Seattle CIO Executive Summit

November 16, 2022 | Grand Hyatt Seattle

November 16, 2022
Grand Hyatt Seattle

REGISTER NOW

Collaborate with your peers

Get together with Seattle's top CIOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CIOs today:

Mastering the art of change and adaptability

Accelerating high growth and a data-first mindset

Empowering talent, protecting the enterprise

Seattle CIO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CIOs, for CIOs.

Co-Chairs

Brian Abrahamson

Pacific Northwest National Laboratory
CIO

Anja Canfield-Budde

University of Washington
Associate Vice President, Information Management

Darren Challey

Amazon
Director - Director Security Operations and Technology (SOT) / Global Security Operations (GSO)

Chuck Markarian

PACCAR
CISO

Sean Murphy

BECU
SVP, CISO

What to Expect

Interactive Sessions

Hear from CIO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Seattle CIO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


Executive Boardroom Sessions

The Rise of Big Security Data

Data is growing exponentially. The challenge is that with the rise of data stored in the cloud and the rise of endpoints and IoT devices, the enterprises looking to improve their security posture by leveraging this abundant wealth of data. However, data without context becomes superfluous and that more data does not equate to better security. Data needs to be contextualized and assembled into actionable results.

Come to this session to discuss:

  • How cyber hackers are exploiting weaknesses posed by legacy SIEM and EDR solutions
  • How rogue devices and shadow IT are leaving your enterprise even more vulnerable
  • How data retention is key to effective threat hunting, but it comes at a cost

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CIOs & CISOs).

To reserve your seat, please contact: Tony Stach

Tony.Stach@evanta.com

Manage Security Posture and Risk Across SaaS Environments

As the adoption of enterprise SaaS grows, high-profile SaaS application data breaches are also on the rise. CISOs are ultimately responsible for the security of their organization’s data, including access by third party applications, and must implement appropriate security settings and data governance for their environments. The challenge, the most widely used gateway architecture solutions don’t deliver visibility into the complex, unique characteristics of different SaaS applications.

Join this Boardroom to discuss:

  • How to gain immediate visibility into what data can be accessed by all types of users and integrations, including third party applications
  • How to build the business case for a comprehensive SaaS security program, including funding sources
  • How to integrate security into the Software Development Lifecycle to improve DevSecOps during the product development process

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CIOs & CISOs).

To reserve your seat, please contact: 

Tony Stach at Tony.Stach@evanta.com

Architecting a More Adaptive and Integrated IAM Strategy

IAM systems are the digital keys to your company’s castle. But the transition to remote, connect anywhere computing means there are thousands of keys created every day, each one exponentially increasing the risk of unauthorized access through any one of the systems your users access daily. So if identity is now the ultimate perimeter and that perimeter is constantly expanding and becoming more complex, how do you build a defense structure capable of protecting it?

During this peer-discussion you will explore:

  • The role of zero trust in access management
  • How to implement IAM tools without negatively impacting the user experience or core business operations
  • How to engage other stakeholders and functions on their access needs to move beyond surface-level coordination

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CxOs).

To reserve your seat, please contact: 

Tony Stach at Tony.Stach@evanta.com

Third-Party Cyber Risk — Zero-Day Findings and Mitigation

Managing distributed risk is today’s defining cybersecurity challenge. Mitigation of zero-day vulnerabilities is critical as adversaries exploit supply chain entities. This session explores how to identify all third parties impacted by zero-day vulnerabilities and guide their mitigation efforts. Your vendor, supplier, and partner ecosystem is now your enterprise attack surface.

Join this session to learn:

  • How to manage distributed risk associated with hundreds and even thousands of vendors, suppliers, and partners 
  • Approaches to identify, prioritize, and mitigate active threats and critical/zero-day vulnerabilities 
  • Strategies to reduce supply chain/external ecosystem risk associated with zero-day

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CIOs & CISOs).

To reserve your seat, please contact: 

Tony Stach at Tony.Stach@evanta.com

Executive Boardroom Hosted by Fastly

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CxOs).

To reserve your seat, please contact: 

NAME at PHONE or EMAIL

Executive Boardroom Hosted by Expel

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CxOs).

To reserve your seat, please contact: 

NAME at PHONE or EMAIL


Breakout Sessions

A C-level Guide to Zero Trust Implementation

The relationship between the CIO and CISO has inherent tension: the CIO wants to create new business opportunities, while the CISO is concerned about security and risk. Zero trust architecture can be the mediating intersection point between competing CIO and CISO objectives and a strong partnership can accelerate zero trust across the enterprise while driving other business transformation initiatives.

Join the discussion to learn more about:

  • The keys to implementing zero trust as a service
  • How to position zero trust to other C-level executives and the board
  • Ensuring the right competencies and workflows are in place to achieve success

Shadow in the Darkness — Cyberdefense in a Changing Threat Landscape

Cybercrime and cybercrime activities are not only increasing exponentially each year, but also easier to execute successfully. Complicated attack crime toolkits can be created or purchased easily, making sophisticated attacks more attainable. Furthermore, the changing geopolitical and economic landscapes have given State-sponsored threat attackers with unlimited resources to target NGOs and critical resources.

In this session we will examine:

  • Techniques, tools and deceptions threat actors use to bypass perimeter security, compromise cloud environments, and manipulate users
  • Methods cybercriminals use to cover tracks and stay hidden
  • Both cloud and on-premise strategies on how to protect your organization from motivated and sophisticated attackers

The Evolving Role of the CIO

The scope of the CIO responsibilities expands beyond borders and beyond managing the IT of an organization. They must be business leaders looking to add value to a company, talent leaders finding the right employees and adaptive leaders who first need to identify the problem before they can solve it. So, what’s in the job description for tomorrow's CIO?

Join this session to discuss:

  • Preparing for what the CIO leadership role will entail in the coming years
  • Delivering at the bottom line while juggling other responsibilities company-wide
  • Strategizing how to be an agile leader who enables others to make quick decisions

Passwordless Is Just the Start — Why CIOs & CISOs Must Rethink the Customer Identity Experience

Threat actors constantly target customer passwords, which is why many CIOs & CISOs view passwordless as a big leap in authentication security. Recent experience reveals how attackers are adapting to passwordless authentication, demonstrating that simply eliminating passwords isn't enough. To close off the threat vectors fraudsters abuse, CIOs & CISOs and identity professionals must take a comprehensive CIAM approach to protect accounts throughout the lifecycle of the user journey, from first registration to account recovery.

This session explores:

  • The role of passwordless authentication in improving protection and customer experience
  • How attackers are adapting to passwordless authentication
  • Why companies must take a more comprehensive approach to account protection, inclusive of passwordless authentication
  • How to deliver security-first CIAM without compromising the user experience


Keynote Sessions

Scaling Tech in New Markets with a Culture-First Approach

At the core of lululemon is its culture: innovative, diverse, inclusive and authentic. When Julie Averill, EVP and Chief Technology Officer, set out to scale lululemon’s technology team into India, she led with a culture-first approach. In this engaging session, Julie will discuss lululemon’s journey - where they’ve been, and where they’re going.

Join this keynote to hear highlights from lululemon’s India Tech Hub inauguration, including:

  • Bringing lululemon’s culture into a new community while honoring the local culture & heritage
  • Attracting top talent and finding leaders who share in the company’s core value and mission
  • Overcoming barriers and the work that lies ahead

Work Rebalanced – Fueling Trust, Collaboration and Empowerment

Technology is no longer just an enabler of employee productivity; it is invaluable empowerment. To thrive in a world teeming with opportunity and potential pitfalls, organizations must create deeply considered strategies that include intelligent IT, empathic leadership, secure platforms, and tech empowerment.

Join this keynote to:

  • Understand the forces challenging and reshaping organizations today
  • Balance employee needs and challenges while securing and simplifying digital workspaces
  • Leverage technology to foster flexibility, collaboration and trust across the dispersed enterprise


REGISTER

We look forward to seeing you at an upcoming in-person gathering


Evanta programs are uniquely positioned to succeed in the current landscape.

  • Our invitation-only gatherings are designed to be smaller in scale, providing a safe and comfortable environment.
  • All in-person programs are local and complimentary, with zero impact on your organization’s T&E.

We are committed to creating the safest possible environment for all participants, partners, and associates. As a part of our commitment we will continue to monitor and adhere to government, venue, and health agency guidelines. Information on vaccinations, face mask guidance, on-site safety measures, and more, can be found here: Health and Safety Resource Policy.

Location


Venue & Accommodation

Grand Hyatt Seattle

A block of rooms has been reserved at the Grand Hyatt Seattle at a reduced conference rate. Reservations should be made online or by calling 1-888-421-1442. Please mention G-EVAE to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $229 USD (plus tax) is October 25, 2022.

Your Community Partners


Global Thought Leader
CISO Thought Leader
Program Partners

Seattle CIO Program Manager


For inquiries related to this event, please reach out to your dedicated program contact.

Tony Stach

Program Manager

3604335583

tony.stach@evanta.com