IN-PERSON

Minneapolis CISO Executive Summit

December 10, 2024 | Sheraton Bloomington

December 10, 2024
Sheraton Bloomington

APPLY TO PARTICIPATE

Collaborate with your peers

Get together with Minneapolis's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Equipping users with safely-integrated AI tools and practices per the demand of advancing businesses

Improving business outcomes through cost and resource optimization

Strengthening influence and partnerships across organization

Minneapolis CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Vince Aimutis

Federated Insurance
VP – Director of Information Services / CISO

Mary Faulkner

Thrivent
VP, CISO & IT Operations

Jeff Johnson

Digi-Key
CISO, Director, IT Security and Privacy

Greg Matthias

Agiliti
VP, CISO

Tina Meeker

Sleep Number
VP, Information Security & Enterprise Architecture

Param Vig

Solventum
SVP, CISO

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Minneapolis CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


December 10, 2024

7:45am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

Playing the Generative AI Long Game

Manjeet Rege headshot

Manjeet Rege

AI and Machine Learning Thought Leader, Educator & Author

University of St. Thomas

As Generative AI passes the peak in its hype cycle, CISOs are uniquely positioned to step back from the buzz and leverage the technology to generate real value for the business. From increasing productivity to understanding its limitations, it is critical to consider the potential for tangible, high-impact use cases.

Join Manjeet Rege, AI & ML Educator, Author and Thought Leader to explore:

  • Eliminating the buzz to uncover the potential of AI technologies
  • Finding the balance between technology innovation and business needs
  • Navigating the future impact of Gen AI on the workforce and talent

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Mindful Leadership — The Calm in the Cyber Storm

Sarah Engstrom headshot

Sarah Engstrom

CISO and Vice President of IT Security, Productivity and Privacy

CHS

Beth Singer headshot

Beth Singer

IT Compliance Director

CHS

 In the high-stakes world of cybersecurity, leaders face the unique challenge of guiding their teams through constant change and uncertainty. Navigating this roller coaster requires more than just technical skills; it calls for mindful leadership that fosters resilience and enjoyment amidst the chaos. Join this session to explore:

  • Formulas for embracing ‘the pause’ 
  • Tactics to use with your teams to avoid getting trapped in stress 
  • Tapping into the growth mindset that is essential for people and organizations to thrive

9:40am - 10:25am  Executive Boardroom

Maximizing the Value of Your Security Investments

William Scandrett headshot

William Scandrett

VP, Chief Information Security Officer

Allina Health

Tina Meeker headshot

Tina Meeker

VP, Information Security & Enterprise Architecture

Sleep Number

Threats don't brake for CISOs with budget restrictions. And even when funds are low, the business expects you to ward off attacks. That means you'll have to increase success without increasing tools or talent.

Together with your C-level peers, discuss how to:

  • Expand coverage without spreading it thin
  • Deliver on the business's existing security investments
  • Demonstrate the linkage between a safe business and a profitable one

9:40am - 10:25am  Executive Boardroom

Governing Generative AI in your Organization

Mandy Andress headshot

Mandy Andress

CISO

Elastic

Generative AI is being utilized by companies and employees alike–sometimes without permission. The normalization of this emerging technology has expanded the attack surface and left many security leaders feeling anxious and uncertain. Is generative AI worth the risk, and how should it be governed in an organization?

Join this interactive roundtable to explore:

  • What to expect from the threat landscape as generative AI becomes increasingly normalized
  • What adopting generative AI does to your attack surface, and if you should even allow it
  • How to implement governance rules that your organization will follow

10:25am - 11:05am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:05am - 11:50am  Breakout Session

Accelerating Change — From 0 to 100

Param Vig headshot

Param Vig

SVP, CISO

Solventum

Kyle Erickson headshot

Kyle Erickson

VP, Product CISO

Solventum

When Param Vig, SVP, CISO, Solventum built-out an entire security program from scratch, she wanted to do things differently. In just a 9 month time frame Solventum set out to modernize their program while building it, on-board an entire team of high-performing talent, and make strategic decisions to enable the business.

Join this session to learn the importance of: 

  • Getting the business to the next evolution and being a champion of change         
  • Having a mindset that goes beyond the industry playbook and seeing hurdles as growth opportunities 
  • Creating a strong network up front, from staff to third-parties, and everyone in between

11:05am - 11:50am  Executive Boardroom

Controlled Chaos — Mastering Incident Response

Vince Aimutis headshot

Vince Aimutis

VP – Director of Information Services / CISO

Federated Insurance

Carlos Moran headshot

Carlos Moran

VP, Chief Information Security Officer (CISO)

Toppan Merrill

CISOs need more than a plan. They need to know what it takes to master the art of containment, eradication and recovery while keeping the business's costs (both financial and reputational) to a minimum.

Only in a room of your security-focused peers will you:

  • Unlock specific, essential incident response practices
  • Hear relatable cases of what is and isn't working for others in your position
  • Gather the threat mitigation insights of your fellow cyber leaders


11:05am - 11:50am  Executive Boardroom

The Present and Future State of Tool-Based IAM

Aimee Martin headshot

Aimee Martin

CISO

Data Recognition Corporation

Brad Abbott headshot

Brad Abbott

Senior Director – Information Risk Management-CISOSenior Director – Information Risk Management - CISO

Medica

Ask 15 CISOs what it would take to feel truly confident in their identity access policies and you might get 15 different answers. One variable they might all benefit from considering, however, is up-to-date tooling. 

In conversation with your CISO peers, you'll address:  

  • How much trust should be placed in your IAM toolbelts 
  • Where, in light of major threat advancements, your equipment needs upgrading 
  • Which IAM hurdles, if any, require more than tool-based solutions


11:50am - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

Lunch Comments & Keynote

 Session details coming soon!

1:10pm - 1:35pm  Break

1:35pm - 2:20pm  Executive Boardroom

Trusted Ties — The Art of Secure Partnerships

Tony Taylor headshot

Tony Taylor

CISO

Land O'Lakes

Jeff Johnson headshot

Jeff Johnson

CISO, Director, IT Security and Privacy

Digi-Key

Vendor selection, pre-partner due diligence, and trusted implementation are merely the beginning of a healthy third-party management culture. With those pieces in place, the real work (like battling for constant visibility and enforcing your requirements) begins. You’ll need to be prepared. 

Gather and discuss how to CISOs have successfully:

  • Vetted new and prospective third-parties
  • Monitored network of existing third-parties
  • Asserted security requirements with vulnerable, but critical, third-parties

1:35pm - 2:20pm  Executive Boardroom

The Security Implications of Technical Debt

Ashok Kallam headshot

Ashok Kallam

CISO

Fairview Health Services

Abdeslam Mazouz headshot

Abdeslam Mazouz

CISO

City of Minneapolis

You needed a solution and chose a quick fix. Now, it's payback time. Best case scenario, your team's talents are momentarily lost to remediating the issue. Worst case scenario, you kickstart a cycle: Build quick. Leave gaps. Rectify. Lose time. Catch up. Repeat. 

Join your fellow security executives to discuss: 

  • Common reasons for assuming technical debt and its unavoidable consequences 
  • How to catch up without compromising the integrity of present development 
  • If the benefits of technical debt ever outweigh its risks

2:20pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

2:50pm - 3:00pm  Break

3:00pm - 3:35pm  Keynote

Mastering the Art of Influence in Cybersecurity

Matthew Bohne headshot

Matthew Bohne

VP, Chief Product Security Officer

Honeywell

Cybersecurity is a craft where passion, technical competence and influence are the real keys to success. Influencing the business to take the right actions, including making the right investments, takes a team of fearless and inspired leaders. The world is changing, how are cybersecurity leaders leaning in to change with it?

Hear from Matthew Bohne, VP & Chief Product Security Officer at Honeywell, to:

  • Discover strategies for influencing decision-makers and stakeholders, including government bodies, to drive meaningful change
  • Learn real techniques to change the conversation on how your company is investing in and understanding cybersecurity
  • Build influential relationships with legal teams to support compliance and risk management

3:35pm - 3:45pm  Closing Comments and Prize Drawing

3:45pm - 5:00pm  Governing Body Reception

Governing Body Reception

Governing Body members host this reception for executives to close out the event with an evening of peer networking, food and drinks.

December 10, 2024

We look forward to seeing you at an upcoming in-person gathering


Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

Sheraton Bloomington

A block of rooms has been reserved at the Sheraton Bloomington at a reduced conference rate. Reservations should be made online or by calling 952-656-5922. Please mention Evanta CISO Executive Summit to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $119 USD (plus tax) is November 18, 2024.

Your Community Partners


CISO Thought Leader
Key Partners
Program Partners

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Joey Freedman

Program Manager

971-275-4444

joey.freedman@evanta.com