IN-PERSON

Milwaukee CISO Executive Summit

December 14, 2021 | Hyatt Regency Milwaukee

December 14, 2021
Hyatt Regency Milwaukee

Collaborate with your peers

Get together with Milwaukee's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Seizing momentum – influencing and leading the enterprise

Thriving through uncertainty - empowering people and delivering value

Advancing and scaling strategic, outcome-based technologies

Milwaukee CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Richard Flahaven

Harley-Davidson
Chief Information Security Officer & Data Privacy Officer

Mandy Huth

Kohler Co.
VP, Cybersecurity

Rick Sackett

ProAmpac
Director, Information Security

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Milwaukee CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


December 13, 2021

December 14, 2021

6:00pm - 8:30pm  Governing Body Welcome Reception

Governing Body Private Dinner

Exclusive to Governing Body members and select guests, this dinner is a can’t-miss opportunity to connect with your peers prior to tomorrow’s Executive Summit. Please join your colleagues for an evening of good food, wine, and lively networking.

7:30am - 8:15am  Registration & Breakfast

8:15am - 9:00am  Keynote

The Path to Alignment — The CIO & CISO Relationship

Mandy Huth headshot

Mandy Huth

VP, Cybersecurity

Kohler Co.

Paul Ryan headshot

Paul Ryan

Chief Information Officer

Kohler Co.

CIO-CISO partnerships are built on trust and thrive when leaders invest in each other throughout the organization. IT leaders must set an example, demonstrating a commitment to security, positioning it at the core of IT and enterprise roadmaps.

Join this keynote to hear the success story on how to:

  • Strengthen the IT-Security partnership to fuel innovation and accelerate new technology deployments
  • Ensure security is represented as a holistic element of the organization
  • Collaborate in different business sectors while moving business initiatives forward

9:00am - 9:15am  Break

9:15am - 10:00am  Breakout Session

Activating a Cybersecurity Force for a New Era

Renee Tarun headshot

Renee Tarun

Deputy CISO/Vice President Information Security

Fortinet

With an increase in threat vectors comes the increased need for a sound yet dynamic cybersecurity program. CIOs must take a proactive approach in ensuring cybersecurity risk is considered at every step, even in times of rapid disruption.
Join this session for a discussion on:

  • Strategies to prepare for combating the threats of today and tomorrow.
  • Quantifying, measuring, and communicating risk across the organization
  • Upskilling your cybersecurity teams to stay ahead of emerging threats

9:15am - 10:00am  Executive Boardroom

Taking a Strategic Approach to Third-Party Risk

Scott Crouch headshot

Scott Crouch

Senior Vice President, Information Technology

GMR Marketing

Doug Michelz headshot

Doug Michelz

CISO

Wisconsin Department of Natural Resources

Chad Steighner headshot

Chad Steighner

CIO

Clarios

For many businesses, third-party vendors have become an important source of strategic advantage and business value. Yet outsourcing is not without its risks. As these external partnerships become increasingly complex, the need for a new strategic approach to vendor risk management is clear.

Join this session to discuss:

  • Ways to partner across the c-suite on third-party risk efforts
  • New approaches for managing third, fourth, and even fifth-party partners
  • Strategies that will help you make the best choices for your organization

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact Jenn St. John (jenn.stjohn@evanta.com). 

10:00am - 10:30am  Networking Break

10:30am - 11:15am  Breakout Session

Actionable Intelligence — Keeping Pace with Relentless Threats

Amanda Knutson headshot

Amanda Knutson

Supervisory Special Agent

Federal Bureau of Investigation

Bill Nash headshot

Bill Nash

Cybersecurity Advisor

Cybersecurity and Infrastructure Security Agency

Whether it’s cybercriminals motivated by profit or nation-state attackers with geopolitical motives, public and private organizations of all sizes have felt the impact of cyberattacks. Enterprise organizations are reeling from the onslaught of massively spread ransomware attacks to surgical pinpointed attacks on their assets from sophisticated state-sponsored actors. How can security leaders best face changing threat vectors?

Join Amanda Knutson, Supervisory Special Agent, Federal Bureau of Investigation and Bill Nash, Cybersecurity Advisor, Cybersecurity and Infrastructure Security Agency to discuss:

  • Understanding the adversary’s goals and objectives
  • How to build a more secure and resilient infrastructure through preparedness, incident response, and mitigation
  • What security executives can do to build resiliency

10:30am - 11:15am  Executive Boardroom

Building the Identity Platform of the Future

Mandy Huth headshot

Mandy Huth

VP, Cybersecurity

Kohler Co.

Michael Weber headshot

Michael Weber

Director Of Information Technology

Physicians Realty Trust

Digital transformation has created a convergence of users, devices, and applications that demands an identity-based security approach. With the identity perimeter exposed, CISOs need new and better ways to protect it.

Join this interactive boardroom conversation to discuss:

  • Strategies to reach frictionless IAM
  • How identity can protect against automated attacks
  • The future of IAM including passwordless authentication

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact Jenn St. John (jenn.stjohn@evanta.com). 

11:15am - 11:25am  Break

11:25am - 12:40pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:45am - 1:30pm  Lunch Service

12:40pm - 1:00pm  Break

1:00pm - 1:35pm  Keynote

Strengths 2.0 — Applying Design Thinking to Your Strengths and Weaknesses

John K. Coyle headshot

John K. Coyle

Innovation & Design Thinking Expert

Guest Speaker

John K. Coyle is the founder and CEO of "Art of Really Living" and one of the world's leading experts in innovation and design thinking. Through the metaphor of sport, learn how individuals and teams can use innovation approaches to identify and leverage their unique strengths (and design around weaknesses). Become empowered to solve old problems in new ways and achieve breakthrough results. Understand how to apply the “Design Thinking” process to business and personal challenges. 

This will empower you to:

  • Achieve breakthrough performance by focusing on what you do best
  • Decide what to delegate, quit or outsource, and plan to maximize team resources
  • Create higher engagement and more effective collaboration with customers and colleagues

1:35pm - 1:50pm  Break

1:50pm - 2:35pm  Breakout Session

The Business Value of a SASE, Zero-Trust Journey

Mike Anderson headshot

Mike Anderson

Chief Digital & Information Officer

Netskope

With people working remotely and most user traffic destined for SaaS and cloud, network security requires transformation. It’s no longer efficient or cost-effective to route traffic through the corporate network to apply security controls. Adopting a Secure Access Service Edge (SASE) Architecture while focusing on Zero-Trust principles ensures that your employees can be productive and secure working from anywhere.

In this session, we will discuss:

  • The economics and business case for a SASE journey
  • Best practices for implementing Zero Trust within a SASE architecture
  • The importance of granular Cloud and SaaS visibility in a SASE architecture

1:50pm - 2:35pm  Executive Boardroom

The Brutal Honesty on Ransomware

Reshad Alam headshot

Reshad Alam

Vice President, Information Systems Security

Regal Rexnord

Chris Merkel headshot

Chris Merkel

Senior Director, Cybersecurity Operations

Northwestern Mutual

IT leaders across the globe are asking themselves that question as ransomware grows increasingly prevalent and as attackers continue to raise their demands. It may seem difficult to prioritize building out your recovery plan when you could spend that time focused on increasing defensive measures but recovering from ransomware is not a process you want to wing.

Join this session to discuss:

  • Step-by-step guidance for navigating ransomware response protocols
  • Key pitfalls most organizations make when attempting a ransomware recovery and how to avoid them
  • How to build a foundation for developing a thorough, practical, and well-documented plan of action

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact Jenn St. John (jenn.stjohn@evanta.com). 

2:35pm - 3:05pm  Networking Break

3:05pm - 3:40pm  Keynote

The Three Keys to Cybersecurity Transformation — Platform, People, and Process

Tim Dickson headshot

Tim Dickson

CIO

Generac Power Systems

Pamela Kubiatowski headshot

Pamela Kubiatowski

Field CTO - AMS

Zscaler

The process of digital transformation improves business agility and information flow, but dramatically expands the attack surface and exposes your business to new threats. Your employees are on the internet now more than they are on the corporate network, accessing applications and data from everywhere. Protecting your business and retaining the benefits of digital transformation requires migrating to a zero trust security model delivered through the cloud, closer to where your users and business assets are now centered.

Join your peers for a session focused on:

  • Building your security ecosystem on a Zero Trust foundation
  • Developing new skills and embracing a new cultural mindset at all levels of the enterprise
  • Defining the right tools to empower your adoption of Zero Trust

3:40pm - 4:10pm  Closing Reception & Prize Drawing

6:00pm - 8:30pm  Governing Body Welcome Reception

Governing Body Private Dinner

Exclusive to Governing Body members and select guests, this dinner is a can’t-miss opportunity to connect with your peers prior to tomorrow’s Executive Summit. Please join your colleagues for an evening of good food, wine, and lively networking.

7:30am - 8:15am  Registration & Breakfast

8:15am - 9:00am  Keynote

The Path to Alignment — The CIO & CISO Relationship

Mandy Huth headshot

Mandy Huth

VP, Cybersecurity

Kohler Co.

Paul Ryan headshot

Paul Ryan

Chief Information Officer

Kohler Co.

CIO-CISO partnerships are built on trust and thrive when leaders invest in each other throughout the organization. IT leaders must set an example, demonstrating a commitment to security, positioning it at the core of IT and enterprise roadmaps.

Join this keynote to hear the success story on how to:

  • Strengthen the IT-Security partnership to fuel innovation and accelerate new technology deployments
  • Ensure security is represented as a holistic element of the organization
  • Collaborate in different business sectors while moving business initiatives forward

9:00am - 9:15am  Break

9:15am - 10:00am  Executive Boardroom

Technology and the Boardroom: A CIO's Guide to Engaging the Board

Rick Britton headshot

Rick Britton

EVP, CIO

Viad

Tim Brown headshot

Tim Brown

EVP, CIO

Johnson Financial Group, Inc.

Larry Pedrazoli headshot

Larry Pedrazoli

Director of Cyber Security

Generac Power Systems

Corporate directors often lack the technological background to navigate the nuanced discussions of operational IT. This session will inform CIOs of ways to communicate with CEOs and board of directors on why cyber security and the investment needed in today’s environment address concerns effecting corporate branding and the secondary and tertiary effects of a need for a secure IT network and systems. The best CIO board presenters are savvy communicators who can focus on the right metrics and the right message.

Join your peers to discuss:

  • How CIOs can lead and guide the conversation on how technology can enable business trajectory
  • Engaging the board in continuous dialogue in areas related to performance, risk, and strategy
  • Demystifying technology spend and showing clear ties to enabling and protecting the business

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact Jenn St. John (jenn.stjohn@evanta.com). 

9:15am - 10:00am  Executive Boardroom

Taking a Strategic Approach to Third-Party Risk

Scott Crouch headshot

Scott Crouch

Senior Vice President, Information Technology

GMR Marketing

Doug Michelz headshot

Doug Michelz

CISO

Wisconsin Department of Natural Resources

Chad Steighner headshot

Chad Steighner

CIO

Clarios

For many businesses, third-party vendors have become an important source of strategic advantage and business value. Yet outsourcing is not without its risks. As these external partnerships become increasingly complex, the need for a new strategic approach to vendor risk management is clear.

Join this session to discuss:

  • Ways to partner across the c-suite on third-party risk efforts
  • New approaches for managing third, fourth, and even fifth-party partners
  • Strategies that will help you make the best choices for your organization

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact Jenn St. John (jenn.stjohn@evanta.com). 

10:00am - 10:30am  Networking Break

10:30am - 11:15am  Breakout Session

Actionable Intelligence — Keeping Pace with Relentless Threats

Amanda Knutson headshot

Amanda Knutson

Supervisory Special Agent

Federal Bureau of Investigation

Bill Nash headshot

Bill Nash

Cybersecurity Advisor

Cybersecurity and Infrastructure Security Agency

Whether it’s cybercriminals motivated by profit or nation-state attackers with geopolitical motives, public and private organizations of all sizes have felt the impact of cyberattacks. Enterprise organizations are reeling from the onslaught of massively spread ransomware attacks to surgical pinpointed attacks on their assets from sophisticated state-sponsored actors. How can security leaders best face changing threat vectors?

Join Amanda Knutson, Supervisory Special Agent, Federal Bureau of Investigation and Bill Nash, Cybersecurity Advisor, Cybersecurity and Infrastructure Security Agency to discuss:

  • Understanding the adversary’s goals and objectives
  • How to build a more secure and resilient infrastructure through preparedness, incident response, and mitigation
  • What security executives can do to build resiliency

10:30am - 11:15am  Executive Boardroom

CIOs Promise: Delivering Data & Analytics

Eric Hanson headshot

Eric Hanson

Global VP, Information Services

HUSCO

Sam Hilgendorf headshot

Sam Hilgendorf

CIO

Fox World Travel

Faced with demands for modernization, cost optimization and digital business transformation, CIOs are looking at how data and analytics programs can support expanding their digital business and increasing their D&A maturity. After a D&A strategy is set, IT leader must execute and deliver on the intended business outcomes.

Join your peers in discussing:

  • Approaches to leveraging technology and resources to support D&A program and improve business outcomes
  • Best practices for building out new business processes and executing change management across the enterprise
  • Management of cultural shifts in the organization

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact Jenn St. John (jenn.stjohn@evanta.com). 

11:15am - 11:25am  Break

11:25am - 12:40pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:45am - 1:30pm  Lunch Service

12:40pm - 1:00pm  Break

1:00pm - 1:35pm  Keynote

Strengths 2.0 — Applying Design Thinking to Your Strengths and Weaknesses

John K. Coyle headshot

John K. Coyle

Innovation & Design Thinking Expert

Guest Speaker

John K. Coyle is the founder and CEO of "Art of Really Living" and one of the world's leading experts in innovation and design thinking. Through the metaphor of sport, learn how individuals and teams can use innovation approaches to identify and leverage their unique strengths (and design around weaknesses). Become empowered to solve old problems in new ways and achieve breakthrough results. Understand how to apply the “Design Thinking” process to business and personal challenges. 

This will empower you to:

  • Achieve breakthrough performance by focusing on what you do best
  • Decide what to delegate, quit or outsource, and plan to maximize team resources
  • Create higher engagement and more effective collaboration with customers and colleagues

1:35pm - 1:50pm  Break

1:50pm - 2:35pm  Breakout Session

The Business Value of a SASE, Zero-Trust Journey

Mike Anderson headshot

Mike Anderson

Chief Digital & Information Officer

Netskope

With people working remotely and most user traffic destined for SaaS and cloud, network security requires transformation. It’s no longer efficient or cost-effective to route traffic through the corporate network to apply security controls. Adopting a Secure Access Service Edge (SASE) Architecture while focusing on Zero-Trust principles ensures that your employees can be productive and secure working from anywhere.

In this session, we will discuss:

  • The economics and business case for a SASE journey
  • Best practices for implementing Zero Trust within a SASE architecture
  • The importance of granular Cloud and SaaS visibility in a SASE architecture

2:35pm - 3:05pm  Networking Break

3:05pm - 3:40pm  Keynote

The Three Keys to Cybersecurity Transformation — Platform, People, and Process

Tim Dickson headshot

Tim Dickson

CIO

Generac Power Systems

Pamela Kubiatowski headshot

Pamela Kubiatowski

Field CTO - AMS

Zscaler

The process of digital transformation improves business agility and information flow, but dramatically expands the attack surface and exposes your business to new threats. Your employees are on the internet now more than they are on the corporate network, accessing applications and data from everywhere. Protecting your business and retaining the benefits of digital transformation requires migrating to a zero trust security model delivered through the cloud, closer to where your users and business assets are now centered.

Join your peers for a session focused on:

  • Building your security ecosystem on a Zero Trust foundation
  • Developing new skills and embracing a new cultural mindset at all levels of the enterprise
  • Defining the right tools to empower your adoption of Zero Trust

3:40pm - 4:10pm  Closing Reception & Prize Drawing

December 13, 2021

December 14, 2021

We look forward to seeing you at an upcoming in-person gathering


Location


Venue & Accommodation

Hyatt Regency Milwaukee
MORE INFORMATION

A block of rooms has been reserved at the Hyatt Regency Milwaukee at a reduced conference rate. Reservations should be made online or by calling 414-276-1234.

Deadline to book using the discounted room rate of $154 USD (plus tax) is November 19, 2021.

Your Community Partners


CIO Thought Leaders
Key Partner
Program Partner

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Jenn St. John

Program Manager

971-222-5924

jenn.stjohn@evanta.com