We look forward to seeing you at an upcoming in-person gathering
Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.
June 18, 2024 | The Henry, Autograph Collection
June 18, 2024
The Henry, Autograph Collection
Get together with Detroit's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.
Join your peers to discuss the most critical issues impacting CISOs today:
Leveraging technology and modernizing processes to enhance operational efficiency
Ensuring resiliency and mitigating risk is top of mind within cybersecurity strategies
Using data-driven insights to sustain a competitive advantage in the age of digital intelligence
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.
Janette Barretto
Yazaki North America
Global Security and Risk Manager
Brent Cieszynski
Blue Cross Blue Shield of Michigan
VP & CISO
Russ Gordon
PHINIA
CISO
Steven Herrin
DTE
Director, Cybersecurity/CISO
Rich Hook
Penske
EVP & CIO
Rachelle Putnam
General Dynamics Land Systems
Chief Information Technology Officer
Jeff Small
Great Lakes Water Authority
CIO
Ryan Talbott
BorgWarner
VP & Global CIO
Erik Wille
Cabinetworks Group
CISO
Body Language Secrets for Enhanced Executive Presence
Uncovering the mysteries of body language — how people communicate their thoughts and feelings without saying a word — is a decisive first step toward mastering any business and social situation. Top executives know that detecting split-second signals from your team and leadership then taking immediate action is crucial to being a persuasive communicator and problem-solver especially during tricky internal matters or high-level negotiations.
During this session you will learn how to:
Worth the Business Risk? Security That Advances Innovation
IT and security must strike an intricate balance between enablement and protection. Cyber and business risk considerations should mesh into a strategy that both propels innovation and creates business value. As CIOs and CISOs grapple with increasingly complex decisions and evolving digital transformation roadmaps, how can leaders position cybersecurity as a pillar for advancing innovation?
Join this session to learn:
The Path of Most Resistance
More details coming soon.
Optimize Application Rationalization to Reduce Cost
CIOs are balancing an ever-increasing number of service providers which requires a strong vendor and application rationalization integrated into strategic decision-making. In order to allocate more funds towards innovation and differentiation initiatives, mission-critical systems need to be optimized, cost effective, and flexible.
Join this session to discuss:
The Business of Security — Bridging the Gap Between Cyber Initiatives and Business Impact
Economic trends have tightened purse strings everywhere, leaving CISOs and security leaders to demonstrate ROI and defend their budgets. But ROI is notoriously tough to quantify when the primary return for security investment is reduction in risk. As a result, bridging the gap between security investments and actual business impact can be easier said than done, particularly if your cybersecurity spend doesn’t clearly map to organizational goals.
Join this session to discuss:
Managing OT to Fully Secure the Business
For most organizations, the number of connected, essential devices is growing by the second. In response, the CISO's jurisdiction is changing just as rapidly. Now, in the case of any security issue, the rest of the C-suite may be looking to you for answers.
Join this session and start understanding:
Transformative Shockwaves: Navigating Unpredictability Through Strategic Control
As lines of business continue to invest in new applications and processes, disconnected, siloed, and individual initiatives are creating shockwaves throughout the organization. Such random acts of digital lack the necessary degrees of strategic oversight and organizational change control, leading to unpredictability and elevated levels of organizational risk.
Join this boardroom to discuss how to:
Generative AI – Should CISOs be Guardians or Gatekeepers?
From content generation to data analysis, generative AI is transforming the way people work and drastically improving productivity. However, the benefits do not come without risks, and the technology has the potential to do more harm than good when placed in the wrong hands. So what do security leaders need to know about the risks of generative AI, and how do they mitigate them?
Join this session for an insightful discussion on the latest cybersecurity challenges associated with generative AI, including:
User Access – Leveraging the Right Technologies
The path to a stronger IAM strategy lies within an agile digital system. CISOs are often challenged with keeping an entire company up to date, as well as identity-related breaches and core business operations being interrupted - but easy to use technology (when leveraged correctly) can be a game changer.
Join this boardroom to discuss:
Connecting Business, Data and Technology
According to Gartner, the challenge for many IT and business leaders today is to instill a culture of data-driven decision making across the organization. Those who want to exploit the potential of new data and advanced analytics capabilities at scale typically face numerous challenges.
Join this session to discuss:
Strategic Third-Party Risk Management— From Due Diligence to Continuous Oversight
Vendor selection, pre-partner due diligence, and trusted implementation are merely the beginning of a healthy third-party management culture. With those pieces in place, the real work (like battling for constant visibility and enforcing your requirements) begins. You’ll need to be prepared.
Gather and discuss how to CISOs have successfully:
The CIO Tech Stack — Embracing Cloud, Security, and Innovation
IT leaders are being asked to do more with less, like adopting innovative tech like GenAI, reducing risks of cyber threats, lowering costs all while spending significant time just on IT maintenance. Balancing the maintenance of existing tech while finding time to invest in innovative work is a foundational priority for all CIOs, but what are best practices to navigate the complexities of an evolving tech landscape? This session empowers CIOs by exploring strategies for cloud-based transformation to achieve superior security, streamlined management, and user-centric, modern experiences.
Join this session and breakout-style conversation with your peers to discuss:
Embracing Innovation — Real-World GenAI Use Cases
The present moment offers an opportunity to unlock GenAI's transformative power, but maturity across organizations varies. Business leaders recognize this technology is a catalyst for innovation. By understanding real-world case studies with lessons learned, those leaders can create real movement forward inside of their own organizations.
Bring your questions to this INTERACTIVE session as you hear from executives who have:
A New Era of Compliance & Regulation
With the continuous advancement of technology, businesses face new and evolving threats that require a proactive response. New laws and precedents expose cybersecurity leaders to personal liability and leave security leaders questioning their protection.
Join this interactive session to discuss:
Evanta facilitates exclusive, C-level communities by personally qualifying and understanding the priorities, challenges and interests of each member.
Our selective approach maintains the high quality of the network and ensures top-level discussions with peers from the world’s leading organizations.
A block of rooms has been reserved at the The Henry, Autograph Collection at a reduced conference rate. Reservations should be made online or by calling (313) 441-2000.
Deadline to book using the discounted room rate of $249 USD (plus tax) is May 27, 2024.
For inquiries related to this community, please reach out to your dedicated contacts.