Chicago CISO Executive Summit

May 24, 2022 | Chicago Marriott Downtown Magnificent Mile

May 24, 2022
Chicago Marriott Downtown Magnificent Mile

REGISTER NOW

Collaborate with your peers

Get together with Chicago's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Driving the business forward through strategic technology and management processes

Encouraging cross-company security ownership

Monitoring the threat horizon and bolstering your defenses

Chicago CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Co-Chairs

Waqas Akkawi

SIRVA Worldwide
VP, CISO

Sarah Buerger

Coyote Logistics
Director, IT Security

Jim Cameli

Walgreens Boots Alliance
VP & Global Chief Information Security Officer

Erik Hart

Cushman & Wakefield
CISO

Ricardo Lafosse

The Kraft Heinz Company
Chief Information Security Officer

JJ Markee

Baxter
Chief Information Security Officer

Bill Podborny

Constellation Brands
CISO

Paolo Vallotti

Tate & Lyle
CISO & VP of Operations

Mike Zachman

Zebra Technologies
VP & Chief Security Officer

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Chicago CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


May 23, 2022

6:00pm - 8:30pm  Governing Body Welcome Reception

Governing Body Private Dinner

Governing Body members host this dinner for attendees to launch the event with an evening of peer networking.

May 24, 2022 - morning

7:30am - 8:15am  Registration & Breakfast

8:15am - 9:00am  Keynote

Calling in Backup - The Benefits of a Partnership with the FBI

Eric Shiffman headshot

Eric Shiffman

Supervisory Special Agent

Federal Bureau of Investigation

Erik Hart headshot

Erik Hart

CISO

Cushman & Wakefield

Jay Patel headshot

Jay Patel

Special Agent

Federal Bureau of Investigation

Tricia Maier headshot

Tricia Maier

Chief Division Counsel

Federal Bureau of Investigation

After an attack on your organization, you might be more concerned with recovering your assets than nabbing the bad guy. So why call the FBI? Three Chicago-based agents say there are plenty of reasons.

Join our opening keynote to:

  • Ask federal investigators your questions about today's threat climate
  • Gain advice on when and how best you can utilize the Bureau's resources
  • Learn why investigators say crypto, notification requirements and legal compliance are top of mind

9:00am - 9:30am  Networking Break

9:30am - 10:15am  Breakout Session

Going Passwordless —The Future of Access Management

Raj Galagali headshot

Raj Galagali

Vice President, Solutions Engineering, Transmit Security

Transmit Security

Thanks to bots and automated tools capable of testing thousands of logins per second, bad actors today leverage harvested credentials at scale; resulting in a quietly-collected $16B a year. It's time to stop them in their tracks.

This session covers how to:

  • Eliminate passwords from every step of customer authentication
  • Implement passwordless without creating silos and security gaps
  • Solve complex challenges to secure all customer scenarios and journeys


9:30am - 10:15am  Breakout Session

Fire Away – CIO Office Hours

Julie Devine headshot

Julie Devine

CIO

Medulla

Tom Kirkham headshot

Tom Kirkham

CIO

Primient

 Have you ever wished you could pop into your CIO's mind and instantly understand how they approach important topics and decisions? Now is your chance to anonymously pose questions to a CIO who will pull back the curtain on their thought process and share candid context for why and how they make certain choices.

The questions in this session will be decided by the audience and will touch on themes such as:

  • Building relationships across the C-Suite, with stakeholders and within the enterprise
  • Pursuing innovation while keeping the lights on
  • What’s next for the role of CIO and CISO

9:30am - 10:15am  Executive Boardroom

Securing Sprawl – Mitigating Risk

Karl Mattson headshot

Karl Mattson

CISO

Noname Security

Michelle Ayala headshot

Michelle Ayala

Director IT Security

Green Thumb

Waqas Akkawi headshot

Waqas Akkawi

VP, CISO

SIRVA Worldwide

As business and technology teams drive cloud adoption and implement modern application architectures, the security vulnerabilities of the sprawling IT stack multiply as visibility dwindles. Now is the time to explore new applications and API security strategies to proactively reduce risk, secure the environment, and capitalize on cloud-native capabilities to meet these challenges.

Join this boardroom to discuss:

  • Establishing effective vulnerability management and application security programs
  • Moving from a reactive to a proactive security posture
  • API governance and security challenges and opportunities

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).

To reserve your seat, please contact: Channelle Lawrence at chanelle.lawrence@evanta.com

9:30am - 10:15am  Executive Boardroom

Future Challenges⁠ — Security, Transformation, Hybrid and More

Wayne Geils headshot

Wayne Geils

Director, Technical Integrations

Appgate

Joe Puissant headshot

Joe Puissant

Cyber Security Manager | Product & Service Management, Global Lead

Bosch

Matthew Zielinski headshot

Matthew Zielinski

Director of Information Security (CISO)

Vivid Seats

Enterprises are forced to adopt wildly different logistical solutions while providing protection against ever-emerging threats. With greater reliance on the Cloud in 2022 and beyond, it’s time to improve efficiencies while still mitigating risks and protect  ALL environments. Not just cloud transformation, but hybrid, multi-cloud, and on-prem. 

Join this roundtable discussion to learn about: 

  • Improving processes and efficiencies 
  • Extending protections to all workloads
  • Analyzing tools, strategies, and technologies available

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).

To reserve your seat, please contact: Chanelle Lawrence |  chanelle.lawrence@evanta.com

10:15am - 10:45am  Networking Break

10:20am - 10:45am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

10:45am - 11:30am  Breakout Session

Third-Party Cyber Risk — Zero-Day Findings and Mitigation

Joel Molinoff headshot

Joel Molinoff

Vice Chairman

BlueVoyant

Managing distributed risk is today’s defining cybersecurity challenge. Mitigation of zero-day vulnerabilities is critical as adversaries exploit supply chain entities. This session explores how to identify all third parties impacted by zero-day vulnerabilities and guide their mitigation efforts. Your vendor, supplier, and partner ecosystem is now your enterprise attack surface.

Join this session to learn:

  • How to manage distributed risk associated with hundreds and even thousands of vendors, suppliers, and partners
  • Approaches to identify, prioritize, and mitigate active threats and critical/zero-day vulnerabilities
  • Strategies to reduce supply chain/external ecosystem risk associated with zero-day

10:45am - 11:30am  Breakout Session

Zero Fluff – A Real, Helpful, Zero Trust Success Story

Mike Zachman headshot

Mike Zachman

VP & Chief Security Officer

Zebra Technologies

Colin Chisholm headshot

Colin Chisholm

Sr Manager, Information Security Management

Zebra Technologies

Racing to keep up with Zebra’s moving to the cloud, Mike Zachman, VP & Chief Security Officer, Zebra Technologies made selecting and deploying a Zero Trust/SASE platform a top priority. Gone were the days of Zero Trust theory or pontification. It was time for action. Multiple platform evaluations and 70+ use cases later, his team delivered and selected a final platform. Now, it’s time for you to benefit from his trials.

Join Mike Zachman and his team for:

  • A boots-on-the-ground presentation about Zero Trust goals and successes
  • Practical takeaways and lessons tested by the team at Zebra
  • A glimpse at multiple methods and a spotlight on discovered best practices

10:45am - 11:30am  Executive Boardroom

Beyond Initial Intrusion – Combating Advanced Threats on the Network

Keith Dillon headshot

Keith Dillon

Area Vice President

ExtraHop

Jesse Magenheimer headshot

Jesse Magenheimer

Vice President & CISO

State Farm

Steven McLean headshot

Steven McLean

Senior Manager, Information Security

Ortho Clinical Diagnostics

Based on Gartner research, 75 percent of cybersecurity budgets go to preventing initial intrusion and only 25 percent on detection and mitigation. However, the real damage to the enterprise happens once the attacker is already inside the network, working their way toward carrying out a costly breach or extortion.

Join this session to discuss:

  • Key areas to reduce cyber risk and build resilience
  • The advanced attack techniques that bad actors are forced to rely on and how to spot them
  • Strategies to increase the speed of detection and mitigation

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).

To reserve your seat, please contact: Chanelle Lawrence at chanelle.lawrence@evanta.com

10:45am - 11:30am  Executive Boardroom

Ransomware — Covering the Attack Surface

Jeff Trower headshot

Jeff Trower

Principal Product Manager

CrowdStrike

Michael Boucher headshot

Michael Boucher

CISO, Americas

JLL

Diane Brown headshot

Diane Brown

VP, IT Risk Management

Ulta Beauty

Cybersecurity is no longer a nice to have, it’s a front line defense that protects organizations from targeted attacks and sophisticated threat actors. Security leaders must always be one step ahead and deliver effective cybersecurity through active prevention and defense. How can CISOs mitigate threats against the attack surface, whilst providing the business and technical outcomes to both stay secure and advance business objectives?

Join this boardroom to discuss:

  • Leveraging proprietary data, analytics and technology to prevent attacks

  • Implementing proactive defense for businesses of all sizes to mitigate today’s threats

  • Pressure-testing your incident response plan and playbooks

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).

To reserve your seat, please contact: 

Chanelle at chanelle.lawrence@evanta.com

11:30am - 11:40am  Break

May 24, 2022 - mid-afternoon

11:30am - 12:30pm  Lunch Service

12:30pm - 1:05pm  Keynote

Three Keys To Zero Trust — Isolation, People, and Productivity

Stephen Pieraldi headshot

Stephen Pieraldi

Distinguished Technologist, Security Architect

HP Inc.

How can CISOs adapt and enable business agility without compromising security? In the wake of widespread cloud adoption and ubiquitous remote workers, traditional network and security systems have failed to keep pace. Patch management and user productivity are two critical gaps CISOs must solve, but with such complexity, solutions can be challenging to find.  

Join this discussion to learn how others are taking a Zero Trust approach to:

  • Layered and diverse strategies that are critical in today’s market
  • The latest landscape for Zero Trust and identity governance best practices and challenges
  • Strategic considerations for securing remote work

1:05pm - 1:20pm  Break

1:20pm - 2:05pm  Breakout Session

What Are We Doing? ⁠— The Current and Future Cyber Insurance Climate

Victor Hsiang headshot

Victor Hsiang

Information Security Director

GATX

Mike Fitzpatrick headshot

Mike Fitzpatrick

Senior Director, Corporate Insurance

GATX

David Wasson headshot

David Wasson

Vice President, Professional and Cyber Practice Leader

Brown & Brown Insurance

 The Cyber insurance application process is taking longer and has become more complicated in the last few years. Premiums are rising. Leaders from organizations big and small are questioning the value of Cyber insurance. Don’t struggle alone. Now's your chance to field your questions with a practicing insurance broker, and the executives with whom he partners.

Join this session for:

  • Different perspectives on the changing cyber insurance industry
  • A chance to troubleshoot your cyber insurance concerns
  • Open conversations about the struggles and benefits of investing in cyber insurance


1:20pm - 2:05pm  Breakout Session

Security is a Team Sport

Shamla Naidoo headshot

Shamla Naidoo

Head of Cloud Strategy & Innovation

Netskope

Mahmood Khan headshot

Mahmood Khan

SVP & Global CISO

CNA

Building trust and reliance across technology and security teams is key to defending the enterprise. As security stacks incorporate Security Service Edge (SSE) to sustain the SASE journey, the partnership between CIOs, CISOs, and their teams is more important than ever.

Join this session to learn about:

  • Best practices for IT and security collaboration
  • Communicating the importance of SSE to your CEO and Board
  • Improving internal stakeholder relationships to fuel business outcomes

1:20pm - 2:05pm  Executive Boardroom

The Art of Communicating Risk to the Business

Gaurav Kulkarni headshot

Gaurav Kulkarni

VP of Solutions Architecture

ReliaQuest

Bill Podborny headshot

Bill Podborny

CISO

Constellation Brands

Scott Barnes headshot

Scott Barnes

Director, Enterprise Cyber Security

Fortune Brands Home & Security

To quantify how they are reducing risk for the business and where to strategically invest, security leaders need effective, actionable metrics. These measures are essential to communicating effectively with the Board and other executive stakeholders.

Join this roundtable discussion to gain insight into how your peers are:

  • Making informed investment decisions
  • Communicating risk to the business at large
  •  Using data to tell a story to non-technical audiences

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).

To reserve your seat, please contact: 

Chanelle Lawrence | chanelle.lawrence@evanta.com

1:20pm - 2:05pm  Executive Boardroom

Threat Management – Visibility Detection and Response Across Dispersed Environments

Alden Hutchison headshot

Alden Hutchison

Partner, Security Services

IBM

Ricardo Lafosse headshot

Ricardo Lafosse

Chief Information Security Officer

The Kraft Heinz Company

Sarah Buerger headshot

Sarah Buerger

Director, IT Security

Coyote Logistics

Many organizations are implementing their security program across a widely distributed infrastructure and often share responsibility of critical aspects with their service providers. So how can they best gain visibility into that environment, detect malicious activity, and orchestrate effective, business-wide responses?

Join this interactive roundtable to discuss:

  • Key industry advances in open interconnectivity of tools and data sources
  • Strategies for orchestrating teams and technologies throughout the threat management process
  • Improving the efficiency and effectiveness of security analysts

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).

To reserve your seat, please contact: 

Chanelle Lawrence at chanelle.lawrence@evanta.com

May 24, 2022 - afternoon

2:05pm - 2:35pm  Networking Break

2:10pm - 2:35pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

2:35pm - 3:20pm  Breakout Session

From the Front Lines – The Ransomware Defense Strategies that Worked

Oren Wortman headshot

Oren Wortman

VP Cyber Security Services, NA

Sygnia

Yotam Meitar headshot

Yotam Meitar

Incident Response Manager

Sygnia

Over the past year, we partnered with more than 100 organizations to defeat ransomware attacks. Join our session to find out what strategies worked for these CISOs, and how you can build on their experience to secure your network. Ransomware attacks have evolved, but if you identify the threat early-on, technologies already in place can eliminate it with no need for additional spend.

Join us and discover:

  • Real-world case study: The anatomy of a heavyweight ransomware attack
  • Key pitfalls commonly overlooked by security teams
  • Quick wins for preventing ransomware attacks without investing in additional technologies

2:35pm - 3:20pm  Breakout Session

Leader-Level Investment, Team-Level Buy In

JJ Markee headshot

JJ Markee

Chief Information Security Officer

Baxter

Nitin Raina headshot

Nitin Raina

VP - Cyber & Information Security

ThoughtWorks

It’s no longer enough to manage your team and hope they stick around. Instead, long-term retention calls for a plan. Now, in this era of labor uncertainty, it’s more important than ever to come together and share what’s working.

Together, we’ll figure out:

  • How CISOs are encouraging their teams and retaining their rosters
  • What many are noticing to be the red flags of security burnout
  • Retention practices you can immediately implement to maintain your camp

2:35pm - 3:20pm  Executive Boardroom

Ahead of the Cloud — Flexible Solutions for a Moving Target

Shashank Kapoor headshot

Shashank Kapoor

CISO

Truckstop.com

Jason Mical headshot

Jason Mical

Field Chief Technology Officer - Americas

Rapid7

Shane Hibbard headshot

Shane Hibbard

Director of Information Security

Invenergy

Sometimes, cloud can seem like a "one size fits none" type of hurdle. One thing is certain, however — as the cloud landscape continues to evolve, so too should a CISO's security strategies.

Join this boardroom to:

  • Gather practical takeaways and cloud solutions from your peers
  • Explore solutions to current and future cloud security issues
  • Gain feedback on your organization's cloud priorities

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).

To reserve your seat, please contact: 

Chanelle Lawrence | chanelle.lawrence@evanta.com

2:35pm - 3:20pm  Executive Boardroom

Modernizing Advanced Threats Through Automation

Andrew Bryan headshot

Andrew Bryan

Head of Field Engineering, Hunters.ai

Hunters.ai

Brian Ekkebus headshot

Brian Ekkebus

CISO

USG

Frank Yanan headshot

Frank Yanan

SVP / Business Information Security Officer

Bank of America

Between skills shortages and the escalating sophistication of threats, security teams are looking beyond SIEM to overcome data volume, complexity, and false positives. CISOs need new approaches to data ingestion and retention, and automation of threat detection/response for increased SOC efficiencies. Join this session to discuss:

  • How SOCs are leveraging automation to improve their threat detection, and incident response practices
  • How to cover the entire attack surface at a predictable, manageable cost for better security outcomes 
  • Ways to incorporate MITRE-ATT&CK and MITRE-D3FEND framework into threat detection and response

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).

To reserve your seat, please contact: 

Chanelle Lawrence | chanelle.lawrence@evanta.com

3:20pm - 3:35pm  Networking Break

3:35pm - 4:10pm  Keynote

Creating and Jumpstarting an Inclusive Culture

Keith Wyche headshot

Keith Wyche

Vice President, Community Engagement and Support

Walmart

 In the wake of major social and political change over the past decade, employers large and small alike have taken steps to increase diversity, equity, and inclusion. Yet despite growing pressure and awareness, progress is slow and most corporate DE&I initiatives are not yet achieving the desired results. With so many steps forward, how come representation still is not where it needs to be at senior levels for almost every diverse group?

Join this session to learn more as Keith Wyche:

  • Provides real, actionable steps for those who are serious about DE&I, and looking for solutions to improve the experience of Black and other underrepresented groups, colleagues and leaders within the organization 
  • Shares a collection of best practices backed by research and strategies
  • Provides a roadmap for leaders to create breakthrough change that explores meaningful topics

4:10pm - 4:40pm  Closing Reception & Prize Drawing

REGISTER

We look forward to seeing you at an upcoming in-person gathering


Evanta programs are uniquely positioned to succeed in the current landscape.

  • Our invitation-only gatherings are designed to be smaller in scale, providing a safe and comfortable environment.
  • All in-person programs are local and complimentary, with zero impact on your organization’s T&E.

We are committed to creating the safest possible environment for all participants, partners, and associates. As a part of our commitment we will continue to monitor and adhere to government, venue, and health agency guidelines. Information on vaccinations, face mask guidance, on-site safety measures, and more, can be found here: Health and Safety Resource Policy.

Location


MORE INFORMATION

A block of rooms has been reserved at the Chicago Marriott Downtown Magnificent Mile at a reduced conference rate. Reservations should be made online or by calling 1-877-303-0104.

Deadline to book using the discounted room rate of $309 USD (plus tax) is May 3, 2022.

Your Community Partners


Global Thought Leader
CISO Thought Leaders
Program Partners

Chicago CISO Program Manager


For inquiries related to this event, please reach out to your dedicated program contact.

Chanelle Lawrence

Senior Program Manager

9712822228

chanelle.lawrence@evanta.com