Philadelphia CISO Executive Summit

November 9, 2021 | Hilton Philadelphia at Penn's Landing

November 9, 2021
Hilton Philadelphia at Penn's Landing


Collaborate with your peers

Get together with Philadelphia's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Accelerating security to match the pace of digital business initiatives

Managing the risk created from a landscape of new core technologies

Achieving sustainability for the CISO role without compromising outcomes

Philadelphia CISO Governing Body

The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.


Todd Bearman

TE Connectivity
Chief Information Security Officer

Mark Eggleston

Health Partners Plans

Anahi Santiago

Christiana Care

Dave Snyder

Independence Blue Cross
Chief Information Security Leader

Alden Sutherland

VP, Chief Information Security Officer

Reginald Williams

The Chemours Co
Chief Information Security Officer

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Philadelphia CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.


Executive Boardroom Sessions

Keeping the Cloud Clean

As the world continues to shift, the most common security challenges faced in the cloud stem from misconfigurations, the need for continuous compliance, and an exploding set of cloud infrastructure services. Whether you are migrating to cloud or building up cloud-native applications, getting basic hygiene right is the first step to building in the cloud with confidence. 

Join this session to discuss:

  • Best practices for securing your infrastructure, applications, and data across hybrid and multi-cloud environments 

  • How to operate your cloud environment without misconfigurations 

  • The most common attacks and how do you protect your business from application security threat

Executive Boardroom hosted by Deepwatch

Session details coming soon! 

What Matters Most for Your Security Operations

Since cybercriminals never rest, a sound SOC - staffed by the right people using the right tools in the right way - should be a key part of your cyber defense strategy. Whether your security operations program is completely in-house, outsourced, or operating in a hybrid model you’ll want to measure its effectiveness. How do you think about measuring efficacy and how do these metrics feedback into your program to increase operational maturity over time?

In this session you will discuss:

  • Volume and trend metrics that speak to effectiveness; what does good look like?
  • How does automation come into play and how do you monitor what the robots are doing?
  • What impact does this have on hiring and ongoing job satisfaction?

Manage Security Posture and Risk Across SaaS Environments

As the adoption of enterprise SaaS grows, high-profile SaaS application data breaches are also on the rise. CISOs are ultimately responsible for the security of their organization’s data and must implement appropriate security settings for their environments. The challenge is that the most widely-used gateway architecture solutions don’t deliver visibility into the complex, unique characteristics of different SaaS applications.

Join this Boardroom to discuss:

  • How to better secure your organization’s SaaS data
  • How to understand the similarities and differences between your Public Cloud and SaaS security postures, and how to standardize security across your clouds
  • How to gain immediate visibility into what data can be accessed by all types of users and integrations

When Ransomware Strikes, Will You Be Ready?

IT leaders across the globe are asking themselves that question as ransomware grows increasingly prevalent and as attackers continue to raise their demands. It may seem difficult to prioritize building out your recovery plan when you could spend that time focused on increasing defensive measures but recovering from ransomware is not a process you want to wing.

Join this session to discuss:

  • Step-by-step guidance for navigating ransomware response protocols.
  • Key pitfalls most organizations make when attempting a ransomware recovery and how to avoid them.
  • How to build a foundation for developing a thorough, practical, and well-documented plan of action.

Manging Third Party and Supply Chain Risk

Today’s increasingly complex and interconnected supply chain creates more opportunities than ever for malicious actors to cause damage to your business. Third-party data breaches are at an all-time high, and legacy approaches to third-party risk management can’t keep up.

Join this boardroom to explore: 

  • Continuous assessment and monitoring of third parties and supply chain partners 
  • How to create an accurate inventory of all vendors within your ecosystem
  • What to do when your third party gets breached

Breakout Sessions

The Modern CISO- Managing Scale, Building Trust and Enabling the Business

The role of the CISO is being rapidly elevated to a strategic business leader and CISOs now have a better seat at the table. From risk managers to business enablers and beyond, CISOs must effectively translate their value and importance to the board.

 Join Mark Odom, CISO, Jefferson Health as he discusses: 

  • A security-first approach
  • Tools and methods to contextualize security in your business strategy and objectives
  • Approaches for effective business enablement & partnership with other executives

Pen Test your Board Pitch 2.0 - An Interactive Exercise

Pitching to the board is a skill that must be mastered. CISOs are tasked to use visuals, communicate business value and synthesize complex information in a way that makes sense. Join this interactive session to identify the holes in your board pitch—and improve them for the next time you’re in the hot seat.

In this interactive session, you will work in a group to:

  • Create and deliver a board pitch
  • Receive real-time feedback on your pitch
  • Learn best practices and strategies for communicating with your board

Keynote Sessions

Stress and the CISO — Practical Strategies to Mitigate Burnout

Today’s CISOs face daunting challenges. It is a balance between fighting off increasingly sophisticated attacks, managing scarce resources, and working with stakeholders that often don't understand the inevitability of a breach. Since there continues to be a knowledge gap about the criticality of the CISO’s role, it is no surprise that they’re experiencing stress and burnout at unprecedented rates. How can CISOs make their careers sustainable and maintain a sense of well-being?

Join this keynote to explore:

  • How to recognize the signs and symptoms of toxic stress and burnout.
  • How to remain engaged, energized, and focused during turbulent times
  • Methods to reduce stress at work and how to not let the stress overlap into personal lives
  • Mindfulness strategies that can help alleviate burnout
  • How to model work-life balance for Gen y and Gen z<

To Community and Beyond

As the 11th year of Evanta Philadelphia CISO events comes to a close, let's take some time to reflect on the true purpose of these gatherings and the opportunities that surround you. Hear from influential governing body members on their advice on how to get the most out of our community gatherings and beyond.

Come together with the Philadelphia Governing Body to discuss:

  • Expanding your circle through community networking
  • How to lean on one another during the difficult times
  • The future goals for expanding your personal network


Returning to in-person conferences

We are excited to welcome you back, in person, to Evanta gatherings.

As previously shared, Evanta will hold in-person programs only in locations that meet our stringent health and safety criteria to help ensure the well-being of our participants, partners, and our associates. These criteria include adhering to government, venue, and health agency guidelines in addition to taking all practical steps on-site.

Please note that our onsite planning will continue to evolve, and all measures will be subject to change to ensure the best and safest possible experience. Please see below (under ‘more information’) for our current approach and planned onsite safety measures.



Your Community Partners

Key Partners
Program Partners

Philadelphia CISO Program Manager

For inquiries related to this event, please reach out to your dedicated program contact.

Spencer Bisgaard

Program Manager