St. Louis CISO Virtual Executive Summit

December 16, 2020 | 8:00am - 1:15pm CST

December 16, 2020 | 8:00am - 1:15pm CST


Collaborate with your peers

Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the St. Louis CISO Virtual Executive Summit.

Join your peers to discuss the most critical issues impacting CISOs today:

The Future of the CIO & CISO

Redefining Personal Data Protection and Privacy

Pursuing New Digitally-Enabled Business Models


Joe Caro

Post Holdings

Kevin Hardcastle

Washington University in St. Louis

Dan Henke


Matt Modica

BJC HealthCare


December 16, 2020

8:00am - 8:45am CST Virtual Summit Keynote

Finding Success with Adopting a SASE Architecture

Jason Clark headshot

Jason Clark

Chief Strategy Officer


Dustin Wilcox headshot

Dustin Wilcox



Organizations are feeling a shift in the world of networking and security as they rapidly adopt and embrace the cloud. On-premises private data centers are no longer the place for data and workloads to exist. With this shift, security and networking are brought closer than ever. Enterprises need speed, visibility, security and reliability without compromise. Enter, the secure access service edge, better known as SASE. This evolved concept of cloud security architecture outlines a convergence of multiple security functions to offer identity-based secure access. How can your organization best position itself for the transition?

In this session, you will discuss:

  • Problems SASE can address in the modern enterprise
  • Benefits of moving to a SASE architecture
  • Insights from organizations adopting SASE today

8:45am - 9:00am CST Break

9:00am - 10:00am CST Virtual Summit Boardroom

How to Transform to a NextGen Data Center

Stacy Mill headshot

Stacy Mill

Chief Technology Officer

State of Kansas

As technology continues to evolve in a changing world, IT leaders are often asked to increase speed to execution and operational cost optimization. Technical debt and complexity can act as barriers to these goals, but with the right strategy, CIOs can meet the needs of the enterprise.

This interactive boardroom will discuss:

  • Assessing the infrastructure and determining what is possible
  • Developing the strategy and execution plan
  • Understating all of the critical success components around cost, networking, security, governance, disaster recovery, cloud, and colocation facilities

9:00am - 10:00am CST Virtual Summit Boardroom

Boardroom Session

Details coming soon.

9:00am - 10:00am CST Virtual Summit Boardroom

RPA – Automation’s Golden Age

Steve Kappel headshot

Steve Kappel

Chief Information Officer

Safety National

Toss out the manual on redundancies in the business process; RPA is automating its way to greater efficiencies and a brighter bottom line. This peer-to-peer discussion is a mix of RPA advocates, early adopters and outside observers — joining forces to learn from each other and explore:

  • How peers have deployed RPA— what has worked and what needs work
  • How to measure the return on investment for automated processes
  • How automation is being successfully deployed across the enterprise
  • How to overcome human barriers — such as employee engagement ­and leadership buy-in — to realize the full potential of RPA

10:00am - 10:45am CST Virtual Summit Keynote

Accelerate Your Secure Digital Transformation

Jay Chaudhry headshot

Jay Chaudhry

CEO, Chairman & Founder


Bruce Lee headshot

Bruce Lee


Centene Corporation

The cloud and mobility are powerful enablers of digital transformation, but many organizations are grappling with legacy architectures that haven't evolved much in decades. With most applications in the cloud and employees working remotely, legacy network and security models are not only ineffective, but they hinder your ability to take advantage of the agility, productivity, efficiency, and speed enabled by digital transformation. Network and security architectures need to evolve to securely connect any entities—users, devices, applications—to meet business needs in the digital era.

In this session, Zscaler CEO Jay Chaudhry talks with Bruce Lee of Centene, who will discuss how Centene's digital transformation has made the company more resilient, enabling its entire staff to work remotely with minimal disruption and no compromising on security.

  • “Owning the moment”: IT’s opportunity to accelerate secure digital transformation
  • Best practices for securing work-from-anywhere using Gartner’s secure access service edge (SASE) and zero trust network access (ZTNA) frameworks
  • What comes next: IT’s new role as strategic business enabler

10:45am - 11:00am CST Break

11:00am - 12:00pm CST Virtual Summit Boardroom

Creating a Secure, Digital, and Modern Environment

Gary Harbison headshot

Gary Harbison

Global CISO

Bayer Corporation

Bill Lapp headshot

Bill Lapp

Solution Architecture, Global Leader


Information security is now, more than ever, playing a role in the organization’s mission to make security personal and collaborative. How are CIOs partnering with CISOs to help establish a security strategy that is an enabler of the digital business rather than an obstacle?

In this interactive session, you’ll discuss:

  • How the security team can enable strategy and be a successful partner with the IT team
  • Best practices for organizational change management
  • Create a communication strategy that ties security to organizational success

11:00am - 12:00pm CST Virtual Summit Boardroom

Bracing for Seismic Shifts – Meeting the Demands of the Business

Tom Henry headshot

Tom Henry

Chief Data & Analytics Officer


2020 forced technologists to innovate and work smarter [and faster] to meet increased business demands. To succeed, leaders were forced to become flexible and accommodating in delivering new digital and data solutions to their organizations at lightspeed, inciting endless channels of demand. Join your peers in a focused discussion on how to best leverage newfound operating structures/models and manage a rising need for speed, delivery, and value.

Join this virtual boardroom conversation to explore:

  • Riding the current momentum to influence and advance the enterprise
  • Balancing increased demands with the imperative of tangible business outcomes
  • Increasing the pace and reducing friction points in new technology and feature, functionality adoption
  • Implementing data and analytic strategies that inform and facilitate desired business outcomes

11:00am - 12:00pm CST Virtual Summit Boardroom

The Continual Shifting of Threats

Craig Byrkit headshot

Craig Byrkit

VP, Global Information Security and Privacy Officer

Reinsurance Group of America

Aman Raheja headshot

Aman Raheja



Whether it’s cybercriminals motivated by profit or nation-state attackers with geopolitical motives, public and private organizations of all sizes have felt the impact of cyberattacks. Enterprise organizations are reeling from the onslaught of massively spread ransomware attacks to surgical pinpointed attacks on their assets from sophisticated state-sponsored actors. How can CISOs best face changing threat vectors?

Join this roundtable conversation to discuss:

  • The current threat landscape and development on ransomware attacks
  • How to best discover and prevent nation-state attacks
  • What security executives can do to build resiliency

12:00pm - 12:45pm CST Virtual Summit Keynote

Cloud Strategies to Power Digital Transformation

Hillery Hunter headshot

Hillery Hunter

CTO, IBM Cloud


The most successful businesses today connect digital transformation to business goals using innovative technology and increasing moving more of their enterprise workload to the Cloud. CIOs are charged with clearing adoption hurdles to align mission-critical tasks and business priorities with the multiple cloud environments.

This interactive session explores:

  • Case studies on successful transformations using open, flexible, and secure multicloud operating environments
  • Fostering digital transformation and creating a competitive advantage through a hybrid cloud strategy
  • Accelerating the skills and culture that leverages AI and cloud

By registering for this session, this serves as your authorization to Evanta or its vendor to provide your contact information to IBM to follow up on your interaction and participation. IBM’s use of your contact information is governed by the IBM Privacy Policy. If you need more information on how IBM is using your personal data you may refer to the IBM Privacy Statement. To withdraw your marketing consent and unsubscribe to receiving emails click on the unsubscribe button at this address:

12:45pm - 1:15pm CST Networking

Community Discussion

An informal and interactive opportunity for you to network with peers in small groups. 


Your Community Partners

CISO Thought Leader
Program Partner

St. Louis CISO Program Manager

For inquiries related to this event, please reach out to your dedicated program manager.

Josh Rybak