Philadelphia CISO Executive Summit

November 9, 2021 | Hilton Philadelphia at Penn's Landing

November 9, 2021
Hilton Philadelphia at Penn's Landing


Collaborate with your peers

Get together with Philadelphia's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Accelerating security to match the pace of digital business initiatives

Managing the risk created from a landscape of new core technologies

Achieving sustainability for the CISO role without compromising outcomes

Philadelphia CISO Governing Body

The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.


Todd Bearman

TE Connectivity
Chief Information Security Officer

Mark Eggleston

CSC Global

Anahi Santiago

Christiana Care

Dave Snyder

Independence Blue Cross
Chief Information Security Leader

Alden Sutherland

VP, Chief Information Security Officer

Reginald Williams

The Chemours Co
Chief Information Security Officer

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Philadelphia CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.


November 8, 2021

6:00pm - 8:30pm  Governing Body Welcome Reception

Governing Body Welcome Reception

Exclusive to Governing Body members and select guests, this dinner is a can’t-miss opportunity to connect with your peers prior to tomorrow’s Executive Summit. Please join your colleagues for an evening of good food, wine, and lively networking.

November 9, 2021 - morning

7:30am - 8:15am  Registration & Breakfast

8:15am - 8:30am  Opening Comments

8:30am - 9:00am  Keynote

Stress and the CISO — Practical Strategies to Mitigate Burnout

Sheila Hamilton headshot

Sheila Hamilton

Mental Health Thought Leader and Author of "All the Things We Never Knew"

Guest Speaker

Today’s CISOs face daunting challenges. It is a balance between fighting off increasingly sophisticated attacks, managing scarce resources, and working with stakeholders that often don't understand the inevitability of a breach. Since there continues to be a knowledge gap about the criticality of the CISO’s role, it is no surprise that they’re experiencing stress and burnout at unprecedented rates. How can CISOs make their careers sustainable and maintain a sense of well-being?

Join this keynote to explore:

  • How to recognize the signs and symptoms of toxic stress and burnout.
  • How to remain engaged, energized, and focused during turbulent times
  • Methods to reduce stress at work and how to not let the stress overlap into personal lives
  • Mindfulness strategies that can help alleviate burnout
  • How to model work-life balance for Gen y and Gen z

9:00am - 9:15am  Break

9:15am - 10:00am  Breakout Session

Office Hours with Sheila Hamilton

Sheila Hamilton headshot

Sheila Hamilton

Mental Health Thought Leader and Author of "All the Things We Never Knew"

Guest Speaker

The statistics are alarming about those who work in security - high rates of substance abuse, short tenure at jobs, and unhealthy levels of stress. How can CISOs make their careers sustainable and maintain a sense of well-being?

During office hours with Sheila Hamilton, you will learn:

  • How to assess and prioritize your mental health
  • Methods to reduce stress in careers
  • How to communicate the importance of mental health within your organization

9:15am - 10:00am  Executive Boardroom

Keeping the Cloud Clean

Dave Snyder headshot

Dave Snyder

Chief Information Security Leader

Independence Blue Cross

Paul Lynch headshot

Paul Lynch

Director, Information Security Officer


As the world continues to shift, the most common security challenges faced in the cloud stem from misconfigurations, the need for continuous compliance, and an exploding set of cloud infrastructure services. Whether you are migrating to cloud or building up cloud-native applications, getting basic hygiene right is the first step to building in the cloud with confidence. 

Join this session to discuss:

  • Best practices for securing your infrastructure, applications, and data across hybrid and multi-cloud environments 

  • How to operate your cloud environment without misconfigurations 

  • The most common attacks and how do you protect your business from application security threat

9:15am - 10:00am  Executive Boardroom

Vulnerability Management – Prioritizing Zero-Day Threats

Corey Bodzin headshot

Corey Bodzin

Chief Technology Officer


Dan Walsh headshot

Dan Walsh



Chris Wolfe headshot

Chris Wolfe

Director IT GRC

Main Line Health

Monique St. John headshot

Monique St. John

Chief Technology and Security Officer

Children's Hospital of Philadelphia

Identifying, classifying, and mitigating vulnerabilities continue to be a cornerstone of CISOs overarching risk management strategy. But how are you prioritizing and mitigating zero-day vulnerabilities?

Join this boardroom discussion to learn how to:

• Ensure you have visibility of your organization’s assets, threats, and vulnerabilities

• Decrease your time to remediate vulnerabilities by leveraging new approaches, tools, and people

• Profile assets by function, services, environment, and life cycle

10:00am - 10:30am  Networking Break

10:30am - 11:15am  Breakout Session

The Modern CISO- Managing Scale, Building Trust and Enabling the Business

Mark Odom headshot

Mark Odom

Vice President & CISO

Jefferson Health

The role of the CISO is being rapidly elevated to a strategic business leader and CISOs now have a better seat at the table. From risk managers to business enablers and beyond, CISOs must effectively translate their value and importance to the board.

 Join Mark Odom, CISO, Jefferson Health as he discusses: 

  • A security-first approach
  • Tools and methods to contextualize security in your business strategy and objectives
  • Approaches for effective business enablement & partnership with other executives

10:30am - 11:15am  Executive Boardroom

What Matters Most for Your Security Operations

Yanek Korff headshot

Yanek Korff

Co-Founder, COO


Chris Campbell headshot

Chris Campbell

Executive Director, Chief Information Security Officer

Fs Investments

David Sherry headshot

David Sherry


Princeton University

Since cybercriminals never rest, a sound SOC - staffed by the right people using the right tools in the right way - should be a key part of your cyber defense strategy. Whether your security operations program is completely in-house, outsourced, or operating in a hybrid model you’ll want to measure its effectiveness. How do you think about measuring efficacy and how do these metrics feedback into your program to increase operational maturity over time?

In this session you will discuss:

  • Volume and trend metrics that speak to effectiveness; what does good look like?
  • How does automation come into play and how do you monitor what the robots are doing?
  • What impact does this have on hiring and ongoing job satisfaction?

10:30am - 11:15am  Executive Boardroom

Manage Security Posture and Risk Across SaaS Environments

Brandon Conley headshot

Brandon Conley



Todd Bearman headshot

Todd Bearman

Chief Information Security Officer

TE Connectivity

Randy Nitowski headshot

Randy Nitowski

IT Director, Infrastructure

Subaru of America

As the adoption of enterprise SaaS grows, high-profile SaaS application data breaches are also on the rise. CISOs are ultimately responsible for the security of their organization’s data and must implement appropriate security settings for their environments. The challenge is that the most widely-used gateway architecture solutions don’t deliver visibility into the complex, unique characteristics of different SaaS applications.

Join this Boardroom to discuss:

  • How to better secure your organization’s SaaS data
  • How to understand the similarities and differences between your Public Cloud and SaaS security postures, and how to standardize security across your clouds
  • How to gain immediate visibility into what data can be accessed by all types of users and integrations

11:15am - 11:25am  Break

November 9, 2021 - mid-afternoon

11:25am - 12:40pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:45am - 1:15pm  Lunch Service

12:40pm - 1:00pm  Break

1:00pm - 1:05pm  Lunch Comments

1:05pm - 1:35pm  Keynote

Benchmarking Session - Protect your Data or Pay the Price?

Paul Lynch headshot

Paul Lynch

Director, Information Security Officer


The risk of attacks is top-of-mind for all organizations today as threat actors become more sophisticated and their impact increasingly detrimental. Cybersecurity professionals must have the right strategy and tools in place to prevent, detect and respond quickly to breaches to avoid reputational risk or paying a hefty sum.

Join this benchmarking session to discuss:

  • Taking ransomware protection to the next level

  • Strategies to defend against bad actors 

  • Challenges and best practices in managing major security events

1:35pm - 1:50pm  Break

November 9, 2021 - afternoon

1:50pm - 2:35pm  Executive Boardroom

Automate your detection, hunting, and triage lifecycle: Move from tactical to strategic

Jim Carty headshot

Jim Carty

Chief Security Officer, Philadelphia Division

Federal Bureau of Investigation

Mark Eggleston headshot

Mark Eggleston


CSC Global

The threat detection, hunting, and triage lifecycle is an iterative process that organizations must start to automate if they want to stop threats before adversaries start developing new tactics and techniques. CISOs need to have clear visibility into their threat coverage and priorities to make informed decisions based on unique environments and organizational priorities while enabling all teams to reduce cost and risk to the business.

Join this session to learn:

  • How teams can build a narrative across millions of logs in minutes and visualize high-fidelity alerts
  • How automating detection, hunting and triage can help accelerate business priorities and stop security from being a bottleneck
  • How to adopt repeatable processes to re-evaluate and validate detection, hunting, and triage processes with formalized frameworks

1:50pm - 2:35pm  Breakout Session

Pen Test your Board Pitch 2.0 - An Interactive Exercise

Nancy Hunter headshot

Nancy Hunter


Federal Reserve Bank of Philadelphia

Pitching to the board is a skill that must be mastered. CISOs are tasked to use visuals, communicate business value and synthesize complex information in a way that makes sense. Join this interactive session to identify the holes in your board pitch—and improve them for the next time you’re in the hot seat.

In this interactive session, you will work in a group to:

  • Create and deliver a board pitch
  • Receive real-time feedback on your pitch
  • Learn best practices and strategies for communicating with your board

1:50pm - 2:35pm  Executive Boardroom

From Zero Trust to Zero Touch with Intelligent Security

Jason Garbis headshot

Jason Garbis

Author of the Zero Trust Security Guide & Chief Product Officer


Tammy Klotz headshot

Tammy Klotz


Covanta Energy

Arvin Bansal headshot

Arvin Bansal

Sr. Director Data & Cloud Security


Organizations are challenged to strike a balance between security teams who want a Zero Trust approach and employees who desire seamless Zero Touch access. Bridging that gap is Artificial Intelligence and a Zero Trust Architecture.

Join this session to discuss:

  • Why the view of endpoints impacts how they’re secured and managed
  • How adaptive security and artificial intelligence can protect all endpoints
  • The goal of increasing security while acknowledging other factors

2:35pm - 3:05pm  Networking Break

3:05pm - 3:50pm  Executive Boardroom

Defend the Endpoint, Protect the Center

Todd Bearman headshot

Todd Bearman

Chief Information Security Officer

TE Connectivity

The proliferation of devices over the last decade has radically increased how many endpoints companies are responsible for, and traditional endpoint protection is no longer up to the task. How can an organization maintain the fundamentals of endpoint security — and security in general — while embracing new technologies and strategies like machine learning and big data analytics?

Join fellow CISOs as they discuss:

  • Successes and challenges in keeping users secure at all times
  • Leveraging new technologies to quantify threats and assess impacts
  • Common pitfalls in securing large numbers of remote users

3:05pm - 3:50pm  Breakout Session

Hacking the Cyber Talent Squeeze

Mark Eggleston headshot

Mark Eggleston


CSC Global

Kim Gray headshot

Kim Gray

Global Chief Privacy Officer


CISOs globally are struggling with technology outpacing the availability and skill development of their talent. What does it take to create opportunities for the next generation to thrive in a security career?

Join this breakout session to discuss:

  • What it takes to identify, develop, and retain diverse talent
  • Strategies to measure the capabilities of your team based on talent versus tenure
  • Upskilling and reallocating talent to meet changing demand

3:05pm - 3:50pm  Executive Boardroom

Manging Third Party and Supply Chain Risk

Vincent Miller headshot

Vincent Miller



Ankit Patel headshot

Ankit Patel



Today’s increasingly complex and interconnected supply chain creates more opportunities than ever for malicious actors to cause damage to your business. Third-party data breaches are at an all-time high, and legacy approaches to third-party risk management can’t keep up.

Join this boardroom to explore: 

  • Continuous assessment and monitoring of third parties and supply chain partners 
  • How to create an accurate inventory of all vendors within your ecosystem
  • What to do when your third party gets breached

3:50pm - 4:05pm  Break

4:05pm - 4:10pm  Closing Comments

4:10pm - 4:40pm  Keynote

To Community and Beyond

Tammy Klotz headshot

Tammy Klotz


Covanta Energy

Reginald Williams headshot

Reginald Williams

Chief Information Security Officer

The Chemours Co

Arvin Bansal headshot

Arvin Bansal

Sr. Director Data & Cloud Security


As the 11th year of Evanta Philadelphia CISO events comes to a close, let's take some time to reflect on the true purpose of these gatherings and the opportunities that surround you. Hear from influential governing body members on their advice on how to get the most out of our community gatherings and beyond.

Come together with the Philadelphia Governing Body to discuss:

  • Expanding your circle through community networking
  • How to lean on one another during the difficult times
  • The future goals for expanding your personal network

4:40pm - 5:10pm  Closing Reception & Prize Drawing


Returning to in-person conferences

We are excited to welcome you back, in person, to Evanta gatherings.

As previously shared, Evanta will hold in-person programs only in locations that meet our stringent health and safety criteria to help ensure the well-being of our participants, partners, and our associates. These criteria include adhering to government, venue, and health agency guidelines, in addition to taking all practical safety precautions onsite.

Please note that our onsite planning will continue to evolve, and all measures are subject to change to ensure the best and safest possible experience. Please refer to our COVID-19 Health and Safety Protocols for up-to-date local guidelines.



A block of rooms has been reserved at the Hilton Philadelphia at Penn's Landing at a reduced conference rate. Reservations should be made online or by calling 1-888-225-9664. Please mention CISO Executive Summit to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $189 USD (plus tax) is November 4, 2021.

Your Community Partners

Key Partners
Program Partners

Philadelphia CISO Program Manager

For inquiries related to this event, please reach out to your dedicated program contact.

Spencer Bisgaard

Program Manager