IN-PERSON

Ohio CISO Executive Summit

May 16, 2024 | Duke Energy Convention Center

May 16, 2024
Duke Energy Convention Center

APPLY TO PARTICIPATE

Collaborate with your peers

Get together with Ohio's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Expanding Digital Business and Increasing Maturity with Data and Analytics

Innovating for Competitive Advantage in Security

Using AI to Improve Processes and Efficiencies While Keeping Up With the Changing Landscape

Ohio CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Michael Erickson

Baptist Health
CISO

Lisa Heckler

CareSource
CISO

Ryan Kean

Total Quality Logistics
CIO

Phani Konduru

BrightSpring Health Services
Chief Digital & Technology Officer

Bob Schuetter

Ashland
CISO

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Ohio CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


May 15, 2024

May 16, 2024

6:00pm - 8:30pm  Networking

Governing Body Welcome Reception

Join us for an evening of networking and beer tasting at Rhinegeist Brewery (1910 Elm St, Cincinnati, OH 45202).

7:45am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

Adopting a Growth Mindset and Boosting Resilience

Daniel Bull headshot

Daniel Bull

World Record-Breaking Adventurer

Guest Speaker

At the very top of the world, as in the business world, constant change means we’re all navigating new terrain. Come together and bounce back from the greatest disruptive event of our generation, while being inspired by 3x world record-breaking adventurer Daniel Bull. He shares powerful and practical strategies learnt from Everest to Antarctica and beyond while empowering you to defy limits, grasp opportunities, and conquer your own mountains – in work and in life.

Daniel will share:

  • Proven strategies for dealing with unrelenting change
  • Powerful insights on courageous leadership in the face of ongoing uncertainty
  • What it takes to reach the top – adopting a growth mindset and boosting resilience despite epic challenges

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Defining Enterprise-wide IT and Security Strategy

Tom Dager headshot

Tom Dager

CISO

ADM

Dawn Paquette headshot

Dawn Paquette

CIO

GE Aerospace

CIOs and CISOs can increase the value of IT and security through operating model changes and creating business alignment efficiencies. By working collaboratively with business units, leaders can prioritize technology needs and invest in capabilities to achieve efficiencies in aligning with the business.

Join this fireside chat as they discuss:

  • Building an IT and security strategy closely aligned with the business strategy
  • Driving operational change with strategic change management
  • Attaining efficiencies with a consistent approach to processes

9:40am - 10:25am  Executive Boardroom

Securing the Everywhere World — Building Cyber Resilience through a “Connectivity Cloud”

John Engates headshot

John Engates

Field CTO

Cloudflare

Lisa Heckler headshot

Lisa Heckler

CISO

CareSource

When users are everywhere and digital operations span cloud, SaaS, and on-premises environments, achieving cyber resilience becomes paramount. The challenge lies in navigating this complexity and maintaining visibility and control to ensure continuous operation despite cyber threats.

Join this interactive roundtable to discuss:

  • Optimizing costs and improving security across diverse cloud environments
  • Adopting Zero Trust philosophies to protect users, data, and applications
  • Innovating with AI while addressing global regulatory and data privacy requirements

9:40am - 10:25am  Executive Boardroom

User Access – Leveraging the Right Technologies

Michael Haas headshot

Michael Haas

CISO

The Kroger Co.

The path to a stronger IAM strategy lies within an agile digital system. CISOs are often challenged with keeping an entire company up to date, as well as identity-related breaches and core business operations being interrupted - but easy to use technology (when leveraged correctly) can be a game changer.

Join this boardroom to discuss:

  • What the essentials are for building an efficient IAM system
  • The challenges faced when protecting remote workers’ environments
  • Optimizing user experience when adopting a user access program

10:25am - 11:05am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:05am - 11:50am  Breakout Session

Which Side are You On?

Brian Klenke headshot

Brian Klenke

CISO

Bath & Body Works

Join a friendly discussion and debate with peers to challenge your ideas on cloud and security ease of access. Explore the concept of polarity and determine if you can have the best of both worlds.

Join this session to:

  • Build community through interactivity
  • Expand your thinking on polarizing topics
  • Understand the journey your peers are on

11:05am - 11:50am  Executive Boardroom

Optimize Application Rationalization to Reduce Cost

Mark Carney headshot

Mark Carney

Information Security Leader

State Auto Insurance Companies

CIOs & CISOs are balancing an ever-increasing number of service providers which requires a strong vendor and application rationalization integrated into strategic decision-making. In order to allocate more funds towards innovation and differentiation initiatives, mission-critical systems need to be optimized, cost effective, and flexible.

Join this session to discuss:

  • Incorporate effective contract management
  • Strategies to avoid vendor lock-in
  • Financially optimizing the vendor portfolio

11:05am - 11:50am  Executive Boardroom

Communicating and Measuring Cyber Risk More Effectively

Matt King headshot

Matt King

VP of Global IT Security, CISO

Belcan

In today’s environment, it is even more challenging for security leaders to communicate and measure their cyber risk and program to their executive board. Being fully transparent about an organization’s weaknesses, strengths, and investments as it relates to cyber risk can be an uncomfortable conversation to have, but it is essential to the overall health of the business. 

Join this session to learn:

  • Metrics that quantify challenges & risks
  • How to create trust with dialogue delivery and engage leadership with non-security terms
  • Using data to communicate and explain the risks and how to best leverage this data

11:50am - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

Optimizing for Agility – Network and Security Convergence

Mike Anderson headshot

Mike Anderson

Chief Digital & Information Officer

Netskope

Integrating a complex ecosystem across all security areas can optimize defenses without simplifying adversaries’ challenges. This approach balances robust security with efficiency, crucial for navigating generative AI and tech advancements. Achieving this requires strategic selection and consolidation of platforms to enhance agility, reduce risk, and maintain cost-effectiveness.

In this session, you’ll learn:

  • The composition of an effective security architecture
  • Value you can derive from a converged networking and security platform
  • Common consolidation mistakes people make and how to avoid them

1:10pm - 1:35pm  Break

1:35pm - 2:20pm  Breakout Session

Uplevel Your Board Pitch - An Interactive Session

Jigar Kadakia headshot

Jigar Kadakia

CISO

Emory Healthcare

Pitching to the board is a skill that must be mastered. Technology and security leaders are tasked to use visuals, communicate business value and synthesize complex information in a way that makes sense — often with limited time. Join this interactive session to identify the holes in your board pitch—and improve them for the next time you’re in the hot seat. 

Bring your board pitches and join this interactive session to:

  • Analyze different styles of board communication
  • Receive real-time feedback on your pitch
  • Learn best practices and strategies for communicating with your board

1:35pm - 2:20pm  Executive Boardroom

Managing OT to Fully Secure the Business

Suresh Manchella headshot

Suresh Manchella

VP & CISO

Hillenbrand

Jonathan Phillips headshot

Jonathan Phillips

CISO

Klöckner Pentaplast

For most organizations, the number of connected, essential devices is growing by the second. In response, the CISO's jurisdiction is changing just as rapidly. Now, in the case of any security issue, the rest of the C-suite may be looking to you for answers.

Join this session and start understanding:

  • Your new or growing operational technology responsibilities
  • What you can do to smoothly plot and control your OT workload
  • How you can best juggle IT and OT security simultaneously

1:35pm - 2:20pm  Executive Boardroom

Connecting Business, Data and Technology

Katrina Biscay headshot

Katrina Biscay

CISO

University of Cincinnati

Debi Brobst headshot

Debi Brobst

CIO, Acute/Ambulatory

ProMedica

According to Gartner, the challenge for many IT and business leaders today is to instill a culture of data-driven decision making across the organization. Those who want to exploit the potential of new data and advanced analytics capabilities at scale typically face numerous challenges. 

Join this session to discuss:

  • Discuss best practices for designing data and analytics programs
  • Identify and define quick-win opportunities supporting the business data strategy
  • Brainstorm technology and resource alignment 

2:20pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:35pm  Keynote

Balancing the Risk Versus Reward of AI

Matt Hough headshot

Matt Hough

VP & CIO

Cintas

Bob Schuetter headshot

Bob Schuetter

CISO

Ashland

The hype around generative AI has been focused on opportunities and concerns. Technology executives are now looking to take the conversation a step further to discuss specific use cases and how organizations are using AI as a driver of innovation. With the ease of access, companies are hurrying to implement policies and are working cross-functionally with peers to figure out how AI can address business needs.

During this keynote, speakers will discuss:

  • Practical AI use cases
  • Strategies for creating governance and policies around AI
  • How companies are keeping up with the changing AI landscape

3:35pm - 4:00pm  Closing Reception & Prize Drawing

6:00pm - 8:30pm  Networking

Governing Body Welcome Reception

Join us for an evening of networking and beer tasting at Rhinegeist Brewery (1910 Elm St, Cincinnati, OH 45202).

7:45am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

Adopting a Growth Mindset and Boosting Resilience

Daniel Bull headshot

Daniel Bull

World Record-Breaking Adventurer

Guest Speaker

At the very top of the world, as in the business world, constant change means we’re all navigating new terrain. Come together and bounce back from the greatest disruptive event of our generation, while being inspired by 3x world record-breaking adventurer Daniel Bull. He shares powerful and practical strategies learnt from Everest to Antarctica and beyond while empowering you to defy limits, grasp opportunities, and conquer your own mountains – in work and in life.

Daniel will share:

  • Proven strategies for dealing with unrelenting change
  • Powerful insights on courageous leadership in the face of ongoing uncertainty
  • What it takes to reach the top – adopting a growth mindset and boosting resilience despite epic challenges

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Defining Enterprise-wide IT and Security Strategy

Tom Dager headshot

Tom Dager

CISO

ADM

Dawn Paquette headshot

Dawn Paquette

CIO

GE Aerospace

CIOs and CISOs can increase the value of IT and security through operating model changes and creating business alignment efficiencies. By working collaboratively with business units, leaders can prioritize technology needs and invest in capabilities to achieve efficiencies in aligning with the business.

Join this fireside chat as they discuss:

  • Building an IT and security strategy closely aligned with the business strategy
  • Driving operational change with strategic change management
  • Attaining efficiencies with a consistent approach to processes

9:40am - 10:25am  Executive Boardroom

Securing the Everywhere World — Building Cyber Resilience through a “Connectivity Cloud”

John Engates headshot

John Engates

Field CTO

Cloudflare

Lisa Heckler headshot

Lisa Heckler

CISO

CareSource

When users are everywhere and digital operations span cloud, SaaS, and on-premises environments, achieving cyber resilience becomes paramount. The challenge lies in navigating this complexity and maintaining visibility and control to ensure continuous operation despite cyber threats.

Join this interactive roundtable to discuss:

  • Optimizing costs and improving security across diverse cloud environments
  • Adopting Zero Trust philosophies to protect users, data, and applications
  • Innovating with AI while addressing global regulatory and data privacy requirements

9:40am - 10:25am  Executive Boardroom

User Access – Leveraging the Right Technologies

Michael Haas headshot

Michael Haas

CISO

The Kroger Co.

The path to a stronger IAM strategy lies within an agile digital system. CISOs are often challenged with keeping an entire company up to date, as well as identity-related breaches and core business operations being interrupted - but easy to use technology (when leveraged correctly) can be a game changer.

Join this boardroom to discuss:

  • What the essentials are for building an efficient IAM system
  • The challenges faced when protecting remote workers’ environments
  • Optimizing user experience when adopting a user access program

10:25am - 11:05am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:05am - 11:50am  Breakout Session

Which Side are You On?

Brian Klenke headshot

Brian Klenke

CISO

Bath & Body Works

Join a friendly discussion and debate with peers to challenge your ideas on cloud and security ease of access. Explore the concept of polarity and determine if you can have the best of both worlds.

Join this session to:

  • Build community through interactivity
  • Expand your thinking on polarizing topics
  • Understand the journey your peers are on

11:05am - 11:50am  Executive Boardroom

Optimize Application Rationalization to Reduce Cost

Mark Carney headshot

Mark Carney

Information Security Leader

State Auto Insurance Companies

CIOs & CISOs are balancing an ever-increasing number of service providers which requires a strong vendor and application rationalization integrated into strategic decision-making. In order to allocate more funds towards innovation and differentiation initiatives, mission-critical systems need to be optimized, cost effective, and flexible.

Join this session to discuss:

  • Incorporate effective contract management
  • Strategies to avoid vendor lock-in
  • Financially optimizing the vendor portfolio

11:05am - 11:50am  Executive Boardroom

Communicating and Measuring Cyber Risk More Effectively

Matt King headshot

Matt King

VP of Global IT Security, CISO

Belcan

In today’s environment, it is even more challenging for security leaders to communicate and measure their cyber risk and program to their executive board. Being fully transparent about an organization’s weaknesses, strengths, and investments as it relates to cyber risk can be an uncomfortable conversation to have, but it is essential to the overall health of the business. 

Join this session to learn:

  • Metrics that quantify challenges & risks
  • How to create trust with dialogue delivery and engage leadership with non-security terms
  • Using data to communicate and explain the risks and how to best leverage this data

11:50am - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

Optimizing for Agility – Network and Security Convergence

Mike Anderson headshot

Mike Anderson

Chief Digital & Information Officer

Netskope

Integrating a complex ecosystem across all security areas can optimize defenses without simplifying adversaries’ challenges. This approach balances robust security with efficiency, crucial for navigating generative AI and tech advancements. Achieving this requires strategic selection and consolidation of platforms to enhance agility, reduce risk, and maintain cost-effectiveness.

In this session, you’ll learn:

  • The composition of an effective security architecture
  • Value you can derive from a converged networking and security platform
  • Common consolidation mistakes people make and how to avoid them

1:10pm - 1:35pm  Break

1:35pm - 2:20pm  Breakout Session

Uplevel Your Board Pitch - An Interactive Session

Jigar Kadakia headshot

Jigar Kadakia

CISO

Emory Healthcare

Pitching to the board is a skill that must be mastered. Technology and security leaders are tasked to use visuals, communicate business value and synthesize complex information in a way that makes sense — often with limited time. Join this interactive session to identify the holes in your board pitch—and improve them for the next time you’re in the hot seat. 

Bring your board pitches and join this interactive session to:

  • Analyze different styles of board communication
  • Receive real-time feedback on your pitch
  • Learn best practices and strategies for communicating with your board

1:35pm - 2:20pm  Executive Boardroom

Managing OT to Fully Secure the Business

Suresh Manchella headshot

Suresh Manchella

VP & CISO

Hillenbrand

Jonathan Phillips headshot

Jonathan Phillips

CISO

Klöckner Pentaplast

For most organizations, the number of connected, essential devices is growing by the second. In response, the CISO's jurisdiction is changing just as rapidly. Now, in the case of any security issue, the rest of the C-suite may be looking to you for answers.

Join this session and start understanding:

  • Your new or growing operational technology responsibilities
  • What you can do to smoothly plot and control your OT workload
  • How you can best juggle IT and OT security simultaneously

1:35pm - 2:20pm  Executive Boardroom

Connecting Business, Data and Technology

Katrina Biscay headshot

Katrina Biscay

CISO

University of Cincinnati

Debi Brobst headshot

Debi Brobst

CIO, Acute/Ambulatory

ProMedica

According to Gartner, the challenge for many IT and business leaders today is to instill a culture of data-driven decision making across the organization. Those who want to exploit the potential of new data and advanced analytics capabilities at scale typically face numerous challenges. 

Join this session to discuss:

  • Discuss best practices for designing data and analytics programs
  • Identify and define quick-win opportunities supporting the business data strategy
  • Brainstorm technology and resource alignment 

2:20pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:35pm  Keynote

Balancing the Risk Versus Reward of AI

Matt Hough headshot

Matt Hough

VP & CIO

Cintas

Bob Schuetter headshot

Bob Schuetter

CISO

Ashland

The hype around generative AI has been focused on opportunities and concerns. Technology executives are now looking to take the conversation a step further to discuss specific use cases and how organizations are using AI as a driver of innovation. With the ease of access, companies are hurrying to implement policies and are working cross-functionally with peers to figure out how AI can address business needs.

During this keynote, speakers will discuss:

  • Practical AI use cases
  • Strategies for creating governance and policies around AI
  • How companies are keeping up with the changing AI landscape

3:35pm - 4:00pm  Closing Reception & Prize Drawing

May 15, 2024

May 16, 2024

We look forward to seeing you at an upcoming in-person gathering


Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

Duke Energy Convention Center
MORE INFORMATION

Your Community Partners


CISO Thought Leader
Key Partners
Program Partner

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Samantha White

Community Program Manager

623-221-4103

samantha.white@evanta.com