#1301214: CSO50 Conference+Awards
THE CSO50 CONFERENCE
LEVERAGING WORLD-CLASS SECURITY STRATEGIES
SHARE YOUR CONFERENCE EXPERIENCE ON SOCIAL MEDIA USING THE HASHTAG #CSO50
Sessions at the CSO50 Conference will explore how the business risk landscape is changing at breakneck speed, and the ways enterprise technology rapidly advances and exposes new threats, the number of Internet-of-Things (IoT) and other devices is growing exponentially and by the billions. Attend and discover how you proactively find and deploy new and innovative approaches to minimize threats and risk to your enterprise.
Find out what award-winning organizations are doing at the CSO50 Conference + Awards, taking place at the JW Marriott Camelback Inn Resort & Spa, April 27-29, 2020.
Winning projects and initiatives featured in our information-packed, TED-like format of 18-minute sessions cover topics such as:
Access and Identity Management
Data Loss Prevention and Recovery
IoT and Machine Learning
Managing Third-Party Risk
Minimizing Risk & Fraud
Security Awareness and Training
and much more
The CSO50 Conference agenda reveals a wide variety of security executives presenting the projects that won their organizations CSO50 Awards for 2020. They’ll present how their projects came to fruition, how they’ve delivered business value, and key takeaways you can leverage for your organization. (Please note that exact session times on the agenda are subject to slight adjustment.)
Sorted by Company
Sorted by Day & Time
RETHINKING APPLICATION SECURITY FOR SPEED AND INNOVATION
Jeremy Brooks, Information Security Architect, Aaron’s
Eric Simmons, Aaron’s
Headquartered in Atlanta, Aaron’s, Inc. is a leader in the lease ownership of name brand furniture, consumer electronics and home appliances through its more than 1,600 company-operated and franchised stores in 47 states and Canada. Aaron’s previous application security program was typical of many organizations performing biweekly or monthly static application security testing and semiannual and ad hoc dynamic application security testing. Feedback could take weeks or months, which made prioritizing and issue remediation difficult, thereby conflicting with the DevOps culture, slowing development, and stifling innovation. Join us for this session to learn how the application security team partnered with QA, development, and DevOps to create a ground-breaking application security platform that accelerates discovery and remediation of application security defects.
ESTABLISHING SECURITY AMBASSADORS TO FORTIFY A SECURE ORGANIZATIONAL CULTURE
Omar Prunera, Senior Director, MNC Business Security Office and Global Programs, ADP
ADP is a global provider of cloud-based human capital management (HCM) solutions that unite HR, payroll, talent, time, tax and benefits administration and a leader in business outsourcing services, analytics and compliance expertise. Because security is critical to all aspects of the organization, ADP is constantly looking for innovative ways to transform its culture of security from something ADP says it does, to something they are. With that goal in mind, ADP’s Global Security Organization launched the Security Ambassadors for Excellence (S.A.F.E.) initiative to inform and train employees about security, improve their knowledge and behavior, and maintain the highest levels possible for ADP’s security posture. Join us for this session to learn the benefits of the S.A.F.E. program including how to use crowdsourcing to promote security awareness.
STREAMLINING AUTHENTICATION AND VALIDATION WITH BIOMETRICS
Raj Madan, Managing Director, Technology, BNY Mellon/Pershing
BNY Mellon/Pershing and its affiliates provide advisors, broker-dealers, family offices, hedge fund and ’40 Act fund managers, registered investment advisor firms and wealth managers with a broad suite of global financial business solutions. Financial services has traditionally been reliant on paper recordkeeping, but it’s widely understood today that paper transactions can actually be a contributor to fraudulent activity. With fraud reduction in mind, BNY Mellon/Pershing saw the need for an automated process that leverages an investor’s identity to streamline authenticating and validating a payment transaction, thereby reducing time while preventing identity theft. Join us for this session to learn how the organization’s Investor Biometric Payment Acknowledgment gives investors the ability – through biometrics — to efficiently access and authorize payments.
EMBEDDING CYBERSECURITY AND FRAUD PREVENTION IN DIGITAL STRATEGY
Stephen Pedersen, Director, Information Security, Coast Capital Savings
Coast Capital Savings is Canada’s largest credit union by membership and British Columbia’s first credit union to become a federal credit union. Owned by its 572,000 members, Coast Capital offers banking and investment services digitally and through its 52 branches in the Metro Vancouver, Fraser Valley, Okanagan, and Vancouver Island regions of British Columbia. Coast Capital Savings has been working on plans to expand its business nationally, including the launch of a digital strategy to help penetrate new markets. The centerpiece of this initiative was the July 2019 rollout of a new digital banking platform with a focus on cybersecurity and fraud prevention and detection, among other best-in-class features. Join us for this session to understand how this project demonstrates significant innovation in cost-effective assembly and configuration of out-of-the-box technologies and cloud capabilities to create a scalable cybersecurity ecosystem to deliver a trusted banking experience.
TRANSFORMING THE PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION
Kevin Charest, CISO, Health Care Service Corporation
Health Care Service Corporation (HCSC), the largest customer-owned health insurer in the United States operating through Blue Cross and Blue Shield Plans in Illinois, Montana, New Mexico, Oklahoma, and Texas, prioritizes the safety and security of its more than 16 million members’ personal health data. Yet with the rise of bad actors attempting to steal personal identities, ransomware attacks are continuing to increase across the health care space. Join us for this session to learn how HCSC deploys its cyber defense team to investigate and respond to suspicious activity through its security operations hub and leverage advanced monitoring and detection techniques in a highly regulated industry.
CYBER EDUCATING EVERY K-12 AND HIGHER EDUCATION STUDENT IN NORTH DAKOTA
Shawn Riley, CIO, ND Information Technology Department
As a national leader in energy and agriculture with a significant military footprint, North Dakota’s cybersecurity strategy involves a whole-of-government approach – including training the next generation of cybersecurity professionals. The state’s “K-20W” Initiative aims to educate every student in every class with computer science and cybersecurity skills that are foundational in the digital age and valuable in virtually every industry. Join this panel to learn how North Dakota is creating a 21st century technology literate workforce to help students compete and succeed in a global economy, and the impact of Working as One to create the cyber workforce of the future.
LEVERAGING GAMIFICATION TO IMPROVE PENETRATION TESTING EXERCISES
Seth Fogie, Director, Information Security, Penn Medicine
Penn Medicine is one of the world’s leading academic medical centers, dedicated to the related missions of medical education, biomedical research, and excellence in patient care – and consists of the Raymond and Ruth Perelman School of Medicine at the University of Pennsylvania (founded in 1765 as the nation’s first medical school) and the University of Pennsylvania Health System. As a leading academic medical center in the United States, Penn Medicine must take extraordinary measures to protect its technology environment. To educate employees on guarding against threats, the Penn Test Security Challenge was created to leverage gamified penetration testing exercises as part of its security program. Join us for this session to understand how performing penetration testing exercises with real-world vulnerabilities and exploits enables team-building and discovery at Penn Medicine to successfully understand complex attacker techniques and remediate technology security challenges.
|Date added||Feb. 9, 2020, 5:20 p.m.|
|Venue||JW MARRIOTT SCOTTSDALE CAMELBACK INN RESORT & SPA 5402 East Lincoln Drive Scottsdale, AZ 85253, April 27, 2020, midnight - April 29, 2020, midnight|