Philadelphia CISO Virtual Executive Summit

May 27, 2021 | 8:00am - 1:30pm EDT

May 27, 2021 | 8:00am - 1:30pm EDT

Collaborate with your peers

Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the Philadelphia CISO Virtual Executive Summit.

Join your peers to discuss the most critical issues impacting CISOs today:

Accelerating security to match the pace of digital business initiatives

Managing the risk created from a landscape of new core technologies

Achieving sustainability for the CISO role without compromising outcomes


Todd Bearman

TE Connectivity
Chief Information Security Officer

Mark Eggleston

Health Partners Plans

Anahi Santiago

Christiana Care

Dave Snyder

Independence Blue Cross
Chief Information Security Leader

Alden Sutherland

VP, Chief Information Security Officer

Reginald Williams

The Chemours Co
Chief Information Security Officer

What to Expect

Connect with your CISO community through a variety of different session formats at the upcoming Virtual Executive Summit. You'll have the opportunity to listen, engage and create lasting relationships with like-minded peers.


Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join intimate, interactive discussions with peers in Boardroom sessions.

Meet the Speakers

Don't miss this opportunity to meet with CISO practitioners and industry thought leaders who shared their insights on the agenda. Come with questions and get ready to meet new friends in this casual session designed to foster peer connections and collaboration in the Philadelphia community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. Be sure to opt in when you register and get matched based on your key priorities.


May 27, 2021

8:00am - 8:45am  EDT Virtual Summit Keynote

Navigating A People-Centric Approach to Security

Lucia Milica headshot

Lucia Milica

Global Resident CISO


With remote work, organizations around the world are at a greater risk of cyber threats than ever before, and cybercriminals are taking advantage of the situation. In this session, you will examine the biggest challenges security leaders face, and why a people-centric approach to security is everyone’s biggest opportunity to better protect their organization.

In this session, you will explore:

  • How remote work and the move to the cloud has changed the nature of threats to data
  • The ways in which organizations are building controls to better understand and protect their employees
  • The impact of changing behaviors, employee culture and workplace environment on people risk
  • How today’s threats are informing your data protection practices/controls

8:45am - 9:00am  EDT Break

9:00am - 10:00am  EDT Virtual Summit Boardroom

Driving Business Value With Cloud Security Innovation

Amy Claire Smith headshot

Amy Claire Smith

Executive Cloud Security Architect, IBM Security


Aaron Weismann headshot

Aaron Weismann


Main Line Health

Arvin Bansal headshot

Arvin Bansal

Sr. Director Data & Cloud Security


Whether you are just moving into the cloud, researching more options within the public cloud, or building your own private cloud, most leaders agree that this is the future of infrastructure as a service. But can CISOs have it all – both increased productivity and cost benefits within a secure cloud?

During this peer-discussion you will explore:

  • Automation, orchestration, AI and machine learning cloud strategies
  • Nuances for hybrid on- and off-premise systems
  • Ways to incorporate the cloud into a fully articulated security strategy

By registering for this session, this serves as your authorization to Evanta or its vendor to provide your contact information to IBM to follow up on your interaction and participation. IBM’s use of your contact information is governed by the IBM Privacy Policy. If you need more information on how IBM is using your personal data you may refer to the IBM Privacy Statement. To withdraw your marketing consent and unsubscribe to receiving emails click on the unsubscribe button at this address:

9:00am - 10:00am  EDT Virtual Summit Boardroom

Defeating Ransomware by Protecting Active Directory

Tony Cole headshot

Tony Cole


Attivo Networks

Randy Nitowski headshot

Randy Nitowski

IT Director, Infrastructure & Information Security

Subaru of America

Matt Cerny headshot

Matt Cerny

Sr Manager, Security Operations

Integra Life Sciences

The majority of corporate ransomware attacks involve the compromise of Active Directory and the SolarWinds Congressional hearings highlighted critical security gaps related to privilege escalation and lateral movement detection.  Defending against this stage 2 of an attack has escalated to atop 2021 priority for every CISO. Active Directory is inherently complex and insecure, and without the right tools to understand vulnerabilities and live attacks, comes with dire consequences when its control is lost to an attacker.

Join this session discuss methods to strengthen your defense strategy, including:

  • Why Active Directory is the attack vector of choice for 2021
  • How ransomware uses AD to accomplish their goals
  • How data cloaking conceals credentials, AD objects, and data to prevent lateral movement and derail attacks
  • What automated tools can be deployed to improve your security posture and accelerate detection of AD live attacks.

10:15am - 11:15am  EDT Virtual Summit Keynote

Securing the Supply Chain: Where Risk Meets Business

Guy Delp headshot

Guy Delp

Vice President, Global Information Security


Todd Bearman headshot

Todd Bearman

Chief Information Security Officer

TE Connectivity

Anahi Santiago headshot

Anahi Santiago


Christiana Care

Dave Snyder headshot

Dave Snyder

Chief Information Security Leader

Independence Blue Cross

Security threats have been around for decades, but lately the nature of those threats has changed - the security of supply chains has come to the forefront as an urgent issue for enterprises. CISOs understand that in this interlinked world, they’re only as secure as the weakest link in their supply chain.

Join this keynote to explore:

  • New approaches for managing third-party and supply chain partners
  • How much can, and should, CISOs control their supply chain
  • Tools and strategies that will help you make the best choices for your organization

10:00am - 10:15am  EDT Break

9:00am - 10:00am  EDT Virtual Summit Boardroom

Mitigating New Third Party Risks

Michael Ansel headshot

Michael Ansel



Tracey Brand - Sanders headshot

Tracey Brand - Sanders


UGI Corporation

Cheryl Flannery headshot

Cheryl Flannery

Sr. Director, Cloud, Security, and Infrastructure Architecture Practice Leader


Seth Shestack headshot

Seth Shestack

Deputy CISO

Temple University

Many third-party risks are identified after initial onboarding and due diligence, suggesting traditional methods in risk management policy fail to capture new and evolving risks. As these external partnerships become increasingly complex, the need for a new vendor risk management approach is clear.

Join this conversation to discuss:

•Establish business-driven methods for ongoing risk management analysis

•Partner across the C-Suite to establish organizational buy-in

•Strategies to employ an iterative approach to ongoing relationship management

11:15am - 11:45am  EDT Networking

Meet the Speakers

Don't miss this opportunity to meet with Philadelphia practitioners and industry thought leaders who shared their insights on the agenda. Come with questions and get ready to meet new friends in this casual session designed to foster peer connections and collaboration in the CISO community. 

11:45am - 12:00pm  EDT Break

12:00pm - 1:30pm  EDT Virtual Peer-to-Peer Meetings

Peer-to-Peer Meetings

Meet virtually for in-depth conversations with your colleagues

May 27, 2021

Your Community Partners

Key Partners
Program Partner

Community Program Manager

For inquiries related to this community, please reach out to your dedicated contact.

Spencer Bisgaard

Program Manager