Philadelphia CISO Executive Summit

November 15, 2022 | Hilton Philadelphia at Penn's Landing

November 15, 2022
Hilton Philadelphia at Penn's Landing

Collaborate with your peers

Get together with Philadelphia's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Elevating the security practice and CISO role into strategic partners who manage cyber risk

Maturing IAM roadmaps and infrastructure to become more resilient against evolving demands

Evolving traditional approaches and technologies in response to the expanding attack surface

Philadelphia CISO Governing Body

The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Todd Bearman

TE Connectivity
Chief Information Security Officer

Mark Eggleston

CSC Global

Anahi Santiago

Christiana Care

Reginald Williams

The Chemours Co
Chief Information Security Officer

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Philadelphia CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.


November 14, 2022

November 15, 2022

6:00pm - 8:30pm  Governing Body Welcome Reception

Governing Body Welcome Reception — Casino Night!

The Governing Body of Philadelphia CISOs and invited guests are welcome to join us for a fun, interactive spin on the annual Governing Body Welcome Reception. Casino Night at Hilton Philadelphia at Penn's Landing will feature table games, food and drinks to kick off our “By CISOs, For CISOs” executive gathering.

11:20am - 12:05pm  Breakout Session

Blazing the Trail for a Neurodiverse Workforce

Mark Odom headshot

Mark Odom

Vice President & CISO

Jefferson Health

Wendy J. Ross headshot

Wendy J. Ross

Director, Center for Autism & Neurodiversity

Jefferson Health

 Research shows that highly diverse teams are more innovative and productive, but it's no secret that IT and cybersecurity positions have a diversity shortage. CISO’s have an opportunity to ignite change and create a space for the neurodiverse community.

 Join this session for an in-depth and candid conversation with Mark Odom, and Dr. Wendy J. Ross to discuss:

  • How their neurodiversity program accelerates innovation and business through diversity and inclusion
  • What it takes to support, develop, and retain neurodiverse talent
  • Setting a vision and architecting the diverse IT workforce of the future

11:20am - 12:05pm  Executive Boardroom

Zero Trust – Hype or Hope?

Jai Arun headshot

Jai Arun

Sr. Director, Strategy & Product Mgmt., Cybersecurity, Cloud and Cognitive Solutions


Monique St. John headshot

Monique St. John

Chief Technology and Security Officer

Children's Hospital of Philadelphia

Andre Jenkins headshot

Andre Jenkins

Deputy Chief Information Security Officer (CISO)

University of Pennsylvania

An organization's ability to achieve successful digital transformation is in large part enabled by the security team. Distributed, loosely connected infrastructure and tools, coupled with the demand for almost any-to-any connectivity, complicates the mission. Regularly defined as being delivered by a single "silver bullet" point solution, the term zero trust is now often held in poor regard. It is however, a highly effective conceptual framework, and perhaps even a cultural shift, that many organizations have been working with for several years.

Join this interactive boardroom to discuss:

  • The broader definition of what a zero trust framework is
  • The foundational control required to build a zero trust program
  • Strategies for improving the user experience and proving value to get organization wide acceptance

11:20am - 12:05pm  Executive Boardroom

The Indispensable Human Element of Cybersecurity

Michael Leland headshot

Michael Leland

Chief Cybersecurity Evangelist


Muhammad Sheikh headshot

Muhammad Sheikh

Head of Information Security

Five Below

Artificial Intelligence is a pervasive part of our lives today and cybersecurity teams and adversaries alike have learned to harness the speed and power of machines to strengthen their capabilities. With machine learning becoming one of the most important tools of defense, leaders must balance the overwhelming speed and accuracy advantages of AI with the need for measured and intuitive interactions with a real-world human element. 

Join this session to discuss:

  • What these trends mean for the hands-on practitioner
  • When the velocity of innovation outpaces the capabilities of human intellect
  • The role of automation in the effective practice of securing our digital world

12:05pm - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

Three Keys To Zero Trust — Isolation, People, and Productivity

Mike Schaeffer headshot

Mike Schaeffer

HP Wolf Security Strategy Architect

HP Inc.

How can CISOs adapt and enable business agility without compromising security? In the wake of widespread cloud adoption and ubiquitous remote workers, traditional network and security systems have failed to keep pace. Patch management and user productivity are two critical gaps CISOs must solve, but with such complexity, solutions can be challenging to find.

Join this discussion to learn how others are taking a Zero Trust approach to:

  • Layered and diverse strategies that are critical in today’s market
  • The latest landscape for Zero Trust and identity governance best practices and challenges
  • Strategic considerations for securing remote work

1:10pm - 1:25pm  Break

1:25pm - 2:10pm  Breakout Session

Buzzers Over Buzzwords

Donna Ross headshot

Donna Ross

EVP & Chief Information Security Officer

Radian Group

What's your community's top priority? What do your C-Level peers consider the largest hurdle in when it comes to accomplishing their goals? In this fun, highly-interactive, game-show-style session, we'll put your knowledge to the test. 

Come on down to:

  • Compete in a data-driven, community-specific quiz game
  • Learn more about the struggles and opportunities reported by members of your governing body
  • Share and expand on these reported goals and challenges

1:25pm - 2:10pm  Breakout Session

Managing Identity – No Access without Context

Benjamin Corll headshot

Benjamin Corll

CISO - Americas


Identity is not the new perimeter, but rather identity is a nexus for context and context is the new perimeter. Zero trust principles woven throughout your IAM strategy in today’s work-from-anywhere environments can be the key to protecting the business across people, devices and applications. As context becomes more complex and the perimeter is ever-evolving, how do you build a defense structure capable of protecting users and the business?

In this session, you will explore:

  • The role of zero trust in identity and access management
  • How to implement IAM tools without negatively impacting the user experience or core business operations
  • How to engage other stakeholders and functions on their access needs to move beyond surface-level coordination

1:25pm - 2:10pm  Executive Boardroom

Manage Security Posture and Risk Across SaaS Environments

Tim Bach headshot

Tim Bach

Vice President of Engineering


Steven Odhiambo headshot

Steven Odhiambo

VP of Internal Audit

Freedom Mortgage

Michael DaGrossa headshot

Michael DaGrossa

Senior Director, Information Security

Genesis HealthCare

As the adoption of enterprise SaaS grows, high-profile SaaS application data breaches are also on the rise. CISOs are ultimately responsible for the security of their organization’s data, including access by third party applications, and must implement appropriate security settings and data governance for their environments. The challenge, the most widely used gateway architecture solutions don’t deliver visibility into the complex, unique characteristics of different SaaS applications.

Join this Boardroom to discuss:

  • How to gain immediate visibility into what data can be accessed by all types of users and integrations, including third party applications
  • How to build the business case for a comprehensive SaaS security program, including funding sources
  • How to integrate security into the Software Development Lifecycle to improve DevSecOps during the product development process

1:25pm - 2:10pm  Executive Boardroom

What Are We Doing? ⁠— The Current and Future Cyber Insurance Climate

Matt Cerny headshot

Matt Cerny

Sr Manager, Security Operations

Integra Life Sciences

Mark Purcell headshot

Mark Purcell

Exec Dir of Info Sec & Compliance

La Salle University

The Cyber insurance application process is taking longer and has become more complicated in the last few years. Premiums are rising. Leaders from organizations big and small are questioning the value of Cyber insurance. 

Join this session for:

  • Different perspectives on the changing cyber insurance industry
  • A chance to troubleshoot your cyber insurance concerns
  • Open conversations about the struggles and benefits of investing in cyber insurance

8:15am - 8:45am  Registration & Breakfast

8:45am - 9:30am  Keynote

Stress Management Strategies for Effective Leadership

Oluyinka Ajirotutu headshot

Oluyinka Ajirotutu

Stress Management & Lifestyle Change Expert

Guest Speaker

According to the American Psychological Association (APA), there are an unprecedented number of employees struggling with stress and mental health concerns that negatively impact their work and home life. The skill of stress management is more important than ever for leaders to motivate and support their teams effectively while sustaining personal wellbeing.  

Join this interactive keynote to:  

  • Understand the critical role leaders play regarding stress management that can improve employee morale, retention and productivity
  • Learn key strategies to reduce stress, overcome burnout and develop resilience in the face of challenges
  • Develop a comprehensive stress management plan that will result in long-term wellbeing and enhanced quality of life

9:30am - 10:00am  Networking Break

10:00am - 10:45am  Breakout Session

Let's Talk About Compliance

Kristin Jones headshot

Kristin Jones

Senior Counsel


Jana Landon headshot

Jana Landon

Chief Privacy Officer

Lincoln Financial Group

New regulations, and some organizations' failure to meet them, have resulted millions of dollars in fines. We are entering a new era —one in which governments and regulatory agencies have more oversight of cybersecurity incidents. Now is the time to recognize the renewed importance of privacy and regulatory compliance.

Join Jana Landon, Chief Privacy Officer at Lincoln Financial Group and Kristin J. Jones, Senior Counsel at CVS Health to discuss:

  •  The importance of compliance
  • Upcoming regulations and laws affecting CISOs
  •  C-Suite liability and information security risk

10:00am - 10:45am  Executive Boardroom

Defend the Endpoint — Accelerate Recovery

Jeff Worthington headshot

Jeff Worthington

Executive Strategist and Cyber Advisor


Michael DiLoreto headshot

Michael DiLoreto

Sr. Director, Information Risk Management & BISO Services

Anywhere Real Estate

Eric Zematis headshot

Eric Zematis


Lehigh University

Adversaries are increasingly fast and stealthy, don’t respect time zones or holidays, and often execute damaging intrusions in hours.  Every second matters when under attack and the first steps taken in the wake of a threat can determine success or downtime and disruption. How are you ensuring you have the tools and processes to protect your endpoints and the organization from today’s threats?

Join this interactive discussion for strategies to:

  • Deploy the right endpoint security tools to stop an adversary with speed
  • Identify resources to appropriately implement, operate and maintain an effective security program
  • Secure critical applications even in a state of compromise

10:00am - 10:45am  Executive Boardroom

Full Speed Ahead — Preventing Cyber Disruption while Accelerating Growth

Jeffrey Gardner headshot

Jeffrey Gardner

Practice Advisor of Detection & Response


Helane Stein headshot

Helane Stein


Brixmor Property Group

Businesses continue to double down on Cybersecurity spending, but companies are still getting hacked. It may be time to consider an alternate operating model. One that will increase ROI, remove complexity, cut down risk, and create significant value for your stakeholders.

Join this session to discuss:

  • How to radically transform your operating model
  • Ways to prevent cyber disruption and accelerate growth
  • Insights into a cybersecurity profit and loss readiness toolkit

10:45am - 11:20am  Networking Break

10:50am - 11:15am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

2:10pm - 2:45pm  Networking Break

2:15pm - 2:40pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

2:45pm - 3:30pm  Breakout Session

Enabling Cyber Resiliency through Collaboration

Reginald Williams headshot

Reginald Williams

Chief Information Security Officer

The Chemours Co

Tracey Brand - Sanders headshot

Tracey Brand - Sanders


UGI Corporation

 Cybersecurity no longer exists exclusively to secure things — it's an integral part of an organization's overall strategy and ability to thrive. Today's CISOs must bring both business and security expertise to the table and build innovative programs that support long-term enterprise goals.

During this session you will explore:

  • Creating synergy between business and security initiatives to yield mutually beneficial outcomes
  • Helping to build a culture of risk awareness across all business units
  • Adopting a business mindset when advocating for and communicating security needs

2:45pm - 3:30pm  Executive Boardroom

Automation Isn’t Everything

Dave Snyder headshot

Dave Snyder

Chief Cloud Architect

Independence Blue Cross

Brad Carvellas headshot

Brad Carvellas

VP, Cybersecurity and Chief Information Security Officer


When it comes to security, automation should not be the end goal; it’s simply a means to an end. While security automation is certainly an incredibly valuable tool, it is just that: a tool. So how do you identify which areas of your security operation are the best candidates for automation, and which should stay in the hands of your team (at least for now)?

During this peer-discussion you will explore:

  • Creating a framework for evaluating automation use cases
  • Whether the “single pane of glass” vision of automation is truly achievable
  • Innovative ways other CISOs have used security automation

2:45pm - 3:30pm  Executive Boardroom

Risk – Measuring What Counts

Nancy Hunter headshot

Nancy Hunter

VP, Chief Information Security Officer

Federal Reserve Bank of Philadelphia

Lucas Burke headshot

Lucas Burke

Vice President, Information Security Governance, Risk & Compliance

Radian Group

Sophisticated enterprise risk management strategy is not necessarily the full mitigation of risk. For most information security executives, strategic risk management describes a cross-organizational framework to assess different areas of risk and determine when accepting those risks is in the net interest of the business. In order to inform strategy and accountability for risk management, CISOs must be able to leverage meaningful metrics and messaging.

Join this session to discuss:

  • Metrics that work – and don’t work – in describing information security risk
  • The role that the CISO plays in setting risk management strategy
  • Effective cross-functional partnerships in risk management

3:30pm - 3:45pm  Networking Break

3:45pm - 4:20pm  Keynote

Putting FUN into Security Culture: Focus, Unity & Needs

Paul Turcotte headshot

Paul Turcotte



Todd Bearman headshot

Todd Bearman

Chief Information Security Officer

TE Connectivity

Anahi Santiago headshot

Anahi Santiago


Christiana Care

Talent and skills shortages, hiring and retention dilemmas, etc. have many at their wit's end. But what happens when you create a culture that keeps them so engaged, they don't want to leave? Listen in and learn how CISOs are leveraging employee satisfaction and engagement to drive growth, increase operational efficiencies and boost productivity.

Join this Keynote to discover:

  • Attuning yourself to the needs of employees, teams, and the enterprise- big or small.
  • Mentoring a multigenerational workforce – creating operational excellence
  • Keeping the right people – thinking beyond retention

4:20pm - 4:50pm  Closing Reception & Prize Drawing

November 14, 2022

November 15, 2022

We look forward to seeing you at an upcoming in-person gathering



A block of rooms has been reserved at the Hilton Philadelphia at Penn's Landing at a reduced conference rate. Reservations should be made online or by calling 1-888-225-9664. Please mention Evanta Executive Summit to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $239 USD (plus tax) is October 24, 2022.

Your Community Partners

Global Thought Leader
CISO Thought Leader
Key Partners
Program Partners

Community Program Manager

For inquiries related to this community, please reach out to your dedicated contact.

Tim Bigley

Senior Program Manager – Territory Specialist