VIRTUAL EVENT
ONE INSPIRING KEYNOTE
AND
THOUGHT LEADERSHIP PANEL DISCUSSION
KEYNOTE
U.S. Army (Ret), served the nation for more than 30 years, experienced in leadership, technology, acquisition, and logistics. Currently a public and private sector advisor.
KEYNOTE | Lessons From the Front Line on Information Tracking and Controls
In this keynote, the General will draw parallels between protecting confidential information during his more than three decades in the U.S. Army and the cyber war state of modern-day commercial enterprises. The General will present with a specific emphasis on how comprehensive intelligence of the where, who, and when of sensitive information communication is paramount to ensuring the security of information. You’ll hear, through specific examples during his time in the Army, how this intelligence shores up necessary tracking and controls of information communication to ensure the wrong information doesn’t fall into enemy hands. Public and private institutions today are at war with the hackers, and war-like information privacy strategies are becoming a necessity. Join the keynote to get a first-hand account of those strategies from someone who designed and lived them.
THOUGHT LEADER PANEL DISCUSSION
Observations and real-world learnings from the past 6 months. Gain insight into the latest attacks and learn what your organization can do to be better prepared.
Lauren Boas Hayes
Senior Advisor for Technology and Innovation at CISA
Compliance Driven Technology and Innovation to Secure Your Organization and Minimize Violations
Discuss strategies to drive tighter convergence between compliance and cybersecurity, and how this can reduce risk and minimize compliance violations.
Heather Sussman
Global Chair – Cyber, Privacy, and Data Innovation Practice Group at Orrick, Herrington, and Sutcliffe LLP
Enabling Data Innovation in a Regulated World
CLOSING PRESENTATION & WRAP-UP
Jonathan Yaron
CEO and Chairman at Kiteworks.
KEYNOTE | Closing the Risk-Management Gap Across Security, Privacy and Compliance of Sensitive Information
Jonathan experienced first-hand how interruptive a breach can be, and in this discussion he’ll lead a discussion on how harmonizing the needs of security, privacy and compliance teams lowers the risk profile of an institution and helps to prevent against the ultimate interrupter of “business as usual” after a breach: lawsuits. Key focuses of the discussion will include unifying metadata intelligence to provide insights across enterprise functions, what you didn’t know governments, Microsoft and other cloud providers have access to and how it increases your company’s risk, and finally how technology can simplify the processes and reduce human resource requirements in the effort to gain control of the chaos of your sensitive and private information.
AGENDA
8:00 AM – 8:45 AM PT / 11:00 AM – 11:45 AM ET | Keynote Presentation | ||
8:45 AM – 9:30 AM PT / 11:45 AM – 12:30 PM ET | Thought Leadership Panel Discussion | ||
9:30 AM – 10:00 AM PT / 12:30 PM – 1:00 PM ET | Closing Presentation & Wrap-up |
8:00 AM – 8:45 AM PT / 11:00 AM – 11:45 AM ET | Keynote Presentation |
8:45 AM – 9:30 AM PT / 11:45 AM – 12:30 PM ET | Thought Leadership Panel Discussion |
9:30 AM – 10:00 AM PT / 12:30 PM – 1:00 PM ET | Closing Presentation & Wrap-up |
Fill out the form below to register for Summit.