Register Now
August 3-8, 2024
Mandalay Bay / Las Vegas

Black Hat CISO Summit

Tuesday, August 6, 2024

Four Seasons, Las Vegas, NV


The Black Hat CISO Summit is an approval-only event during Black Hat USA which brings together top security executives from global corporations and government agencies for a full day of unique discussions. Offered the day before the main Black Hat USA Briefings sessions, the CISO Summit is intended to give CISOs and other InfoSec executives leading-edge insight into the latest security trends, technologies, and enterprise best practices.

The cost to attend includes Business Hall Access during Black Hat USA on Aug 7 and 8.

Due to limited space, Black Hat Management will review all applications. Notification of application status will be sent within 30 days of application.

*Please note: In order to create an open and candid environment that promotes the sharing of ideas and discussion, the CISO Summit will follow Chatham House Rule; neither media nor event coverage is permitted. This program was designed for executive security practitioners; solution providers and vendor attendees are limited to event sponsors.


Agenda

Monday, August 5

5:00 - 7:00 PM CISO Summit Welcome Reception

Tuesday, August 6

8:00 - 9:00 AM Networking Breakfast
9:00 – 9:20 AM Welcome and Introductions
  • Jeff Moss, Founder, Black Hat + DEF CON

    Mr. Moss advises companies on security issues, both, electronic and physical, as well as speaking globally on the topic. He sits on several advisory boards helping enterprises make informed decisions on cyber risks.

    In April 2011 Mr. Moss was appointed as the Chief Security Officer for the Internet Corporation for Assigned Names and Numbers (ICANN), a non-profit whose responsibilities include coordinating and ensuring the security, stability and resiliency of the Internet's unique global identifiers as well as maintaining the root zone of the Internet. This position involved managing the IT security of the ICANN networks and information systems, the physical security of ICANN facilities and meetings, and ensuring that ICANN meets its security and resiliency commitments to the multi stake holder community that oversees ICANN. This position involved extensive international travel and coordination with governments, law enforcement, and operational security communities in support of discussions around Internet Governance and security. Mr. Moss left this position at the end of 2013.

    Moss is the founder and creator of both the Black Hat Briefings and DEF CON, two of the most influential information security conferences in the world, attracting over ten thousand people from around the world to learn the latest in security technology from those researchers who create it. DEF CON just had its 21st anniversary.

    Prior to creating Black Hat Briefings, Jeff was a director at Secure Computing Corporation where he helped establish their Professional Services Department in the United States, Asia, and Australia. His primary work was security assessments of large multi-national corporations. Jeff has also worked for Ernst & Young, LLP in their Information System Security division. Because of this unique background Jeff is uniquely qualified with his ability to bridge the gap between the underground researcher community and law enforcement, between the worlds of pure research and the responsible application of disclosure.

    Jeff is currently a member of the U.S. Department of Homeland Security Advisory Council (HSAC), providing advice and recommendations to the Secretary of the Department of Homeland Security on matters related to homeland security. Jeff is a life member of the Council on Foreign Relations, which is an independent, nonpartisan membership organization, think tank, and publisher.

    In 2013, Jeff was appointed as a Nonresident Senior Fellow at the Atlantic Council, associated with the Cyber Statecraft Initiative, within the Brent Scowcroft Center on International Security.

    In 2014, Jeff joined the Georgetown University School of Law School Cybersecurity Advisory Committee.

    Jeff is active in the World Economic Forum, and recently became a member of the Cyber Security Global Agenda Council for 2014-2016.

    ICSA President's Award for Public Service, 2011.


  • Steve Wylie, General Manager, Black Hat

9:20 – 9:50 AM Optimizing Supply Chain Management
9:50 – 10:20 AM A Government Update
10:20 - 10:40 AM Networking Break
10:40 – 11:10 AM Quantifying the Cost of Cyber Risk
  • Scott Stransky

    Scott Stransky is Managing Director and Head of the Marsh McLennan Cyber Risk Intelligence Center. The Center launched in 2021 to provide cyber modeling, thought leadership, and cyber analytics guidance across Marsh McLennan. Previously, he led the Cyber Modeling group at extreme event modeling firm AIR Worldwide (part of Verisk Analytics). Under his leadership and guidance, the team sourced and cleansed detailed cyber security, incident, and claims data, and combined it with advanced machine learning algorithms, stochastic modeling techniques, and Monte Carlo simulations, providing the insurance industry with a robust suite of models to manage their cyber insurance portfolios. He is a recognized speaker across North America and Europe on the topics of cyber insurance risk and catastrophe modeling, having been invited to speak at numerous conferences sponsored by Advisen, NetDiligence, IUA of London, RAA, CPCU Society, AM Best, Lloyd's, and others, in addition to engaging directly with clients. He was voted by his industry peers to be the 2023 Cyber Risk Industry Person of the Year in the Actuary/Modeler category. Mr. Stransky earned a bachelor’s degree in Mathematics with Computer Science from MIT and a master’s degree in Atmospheric Science from MIT.


11:10 – 11:40 AM The Changing Role of the CISO
11:40 AM – 12:10 PM AI Unleashed: Managing the Risks, Reaping the Rewards

Panel

  • Caleb Sima

    Caleb Sima served as the Chief Security Officer at Robinhood where he built the team thru IPO and served as a public company executive. Prior to Robinhood he was VP of Information Security at Databricks a leading data analytics and machine learning company where he has built the security team from the ground up. Previously he was a Managing VP at CapitalOne, where he spearheaded many of their security initiatives. Prior to CapitalOne, Caleb founded SPI Dynamics and BlueBox security, which were acquired by HP and Lookout. He is attributed as one of the pioneers of application security and holds multiple patents in the space and is also the author of Web Hacking Exposed. He serves as an advisor, investor, and board member for security companies.


  • Russ Bodnyk
  • Kristy Hornland
  • Robert Hansen

    Robert Hansen became the CTO of Bit Discovery after his company OutsideIntel was acquired. Mr. Hansen has worked for Digital Island, Exodus Communications and Cable & Wireless beginning as a Sr. Security Architect and eventually leading managed security services product management. He also worked at eBay as a Sr. Global Product Manager of Trust and Safety, focusing on anti-phishing, anti-malware and anti-virus. Later he was the VP of Labs for Whitehat Security. Robert currently sits on the technical advisory board of and contributes to the security strategy of several startup companies as a virtual CISO and Innovation Officer. Mr. Hansen ran the web application security lab at ha.ckers.org, and authored/co-authored several books.


12:10 - 1:40 PM Lunch
1:40 – 2:10 PM A CISO's Playbook for Personal Safety
2:10 – 2:40 PM Surviving and Thriving After the Breach: A Resilience Roadmap
2:40 – 3:10 PM Networking Break
3:10 – 3:40 PM Navigating the Regulatory Landscape: A Fireside Chat on SEC Actions and Corporate Responses

Fireside Chat

  • Jennifer Lee
  • Chenxi Wang

    Chenxi Wang is an experienced technology executive with deep cybersecurity expertise. Board of Director for MDU Resources, a Fortune 500 company, serving on Audit and ESG Committee. Founder and General Partner of Rain Capital, a Cyber-focused venture fund. Chenxi has held senior tech strategy roles in large companies (Intel Security). She has led Go-to-market operations and product strategy in booming Silicon Valley startups (Twistlock, Ciphercloud). Chenxi is also an advocate for diversity & inclusion, and founder of the Forte Group, a 5013(C) organization to advance women's careers in Cyber. Previously Chenxi was a computer engineering professor at Carnegie Mellon University. She holds a Ph.D. in Computer Science.


3:40 – 4:10 PM From the Server Room to the Boardroom: Insights from a Journey Beyond the CISO Role

Joanna Burkey

4:10 – 4:40 PM Lightning Talks: Briefing Session Summaries
4:55 - 5:00 PM Closing Remarks
5:00 – 6:00 PM Cocktail Reception

Advisory Board

Justine Bone
Trey Ford
Jeremiah Grossman
Robert Hansen
Allison Miller
Wendy Nather
Caleb Sima
Alex Stamos
Saša Zdjelar

Sponsors

Welcome Reception Sponsor

Customers trust the Absolute Cyber Resilience Platform to ensure their security solutions work as intended, mobile and hybrid workforces can connect securely from anywhere, and to quickly restore business continuity following cyber disruptions and attacks. Absolute is partnered with 28 of the world’s leading endpoint device manufacturers, embedded in the firmware of 600 million devices, trusted by 21,000 global enterprises, and licensed across 16 million PC users. Our patented solution is recognized for extending cyber resilience across multiple security categories, including Endpoint Security, Zero Trust Network Access (ZTNA), Security Services Edge (SSE), Automated Security Control Assessment (ASCA), and Zero Trust Platforms.


Premium Sponsors

Armis® is the leading agentless device security platform purpose-built to protect the world of unmanaged and IoT devices - providing passive, real-time and continuous cybersecurity asset management, risk management, and automated enforcement to prevent cyber attacks from disrupting and compromising your business. Armis has the world's largest Device Knowledgebase, tracking 500M+ devices.


Gurucul is a global cyber security company changing the way organizations protect their most valuable assets from insider & external threats on-premises and in the cloud. Gurucul's real-time Unified Security and Risk Analytics Platform provides Analytics-Driven SIEM, UEBA, XDR, Risk-Driven SOAR, Identity Analytics, and Fraud Analytics.


Qualys is a pioneer and leading provider of cloud-based security and compliance solutions that help organizations streamline and consolidate their security and compliance solutions and build security into digital transformation. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously across global IT assets.

Sumedh Thakar
Pinkesh Shah
Jonathan Trull

Foundation Sponsors

AT&T Cybersecurity


Bitdefender provides cybersecurity solutions with leading security efficacy, performance, & ease of use to enterprise organizations & consumers. The company is committed to defending organizations & individuals around the globe against cyberattacks.

For more information, visit www.bitdefender.com.


CrowdStrike is redefining security for the cloud era with an endpoint and workload protection platform built from the ground up to stop breaches. With CrowdStrike, customers benefit from better protection, better performance and immediate time-to-value.


ReliaQuest, the force-multiplier of security operations, increases visibility, reduces complexity, and manages risk with its cloud-native security operations platform, GreyMatter. ReliaQuest GreyMatter is built on an XDR architecture and delivered as a service anywhere in the world, any time of the day, by bringing together telemetry from tools and applications across cloud, on-premises, and hybrid cloud architectures.

Hundreds of the world’s most trusted brands team up with ReliaQuest to enable them to extend detection and response across cloud, endpoint, and network infrastructures, leveraging relevant data from both security and business applications. ReliaQuest is a privately held technology unicorn headquartered in the U.S. with multiple global locations. For more information, visit www.reliaquest.com


Securonix revolutionizes cyber operations with precise, rapid and efficient threat detection, investigation and response. Its unified platform streamlines operations, employs advanced AI and analytics for accuracy, supports multi-cloud environments and seamlessly enhances existing detection systems. Securonix significantly reduces cyber risks and improves operational efficiency with a frictionless experience for the security team.

Scott Sampson
Haggai Polak

Sophos delivers superior cybersecurity outcomes by providing cybersecurity as a service to protect companies of all sizes from the most advanced cyberthreats. Our cybersecurity products and services include managed detection and response (MDR), firewall, email, endpoint (XDR), and cloud native security protection. Sophos products and services defend against ransomware, phishing, malware, and more. They connect through the cloud-based Sophos Central management console and are powered by Sophos X-Ops, our cross-domain threat intelligence unit. We provide fully managed security solutions so you can manage your cybersecurity directly with our security operations platform. Or, you can supplement your in-house team with Sophos' products and services.

www.sophos.com

Joe Levy
Ross McKerchar

Breakfast Sponsors

Check Point is a leading provider of cyber security solutions globally, protecting customers from 5th generation attacks with an industry leading catch rate of malware, ransomware and other types of attacks. We offer multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network and mobile device held information. www.checkpoint.com


HackerOne is the #1 hacker-powered security platform, helping organizations receive and resolve critical vulnerabilities before they can be exploited. More Fortune 500 and Forbes Global 1000 companies trust HackerOne than any other hacker-powered security partner. Organizations, including the U.S. Department of Defense, U.S. General Service Administration, General Motors, Google, Twitter, GitHub, Nintendo, Lufthansa, Goldman Sachs, Qualcomm, Starbucks, Dropbox, Intel, and the CERT Coordination Center trust HackerOne to find critical software vulnerabilities before they can be criminally exploited. HackerOne customers have resolved over 72,000 vulnerabilities and have awarded over $30M in bounty rewards. HackerOne is headquartered in San Francisco with offices in London, New York, and the Netherlands.


Strengthen digital resilience by modernizing your SOC with unified threat detection, investigation and response. Splunk delivers a scalable security analytics platform with out-of-the-box detections, risk-based alerting, automation and machine learning to help you reduce business risk, empower security innovation and establish efficient and effective SecOps at scale.


Networking Break Sponsors

Devo replaces traditional SIEMs with a real-time security data platform.
Devo’s integrated platform serves as the foundation of your security operations and includes data-powered SIEM, SOAR, and UEBA. AI and intelligent automation help your SOC work faster and smarter so you can make the right decisions in real-time.


ExtraHop is the cybersecurity partner enterprises trust to reveal cyber risk and build business resilience. The ExtraHop RevealX network detection and response platform uniquely delivers the unparalleled visibility and decryption capabilities that organizations need to investigate smarter, stop threats faster, and move at the speed of risk.


Sponsored Executive Dinner - Monday, Aug. 5

ServiceNow makes the world work better for everyone. Our cloud-based platform, risk, ESG, and security solutions help digitize and unify organizations so that they can find smarter, faster, better ways to address evolving risks, vulnerabilities, and compliance challenges. Bring risk, security, and IT together through a common data model to drive risk-informed decisions, unlock productivity, and build trust with customers, employees, and third parties. The world works with ServiceNowTM.

www.servicenow.com/securityandrisk


Sponsored Executive Dinner - Tuesday, Aug. 6

AT&T Cybersecurity

Become a Sponsor

Continuing Professional Education (CPEs)

ISC2

Those who are certified through ISC2 can earn 5.5 Continuing Professional Education (CPE) credits for attending the CISO Summit.

Black Hat does not maintain records of earned CPE credits. However, we will report your credits to ISC2 on your behalf after the event. Please provide your ISC2 member number when registering for the event.

For questions about credits for CISO attendees, e-mail cisosummit@blackhat.com.