ISMG Events
  • Summits
  • Roundtables
  • Faculty
  • About ISMG Events
  • Contact us

Virtual Cybersecurity Summit: Pacific Northwest

May 04-05, 2021

Register Now

WELCOME / Summit Overview

ISMG’s Global Summit Series will take place across multiple continents, focusing on global security topics such as fraud and breach prevention, zero trust security, connected devices and on many key industry verticals such as finance, government, retail, energy and healthcare.

All content will be driven by our global editorial team from publications such as DataBreachtoday, BankInfoSecurity, GovInfoSecurity and HealthcareInfoSecurity, as well as our newest sites dedicated to Payments Security, Device Security and Fraud. These events will provide the opportunity to learn from industry influencers, earn CPE credits, meet with leading technology providers and be a part of the ISMG community of over 900,000 subscribers.

Details

Free Registration

May 4th & 5th 2021

Register Now

Registering For a Group?
Call + 1 (609)-356-1499

  • Event Gallery

Olivera Zatezalo

Chief Security Officer, Huawei Technologies Canada

Imran Ahmad

Partner - Blake, Cassels & Graydon LLP

Randy Sabett

Vice Chair, Privacy & Data Protection Practice Group, Cooley LLP

Sunil Chand

Canada Security Leader, CGI

Ryan Duquette

Security, Privacy and Risk Consulting, RSM Canada

Ruth Promislow

Partner, Commercial Litigation, Fraud and Cybersecurity Practice, Bennett Jones LLP, Toronto

Gord Jamieson

Head of Visa Canada Risk Services

Michael Theis

Chief Engineer & Assistant Director for Research, National Insider Threat Center, CERT/SEI, Carnegie Mellon University

Speakers / Featured Speakers

Sujay Solomon

Manager of DevOps Product Management, Broadcom

Mary Ann Furno

Offering Manager, Broadcom

Dave Lewis

Global Advisory CISO, Duo Security at Cisco

Avi Rembaum

Vice President of Security Solutions, Check Point Software Technologies

Sean Ryan

Senior Analyst, Security & Risk, Forrester

Cris Ewell

CISO, UW Medicine

John F McClure

Global CISO, Laureate Education, Inc.

Renata C Spinks

Cyber Technology Officer, USMC

Jamie Manriquez

VP, CISO Santa Cruz Bank

Keith Tresh

CISO, State of Idaho

Trey Blalock

CISO, Coinstar (Bellevue Washington)

Michael Bray

CISO, Vancouver Clinic

Ryan Poppa

Director of Product Management at Cisco Cloud Security

Stephen Gates

Security Evangelist and Senior Solutions Specialist, Checkmarx

Kevin Morrison

Managing Director, CISO, Alaska Air

Vinod Brahmapuram

CISO, State of Washington

Khaja Ahmed

SVP, Head Global Product and Application Security, SAP

Call for Speakers is Now Open!

Interested in addressing ISMG’s global audience of cybersecurity, information security, fraud, risk and compliance professionals?

Click here to learn more!

Schedule / Pacific Time - PT



  • Tuesday, May 4th

  • Wednesday, May 5th

  • Hall A
  • Hall B
  • Hall C
  • Hall D
9:00 am -
9:30 am
9:00 am - 9:30 am

Registration & Exhibit Browsing

9:30 am -
10:00 am
9:30 am - 10:00 am

Keynote: Alaska Air

Speaker:
Kevin Morrison, Managing Director, CISO, Alaska Air

Kevin Morrison is the Managing Director of Enterprise Information Security, & CISO at Alaska Air Group in Seattle, WA. Alaska Air Group has both Alaska Airlines and Horizon Airlines under its umbrella, and Kevin has been fortunate to serve in this role since May 2020. Kevin has held previous CISO roles at Coinstar, PulteGroup, and at Jones Day, which is one of the oldest and largest law firms in the world. His background spans nearly 22 years in IT, with over 16 of them in Information and Cybersecurity. Kevin’s passion for people and security has included building and leading teams focused on incident management, operations, DLP, mobility, forensics, compliance, policy, privacy, and business continuity in innovative and highly regulated environments across public and private industries.

Kevin has had the pleasure to present extensively within the Information Security community and has served on several advisory and governance boards, and in March 2015, was selected by his peers as the ISE® Southeast People’s Choice Award Winner. He holds a B.S. in IT from UMass Lowell, and an MBA from Pacific Lutheran University, while maintaining CISSP, CISM, and CISA certification

10:00 am -
10:30 am
10:00 am - 10:30 am Track A

Become the “Smokey” of Hybrid IT Security - Only YOU can make security pervasive

Speakers:
Mary Ann Furno, Offering Manager, Broadcom
Sujay Solomon, Manager of DevOps Product Management, Broadcom

Only YOU can make security pervasive. Today, siloed IT organizations give way to hybrid IT organizations that drive a need for an abundance of integrations via APIs. Bringing on premise and cloud services together is crucial and can inundate organizations unprepared for the complexity of it. The goal is often to create a workload-optimized environment that enables accelerated, on-demand IT service delivery while ensuring no compromise in security and compliance. Putting security first in integrated environments like this is often a challenge.

In this session, we will address the joint requirements, explore how to overcome the security challenge, understand why it is now more important than ever, and conclude on how to lead with security.

Key takeaways:

  • Top challenges to address
  • Addressing regulatory and compliance requirements
  • Setting up and managing the environment
  • Access control and credentials on APIs
  • The need for and securing the test and pre-production environment
10:00 am - 10:30 am Track B

A Proven Approach to Embed Security into DevOps

Speaker:
Stephen Gates, Security Evangelist and Senior Solutions Specialist, Checkmarx

The shift towards DevOps makes it clear that organizations are adopting this model to facilitate the practice of automating development, delivery, and deployment of mission-critical software. While the traditional idea of a software release dissolves into a continuous cycle of service and delivery improvements, organizations find that their conventional approaches to application security are having a difficult time adapting to DevOps, since security if often viewed as an inhibitor to this new approach.

Join Stephen Gates, Checkmarx SME where you’ll:

  • Discover the six proven steps of embedding software security into DevOps.
  • Learn how to ensure vulnerabilities and run-time risks are identified and remediated early in development.
  • Explore the benefits of AppSec integration and automation into the tooling your developers use.
10:30 am -
11:00 am
10:30 am - 11:00 am

CISO Panel: Re-Evaluating Insider Risk

Speakers:
Jamie Manriquez, VP, CISO Santa Cruz Bank
John F McClure, Global CISO, Laureate Education, Inc.
Renata C Spinks, Cyber Technology Officer, USMC

The old risk models no longer work. Today you have employees permanently assigned to home offices, under stress, in conditions that are ripe for malicious insiders who want to cause harm, as well as well-intentioned employees who make costly mistakes. How do you mitigate your new insider risks? Join this panel for a discussion of:

  • Monitoring employee behavior
  • Warning signs of malicious and accidental insider threat
  • Insider risk education that really works
11:00 am -
11:15 am
11:00 am - 11:15 am

Security Debt, Running with Scissors

Speaker:
Dave Lewis, Global Advisory CISO, Duo Security at Cisco

Security debt, defined by Dave Lewis, Global Advisory CISO, Duo Security at Cisco, as “the accumulation of the patches missed, the risks accepted, and the configurations misapplied,” is a serious and common problem for many organizations, especially with the move to cloud computing and rise of IoT. Part of the problem is that, while organizations might accept the risks they encounter, they often neglect to review them or make a plan for the future, and that risk is compounded when patches are passed from person-to-person through staff changes and/or employee churn. However, it doesn’t have to be this way - to track and address security debt, organizations must develop and implement defined, repeatable processes. They should look to strategies like the zero-trust model, trust but verify, sanitation of inputs and outputs, and of course, make sure to execute patches instead of pushing it onto the next person.

11:15 am -
11:45 am
11:15 am - 11:45 am Track A

How to Think Like a Cybercriminal (so you can outsmart them)

Speaker:
Ryan Poppa, Director of Product Management at Cisco Cloud Security

How well do you really know your environment, your security practices and policies? Do you know the tools, techniques, and procedures that cyberattackers use to exploit your vulnerabilities?

Join Cisco Umbrella cybersecurity expert Ryan Poppa exposes the inner workings of a crafty cyberattack.

In his presentation, you'll learn:

  • Why you have been targeted for attack
  • How cybercriminals penetrate environments
  • What tactics they use to pivot from system-to-system while escalating privileges along the way
  • How they are capable of easily exfiltrating sensitive data out of your organization
  • Where your biggest threats may exist

Ryan will also share key insights on how you can protect your organization against these malicious actors and improve your cybersecurity posture with immediate results.

11:15 am - 11:45 am Track B

Security Transformed

Speaker:
Avi Rembaum, Vice President of Security Solutions, Check Point Software Technologies

Preceding the outbreak of COVID-19 was a trend across industries to transform the traditional IT stack into a new form of computing, one that was focused on enabling agility and innovation while also delivering cost reduction. This shift sought to leverage public cloud and cloud-like development methods as well as infrastructure design. The effort to transform information technologies, like all changes, introduces new considerations, especially in the areas of cyber, information and network security. This session will highlight the steps of the transformation process and their security implications. It will also suggest key technologies and processes that organizations should consider when embarking on a transformation program.

11:45 am -
12:00 pm
11:45 am - 12:00 pm

Exhibit, Resource Center & Networking Break

12:00 pm -
12:30 pm
12:00 pm - 12:30 pm

Panel Discussion: Pacific North West

Speakers:
Keith Tresh, CISO, State of Idaho
Michael Bray, CISO, Vancouver Clinic
Trey Blalock, CISO, Coinstar (Bellevue Washington)

12:30 pm -
1:00 pm
12:30 pm - 1:00 pm

Making the Case for IAM Agility

Speaker:
Sean Ryan, Senior Analyst, Security & Risk, Forrester

A accelerated digital world calls for greater protection of identity and access - as well as greater agility in doing so. In this exclusive session, Sean Ryan of Forrester Research makes the case for IAM agility, focusing on:

  • Identity governance
  • Going passwordless
  • Machine identities and non-human identities
1:00 pm -
1:30 pm
1:00 pm - 1:30 pm

First Responders and the Response to Cybersecurity Concerns

Speaker:
Cris Ewell, CISO, UW Medicine

Washington State was the first U.S. epicenter of the COVID-19 pandemic, and as CISO of UW Medicine Cris Ewell was supporting the first responders. How is his security organization most different today than it was a year ago? Hear his approach to:

  • Work from anywhere
  • Supply chain risk
  • Medical device security
1:30 pm -
2:00 pm
1:30 pm - 2:00 pm

Khaja Ahmed, SVP, Head Global Product and Application Security, SAP

2:00 pm -
2:30 pm
2:00 pm - 2:30 pm

Vinod Brahmapuram, CISO, State of Washington

Speaker:
Vinod Brahmapuram, CISO, State of Washington

Vinod Brahmapuram was appointed state Chief Information Security Officer in October 2019. Vinod oversees WaTech’s state Office of Cybersecurity and is responsible for establishing and leading the strategic direction of cybersecurity for state government, as well as advising the Governor and Legislators on key cyber issues.

Vinod has more than 20 years of information technology experience with deep expertise in managing cybersecurity, developing and leading high-performing teams, and managing risk and compliance in heavily regulated environments. Before joining WaTech, he previously served as the Deputy Chief Information Security Officer for the state of South Carolina and held several security roles for the state of New Hampshire Health and Human Services, including serving as the agency’s CISO from 2015-2016.

Since Joining WaTech, Vinod has focused on strengthening the state’s information security posture and creating greater cohesion and cooperation with state agency security professionals to establish an enterprise-wide view of risk. Those efforts have included creating a sustainable cybersecurity operational plan for the state of Washington to meet the security challenges that lie ahead. In the last year, he has worked to build his team and empower them to do their job to protect the state system and data. He has focused on establishing trust and confidence with agencies and is highly engaged and transparent with the CISO community. Even with a challenging year due to COVID-19, great strides have been made to unite the state IT community, working proactively and holistically to detect, respond to and prevent cyberattacks.

View Schedule
  • Hall A
  • Hall B
  • Hall C
  • Hall D
9:00 am -
9:30 am
9:00 am - 9:30 am

Registration & Exhibit Browsing

9:30 am -
10:00 am
9:30 am - 10:00 am

Keynote: Alaska Air

Speaker:
Kevin Morrison, Managing Director, CISO, Alaska Air

Kevin Morrison is the Managing Director of Enterprise Information Security, & CISO at Alaska Air Group in Seattle, WA. Alaska Air Group has both Alaska Airlines and Horizon Airlines under its umbrella, and Kevin has been fortunate to serve in this role since May 2020. Kevin has held previous CISO roles at Coinstar, PulteGroup, and at Jones Day, which is one of the oldest and largest law firms in the world. His background spans nearly 22 years in IT, with over 16 of them in Information and Cybersecurity. Kevin’s passion for people and security has included building and leading teams focused on incident management, operations, DLP, mobility, forensics, compliance, policy, privacy, and business continuity in innovative and highly regulated environments across public and private industries.

Kevin has had the pleasure to present extensively within the Information Security community and has served on several advisory and governance boards, and in March 2015, was selected by his peers as the ISE® Southeast People’s Choice Award Winner. He holds a B.S. in IT from UMass Lowell, and an MBA from Pacific Lutheran University, while maintaining CISSP, CISM, and CISA certification

10:00 am -
10:30 am
10:00 am - 10:30 am Track A

Become the “Smokey” of Hybrid IT Security - Only YOU can make security pervasive

Speakers:
Mary Ann Furno, Offering Manager, Broadcom
Sujay Solomon, Manager of DevOps Product Management, Broadcom

Only YOU can make security pervasive. Today, siloed IT organizations give way to hybrid IT organizations that drive a need for an abundance of integrations via APIs. Bringing on premise and cloud services together is crucial and can inundate organizations unprepared for the complexity of it. The goal is often to create a workload-optimized environment that enables accelerated, on-demand IT service delivery while ensuring no compromise in security and compliance. Putting security first in integrated environments like this is often a challenge.

In this session, we will address the joint requirements, explore how to overcome the security challenge, understand why it is now more important than ever, and conclude on how to lead with security.

Key takeaways:

  • Top challenges to address
  • Addressing regulatory and compliance requirements
  • Setting up and managing the environment
  • Access control and credentials on APIs
  • The need for and securing the test and pre-production environment
10:00 am - 10:30 am Track B

A Proven Approach to Embed Security into DevOps

Speaker:
Stephen Gates, Security Evangelist and Senior Solutions Specialist, Checkmarx

The shift towards DevOps makes it clear that organizations are adopting this model to facilitate the practice of automating development, delivery, and deployment of mission-critical software. While the traditional idea of a software release dissolves into a continuous cycle of service and delivery improvements, organizations find that their conventional approaches to application security are having a difficult time adapting to DevOps, since security if often viewed as an inhibitor to this new approach.

Join Stephen Gates, Checkmarx SME where you’ll:

  • Discover the six proven steps of embedding software security into DevOps.
  • Learn how to ensure vulnerabilities and run-time risks are identified and remediated early in development.
  • Explore the benefits of AppSec integration and automation into the tooling your developers use.
10:30 am -
11:00 am
10:30 am - 11:00 am

CISO Panel: Re-Evaluating Insider Risk

Speakers:
Jamie Manriquez, VP, CISO Santa Cruz Bank
John F McClure, Global CISO, Laureate Education, Inc.
Renata C Spinks, Cyber Technology Officer, USMC

The old risk models no longer work. Today you have employees permanently assigned to home offices, under stress, in conditions that are ripe for malicious insiders who want to cause harm, as well as well-intentioned employees who make costly mistakes. How do you mitigate your new insider risks? Join this panel for a discussion of:

  • Monitoring employee behavior
  • Warning signs of malicious and accidental insider threat
  • Insider risk education that really works
11:00 am -
11:15 am
11:00 am - 11:15 am

Security Debt, Running with Scissors

Speaker:
Dave Lewis, Global Advisory CISO, Duo Security at Cisco

Security debt, defined by Dave Lewis, Global Advisory CISO, Duo Security at Cisco, as “the accumulation of the patches missed, the risks accepted, and the configurations misapplied,” is a serious and common problem for many organizations, especially with the move to cloud computing and rise of IoT. Part of the problem is that, while organizations might accept the risks they encounter, they often neglect to review them or make a plan for the future, and that risk is compounded when patches are passed from person-to-person through staff changes and/or employee churn. However, it doesn’t have to be this way - to track and address security debt, organizations must develop and implement defined, repeatable processes. They should look to strategies like the zero-trust model, trust but verify, sanitation of inputs and outputs, and of course, make sure to execute patches instead of pushing it onto the next person.

11:15 am -
11:45 am
11:15 am - 11:45 am Track A

How to Think Like a Cybercriminal (so you can outsmart them)

Speaker:
Ryan Poppa, Director of Product Management at Cisco Cloud Security

How well do you really know your environment, your security practices and policies? Do you know the tools, techniques, and procedures that cyberattackers use to exploit your vulnerabilities?

Join Cisco Umbrella cybersecurity expert Ryan Poppa exposes the inner workings of a crafty cyberattack.

In his presentation, you'll learn:

  • Why you have been targeted for attack
  • How cybercriminals penetrate environments
  • What tactics they use to pivot from system-to-system while escalating privileges along the way
  • How they are capable of easily exfiltrating sensitive data out of your organization
  • Where your biggest threats may exist

Ryan will also share key insights on how you can protect your organization against these malicious actors and improve your cybersecurity posture with immediate results.

11:15 am - 11:45 am Track B

Security Transformed

Speaker:
Avi Rembaum, Vice President of Security Solutions, Check Point Software Technologies

Preceding the outbreak of COVID-19 was a trend across industries to transform the traditional IT stack into a new form of computing, one that was focused on enabling agility and innovation while also delivering cost reduction. This shift sought to leverage public cloud and cloud-like development methods as well as infrastructure design. The effort to transform information technologies, like all changes, introduces new considerations, especially in the areas of cyber, information and network security. This session will highlight the steps of the transformation process and their security implications. It will also suggest key technologies and processes that organizations should consider when embarking on a transformation program.

11:45 am -
12:00 pm
11:45 am - 12:00 pm

Networking & Exhibit Break

12:00 pm -
12:30 pm
12:00 pm - 12:30 pm

Panel Discussion: Pacific North West

Speakers:
Keith Tresh, CISO, State of Idaho
Michael Bray, CISO, Vancouver Clinic
Trey Blalock, CISO, Coinstar (Bellevue Washington)

12:30 pm -
1:00 pm
12:30 pm - 1:00 pm

Making the Case for IAM Agility

Speaker:
Sean Ryan, Senior Analyst, Security & Risk, Forrester

A accelerated digital world calls for greater protection of identity and access - as well as greater agility in doing so. In this exclusive session, Sean Ryan of Forrester Research makes the case for IAM agility, focusing on:

  • Identity governance
  • Going passwordless
  • Machine identities and non-human identities
1:00 pm -
1:30 pm
1:00 pm - 1:30 pm

Khaja Ahmed, SVP, Head Global Product and Application Security, SAP

1:30 pm -
2:00 pm
1:30 pm - 2:00 pm

Vinod Brahmapuram, CISO, State of Washington

Speaker:
Vinod Brahmapuram, CISO, State of Washington

Vinod Brahmapuram was appointed state Chief Information Security Officer in October 2019. Vinod oversees WaTech’s state Office of Cybersecurity and is responsible for establishing and leading the strategic direction of cybersecurity for state government, as well as advising the Governor and Legislators on key cyber issues.

Vinod has more than 20 years of information technology experience with deep expertise in managing cybersecurity, developing and leading high-performing teams, and managing risk and compliance in heavily regulated environments. Before joining WaTech, he previously served as the Deputy Chief Information Security Officer for the state of South Carolina and held several security roles for the state of New Hampshire Health and Human Services, including serving as the agency’s CISO from 2015-2016.

Since Joining WaTech, Vinod has focused on strengthening the state’s information security posture and creating greater cohesion and cooperation with state agency security professionals to establish an enterprise-wide view of risk. Those efforts have included creating a sustainable cybersecurity operational plan for the state of Washington to meet the security challenges that lie ahead. In the last year, he has worked to build his team and empower them to do their job to protect the state system and data. He has focused on establishing trust and confidence with agencies and is highly engaged and transparent with the CISO community. Even with a challenging year due to COVID-19, great strides have been made to unite the state IT community, working proactively and holistically to detect, respond to and prevent cyberattacks.

2:00 pm -
5:00 pm
2:00 pm - 5:00 pm

End of Day 2 and Close of Summit!

View Schedule

PAST SPONSORS / Supporting Organizations

Accenture
Cequence Security
Check Point
Cisco Systems
Darktrace
DUO Security
exabeam
Forcepoint
Gigamon
IBM
Radware
RSA
Thales
Transmit Security
Veracode

VIRTUAL SUMMIT DETAILS / what to expect at our virtual event

View sessions, chat with speakers and technology experts in our Interactive Exhibit & Networking Experience, and browse our Resource Center to download educational assets to review post-summit.

If you miss any live sessions, feel free to log in and view on demand at your own pace. Session recordings will be available in our virtual environment after the agenda has ended.

ISMG Virtual Summit Attendee Guide
For more information please download our ISMG Virtual Summit Attendee Guide.

Meet Our Speakers

ISMG Global Events: 2020 and Beyond

ISMG's SVP of Editorial, VP of Global Events, and Group Director of Custom Events discuss the state of events.

The Critical Importance of Data Integrity

Microsoft's Diana Kelley on How to Keep Data Untampered

Steve Katz on Cybersecurity’s State of the Union

World's First CISO Weighs in on the Technologies and Trends Shaping 2019

The Challenge of Fighting Identity Fraud

IBM's Shaked Vax on Emerging Technologies to Assure Digital IDs

A Common Sense Guide to Mitigating Insider Threats

Randy Trzeciak of CERT Reviews the Latest Research

Register Today

To earn CPE credits, hear from industry influencers, join ISMG’s global community and meet with leaders of technology register today.

Register Now

Registering For a Group?
Call + 1 (609)-356-1499  or email at events@ismg.io

Contact Us

Reach us: Reserve your attendance today to ensure you don’t miss the opportunity to meet, network and learn from the foremost experts in information security and risk management in this interactive environment.

+1 (609) 356-1499
events@ismg.io

Join the Community

Subscribe to get the latest happenings on our Roundtables, Summits, and other Events!

    • BankInfoSecurity
    • CUInfoSecurity
    • GovInfoSecurity
    • HealthcareInfoSecurity
    • InfoRiskToday
    • CareersInfoSecurity
    • DataBreachToday
    • CyberEd
    Home | Summits | Press Releases | Sponsorship
    © 2021 Information Security Media Group, Corp. |
    Privacy & GDPR Statement | CCPA: Do Not Sell My Personal Data