Forging the Future of Cybersecurity
Thought Leadership | Peer Networking
AI and the Art of Cyber Warfare: Staying Ahead of the Hackers
Advanced Threat Landscape: Understanding the Latest Cybersecurity Risks
Dive deep into the current cyber threat landscape, including emerging threats and sophisticated attack vectors.
AI and Machine Learning in Cyber Defense
Explore how artificial intelligence and machine learning are revolutionizing cybersecurity defenses and threat detection.
Building a Resilient Cybersecurity Culture: Strategies and Best Practices
Learn effective ways to foster a security-first culture within your organization and engage all employees in cybersecurity.
The Future of Cybersecurity: Predictions and Preparations
Gain insights into the future challenges and developments in cybersecurity, and how to prepare your organization for them.
Cybersecurity in the Cloud: Managing Risks and Safeguarding Data
Discuss the unique challenges and strategies for ensuring security in cloud environments.
Next-Generation Cybersecurity Technologies: From Quantum Computing to Blockchain
Examine the potential impact of emerging technologies like quantum computing and blockchain on cybersecurity.
Securing the Remote Workforce: Challenges and Solutions
Address the security challenges brought on by the increasing trend of remote work and learn about the best practices and solutions.
Exclusive Networking with Cybersecurity Leaders and Experts
Connect with peers, industry leaders, and experts for knowledge sharing and building valuable connections.
Connect, Collaborate, and Innovate
with a community of your peers.
CISOcircle Thought Leader Network
Agenda
11:00am - 3:30pm CST
11:00 - 12:15
Registration & Open Networking
Grab a coffee and prepare for an afternoon of fresh perspectives, insights, collaboration, and meaningful connections in the CISOlounge with your local CISO leadership peers.
12:15 - 12:25
Setting the Tone
Our professional Moderator takes the floor to facilitate a day of intimate thought provoking discussion.
12:25-12:45
From Code to Catastrophe: Navigating the Intricacies of Development Environments and Supply Chain Threats - Legit Security
John Tierney, VP of Sales Engineering, Legit Security
In today's rapidly evolving tech landscape, development environments have become increasingly intricate, presenting new challenges for security. As attackers shift their focus from traditional application targets to exploiting vulnerabilities within software supply chains, the stakes have never been higher. Join us for an insightful fireside chat as we delve into the complexities of modern development pipelines, explore the emerging threats, and discuss strategies to safeguard our software supply chains from potential catastrophes.
12:45-1:45
Leader's Lunch
Connecting the dots over this epicurean lunch is the foundation for today's relationship building.
1:45 - 2:30
Predictions Panel
Insights into how new technologies are helping shape strategic maneuvers from within the CISO's office. How is the changing technology landscape climate forcing CISOs to adjust their focus? What new tools can CISOs equip their teams with to help address these challenges?
2:30-2:45
Closing Remarks
We wrap up with a concise synthesis of our event's key messages, express gratitude, and spark motivation for continued innovation and partnership.
2:45-3:30
Cocktail Reception
More than a cocktail reception these are the connections that add light to daily decisions made. Conversations with colleagues and peers in the CISOlounge under the umbrella of the latest technologies and visionaries behind them.