GREAT CONVERSATION HIGHLIGHTS

Explore a sample of past sessions

The Business Value of an Enterprise Risk and Security Management Strategy
John Turey, Vice President of Enterprise Risk and Security Management, TE Connectivity
The Great Conversation opens with a thought leader and practitioner in security risk management. You will learn how business executives (CEO, COO, CFO, CTO) are thinking about enterprise risks and what you can do to enhance your role as a strategic enterprise business partner. Walk away with a high-level framework in which you can leverage then engage the “enterprise owners of risk” in your organization.

Why Technology Will Change the Way You Do Security
Dr. Thomas Cellucci, Founder & CEO, Cellucci Associates, Inc.
We have discussed how people perform roles in a process and how important the culture is to the overall program’s success. Now we will learn how to use technology to redefine the new security functions and the evolving value it accelerates in the organization. Once you have technology expertise embedded in the security risk assessment and business optimization efforts it can fundamentally change the strategy and planning. Robotics can replace human security officers.  Drones can be utilized for site surveillance. Artificial Intelligence can be used to access activity, monitoring activism & social media activities for potential brand and reputation issues, as well as threats that could lead to workplace violence or active shooter incidents.  Learn how the technology will change how you approach your risk programs.


Managing the ‘Insider’ Threat
Michael Gelles, Managing Director, Deloitte Consulting, LLP
You think you have the risk, strategy and program identified; you believe you have an effective security technology solutions architecture in place; and then you find that you have not fully realized the insider threat to your enterprise. You also are once again building a guiding coalition between human resources, legal, IT and security to create a proactive and measurable strategy for success.


Risk Planning and Resilience: What We Can Learn From the X-Event
Kristina Anderson, Executive Director and Founder, Koshka Foundation for Safe Schools
The Great Conversation continues with a riveting story from the eyes of a victim then quickly moves into a breakdown of the lessons learned around all-hazards risk, resilience and security. Every security executive knows there are powerful forces that keep us from doing the right thing the first time until the wrong thing happens to us.


Strategic Leadership: A Journey
Mike Howard, Chief Security Officer, Microsoft
Microsoft CSO Mike Howard shared his career path and lessons learned along the way. He discussed the value of mentorship and explained how mentors at the Oakland Police Department and the CIA influenced his own career. He shared examples of leadership and change management and his own insights on leadership.
 

The Evolution of Security: Leadership, Innovation, and a Changing Workforce
Michael Mason, SVP, Chief Security Officer, Verizon Communications
In the private-sector security community, we often focus on technological advances intended to make us more effective at executing the duties associated with our roles as security leaders. We focus on information gathering until we reach the point where we are deleting more information each day than we are digesting. However, our business is still a people-oriented business. This presentation focused on the manner each of us, as private-sector security leaders, impacts today’s security workforce, as well as challenging the too often accepted conventional wisdom about the young men and women who comprise that workforce.


Security in An Age of Technological Disruption
Kimo Quaintance, George C. Marshall European Center for Security Studies, Thought Leader

Traditional planning cycles that served the needs of stable hierarchies are being thrown into chaos by dynamic networks that possess the advantage of rapid adaptation and innovation. Democratizing technology and pervasive connectivity are driving a great diffusion of power that sees no signs of slowing. How can security organizations adapt to such an unpredictable environment, when we are expected to not only survive such continual disruptions, but thrive and create new sources of value?