Virtual Roundtable: CISO 360 – Secure development during digital transformation – A new approach for a new reality
10 February 2021
14:00 – 15:30 GMT
How can we as CISOs ‘shift left’ to enable our developers to innovate faster while we secure enterprise applications at scale?
- There is no cost to attend for in-house practitioners – CISOS, CIOs, Developers, Heads of Architecture, Networks, Applications.
- Places are limited to 5 guests for this event to maintain an in-depth peer to peer benchmarking focus for the discussion and the sharing of best practices.
- Confirmations will be done on a ‘first to confirm’ basis.
- Led by CISOs, the Roundtables are individual sessions designed around content, connection and contribution. Kindly sponsored, there is no sales talk and no presentation.
- This roundtable will be hosted on Zoom.
As a CISO, you are invited to attend this special CISO 360 Roundtable hosted on 10 February. During the discussion, you will benchmark operational security capabilities with peers.
As companies adapt to compete in today’s marketplace, business leaders need to be aggressive and intentional about driving adoption of agile and DevOps within their organisations. However, the shift to digital initiatives means more software and that means more software risk. Your infrastructure is now part of your application, blurring the lines on who is responsible for security. DevOps has accelerated the deployment of software. But where does this leave your security practice?
Led ‘by, with and for’ CISOs, you will exchange experiences with peers on secure development during digital transformation. What are the new approaches for new realities/ How can we as CISOs ‘shift left’ to enable our developers to innovate faster while securing your enterprise applications at scale?
Hosted by Pulse Conferences, sponsored by Snyk and Sep2, we will connect peers for an energetic debate on the practical approaches, realities, challenges and successes. All participants are encouraged to contribute throughout for this digital face to face benchmarking event.
- Why the old ways of doing security don’t mesh with the way we build apps today
- The dev-first security practices that can cut risk without harming agility
- The new tools and the shift in mindset that these changes demand
The discussion is held under The Chatham House Rule of non-attribution.
We are delighted to welcome Alyssa Miller, BISO of S&P Global Ratings who will lead this discussion, working alongside a further CISO. Clive Room, Director, Pulse Conferences will top and tail the event as your esteemed Master of Ceremonies.
If you can accept, please click on the ‘Register’ button to confirm your place around the digital table.
We look forward to seeing you on 10 February, 14:00-15:30 GMT for what promises to be an educational, memorable – as well as entertaining – discussion with peers!
The agenda is relatively fluid to ensure that all participants have the opportunity to contribute – everyone is a speaker in this small group format that is designed for in-depth benchmarking CISO to CISO.
Digital House-Keeping and Guest Welcome
Master of Ceremonies: Clive Room, Director, Pulse Conferences
Introduction and insights on the topics
Main Roundtable discussion
Secure development during digital transformation – A new approach for a new reality.
Summaries and Goodbyes
Alyssa Miller, Business Information Security Officer (BISO), S&P Global Ratings
Alyssa Miller is a life-long hacker, programmer, and security advocate. She’s always had a passion for computers. She bought her first PC at age 12 and taught herself BASIC programming. Her career began as a software developer and later pivoted to security as a penetration tester. She has 15 yrs. experience in security leadership across enterprise, consulting, and product organizations. She currently directs division security strategy as the Business Information Security Officer (BISO) for S&P Global Ratings. Alyssa advocates for aspiring security professionals trying to find a path into security and expanding diverse representation across security. In addition to conducting and presenting her own research, she is also a member of the Women in Cyber Security (WiCyS) racial equity committee, a Women of Security (WoSEC) chapter leader and presented at the She Speaks Security Symposium at RSA USA 2020.
Stephen Khan, Head of Tech and Cyber Security Risk -Global Resilience Risk, HSBC (and Board Advisor and Chairman of White Hat Events)
Before joining HSBC, Stephen was at RBS and held the position of Global Head Security Strategy, Architecture and Engineering; and Global Head of Security Transformation programmes. Stephen has extensive’ experience in Information and Cyber Security including experience of establishing, delivering, and managing global cyber security organisations & global services for complex global and highly regulated organisations to effectively manage information assurance; privacy; and cyber security risk & Cyber security operations to drive strategic business value. Stephen’s experience spans across multiple business functions; industry verticals including Finance; Pharmaceutical and Manufacturing. Stephen combines business acumen and commercial experience with deep cyber security expertise to deliver long term strategic business value by building high performing capable teams and strong stakeholder management.
Stephen is Board Advisor and Chairman of White Hat Events which runs information security charity events including White Hat Ball; and White Hat Rally to support NSPCC ChildLine & Barnardo’s. Stephen contributes to the wider Cyber Security community via industry forms, coaching and mentoring future leaders; and executive engagements with his peers across multiple sectors.”
Master of Ceremonies
Clive Room, Director, Pulse Conferences
Clive has worked as a marketeer within cybersecurity since 2000. As the Marketing Manager at Portcullis Computer Security he organised all their bespoke events from seminars to hospitality events like the famous Portcullis Arms during Infosec. He was also responsible for their involvement with conferences and exhibitions all over Europe. His experience in promoting and presenting at cyber security events is matched by his passion for helping people understand the critical importance of mitigating the risks and protecting themselves and their organisations from cybercrime. He believes that in terms of reputational damage and operational costs, security breaches should be a key concern of everyone from the ground floor worker up to board and director level. Clive was Chairman of The White Hat Committee, the charity for the information security industry, which raises money for ChildLine and Barnardo’s throughout the year. This January’s White Hat Ball was the most successful to date raising over two hundred thousand pounds and the next White Hat Car Rally is in September. Clive is proud to be a part of the dynamic team at Pulse Conferences bringing the CISO 360 Congress and related series to the marketplace as a game changer in cybersecurity events.
About the Sponsors
Snyk is a developer-first security company that helps software-driven businesses develop fast and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and container images. Snyk’s solution is built on a comprehensive, proprietary vulnerability database, maintained by an expert security research team in Israel and London. With tight integration into existing developer workflows, source control (including GitHub, Bitbucket, GitLab), and CI/CD pipelines, Snyk enables efficient security workflows and reduces mean-time-to-fix. For more information or to get started with Snyk for free today, visit https://snyk.io.
sep2 is pronounced [sep-two] and is taken from three key words which define our ethos; security | excellence | partner. These three words are our foundation and with the exponent of two signifying the partnership between sep2 and you, our customer. Founded in 2016 by three passionate and focused security professionals; sep2 was born out of the drive for perfect security and service excellence, with solid understanding in designing, implementing and auditing IT Security infrastructures. The sep2 team have a well-earned reputation of offering organisations a vast wealth of knowledge and support in a multitude of solutions and services. www.sep2.co.uk