Washington, DC CIO Executive Summit

June 13, 2024 | Convene at 1201 Wilson Blvd

June 13, 2024
Convene at 1201 Wilson Blvd


Collaborate with your peers

Get together with Washington, DC's top CIOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CIOs today:

Mitigating risks and improving efficiencies with cybersecurity strategies

Making data-driven decisions to improve business outcomes and allow for innovation

Improving communication to better align business goals with IT and security priorities

Washington, DC CIO Governing Body

The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CIOs, for CIOs.

What to Expect

Interactive Sessions

Hear from CIO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Washington, DC CIO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.


Executive Boardroom Sessions

Threat Intelligence and Third-Party Risk – Doubling Down on Critical Vulnerabilities

The complete entanglement of cyber risk with business risk is becoming increasingly more visible. CISOs now have an opportunity to better pinpoint third parties that present a threat to the organization. Yet the increasing complexities of third party, and even fourth party, risk management, prompted by a wide range of evolving threats, demands heightened attention. How can CISOs ensure they have a clear overview of the threat landscape and vulnerabilities across ecosystems and supply chains?

Join this session to discuss:

  • Identification of vulnerabilities across your vendor landscape to prioritize response efforts
  • Best practices for mitigating a new wave of sophisticated attacks to keep assets safe
  • The role threat intelligence plays in risk management strategies to safeguard your digital ecosystem

Preparing for Battle — Getting Ahead of Security Challenges of Tomorrow

When it comes to GenAI and nascent technologies being rapidly adopted, CIOs and CISOs must be proactive and thorough in their planning efforts and essentially attempt to predict the future. Today, we know data, access control, and IP must be protected while delighting users amid a changing threat landscape. But what does tomorrow bring?

Join this session to explore:

  • How to take advantage of the AI opportunity while also developing a foundationally secure enterprise
  • Ways to ensure your data, policies, and practices are clean and secure to minimize the risk of AI usage
  • Developing guidelines and policies for enabling business leaders, employees, and customers to realize the AI opportunity

Keynote Sessions

Body Language Secrets for Enhanced Executive Presence

Uncovering the mysteries of body language — how people communicate their thoughts and feelings without saying a word — is a decisive first step toward mastering any business and social situation. Top executives know that detecting split-second signals from your team and leadership then taking immediate action is crucial to being a persuasive communicator and problem-solver especially during tricky internal matters or high-level negotiations.

During this session you will learn how to:

  • Move beyond the vacuum of artificial body language to a behavioral approach based on YOU
  • Strengthen interpersonal relationships, be a more decisive leader and manage your nerves better
  • Uncover the less obvious needs of others and improve your team’s confidence and competence

Leveraging Emerging Technologies for Cybersecurity Strategy

New, special demands constantly arise for decision-makers who steer the fortunes of companies. Recently, business success has become linked to IT infrastructure. Seamless and secure connectivity is the key to unlocking innovation and accelerating business outcomes. To reach this state, enterprises are transforming their networks and security to a zero trust architecture augmented by AI/ML capabilities, thereby reducing risk, eliminating cost and complexity and increasing agility.

Join this session and learn:

  • How zero trust architecture secures users, workloads, IoT/OT devices, and your business partners by addressing critical security shortcomings of legacy network architecture
  • How to reduce network complexity without exposing your organization to new risks
  • How AI/ML adds defensive and business analytics capabilities that have the power to turn IT into the engine propelling business success forward

Closing Keynote & Comments

Join this keynote to hear from the 2023 Gartner CIO Analyst of the Year, Paul Furtado.  Details coming soon!

Breakout Sessions

Building an AI-Powered and Secure Unstructured Data Strategy

Your unstructured data holds immense value in the files that define your business. To maximize the potential of this data, it's crucial to establish a comprehensive unstructured data strategy that prioritizes both security and AI integration.

Join this session to learn about:

  • Identifying your valuable unstructured data sources and tools
  • Developing robust security measures for internal and external data use
  • Balancing AI with stringent security and compliance protocols to increase utility

Embracing Innovation — Real-World GenAI Use Cases

The present moment offers an opportunity to unlock GenAI's transformative power, but maturity across organizations varies. Business leaders recognize this technology is a catalyst for innovation. By understanding real-world case studies with lessons learned, those leaders can create real movement forward inside of their own organizations.

Bring your questions to this session as you hear from executives who have:

  • Implemented practical GenAI use cases and identified opportunities
  • Compared and measured platforms and solutions for value outcomes
  • Balanced approach to value and risk

Bridging the Gap — Public and Private Sector Similarities

It might seem simple to point out key differences within the public and private sectors, especially when choosing a career or networking. For today's technology leader, it's important to also understand the similarities within these two areas of business. Who knows, there might be a process worth adapting across industries. Whether the topic is innovation, data security, work-life balance or the structure of the c-suite, it's important for IT and security professionals to myth bust commonly associated with working in the private versus the public sector.

Join this session to discuss:

  • What differences and similarities are found when public and private companies decide to innovate
  • How data security is paramount across industries
  • The role the c-suite's structure plays in relationships and company culture

Peer-to-Peer Meetings Session

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

We look forward to seeing you at an upcoming in-person gathering

Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.


Venue & Accommodation

Convene at 1201 Wilson Blvd

Your Community Partners

Global Thought Leader
CIO Thought Leader
CISO Thought Leader
Key Partner
Program Partners

Community Program Manager

For inquiries related to this community, please reach out to your dedicated contact.

Melissa Tarpley

Community Program Manager