IN-PERSON

Washington, DC CISO Executive Summit

June 13, 2024 | Convene at 1201 Wilson Blvd

June 13, 2024
Convene at 1201 Wilson Blvd

APPLY TO PARTICIPATE

Collaborate with your peers

Get together with Washington, DC's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Mitigating risks and improving efficiencies with cybersecurity strategies

Making data-driven decisions to improve business outcomes and allow for innovation

Improving communication to better align business goals with IT and security priorities

Washington, DC CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Washington, DC CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


June 12, 2024

June 13, 2024

6:00pm - 8:30pm  Networking

Governing Body Welcome Reception

Ahead of the Washington DC Executive Summit, Governing Body members will host an exclusive networking reception for CIO and CISO attendees that includes learning how to create craft cocktails and mocktails. Please join your peers for an evening of great drinks, wonderful food and lively networking.

7:45am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

Body Language Secrets for Enhanced Executive Presence

Chris Ulrich headshot

Chris Ulrich

Body Language Expert

Guest Speaker

Uncovering the mysteries of body language — how people communicate their thoughts and feelings without saying a word — is a decisive first step toward mastering any business and social situation. Top executives know that detecting split-second signals from your team and leadership then taking immediate action is crucial to being a persuasive communicator and problem-solver especially during tricky internal matters or high-level negotiations.

During this session you will learn how to:

  • Move beyond the vacuum of artificial body language to a behavioral approach based on YOU
  • Strengthen interpersonal relationships, be a more decisive leader and manage your nerves better
  • Uncover the less obvious needs of others and improve your team’s confidence and competence

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Building an AI-Powered and Secure Unstructured Data Strategy

Jenna Cline headshot

Jenna Cline

VP CIO Advisor

Box

Your unstructured data holds immense value in the files that define your business. To maximize the potential of this data, it's crucial to establish a comprehensive unstructured data strategy that prioritizes both security and AI integration.

Join this session to learn about:

  • Identifying your valuable unstructured data sources and tools
  • Developing robust security measures for internal and external data use
  • Balancing AI with stringent security and compliance protocols to increase utility

9:40am - 10:25am  Executive Boardroom

Threat Intelligence and Third-Party Risk – Doubling Down on Critical Vulnerabilities

John Chisum headshot

John Chisum

VP, Solutions Consulting

RiskRecon - A MasterCard Company

Nick Leshock headshot

Nick Leshock

CIO

General Dynamics

The complete entanglement of cyber risk with business risk is becoming increasingly more visible. CISOs now have an opportunity to better pinpoint third parties that present a threat to the organization. Yet the increasing complexities of third party, and even fourth party, risk management, prompted by a wide range of evolving threats, demands heightened attention. How can CISOs ensure they have a clear overview of the threat landscape and vulnerabilities across ecosystems and supply chains?

Join this session to discuss:

  • Identification of vulnerabilities across your vendor landscape to prioritize response efforts
  • Best practices for mitigating a new wave of sophisticated attacks to keep assets safe
  • The role threat intelligence plays in risk management strategies to safeguard your digital ecosystem

10:25am - 11:05am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:05am - 11:50am  Executive Boardroom

Preparing for Battle — Getting Ahead of Security Challenges of Tomorrow

Eric Ranta headshot

Eric Ranta

Director, Customer Value & Transformation Advisors

Google Cloud

Tony Parrillo headshot

Tony Parrillo

VP, Enterprise IT Global Head of Security

Schneider Electric North America

When it comes to GenAI and nascent technologies being rapidly adopted, CIOs and CISOs must be proactive and thorough in their planning efforts and essentially attempt to predict the future. Today, we know data, access control, and IP must be protected while delighting users amid a changing threat landscape. But what does tomorrow bring?

Join this session to explore:

  • How to take advantage of the AI opportunity while also developing a foundationally secure enterprise
  • Ways to ensure your data, policies, and practices are clean and secure to minimize the risk of AI usage
  • Developing guidelines and policies for enabling business leaders, employees, and customers to realize the AI opportunity

11:05am - 11:50am  Executive Boardroom

Optimizing Decision-Making with Advanced Analytics

The term "data-driven" is often used as a coveted descriptor for business excellence. But does this description hit the mark? A data-driven enterprise must convert trusted data while leaning heavily into predictive analytics to inform decision-making.

Join this session as CIOs discuss:

  • Ensuring data quality standards truly benefit from analytical insights
  • Empowering the enterprise to make more data informed decisions
  • Troubleshooting to drive business value

11:50am - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

Leveraging Emerging Technologies for Cybersecurity Strategy

Sanjit Ganguli headshot

Sanjit Ganguli

CTO in Residence

Zscaler

New, special demands constantly arise for decision-makers who steer the fortunes of companies. Recently, business success has become linked to IT infrastructure. Seamless and secure connectivity is the key to unlocking innovation and accelerating business outcomes. To reach this state, enterprises are transforming their networks and security to a zero trust architecture augmented by AI/ML capabilities, thereby reducing risk, eliminating cost and complexity and increasing agility.

Join this session and learn:

  • How zero trust architecture secures users, workloads, IoT/OT devices, and your business partners by addressing critical security shortcomings of legacy network architecture
  • How to reduce network complexity without exposing your organization to new risks
  • How AI/ML adds defensive and business analytics capabilities that have the power to turn IT into the engine propelling business success forward

1:10pm - 1:35pm  Break

1:35pm - 2:20pm  Breakout Session

Embracing Innovation — Real-World GenAI Use Cases

Vishal Gupta headshot

Vishal Gupta

CTO & CIO, SVP Connected Technology

Lexmark

Dave Shive headshot

Dave Shive

CIO

General Services Administration

The present moment offers an opportunity to unlock GenAI's transformative power, but maturity across organizations varies. Business leaders recognize this technology is a catalyst for innovation. By understanding real-world case studies with lessons learned, those leaders can create real movement forward inside of their own organizations.

Bring your questions to this session as you hear from executives who have:

  • Implemented practical GenAI use cases and identified opportunities
  • Compared and measured platforms and solutions for value outcomes
  • Balanced approach to value and risk

1:35pm - 2:20pm  Executive Boardroom

Securing a Modern Data Governance Program

Amit Khosla headshot

Amit Khosla

Business Information Security Officer

Fannie Mae

Robert Keefer headshot

Robert Keefer

Senior Manager, Security Operations

The Pew Charitable Trusts

Establishing a secure governance program that successfully aligns with business priorities is crucial especially in an age of AI innovation. CIOs and CISOs must balance providing accurate and accessible data with compliance and security concerns.

Join this session to discuss:

  • Aligning data governance strategy with the organization’s goals
  • Addressing data privacy, compliance and security concerns
  • Focusing on data ownership and stewardship for effective management

2:20pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

Bridging the Gap — Public and Private Sector Similarities

Traci Knight headshot

Traci Knight

Deputy Chief Information Security Officer, Director of Global Security Operations

Under Armour

Manny Castillo headshot

Manny Castillo

CISO

Prince George's

Nick Leshock headshot

Nick Leshock

CIO

General Dynamics

It might seem simple to point out key differences within the public and private sectors, especially when choosing a career or networking. For today's technology leader, it's important to also understand the similarities within these two areas of business. Who knows, there might be a process worth adapting across industries. Whether the topic is innovation, data security, work-life balance or the structure of the c-suite, it's important for IT and security professionals to myth bust commonly associated with working in the private versus the public sector.

Join this session to discuss:

  • What differences and similarities are found when public and private companies decide to innovate
  • How data security is paramount across industries
  • The role the c-suite's structure plays in relationships and company culture

3:00pm - 3:45pm  Executive Boardroom

CISOs in the Hot Seat – Understanding Personal Liability

Ryan Boulais headshot

Ryan Boulais

CISO

AES Corporation

With cyber threats escalating and the increase of legal and financial risks, CISOs are feeling the pressure. New laws and precedents expose cybersecurity leaders to personal liability, and watching the news isn’t helping. How can CISOs protect themselves and their families in this new era?

Join this session to discuss:

  • Elements for effective D&O policies
  • Essential questions to ask your legal team
  • Incidents in the news and details to note

3:00pm - 3:45pm  Executive Boardroom

Delivering Business Value through AI Investments

David Lackey headshot

David Lackey

Chief Information Security Officer & Chief Privacy Officer

World Vision

As AI technologies evolve, the opportunities are pushing organizations into a new era of efficiency and competitiveness. CIOs and CISOs are creating comprehensive strategies that lead to business outcomes and prioritizes data security and privacy. Whether creating an in-house tool or looking at vendor platforms, now is the time to assess current capabilities and identify where AI can add value.

Join your CIO and CISO community to discuss:

  • Identifying and aligning business needs and use cases for AI implementation
  • Zeroing in on the right AI investments for the organization
  • Assessing data security and privacy to fully harness the power of AI

3:45pm - 4:10pm  Break

4:10pm - 5:00pm  Keynote

Ransomware Is Changing — Are You Ready?

Paul Furtado headshot

Paul Furtado

VP Analyst

Gartner

The bad actors are adapting and pivoting their attacks. This keynote will highlight the changing landscape of ransomware and discuss the new tactics being deployed and how to best position your organization to combat them. Paul Furtado has held roles including CIO and CISO before joining Gartner as a Vice President, Analyst where he is responsible for providing insights into cybersecurity trends, threats, prevention and governance.  In his current role, he helps leaders around the world develop and enhance their cybersecurity programs.  With his expertise in ransomware, insider risk and executive cyber risk awareness, Paul was named the 2023 Gartner CIO Analyst of the year.

For this keynote, bring your questions for Furtado and listen as he discusses:

  • Importance of strong leadership in adversity
  • The impact AI advancement is having on ransomware
  • The current eco system driving Ransomware-as-a-Service

5:00pm - 5:15pm  Closing Comments and Prize Drawing

6:00pm - 8:30pm  Networking

Governing Body Welcome Reception

Ahead of the Washington DC Executive Summit, Governing Body members will host an exclusive networking reception for CIO and CISO attendees that includes learning how to create craft cocktails and mocktails. Please join your peers for an evening of great drinks, wonderful food and lively networking.

7:45am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

Body Language Secrets for Enhanced Executive Presence

Chris Ulrich headshot

Chris Ulrich

Body Language Expert

Guest Speaker

Uncovering the mysteries of body language — how people communicate their thoughts and feelings without saying a word — is a decisive first step toward mastering any business and social situation. Top executives know that detecting split-second signals from your team and leadership then taking immediate action is crucial to being a persuasive communicator and problem-solver especially during tricky internal matters or high-level negotiations.

During this session you will learn how to:

  • Move beyond the vacuum of artificial body language to a behavioral approach based on YOU
  • Strengthen interpersonal relationships, be a more decisive leader and manage your nerves better
  • Uncover the less obvious needs of others and improve your team’s confidence and competence

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Building an AI-Powered and Secure Unstructured Data Strategy

Jenna Cline headshot

Jenna Cline

VP CIO Advisor

Box

Your unstructured data holds immense value in the files that define your business. To maximize the potential of this data, it's crucial to establish a comprehensive unstructured data strategy that prioritizes both security and AI integration.

Join this session to learn about:

  • Identifying your valuable unstructured data sources and tools
  • Developing robust security measures for internal and external data use
  • Balancing AI with stringent security and compliance protocols to increase utility

9:40am - 10:25am  Executive Boardroom

Threat Intelligence and Third-Party Risk – Doubling Down on Critical Vulnerabilities

John Chisum headshot

John Chisum

VP, Solutions Consulting

RiskRecon - A MasterCard Company

Nick Leshock headshot

Nick Leshock

CIO

General Dynamics

The complete entanglement of cyber risk with business risk is becoming increasingly more visible. CISOs now have an opportunity to better pinpoint third parties that present a threat to the organization. Yet the increasing complexities of third party, and even fourth party, risk management, prompted by a wide range of evolving threats, demands heightened attention. How can CISOs ensure they have a clear overview of the threat landscape and vulnerabilities across ecosystems and supply chains?

Join this session to discuss:

  • Identification of vulnerabilities across your vendor landscape to prioritize response efforts
  • Best practices for mitigating a new wave of sophisticated attacks to keep assets safe
  • The role threat intelligence plays in risk management strategies to safeguard your digital ecosystem

10:25am - 11:05am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:05am - 11:50am  Executive Boardroom

Preparing for Battle — Getting Ahead of Security Challenges of Tomorrow

Eric Ranta headshot

Eric Ranta

Director, Customer Value & Transformation Advisors

Google Cloud

Tony Parrillo headshot

Tony Parrillo

VP, Enterprise IT Global Head of Security

Schneider Electric North America

When it comes to GenAI and nascent technologies being rapidly adopted, CIOs and CISOs must be proactive and thorough in their planning efforts and essentially attempt to predict the future. Today, we know data, access control, and IP must be protected while delighting users amid a changing threat landscape. But what does tomorrow bring?

Join this session to explore:

  • How to take advantage of the AI opportunity while also developing a foundationally secure enterprise
  • Ways to ensure your data, policies, and practices are clean and secure to minimize the risk of AI usage
  • Developing guidelines and policies for enabling business leaders, employees, and customers to realize the AI opportunity

11:05am - 11:50am  Executive Boardroom

Optimizing Decision-Making with Advanced Analytics

The term "data-driven" is often used as a coveted descriptor for business excellence. But does this description hit the mark? A data-driven enterprise must convert trusted data while leaning heavily into predictive analytics to inform decision-making.

Join this session as CIOs discuss:

  • Ensuring data quality standards truly benefit from analytical insights
  • Empowering the enterprise to make more data informed decisions
  • Troubleshooting to drive business value

11:50am - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

Leveraging Emerging Technologies for Cybersecurity Strategy

Sanjit Ganguli headshot

Sanjit Ganguli

CTO in Residence

Zscaler

New, special demands constantly arise for decision-makers who steer the fortunes of companies. Recently, business success has become linked to IT infrastructure. Seamless and secure connectivity is the key to unlocking innovation and accelerating business outcomes. To reach this state, enterprises are transforming their networks and security to a zero trust architecture augmented by AI/ML capabilities, thereby reducing risk, eliminating cost and complexity and increasing agility.

Join this session and learn:

  • How zero trust architecture secures users, workloads, IoT/OT devices, and your business partners by addressing critical security shortcomings of legacy network architecture
  • How to reduce network complexity without exposing your organization to new risks
  • How AI/ML adds defensive and business analytics capabilities that have the power to turn IT into the engine propelling business success forward

1:10pm - 1:35pm  Break

1:35pm - 2:20pm  Breakout Session

Embracing Innovation — Real-World GenAI Use Cases

Vishal Gupta headshot

Vishal Gupta

CTO & CIO, SVP Connected Technology

Lexmark

Dave Shive headshot

Dave Shive

CIO

General Services Administration

The present moment offers an opportunity to unlock GenAI's transformative power, but maturity across organizations varies. Business leaders recognize this technology is a catalyst for innovation. By understanding real-world case studies with lessons learned, those leaders can create real movement forward inside of their own organizations.

Bring your questions to this session as you hear from executives who have:

  • Implemented practical GenAI use cases and identified opportunities
  • Compared and measured platforms and solutions for value outcomes
  • Balanced approach to value and risk

1:35pm - 2:20pm  Executive Boardroom

Securing a Modern Data Governance Program

Amit Khosla headshot

Amit Khosla

Business Information Security Officer

Fannie Mae

Robert Keefer headshot

Robert Keefer

Senior Manager, Security Operations

The Pew Charitable Trusts

Establishing a secure governance program that successfully aligns with business priorities is crucial especially in an age of AI innovation. CIOs and CISOs must balance providing accurate and accessible data with compliance and security concerns.

Join this session to discuss:

  • Aligning data governance strategy with the organization’s goals
  • Addressing data privacy, compliance and security concerns
  • Focusing on data ownership and stewardship for effective management

2:20pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

Bridging the Gap — Public and Private Sector Similarities

Traci Knight headshot

Traci Knight

Deputy Chief Information Security Officer, Director of Global Security Operations

Under Armour

Manny Castillo headshot

Manny Castillo

CISO

Prince George's

Nick Leshock headshot

Nick Leshock

CIO

General Dynamics

It might seem simple to point out key differences within the public and private sectors, especially when choosing a career or networking. For today's technology leader, it's important to also understand the similarities within these two areas of business. Who knows, there might be a process worth adapting across industries. Whether the topic is innovation, data security, work-life balance or the structure of the c-suite, it's important for IT and security professionals to myth bust commonly associated with working in the private versus the public sector.

Join this session to discuss:

  • What differences and similarities are found when public and private companies decide to innovate
  • How data security is paramount across industries
  • The role the c-suite's structure plays in relationships and company culture

3:00pm - 3:45pm  Executive Boardroom

CISOs in the Hot Seat – Understanding Personal Liability

Ryan Boulais headshot

Ryan Boulais

CISO

AES Corporation

With cyber threats escalating and the increase of legal and financial risks, CISOs are feeling the pressure. New laws and precedents expose cybersecurity leaders to personal liability, and watching the news isn’t helping. How can CISOs protect themselves and their families in this new era?

Join this session to discuss:

  • Elements for effective D&O policies
  • Essential questions to ask your legal team
  • Incidents in the news and details to note

3:00pm - 3:45pm  Executive Boardroom

Delivering Business Value through AI Investments

David Lackey headshot

David Lackey

Chief Information Security Officer & Chief Privacy Officer

World Vision

As AI technologies evolve, the opportunities are pushing organizations into a new era of efficiency and competitiveness. CIOs and CISOs are creating comprehensive strategies that lead to business outcomes and prioritizes data security and privacy. Whether creating an in-house tool or looking at vendor platforms, now is the time to assess current capabilities and identify where AI can add value.

Join your CIO and CISO community to discuss:

  • Identifying and aligning business needs and use cases for AI implementation
  • Zeroing in on the right AI investments for the organization
  • Assessing data security and privacy to fully harness the power of AI

3:45pm - 4:10pm  Break

4:10pm - 5:00pm  Keynote

Ransomware Is Changing — Are You Ready?

Paul Furtado headshot

Paul Furtado

VP Analyst

Gartner

The bad actors are adapting and pivoting their attacks. This keynote will highlight the changing landscape of ransomware and discuss the new tactics being deployed and how to best position your organization to combat them. Paul Furtado has held roles including CIO and CISO before joining Gartner as a Vice President, Analyst where he is responsible for providing insights into cybersecurity trends, threats, prevention and governance.  In his current role, he helps leaders around the world develop and enhance their cybersecurity programs.  With his expertise in ransomware, insider risk and executive cyber risk awareness, Paul was named the 2023 Gartner CIO Analyst of the year.

For this keynote, bring your questions for Furtado and listen as he discusses:

  • Importance of strong leadership in adversity
  • The impact AI advancement is having on ransomware
  • The current eco system driving Ransomware-as-a-Service

5:00pm - 5:15pm  Closing Comments and Prize Drawing

June 12, 2024

June 13, 2024

We look forward to seeing you at an upcoming in-person gathering


Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

Convene at 1201 Wilson Blvd
MORE INFORMATION

Your Community Partners


Global Thought Leader
CIO Thought Leader
CISO Thought Leader
Key Partner
Program Partners

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Melissa Tarpley

Community Program Manager

619-300-6401

melissa.tarpley@evanta.com