Boston CISO Executive Summit

November 17, 2021 | Renaissance Boston Waterfront Hotel

November 17, 2021
Renaissance Boston Waterfront Hotel


Collaborate with your peers

Get together with Boston's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Accelerating security to match the pace of digital business initiatives

Managing the risk created from a landscape of new core technologies

Achieving sustainability for the CISO role without compromising outcomes

Boston CISO Governing Body

The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.


Kevin Brown

Boston Scientific
Vice President & Chief Information Security Officer

Javed Ikbal

Bright Horizons

Lawrence Jarvis

Iron Mountain Inc
SVP, Chief Information Security Officer

Holly Ridgeway

Citizens Financial Group
Chief Security Officer

Ravi Thatavarthy

BJ's Wholesale Club

Marnie Wilking

Global Head of Security and IT Risk Management

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Boston CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.


Keynote Sessions

The Art of Innovation — Creativity at Work

Turning social distancing into creative connecting, Artist/Author Noah Scalin and creator of the Webby award-winning Skull-A-Day project, shares images of his awe-inspiring work and tells the unusual story of how he completely overturned his own working practices to develop a new way of sustaining innovation in his work and life. He will share how his learnings from that experience have helped him to continue creating and connecting despite the challenges of this moment in time.

Join this keynote to learn:

  • Actionable lessons to unleash creativity to solve business problems
  • Creative concepts to maintain employee engagement in an era of remote work
  • How to jump-start and sustain creative leadership

Training the Next Generation of Cyber Professionals

Compared with academic pursuits like history, philosophy or mathematics, the field of cybersecurity is still in its infancy. The word cybersecurity itself is barely three decades old, and by some estimates, the global cybersecurity workforce needs to grow at a blistering 145 percent each year simply to keep pace with the demand for skilled talent in the near future.

Join Julie Fitton as she discusses: 

  • Strategies for developing the next generation of cybersecurity professionals
  • Expanding diverse talents
  • How to successfully educate cohorts of underprivileged and underserved students about cyber technologies

Breakout Sessions

The CRO, CIO and CISO Partnership: Creating Enterprise Agility While Reducing Attack Opportunities

A challenge in many organizations is maintaining clear boundaries and responsibilities, while improving communication and maximizing cooperation between the three technology offices: CIO, CISO and CRO. There is no single right answer when it comes to assigning cybersecurity responsibilities and developing a reporting structure. Instead, it is best to ask how cybersecurity responsibilities should be delegated among these roles.

Join this interactive session as we dissect a real-life cyber-attack and understand:

  • How to build productive working relationships
  • Roles and Responsibilities of the CRO, CIO, and CISO
  • How to improve communication between the three offices

Benchmarking Session - Protect your Data or Pay the Price?

The risk of attacks are top-of-mind for all organizations today as threat actors become more sophisticated and their impact increasingly detrimental. Cybersecurity professionals must have the right strategy and tools in place to prevent, detect and respond quickly to breaches to avoid reputational risk or paying a hefty sum.

Join this benchmarking session to discuss:

  • Taking ransomware protection to the next level

  • Strategies to defend against bad actors 

  • Challenges and best practices in managing major security events

The Three Keys To Cybersecurity Transformation – Platform, People, and Process

The process of digital transformation improves business agility and information flow, but dramatically expands the attack surface and exposes your business to new threats. Your employees are on the internet now more than they are on the corporate network, accessing applications and data from everywhere. Protecting your business and retaining the benefits of digital transformation requires migrating to a zero trust security model delivered through the cloud, closer to where your users and business assets are now centered.

Join your peers for a session focused on:

  • Building your security ecosystem on a Zero Trust foundation
  • Developing new skills and embracing a new cultural mindset at all levels of the enterprise
  • Defining the right tools to empower your adoption of Zero Trust

Kick Start Your Company-Wide Risk Analysis Program

Most likely your risk management program has evolved due to outside influences such as client contract requirements, board requests, and/or specific security incidents. What you may not realize is that your risk program should be far more holistic, based not only on your business’ enterprise-wide risks but built around the unique assets critical to your organizations ability to deliver services.

Join Robert Sullivan, VP, Technology Shared Services and CISO at Agero as he discusses:

  • How you can quickly reorient your risk program to be based on your enterprise’s unique assets
  • Defining the cyber risk, potential for loss, disruption, exposure, or corruption of those assets, measured in terms of annualized loss expectancy
  • How to complete an initial asset valuation and business discovery without investing months of work

Executive Boardroom Sessions

Third Party Third Party Risk: How to measure and manage your risk with outsourcing

In today’s business environment, organizations are held responsible for the actions of their suppliers, vendors and partners in addition to their own internal activities. Knowledge and understanding of supplier and third-party risk is of the utmost importance and CISOs and the business teams they support.  Organizations must know their business well enough to understand where risks may materialize and employ processes to detect and react to their evolving risk from third parties.

Join this session to discuss:

  • How to create an accurate inventory of all vendors within your ecosystem
  • Strategies to establish a process for continuous assessment and monitoring of third parties
  • What to do when your third party gets breached

When Ransomware Strikes, Will You Be Ready?

IT leaders across the globe are asking themselves that question as ransomware grows increasingly prevalent and as attackers continue to raise their demands. It may seem difficult to prioritize building out your recovery plan when you could spend that time focused on increasing defensive measures but recovering from ransomware is not a process you want to wing.

Join this session to discuss:

  • Step-by-step guidance for navigating ransomware response protocols.
  • Key pitfalls most organizations make when attempting a ransomware recovery and how to avoid them.
  • How to build a foundation for developing a thorough, practical, and well-documented plan of action.

From Zero Trust to Zero Touch with Intelligent Security​

Organizations are challenged to strike a balance between security teams who want a Zero Trust approach and employees who desire seamless Zero Touch access. Bridging that gap is Artificial Intelligence and a Zero Trust Architecture.

Join this session to discuss:

  • Why the view of endpoints impacts how they’re secured and managed
  • How adaptive security and artificial intelligence can protect all endpoints
  • The goal of increasing security while acknowledging other factors


Returning to in-person conferences

We are excited to welcome you back, in person, to Evanta gatherings.

As previously shared, Evanta will hold in-person programs only in locations that meet our stringent health and safety criteria to help ensure the well-being of our participants, partners, and our associates. These criteria include adhering to government, venue, and health agency guidelines in addition to taking all practical steps on-site.

Please note that our onsite planning will continue to evolve, and all measures will be subject to change to ensure the best and safest possible experience. Please see below (under ‘more information’) for our current approach and planned onsite safety measures.


Venue & Accommodation

Renaissance Boston Waterfront Hotel

A block of rooms has been reserved at the Renaissance Boston Waterfront Hotel at a reduced conference rate. Reservations should be made online or by calling 1-877-901-6632. Please mention Evanta Boston Executive Summit to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $279 USD (plus tax) is October 24, 2021.

Your Community Partners

Key Partners
Program Partners

Boston CISO Program Managers

For inquiries related to this event, please reach out to your dedicated program contacts.

Cathleen Hogan

Program Manager

Tim Bigley

Senior Program Manager – Territory Specialist