Global CISO Executive Summit

October 12-14, 2022 | Waldorf Astoria Chicago

October 12-14, 2022
Waldorf Astoria Chicago


Collaborate with your Global peers

Get together with other CISOs who lead global operations at this exclusive, three-day summit. Engage in candid discussions, dive deep into critical issues and validate strategies with other enterprise heads of security on the challenges unique to large, complex organizations. Executives are assured a level of information exchange and interaction with true peers, along with discussion topics driven by Global CISOs, for Global CISOs.

Join your peers to discuss the most critical issues impacting CISOs today:

Leveraging technology and tools to drive greater cyber security efficiency on a global scale

Enabling collaboration between cross-functional teams to mitigate risk and build resilience

Evaluating, communicating and responding to evolving international threats

Global CISO Governing Body

The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.


Rich Agostino

SVP, Chief Information Security Officer

Sara Andrews

Global CISO

Derek Benz

Coca-Cola Company
Chief Information Security Officer

Tim Callahan

SVP, Global CISO

Darren Challey

Director - Director Security Operations and Technology (SOT) / Global Security Operations (GSO)

Juan Gomez-Sanchez

Whirlpool Corporation
Global CISO

Marcos Marrero

H.I.G. Capital
Chief Information Security Officer

Tim McKnight

Executive VP & Chief Security Officer

Marc Varner

Lowe's Companies
Corporate VP & CISO

Kylie Watson

Sumitomo Mitsui Banking Corporation

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Global CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.


October 12, 2022 - wednesday

10:00am - 3:00pm  Social Experience

Social Experience #1

Details coming soon!

10:00am - 3:00pm  Social Experience

Social Experience #2

Details coming soon!

10:00am - 3:00pm  Social Experience

Social Experience #3

Details coming soon1

3:00pm - 5:00pm  Break

5:00pm - 6:30pm  Keynote

CISO Series Podcast — Live Recording

David Spark headshot

David Spark


Guest Speaker

Are you ready for the live podcast that has spotlighted one of the most critical areas of InfoSec – relations between buyers and sellers of cybersecurity products? Join us as our host David Spark and special guests comment on hot cybersecurity issues, and listener questions, and play risk-based security games like "What's Worse?!"

7:00pm - 9:00pm  Governing Body Welcome Reception

Governing Body Welcome Reception

The Governing Body invites attendees to kick off the Global CISO Executive Summit with a welcome reception and night full of networking with peers. 

October 13, 2022 - thursday

6:30am - 8:15am  Registration & Breakfast

9:00am - 9:30am  Networking Break

9:05am - 9:25am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

9:30am - 10:15am  Breakout Session

Tales From the Log4j Trenches

Marc Varner headshot

Marc Varner

Corporate VP & CISO

Lowe's Companies

Join this breakout session to hear Marc Varner, Corporate VP & CISO, Lowe's Companies talk about his success story of navigating the Log4j incident and the lessons learned. 

9:30am - 10:15am  Executive Boardroom

A Global Shift Left in API Security

Karl Mattson headshot

Karl Mattson


Noname Security

Ken Athanasiou headshot

Ken Athanasiou

Chief Information Security Officer

VF Corp

As business and technology teams around the world drive cloud adoption and implement modern application architectures, the security vulnerabilities of the sprawling IT stack multiply as visibility dwindles. Now is the time to explore new applications and API security strategies to proactively reduce risk, secure the environment, and capitalize on cloud-native capabilities to meet these challenges for a global workforce.

Join this boardroom to discuss:

  • Managing the lifecycle of API risks
  • Defending against API attacks
  • Developer-led API security practices

9:30am - 10:15am  Executive Boardroom

Threat Management – Visibility Detection and Response Across Dispersed Environments

Jeff Greene headshot

Jeff Greene


International Paper

Chris Jacquet headshot

Chris Jacquet


Hertz Global

Many organizations are implementing their security program across a widely distributed infrastructure and often share responsibility of critical aspects with their service providers. So how can they best gain visibility into that environment, detect malicious activity, and orchestrate effective, business-wide responses?

 Join this interactive roundtable to discuss:

  • Key industry advances in open interconnectivity of tools and data sources
  • Strategies for orchestrating teams and technologies throughout the threat management process
  • Improving the efficiency and effectiveness of security analysts

10:15am - 10:30am  Networking Break

10:30am - 12:00pm  Innovation Spotlight

Innovation Spotlight - Ten Eleven Ventures

James Campbell headshot

James Campbell

CEO and Co-founder

Cado Security

Anusha Iyer headshot

Anusha Iyer

President/CTO and Co-Founder


Be among the first to see what’s new and next in the security solutions landscape. Three early-stage providers will get the chance to showcase their innovative solutions to the most pressing cybersecurity challenges.

The three providers you will hear from are: 

  • Cado Security
  • Noetic Cyber
  • Corsha

12:00pm - 12:30pm  Lunch & Comments

12:35pm - 1:05pm  Keynote

Lunch Keynote hosted by Zscaler

Jay Chaudhry headshot

Jay Chaudhry

CEO, Chairman & Founder


Session details coming soon!

1:05pm - 1:20pm  Networking Break

1:20pm - 2:05pm  Breakout Session

Optimizing the Workforce for Cyber Crisis Resilience — An Interactive Simulation

Paul Bentham headshot

Paul Bentham

Chief Product Officer

Immersive Labs

As we continue to evolve our corporate defenses, even the best crisis response plans struggle to account for the human element. The performance of your technology might be a known quantity, but what about your human capabilities? This interactive session will test organization-wide decision-making skills using a realistic cyber crisis.

Join this interactive session to:

  • Understand the business impact of technical choices, stakeholder management actions, and more
  • See real-time data on the effects of decisions on crisis management and response
  • Strengthen your organization's resilience at both the executive and technical levels

1:20pm - 2:05pm  Breakout Session

Cybersecurity in a Changing Geopolitical World

Franco Cappa headshot

Franco Cappa

Chief of Cybersecurity

Cybersecurity and Infrastructure Security Agency

Whether it’s cybercriminals motivated by profit or nation-state attackers with geopolitical motives, public and private organizations of all sizes have felt the impact of cyberattacks. Enterprise organizations are reeling from the onslaught of massively spread ransomware attacks to surgical pinpointed attacks on their assets from sophisticated state-sponsored actors. How can security leaders best face changing threat vectors?

Join Franco Cappa, Cybersecurity Advisor, Cybersecurity and Infrastructure Security Agency to discuss:

  • Understanding the adversary’s goals and objectives
  • How to build a more secure and resilient infrastructure through preparedness, incident response, and mitigation
  • What security executives can do to build resiliency

1:20pm - 2:05pm  Executive Boardroom

Sorting and Protecting New APIs in the Era of Public Cloud

Jonathan Trull headshot

Jonathan Trull



SaaS and public cloud services are driving a fundamental paradigm shift and a resulting API explosion. As we do our best to navigate this newly grown jungle of connectivity, it can be hard to notice system vulnerabilities.

Join this session learn:

  • Ways to manage and protect these seemingly endless connections
  • Best practices for distributing APIs through Cloud and SaaS
  • The public cloud transition process and why it does not necessarily mean starting over

1:20pm - 2:05pm  Executive Boardroom

It Starts With People – Combating Data Loss and Insider Risk

Brian Reed headshot

Brian Reed

Senior Director, Cybersecurity Strategy


Ricardo Lafosse headshot

Ricardo Lafosse

Chief Information Security Officer

The Kraft Heinz Company

Christopher Lukas headshot

Christopher Lukas



Christine Vanderpool headshot

Christine Vanderpool

Vice President & Chief Information Security Officer

Florida Crystals Corporation

Data doesn’t move itself. People—whether they are negligent, compromised or malicious—move data in secure and risky ways. The growth in remote work from anywhere and everywhere has redefined the global security perimeter and increased the risk of insider-led data loss for organizations. At the same time, the frequency and volume of insider threats keeps rising, placing a significant burden on security teams to keep pace. Where do you start to stop insider threats?

Join this session to discuss:

  • Moving beyond legacy data loss prevention approaches
  • Managing insider threats and risks in your organization
  • Increasing visibility across multiple channels to accelerate incident response

2:05pm - 2:35pm  Networking Break

2:10pm - 2:30pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

2:35pm - 3:20pm  Executive Boardroom

User Access — Leveraging the Right Technologies

Mahmood Khan headshot

Mahmood Khan

SVP & Global CISO


David Tyburski headshot

David Tyburski

Vice President, Chief Information Security Officer

Wynn Resorts

Michael Simmons headshot

Michael Simmons


Dick's Sporting Goods

The path to a stronger IAM strategy lies within an agile digital system. CISOs are often challenged with keeping an entire company up to date, as well as identity-related breaches and core business operations being interrupted - but easy to use technology (when leveraged correctly) can be a game changer.

Join this boardroom to discuss:

  • What the essentials are for building an efficient IAM system
  • The challenges faced when protecting a hybrid workforce environment
  • Readying your staff when adopting a user access program

3:20pm - 3:35pm  Networking Break

4:10pm - 4:30pm  Networking Break

4:30pm - 5:15pm  Executive Boardroom

Communicating Information Security Risk Simply and Effectively

Deneen DeFiore McGarvey headshot

Deneen DeFiore McGarvey


United Airlines

Ken Townsend headshot

Ken Townsend

Global CISO


Jesse Magenheimer headshot

Jesse Magenheimer

Vice President & CISO

State Farm

The topic of enterprise risk management presents a twofold problem: the calculation of the level of risk and effective communication to top management. CISOs must communicate an accurate risk assessment that is understood thoroughly by those with decision making power. Knowing how to describe information security risk to top management effectively is essential to aid decision-making and ensure an organization is secure.

Join this session to discuss:

  • Which metrics should be applied to communicate value to the board while strengthening your security program
  • How to clearly articulate risk across the organization in a manner that encourages others to act
  • Understanding how to effectively measure the metrics that matter

4:30pm - 5:15pm  Executive Boardroom

Taking Stock of the Acceleration to the Cloud

Deborah Wheeler headshot

Deborah Wheeler

Chief Information Security Officer

Delta Air Lines

Jesse Magenheimer headshot

Jesse Magenheimer

Vice President & CISO

State Farm

Eric Hussey headshot

Eric Hussey



Organizations have accelerated their cloud and digital transformation strategies over the past two years creating tremendous opportunity. The impact of this is still being felt, and it's important to take stock and assess where enterprises have found challenges and successes along the way. It is time to consider the influence of this acceleration, understand how CISOs are taking advantage of business evolution to better their cloud infrastructure and explore the impact of key tools and processes such as SOARs, security analytics and Zero Trust initiatives.

Join this boardroom session to discuss:

  • SOAR tools have increased efficiencies and quickened cloud adoption
  • Security analytics have evolved in tandem with the complexity of threats and challenges faced along the way
  • The Zero-Trust approach has become an essential foundation to organizations cloud security

4:30pm - 5:15pm  Executive Boardroom

Navigating the Third-Party Threat Landscape

Diego Souza headshot

Diego Souza

Global Chief Information Security Officer


Chris McFarland headshot

Chris McFarland

VP, Chief Information Security Officer

Abercrombie & Fitch

Dave Estlick headshot

Dave Estlick

Chief Information Security Officer

Chipotle Mexican Grill

Companies are increasingly dependent on vast networks of third parties which makes it difficult to monitor the level of exposure these risks pose to the organization. Perfect monitoring of all third parties, especially at global scale is impossible with limited resources. However, a proper third-party risk management program can be the life-saving measure your business needs when your partners are under attack.

Join this session to discuss:

  • Prioritizing your vendor inventory for assessment
  • Leveraging automation for calculating risk and streamlining the review process
  • Expanding third-party risk conversations beyond cybersecurity

5:15pm - 7:15pm  Break

7:15pm - 8:15pm  Dinner Service

8:30pm - 9:15pm  Keynote

Paving The Way for a Better Tomorrow

Easton LaChappelle headshot

Easton LaChappelle

CEO/ Founder at Unlimited Tomorrow, Inc.

Guest Speaker

At age 14, Easton LaChappelle created a robotic hand for a science fair that would go on to disrupt the prosthetics industry.  Now, his bionic arms are more technologically sophisticated than conventional prosthetics and cost a fraction of the price. LaChappelle will share insights into leveraging technology to make structural changes in the market.

Join this keynote to learn: 

  • Creating a systematic change that leads to a significant impact
  • Using technological advances to address gaps in the market and improve the lives of others
  • Setting the foundation for global change

9:15pm - 10:30pm  Social Hour

Cocktail Reception

details coming soon!

October 14, 2022 - friday

6:30am - 8:15am  Registration & Breakfast

8:30am - 9:00am  Keynote

Opening Comments & Keynote

details coming soon!

9:00am - 9:30am  Networking Break

9:30am - 10:15am  Breakout Session

Breakout Session

session details coming soon!

9:30am - 10:15am  Breakout Session

#EpicFail — A Ransomware Choose Your Own Adventure

Shawn Bowen headshot

Shawn Bowen

Vice President & Chief Information Security Officer

World Fuel Services

Brett Conlon headshot

Brett Conlon

Chief Information Security Officer

American Century Investments

Whether it comes from across the globe or down the street, the ever-looming threat of a ransomware attack is always in the back of the IT and security executive’s mind. Get your collaborative and creative juices flowing in this gamified choose your own adventure.

In this interactive session attendees will:

  • Collaborate to identify threat responses

  • Respond to choices and forces out of their control

  • Discuss pitfalls and best practices

10:15am - 10:45am  Networking Break

10:20am - 10:40am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

10:45am - 12:15pm  Innovation Spotlight

Innovation Spotlight - SYN Ventures

Be among the first to see what’s new and next in the security solutions landscape. Three early-stage providers will get the chance to showcase their innovative solutions to the most pressing cybersecurity challenges.

The three providers you will hear from are: 

  • Phosphorus Cybersecurity
  • Netography
  • Halcyon

12:15pm - 12:45pm  Lunch Service

12:45pm - 1:15pm  Keynote

The Will to Climb

Ed Viesturs headshot

Ed Viesturs

Author & World-Class Mountaineer

Guest Speaker

Sometimes attaining your goals can feel like summitting a mountain. But how can the lessons from actual mountain climbing apply to your life? Seasoned mountaineer Ed Viesturs has reached the peak of many of the world’s most treacherous mountains without supplemental oxygen. He will share compelling and actionable insights into how he accomplished his goals that can apply to the business world, and your role as a leader.

Join this inspirational keynote to learn: 

  • How to plan ahead with resources to make sure you finish what you set out to do
  • Managing and mitigating risk through perseverance, dedication, and teamwork
  • Leadership and rational decision making in times of crisis to complete a monumental goal

1:15pm - 1:45pm  Closing Reception & Prize Drawing

1:45pm - 2:15pm  Closing Reception & Prize Drawing


We look forward to seeing you at an upcoming in-person gathering

Evanta programs are uniquely positioned to succeed in the current landscape.

  • Our invitation-only gatherings are designed to be smaller in scale, providing a safe and comfortable environment.
  • All in-person programs are local and complimentary, with zero impact on your organization’s T&E.

We are committed to creating the safest possible environment for all participants, partners, and associates. As a part of our commitment we will continue to monitor and adhere to government, venue, and health agency guidelines. Information on vaccinations, face mask guidance, on-site safety measures, and more, can be found here: Health and Safety Resource Policy.


Venue & Accommodation

Waldorf Astoria Chicago

A block of rooms has been reserved at the Waldorf Astoria Chicago at a reduced conference rate. Reservations should be made online or by calling 312-646-1441.

Deadline to book using the discounted room rate of $595 USD (plus tax) is September 20, 2022.

Your Community Partners

Global Thought Leader
CIO Thought Leader
Key Partners

Global CISO Program Manager

For inquiries related to this event, please reach out to your dedicated program contact.

Kody Paine

Senior Program Manager