Day 2: Monday, March 12th

7:45 AM - 8:45 AM Breakfast Briefing: Building and Improving a Collaborative Privacy and Information Security Program

Jacki Monson, Vice President, Chief Privacy and Information Security Officer, Sutter Health

Jacki Monson

Vice President, Chief Privacy and Information Security Officer
Sutter Health


8:45 AM - 9:15 AM Disrupting the Cybersecurity Status Quo

Scott Simkin, Director, Threat Intelligence, Palo Alto Networks
Consuming cybersecurity innovations has become nearly impossible. Teams spend more time testing, integrating, and operating disconnected tools than stopping threats. You must continue to innovate your defenses as attackers evolve their tactics. It is time for a fundamental shift in the consumption of security, so organizations can rapidly adopt innovative capabilities that work together to prevent successful cyberattacks.

Scott Simkin

Director, Threat Intelligence
Palo Alto Networks

9:20 AM - 9:50 AM Business Meetings

9:50 AM - 10:20 AM Business Meetings

10:20 AM - 10:35 AM Networking Break


10:35 AM - 10:55 AM Tackling the Risks of Open Source Security: Five Things Every CISO Needs to Know

Azi Cohen, General Manager of North America, WhiteSource
Open source has become the key building block for application development in today’s market, where companies are under constant pressure to accelerate time to market. The increasing adoption of open source components, however, has introduced new security challenges that most teams are not prepared to mitigate in their current posture. In this session, we will present five approaches and best practices that security teams should implement in order to enable their developers to harness the power of open source without slowing them down or compromising on security.

Azi Cohen

General Manager of North America


10:55 AM - 11:25 AM Changing Threat Landscapes and New Technology Outlook

Parker Ashley, Director, Darktrace
The scene is changing: classic compromises like stolen data or defaced websites are being forced to share the headlines. Now Hackers are playing high-speed games on a global scale, decimating networks with WannaCry ransomware and leveraging IoT devices to bring down the internet. But attackers are also wreaking havoc in stealthier ways, waiting quietly on networks in order to undermine the very integrity of data.

Corporate networks are changing too. Increasing digitization and the corresponding shift towards IoT technologies and the cloud mean that network boundaries are more amorphous than ever. Securing the perimeter simply isn’t possible anymore.

Today’s rapidly evolving threat landscape demands a fundamentally different approach to cyber defense. Proactive security has to think beyond rules and signatures in order to protect against the unknown. AI-based technologies have made possible self-learning, self-defending networks capable of detecting and autonomously responding to threats in real time. These cyber immune systems enable the security team to focus on high-value tasks, can counter even fast-moving, automated attackers, and work across all environments, including the cloud.

In this session, learn:
•The implications of the new era of cyber-threats for business networks
•Why legacy approaches like rules and signatures are proving insufficient on their own
•How new immune system technologies are imperative for the next generation of cyber-defense
•Why 100% network visibility and intelligence allow you to preempt emerging situations, in real time, across any network environment, including Cloud, OT, and IoT
•Real-world examples of subtle threats that routinely bypass traditional controls

Parker Ashley


Case Study

11:30 AM - 12:30 PM Integration of the Electronic Storage Detection K-9

Ian Polhemus, Detective K-9 Handler, City of Seattle
This session will introduce attendees to the newest concept in K-9 training that has a technology component to it within the cyber crime fight. It will provide an overview of the Electronic Storage Detection (ESD) K-9 program as well as discuss both the law enforcement and civilian applications in today’s evolving physical and cyber security world.
Following the investigation and subsequent arrest of Subway pitchman Jared Fogle, with the assistance of a black lab named “Bear”, Ian reached out to the trainer and initiated a plan to purchase Bear and bring him back to Seattle.

Since September of 2015 Ian and Bear have continued to support the Internet Crimes Against Children Task Force, where they focus on assisting investigators in the recovery of digital evidence that might otherwise have gone undetected, but for the power of the nose!

Ian Polhemus

Detective K-9 Handler
City of Seattle

12:30 PM - 1:30 PM Networking Lunch

Rotating Roundtable Discussions: Engage in your choice of two 30-minute targeted discussions for open exchange among industry peers

1:30 PM - 2:35 PM How to Prevent Evasive Cyber-attacks Hidden Deeply in Incoming Files and Emails

Ron Goren, VP Sales, Sasa Software presented by Bavelle Technologies , , Oren David, CFO, Bavelle Technologies

Ron Goren

VP Sales
Sasa Software presented by Bavelle Technologies

Oren David

Bavelle Technologies

Rotating Roundtable Discussions: Engage in your choice of two 30-minute targeted discussions for open exchange among industry peers

1:30 PM - 2:35 PM Zero Trust Access: Five Steps to Securing the Distributed Enterprise

Michael Moshiri, Senior Director of Product Marketing, Duo Security

Michael Moshiri

Senior Director of Product Marketing
Duo Security

Rotating Roundtable Discussions: Engage in your choice of two 30-minute targeted discussions for open exchange among industry peers

1:30 PM - 2:35 PM Hacking Vulnerability Disclosure

Lisa Wiswell, Advisor, Former Department of Defense, HackerOne

Lisa Wiswell

Advisor, Former Department of Defense

2:40 PM - 3:10 PM Business Meetings

3:10 PM - 3:40 PM Business Meetings


3:40 PM - 4:15 PM Proactive Strategies for Empowering Unified IT/OT Security

David Alexander, CISO, Los Angeles Department Water and Power
In this session, explore common issues existing in many industrial control systems. Look at the divide between existing control and communication systems and backbone corporate systems. As control systems continue to change away from proprietary systems, look at common challenges and incompatibilities between contemporary IT and OT systems. Explore the best methods for successful integration to ensure enhanced cyber security.
In this discussion:
•Analyzing security gaps across IT/OT
•Navigating threat intelligence, network security monitoring, and malware analysis
•Improving incident response and disaster recovery

David Alexander

Los Angeles Department Water and Power

4:15 PM - 4:30 PM Networking Break

4:30 PM - 5:00 PM Business Meetings

5:00 PM - 5:30 PM Business Meetings


5:30 PM - 6:15 PM The ‘Cyber Literacy’ Project: Helping Lawyers Understand Technology and Technologists Understand Law.”

Daniel Sutherland, Associate General Counsel, Department of Homeland Security

Daniel Sutherland

Associate General Counsel
Department of Homeland Security

6:15 PM - 6:15 PM Cocktail Reception