Speaker Topics
CISO Flagship Summit Speaker Event
Generis Speaker Event American CIO & IT Summit
Past Engagements
Speaker Topics
Quantum Computing:
Prepare to be Prepared
Session Blurb: The topic of quantum computing sounds complex unless you are an expert mathematician. Most of us are not, but we can still understand the concepts, follow the evolution and learn what we need to do to be prepared
The Why: As technology professionals, we need to remain informed on how future technology will impact what we do. Quantum computing promises to deliver results exponentially faster than today’s computers, and that is exciting and frightening at the same time. Come hear why.
3 Key takeaways:
-
A high-level understanding of the impact of Quantum Computing
-
Why it threatens our current cryptography methods
-
What you can do before it arrives
​
This session is for you if you are curious about the future of technology and want to get ahead of protecting your information and technology assets.
"You don't need an A+ in Quantum Computing to prepare for its impact"
Preparing for The Journey To A Mature Security Model
Session Blurb: Maturing the security capabilities of an organization takes intentional planning and execution. It is more than securing funding. To pave the way we must align with the company's goals, assess where we are, and engage all parts of the company.
The Why: In today's digital age, it is crucial for organizations to have a mature security model in place to protect sensitive information and assets. However, creating a mature security model involves everyone.
3 Key takeaways:
-
Understand the importance of making this transition
-
Who to partner with in your organization and why
-
Know the necessary steps to move their organization to a mature security model
"We can no longer create a mature security capability without the rest of the company's commitment"
You Can't Measure What You Don't See
Session Blurb: Having visibility into an organization's digital environment is key to protecting a company. Where do you start and who do you ask? Learn how to use what you have and know today to build out the visibility needed to protect your company.
The Why: With a comprehensive view of a company's digital footprint, we stand a better chance of protecting company assets.
3 Key takeaways:
-
See how to use what you have and know today to build visibility
-
Learn an approach to gaining better visibility
-
Understand what barriers are in the way
"While it is true that you can't manage what you don't measure, it is equally true that you can't measure what you don't see. Building visibility is required to become more secure"
Eliminating the After-Market of Security
Session Blurb: Today, information security is a top priority for every company due to constantly growing and evolving threats. That makes building security into applications from the start more important than ever. What applications don’t do are equally as important as what they are intended to do.
The Why: Building and running applications with security as a requirement is a change not just to technology or process, but to our own behavior.
3 Key takeaways:
-
Learn how to secure apps as they are developed
-
Hear tips on how to get a jump start
-
Understand what behavior changes are required and by who
"Developers must prioritize secure coding practices from the start to prevent avoidable vulnerabilities and avoid costly delays."
Thriving as a Woman in Leadership: Strategies for Success
Session Blurb: Gender biases and stereotypes are still prevalent and being a female leader can be challenging. However, with the right mindset, skills, support and qualities, women can overcome these obstacles and make a significant impact in their industries. By exploring the challenges, advantages, and qualities of female leaders, you will be better equipped with inspiration and guidance to become effective and empowering leaders.
The Why: This session is for any woman who wants to become a leader or anyone who wants to support and promote female leadership.
3 Key takeaways:
-
Learn the key traits and qualities of female leaders, such as courage, resilience, and authenticity, and how to cultivate them.
-
Hear about the challenges female leaders face in a male-dominated industry and how to turn them into opportunities for growth and impact.
-
Understand different leadership styles, strategies, and lessons learned.
"Embrace your uniqueness and use it to your advantage"
Strategies for a Stronger Security Program: Lessons from Across Industries
Session Blurb: There are both commonalities and differences when implementing a security program in different industries. As cyber-attacks continue to rise, it's essential for businesses to implement a robust security program to protect themselves and their customers. Hear the strategy that is effective across industries, how to recognize where there may be differences, and how you can apply them to your own company.
The Why: Gain insights into effective strategies used in other industries and learn how to apply them to your company. Understanding where there are commonalities and differences in implementing a security program across different industries will help you stay focused on the key differentiators for your industry.
3 Key takeaways:
-
Learn what strategies are effective across industries and recognize differences, to build a tailored and comprehensive security program at your company.
-
Hear how other industries approach security and how you can apply best practices to your own business.
-
Understand it is essential to recognize when and where commonalities and differences can occur to create an effective security program.
"Unlike snowlakes, security programs across industries are more alike than we think"