAM with Employee Experience

During this session, you will learn from your peers how they are approaching the optimization of security and convenience for workforce identity access management and governance. Below are the topics we’ll explore during our conversation.

  • Joiner/Mover/Leaver user workflows and associated identity process challenges and improvements considering new remote workforce reality
  • Using the “passwordless journey” as a contributor to improving the digital employee experience
  • Reducing IAM operational burden to improve employee experience for those in support services, systems administration, and security operations roles

Speakers:
Geoff Cairns, Principal Analyst, Forrester

Securing cloud native technologies

During this session, you will learn from your peers how they are approaching Securing cloud native technologies. Below are the topics we’ll explore during our conversation.

  • What are the challenges of securing containers.
  • What goes into securing serverless applications and their ecosystem.
  • What are the benefits of infrastructure as code (Iac) security.

Speakers:
Janet Worthington, Senior Analyst, Forrester

3:20 pm – 3:50 pm ET

Keynote Panel: Insider Risk Reduction Requires Two Parts Culture, One Part Security

Insider incidents are responsible for almost a quarter of data breaches. Data breaches, however, are not the only risk that can be triggered by insiders. Organizations have to address the risk posed by insiders through accidental disclosure, policy violations, and malicious actions. Reducing insider risk, however, requires more of a cultural approach than a security-centric strategy. This panel will discuss an insider risk approach that focuses on the people, not technology.  

Speakers:
Joseph Blankenship, VP, Research Director, Forrester
Alla Valente, Senior Analyst, Forrester
Dr. Deanna D. Caputo, Chief Scientist for Insider Threat Capabilities and Senior Principal Behavioral Psychologist , MITRE
Ryan Boyer, Insider Threat Program Manager, CISA

4:00 pm – 4:30 pm ET

Keynote: Adopt Minimum Viable Security To Drive Trust

Business leaders prioritize both innovation and security — minimum viable security (MVS) bridges the two by aligning security requirements with the product’s context and the development team’s agility. MVS enables security leaders to contribute directly to the early-stage products that drive hypergrowth. During this session, we will: 

  • Explore why security teams struggle to support rapid prototyping and concept testing … and why that matters. 
  • Explain how an MVS approach adds the right level of security into early-stage products and positions them for security success later, without stymieing innovation today. 
  • Provide a framework and best practices to help security leaders understand what security issues to prioritize during early-stage product development. 

Speakers:
Sandy Carielli, Principal Analyst, Forrester

4:30 pm – 4:35 pm ET

Closing Remarks

with Stephanie Balaouras, VP, Group Director, Forrester

Early Access

Nov 7
  • 1:00 pm – 1:30 pm ETDiversity, Equity, Inclusion

Tuesday

Nov 8
  • 10:00 am – 11:20 am ETOpening Remarks & Keynotes
  • 12:00 pm – 1:05 pm ETBreakout Session
  • 2:05 pm – 3:45 pm ETBreakout & Case Study Sessions
  • 4:30 pm – 5:45 pm ETKeynote Sessions

Wednesday

Nov 9
  • 9:30 am – 10:50 am ETKeynote Sessions
  • 11:30 am – 12:35 pm ETBreakout & Case Study Sessions
  • 1:35 pm – 2:40 pm ETBreakout & Case Study Sessions
  • 3:20 pm – 4:35 pm ETKeynote Sessions & Closing Remarks

Tuesday Nov 8

10:00 am – 10:10 am ET

Welcome & Opening Remarks

with Stephanie Balaouras, VP, Group Director, Forrester

10:10 am – 10:40 am ET

Keynote: Securing The Future: Geopolitical Risk Will Redefine Security Strategies For The Next Decade

Globalization and international cooperation have passed their peak, thanks to global supply chain challenges and the threat of a third world war. As global powers work to protect themselves from the fallout, enterprises must prepare for how these changing global dynamics will affect their strategy and their security policies. Attend this keynote for insights into how geopolitical tension will define the next decade and how to adapt your security strategy to mitigate your risk. 

 

Speakers:
Renee Murphy, Principal Analyst, Forrester
Allie Mellen, Senior Analyst, Forrester

10:50 am – 11:20 am ET

Keynote: Privacy And The Immersive Experiences Of The Future

The metaverse does not exist yet. But the promise of a future defined by interoperable, immersive platforms is already driving companies’ investments, changing customer expectations, and shaping new engagement models. Individuals’ personal data, trusted identities, and attributes are fundamental pillars to achieve the promise of immersive digital experiences of the future. While many have plans on how to exploit sensitive personal data, only a few know how to keep them safe. Join this session to: 

  • Learn how the demand and the collection of individuals’ personal data will evolve as digital experiences become more immersive and intelligent. 
  • Assess the privacy risks of immersive experiences of the future. 
  • Design a privacy approach fit for future immersive experiences. 

Speakers:
Enza Iannopollo, Principal Analyst, Forrester

12:00 pm – 12:30 pm ET

Breakout Sessions

Tackle Risk And Compliance Head On
Seven Ransomware Business Continuity Considerations You Missed

New ransomware attack methods such as double extortion and the sheer number of attacks make businesses even more aware of the looming threat. As a result, business-continuity ransomware scenario plans are in demand, and business continuity pros are on the hot seat to plan, test, and invoke plans to save the business from embarrassment and unwarranted business downtime. During this session, we’ll cover: 

  • The new threats that business continuity plans need to anticipate. 
  • How to create a plan that takes into account more than just the recovery of services. 
  • Common missing considerations that cause long delays in restoring services. 

Speakers:
Amy DeMartine, VP, Research Director, Forrester

READ MORE +READ LESS -
Elevate Trust With Privacy, Data Security, And Identity
Redefining Data Security For The Modern Age

What is data security? What capabilities and controls are included, and from where? These are significant questions for every organization when every security technology product’s purpose is to protect your organization’s data, and more security and compliance functionality is being built into nonsecurity technologies and data platforms. This session will explore: 

  • Data security controls in the context of a Zero Trust approach. 
  • The future of data security and the anticipated challenges. 
  • Technology innovations to watch. 

Speakers:
Heidi Shey, Principal Analyst, Forrester

READ MORE +READ LESS -
Lead Through Unprecedented Change
From Compliance To Cultural Change: The Future Of Security Awareness And Training

Security awareness and training remains plagued by the legacy of compliance-driven and checkbox-oriented tools and methods. Transformational security leaders are pushing for change that reflects the importance of human-centric security and the necessity of behavioral change. The future of awareness and training won’t be about awareness and training but rather a shift to evidence-based human-risk management in the near term and, in the longer term, to outcomes that lead to behavioral change. This session will offer detailed guidance for security leaders on what they should demand from their awareness and training partners and help them predict what regulators will want in the future. Join this session to: 

  • Discover what effective awareness and training programs will look like in the next three years. 
  • Plan your investments in your awareness and training resources now. 
  • Achieve actual behavior and culture change as a result of your security awareness and training program. 

Speakers:
Jinan Budge, VP, Principal Analyst, Forrester

READ MORE +READ LESS -
Bolster Defenses With Zero Trust
Reinvent Your Vulnerability Management Program To Regain Trust

Vulnerability management is the hot potato of IT and security programs. It’s often neglected, lacks ownership, or is seen as a burdensome disruption to business. As the business adopts more technology and the drumbeat of critical vulnerability drops continues, security leaders must become strategic fortune-tellers, responsible for predicting and prioritizing vulnerabilities. During this session, we’ll explore: 

  • What key best practices you must use for vulnerability management policies.
  • How to prioritize remediation and build zero-day playbooks.
  • How to factor new technology adoption into your vulnerability management strategy. 

Speakers:
Erik Nost, Senior Analyst, Forrester

READ MORE +READ LESS -
12:35 pm – 1:05 pm ET

Case Study Sessions

Hear real world case studies showcasing the value of partnering with the right technology provider.

Attend one session:

Key Resources: Understanding Mainframe Integrity Vulnerabilities

The integrity of mainframe data and software is critical to the success of your business. Understanding mainframe integrity is a critical component of security strategies. It isn’t just about user authentication/ authorization. An appropriate analogy is locking the front door to your house but leaving your windows open. Learn what is a mainframe integrity vulnerability, why you care, what responsibilities you have with regards to integrity, what you can I do to stay compliant.

Speakers:
Ray Overby, Co-Founder & CTO, Key Resources Inc.

Reciprocity: SumTotal’s Journey From Zero to Strategic Risk Management

Is your organization strong on compliance but lacking when it comes to risk management? Join Sean McClanahan, Compliance Manager of SumTotal’s Cloud Operations (part of Cornerstone OnDemand), and Rob Ellis, SVP of Product Strategy at Reciprocity, as they discuss SumTotal’s journey from a foundational risk program to a strategic approach that ties risk to business priorities.  You’ll leave seeing risk differently, delivering better outcomes with less effort and more effectively communicating risk to the C-Suite and Board.

Speakers:
Rob Ellis, Senior Vice President of Product Strategy, Reciprocity
Sean McClanahan, Compliance Manager, SumTotal (part of Cornerstone OnDemand)

Tanium: Transformative Approach to Endpoint Management & Risk Mitigation

Hear from CIOs Jake McClean and Tom Molden on using a transformative approach to IT Operations, Risk Mitigation & Threat Response. They will cover how Tanium uses converged endpoint management to see, control, and remediate every endpoint for Tanium’s thousands of employees around the world, all while getting their weekends back and enabling a more streamlined IT and security organization.

Speakers:
Jake McClean, CIO, Tanium
Tom Molden, CIO Sales, Tanium

ThreatLocker: The Total Economic Impact™ Of ThreatLocker

In this case study, users will learn about the key challenges regarding the cybersecurity landscape that’s solved with the ThreatLocker Solution as well as the cost-benefit analysis and total economic impact it had on it’s users

Speakers:
Ryan Bowman, Director of Solutions Engineering, ThreatLocker

2:05 pm – 2:35 pm ET

Breakout Sessions

Tackle Risk And Compliance Head On
The Supply Chain Risk Crusade And Other Ill-Fated Quests

Two years and two global crises later, supply chains are operating in a state of continuous chaos. Beyond memes and headlines, “supply chain issues” are still responsible for shortages and delays for consumers and missed opportunities for businesses. This session will explore: 

  • What’s continuing to fuel the global supply chain crisis. 
  • How connectedness, dependencies, and systemic risks create a domino effect. 
  • What’s risk pros’ role in stabilizing the impact of supply chain disruption. 

Speakers:
Alla Valente, Senior Analyst, Forrester

READ MORE +READ LESS -
Elevate Trust With Privacy, Data Security, And Identity
The Promise And Hype Of Privacy-Preserving Technologies

Privacy-preserving technologies (PPTs) promise privacy protections to the highest standard while enabling organizations to achieve data’s full potential through sophisticated data analytics. From privacy and security professionals to data scientists and technologists, privacy-preserving technologies are the technologies that everybody is talking about. Is the hype real? Join this session to learn about: 

  • What are privacy preserving technologies (PPTs)? How do they work? 
  • What problems do PPTs solve? What problems don’t they solve?. 
  • What  PPT use cases are early adopters deploying? What lessons have they have learned? 

Speakers:
Enza Iannopollo, Principal Analyst, Forrester

READ MORE +READ LESS -
Lead Through Unprecedented Change
Communicating Value: A CISO’s Business Acumen Primer for 2023

Over the past 20 years cybersecurity has evolved from a cost center and perceived roadblock risk to a market leading capability with the power to differentiate and increase competitive advantage. This places more pressure on and provides greater opportunity for security leaders better align with business models and strategies set forth by their organizations. To do so requires a clearer line-of-sight from security investment to business performance. The biggest barrier to achieving this is one of translation – truly speaking the language of risk while articulating security’s value. This session will deliver a primer on the leading concepts that strengthen CISOs’ business acumen and substantiate their place as strategic partners. 

Join this session to:  

  • Get a valuable cheat code for translating finance and ELT terms 
  • Learn how to discuss risk using terms and context understood by the board 
  • Develop security strategies to carry market value further 

Speakers:
Christopher Gilchrist, Principal Analyst, Forrester

READ MORE +READ LESS -
Bolster Defenses With Zero Trust
CISOs Need To Flip The Script To Secure OT

From the Colonial Pipeline attack to PIPEDREAM, critical infrastructure providers are facing more public cyberattacks than they have before. They are also undergoing major digital transformation in the form of OT/IT convergence, driven by greater efficiency, increased capabilities, and potential cost savings. This change, however, is exposing critical infrastructure to increased risk of disruptive cyberattacks at a critical time. During this session, we will explore:  

  • The current state of OT/IT convergence.  
  • The threat landscape for critical infrastructure providers 
  • How to interweave IT security principles with operations technology (OT) expertise to protect OT environments. 

Speakers:
Brian Wrozek, Principal Analyst, Forrester

READ MORE +READ LESS -
2:40 pm – 3:10 pm ET

Case Study Sessions

Hear real world case studies showcasing the value of partnering with the right technology provider.

Attend one session:

Code42: The Impact of Cultural Drift on Data Protection

Every organization’s culture has a true north that demonstrates how secure that organizations’ data is. As security leaders, we have a choice – is it better to correct behavioral drift away from this true north at the time it happens or give it free reign to establish a new norm? Join to learn more about the critical role culture plays in building a security aware organization as new technologies bring new vectors for data exposure when behavior is unchecked.

Speakers:
Rob Juncker, CTO, Code42

Confiant: Why malvertising matters to your endpoint defense

The digital landscape has dramatically evolved over the past ten years. Phishing, malware attacks and crypto scams using ads as a vector are on the rise. Sophisticated cyber criminals are a threat to any digital user and enterprise organization. This case study will go into detail and provide insight into the detection of Mac malware attacks, malware families and notarized Mac malware.

Speakers:
Louis-David “LD” Mangin, CEO and Co-Founder, Confiant

IBM: How Bed Bath & Beyond scaled their security and risk management program with IBM Security

With nearly a thousand stores and decades as a leading retailer, Bed Bath & Beyond always has the security of its business assets and its customers’ sensitive information as a top priority. As they’ve battled the impact of COVID, as well as changes in strategic direction that are impacting many large organizations, it’s become even more critical to enhance the cybersecurity efforts via policy and standards analysis, risk quantification, and the continuous safeguarding of customers credit card data. Join us for this session, to hear about the on-going journey of building out a leading program in information security and risk management, as well as where they plan to focus on staying ahead of future threats.

Speakers:
Tameka Foster, Director, Risk Operations Center, Bed Bath & Beyond
Rebecca Dodson, Partner, Security Strategy Risk & Compliance, Americas, IBM Security

StrikeReady: Cyber Warfare: Transforming SOC through Adaptive Defense

Geopolitical issues have spilled from urban warfare into cyber warfare, adding a new challenge to security programs. Consequently, we implemented an Active Defense strategy to bolster our defense against aggressive adversaries and respond effectively, as well as transform our Security Operations Center (SOC). This yielded astonishing results, and I’d like to share the blueprint with you.

Speakers:
Wasif Khan, V.P. InfoSec Operations, CNA Insurance

ThreatConnect: Quantifying cyber risk in financial terms

Cyber risk is a continuously changing risk that companies struggle to understand and mitigate. Many companies today try to measure and communicate cyber risk with heat maps, technical metrics, or with subjective analysis. ThreatConnect and Snowflake, an RQ customer, will walk you through a case study to describe how quantified risk is being used to identify, communicate and begin to mitigate cyber risk in a data driven, defensible manner.

Speakers:
Josh Mckibben, Director of Global Security Compliance & Risk , Snowflake
Jerry Caponera, General Manager, Cyber Risk Quantification Products, ThreatConnect

3:15 pm – 3:45 pm ET

Breakout Sessions

Tackle Risk And Compliance Head On
Managing Cloud Security Risk And Compliance

Adoption of cloud infrastructure (infrastructure as a service, platform as a service, software as a service, private cloud), cloud-first IT strategy, and cloud migrations all highlight the importance of managing cloud security risk and compliance. Organizations, in their quest to control their cloud infrastructure and protect the data they host, must: 1) protect cloud platforms’ configuration and identities; 2) extend on-premises operating system-level security to cloud hypervisors and operating systems; and 3) apply robust protections to container runtimes and orchestration systems — all while maintaining regulatory compliance. In this session, you will learn about: 

  • The cloud security tooling landscape and architectural choices for cloud security. 
  • Key technical and nontechnical best practices. 
  • Forrester’s predictions for cloud security. 

Speakers:
Andras Cser, VP, Principal Analyst, Forrester

READ MORE +READ LESS -
Elevate Trust With Privacy, Data Security, And Identity
Customer Data: From Privacy Risk To Opportunity

The customer data landscape is shifting rapidly as a proliferation of privacy laws, companies such as Apple and Google, and rising consumer privacy expectations limit how much consumer data is readily available, and yet your marketing colleagues are doubling down on their efforts to capture more customer data. Join this session to learn: 

  • What market forces are leading marketers to be so data-hungry. 
  • How customer-facing experiences can help engender (or impede!) trust. 
  • How to break down departmental silos to collaborate with your marketing team. 

Speakers:
Stephanie Liu, Analyst, Forrester

READ MORE +READ LESS -
Lead Through Unprecedented Change
Cybersecurity Drives Revenue: How To Win Every Budget Battle

Whether your company continues to grow or gets caught up in macroeconomic headwinds, expect more pressure on security leaders to explain current spending and more challenges from the CFO when requesting budget increases. This session will explain how to leverage three factors that make winning budget battles easier, provide a methodology to incorporate them into your business case, and equip you with the ability to tell the story that gets you the budget you need.

Join this session to:

  • Utilize three externalities to make cybersecurity budgets a must-have investment area.
    • Intense customer requests
    • Aggressive cyber insurance mandates
    • Increase in regulatory requirements
  • Make impact and effectiveness the foundation of your business case for increased cybersecurity investment.
  • Weave a compelling narrative with storytelling that confirms this fact: Cybersecurity must be a core competency of your enterprise.

Speakers:
Jeff Pollard, VP, Principal Analyst, Forrester

READ MORE +READ LESS -
Bolster Defenses With Zero Trust
The Truth Behind ML’s Madness: How AI Is Actually Used In Detection And Response

Deobfuscating how AI and machine learning (ML) are used in security technologies today is more challenging than reverse-engineering the latest malware from Wizard Spider. But it doesn’t have to be, and knowing what’s going on under the hood can help inform your detection and response strategy. We must break free of the hype around AI to uncover how it’s actually used in security technologies and how to leverage it to the fullest in the security operations center (SOC). In this session, you will learn: 

  • What AI/ML is used for in security products. 
  • How to better leverage AI/ML in the SOC. 
  • How future advancements in AI/ML will change security (really). 

Speakers:
Allie Mellen, Senior Analyst, Forrester

READ MORE +READ LESS -
4:30 pm – 5:00 pm ET

Guest Keynote - ICS Threats: From Pipe Dream To PIPEDREAM

Threats to industrial control systems (ICS) and critical infrastructure are nothing new. What’s changed is the pervasiveness of the ability to carry out cyber-attacks against these systems and the geopolitical environment which makes these systems prime targets by adversaries. Robert M. Lee, CEO and Co-founder of Dragos will discuss ICS threats from cascading IT attacks to today’s ICS-focused malware as well as strategies for defending modern infrastructure.

 

Speakers:
Robert M. Lee, CEO & Co-Founder, Dragos

5:05 pm – 5:35 pm ET

Keynote: Unleash Your Potential With ZTE

Amidst the cacophony of Zero Trust messaging, Zero Trust Edge has emerged as an ideal technology for security leaders to embrace. The combination of networking and security controls positions ZTE as a simple solution for multiple problems and accelerates overall ZT adoption. This session will focus on the following areas: 

  • ZTE- what it is, and what it isn’t 
  • How ZTE enables edge computing 
  • How and why to apply ZTE from an organizational perspective 

Speakers:
Heath Mullins, Sr. Analyst, Forrester

Wednesday Nov 9

9:30 am – 10:10 am ET

Keynote: From CISO To Chief Trust Officer: The Next Step Forward In CISO Career Paths

Sparked by the trust imperative and in response to companies moving away from business models that put them at odds with their customers, a new C-suite role has emerged: chief trust officer. It’s also the next step in the career path for CISOs. No other role in the C-suite brings the insights and empathy necessary to become an effective CTrO as the CISO. The trust imperative will force firms to accept that cybersecurity is a core competency, requiring CISOs to become CTrOs to inspire trust and secure the future. Attend this keynote to: 

  • Understand how informal customer-facing activity helped train CISOs to step in as CTrOs.  
  • Learn how the CTrO role helps CISOs escape the clutches of IT to truly become a C-level executive. 
  • Find out how other CISOs became CTrOs: some by design and some by accident.  
  • Discover the essential elements of the CTrO organization and responsibilities. 

Speakers:
Jeff Pollard, VP, Principal Analyst, Forrester

10:15 am – 10:45 am ET

Keynote Panel: Take A Zero Trust Approach To Threat Prevention, Detection, And Response

This panel, moderated by Forrester Research VP, Group Director, Laura Koetzle, will be a dynamic discussion of threat prevention, detection, and response using Zero Trust principles by security experts from technology partners. Forrester’s Zero Trust model of information security protects data and systems by denying access to applications and data by default, implementing security monitoring, and automating response actions. Attend this session to see how these capabilities work together as a comprehensive security approach.

Speakers:
Laura Koetzle, VP, Group Director, Forrester
Chris Meenan, VP Product Management, IBM
Jerry Caponera, General Manager, Cyber Risk Quantification Products, ThreatConnect
Ryan Bowman, Director of Solutions Engineering, ThreatLocker

11:30 am – 12:00 pm ET

Breakout Sessions

Tackle Risk And Compliance Head On
Dodgeball, Your New Favorite Sport: Systemic Risks

Dodgeball is a humiliating sport. If you have weak arms and can’t get out of the way, you will get hit. Cybersecurity is in a dodgeball competition with systemic risks and doesn’t even know it. You, too, can dodge systemic-risk events or, better yet, mitigate those risks by catching them. During this session, we’ll cover: 

  • How cybersecurity is not immune to the humiliating sport that is systemic risks. 
  • What ball is going to hit your blindside by understanding the 2022 systemic risk ranking. 
  • How to plan for and communicate cybersecurity systemic-risk events (way to catch that ball!). 

Speakers:
Renee Murphy, Principal Analyst, Forrester

READ MORE +READ LESS -
Elevate Trust With Privacy, Data Security, And Identity
Biometrics: The Good, The Bad, And The Ugly

Biometrics usage is at a crossroads. While it provides valuable convenience and ease of use for consumers, biometrics also opens a potential hornet’s nest of privacy and compliance concerns. Organizations must also select from a wide range of biometric options, including voice, finger, face, and other emerging technologies. This session will explore: 

  • Key use cases and industries that are deploying biometrics. 
  • What regulatory forces are influencing biometrics around privacy protection. 
  • How to deploy biometrics in a privacy-centric way. 

Speakers:
Merritt Maxim, VP, Research Director, Forrester

READ MORE +READ LESS -
Lead Through Unprecedented Change
Panel Discussion: Amplify Security’s Influence And Impact With BISOs

Businesses are charging forward with innovative ways to win, serve, and retain customers, putting greater pressure on all functions to move quickly — and on the CISO to keep pace. But in large organizations with multiple business units, building and maintaining a bridge that connects business objectives with security requirements cannot fall on the CISO alone. Enter the business information security officer (BISO). Effective BISOs seamlessly transition between diplomat, therapist, translator, negotiator, and cybersecurity expert and, in doing so, enable business leaders to make security-minded, risk-informed decisions. This session will provide you valuable insights into the BISO role and best practices for empowering BISOs in your organization. 

Join this session to: 

  • Hire or develop talent with the right skill set for the role. 
  • Overcome common challenges in integrating BISOs into business units. 
  • Harness the power of effective collaboration and empower the organization to go to market on trust. 

Speakers:
Jess Burn, Senior Analyst, Forrester
Vivien Osamiluyi, Business Information Security Officer and Privacy Product Owner, Comcast
Kathy Washenberger, Executive Director Information Security/GRC, Deluxe Corporation
James Binford, Business Information Security Officer, Humana

READ MORE +READ LESS -
Bolster Defenses With Zero Trust
Implementing ZTE For All Edges In An Enterprisewide Networking Fabric

The current set of Zero Trust Edge (ZTE) vendors offer solutions to connect remote locations and workers to a cloud platform but can’t address hybrid or multicloud environments. They see cloud edge different than remote location edge. (Hint. It’s not). Traditional networking vendors can’t help either. They are too busy fighting over private data center networking infrastructure carcasses. In the shadows between ZTE vendors and traditional network vendors, a new set of vendors has emerged. But why? Using the ZTE framework highlighted in “Unleash Your Potential With ZTE” keynote, this session will explore the current state of ZTE vendors relative to the ZTE model, highlight the emerging secure multi-cloud network overlay vendors, and lay out the rationale for why these new vendors and ZTE vendors will merge to create a better ZTE vendor solution. In addition, Forrester will cover what this convergence means to business and technology leaders and how to maximize the potential from ZTE going forward.

Speakers:
Andre Kindness, Principal Analyst, Forrester

READ MORE +READ LESS -
12:05 pm – 12:35 pm ET

Case Study Sessions

Hear real world case studies showcasing the value of partnering with the right technology provider.

Attend one session:

BeyondTrust: Best Practices: Privileged Access Management Security and Privilege Protection

The term best practice is used a lot, and the definition can differ between organizations based on risk appetite and tolerance. Similarly, the term, ‘PAM’ is also often mis or overused. This session will look at how PAM is defined today, understanding how privileges are used within your organization, and some useful tips to start or mature your security model. This will help your organization move towards just-in-time and a Zero Trust security model.

Speakers:
Jason Silva, Senior Solutions Architect, BeyondTrust

CyberProof: Unexpected Benefits of Large-Scale Cloud Native Security Architectures

CyberProof transformed a global insurance company in a highly regulated market to a cloud native architecture. As an early adopter of the Microsoft security stack including the Microsoft Sentinel SIEM, CyberProof and our client overcame many challenges to meet the needs of this complex transformation while achieving many expected and unexpected benefits. As a result, we believe the cloud native security architecture is the future and the time to transform is now. Attend this session to understand why.

Speakers:
Tony Velleca, CEO, CyberProof

KnowBe4: Building a Security and Risk Conscious Culture

In this session, participants will better understand how to achieve a higher impact security culture and how to view awareness through the lens of organizational culture.

Speakers:
Joanna Huisman, SVP of Strategic Insights & Research, KnowBe4

Kyndryl: Learn Lessons from Hundreds of Ransomware Recoveries and Help Cybergeddon

Cyberattacks and ransomware incidents are increasing in frequency and complexity. Successful attacks can be swift and crippling, leading to a ‘Cybergeddon’. Recovery can often take weeks and taxes the delivery teams. Learn from experts who have led recoveries from over hundreds of ransomware and other cyber incidents over the past years, talk about their learnings and best practices for recovering from such attacks and maintaining the core purpose and integrity under duress

Speakers:
John Greenough, Head of Market Relations, Security & Resiliency, Kyndryl
Rhonda Childress, Chief Innovation Officer, Kyndryl

Onspring: Success Story Spotlight: American Family Insurance

Development in Onspring can be very rapid, but what do you do when everything around you is changing? Learn how to navigate your use of Onspring while your business, the processes, and roles continue to change. This session will also review how you can integrate Onspring with other internal technologies, and share advice on how to avoid breaking existing infrastructure and harmonize cross-functional teams.

Speakers:
John Aaholm, GRC Technology Lead, American Family Insurance

1:35 pm – 2:05 pm ET

Breakout Sessions

Tackle Risk And Compliance Head On
Secure Software Supply Chain Essentials

The weakest link in your software supply chain is security. The NIST’s special publication, “Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations,” provides guidelines on how to strengthen the supply chain and reduce the risk to your enterprise. For security leaders, this is a great tool to get your executive team, risk management team, and the rest of the organization aligned and working toward a more secure supply chain. During this session, we’ll explore the following questions: 

  • Why do all enterprises, not just government suppliers, need to be aware of the NIST guidelines?  
  • What are the software security considerations put forward by NIST? 
  • How can you start putting the guidelines into practice? 

Speakers:
Janet Worthington, Senior Analyst, Forrester

READ MORE +READ LESS -
Elevate Trust With Privacy, Data Security, And Identity
The State Of Decentralized Digital Identities

Decentralized digital identities (DDIs, also known as self-sovereign identities) represent the next major paradigm shift in identity and access management (IAM). Privacy-conscious, end-user-centric, and extending beyond registration and authentication into credentials, authorizations, and proofs, DDI infrastructures are set to permanently change the IAM landscape. In this session, you will learn about: 

  • Use case patterns for DDIs. 
  • Key strengths and weaknesses of DDIs. 
  • The state of adoption, real-life examples, and future opportunities for DDI. 

Speakers:
Andras Cser, VP, Principal Analyst, Forrester

READ MORE +READ LESS -
Lead Through Unprecedented Change
Beyond The B.S. (Or B.A.): Buck Tradition To Hire Early-Career Security Talent

It’s time for CISOs to stop waiting on institutions for change and take on the cybersecurity staffing shortage themselves. This session, filled with real-world examples, will make the case for breaking with traditional hiring practices at the entry level and forming new collaborations to cultivate a bigger, more diverse cybersecurity talent pool, a pool that includes underrepresented minorities, women, veterans, and populations of workers with transferable skills. Join this session to:  

  • Bust outdated four-year degree requirements and move away from restrictive applicant tracking systems and screening practices. 
  • Start or support new talent development efforts in your region or industry. 
  • Cultivate the time and ability of your management team to train early-career talent. 

Speakers:
Jess Burn, Senior Analyst, Forrester
David McLeod, Vice President and Chief Information Security Officer, Cox Enterprises

READ MORE +READ LESS -
Bolster Defenses With Zero Trust
Rethinking How To Secure The Anywhere-Work Endpoint

For many, work has stopped being tied to an office — not solely because of the COVID-19 pandemic but also because of the shift to remote access. In a world where users are no longer limited to fixed locations or specific devices, the importance of traditional endpoints diminishes and is replaced by how users interact with remote data. Security leaders must adapt how they structure their endpoint security strategy to protect business information while ensuring user privacy and flexibility. In this session, we will explore:  

  • The current state of securing anywhere work. 
  • How to protect while ensuring user privacy in a “bring your own device” world. 
  • What the future of the endpoint looks like: the browser. 

Speakers:
Paddy Harrington, Senior Analyst, Forrester

READ MORE +READ LESS -
2:10 pm – 2:40 pm ET

Case Study Sessions

Hear real world case studies showcasing the value of partnering with the right technology provider.

Attend one session:

Censys: Using Censys to Discover Russian Ransomware C2 Networks

On June 24, 2022, Censys uncovered two Russian hosts leveraging a publicly-available Command and Control tool, a commercial exploit tool, direct links to two Bitcoin nodes, and ransomware kits tied to the Medusa Locker ransomware group by leveraging JARM and certificate pivoting as well as investigating historical postures of said hosts. We will walk you through this process and provide you with the playbook necessary to launch your own proactive threat hunts.

Speakers:
Matt Lembright, Director of Federal Applications, Censys

Illumio: Zero Trust Segmentation – ROI every step of the way

Segmentation projects have long suffered because traditional network centric approaches are overly complex, and are often unable to show any benefit until fully executed. Zero Trust Segmentation is different. Decoupled from the infrastructure, and focused on providing value at each step it enables agencies to progressively adopt microsegmentation to reduce the threats of ransomware and breaches, and continuously increase their cyber resilience – across data centre, endpoint and cloud. Join this session to find out how.

Speakers:
Gary Barlet, Federal Chief Technology Officer, Illumio

Interos: Supply Chain Resilience in a Time of Techtonic Geopolitical Shifts

For decades, the confluence of globalization and digitization drove supply chains toward increasing complexity, optimization, opaqueness, and insecurity. These physical and digital ties are fracturing at a rapid pace along geopolitical fault lines, powered by growing interstate hostilities, global trade wars, the Splinternet and emerging technologies, and an unprecedented pace of regulatory change. This session will detail the challenges and opportunities associated with these ‘techtonic’ shifts and how organizations can take steps toward greater resilience during significant geopolitical uncertainty. 

Speakers:
Dr. Andrea Little Limbago, VP of Research and Analytics , Interos

OneTrust: Scaling Trust by Design

Telus is on a mission to drive meaningful change — from transforming healthcare to making our food supply more sustainable to reducing our environmental footprint while connecting Canadians in need. Pam Snively has played a pivotal role in this transformation – evolving alongside the business from Chief Privacy Officer to the company’s first Chief Trust Officer. In this session she will share her journey transforming privacy, ethics, and data literacy at Telus to extend trust and make a meaningful impact.

Speakers:
Jason Sabourin, GRCP, CIPP/E, CIPM, CSPO Director, Product Management, OneTrust
Pam Snively, Chief Data & Trust Officer, TELUS

Tessian: Simplifying Email Data Loss Prevention with Behavioral Intelligence

Organizations are routinely faced with combating unknown risks and humans making mistakes that policies cannot predict. The impact can be catastrophic since investigating and mitigating these incidents drains time and resources. There is a simpler option that allows a deeper understanding into data loss prevention. Join B. Riley Financial and Tessian as we discuss how to reduce insider threat and data loss risk with a behavioral intelligence based approach.

Speakers:
Aaron J. Goodwin, Chief Information Security Officer , B. Riley Financial
Jen Gerhart, Senior Customer Success Manager, Tessian

3:20 pm – 3:50 pm ET

Keynote Panel: Insider Risk Reduction Requires Two Parts Culture, One Part Security

Insider incidents are responsible for almost a quarter of data breaches. Data breaches, however, are not the only risk that can be triggered by insiders. Organizations have to address the risk posed by insiders through accidental disclosure, policy violations, and malicious actions. Reducing insider risk, however, requires more of a cultural approach than a security-centric strategy. This panel will discuss an insider risk approach that focuses on the people, not technology.  

Speakers:
Joseph Blankenship, VP, Research Director, Forrester
Alla Valente, Senior Analyst, Forrester
Dr. Deanna D. Caputo, Chief Scientist for Insider Threat Capabilities and Senior Principal Behavioral Psychologist , MITRE
Ryan Boyer, Insider Threat Program Manager, CISA

4:00 pm – 4:30 pm ET

Keynote: Adopt Minimum Viable Security To Drive Trust

Business leaders prioritize both innovation and security — minimum viable security (MVS) bridges the two by aligning security requirements with the product’s context and the development team’s agility. MVS enables security leaders to contribute directly to the early-stage products that drive hypergrowth. During this session, we will: 

  • Explore why security teams struggle to support rapid prototyping and concept testing … and why that matters. 
  • Explain how an MVS approach adds the right level of security into early-stage products and positions them for security success later, without stymieing innovation today. 
  • Provide a framework and best practices to help security leaders understand what security issues to prioritize during early-stage product development. 

Speakers:
Sandy Carielli, Principal Analyst, Forrester