Agenda*
 

Monday, August 6

5:30PM – 7:00PM

Welcome Reception
InterContinental - The Harbor Room


Tuesday, August 7
 

All sessions will be held in the Seaport meeting room. 

7:30AM – 8:30AM

Breakfast
Waterside 3

8:30AM – 8:45AM

Welcome and Introductions

  • Stephen Gold, President and CEO, MAPI 

8:45AM – 9:45AM

Securing the Future Enterprise Today - Build Pervasive Cyber Resilience Now

  • Wayne Dennis, Security Lead - Products, Accenture
     

    With the proliferation of more and more sensitive data, expanding connectivity, and the adoption of automated processes, new research from Accenture (NYSE: ACN) reveals that C-suite and IT decision makers need to embrace a different approach to cybersecurity to effectively protect against future cyber risks. While most companies have a chief information security officer (CISO) or assigned cybersecurity to a C-suite executive, such as a chief information officer (CIO), often, these leaders have limited influence on cybersecurity strategy outside their departments. Additionally, nearly half of CISOs acknowledge that their responsibilities for securing the organization are growing faster than their ability to address security issues.

    In the study “Securing the Future Enterprise Today - 2018", 73 percent of the more than 1,400 C-level executives polled, agreed that cybersecurity staff and activities need to be dispersed and executed throughout all parts of the organization, but cybersecurity remains centralized in 74 percent of companies. Moreover, there is little indication that C-suite executives expect to shift more responsibility for cybersecurity to business units. For example, 25 percent of non-CISO executives say business unit leaders are accountable for cybersecurity today and a similar number believe business unit leaders should be responsible in the future. 

9:45AM – 10:45AM

Defenses Against the Next Digital Black Swan: The Role of the Auditor, The CISO and The C-Suite

  • Jeffrey Welgan, PMP, Executive Director, Head of Executive Training, CyberVista

Equifax, Yahoo, Anthem, Uber; these massive cyber breaches impacted millions of customers and served as ‘digital black swans’. With the proper controls, governance, and communication to leadership, these events could have been prevented. This session will review the root causes and commonalities of past digital black swan events, critical controls to implement that reduce the likelihood and impact of a cyberattack, and communication techniques to achieve senior leadership buy-in.

10:45AM – 11:00AM

Break

11:00AM – 12:00PM

Managing Cyber Risk in Today's World

  • Tyler Farrar, Senior Manager, Cyber Security Audit, Maxar Technologies

    Given the rapid evolution of technology today and the continued evolution to come, organizations must evolve their cybersecurity, risk management, and compliance capabilities. This session will cover how to create a cyber risk management baseline, how that baseline should feed into the overall enterprise risk management (ERM) program, and the guiding principles one should follow to ensure the organization is heading in the right direction.

12:00PM – 1:00PM

Lunch
Waterside 3

1:00PM – 2:30PM

Identifying a Cybersecurity Framework Which Aligns With Your Company's Needs
 

  • Matt Barrett, Program Manager, NIST Cybersecurity Framework, National Institute of Standards and Technology 
  • Ernest Begin, Senior Director of IT Security & Governance, Kaman Corporation 

The NIST voluntary Framework consists of standards, guidelines, and best practices to manage cybersecurity-related risk. Version 1.1 of the Framework was published in April 2018 and clarifies and enhances Version 1.0.

What does the NIST Framework mean for your organization? How can you measure your cybersecurity posture against other manufacturing companies? Join us to learn how to identify and implement a framework to protect your company.

2:30PM – 2:45PM

Break

2:45PM – 3:45PM 

Ignite Session
Harbor

3:45PM – 4:45PM

Responding to Cyber Incidents: Response Teams and Procedures

  • Melissa Ventrone, Member, Clark Hill PLC

    This session will help attendees identify the different challenges and decision points common to breach response and to ascertain what the Business Interruption insurance implications may be. Melissa will provide participants with a number of key insights which could be highly valuable in managing a security breach event as well as practical guidance in breach preparedness planning. 

4:45PM – 7:00PM

Networking Reception
InterContinental - Algonquian Room


Wednesday, August 8
 


All sessions will be held in the Seaport meeting room. 
 

7:30AM – 8:30AM

Breakfast
Waterside 3

8:30AM – 9:30AM

Regulation and Risk Management: Quantitative Methods for Managing Cyber Risk

  • Vincent Voci, Senior Policy Manager, Cyber, Intelligence, and Security, U.S. Chamber of Commerce
  • Doug Clare, Vice President for Security Solutions, FICO

Cyber risk continues to be a front-of-mind issue for businesses of all stripes, and the incessant pace of new breaches and the resulting string of regulations ensure that this will be the case for the foreseeable future. While once viewed in terms of absolutes, more companies are looking at cyber risk management along a continuum of risk and reward and are deploying time-proven methods of quantitative risk management to the cyber problem.  This session will discuss developments in the world of regulation and enforcement, as well as the way in which quantitative methods can be used to measure, predict, and mitigate risk in the uncertain world of cyber security.

9:30AM – 10:30AM

Bringing Digital Disruption in Audit to Life  

  • Dale Livezey, Specialist Leader, Audit Analytics, Deloitte
  • Neil White, Principal, Risk and Financial Advisory, Deloitte

In this session, Neil and Dale will:

  • Discuss the nature of digital disruption in play across compliance and internal audit while providing specific insights into the technology landscape of today,
  • Draw upon results from a recent Deloitte survey of over 1,000 chief audit executives on the state of innovation, 
  • Include a cognitive/robotic use case example, and 
  • Explain how you can audit disruptive technology risks. 
     

10:30AM – 11:00AM

Break

11:00AM – 12:00PM

Have you Mitigated the Risks of Connected Systems, Devices, and Products?

  • Charles Sun, IPv6 Guru/Thought Leader, IoT Top Influencer, Columnist for Homeland Security Today

By the end of 2018, there will be over 23 billion connected devices. What does this mean for the devices and internet traffic that connect to your networks? IPv6 is the latest version of internet protocol, which identifies devices across the internet so they can be located. According to a recent Network World article, under 30% of the Alexa Top 1000 websites are reachable by IPv6. This session will address why wired and wireless IPv6 industrial networks are critical to protecting your data and enabling the modern workforce.

12:00PM – 1:00PM

Lunch
 

*Agenda is subject to change based on availability.