Washington, DC CISO Executive Summit

May 31, 2018 | Marriott Marquis Washington, DC

May 31, 2018
Marriott Marquis Washington, DC

Collaborate with your peers

Get together with your peers to tackle top business challenges through peer-driven content and discussions at the Washington, DC CISO Executive Summit.

Join your peers to discuss the most critical issues impacting CISOs today:

Investing in your people and the right technologies

Innovating with advanced technologies and new delivery models

Influencing business stakeholders and enterprise outcomes

Washington, DC CISO Governing Body

The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.


Sam Abbate

Northrop Grumman Corporation
Vice President and Chief Information Officer

Ted Colbert


Jim Connelly

Lockheed Martin

Alissa Johnson

Xerox Corporation

Shamim Mohammad


Christopher Porter

Fannie Mae

Chris Tignor

Federal Reserve System
Cyber Security Chief Data Officer

Terry West

Performance Food Group


May 30, 2018

6:00pm - 8:30pm  Keynote

The Neuroscience of Being Memorable

Carmen Simon headshot

Carmen Simon

Cognitive Neuroscientist & Author

Impossible to Ignore: Creating Memorable Content to Influence Decisions

Success in any industry is a function of influencing others. This is no easy task because modern audiences and decision makers are bombarded with requests for their attention, many of which go ignored. In this session, discover strategies for transforming yourself and your message into something worth noticing. Carmen Simon delves into the field of neuroscience, revealing how the brain processes information. The key is understanding what makes people pay attention, remember you and ultimately act on what you say. Learn how to convert neuroscience insights into practical guidelines that will help you resonate with people and spark action.

May 31, 2018 - morning

7:00am - 7:45am  Registration & Breakfast

7:45am - 8:30am  Keynote

A Comprehensive Cyber Strategy to Manage Cyber Risk

Michael Johnson headshot

Michael Johnson


Capital One

Cyber is an existential risk to trust-based, digital businesses. Managing that risk is a complex, high-stakes endeavor. Cyber threats continue to grow in frequency and sophistication. Institutions today must simultaneously safeguard and defend against both thieves and nation state-capable adversaries. This presentation describes the elements of a comprehensive cyber strategy leading to a “best-in-class” cyber risk posture, and how to communicate to key stakeholders, including the board of directors.

8:30am - 9:00am  Networking Break

9:00am - 9:50am  Breakout Session

Disrupting to Become a Differentiating Force

Bharat Amin headshot

Bharat Amin


Newport News Shipbuilding

For legacy businesses to fully realize the benefits of digital disruption, they must first have the courage to embrace cultural change and empower change agents. Bharat Amin offers a bold approach to driving disruption as he leads the IT Division of a 132-year-old organization to become a differentiating force. His insights into driving change illustrate the value of taking risks and actively seeking out innovators at all levels. In this session, Bharat shares anecdotes and essential actions to disrupt the business landscape.

9:00am - 9:50am  Breakout Session

Rethinking Cybersecurity for the Digital Transformation Era

Dan Shelton headshot

Dan Shelton

Director, Product Management


The pace of technology change is challenging traditional cybersecurity strategies. Not long ago, clouds and mobility forced organizations to rethink their security and network architectures. And when most network traffic was destined for the data center, it made sense to backhaul all traffic over a hub-and-spoke network protected by a 'castle-and-moat' security model. But with today’s massive investments in SaaS applications, moving internal applications to private clouds for unfettered access requires a new approach. As the Internet becomes the corporate network, how do you adapt your security? And how can your moves to the cloud be made more secure? Join us for answers to these questions and more.

9:00am - 9:50am  Executive Boardroom

Go Big or Go Home — Radical Change for Big Data

Kevin Apperson headshot

Kevin Apperson


Maxim Healthcare Services, Inc.

Chris Tignor headshot

Chris Tignor

Cyber Security Chief Data Officer

Federal Reserve System

Wolf Ruzicka headshot

Wolf Ruzicka

Chairman of the Board

Eastbanc Technologies

Big data provides endless opportunities when managed correctly, but analytics projects are coming up short. In fact, 60% to 85% of big data efforts fail, and each failed project is costing companies an average of $7.4 million. A slight tweaking to big data projects won't do the trick. Organizations need to radically change the way they view and manage their data if they want to tap into its full potential. Moderated by technology leader Wolf Ruzicka, this discussion examines the current approach to big data and explores new methods of management.

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CIOs and CISOs).

To reserve your seat, please contact: 

Mikhail Babbs at 1-971-506-3303 or mikhail.babbs@evanta.com

9:50am - 10:20am  Networking Break

10:20am - 11:10am  Breakout Session

Creating a Culture of Innovation

Ash Banerjee headshot

Ash Banerjee

Global CIO

Hogan Lovells

Kelly Clark headshot

Kelly Clark



Amy Doherty headshot

Amy Doherty



Mike Summers headshot

Mike Summers


Sunrise Senior Living, Inc.

Driving innovation at an organization is easier said than done. It requires building foundational support and cultivating a culture that encourages new ideas. Executives must build from the top to evolve their organizations into innovative hubs. But how do you achieve this? What kind of culture encourages innovation? What technology should organizations have in place? In this session, panelists address these questions about practical ways to drive innovation.

10:20am - 11:10am  Breakout Session

The Future of Work – Meeting the Demands of Digital

Sonny Hashmi headshot

Sonny Hashmi

Managing Director, Global Government


The future of work continues to evolve, and every day that future is brought closer by the accelerating business demands of digital transformation, emerging cultural norms and the capabilities of new technologies and innovations. Digitally-enabled businesses must strive to be more global and work outside their normal bounds. The session will explore the growing demand for transparency and less hierarchy in the workplace alongside the advent of real-time communications tools. Hear use cases from firms that are on the leading edge of implementing more data-driven decision making, AI-enabled processes and new models for information security.

10:20am - 11:10am  Executive Boardroom

Evolution of an Integrated Cybersecurity Office - A CISO’s Perspective

Joseph Dyer headshot

Joseph Dyer



Randy Marchany headshot

Randy Marchany


Virginia Tech

Ellen Sundra headshot

Ellen Sundra

VP of Americas, Systems Engineering

ForeScout Technologies, Inc.

The hyper-growth of IoT across the enterprise is forcing leaders to reassess how they secure their networks. Recent Forrester research has unveiled some hidden technical and organizational challenges IT professionals should be aware of when managing their overall security framework. There appears to be a dynamic shift in the way organizations are handling security and risk. Join this interactive session, led by ForeScout, to discuss effective strategies for devising information risk and value metrics, as well as security operational metrics, that are relevant to the board and executive team. Come ready to learn and share what organizations can do to better defend IoT-enabled systems from cyberattacks and mature the SOC into an Integrated Cybersecurity Fusion Center.

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CIOs and CISOs).

To reserve your seat, please contact: 

Mikhail Babbs at 1-971-506-3303 or mikhail.babbs@evanta.com

11:10am - 11:40am  Networking Break

May 31, 2018 - mid-afternoon

11:40am - 12:50pm  Keynote

The Perimeter of One

Andy Ellis headshot

Andy Ellis

Chief Security Officer

Akamai Technologies, Inc.

Today’s companies are embracing new technologies, opening doors to new ways of improving business. But these advancements create a need for a more robust security strategy that safeguards more than just network perimeters. Organizations must protect data spread across a variety of systems, devices and apps. However, keeping security in step with the CIO’s technology direction – and supporting enterprise programs – is easier said than done. Listen to Andy Ellis as he explores a security approach for the digital age, one that combines high visibility and zero trust to protect important assets both individually and collectively.

12:50pm - 1:20pm  Networking Break

1:20pm - 2:10pm  Breakout Session

Acquiring Risk – How To Navigate Through Change

Terry West headshot

Terry West


Performance Food Group

Mergers and acquisitions can be messy, especially when it comes to cybersecurity. Organizational growth spurts bring new data, new employees, new technology and, you guessed it, a new level of risk. The CISO-CIO partnership has never been more important when navigating a seamless integration. However, it takes more than risk awareness to come out on top. In this session, Terry West addresses the CIO’s leading role in navigating mergers and acquisitions, sharing best practices and lessons learned from his own experience.

1:20pm - 2:10pm  Breakout Session

Cyber Hygiene — A Differentiator in Defense

Terry Chapman headshot

Terry Chapman

Director Information Security

Ferguson Enterprises

Darren Death headshot

Darren Death


ASRC Federal

Larry Janeshek headshot

Larry Janeshek



It’s a misconception that the most destructive cyberattacks employ complex technology that outsmarts defenses. Often these attacks prey on little more than overlooked vulnerabilities — hallmarks of poor IT hygiene. Not knowing who is on your network, what applications are being run and which systems are unprotected is a recipe for a breach. In this session, a panel of security experts explore why IT hygiene is so important and share best practices for how they maintain it and keep breaches at bay.

1:20pm - 2:10pm  Executive Boardroom

Leveraging Identity Governance to Effectively Manage Security Risk

Brian Wilkinson headshot

Brian Wilkinson

Director, Global Information & Cyber Security

Under Armour

Keith Young headshot

Keith Young

Enterprise Information Security Official

Montgomery County Government

Joe Gottlieb headshot

Joe Gottlieb

SVP, Corporate Development


How can identity awareness improve your enterprise’s risk posture? For starters, it can lead to fewer data breaches. In fact, it’s estimated that by 2021, organizations with complementary or integrated identity governance across applications and files will suffer 60 percent fewer data breaches. After all, understanding who has access to what data, as well as who should have access, is key to keeping information in the right hands. Join your peers for a discussion on leveraging identity to govern access across all users, applications and data. Then discuss ways to strengthen investments in existing security solutions.

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CIOs and CISOs).

To reserve your seat, please contact: 

Mikhail Babbs at 1-971-506-3303 or mikhail.babbs@evanta.com

May 31, 2018 - afternoon

2:10pm - 2:30pm  Networking Break

2:30pm - 3:20pm  Breakout Session

Evolving Your Security Operations Center

Michele Thomas headshot

Michele Thomas


US Department of Transportation

IT is constantly expanding, introducing new technology and, as a result, new vulnerabilities. To keep up, cybersecurity must advance at an equal pace. To do this, organizations must evolve their security operations center. But just how do you do that? In this session, Michele Thomas shares her insight on everything from hiring the right people to planning responses to critical incidents. That way, when an attack does happen, you’ll be ready.

2:30pm - 3:20pm  Breakout Session

Taking Security From Prevention to Eradication

Rodrigo Loureiro headshot

Rodrigo Loureiro


Laureate International Universities

Preventing security threats is one option. Eradicating them is a better one. This is the mindset of Rodrigo Loureiro, who says he’s setting new standards on how to respond to cyber threats. Instead of simply blocking attacks, he’s cultivating a culture of elimination. Loureiro applies this mindset to his organization, working with urgency and efficiency to keep the organization healthy. In this session, he shares his security framework and divulges his secret sauce for eliminating threats for good.

2:30pm - 3:20pm  Executive Boardroom

Break Barriers to Build Cross-Functional Teams

Steve Hull headshot

Steve Hull

Chief Information Officer


Howard Spira headshot

Howard Spira

Senior Vice President and CIO

Export-Import Bank of the United States

The benefits of creating cross-functional teams isn’t news to CIOs, yet they are still struggling to prioritize collaboration with other departments. The advantages of cross-functional teams are plentiful. They encourage diverse ideas and perspectives that foster innovation. They help align decisions with the broader organizational perspective. And yet, despite the benefits,organizational silos still exist. How can CIOs encourage collaboration and connect IT to other departments? Join your peers for a discussion on increasing cross-department collaboration, sharing specifics of what’s worked and what hasn’t.

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CIOs and CISOs).

To reserve your seat, please contact: 

Mikhail Babbs at 1-971-506-3303 or mikhail.babbs@evanta.com

3:20pm - 3:40pm  Networking Break

3:40pm - 4:20pm  Keynote

A Lesson in Leadership – Bet On Yourself

Catherine Szpindor headshot

Catherine Szpindor


United States House of Representatives

Catherine’s path to becoming a CIO didn’t happen overnight. It also didn’t happen by design. Her journey to CIO instead began with a fortuitous and unexpected situation, one that connected her to an unlikely job in IT. That job opened myriad doors, and she said yes to every opportunity, big and small, that came her way. She is now CIO at the United States House of Representatives, and she credits her success to her willingness to tackle new challenges and embrace change. In this session, Szpindor shares her inspiring story of becoming a CIO, divulging the leadership principles that got her to where she is today.


4:20pm - 5:00pm  Closing Reception & Prize Drawing


Venue & Accommodation

Marriott Marquis Washington, DC

Your Community Partners

Keynote Sponsor
Presenting Sponsors
National Sponsors

Washington, DC CISO Program Manager

For inquiries related to this event, please reach out to your dedicated program contact.

Mikhail Babbs

Former Account Executive