We use cookies to deliver the best possible experience on our website. To learn more, visit our Privacy Policy.
By continuing to use this site, or closing this box, you consent to our use of cookies.

Chicago CISO Executive Summit
December 1, 2021 | Chicago Marriott Downtown Magnificent Mile
December 1, 2021
Chicago Marriott Downtown Magnificent Mile
Collaborate with your peers
Get together with Chicago's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.
Join your peers to discuss the most critical issues impacting CISOs today:
Accelerating security to match the pace of digital business initiatives
Managing the risk created from a landscape of new core technologies
Achieving sustainability for the CISO role without compromising outcomes
Chicago CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.
Co-Chairs

Waqas Akkawi
SIRVA Worldwide
VP, CISO

Sarah Buerger
Coyote Logistics
Director, IT Security

Jim Cameli
Walgreens Boots Alliance
VP & Global Chief Information Security Officer

Erik Hart
Cushman & Wakefield
CISO

Ricardo Lafosse
Kraft Heinz
CISO

JJ Markee
Baxter
Chief Information Security Officer

Paolo Vallotti
Tate & Lyle
CISO & VP of Operations

Mike Zachman
Zebra
VP & CSO
What to Expect
Agenda
December 1, 2021 - morning
7:30am - 8:15am Registration & Breakfast
8:15am - 9:00am Keynote
Leading the Transformed Enterprise
Hosted by Citrix Systems, Inc.

Jesse Magenheimer
Vice President & CISO
State Farm

Ashley Pettit
Senior Vice President & CIO
State Farm
IT and security partnerships are built on trust and thrive when leaders invest in each other throughout the organization. IT leaders must set an example, demonstrating a commitment to security, positioning it at the core of IT and enterprise roadmaps.
Join this keynote as State Farm shares their story on how to:
- Strengthen the IT-Security partnership to fuel innovation and accelerate new technology deployments
- Ensure security is represented as a holistic element of the organization
- Collaborate in different business sectors while moving business initiatives forward
9:00am - 9:15am Break
9:15am - 10:00am Breakout Session
Managing and Securing Cloud-Native Workloads
Hosted by Aqua Security

Tsvi Korren
Field CTO
Aqua Security

Nitin Raina
VP - Cyber & Information Security
ThoughtWorks
In a recent report, Gartner® defined a new category of security practices and states that “Optimal security of cloud-native applications requires an integrated approach that starts in development and extends to runtime protection.”
Cloud Native Application Protection Platforms (CNAPP) consolidate several previously-siloed capabilities like CSPM, DevSecOps and Workload Protection to secure and protect containers, functions and Kubernetes.
Join to learn:
- The definition and components of CNAPP
- The security implications of cloud native workloads
- Executing the approach at scale using automation
9:15am - 10:00am Breakout Session
It All Comes Down to This — People, Processes, and Tech
Hosted by Expel

Erik Hart
CISO
Cushman & Wakefield
Presented with monstrous problems, we often look for silver-bullet solutions — knowing all the while quick fixes are rarely long-lasting. Perhaps the key to achieving real, holistic success looks less like a single-tool stopgap and more like this well-balanced, three-part approach.
CISOs can expect:
Discussions on a new, practical problem solving ethos
Challenges to the traditional “one size fits all” approach to fixing hot topic security issues
To collaborate with others in practical, cogent and interactive simulations
9:15am - 10:00am Executive Boardroom
Strengthening Your IAM Strategy
Hosted by Okta

Shane Hibbard
Director of Information Security
Invenergy

Paul Munsen
Director, Global Identity & Access Management
McDonald's
Moving beyond outdated tech and into a world of efficient, seamless access isn’t impossible. Fine-tuning IAM strategies is an important goal of CISOs across the country.
In this boardroom, you’ll discuss with your peers:
How to tailor an IAM strategy with limited resources
When to rely on legacy technology versus investing in new technology
What training is needed to strengthen your IAM program
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact your event Program Manager, Tom Ward (tom.ward@evanta.com).
9:15am - 10:00am Executive Boardroom
Defend the Endpoint, Protect the Center
Hosted by CrowdStrike

Jeff Trower
Principal Product Manager
CrowdStrike

Waqas Akkawi
VP, CISO
SIRVA Worldwide

Ken Townsend
VP, CISO
R1 RCM
The proliferation of devices over the last decade has radically increased how many endpoints companies are responsible for, and traditional endpoint protection is no longer up to the task. How can an organization maintain the fundamentals of endpoint security — and security in general — while embracing new technologies and strategies like machine learning and big data analytics?
Join fellow CISOs as they discuss:
- Successes and challenges in keeping users secure at all times
- Leveraging new technologies to quantify threats and assess impacts
- Common pitfalls in securing large numbers of remote users
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact your event Program Manager, Tom Ward (tom.ward@evanta.com).
10:00am - 10:30am Networking Break
10:30am - 11:15am Breakout Session
Securing the New Way of Work — Zero Trust for the Resilient Enterprise
Hosted by Zscaler

Brad Moldenhauer
CISO Americas
Zscaler

Erik Hart
CISO
Cushman & Wakefield
The process of digital transformation improves business agility and information flow, but dramatically expands the attack surface and exposes your business to new threats. Your employees are on the internet now more than they are on the corporate network, accessing applications and data from everywhere. Protecting your business and retaining the benefits of digital transformation requires migrating to a zero-trust security model delivered through the cloud, closer to where your users and business assets are now centered.
Join your peers for a session focused on:
- Building your security ecosystem on a Zero Trust foundation
- Developing new skills and embracing a new cultural mindset at all levels of the enterprise
- Defining the right tools to empower your adoption of Zero Trust
10:30am - 11:15am Breakout Session
Assembling Your Elite Strike Force
Hosted by SafeBreach

Michael Boucher
CISO, Americas
JLL
Waiting for threats to pop up and hoping you’re ready to play defense can exhaust your resources and lead to frequent states of crisis. That’s why CISOs are enlisting their very best to take out security issues before they strike.
Get ready to learn:
- Who you’ll need on your elite team of threat eliminators
- Real-world, offensive threat detection methods
- Step-by-step tips for building your squad of security scouts
10:30am - 11:15am Executive Boardroom
The Ongoing Fight to Secure Business Messaging
Hosted by Abnormal Security

Mike Britton
CISO
Abnormal Security

Frank Yanan
SVP / Business Information Security Officer
Bank of America

Dannie Combs
SVP, CISO
DFIN Solutions
Despite their efforts, from phishing simulations to security awareness campaigns, CISOs from organizations big and small keep falling short when it comes to stopping Business Email Compromise (BEC) attacks. But, if everyone has an email security program, why are the losses associated with BEC still climbing?
Let's figure out:
- What is working, or not working, with existing processes and technology?
- How do we solve the “human factor” in the equation?
- Best practices for preventing loss related to a BEC attack?
10:30am - 11:15am Executive Boardroom
Overcoming Hurdles and Executing a Security Automation Plan
Hosted by Anvilogic

Karthik Kannan
CEO and Founder
Anvilogic

Paolo Vallotti
CISO & VP of Operations
Tate & Lyle
Certain objectives that create a burden for already-busy team members can easily be shifted to automated processes to ensure the objectives are accomplished, managed, and maintained without human error or manual process of teams with higher priority focus. Of course, the security automation process comes with some unique challenges.
Let’s figure out:
- Burdensome objectives that qualify for automation and identifying gaps where automation can have an immediate impact
- How automation can enable teams to leverage existing investments to increase efficiency and efficacy
- How to automate the detection, hunting, and triage lifecycle to increase coverage, reduce risk, and lower cost
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact your event Program Manager, Tom Ward (tom.ward@evanta.com).
11:15am - 11:25am Break
December 1, 2021 - mid-afternoon
December 1, 2021 - afternoon
Location
Venue & Accommodation
Chicago Marriott Downtown Magnificent MileHost Hotel Information
Information regarding hotel accommodations and group rates coming soon.
Health & Safety Local Guidelines
Our host venue, Chicago Marriott Downtown Magnificent Mile, requires all guests to wear a mask in all public spaces. Masks will be provided for your convenience.
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.