IN-PERSON

Minneapolis CISO Executive Summit

June 18, 2025 | Sheraton Bloomington Hotel

June 18, 2025
Sheraton Bloomington Hotel

APPLY TO PARTICIPATE

Collaborate with your peers

Get together with Minneapolis's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Strengthening cybersecurity's influence as a key facilitator of enterprise risk decisions

Building cyber resilience to withstand and quickly recover from attacks

Recalculating risk appetites across the C-suite and strengthening relationships accordingly

Minneapolis CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.

Governing Body Co-Chairs

Vince Aimutis

Federated Insurance
VP, Director, Information Services & CISO

Peter Christy

Patterson Companies
VP, CISO

Mary Faulkner

Thrivent
VP, CISO & IT Operations

Jeff Johnson

Digikey
Director, IT Security

Aimee Martin

Data Recognition Corporation
CISO

Greg Matthias

Agiliti
VP, CISO

Tina Meeker

Sleep Number
VP, Information Security & Enterprise Architecture

Michael Rogers

Hormel Foods
CISO & Director Information Security & Compliance

Param Vig

Solventum
SVP, CISO

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Minneapolis CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


June 18, 2025

8:00am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

The Performance Paradox — Navigating Peak Performance with Mental Health in Mind

Kara Hardin headshot

Kara Hardin

Registered Psychotherapist & LEO of The Practice Lab

Guest Speaker

In high-achieving environments, the drive to succeed often comes at a quiet cost: exhaustion, disconnection, and a sense that no matter how much we accomplish, it’s never quite enough. When productivity becomes the only measure of worth, rest feels impossible—and burnout starts to look like the norm. But it doesn’t have to be.

In this keynote Kara Hardin, former lawyer, and mental health educator explores why our current approach to performance is backfiring—and what we can do instead. Through research, relatable stories, and practical tools, we’ll unpack:

  • How common ideas about time, efficiency, and productivity are quietly harming individual and collective well-being
  • Why mental health isn’t the reward for high performance—it’s the foundation
  • What leaders can do (for themselves and their teams) to build a healthier, more sustainable relationship with work

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Reimagining Recovery — From Tabletop to Reality

Noah Korba headshot

Noah Korba

VP, Cyber Security

General Mills

Billie Chock headshot

Billie Chock

Director, Cybersecurity

General Mills

As cyber threats escalate each year, organizations must evolve from traditional tabletop exercises to hands-on recovery practices to enhance resilience and technology recovery capabilities. This session will guide participants through the transition from theoretical planning to executing crisis-level recovery exercises. How can CISOs transform disaster recovery from a mere exercise into a strategic capability that addresses real-world threats?

Join this session to:

  • Learn the benefits of moving from tabletop exercises to full-scale, hands-on recovery operations.
  • Explore the process and challenges of rebuilding cloud environments as part of a robust disaster recovery strategy.
  • Understand how to integrate recovery capabilities into organizational resilience planning to effectively counter evolving threats.

9:40am - 10:25am  Executive Boardroom

Executive Boardroom

Scott Deluke headshot

Scott Deluke

Director of Enterprise Sales Engineering

Abnormal Security

Jon Zayicek headshot

Jon Zayicek

Deputy CISO

Cribl

 Session Details Coming Soon...

9:40am - 10:25am  Executive Boardroom

Addressing Enterprise Risks with Automation

Lior Yaari headshot

Lior Yaari

CEO and Co-Founder

Grip Security

Chris Zamora headshot

Chris Zamora

VP of Global Executive Engagement

Nagomi Security

Yan Kravchenko headshot

Yan Kravchenko

Core Technology & Information Security Director

Hennepin Healthcare

Assessing risks across the enterprise is even harder with shadow SaaS sprawl and data fragmentation from tool sprawl. Proactive security requires automation and security assessments to scale operationally.

Join this boardroom to discuss:

  • Strategies for proactive security versus reactive security
  • What data silos can be leveraged for real-time, actionable insights
  • Methods to prioritize and remediate gaps based on real business impact


10:25am - 11:10am  Networking Break

10:35am - 11:00am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:10am - 11:55am  Breakout Session

The Discipline of Cybersecurity through Martial Arts

Peter Christy headshot

Peter Christy

VP, CISO

Patterson Companies

Like Cybersecurity, Martial Arts embodies the discipline of defense. This principle gradually evolves through focus and understanding. As a third-degree black belt in Karate, Peter Christy, CISO at Patterson Companies has learned the importance of preventing attacks, refining techniques, and accumulating knowledge and expertise over time. 

Join this session to explore:

  • Applying the Martial Arts mindset to security
  • Building a culture of continuous improvement and learning
  • Staying proactive, flexible, and resilient against an increasing threat landscape


11:10am - 11:55am  Executive Boardroom

Strategies for Simplifying IT Complexity Through Consolidation

Platform consolidation is a strategic priority for security and IT leaders, driven by increasing tech stack complexity and economic challenges. Unfortunately, many consolidation projects struggle to meet expectations due to gaps between what platforms can do and what it should do.

Join this session to discuss:

  • Simplifying the IT stack for cost savings, less complexity, and enhanced performance and reliability
  • Overcoming organizational inertia and other common obstacles to platform consolidation
  • Proving the ROI of a consolidated IT stack that fosters innovation and can better adapt to changing business needs

11:10am - 11:55am  Executive Boardroom

Protecting Innovation — Rethinking Data Security Strategies

Chris Bates headshot

Chris Bates

Chief Security Officer

Cyberhaven

Jason Meszaros headshot

Jason Meszaros

Director, Infrastructure & Cybersecurity

ATS

AI makes creating and consuming data easier than ever, with shadow AI and dark data presenting new challenges to security teams. As the tactics for protecting data evolve, security leaders must adopt a risk-based strategy to protect mission-critical data and safeguard innovation.

Join this session to discover:

  • Effective practices for ongoing monitoring to identify risks
  • Rapid investigation and response techniques for insider threats
  • Strategies for evolving your data protection approach

11:55am - 12:30pm  Lunch Service

12:30pm - 1:05pm  Keynote

Weaving Digital Business Strategy into Security

Erin Neus-Cheong headshot

Erin Neus-Cheong

Senior Director Analyst

Gartner

Integrating business strategy with security is crucial for leveraging opportunities and driving success. By focusing on micro pivots inspired by digital product management, CISOs can mobilize their organizations, scale opportunities, and enhance security mechanisms without massive changes. 

Join Erin Neus-Cheong, Senior Director Analyst, Gartner to:

  • Identify ways to leverage digital business building blocks to enhance security and operational effectiveness.
  • Learn how to foster a culture of co-leadership that empowers both security and business teams to achieve shared goals.
  • Discover techniques to foster shared accountability for security and risk management in an environment of democratized digital delivery, agility and disruptive innovation.


1:05pm - 1:30pm  Break

1:30pm - 2:15pm  Breakout Session

The Savvy CISO — 10 Minute Wins

Kristi Yauch headshot

Kristi Yauch

VP, Information Security

Winnebago Industries

Abdeslam Mazouz headshot

Abdeslam Mazouz

CISO

City of Minneapolis

In the fast-paced world of cybersecurity, CISOs benefit immensely from sharing savvy strategies that enhance their organization's security posture. By learning from each other's experiences, exchanging insights and successes, CISOs can implement effective program enhancements with minimal time investment and enriches the collective expertise of the community.

Join you peers as they:

  • Introduce practical tools and techniques that can be implemented to enhance cybersecurity, and discuss their effectiveness in different organizational settings.
  • Identify common challenges faced by CISOs, such as limited resources and evolving threats, and collaborate on strategies to overcome these obstacles.
  • Share experiences and successes, promoting knowledge exchange and continuous improvement in cybersecurity practices.


1:30pm - 2:15pm  Executive Boardroom

Should CISOs be Responsible for Business Continuity?

Christopher Groshong headshot

Christopher Groshong

Digital Platforms & Cybersecurity Leader

Blue Cross Blue Shield of Minnesota

While incident response, business continuity, and disaster recovery are unquestionably linked, each is a separate initiative with its own distinct objectives. While it makes sense for CISOs to own IR, business continuity is increasingly also finding its way onto CISOs' already overloaded plates -- but is that where it should be? Since so much of BCP is tied to the service impacts on the organization such as financial, reputation, etc. as CISO do you feel you have sufficient qualifications/expertise to address?

Join your peers for a thought-provoking discussion about:

  • Where business continuity should optimally sit in the organization
  • What CISOs with BCP under their purview are doing to manage it
  • How CISOs are navigating BCP challenges whether they're responsible for it or not


1:30pm - 2:15pm  Executive Boardroom

Checking in on Your Operating Model

As enterprises rapidly accelerate their digital initiatives, CISOs are tasked with striking a delicate balance between implementing the right structures and strategies to safeguard organizational assets and delivering services and applications faster than ever before. How are CISOs updating their operating models and team structures to keep pace with the changing nature of business priorities and the changing technology landscape?

Join this conversation to hear how your peers are:

  • Evolving security operating models to deliver better speed, agility and security while optimizing cost savings  
  • Assessing how their business units may evolve in line with new technological innovations
  • Positioning their team as security advocates and demonstrating business value


2:15pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

CISO Hot Topics - What's Your Take?

Security continues to find its way into the boardroom and even into headlines.  CISOs are feeling the heat to foster and explain strategic value, opportunities, and implications of key priorities and new innovations. In this workshop, you'll have the chance to pick topics that most interest you and have a dynamic dialogue about them with your peers.

Join this session to discuss and debate with your peers:

  • Hot topics surfacing across industries
  • Business impacts of emerging trends
  • Key strategies for communicating new trends to non-technical stakeholders


3:00pm - 3:45pm  Executive Boardroom

Cyber Resilience in Times of Geopolitical Conflict

Jasper Li headshot

Jasper Li

Director, Global IT Infrastructure & Cybersecurity

Banner Engineering

As global tensions rise, coordinated cyber-attacks are impacting organizations globally. Cyber-conflict isn’t just a security problem, it’s a business problem that requires a strategic partnership between CISOs and leaders across the enterprise.

Join this peer-led conversation to discuss:

  • Gauging the business’ appetite for risk amidst geopolitical unrest
  • Engaging leadership to make informed cybersecurity risk decisions
  • Identifying and responding to politically charged TTPs


3:00pm - 3:45pm  Executive Boardroom

The CISO as a Shepherd of the Enterprise

Param Vig headshot

Param Vig

SVP, CISO

Solventum

As the significance of cybersecurity in the corporate world expands and transforms, leaders in cybersecurity need to establish a transparent connection between cybersecurity plans and the company's results and priorities.

Participate in this executive meeting to explore:

  • Integrating cybersecurity strategy with corporate aims and targets
  • Framing security as a contributor to value rather than an expense
  • Cultivating a business-focused mindset within the security department


3:45pm - 4:00pm  Networking Break

4:00pm - 4:35pm  Keynote

From Vision to Reality — Navigating Expansion with Cybersecurity

Andrew Coyne headshot

Andrew Coyne

CISO

Mayo Clinic

Mayo Clinic CISO Andrew Coyne had a clear vision in mind when he embarked on launching a state-of-the-art cyber program: redefine cybersecurity standards in healthcare. Within a dynamic timeframe, he is focusing on modernizing cyber defenses, assembling a team of top-tier talent, and making strategic decisions to support expansive infrastructure initiatives.

Join this session to learn about Coyne's journey to ensuring robust cybersecurity alongside hospital expansions and automation advancements, including:

  • Propelling the organization to new heights and being a catalyst for change in cybersecurity
  •  Addressing and working within the challenges of organizational change management
  • Building a strong network of both

4:35pm - 4:45pm  Closing Comments and Prize Drawing

4:45pm - 6:00pm  Governing Body Reception

Governing Body Reception

Finish the day sharing lessons learned with your peers over light fare and drinks at this closing reception hosted by your governing body members.

June 18, 2025

We look forward to seeing you at an upcoming in-person gathering


Gartner cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

Sheraton Bloomington Hotel

A block of rooms has been reserved at the Sheraton Bloomington Hotel at a reduced conference rate. Reservations should be made online or by calling 952-835-1900.

Deadline to book using the discounted room rate of $173 USD (plus tax) is May 26, 2025.

Your Community Sponsors


CISO Thought Leaders
Program Sponsors

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Joey Freedman

Community Program Manager

971-275-4444

joey.freedman@gartner.com