BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20190215T173000Z
DTEND:20190215T190000Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:Tech Industry Luncheon - Feb 15
DESCRIPTION:Cyber Security Risk & Strategy\n\n\nPanel: Jason Fruge\, VP and CISO of Fossil Group\, David Venable\, VP Cyber Security of Masergy\, Jeff Schilling\, SVP and CISO of Epsilon\n\nModerated by George Finney\, CISO of Southern Methodist University\n\nAssessing\, managing and mitigating cyber security risk as part of a comprehensive risk management strategy has become essential to organizational survival.  Many organizations' cyber security functions have either organically grown out of IT or are outsourced to providers without having a business driven risk assessment and strategy in place.  Organizations and individuals are waking up to this and realize that their technical capabilities and talent need a foundation of risk management and strategy that is based on an in-depth understanding of business needs and best practices.\n\n\n	How to align cyber security to business strategy and goals\n	Measure and balance your cyber risk with your business needs\n	Tips on how to conduct an enterprise wide cyber vulnerability and risk assessment\n	How to develop and roll out a comprehensive cyber strategy\n	Communicate cyber insights and initiatives across the business and C-suite in terms they understand\n\n\n\n\nGeorge Finney CISO of Southern Methodist University\, is a Chief Information Security Officer that believes that people are the key to solving our cybersecurity challenges.  George has worked in Cybersecurity for over 15 years and has helped startups\, global telecommunications firms\, and nonprofits improve their security posture. As a part of his passion for education\, George has taught cybersecurity at Southern Methodist University and is the author of several cybersecurity books including No More Magic Wands: Transformative Cybersecurity Change for Everyone. George has been recognized by Security Magazine as one of their top cybersecurity leaders in 2018 and is a part of the Texas CISO Council\, is a member of the Board of Directors for the Palo Alto Networks FUEL User Group\, and is an Advisory Board member for SecureWorld.  George holds a Juris Doctorate degree from Southern Methodist University and a Bachelor of Arts degree from St. John's College and holds multiple cybersecurity certifications including the CISSP\, CISM\, and CIPP.  \n\n\n\nJason Frug  VP and CISO of Fossil Group\, is responsible for providing leadership and information security advice\, governance\, and subject-matter expertise to the company's large global team of technical operations staff who administer critical distributed information systems. Frug  has more than 18 years of information security and IT leadership experience\, focusing on enterprise security management\, regulatory compliance\, information security program development\, and enterprise security technologies. Prior to Fossil\, Frug  was VP and Global Head of Information Security for Signet Jewelers\, Prior to Signet Jewelers\, Frug  was SVP and Global Information Security Officer for Citi. Prior to that\, Frug  was the CISO and director of enterprise security for Cerner Corporation. Prior to that\, Frug  held positions with FishNet Security\, Sprint\, the USDA and Morgan Stanley. Frug  received a bachelor's of science in business management from the University of Phoenix. He is a certified information systems security professional\, PCI qualified security assessor and is a member of the International Information Systems Security Certification Consortium\, the Project Management Institute\, and the Information Systems Security Association.\n\n\n\nDavid Venable VP Cyber Security of Masergy\, is a former intelligence officer with the National Security Agency\, with extensive experience in Computer Network Exploitation\, Information Operations\, and Digital Network Intelligence\, and cryptography. He has also taught about these subjects while serving as adjunct faculty at the National Cryptologic School.  David has developed and managed several U.S. national-level projects in support of global anti-terrorism operations and the Global War on Terror\, in addition to providing security consulting to Global 500 companies. David has also authored several cyber security articles\, he regularly teaches classes on information security\, and he has received numerous awards from the US Air Force\, the National Security Agency\, and the European Academy of Diplomacy.  David is a cyber security fellow with Strategikon\, a European think tank focused on global security. David is currently the Vice President of Cyber Security at Masergy Communications where he is responsible for protecting a global network infrastructure\, as well as advising multinational companies about protecting their vital digital assets.\n\n\n\nJeff Schilling SVP and CISO of Epsilon\, is overall responsible for the information security including standards\, procedures\, and guidelines for Epsilon and its affiliates.  He drives the overall direction of the information security architecture\, managing the ongoing execution of the security operations center in Information Technology areas such as applications\, data protection\, voice and data communications systems\, as well as all Information Systems Security monitoring\, analysis\, detection and incident response processes. Jeff is a retired US Army Colonel\, with over 24 years of military experience in IT service management\, product management and many CIO type roles.  In his last two capstone assignments in the military\, Jeff ran the global cyber security operations centers at the Department of Defense and US Army global enterprise.  Jeff's previous role before joining Epsilon was as the Chief Security Officer for a market leading cloud security company for 4 years.   Previous to that role\, he was the Global Director of Incident Response and Forensic for a Gartner quadrant leading Manage Security Service Provider.\n\n\n\n\n\nRegistration Policy:\n\n\nPayment is necessary at the time of reservations. Due to catering requirements we must charge for reservations not canceled three days prior to the event.  Unclaimed reservations during the event will be relinquished at noon. Walk-in customers will be seated based on space availability.
X-ALT-DESC;FMTTYPE=text/html:<p><span style="color:#000000\;"><span style="font-family:arial\;"><span style="font-size:18px\;"><b><i>Cyber Security Risk &amp\; Strategy</i></b></span></span></span></p>\n\n<div>\n<div _mce_style="color: #000000\; font-size: 10pt\;" style="color: rgb(0\, 0\, 0)\; font-family: Arial\; font-size: 10pt\;"><span style="color:#000000\;"><span style="font-size:14px\;"><span style="font-family:arial\;">Panel:&nbsp\;<strong>Jason Fruge</strong>\,&nbsp\;VP and CISO of&nbsp\;<strong>Fossil Group</strong>\,&nbsp\;<strong>David Venable</strong>\, VP Cyber Security of&nbsp\;<strong>Masergy</strong>\,&nbsp\;<strong>Jeff Schilling</strong>\, SVP and CISO of&nbsp\;<strong>Epsilon<br />\nModerated by George Finney\, CISO of Southern Methodist University</strong></span></span></span></div>\n\n<p><span style="color:#000000\;"><span style="font-size:14px\;"><span style="font-family:arial\;">Assessing\, managing and mitigating cyber security risk as part of a comprehensive risk management strategy has become essential to organizational survival.&nbsp\; Many organizations&rsquo\; cyber security functions have either organically grown out of IT or are outsourced to providers without having a business driven risk assessment and strategy in place.&nbsp\; Organizations and individuals are waking up to this and realize that their technical capabilities and talent need a foundation of risk management and strategy that is based on an in-depth understanding of business needs and best practices.</span></span></span></p>\n\n<ul>\n	<li><span style="color:#000000\;"><span style="font-family:arial\;"><span style="font-size:14px\;">How to align cyber security to business strategy and goals</span></span></span></li>\n	<li><span style="color:#000000\;"><span style="font-family:arial\;"><span style="font-size:14px\;">Measure and balance your cyber risk with your business needs</span></span></span></li>\n	<li><span style="color:#000000\;"><span style="font-family:arial\;"><span style="font-size:14px\;">Tips on how to conduct an enterprise wide cyber vulnerability and risk assessment</span></span></span></li>\n	<li><span style="color:#000000\;"><span style="font-family:arial\;"><span style="font-size:14px\;">How to develop and roll out a comprehensive cyber strategy</span></span></span></li>\n	<li><span style="color:#000000\;"><span style="font-family:arial\;"><span style="font-size:14px\;"><span style="font-family:arial\;"><span style="font-size:14px\;">Communicate cyber insights and initiatives across the business and C-suite in terms they understand</span></span></span></span></span></li>\n</ul>\n\n<p><br />\n<span style="color:#000000\;"><img alt="" height="150" src="https://chambermaster.blob.core.windows.net/userfiles/UserFiles/chambers/9090/Image/Finney.jpg" style="width: 100px\; height: 150px\; border-width: 2px\; border-style: solid\; margin: 5px\; float: left\;" width="100" /><span style="font-size:12px\;"><span style="font-family:arial\;"><strong>George Finney CISO of Southern Methodist University\,</strong>&nbsp\;is a Chief Information Security Officer that believes that people are the key to solving our cybersecurity challenges.&nbsp\; George has worked in Cybersecurity for over 15 years and has helped startups\, global telecommunications firms\, and nonprofits improve their security posture. As a part of his passion for education\, George has taught cybersecurity at Southern Methodist University and is the author of several cybersecurity books including No More Magic Wands: Transformative Cybersecurity Change for Everyone. George has been recognized by Security Magazine as one of their top cybersecurity leaders in 2018 and is a part of the Texas CISO Council\, is a member of the Board of Directors for the Palo Alto Networks FUEL User Group\, and is an Advisory Board member for SecureWorld.&nbsp\; George holds a Juris Doctorate degree from Southern Methodist University and a Bachelor of Arts degree from St. John&rsquo\;s College and holds multiple cybersecurity certifications including the CISSP\, CISM\, and CIPP.&nbsp\;&nbsp\;</span></span><br />\n<br />\n<img alt="" height="117" src="https://chambermaster.blob.core.windows.net/userfiles/UserFiles/chambers/9090/Image/Fruge.jpg" style="width: 175px\; height: 117px\; margin: 5px\; float: right\; border-width: 2px\; border-style: solid\;" width="175" /><span style="font-size:12px\;"><strong><span style="font-family:arial\;">Jason Frug</span><span style="font-family: arial\;">&eacute\;</span></strong><span style="font-family:arial\;"><strong> VP and CISO of Fossil Group\,</strong> is&nbsp\;responsible for providing leadership and information security advice\, governance\, and subject-matter expertise to the company&rsquo\;s large global team of technical operations staff who administer critical distributed information systems. Frug&eacute\; has more than 18 years of information security and IT leadership experience\, focusing on enterprise security management\, regulatory compliance\, information security program development\, and enterprise security technologies. Prior to Fossil\, Frug&eacute\; was VP and Global Head of Information Security for Signet Jewelers\, Prior to Signet Jewelers\, Frug&eacute\; was SVP and Global Information Security Officer for Citi. Prior to that\, Frug&eacute\; was the CISO and director of enterprise security for Cerner Corporation. Prior to that\, Frug&eacute\; held positions with FishNet Security\, Sprint\, the USDA and Morgan Stanley. Frug&eacute\; received a bachelor&rsquo\;s of science in business management from the University of Phoenix. He is a certified information systems security professional\, PCI qualified security assessor and is a member of the International Information Systems Security Certification Consortium\, the Project Management Institute\, and the Information Systems Security Association.<br />\n<br />\n<img alt="" height="150" src="https://chambermaster.blob.core.windows.net/userfiles/UserFiles/chambers/9090/Image/Venable.jpg" style="width: 150px\; height: 150px\; border-width: 2px\; border-style: solid\; margin: 5px\; float: left\;" width="150" /><strong>David Venable VP Cyber Security of Masergy\,</strong> is a former intelligence officer with the National Security Agency\, with extensive experience in Computer Network Exploitation\, Information Operations\, and Digital Network Intelligence\, and cryptography. He has also taught about these subjects while serving as adjunct faculty at the National Cryptologic School. &nbsp\;David has developed and managed several U.S. national-level projects in support of global anti-terrorism operations and the Global War on Terror\, in addition to providing security consulting to Global 500 companies. David has also authored several cyber security articles\, he regularly teaches classes on information security\, and he has received numerous awards from the US Air Force\, the National Security Agency\, and the European Academy of Diplomacy. &nbsp\;David is a cyber security fellow with Strategikon\, a European think tank focused on global security. David is currently the Vice President of Cyber Security at Masergy Communications where he is responsible for protecting a global network infrastructure\, as well as advising multinational companies about protecting their vital digital assets.</span></span><br />\n<br />\n<img alt="" height="140" src="https://chambermaster.blob.core.windows.net/userfiles/UserFiles/chambers/9090/Image/Schilling_Pix002.jpeg" style="width: 175px\; height: 140px\; border-width: 2px\; border-style: solid\; margin: 5px\; float: right\;" width="175" /><span style="font-size:12px\;"><span style="font-family:arial\;"><span style="background-image:initial\;background-position:initial\;background-size:initial\;background-repeat:initial\;background-attachment:initial\;background-origin:initial\;background-clip:initial\;"><strong>Jeff Schilling SVP and CISO of Epsilon\,</strong> is overall responsible for the information security including standards\, procedures\, and guidelines for Epsilon and its affiliates.&nbsp\; He drives the overall direction of the information security architecture\, managing the ongoing execution of the security operations center in Information Technology areas such as applications\, data protection\, voice and data communications systems\, as well as all Information Systems Security monitoring\, analysis\, detection and incident response processes.&nbsp\;</span>Jeff is a retired US Army Colonel\, with over 24 years of military experience in IT service management\, product management and many CIO type roles.&nbsp\; In his last two capstone assignments in the military\, Jeff ran the global cyber security operations centers at the Department of Defense and US Army global enterprise. &nbsp\;Jeff&rsquo\;s previous role before joining Epsilon was as the Chief Security Officer for a market leading cloud security company for 4 years.&nbsp\;&nbsp\; Previous to that role\, he was the Global Director of Incident Response and Forensic for a Gartner quadrant leading Manage Security Service Provider.</span></span></span><br />\n<br />\n<br />\n<strong style="font-size: small\; font-family: arial\; color: rgb(50\, 50\, 118)\;">Registration Policy:</strong></p>\n</div>\n\n<div style="font-size: 9pt\;"><span style="font-size: 12px\;"><span style="font-family: arial\;"><span style="color: rgb(0\, 0\, 0)\;"><span style="color: rgb(47\, 47\, 47)\;">Payment is necessary at the time of reservations. Due to catering requirements we must charge for reservations not canceled</span> three days prior to the event.&nbsp\; Unclaimed reservations during the event will be relinquished at noon. Walk-in customers will be seated based on space availability.</span></span></span></div>\n
LOCATION:Prestonwood Country Club 15909 Preston Road\, Dallas 75248
UID:e.9090.4476
SEQUENCE:3
DTSTAMP:20260420T083403Z
URL:https://business.techtitans.org/events/details/tech-industry-luncheon-feb-15-4476
END:VEVENT

END:VCALENDAR
