IN-PERSON

Seattle CIO Executive Summit

December 5, 2024 | Grand Hyatt Seattle

December 5, 2024
Grand Hyatt Seattle

APPLY TO PARTICIPATE

Collaborate with your peers

Get together with Seattle's top CIOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CIOs today:

Making data-driven decisions to improve business outcomes and allow for innovation

Ensuring resiliency and mitigating risk is top of mind within cybersecurity strategies

Strengthening influence and partnerships across the organization to enhance operational efficiency

Seattle CIO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CIOs, for CIOs.

Governing Body Co-Chairs

Brian Abrahamson

Pacific Northwest National Laboratory
Chief Digital Officer & Associate Laboratory Director

Charu Jain

Alaska Airlines
Senior Vice President Merchandising & Innovation

Laurent Rotival

Cambia Health Solutions
EVP & CIO

What to Expect

Interactive Sessions

Hear from CIO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Seattle CIO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


December 5, 2024

7:45am - 8:30am  Registration & Breakfast

8:15am - 9:15am  Keynote

Opening Keynote by Andy Kirkland, PepsiCo

Andrew Kirkland headshot

Andrew Kirkland

Global CISO, SVP Information Security

PepsiCo

 More details coming soon.

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Modern Workforce, Modern Security Strategy

Nasko Oskov headshot

Nasko Oskov

Software Engineer/Manager, Chrome Enterprise

Google

In the age of remote and hybrid work, employees now spend the majority of their time in the browser or in virtual meetings. The workforce is more mobile and distributed than ever before. At the same time, we are seeing an increase in cyber attacks and a higher average cost of data breaches. We must think more about protecting users right where they interface with web threats, the browser, without disrupting productivity.

Join this conversation with your peers to discuss:

  • The browser's role in a business's security strategy
  • Zero trust architecture
  • Managing resources for cybersecurity in a time of economic uncertainty

9:40am - 10:25am  Executive Boardroom

Governing Generative AI in your Organization

Mandy Andress headshot

Mandy Andress

CISO

Elastic

Carlos Melvin headshot

Carlos Melvin

Global Data Privacy Officer

Starbucks

Brian Talbert headshot

Brian Talbert

Managing Director, CISO

Alaska Airlines

Generative AI is being utilized by companies and employees alike–sometimes without permission. The normalization of this emerging technology has expanded the attack surface and left many security leaders feeling anxious and uncertain. Is generative AI worth the risk, and how should it be governed in an organization?

Join this interactive roundtable to explore:

  • What to expect from the threat landscape as generative AI becomes increasingly normalized
  • What adopting generative AI does to your attack surface, and if you should even allow it
  • How to implement governance rules that your organization will follow

9:40am - 10:25am  Executive Boardroom

How to Assess Security Maturity and Why It Matters Across the C-Suite

Steve Person headshot

Steve Person

Chief Information Security Officer

Cambia Health Solutions

Maturing your security posture requires knowing how to objectively assess your organization, use industry best practices and frameworks, and select the right tools to advance your business. This complex, time-intensive process often takes a backseat to defending yourself against ever-evolving threats. Getting started can be overwhelming, so finding time to assess and improve your security maturity is a tall task.

Join this session to discuss:

  • Benchmarking SOC performance using common assessment frameworks and tools
  • Determining your security maturity level, and how to fill gaps you’ve identified
  • Analyzing the impact of data and AI on your security posture

10:25am - 11:05am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:05am - 11:50am  Breakout Session

Session hosted by Google Workspace

Session details coming soon

11:05am - 11:50am  Breakout Session

Preparing for the Future — Cybersecurity Update with DHS Chief and FBI Cyber Task Force

Christopher Callahan headshot

Christopher Callahan

Chief of Cybersecurity

Department of Homeland Security

Today's varied threat landscape features both foreign and domestic security concerns that could stop or delay business operations. With so many avenues for malicious actors, how should CIOs and CISOs prioritize their resources to improve resiliency? Local U.S. Department of Homeland Security Chief of Cybersecurity and a Seattle FBI Cyber Task Force Special Agent will share ways to collectively develop and bolster defenses.

In this session, you’ll learn:

  • Insights into the latest cyber threats and emerging trends
  • Effective strategies for addressing the evolving threat landscape and bolstering defenses
  • Best practices for collaboration between public and private entities

11:50am - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

Transforming IT with Zero Trust and AI

Jay Chaudhry headshot

Jay Chaudhry

CEO, Chairman & Founder

Zscaler

Zero trust transformation is not a straightforward, linear process. Modern CXOs must navigate a complex balance between technological advancement and the need to simplify and secure IT environments. The explosion of AI and recent technological disruptions served as a wake-up call to many organizations to scrutinize progress towards zero trust principles – for users, devices, and workloads. How can CXOs take advantage of this momentum to accelerate their zero trust and AI-enabled transformation?

Join this session to learn:

  • How a zero trust approach to IT can help secure organizations’ resources reliably and cost-effectively
  • How to foster a cultural shift within the organization, ensuring employees and leadership understand and embrace zero trust principles
  • How to manage the complexities of AI integration to create robust security frameworks

1:10pm - 1:35pm  Break

1:35pm - 2:20pm  Breakout Session

Leverage AI to Centralize Knowledge and Strengthen Access Controls

Enterprise information is scattered across countless apps and platforms and finding the right data quickly and securely is a constant challenge. In this interactive session, we’ll explore strategies to centralize your company’s knowledge with AI to improve accessibility, as well as security, with robust data governance and access controls.

Join your peers to discuss:

  • Real-world strategies to streamline workflows
  • Actionable steps to safeguard critical company content
  • Enterprise data challenges and best practices to overcome them

1:35pm - 2:20pm  Executive Boardroom

The Silent Spread of AI — And Why You’re Losing Control Over It

Young-Sae Song headshot

Young-Sae Song

CMO

Grip Security

Aradhna Chetal headshot

Aradhna Chetal

Managing Director Executive Cloud Services and DevSecOps

TIAA

AI risk is quietly creeping into every corner of your enterprise, and you don’t even realize it. As more employees adopt AI-powered tools, applications, and processes, it is becoming deeply embedded in your tech stack — but it’s not just your employees using AI. Attackers are also leveraging AI to enhance their own tactics and sharpen their attacks. The real question for CISOs is: Do you have visibility into the countless ways AI is spreading, and what’s the best way to use AI to protect against AI?

Join this session to discuss:

  • The hidden ways AI is entering your enterprise—from third-party tools to shadow AI projects—and why it’s slipping under the radar
  • How attackers are using AI to improve their attacks and making them harder to detect by both legacy security tools and humans themselves
  • Actionable steps for CISOs to gain visibility and control over AI use across the organization

1:35pm - 2:20pm  Executive Boardroom

Applications Overload ― Strategies to Simplify, Optimize, and Mitigate

Viggo Forde headshot

Viggo Forde

CIO and Director of IT

Snohomish County

Business today runs on an ever-growing landscape of enterprise technology across multiple cloud environments. The average enterprise uses 1,000 applications, multiple clouds, and thousands of physical assets. As generative AI improves developer productivity by almost 40%, an explosion of new applications will be created with AI embedded in the next few years. All this complexity creates operational inefficiency and exposure to vulnerabilities.

Join this session to learn about:

  • Creating visibility across disparate systems to resolve the right issues at the right time
  • Simplifying ecosystems to improve efficiencies and optimize costs
  • Mitigate security vulnerabilities in your applications

2:20pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

Where You Stand — The Evolving Role of the Technology & Security Leader

Chuck Markarian headshot

Chuck Markarian

CISO

PACCAR

Increased digitization over the past 50 years has transformed CIOs and CISOs from technical leaders to global business executives who leverage technology to achieve enterprise value. As today’s leaders promote the establishment of optimal technology responsibilities and accountabilities, they must also evolve their own roles to deal with evolving obligations and opportunities.

Join this peer chat to explore:

  • What business outcomes you’re trying to drive
  • How you are strategically approaching those drivers
  • Ways to elevate your role for influence across the C-suite and beyond

3:00pm - 3:45pm  Executive Boardroom

Delivering an Analytics Strategy that Packs a Punch

As leaders seek to drive business value from data and analytics initiatives, they face both cultural and technical challenges. Technology and security leaders must partner with the business in creating a long-term analytics strategy that enables the organization to make data driven decisions.

Join this session to hear perspectives on:

  • Evolving data governance efforts to power accuracy in reporting and analytics
  • Overcoming technical obstacles and cost pressure to ensure analytics programs get prioritized
  • Building a business case to create a strategy that has measurable outcomes and results

3:00pm - 3:45pm  Executive Boardroom

Upskilling for an AI-Integrated World

Brian Abrahamson headshot

Brian Abrahamson

Chief Digital Officer & Associate Laboratory Director

Pacific Northwest National Laboratory

According to Gartner, by 2026, AI will augment 50% of office workers in global enterprises. When IT talent demand outweighs supply, CIOs must face skills gaps head on and create a future-proof talent strategy.

Join this session to discuss:

  • Preparing your workforce for AI Implementation
  • Identifying employee skills to build upon
  • Prioritizing talent planning for long term success

3:45pm - 4:10pm  Break

4:10pm - 4:45pm  Keynote

Authentic Leadership in Times of Change

Mike Robbins headshot

Mike Robbins

Author & Thought Leader

Guest Speaker

Change is inevitable. The one constant in the midst of all the change, stress, and uncertainty we face at work and in life is us. Leaders with a strong sense of emotional intelligence (EQ), a willingness to be courageous and vulnerable, and the capacity to inspire others in a genuine way, have a distinct advantage in keeping their teams engaged and motivated in any circumstances.

In this keynote, author and thought leader Mike Robbins will share practical tips for:

  • Learning to be transparent in a way that’s both liberating and inspiring
  • Connecting at a deeper level with your teams and building real trust
  • Dealing effectively with change and uncertainty — and thriving in the process

4:45pm - 5:00pm  Closing Comments and Prize Drawing

5:00pm - 6:30pm  Governing Body Reception

Governing Body Reception

Governing Body members host this reception for executives to close out the event with an evening of peer networking, food and drinks.

7:45am - 8:30am  Registration & Breakfast

8:15am - 9:15am  Keynote

Opening Keynote by Andy Kirkland, PepsiCo

Andrew Kirkland headshot

Andrew Kirkland

Global CISO, SVP Information Security

PepsiCo

 More details coming soon.

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Modern Workforce, Modern Security Strategy

Nasko Oskov headshot

Nasko Oskov

Software Engineer/Manager, Chrome Enterprise

Google

In the age of remote and hybrid work, employees now spend the majority of their time in the browser or in virtual meetings. The workforce is more mobile and distributed than ever before. At the same time, we are seeing an increase in cyber attacks and a higher average cost of data breaches. We must think more about protecting users right where they interface with web threats, the browser, without disrupting productivity.

Join this conversation with your peers to discuss:

  • The browser's role in a business's security strategy
  • Zero trust architecture
  • Managing resources for cybersecurity in a time of economic uncertainty

9:40am - 10:25am  Executive Boardroom

Governing Generative AI in your Organization

Mandy Andress headshot

Mandy Andress

CISO

Elastic

Carlos Melvin headshot

Carlos Melvin

Global Data Privacy Officer

Starbucks

Brian Talbert headshot

Brian Talbert

Managing Director, CISO

Alaska Airlines

Generative AI is being utilized by companies and employees alike–sometimes without permission. The normalization of this emerging technology has expanded the attack surface and left many security leaders feeling anxious and uncertain. Is generative AI worth the risk, and how should it be governed in an organization?

Join this interactive roundtable to explore:

  • What to expect from the threat landscape as generative AI becomes increasingly normalized
  • What adopting generative AI does to your attack surface, and if you should even allow it
  • How to implement governance rules that your organization will follow

9:40am - 10:25am  Executive Boardroom

How to Assess Security Maturity and Why It Matters Across the C-Suite

Steve Person headshot

Steve Person

Chief Information Security Officer

Cambia Health Solutions

Maturing your security posture requires knowing how to objectively assess your organization, use industry best practices and frameworks, and select the right tools to advance your business. This complex, time-intensive process often takes a backseat to defending yourself against ever-evolving threats. Getting started can be overwhelming, so finding time to assess and improve your security maturity is a tall task.

Join this session to discuss:

  • Benchmarking SOC performance using common assessment frameworks and tools
  • Determining your security maturity level, and how to fill gaps you’ve identified
  • Analyzing the impact of data and AI on your security posture

10:25am - 11:05am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:05am - 11:50am  Breakout Session

Session hosted by Google Workspace

Session details coming soon

11:05am - 11:50am  Breakout Session

Preparing for the Future — Cybersecurity Update with DHS Chief and FBI Cyber Task Force

Christopher Callahan headshot

Christopher Callahan

Chief of Cybersecurity

Department of Homeland Security

Today's varied threat landscape features both foreign and domestic security concerns that could stop or delay business operations. With so many avenues for malicious actors, how should CIOs and CISOs prioritize their resources to improve resiliency? Local U.S. Department of Homeland Security Chief of Cybersecurity and a Seattle FBI Cyber Task Force Special Agent will share ways to collectively develop and bolster defenses.

In this session, you’ll learn:

  • Insights into the latest cyber threats and emerging trends
  • Effective strategies for addressing the evolving threat landscape and bolstering defenses
  • Best practices for collaboration between public and private entities

11:50am - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

Transforming IT with Zero Trust and AI

Jay Chaudhry headshot

Jay Chaudhry

CEO, Chairman & Founder

Zscaler

Zero trust transformation is not a straightforward, linear process. Modern CXOs must navigate a complex balance between technological advancement and the need to simplify and secure IT environments. The explosion of AI and recent technological disruptions served as a wake-up call to many organizations to scrutinize progress towards zero trust principles – for users, devices, and workloads. How can CXOs take advantage of this momentum to accelerate their zero trust and AI-enabled transformation?

Join this session to learn:

  • How a zero trust approach to IT can help secure organizations’ resources reliably and cost-effectively
  • How to foster a cultural shift within the organization, ensuring employees and leadership understand and embrace zero trust principles
  • How to manage the complexities of AI integration to create robust security frameworks

1:10pm - 1:35pm  Break

1:35pm - 2:20pm  Breakout Session

Leverage AI to Centralize Knowledge and Strengthen Access Controls

Enterprise information is scattered across countless apps and platforms and finding the right data quickly and securely is a constant challenge. In this interactive session, we’ll explore strategies to centralize your company’s knowledge with AI to improve accessibility, as well as security, with robust data governance and access controls.

Join your peers to discuss:

  • Real-world strategies to streamline workflows
  • Actionable steps to safeguard critical company content
  • Enterprise data challenges and best practices to overcome them

1:35pm - 2:20pm  Executive Boardroom

The Silent Spread of AI — And Why You’re Losing Control Over It

Young-Sae Song headshot

Young-Sae Song

CMO

Grip Security

Aradhna Chetal headshot

Aradhna Chetal

Managing Director Executive Cloud Services and DevSecOps

TIAA

AI risk is quietly creeping into every corner of your enterprise, and you don’t even realize it. As more employees adopt AI-powered tools, applications, and processes, it is becoming deeply embedded in your tech stack — but it’s not just your employees using AI. Attackers are also leveraging AI to enhance their own tactics and sharpen their attacks. The real question for CISOs is: Do you have visibility into the countless ways AI is spreading, and what’s the best way to use AI to protect against AI?

Join this session to discuss:

  • The hidden ways AI is entering your enterprise—from third-party tools to shadow AI projects—and why it’s slipping under the radar
  • How attackers are using AI to improve their attacks and making them harder to detect by both legacy security tools and humans themselves
  • Actionable steps for CISOs to gain visibility and control over AI use across the organization

1:35pm - 2:20pm  Executive Boardroom

Applications Overload ― Strategies to Simplify, Optimize, and Mitigate

Viggo Forde headshot

Viggo Forde

CIO and Director of IT

Snohomish County

Business today runs on an ever-growing landscape of enterprise technology across multiple cloud environments. The average enterprise uses 1,000 applications, multiple clouds, and thousands of physical assets. As generative AI improves developer productivity by almost 40%, an explosion of new applications will be created with AI embedded in the next few years. All this complexity creates operational inefficiency and exposure to vulnerabilities.

Join this session to learn about:

  • Creating visibility across disparate systems to resolve the right issues at the right time
  • Simplifying ecosystems to improve efficiencies and optimize costs
  • Mitigate security vulnerabilities in your applications

2:20pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

Where You Stand — The Evolving Role of the Technology & Security Leader

Chuck Markarian headshot

Chuck Markarian

CISO

PACCAR

Increased digitization over the past 50 years has transformed CIOs and CISOs from technical leaders to global business executives who leverage technology to achieve enterprise value. As today’s leaders promote the establishment of optimal technology responsibilities and accountabilities, they must also evolve their own roles to deal with evolving obligations and opportunities.

Join this peer chat to explore:

  • What business outcomes you’re trying to drive
  • How you are strategically approaching those drivers
  • Ways to elevate your role for influence across the C-suite and beyond

3:00pm - 3:45pm  Executive Boardroom

Delivering an Analytics Strategy that Packs a Punch

As leaders seek to drive business value from data and analytics initiatives, they face both cultural and technical challenges. Technology and security leaders must partner with the business in creating a long-term analytics strategy that enables the organization to make data driven decisions.

Join this session to hear perspectives on:

  • Evolving data governance efforts to power accuracy in reporting and analytics
  • Overcoming technical obstacles and cost pressure to ensure analytics programs get prioritized
  • Building a business case to create a strategy that has measurable outcomes and results

3:00pm - 3:45pm  Executive Boardroom

Upskilling for an AI-Integrated World

Brian Abrahamson headshot

Brian Abrahamson

Chief Digital Officer & Associate Laboratory Director

Pacific Northwest National Laboratory

According to Gartner, by 2026, AI will augment 50% of office workers in global enterprises. When IT talent demand outweighs supply, CIOs must face skills gaps head on and create a future-proof talent strategy.

Join this session to discuss:

  • Preparing your workforce for AI Implementation
  • Identifying employee skills to build upon
  • Prioritizing talent planning for long term success

3:45pm - 4:10pm  Break

4:10pm - 4:45pm  Keynote

Authentic Leadership in Times of Change

Mike Robbins headshot

Mike Robbins

Author & Thought Leader

Guest Speaker

Change is inevitable. The one constant in the midst of all the change, stress, and uncertainty we face at work and in life is us. Leaders with a strong sense of emotional intelligence (EQ), a willingness to be courageous and vulnerable, and the capacity to inspire others in a genuine way, have a distinct advantage in keeping their teams engaged and motivated in any circumstances.

In this keynote, author and thought leader Mike Robbins will share practical tips for:

  • Learning to be transparent in a way that’s both liberating and inspiring
  • Connecting at a deeper level with your teams and building real trust
  • Dealing effectively with change and uncertainty — and thriving in the process

4:45pm - 5:00pm  Closing Comments and Prize Drawing

5:00pm - 6:30pm  Governing Body Reception

Governing Body Reception

Governing Body members host this reception for executives to close out the event with an evening of peer networking, food and drinks.

December 5, 2024

We look forward to seeing you at an upcoming in-person gathering


Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

Grand Hyatt Seattle
MORE INFORMATION

A block of rooms has been reserved at the Grand Hyatt Seattle at a reduced conference rate. Reservations should be made online or by calling 402-935-5352. Please mention Evanta CIO and CISO Executive Summit to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $189 USD (plus tax) is November 12, 2024.

Your Community Partners


Global Thought Leaders
CIO Thought Leader
Key Partners
Program Partners

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Monica Mickelson

Senior Community Program Manager

+17577054864

monica.podolsky@evanta.com