IN-PERSON

Detroit CISO Executive Summit

June 18, 2024 | The Henry, Autograph Collection

June 18, 2024
The Henry, Autograph Collection

APPLY TO PARTICIPATE

Collaborate with your peers

Get together with Detroit's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Leveraging technology and modernizing processes to enhance operational efficiency

Ensuring resiliency and mitigating risk is top of mind within cybersecurity strategies

Using data-driven insights to sustain a competitive advantage in the age of digital intelligence

Detroit CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Janette Barretto

Yazaki North America
Global Security and Risk Manager

Brent Cieszynski

Blue Cross Blue Shield of Michigan
VP & CISO

Russ Gordon

PHINIA
CISO

Steven Herrin

DTE
Director, Cybersecurity/CISO

Rich Hook

Penske
EVP & CIO

Rachelle Putnam

General Dynamics Land Systems
Chief Information Technology Officer

Jeff Small

Great Lakes Water Authority
CIO

Ryan Talbott

BorgWarner
VP & Global CIO

Erik Wille

Cabinetworks Group
CISO

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Detroit CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


Keynote Sessions

Body Language Secrets for Enhanced Executive Presence

Uncovering the mysteries of body language — how people communicate their thoughts and feelings without saying a word — is a decisive first step toward mastering any business and social situation.  Top executives know that detecting split-second signals from your team and  leadership then taking immediate action is crucial to being a persuasive communicator and problem-solver especially during tricky internal matters or high-level negotiations.

During this session you will learn how to:

  • Move beyond the vacuum of artificial body language to a behavioral approach based on YOU
  • Strengthen interpersonal relationships, be a more decisive leader and manage your nerves better
  • Uncover the less obvious needs of others and improve your team’s confidence and competence

Worth the Business Risk? Security That Advances Innovation

IT and security must strike an intricate balance between enablement and protection. Cyber and business risk considerations should mesh into a strategy that both propels innovation and creates business value. As CIOs and CISOs grapple with increasingly complex decisions and evolving digital transformation roadmaps, how can leaders position cybersecurity as a pillar for advancing innovation?

Join this session to learn:

  • How to foster inclusive conversations on cybersecurity by framing issues in terms of business risk
  • Identifying initial steps and key phases of zero trust implementation within a broader risk strategy
  • Demystifying zero trust architecture for other leaders and recruit business champions for transformation

The Path of Most Resistance

 More details coming soon.


Executive Boardroom Sessions

Optimize Application Rationalization to Reduce Cost

CIOs are balancing an ever-increasing number of service providers which requires a strong vendor and application rationalization integrated into strategic decision-making. In order to allocate more funds towards innovation and differentiation initiatives, mission-critical systems need to be optimized, cost effective, and flexible.

Join this session to discuss:

  • Incorporate effective contract management
  • Strategies to avoid vendor lock-in
  • Financially optimizing the vendor portfolio

The Business of Security — Bridging the Gap Between Cyber Initiatives and Business Impact

Economic trends have tightened purse strings everywhere, leaving CISOs and security leaders to demonstrate ROI and defend their budgets. But ROI is notoriously tough to quantify when the primary return for security investment is reduction in risk. As a result, bridging the gap between security investments and actual business impact can be easier said than done, particularly if your cybersecurity spend doesn’t clearly map to organizational goals.

Join this session to discuss:

  • Identifying the right metrics for quantifying security ROI and business impact        
  • Positioning security as a business enabler, rather than a cost center
  • Aligning security investments to organizational goals

Managing OT to Fully Secure the Business

For most organizations, the number of connected, essential devices is growing by the second. In response, the CISO's jurisdiction is changing just as rapidly. Now, in the case of any security issue, the rest of the C-suite may be looking to you for answers.

Join this session and start understanding:

  • Your new or growing operational technology responsibilities
  • What you can do to smoothly plot and control your OT workload
  • How you can best juggle IT and OT security simultaneously

Transformative Shockwaves: Navigating Unpredictability Through Strategic Control

As lines of business continue to invest in new applications and processes, disconnected, siloed, and individual initiatives are creating shockwaves throughout the organization. Such random acts of digital lack the necessary degrees of strategic oversight and organizational change control, leading to unpredictability and elevated levels of organizational risk.

Join this boardroom to discuss how to:

  • Adopt new digital solutions with proactive approaches
  • Eliminate chance outcomes from random acts of digital
  • Promote unity while mitigating risks

Generative AI – Should CISOs be Guardians or Gatekeepers?

From content generation to data analysis, generative AI is transforming the way people work and drastically improving productivity. However, the benefits do not come without risks, and the technology has the potential to do more harm than good when placed in the wrong hands. So what do security leaders need to know about the risks of generative AI, and how do they mitigate them?

Join this session for an insightful discussion on the latest cybersecurity challenges associated with generative AI, including:

  • How the threat landscape is changing as a result of generative AI
  • How businesses can ensure the privacy and security of sensitive data used in generative AI applications and govern them appropriately
  • What tools and capabilities are necessary to protect organizations from malicious uses of generative AI

User Access – Leveraging the Right Technologies

The path to a stronger IAM strategy lies within an agile digital system. CISOs are often challenged with keeping an entire company up to date, as well as identity-related breaches and core business operations being interrupted - but easy to use technology (when leveraged correctly) can be a game changer.

Join this boardroom to discuss:

  • What the essentials are for building an efficient IAM system
  • The challenges faced when protecting remote workers’ environments
  • Optimizing user experience when adopting a user access program

Connecting Business, Data and Technology

 According to Gartner, the challenge for many IT and business leaders today is to instill a culture of data-driven decision making across the organization. Those who want to exploit the potential of new data and advanced analytics capabilities at scale typically face numerous challenges. 

Join this session to discuss:

  • Discuss best practices for designing data and analytics programs
  • Identify and define quick-win opportunities supporting the business data strategy
  • Brainstorm technology and resource alignment 

Strategic Third-Party Risk Management— From Due Diligence to Continuous Oversight

Vendor selection, pre-partner due diligence, and trusted implementation are merely the beginning of a healthy third-party management culture. With those pieces in place, the real work (like battling for constant visibility and enforcing your requirements) begins. You’ll need to be prepared.

Gather and discuss how to CISOs have successfully:

  • Vetted new and prospective third-parties
  • Monitored network of existing third-parties
  • Asserted security requirements with vulnerable, but critical, third-parties


Breakout Sessions

The CIO Tech Stack — Embracing Cloud, Security, and Innovation

IT leaders are being asked to do more with less, like adopting innovative tech like GenAI, reducing risks of cyber threats, lowering costs all while spending significant time just on IT maintenance. Balancing the maintenance of existing tech while finding time to invest in innovative work is a foundational priority for all CIOs, but what are best practices to navigate the complexities of an evolving tech landscape? This session empowers CIOs by exploring strategies for cloud-based transformation to achieve superior security, streamlined management, and user-centric, modern experiences.

Join this session and breakout-style conversation with your peers to discuss:

  • Practical solutions for enhancing productivity
  • How to adopt AI-driven tools for a competitive edge
  • Cybersecurity considerations with modernization

Embracing Innovation — Real-World GenAI Use Cases

The present moment offers an opportunity to unlock GenAI's transformative power, but maturity across organizations varies. Business leaders recognize this technology is a catalyst for innovation. By understanding real-world case studies with lessons learned, those leaders can create real movement forward inside of their own organizations.

Bring your questions to this INTERACTIVE session as you hear from executives who have:

  • Implemented practical GenAI use cases and identified opportunities
  • Compared and measured platforms and solutions for value outcomes
  • Balanced approach to value and risk

A New Era of Compliance & Regulation

With the continuous advancement of technology, businesses face new and evolving threats that require a proactive response. New laws and precedents expose cybersecurity leaders to personal liability and leave security leaders questioning their protection.

Join this interactive session to discuss:

  • Essential questions to ask your legal team
  • Best practices for keeping up to date with the evolving governance, risk, and compliance landscape
  • C-Suite liability and information security risk


We look forward to seeing you at an upcoming in-person gathering


Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

The Henry, Autograph Collection

A block of rooms has been reserved at the The Henry, Autograph Collection at a reduced conference rate. Reservations should be made online or by calling (313) 441-2000.

Deadline to book using the discounted room rate of $249 USD (plus tax) is May 27, 2024.

Your Community Partners


Global Thought Leaders
CISO Thought Leader
Key Partners
Program Partners

Community Program Managers


For inquiries related to this community, please reach out to your dedicated contacts.

Alex Shimrat

Community Program Manager

315-857-5945

alex.shimrat@evanta.com

Jeff Hull

Community Program Manager

214-649-0033

jeff.hull@evanta.com