CISO Executive Summit

June 29, 2017

Indianapolis Marriott Downtown


June 28, 2017 / Governing Body Private Dinner

6:00pm - 8:30pm Governing Body Private Dinner

The Future of IoT – The Connectivity Machine

Dinner Keynote 

Jason Boschert
Program Manager, Digital Systems
Rolls-Royce North America
Michael Coffey
Head of Commercialization, Global Health and Digital Services
Roche Diabetes Care, Inc.
Jamie Lee
Wabash National Corporation
David Roberts
Senior Advisor Innovation, Technology & Industry Egagement
Indiana Economic Development Corporation
Paula Watson
Ken Miller
Executive Director
IoT Innovation Network
Expand Additional Information

It’s at the core of the autonomy and connectivity machine — the Internet of Things impacts everything. Without IoT, there is no digital connectivity. And without that, there are no insights. If you have no insights, you have no value. And without value, you have no performance or opportunity. No opportunity? No business. If technology executives don’t lead the charge in connectivity, insights and innovation, critical business opportunities will be lost. This panel discussion outlines the future possibilities of IoT, how to overcome roadblocks and what you can do to set your organization up for success.

June 29, 2017 / Conference

7:00am - 7:45am

Registration & Breakfast

7:45am - 8:30am Opening Keynote

The State of Talent in Indiana

Keynote  sponsored by: Pure Storage

Jim Schellinger
Secretary of Commerce
State of Indiana
Expand Additional Information

Session Details Pending

8:30am - 9:00am

Networking Break

9:00am - 9:50am Breakout Sessions

The Trilogy of Risk-Metrics

Featured Session 

Stacy Mill
Director, Info. Risk
KAR Auction Services
Expand Additional Information

Well-executed risk-metrics initiatives can pay dividends for a security program. But to get those metrics, the trilogy of security — CIOs, CISOs and Chief Risk Officers — must work together. Stacy Mill, director of information risk at KAR Auction Services, says gaining support for metrics boils down to how effectively their value can be communicated to the board. In this session, she will share vital questions whose answers will not only create risk-metrics but turn them into communicable data that will protect your organization.

Innovative Leadership in the Midst of Digital Disruption

Featured Session  sponsored by: CenturyLink

Pasha Mohammed
Vice President of Product Strategy
Expand Additional Information

Replacing long-established, profitable business techniques with unknown processes can be daunting. But rather than building walls when the winds of change blow, CXOs must chart a new course with aggressive agility to successfully navigate the journey. Join this session as Pasha Mohammed explores how CenturyLink sailed the choppy waters of digital disruption, embraced change through innovative strategies and positioned the organization for smooth sailing.

Are You Ready for the Cloud?

Executive Boardroom  sponsored by: Cincinnati Bell Technology Solutions

Cory Deeter
Director, Security and Compliance
The Finish Line, Inc.
Walter Grudzinski
Director, Information Security & Business Continuity
Vectren Corporation
Leo Cronin
Cincinnati Bell
Expand Additional Information

The evolution of cloud technologies, third-party solutions and software-as-a-service offerings have steadily transformed the enterprise, allowing for greater flexibility and customization of the IT environment. The ascendance of these tools has also introduced myriad challenges to technology executives charged with securing critical data. As organizations look to the cloud, they must weigh the risks of migrating data in an increasingly threatened world. How can data in the cloud be secured? How does the risk-minded organization evaluate the security posture of their partners? In this session, security executives will examine the benefits, threats and challenges of doing business in the cloud.

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CXOs).

To reserve your seat, please contact:

Led Rhodes

Business Leadership and the Role of the CXO

Executive Boardroom 

Mike Meadows
Eli Lilly and Company
Gary Watkins
CIO, IT Shared Svcs.
KAR Auction Services
Expand Additional Information

As technology executives evolve beyond the role of service provider, these freshly minted business leaders face a host of unique challenges. Advances in technology and the need to leverage it have created specialization, new roles and new possibilities, creating an environment in which the CXO function is in flux. Today’s IT leaders must forge new career paths, a wider variety of partnerships, and strong ties to their teams while weighing an increased demand for high-level strategic thinking. Join your peers for this “State of the CXO” roundtable to assess your present and look to the future.

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CXOs).

To reserve your seat, please contact:

Led Rhodes

9:50am - 10:20am

Networking Break

10:20am - 11:10am Breakout Sessions

The Journey to Connected Customer Experience

Featured Speakers 

Brad Bodell
CNO Financial Group, Inc.
Expand Additional Information

Whether your customers are in the market for a must-have item or a much-needed service, the name of the game is 360-degree engagement. Pique their interest online, keep them connected through every touchpoint and drive that synergy through to point-of-sale. But achieving that high-level customer experience won’t happen overnight. CIO Brad Bodell maps out their journey to digital engagement and the digital enablement of employees and customers — plus the change-management strategy that brought their diverse workforce on board.

Up Your Security Game With Threat Intelligence

Featured Session  sponsored by: FireEye

Tim Sewell
Senior Director, Security Architecture
Eli Lilly and Company
Steve Lodin
Sr. Director, Cyber Security Operations
Sallie Mae
Jeffrey Groman
Senior Manager
Mandiant, a FireEye Company
Expand Additional Information

Threat intelligence can be a powerful tool for enhancing the security of your information and organization. How do you ingest, digest and process threat intelligence to increase the accuracy of threat detection and fuel holistic security efforts? Hear security leaders’ methods of successfully consuming and operationalizing threat intelligence, and learn about its formats and uses. Gain a greater understanding of how to best use threat intelligence — especially in the context of IoT — to monitor and secure your environment and take the bite out of adversaries’ attacks.

Creating Lasting Impact in the Digital Workplace

Executive Boardroom  sponsored by: Sprint Business

Dr. Gerry McCartney
Purdue University
Jan Geldmacher
Sprint Business
Expand Additional Information

For enterprise leaders, the allure of the digital frontier lies in its promise of greater efficiencies, enhanced customer engagement and access to actionable and insight-rich data. Yet CIOs know that unlocking this transformative potential ultimately falls to their people. The speed with which change takes hold depends on employees across the organization embracing new ways of working, new technologies, new skillsets and evolving roles. In this conversation, you and your peers will examine the digital workplace through the prism of your teams and share methods for engaging and maximizing your people in an era of constant change.

11:10am - 11:40am

Networking Break

11:40am - 12:50pm Luncheon Keynote

Reality-Based Leadership – Cut Through the Noise and Find Your CXO Voice

Keynote  sponsored by: Zerto

Cy Wakeman
Author & Thought Leader
Reality-Based Leadership
Expand Additional Information

Amidst the noise that technology executives face daily, one of the key challenges is to quickly see and radically assess the reality of a situation, conserve team energy, and use it to impact present circumstances. A great reality-based leader anticipates upcoming changes and capitalizes on the opportunities inherent in a situation without drama or defense. Cy Wakeman presents the principles of Reality-Based Leadership, a revolutionary look at how transforming an organization’s leadership competencies can drive success in profoundly changing times. Join Wakeman to learn why reality-based leaders should refuse to argue with reality, lead first, manage second and value action over opinion.

12:50pm - 1:20pm

Networking Break

1:20pm - 2:10pm Breakout Sessions

Leveraging Technology for the Ultimate Business Case

Featured Session 

Joey Clark
Director of Computing Infrastructure
Kimball Electronics Group
Sandy Smith
Kimball Electronics Group
Expand Additional Information

With the rapid change in data-center trends, it can be challenging to develop and implement the best data-center strategy for your organization. Joey Clark, director of computer infrastructure, and Sandy Smith, VP of IT, at Kimball Electronics, were tasked with that challenge when Kimball rapidly moved from its temporary space with its former parent company. In this session, Clark and Smith share their strategy, lessons learned and how they worked as a team to fundamentally change Kimball’s global architecture to provide a more redundant, secure and cost-effective solution for the business.

Think Your Network Is Safe? Check All Your Endpoints

Featured Session  sponsored by: HP Inc. Print Security Solutions

Ron Chestang
Senior Security Advisor
HP Inc. Print Security Solutions
Expand Additional Information

While you invest time, resources and millions of dollars in protecting endpoints and network perimeter, are you addressing one of the largest footprints of your network? You may be allowing hackers and malware to take the easy route to your organization’s network and data. Ron Chestang will share real-world breach examples of how some of the most secure organizations are still lagging in overall security for critical endpoints like printers. Chestang will share best practices on how to secure these valuable endpoints in the most effective way.

Seeking Security While Protecting Privacy

Executive Boardroom  sponsored by: Thales

Douglas Rapp
Senior Advisor for Cybersecurity & Defense, Indiana Economic Development Corporation
Cyber Leadership Alliance
Leon Ravenna
KAR Auction Services
Sol Cates
Vice President of Technology Strategy
Expand Additional Information

Whether across platforms or across the world, the free flow of data is crucial for the success of modern enterprise. Yet one weak link in that chain can release sensitive client or internal information that can send an organization into crisis. It is the CXO’s job to optimize both security and privacy — a task made more difficult by the endless channels through which today’s business is done. Join this roundtable as cybersecurity leaders discuss the challenges and best practices for protecting private data while enabling business success.

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CXOs).

To reserve your seat, please contact:

Led Rhodes

2:10pm - 2:30pm

Networking Break

2:30pm - 3:20pm Breakout Sessions

Making Big Data Smart Data

Featured Session  sponsored by: Bell Techlogix

Dr. Brent Drake
Chief Data Officer
Purdue University
Expand Additional Information

For large institutions like public universities, gathering huge amounts of data isn’t hard. But extrapolating that information into a functional product can be. Brent Drake, CDO at Purdue University, suspected that students’ behavioral markers of campus engagement, tracked through badge swipes and network activity, represented an untapped data reserve. His team linked that information with academic performance, and now students can compare themselves with peers university-wide to uncover steps to improving their grades and graduating on time. Attend this session to hear more about this story, and lessons learned in the art of turning untapped data into tangible results.

Demystifying the ‘How’ of Digital Transformation

Featured Session  sponsored by: Dell EMC

Sam Marraccini
Director, Global Portfolio Messaging
Dell EMC
Expand Additional Information

The conversation for CIOs across all industries on digital transformation is no longer “why do I need it?” but “how do I do it?” Fortunately, successful upstarts and incumbents alike show not only the needed competencies across technology — but also the necessary processes, culture and business models to deal with digital transformation. Stemming from real-world use cases, the emerging focus is on software-centricity, data analytics and the use of instrumented products and services to enable continuous product evolution and improvement. In this session, Sam Marraccini demystifies digital transformation and demonstrates how faster business execution can make all the difference.

Conquering Ransomware – No Magic Wands Required

Executive Boardroom  sponsored by: Fortinet, Inc.

Steve Lodin
Sr. Director, Cyber Security Operations
Sallie Mae
Graham Draughon
Vice President & Senior Managing Director, Information Security
Springleaf Finance Corporation
Mamoon Ansar
Senior Systems Engineer
Fortinet, Inc.
Expand Additional Information

As ransomware evolves, attacks are becoming an even bigger threat to organizations. Cybercriminals are continually developing new malware variants, making it difficult for organizations to create lasting safeguards. How do the world’s most sophisticated organizations protect themselves? While there’s no magic solution to guard against all ransomware, there are ways to mitigate threats. To create a successful defense, executives must first know the mechanics of ransomware and understand how criminals are bypassing modern defenses. In this roundtable discussion, executives explore ways to protect against the biggest ransomware threats in the industry and discuss how to react when their organizations are attacked

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CXOs).

To reserve your seat, please contact:

Led Rhodes

3:20pm - 3:40pm

Networking Break

3:40pm - 4:20pm Closing Keynote

Social Wars – A New Hope

Keynote  sponsored by: Wiretap

Greg Moran
Jeff Schuman
Expand Additional Information

An employee-fueled rebellion in organizational collaboration is occurring right now, and not, as George Lucas might say, in a galaxy far, far away. As employees demand faster, more nimble tools to collaborate with one other, a new force is being awakened and asking many unanswered questions. Will these new weapons of mass communication and collaboration be beneficial? Do they pose untold threats? Will there be any hope for the business to stay secure? Join Jeff Schumann and Greg Moran aboard their collaboration starship as they explore these topics and more — and unveil “A New Hope” that’s on the horizon for organizational collaboration.

4:20pm - 5:00pm

Closing Reception & Prize Drawings