3:30 – 4:15 PM | Registration and Hors d'oeuvres |
4:15 – 4:25 PM |
Welcome: Security at a Crossroads |
4:25 – 4:55 PM |
The Future of Human-Robot Interaction Dr. Kate Darling, a well known TED speaker and MIT researcher, will discuss the future of human-robot interaction and share her research on the surprising behavior we exhibit around robots as they move from behind factory walls into shared spaces. Dr. Darling’s keynote will explore why people have an emotional connection to robots, and why it matters. |
4:55 – 5:35 PM |
The State of Cloud Security: Insights from Our Panel Industry leaders will discuss where we are on the Digital Transformation journey, how security has effectively changed with Digital Transformation initiatives, and what security leaders must focus on now to support the full promise of transformation. |
5:40 – 6:30 PM |
Round Table Session Topical Roundtables spanning technical to organizational issues facing CIO’s and CISO’s moderated by industry experts. |
6:35 – 6:45 PM |
Closing Comments |
Demonstrating a unique mix of technical vision, marketing and business acumen, Philippe Courtot has repeatedly built innovative companies into industry leaders. As CEO of Qualys, Philippe has worked with thousands of companies to improve their IT security and compliance postures. Philippe received the SC Magazine Editor’s Award in 2004 for bringing on demand technology to the network security industry and for co-founding the CSO Interchange to provide a forum for sharing information in the security industry. He was also named the 2011 CEO of the Year by SC Magazine Awards Europe.
For many years, Jim Reavis has worked in the information security industry as an entrepreneur, writer, speaker, technologist and business strategist. Jim’s innovative thinking about emerging security trends have been published and presented widely throughout the industry and have influenced many. Jim is helping shape the future of information security and related technology industries as co-founder, CEO and driving force of the Cloud Security Alliance. Jim has been named as one of the Top 10 cloud computing leaders by SearchCloudComputing.com. Jim received a B.A. in Business Administration / Computer Science from Western Washington University in 1987 and formerly served on WWU’s alumni board. Jim was recognized as a WWU Distinguished Alumnus in 2015. In 2016, Jim was inducted into the Information Systems Security Association (ISSA) Hall of Fame..
Dr. Kate Darling is a leading expert in Robot Ethics. She’s a researcher at the Massachusetts Institute of Technology (MIT) Media Lab, where she investigates social robotics and conducts experimental studies on human-robot interaction. Kate explores the emotional connection between people and life-like machines, seeking to influence technology design and policy direction. Her writing and research anticipate difficult questions that lawmakers, engineers, and the wider public will need to address as human-robot relationships evolve in the coming decades. Forever interested in how technology intersects with society, Kate has a background in law & economics and intellectual property.
As Chief Product Officer at Qualys, Sumedh oversees worldwide engineering, development and product management for the Qualys Cloud Platform and integrated suite of security and compliance applications. A core systems and database engineer, Sumedh started at Qualys in 2003, architecting and delivering Qualys' PCI compliance platform to meet the Payment Card Industry (PCI) Data Security Standard (DSS) requirements.
As CISO for Webroot, Gary Hayslip advises executive leadership on protecting critical information resources and oversees enterprise cyber-security strategy. His mission includes creating a “risk aware” culture that places a high value on securing and protecting customer information entrusted to Webroot.
Hayslip’s career in the fields of enterprise information security and network security spans more than 20 years and includes multiple CIO, CISO, and deputy director of IT positions for the U.S. Navy, the Federal Government, and the City of San Diego. In these positions, he was instrumental in architecting security programs from the ground up, auditing large, disparate networks and consolidated extensive legacy network infrastructures into converged virtualized datacenters.
Hayslip recently co-authored the CISO Desk Reference Guide: A Practical Guide for CISOs – Volumes 1 & 2, which are considered among the leading books on enabling CISOs to expand their expertise and scope of business knowledge. Hayslip has a BS in information systems management from UMUC and an MBA from San Diego State University.
Experian is custodian of more than a billion customers' information globally. Through series of multiple acquisitions, Experian has a broad technology footprint that includes cloud, hybrid and on-premises environments and is managed in a federated and decentralized manner. Peeyush Patel, VP, Information Security at Experian will illustrate how the Qualys Cloud Agent enables instant, global visibility of IT assets – including cloud server instances and remote users – with up-to-date asset configuration data for security and compliance. Learn how Qualys has enabled Experian to automate and streamline security and compliance supporting business functions globally, without compromising speed to market.
With more than 20 years of combined work experience in cybersecurity, systems architecture, software development and engineering, Marisa Ruffolo is an accomplished technology leader with a proven track record of designing and implementing enterprise wide cybersecurity solutions. As a Cybersecurity Enterprise Architect at Chevron, Ruffolo is responsible for developing the corporate cybersecurity technology architecture and strategy. Ruffolo serves as the Chair of the American Petroleum Institute Information Technology Security Subcommittee (API ITSS). She is also a Certified Information Systems Security Professional (CISSP). Ruffolo earned her undergraduate degree in electrical engineering from the University of Illinois in Urbana and her Ph.D. in electrical engineering from Northwestern University.
CIO/CISO Interchange is an invitation only, exclusive event. We qualify all attendees to ensure the best possible event. In fact, we limit the attendee list to no more than 30 high-profile executives. There is no cost to attend this event.
This private event has no product pitches and no sales personnel, just candid talk on the important topics and issues facing you and your peers to secure the digital transformation.
Philippe Courtot, Founder of CIO/CISO Interchange
As CEO of Qualys, Philippe has worked with thousands of companies to improve their IT security and compliance postures. Philippe received the SC Magazine Editor's Award in 2004 for bringing on demand technology to the network security industry. He was also named the 2011 CEO of the Year by SC Magazine Awards Europe. He was previously Chairman and CEO of Signio until its acquisition by VeriSign. He is also a member of the Board of Directors of StopBadware, a non-profit, anti-malware organization.
As Chief Product Officer at Qualys, Sumedh oversees worldwide engineering, development and product management for the Qualys Cloud Platform and integrated suite of security and compliance applications. A core systems and database engineer, Sumedh started at Qualys in 2003, architecting and delivering Qualys' PCI compliance platform to meet the Payment Card Industry (PCI) Data Security Standard (DSS) requirements.
Dr. Kate Darling is a leading expert in Robot Ethics. She’s a researcher at the Massachusetts Institute of Technology (MIT) Media Lab, where she investigates social robotics and conducts experimental studies on human-robot interaction. Kate explores the emotional connection between people and life-like machines, seeking to influence technology design and policy direction. Her writing and research anticipate difficult questions that lawmakers, engineers, and the wider public will need to address as human-robot relationships evolve in the coming decades. Forever interested in how technology intersects with society, Kate has a background in law & economics and intellectual property.
For many years, Jim Reavis has worked in the information security industry as an entrepreneur, writer, speaker, technologist and business strategist. Jim’s innovative thinking about emerging security trends have been published and presented widely throughout the industry and have influenced many. Jim is helping shape the future of information security and related technology industries as co-founder, CEO and driving force of the Cloud Security Alliance. Jim has been named as one of the Top 10 cloud computing leaders by SearchCloudComputing.com. Jim received a B.A. in Business Administration / Computer Science from Western Washington University in 1987 and formerly served on WWU’s alumni board. Jim was recognized as a WWU Distinguished Alumnus in 2015. In 2016, Jim was inducted into the Information Systems Security Association (ISSA) Hall of Fame..
As CISO for Webroot, Gary Hayslip advises executive leadership on protecting critical information resources and oversees enterprise cyber-security strategy. His mission includes creating a “risk aware” culture that places a high value on securing and protecting customer information entrusted to Webroot.
Hayslip’s career in the fields of enterprise information security and network security spans more than 20 years and includes multiple CIO, CISO, and deputy director of IT positions for the U.S. Navy, the Federal Government, and the City of San Diego. In these positions, he was instrumental in architecting security programs from the ground up, auditing large, disparate networks and consolidated extensive legacy network infrastructures into converged virtualized datacenters.
Hayslip recently co-authored the CISO Desk Reference Guide: A Practical Guide for CISOs – Volumes 1 & 2, which are considered among the leading books on enabling CISOs to expand their expertise and scope of business knowledge. Hayslip has a BS in information systems management from UMUC and an MBA from San Diego State University.
With more than 20 years of combined work experience in cybersecurity, systems architecture, software development and engineering, Marisa Ruffolo is an accomplished technology leader with a proven track record of designing and implementing enterprise wide cybersecurity solutions. As a Cybersecurity Enterprise Architect at Chevron, Ruffolo is responsible for developing the corporate cybersecurity technology architecture and strategy. Ruffolo serves as the Chair of the American Petroleum Institute Information Technology Security Subcommittee (API ITSS). She is also a Certified Information Systems Security Professional (CISSP). Ruffolo earned her undergraduate degree in electrical engineering from the University of Illinois in Urbana and her Ph.D. in electrical engineering from Northwestern University.
Experian is custodian of more than a billion customers' information globally. Through series of multiple acquisitions, Experian has a broad technology footprint that includes cloud, hybrid and on-premises environments and is managed in a federated and decentralized manner. Peeyush Patel, VP, Information Security at Experian will illustrate how the Qualys Cloud Agent enables instant, global visibility of IT assets – including cloud server instances and remote users – with up-to-date asset configuration data for security and compliance. Learn how Qualys has enabled Experian to automate and streamline security and compliance supporting business functions globally, without compromising speed to market.
Ranu has over nine years of experience in Information Security, Risk and Vulnerability management with extensive experience working in North American Electric Reliability Corporation critical infrastructure protection (NERC- CIP) in the energy sector and in Application Security with Cloud Computing Solutions in the banking sector.
Her cybersecurity risk and compliance experience extends to policy-driven automation and the need for total visibility for Asset protection, Audit and Compliance reporting. She is a Certified Information Systems Security Professional (CISSP) with Master’s in information assurance.
Want to get updates on future events?
© 2020 CIO/CISO Interchange. All rights reserved.