Minneapolis CISO Executive Summit

June 27, 2023 | Hyatt Regency Minneapolis

June 27, 2023
Hyatt Regency Minneapolis

Collaborate with your peers

Get together with Minneapolis's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Charting the trajectory of security executives pioneering new challenges and responsibilities

Evolving Sourcing & Development Tactics to Build a Sustainable Talent Pipeline

Protecting Critical Infrastructure Against Advanced Attacks

Minneapolis CISO Governing Body

The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Betty Elliott

Freddie Mac
Senior VP & Chief Information Security Officer

Jill Kuykendall

Securian Financial
Chief Information Security Officer

Michael Rogers

Hormel Foods

Rohit Tandon

Essentia Health

Tony Taylor

Land O'Lakes

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Minneapolis CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.


June 26, 2023

6:00pm - 8:30pm  Governing Body Welcome Reception

Governing Body Welcome Reception

Join the Minneapolis CISO Governing Body and invited guests for dinner and drinks as we kick off the executive summit. Along with a night of peer networking, we’re partnering with the non-profit "Foster Love" to pack STEM Boxes that will be delivered to local children in foster care. The interactive kits allow kids to experience projects centered around science, technology, engineering and math.

7:45am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

Weaponizing Risk Appetite to Reframe Security Investment

Paul Proctor headshot

Paul Proctor

Distinguished VP Analyst


Risk appetite fails when it is expressed in fuzzy, imprecise terms. Repositioning risk appetite in the context of investment and value delivery creates a measurable scale of risk that powers a new type of governance.

Join this session to learn:

  • How concrete assertions of risk appetite can make executive decisions binding
  • How can risk appetite drive risk decisions
  • What scale can be used to measure risk appetite

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Teamwork Defends – Uniting for Program Maturity, Global M&A, and Cultural Alignment

Tom Bauer headshot

Tom Bauer


APi Group

Ryan Spinti headshot

Ryan Spinti

Cybersecurity Director

APi Group

John Burmood headshot

John Burmood

Enterprise Security Architect

APi Group

Carl Lee headshot

Carl Lee

Information Security Lead, Cyber Defense Operations

APi Group

Cybersecurity is an integral part of an organization's overall strategy and ability to thrive – especially in the event of mergers and acquisitions. In this environment, empowering your team and fostering a culture that values different perspectives is critical. How do you protect the business from sophisticated threat actors throughout the M&A lifecycle without sacrificing culture or security posture?

Join this panel to explore:

  • What a holistic view can reveal about your security program
  • The connection between strong team culture and cybersecurity resiliency
  • Friction points, lessons learned and success stories of global M&A

9:40am - 10:25am  Breakout Session

CISO Says — The Game Show

Michael Rogers headshot

Michael Rogers


Hormel Foods

What will the security industry look like in 2025 — and beyond? Put your future forecasting skills to the test and share where your team stands by playing "CISO Says," a game show-style session powered by the top predictions prepared by Gartner's cybersecurity experts.

Come on down to:

  • Compete in a data-driven quiz game with your peers
  • Discover more about projected opportunities and challenges
  • Share how you're preparing to lead your team through changing market conditions

9:40am - 10:25am  Executive Boardroom

Bringing DevSecOps to Cloud Security

Max Anderson headshot

Max Anderson

Sr. Security Strategist


Derek Dahlen headshot

Derek Dahlen

SVP, Director of Information Security – Identity and Access Management

U.S. Bank

Randy Kirsch headshot

Randy Kirsch

VP of IT

Presbyterian Homes

The threat landscape is continuing to expand and diversify as organizations move to a multi-cloud environment. CISOs need to ensure that their DevSecOps capabilities are incorporated within their overall business strategy to guarantee that their cloud applications and code can remain secure.

Join this session to discuss:

  • Understanding there is no one-size-fits-all model for DevSecOps
  • Best practices for integrating DevSecOps into your cloud security strategy
  • Exploring the intersection between development, security and DevSecOps

9:40am - 10:25am  Executive Boardroom

Building Trust in Security Operations

Vince Aimutis headshot

Vince Aimutis

VP – Director of Information Services / CISO

Federated Insurance

Ken Smith headshot

Ken Smith

Director, IT


Dave Farrow headshot

Dave Farrow


Red Canary

Trust is at the center of what we do in cybersecurity. Trust in your team, trust in your tools, and the business’ trust in you. However, security teams face challenges every day that erode that trust: analysts get burned out and disengage, tools deliver more noise than outcomes, and your security program is more likely to slow down your business rather than help it run at full speed. In this session, we will discuss why this is the case and how to reverse this dynamic.

Join this executive boardroom to discuss:

  • How false positives can erode trust 
  • Building engineering principles into your SecOps process
  • Why a flatter SOC is a better SOC

10:25am - 11:00am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:00am - 11:45am  Breakout Session

Operationalizing Zero Trust Security

Pamela Kubiatowski headshot

Pamela Kubiatowski

Field CTO - Americas


There are many paths leading to zero trust, but careful planning in the initial stages is key to ensuring a smooth journey. Successful digital transformation relies upon cultivating organizational buy-in as well as understanding the best ways to apply zero trust in your environment. Starting off on the right foot can save your business considerable hardship down the road.

Join the session to learn:

  • How to win support from peers and the board by framing zero trust in terms of business risk, not security
  • Where to first introduce zero trust into your organization; access control, third party management, attack surface reduction, app-level segmentation, etc.
  • Identifying and prioritizing risks to avoid scope creep and costly mistakes

11:00am - 11:45am  Breakout Session

From Interns to Innovators — Building the Next Generation of Cybersecurity Professionals

Jeff Johnson headshot

Jeff Johnson

Director, IT Security and Privacy


Ella Cook headshot

Ella Cook

IT Security Engineer Intern


John Westrich headshot

John Westrich

IT Security Engineer


Ryan Dickerson headshot

Ryan Dickerson

Manager, IT Security


Patrick Huber headshot

Patrick Huber

Principal Security Engineer


We've been hearing about — and living through the reality of — the security talent shortage for a decade now. Internship programs can produce a talent pipeline to fill gaps in security programs when executed intentionally. Hear from DigiKey's Cybersecurity Team as they discuss their journey of refining internships for the better.

Join this panel to explore:

  • An overview of their internship program — key strategies and lessons learned.
  • Making the duration of the internship meaningful for all parties.
  • How to stay engaged and connected throughout the entire process.

11:00am - 11:45am  Executive Boardroom

Stopping Insider Risks From Turning Into Insider Threats

Brian Reed headshot

Brian Reed

Senior Director, Cybersecurity Strategy


Tony Taylor headshot

Tony Taylor


Land O'Lakes

Peter Christy headshot

Peter Christy

Sr Director & Information Security Officer

Patterson Companies

Not every insider risk turns into an insider threat, but every insider threat began as an insider risk. Security leaders need an insider risk mitigation program that encompasses people, processes and technology for successful early intervention, detection and mitigation of insider threats. How can executives build out these robust defenses and strengthen internal cross-functional partnerships to tackle insider risk as a team?

Join this session to discuss:

  • Managing insider threats and risks in your organization
  • Contextualizing insider risk mitigation strategies within the framework of the larger corporate risk framework
  • Leveraging behavioral change, analytical insights and precise interventions to reduce human risk

11:00am - 11:45am  Executive Boardroom

A Fresh Look at API Security

Richard Rhodes headshot

Richard Rhodes

Director Cybersecurity

Cub Foods

Drew Bomett headshot

Drew Bomett

VP, CISO - Global IT Cybersecurity

Boston Scientific

Jason Kent headshot

Jason Kent

Hacker In Residence

Cequence Security

APIs fuel digital transformation and are core to every SaaS, web and mobile application. As API use attacks are becoming more frequent and complex, how can CISOs ensure protection for sensitive data, applications, and customers?

Join this boardroom to discuss:

  • How to gain visibility to understand exposure and risk
  • Ways to answer the “so what” for API security, including OWASP API Top 10 impacts
  • How security and development teams can find balance

11:45am - 12:30pm  Lunch Service

12:30pm - 1:05pm  Keynote

Achieving Transformational Security Improvements with the Enterprise Browser

Brian Kenyon headshot

Brian Kenyon

Chief Strategy Officer


One of the most widely deployed applications in the Enterprise has also become one of the most strategic – yet it was an application that was never built or designed for the Enterprise? The browser has changed the way we work in the modern era, however it is unapologetically based on consumer needs and preferences.  What if the browser was designed for the enterprise? What could that do for security, productivity and work itself? Join us to see how this technology is transforming the way companies do business.  

 In this session, we will share details on:

  • Innovative features and possibilities for critical application protection
  • Creating an employee experience centered on productivity and flexibility
  • Reimagining how IT leaders can enable users while creating unique business value


1:05pm - 1:30pm  Break

1:30pm - 2:15pm  Breakout Session

Hot Topics — What’s Your Take?

Aimee Martin headshot

Aimee Martin


Data Recognition Corporation

 Generative Ai, Cyber Insurance, Talent & Culture — oh my! As these and other trending topics make their way to the boardroom and dinner table alike, it’s up to CISO leaders to determine which are more hype and which they need to focus on NOW.

Join this session to discuss and debate with your peers:

  • Hot topics surfacing across industries
  • Business impacts of emerging trends
  • Key strategies for communicating new trends to stakeholders

1:30pm - 2:15pm  Executive Boardroom

Making Every Security Investment Count

Philip Swiderski headshot

Philip Swiderski

Executive Cybersecurity Advisor


Judy Hatchett headshot

Judy Hatchett



Brad Abbott headshot

Brad Abbott

Director of Information Security, CISO


Today’s business leaders find themselves squaring up against a two-headed monster: more attack surfaces and threats to cover than ever before and macroeconomic challenges loom. Cybersecurity isn’t something that orgs can afford to “cut down on,” so increasingly, leaders are asked to achieve even greater outcomes with the same or fewer resources — from budgets to tech to headcount. How can CISOs evaluate spend without compromising on risk?

Join this session to discuss:

  • Ways organizations are improving return on investment (ROI) on existing security investments
  • How leaders can translate risk into business outcomes for leadership and boards, enabled by security investment
  • How to overcome challenges security leaders face as they work to scale, grow, and innovate without sacrificing security

1:30pm - 2:15pm  Executive Boardroom

Transforming Network Security with AI-Powered SASE

Justin Douglas headshot

Justin Douglas

Vice President, Solutions Consulting

Palo Alto Networks

William Scandrett headshot

William Scandrett

VP, Chief Information Security Officer

Allina Health

Jill Kuykendall headshot

Jill Kuykendall

Chief Information Security Officer

Securian Financial

With cloud adoption accelerating and the emergence of permanent hybrid workforces, traditional network security constructs are pushed to their breaking point. As remote work has become the new normal, users, applications and data are now everywhere, challenging traditional notions of security and performance. CISOs need a new security architecture designed to protect our ever-expanding perimeters from ever-evolving threats without sacrificing performance. 

Join this session to discuss: 

  • Why a unified approach to SASE is critical for leveraging AI
  • How AI/ML can deliver better security, networking and operational outcomes
  • Best practices to adopt SASE that sets you up for success

2:15pm - 2:50pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

2:50pm - 3:35pm  Breakout Session

Vendor Security Excellence — Prioritization driven by Partnerships, Threat Intelligence and Risk

Brenda Bjerke headshot

Brenda Bjerke

Sr. Director - Cyber Risk


Amy Hawkins headshot

Amy Hawkins

Sr. Manager - Vendor Security


 In recent years, organizations have faced significant challenges in adapting to a digital-first environment and managing cybersecurity threats, while also relying more on vendors for critical business functions. Successful Vendor Security programs require seamless alignment between security professionals, relationship managers, and vendor contacts to meet expectations throughout the vendor lifecycle. In this session, learn how enabling a strong collaboration between cyber risk and cyber threat intelligence creates meaningful, ongoing conversations about risk.

Join this session to explore:

  • Prioritization decisions driven by data and risk strategies
  • Enhancing your program by infusing threat intelligence
  • Centering partnerships to improve practices and insights

2:50pm - 3:35pm  Executive Boardroom

Deception Detection — Safeguarding Your Organization from Social Engineering

Greg Matthias headshot

Greg Matthias



Kristi Yauch headshot

Kristi Yauch

Director Information Security

Winnebago Ind

Phishing and social engineering remain the top methods used by cybercriminals to infiltrate organizations. It is fundamental for CISOs to implement strong technical solutions as well as cultivate effective training programs to consistently educate employees and increase awareness of potential threats.

Join this boardroom to discuss:

  • The latest trends in social engineering attacks, including spear phishing, pretexting, baiting, and tailgating and methods to identify and respond effectively
  • Leveraging data to better understand your adversaries
  • Best practices to build a resilient security culture and raise employee awareness of social engineering threats

2:50pm - 3:35pm  Executive Boardroom

From Vulnerability to Victory — Brainstorming a Response to Advanced AI

David Dobrotka headshot

David Dobrotka

Enterprise Information Security | Cyber Defense

UnitedHealth Group

Rohit Tandon headshot

Rohit Tandon


Essentia Health

There's no denying the power and popularity of generative AI programs like ChatGPT. For good or for evil, its uses seem endless. Predicting exactly how this advanced AI will impact the future of cyber security is impossible. But through collaboration with your C-level peers, you might be able to prepare.

Join this interactive session to:

  • Share your thoughts on enterprise use cases for generative AI
  • Gauge the impact this tech advancement is having across industries
  • Unpack concerns around developing policies, loss of IP, etc.

3:35pm - 4:00pm  Break

4:00pm - 4:45pm  Keynote

Closing Comments

Grab a drink at the bar and join us in the main ballroom for Closing Comments, Reception, and Prize Drawing!

4:35pm - 5:00pm  Closing Reception & Prize Drawing

June 26, 2023

We look forward to seeing you at an upcoming in-person gathering

Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.


Venue & Accommodation

Hyatt Regency Minneapolis

A block of rooms has been reserved at the Hyatt Regency Minneapolis at a reduced conference rate. Reservations should be made online or by calling 612-370-1234. Please mention G-EV23 to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $189 USD (plus tax) is June 4, 2023.

Your Community Partners

Global Thought Leader
Key Partners
Program Partners

Community Program Manager

For inquiries related to this community, please reach out to your dedicated contact.

Joey Freedman

Program Manager