Conference Day One
Tuesday, July 30, 2024

7:30 am Check-In & Coffee

8:40 am Chair’s Opening Remarks

  • David Sheidlower Chief Information Security & Privacy Officer, Turner Construction Co

Building Enterprise-Wide Security-First Culture

8:50 am Case Study: Demonstrating the ROI on Cybersecurity Strategies to Secure Executive Buy-In & Ensure Consistent Funding

  • Mike Griggs Director, Computer and Information Systems, SSOE Group

Synopsis

  • Identifying and quantifying business cyber risk to determine the appropriate level of investment
  • Constructing a compelling narrative to effectively communicate cybersecurity metrics and benchmarks to company leadership to highlight the criticality of investment
  • Establishing a top-down strategy from executive team to middle management to ensure alignment of security goals

9:30 am Panel: Cultivating a Cybersecurity-Aware Culture to Mitigate Threat Level & Ensure Operational Excellence

  • Adam Billmeier Chief Information Officer, Landmark Structures
  • Ryan Nikolich Director of Security and Infrastructure, Pepper Construction Company
  • Kevin Dreyer Chief Information Security Officer , IT Director, Maple Reinders Group

Synopsis

  • Identifying and overcoming challenges in driving cultural change towards cybersecurity awareness and accountability
  • Elevating the significance of cybersecurity and data classification training alongside safety training to ensure enterprise-wide appreciation for potential cyber threats
  • Defining key metrics for tracking and monitoring cultural change efficiently to showcase strategy effectiveness

10:10 am Speed Networking & Morning Refreshments

Optimizing New Tools & Systems Adoption

11:00 am Mastering Evolving Insurer Expectations & Emerging Trends to Consistently Slash Insurance Premiums

  • Ty Brewer Chief Information Officer, Historymaker Homes

Synopsis

  • Understanding commonly overlooked cybersecurity insurance aspects to formulate an advanced strategy that eliminates vulnerabilities
  • Refining your in-house approach of fulfilling insurance obligations to mitigate the risk of being unable to file a claim in the event of an attack
  • Exploring emerging industry shifts and factors that may impact contract eligibility in the future to proactively prepare your approach

11:40 am Panel: Navigating Through Vendor Exhaustion & Optimizing the Selection Process to Guarantee ROI

  • Ryan Nikolich Director of Security and Infrastructure, Pepper Construction Company
  • Janya Kieffer Chief Information Officer, Austin Industries
  • Brian Roberts Senior Director - Cybersecurity & Service Operations, Ledcor
  • Feras Tappuni Chief Executive Officer, SecurityHQ

Synopsis

  • Pinpointing common challenges in the vendor selection process and how to move towards overcoming them
  • Gaining insights into the disparities in costs among different vendor levels to enable optimal selection for individual business needs
  • Ensuring compatibility of your existing tech stack with selected software solutions to mitigate potential vulnerabilities

12:20 pm Networking Lunch

Navigating the Regulatory & Insurance Landscape

1:30 pm Becoming Compliant With Evolving Regulations to Streamline the Auditing Process

  • Nathanael Dick Director of Information Technology, Security & Compliance, SteelFab

Synopsis

  • Gaining insights into industry regulation and techniques in order to accurately interpret and implement them into your own organization
  • Learning how to effectively communicate the risks associated with non-compliance to business stakeholders to prioritize enterprise-wide adherence
  • Developing strategies for navigating audits effectively to ensure efficiency and consistency in compliance efforts

2:10 pm Audience Discussion: Deploying Zero-Trust Architecture in Your Company to Lower Cyber Threats & Alleviate User Burden

Synopsis

  • Exploring the benefits of Zero Trust and practical strategies for implementing it within your organization
  • Identifying cultural challenges surrounding embracing Zero Trust: How can we move towards overcoming them?
  • Communicating strengths of Zero Trust to stakeholders to secure buy-in and allow seamless integration 

2:50 pm Afternoon Break & Networking

Supercharging Enterprise Efficiency Through Optimizing Governance

3:30 pm Establishing Optimal Data Governance Policies to Increase Operational Efficiency & Fully Utilize Available Data

  • John Kronick Chief Information Security Officer, Tutor Perini

Synopsis

  • Spotlighting the ramifications of improper data governance and the financial impacts upon an organization
  • Exploring best practices of data entry and classification training to ensure maximum data reuse and robust security throughout your organization
  • Maintaining large datasets and retention policies to mitigate legal vulnerabilities and prevent overwhelming storage requirements

4:10 pm Developing Protocols for Efficiently Navigating an Abundance of Alerts to Reduce Time Wasted & Optimize the Pathway to Actionable Outcomes

  • Andre Coleman Director of Infrastructure & Security, Austin Commercial

Synopsis

  • Identifying key logs crucial for monitoring and detecting threats to enhance organizational security posture
  • Deciphering logs efficiently to optimize task prioritization and leverage cost-effective tools and dashboard analytics
  • Establishing best practices for the prioritization of threat alerts to expedite the transition from alert to action for improved response capabilities

4:50 pm Chair’s Closing Remarks

5:00 pm End of Conference Day One

5:00 pm Hosted drinks reception