CDM Media | Zero Trust & Identity Management Summit - Dec. 6, 2022

Zero Trust & Identity Management Summit

CDM Media | Zero Trust & Identity Management Summit

Dec. 6, 2022

Venue TBD

 
 

Speakers

Past and Present CDM Media Summit Speakers

Rob Dyson

IBM OT Security POV View details

Rob Dyson
IBM Global Security Services Global OT Security Services Business Leader
IBM
Tony Goulding

Zero Trust Privilege for the Modern Threatscape View details

Tony Goulding
Cyber Security Evangelist
Centrify
Hussein Syed

Navigating Security & Risk in a Changing IT Landscape View details

Hussein Syed
CISO
RWJ Barnabas Health
Janos Hajagos

How Augmented Analytics Will Help Your Organization View details

Janos Hajagos
Chief of Data Analytics
Stonybrook Medicine
Krister Dackland

Digital transformation of traditional Industries View details

Krister Dackland
CIO
Storstockholms Lokaltrafik
Paul Randlesome

SHIFTING TO A BUSINESS-FIRST NETWORKING MODEL: Determining the business value of a Software-defined Wide Area Network View details

Paul Randlesome
Director
Silver Peak Systems
Paula Rizzo

CIOs/CISOs as the Consummate Communicator View details

Paula Rizzo
Author
Individual
Chandresh Patel

Securing the Human Factor View details

Chandresh Patel
Quanta Services
Antonietta Maria Mastroianni

Digital Transformation - Architecture, Technology and the People View details

Antonietta Maria Mastroianni
Chief Information Officer and Head of Digital
Proximus
Pascal Greenens

I'm Going to the Cloud, Come and Get Me! View details

Pascal Greenens
Security EMEA Evangelist
Radware Ltd.
Mark Sangster

Cyber Risk at the C-Level: Escaping the Trap Between Cyber-Attacks & Regulatory Investigations View details

Mark Sangster
Vice President, Strategic Marketing
eSentire
Martin Howard

Healthcare Interoperability View details

Martin Howard
CIO
New York Proton Center
 

To see the full list of delegates, please sponsor or attend

 
 

Agenda

Registration & Networking Breakfast

8:30 AM - 9:00 AM

Welcome Address

9:00 AM - 9:10 AM

Keynote Panel

9:10 AM - 9:40 AM

2022 Focus: CIOs and CISOs as Transformation Leaders

Successful IT and security leaders in the new world focus on the people, but why didn't they always? Leaders have to become the trusted advisor to the wider executive. It's important for IT and security executives to be associated with transformation and collaboration as much as they are with the tin, the wires and the power point projector. 

 In this session we'll look at: 

 

  • IT and security executives place on the board
  •  How to build the team as a transformation team
  • Leadership should be fluent in new technology leaders, why? 
  • What do you need to lead a digital transformation team

Thought Leadership

9:45 AM - 10:10 AM

Addressing the Technology Skills Gap: Reskilling and Upskilling

In the digital age, technology teams are only as successful as their skills are relevant. Companies are under pressure to become more agile, protect against rising security threats, and continuously deliver innovations to the market. This begs the question - how do you keep up with the constant pace of change in technology? 

Join this session to hear how leaders must see technology skills as a strategic and essential part of successful digital transformation, as well as how they can gain the clarity they need to lead, and the skills they need to move faster.

Break

10:10 AM - 10:20 AM

Think Tank

10:20 AM - 10:45 AM

Digital Evolution - Why Mindset Matters If You Want to Transform Your Business

In this session, we will discuss and share best practices on how to establish an organization-wide digital mindset that will create a strong foundation for your digital transformation strategy and ultimately help you to evolve your business beyond its current capabilities by:

 

  • Maximizing the value of the data you own
  • Creating a culture of technology openness
  • Managing cybersecurity risks effectively 

 

Join to learn how to transform your business and accelerate growth faster than ever before.

Think Tank

10:20 AM - 10:45 AM
View tools and techniques of real-world threat actors and explain why preventing cybersecurity threats is actually possible and a much better approach than detecting and responding after the attack.

Executive Boardroom

10:50 AM - 11:15 AM

Executive Boardroom

10:50 AM - 11:15 AM

Faster Ransomware Remediation through Better Data Insight

Join this session to learn how to leverage Machine Learning and Natural Language Processing to automatically discover and classify sensitive data. By more clearly understanding the value of data you can better prioritize ransomware recovery operations, see how anomaly detection helps you understand the full impact of ransomware in your environment and how you can use our platform to quickly, and surgically recover. 

Data is arguably one of the most critical business assets today, cyber criminals have caught on to this, a ransomware remediation strategy will greatly improve your organization resilience.

Think Tank

11:20 AM - 11:45 AM

Cognitive Computing - Recognizing the Next era of AI

 

  • How does natural language processing (NLP) work to understand human speech? Learn how this has advanced to combine with image recognition reading lips to enable greater accuracy 
  • Historically, AI has created an algorithm to solve a particular problem. How does cognitive computing work differently to seek a universal algorithm for the brain? How can this algorithm solve a vast array of problems in the future?
  • How will cognitive computing enable advancements in humans and machines (including robots) to work better together

Think Tank

11:20 AM - 11:45 PM

The security industry is now a $160B+ industry. So how are we doing? Many CISOs are feeling the pressure of selecting just the right products from a field of thousands of vendors and even more providers. But where does the real risk lie? In what you have detected or what you haven't? Once a company has put millions of dollars into improving cyber security but are still getting compromised, then what? One CISO's perspective on how to look at the overarching issues we face in trying to detect and stop cyber attacks before they start.

Executive Boardroom

11:50 AM - 12:15 PM

Executive Boardroom

11:50 AM - 12:15 PM

Think Tank

12:20 PM - 12:45 PM

Cybersecurity technologies to identify, protect, detect, respond and recover are extremely important, but not sufficient. HumanOS upgrade is required to safely use the Internet and It is not only about training and awareness. It is about the way users must behave online and IT community must openly acknowledge system vulnerabilities. Humans are the weakest and strongest links in Cybersecurity.

Think Tank

12:20 PM - 12:45 PM

We have moved from an information-poor to an information-rich society. Practically unlimited availability of data, computing, networking and socio-mobile connectivity are fundamentally altering our world. In particular, they are enabling businesses to become more effective The increasing connectedness of using big data analytics - collecting all relevant data and automating their processing to drive decision making. This represents a fundamental shift from traditional business analytics, where limited amount of structured data is batch-processed to produce standard Business Intelligence reports

Networking Lunch

12:50 PM - 1:50 PM

Think Tank

1:55 PM - 2:20 PM

Medical device security will become an increasing concern for healthcare organizations, particularly as more of these devices are connected to the Internet, internal networks, and Wi-Fi. The increasing connectedness these medical devices will force more and more healthcare organizations to implement security solutions. 

Think Tank

1:55 PM - 2:20 PM

Understanding Cyberattack Risk in Your Organization: Time to Re-evaluate the Fundamentals?

  • How can organizations ensure that budget spent on security solutions are in fact reducing the company's overall risk profile?
  • Has your company made any structural changes to the organization to ensure that IT leaders who manage identity and access control are contributing to discussions with executives about managing the risk of cyberattacks?
  • Given that many cyberattacks start by exploiting vulnerabilities in IT systems, how has your company pivoted to ensure that foundational security practices are closing some of the most common gaps?

Thought Leadership

2:25 PM - 2:50 PM

Is Digital Transformation Driving the Need for DevSecOps?

There are over 20 million developers working for Enterprise organizations across the globe. The universal desire for faster innovation and Digital Transformation has led to DevOps empowered developers demanding efficient reuse of code, which in turn has led to a growing dependence on open source and third-party software libraries. This velocity means applications are developed faster but it also introduces new security risks. 

Join us as we discuss how the modern software supply chain and the drive for digital innovation is putting organizations at risk. And whether it is time to empower every developer to be a DevSecOps expert?

Think Tank

2:55 PM - 3:20 PM

Delivering Value During Uncertainty

The global pandemic has exacerbated the need of organisations to transform fast and become more resilient. In response, CIOs must quickly and continuously revisit their plans and investments. In such demanding circumstances, how can they ensure that business and IT are able to collaborate and deliver successful projects in a short time? This session looks at how you can bring together fragmented workflows and improve operational efficiency, while injecting security at every step of the development cycle.

Think Tank

2:55 PM - 3:20 PM

The risk extends beyond the perimeter and requires extending your protections against external, insider, and 3rd party threats. It's not just your perimeter that is at risk, it's your customers, your supply chain, your staff, and your business reputation that could be easily tarnished with just one breach.

Executive Boardroom

3:25 PM - 3:50 PM

Executive Boardroom

3:25 PM - 3:50 PM

Prevent Outages Across Your Organization: A guide to how predictive analytics can influence postitive business outcomes

As the pressure to be 'on' increases, so does data complexity - yet many organizations still rely on traditonal legacy IT solutions. During this session, we will explore how predictive analytics supports a pro-active approach to meeting the demands of customers, employees, and the business. 

Is it possible to predict and prevent issues before interruptions or outages occur?

- 5 steps to forecast with confidence:

- learn how predictive analytics and machine learning can help your organization cut costs, streamline operations, and raise productivity

- Learn how you can you successfully imbed tech in your current application

PM Break

3:50 PM - 4:00 PM

Thought Leadership

4:00 PM - 4:25 PM

Closing Panel

4:30 PM - 5:15 PM

Closing Remarks

5:15 PM - 5:25 PM

Summit Happy Hour

5:30 PM - 6:30 PM
 
 

Governing Board

 

Location

 

Exclusive Technology Conferences Held at Extraordinary Locations

CDM Media summits are held exclusively at five-star resorts across the world. Our executive conferences are designed to put our attendees at ease, and make business seem more like pleasure. Our events are designed to get you out of the office and offer the opportunity to focus your complete attention to the critical topics highlighted by the summit agenda. From breathtaking views to superb dining experiences throughout the conference, each attendee is treated to an experience sure to stimulate informal business discussions in an environment that is unmatched.