Day 3: Tuesday, March 13th

7:45 AM - 8:50 AM Networking Breakfast

8:50 AM - 9:00 AM Chairperson’s Opening Remarks

Cyber security is just one responsibility of the CISO, with high profile data breaches in the new regulatory era, communication with the board and the rest of the C-suite is paramount. CISOs must shape the message and methods to address unique organizational dynamics. Explore how the CISO must be part technical guru along with psychologist and business leader. The CISO must know the technology enough to protect the organization’s critical operations and data. The CISO must be able to justify security expenditures in business terms. The psychology helps with navigating motivations and priorities of the rest of the executive team. Changing regulations are also affecting the CISO’s reporting structure and the dynamics of the role

Join this session to learn how to:

•Engage, manage and meet board and C-Suite expectations

•Exploring how the CISO reporting structure has changed with regulations

•Blending business, psychology and technology



Tunde Oni-Daniel

Director of Information Security (CISO)
Perdue Farms Inc.

Sarah Engstrom

Chief Information Security Officer & IT Director of Productivity
CHS

Session

9:40 AM - 10:10 AM Nine Habits of Highly Effective Cybersecurity People

George Finney, Chief Security Officer, SMU
Cybersecurity is a behavior, not a skill. We’ve taught cybersecurity awareness for years as though it were a skill to be learned like any other technology. To change behaviors, we need to understand the underlying habits that govern our responses. This presentation will explore the 9 Cybersecurity Habits and will look at how you can use those habits to focus on changing behaviors in your security training and how to tailor your approach to have the greatest impact for all your employees.

George Finney

Chief Security Officer
SMU

10:15 AM - 10:45 AM Business Meetings

10:45 AM - 11:15 AM Business Meetings

11:15 AM - 12:00 PM Evolving White Board Workshop Session

In this CISO, inspired session we will discuss a topic suggested by you and your fellow CISOs during the CISO Exchange. Please put up sticky notes on the white board, which you would like to discuss during this workshop on Day 1. Then by lunch on Day 2 please rank, which topics are of most interest to you. Then by evening cocktails the chairperson will select the topic, which we will discuss during the workshop. (Please also, consider emailing the conference producer suggestions ahead of time at Melissa.Lattman@iqpc.com)

12:00 PM - 12:00 PM Chairperson’s Closing Remarks