
Detroit CISO Executive Summit
November 12, 2019 | The Westin Book Cadillac Detroit
November 12, 2019
The Westin Book Cadillac Detroit
Collaborate with your peers
Get together with your peers to tackle top business challenges through peer-driven content and discussions at the Detroit CISO Executive Summit.
Join your peers to discuss the most critical issues impacting CISOs today:
Strategies for a risk-aligned, resilient organization
Developing and investing in the security workforce of tomorrow
Creating business value and supporting agile business operations
Detroit CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.
Governing Body Co-Chairs

Martin Bally
American Axle Manufacturing
CISO
Derek Benz
Ford Motor Company
CISO

Brent Cieszynski
Blue Cross Blue Shield of Michigan
VP & CISO

Earl Duby
Lear Corporation
VP & CISO

Russ Gordon
BorgWarner
CISO

Mauricio Guerra
Dow
CISO & Director, Global Information Security

Fred Killeen
General Motors
CISO
Tabice Ward
DTE
Director & CISO
Erik Wille
Penske Automotive
Head of Information Security
Agenda
November 12, 2019
6:30am - 7:30am Networking Break
7:00am - 7:45am Registration & Breakfast
7:45am - 8:00am Opening Comments
8:00am - 8:30am Keynote
Preparing for Tomorrow’s Big Security Trends

Martin Bally
CISO
American Axle Manufacturing

Bridget Kravchenko
CISO
Meritor
Angela Williams
Director of Enterprise Information Security
Blue Cross BlueShield of Michigan

Russ Gordon
CISO
BorgWarner
With 2019 drawing to a close, it is time for CISOs to start preparing for what coming in 2020. However, the future threat landscape is as difficult to predict as a cyber-attack. Join this panel of your peers as they dive into security trends to expect in the new year.
In this keynote, you will explore:
- Lessons learned in 2019
- Strategies to protect against the evolving security landscape
- Key insights into future cyber trends
8:30am - 9:00am Networking Break
9:00am - 9:50am Breakout Session
Expanding the Talent Pipeline
Tabice Ward
Director & CISO
DTE
Angela Williams
Director of Enterprise Information Security
Blue Cross BlueShield of Michigan
Growing the security talent pool will require CISOs to get creative in how they develop and deploy talent. In this interactive session, you will:
- Hear from member of the community who is working to solve the gap
- Brainstorm recruitment and retention strategies
- Determine strategies to connect organizations to the talent pipeline
9:00am - 9:50am Breakout Session
Prepare for a Major Cyber Attack
Drake Sadler
Director, Global IT Security
DexKo Global
Most CISOs feel comfortable managing the minor security incidents with standardized processes, but what about major incidents that shake the very foundation of your organization like the NotPETYA attack? Such crises can be career changing.
Join this workshop to:
- Learn the basic building blocks of effective cybersecurity crisis response
- Share challenges and best practices in managing major security events
- Benchmark against your peers and identify lessons learned
9:00am - 9:50am Executive Boardroom
Cyber-Risk Management — New Approaches for Reducing Your Cyber-Exposure
Hosted by Tenable
John Beeskow
CISO
Chemical Bank

Pamela Hensley
Director, Information Security
AAA Life Insurance
Keith Textor
VP, Global Professional Services
Tenable
When it comes to reducing cyber exposure, overcoming vulnerability overload is critical. Find out how to improve your vulnerability management efforts so you can close your cyber exposure gap and focus on what matters most to your business.
During this peer discussion, you will explore how to:
- Translate raw vulnerability and threat intelligence data into business insights
- Benchmark your organization’s cyber exposure to guide decision making
- Use threat intelligence to move the most dangerous vulnerabilities up your priority list
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact Kenzie Howard at Kenzie.Howard@evanta.com or 971-978-5041.
9:50am - 10:20am Networking Break
10:20am - 11:10am Breakout Session
Digital Risk Explosion — Managing Risk in a Hyper-Outsourcing World
Hosted by RiskRecon
Peter Kobs
EVP
RiskRecon
Digital transformation has dramatically transformed the enterprise risk surface, automating a vast array of processes while outsourcing a vast array of systems and services. Through this frenetic reshaping, few organizations truly understand the nature of their new risk reality and how to successfully manage it.
In this interactive discussion we will:
- Explore the true nature of the enterprise cyber risk surface
- Discuss threats and regulations driving organizations to better manage their extended enterprise
- Share insights on how to better manage third-party risk (hint: good data!)
10:20am - 11:10am Breakout Session
Secure Product Design Lifecycle for Connected Vehicles
Hosted by Cybereason
Lisa Boran
Manager, Vehicle Cybersecurity
Ford
As vehicles continue to evolve the benefits of increased automation and connectivity are plentiful. Nevertheless, these new conveniences and performance technologies come with new risk and attack surfaces. Join, Lisa Boran as she explores cybersecurity implications that are associated with connected vehicles, specifically:
- The importance of automotive cybersecurity
- Approaches the automotive industry is taking to ensure security
- Regulatory requirements that are on the horizon
10:20am - 11:10am Executive Boardroom
Data Governance and Unstructured Data Security and Privacy
Hosted by Fasoo

Travis Bray
Director, Global Information Security
Magna Powertrain Inc.

Daren Fairfield
CISO
Whirlpool Corporation
John Herring
CEO
Fasoo
Organizations are challenged with how to implement data governance security and privacy requirements across their growing inventory of unprotected unstructured data. Unstructured data in the form of sensitive documents including intellectual property and PII is the “wild west” of data security and privacy as it travels freely internal and external to the organization. In this boardroom, get answers to the most pressing questions, including:
- How to gain visibility into high risk areas?
- What controls and policies should be in place to protect unstructured information assets while maintaining compliance?
- What emerging methods, strategies and best practices for unstructured data security and privacy exist?
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact Kenzie Howard at Kenzie.Howard@evanta.com or 971-978-5041.
11:10am - 11:40am Networking Break
November 12, 2019
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.