A SecurityWeek Event


An Exclusive Executive Forum Focused on
Information Security Leadership and Strategy

September 13-14, 2022

2021 CISO Forum Presented by


2021 Diamond Sponsors


2021 Platinum Sponsors


2021 Gold Sponsors


Silver Sponsors


2021 CISO Forum

SecurityWeek’s CISO Forum takes place annually at the beautiful Ritz-Carlton, Half Moon Bay, which has served as the venue of the forum since 2014.

Given the global situation resulting from the COVID-19 pandemic, SecurityWeek’s 2021 CISO Forum, Presented by Cisco, will take place virtually. Through a cutting-edge platform, attendees will be able to interact with speakers and sponsors, and visit networking lounges, specific zones & sponsor booths.

This  event is designed for security leaders to discuss, share and learn information security strategies. (Register)

Visit Here for the Latest Event Updates for the Virtual Edition

An Exclusive Executive Forum Focused on Cybersecurity Leadership and Strategy

September 14-15, 2021
Virtual Event – View Event Website

Throughout this two-day virtual event, sessions will have a strong focus on participation from CISOs in panel discussions along with talks from industry experts, analysts and other end users, and thought leadership, strategy and technical sessions.

Topics Include:

  • Fireside Chat: Adrian Stone: VP, CISO at Peloton
  • Winning Hearts and Minds on the Board
  • Designing and Architecting Security for a Hybrid World
  • CISO Panel: Navigating SBOMs and Supply Chain Security Transparency
  • Panel: CISO’s Guide to Building a Security Dream Team
  • Panel: The Top 5 Priorities of the Modern CISO
  • Defenders Playbook for Attack Simulation and Security Posture Validation
  • Virtual Expo and Networking
  • Identity-Focused Security for Your Zero Trust Journey
  • Winning Hearts and Minds on the Board
  • Securing Our Cloud Environment Against Hackers
  • Key Insights to Prevent Never-Before-Seen Cyber Attacks
  • SASE Industry Trends
  • Measuring Security and Building Trust with Leadership: Enabling Transformation Through Testing
  • How DevOps Can Make AppSec Testing Seamless
  • Addressing Sophisticated Supply Chain Attacks Head On with No Source Code Required
  • Much more! – Add to Calendar

Through a cutting-edge platform, attendees will be able to interact with speakers and sponsors, and visit networking lounges, subject-specific discussion areas, and sponsor booths in a virtual expo hall.

Adrian Stone

Adrian Stone


Anne Marie Zettlemoyer

Anne Marie Zettlemoyer

VP, Security Engineering

Caleb Sima

Caleb Sima


Allan Friedman

Allan Friedman (Invited)

Cybersecurity and Infrastructure Security Agency (CISA)
SBOM Champion

Summer Craze Fowler

Summer Craze Fowler

Argo AI

Fredrick Lee

Fredrick ‘Flee’ Lee

Chief Security Officer

Shaila Shankar

Shaila Shankar

SVP and General Manager of Cisco Cloud Network and Security

Jonathan Jaffe

Jonathan Jaffe


Aanchal Gupta

Aanchal Gupta

VP, Azure Security

Lena Smart

Lena Smart


Sounil Yu

Sounil Yu


Theresa Payton

Theresa Payton

Former White House CIO
Star of CBS TV series, “Hunted”, and Leading Cybersecurity Expert




September 24-26, 2019


1 Miramontes Point Rd, Half Moon Bay, CA 94019


+ 1 (650) 712-7000

New Cyber-Defense Strategies for Healthcare Security

01/10/2017 0

In the healthcare industry, cyber-defense systems must continually evolve to keep pace with the ever-changing threats posed by computer hackers and malicious software attacks. This ongoing game of cat-and-mouse makes it hard for us CISOs to keep our defense postures up to date, or even to stay knowledgeable about the newest security products on the market.

To address this challenge, I recently invited several of my industry peers to meet with some of the most cutting-edge security startups in Silicon Valley in search of some new solutions. This unique CISO-VC Briefing Program was organized by our technology partner Trace3, which has built up strong relationships with many of the Valley’s most prominent venture capital firms and their portfolio startups.

I was joined by my IT security colleagues from Scripps Health, Millennium Health, NuVasive, Ringcentral and Bank of the Internet. Many of us are members of the San Diego CISO Roundtable, a tight knit community of local security executives, while a few participants presented a unique Northern California/Southern California CISO networking opportunity. We all grapple with the same challenges, yet we don’t view information security as a competitive advantage. In fact, we try to help each other by sharing updates about the latest types of attacks and the newest security strategies.

Visiting with Security Startup Leaders in Silicon Valley

Even with the rapid pace of cybersecurity innovations today, the bad actors continue to evolve their threats too. Many of us CISOs still rely on legacy security tools that have been leapfrogged by new types of attacks in recent years, so we need to continually adapt our people, processes and technologies.

Older defense systems such as network firewalls and intrusion detection systems remain important, but they are more easily circumvented today. For instance, firewalls only block certain network entry points, but attackers simply use sanctioned ports in firewalls to deliver their malicious software.

Many of the latest security products take a different approach rather than trying to build a moat around the network, which is no longer effective in this world of cloud computing and mobile computing. Some next-generation technologies incorporate machine learning systems that become smarter over time.

One clever approach is known as user behavior analytics (UBA). This type of software sets up profiles for the expected normal online behaviors of each user. By monitoring all users, the system can detect anomalous behaviors which may be the result of stolen password credentials. Or perhaps such unusual patterns are due to a disgruntled employee who is downloading proprietary company data. Employees with sensitive data access may be detected reaching beyond their authorization and into files they don’t have a legitimate reason to see.

My team at Sharp Healthcare is very interested in adopting UBA to detect such intrusions, and we are planning to purchase a solution in the New Year. 

Staying One Step Ahead of the Bad Guys

Another cool new security technique shown at our briefing involved network anomaly detection, which is used to track network traffic for abnormal patterns. For example, when terabytes of financial information start getting downloaded at 3 AM, that event triggers an alert to mitigate a potential breach.

New tools for identity and access management allow IT managers to give employees the mobile reach they need to access data from any device, while still protecting the company’s interests with cloud-based security. In addition, data packet inspection solutions examine the reputations of email senders to thwart any possible phishing attacks.

As a result of the briefing, I also set up meetings with DB Networks and Imperva, makers of database monitoring systems, along with Immuta, a firm that specializes in data security while providing an integrated experimentation platform for data scientists.

Many CISOs and CIOs shy away from buying cutting-edge technologies. Some prefer to instead stick with the big incumbent vendors. However, it’s critical to develop a familiarity and trust for the technologies that today’s leading startups are developing.  From a security perspective, this is the only way to stay one step ahead of the next potential data breach.

Leave a Reply

Your email address will not be published. Required fields are marked *

Subscribe for Event News