Conference Day One
Tuesday, July 30

7:30 am Check-In & Coffee

8:30 am Chair’s Opening Remarks

Building Enterprise-Wide Security-First Culture

8:40 am Case Study: Demonstrating the ROI on Cybersecurity Strategies to Secure Executive Buy-In & Ensure Consistent Funding

  • Bert Talley Director of Information Technology, Security & Compliance, Cavco Industries

Synopsis

  • Identifying and quantifying business cyber risk to determine the appropriate level of investment
  • Constructing a compelling narrative to effectively communicate cybersecurity metrics and benchmarks to company leadership to highlight the criticality of investment
  • Establishing a top-down strategy from executive team to middle management to ensure alignment of security goals

9:20 am Fireside Chat: Cultivating a Cybersecurity-Aware Culture to Mitigate Threat Level & Ensure Operational Excellence

Synopsis

  • Identifying and overcoming challenges in driving cultural change towards cybersecurity awareness and accountability
  • Elevating the significance of cybersecurity and data classification training alongside safety training to ensure enterprise-wide appreciation for potential cyber threats
  • Defining key metrics for tracking and monitoring cultural change efficiently to showcase strategy effectiveness

10:30 am Speed Networking & Morning Refreshments

Optimizing New Tools & Systems Adoption

11:10 am Audience Discussion: Deploying Zero-Trust Architecture in Your Company to Lower Cyber Threats & Alleviate User Burden

Synopsis

  • Exploring the benefits of Zero Trust and practical strategies for implementing it within your organization
  • Identifying cultural challenges surrounding embracing Zero Trust: How can we move towards overcoming them?
  • Communicating strengths of Zero Trust to stakeholders to secure buy-in and allow seamless integration 

11:50 am Panel: Navigating Through Vendor Exhaustion & Optimizing the Selection Process to Guarantee ROI

  • Ryan Nikolich Director of Security & Infrastructure, Pepper Construction Group
  • Janya Kieffer Chief Information Officer, Austin Industries
  • Brian Roberts Senior Director of Cybersecurity & Service Operations, Ledcor

Synopsis

  • Pinpointing common challenges in the vendor selection process and how to move towards overcoming them
  • Gaining insights into the disparities in costs among different vendor levels to enable optimal selection for individual business needs
  • Ensuring compatibility of your existing tech stack with selected software solutions to mitigate potential vulnerabilities

12:30 pm Networking Lunch

Navigating the Regulatory & Insurance Landscape

1:30 pm Becoming Compliant With Evolving Regulations to Streamline the Auditing Process

  • Nathanael Dick Director of Information Technology, Security & Compliance, SteelFab

Synopsis

  • Gaining insights into industry regulation and techniques in order to accurately interpret and implement them into your own organization
  • Learning how to effectively communicate the risks associated with non-compliance to business stakeholders to prioritize enterprise-wide adherence
  • Developing strategies for navigating audits effectively to ensure efficiency and consistency in compliance efforts

2:10 pm Mastering Evolving Insurer Expectations & Emerging Trends to Consistently Slash Insurance Premiums

  • Ty Brewer Chief Information Officer, Historymaker Homes

Synopsis

  • Understanding commonly overlooked cybersecurity insurance aspects to formulate an advanced strategy that eliminates vulnerabilities
  • Refining your in-house approach of fulfilling insurance obligations to mitigate the risk of being unable to file a claim in the event of an attack
  • Exploring emerging industry shifts and factors that may impact contract eligibility in the future to proactively prepare your approach

3:20 pm Afternoon Break & Networking

Supercharging Enterprise Efficiency Through Optimizing Governance

3:50 pm Establishing Optimal Data Governance Policies to Increase Operational Efficiency & Fully Utilize Available Data

  • John Kronick Chief Information Security Officer, Tutor Perini

Synopsis

  • Spotlighting the ramifications of improper data governance and the financial impacts upon an organization
  • Exploring best practices of data entry and classification training to ensure maximum data reuse and robust security throughout your organization
  • Maintaining large datasets and retention policies to mitigate legal vulnerabilities and prevent overwhelming storage requirements

4:30 pm Developing Protocols for Efficiently Navigating an Abundance of Alerts to Reduce Time Wasted & Optimize the Pathway to Actionable Outcomes

  • Andre Coleman Director of Infrastructure & Security, Austin Industries

Synopsis

  • Identifying key logs crucial for monitoring and detecting threats to enhance organizational security posture
  • Deciphering logs efficiently to optimize task prioritization and leverage cost-effective tools and dashboard analytics
  • Establishing best practices for the prioritization of threat alerts to expedite the transition from alert to action for improved response capabilities

5:10 pm Chair’s Closing Remarks

5:20 pm End of Conference Day One