IN-PERSON

Detroit CIO Executive Summit

June 18, 2024 | The Henry, Autograph Collection

June 18, 2024
The Henry, Autograph Collection

Collaborate with your peers

Get together with Detroit's top CIOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CIOs today:

Leveraging technology and modernizing processes to enhance operational efficiency

Ensuring resiliency and mitigating risk is top of mind within cybersecurity strategies

Using data-driven insights to sustain a competitive advantage in the age of digital intelligence

Detroit CIO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CIOs, for CIOs.

Governing Body Co-Chairs

Janette Barretto

Yazaki North America
Global Security and Risk Manager

Brent Cieszynski

Blue Cross Blue Shield of Michigan
VP & CISO

Russ Gordon

PHINIA
CISO

Steven Herrin

DTE
Director, Cybersecurity/CISO

Rich Hook

Penske
EVP & CIO

Rachelle Putnam

General Dynamics Land Systems
Chief Information Technology Officer

Jeff Small

Great Lakes Water Authority
CIO

Ryan Talbott

BorgWarner
VP & Global CIO

Erik Wille

Cabinetworks Group
CISO

What to Expect

Interactive Sessions

Hear from CIO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Detroit CIO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


June 17, 2024

June 18, 2024

6:00pm - 8:30pm  Networking

Governing Body Welcome Reception

Governing Body members host this dinner for attendees to launch the event with an evening of peer networking, live music and an open bar.

7:45am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

Body Language Secrets for Enhanced Executive Presence

Chris Ulrich headshot

Chris Ulrich

Body Language Expert

Guest Speaker

Uncovering the mysteries of body language — how people communicate their thoughts and feelings without saying a word — is a decisive first step toward mastering any business and social situation.  Top executives know that detecting split-second signals from your team and  leadership then taking immediate action is crucial to being a persuasive communicator and problem-solver especially during tricky internal matters or high-level negotiations.

During this session you will learn how to:

  • Move beyond the vacuum of artificial body language to a behavioral approach based on YOU
  • Strengthen interpersonal relationships, be a more decisive leader and manage your nerves better
  • Uncover the less obvious needs of others and improve your team’s confidence and competence

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

From Familiar to Future — Breaking the Barriers to IT Innovation

Loren Hudziak headshot

Loren Hudziak

Customer Engineer Manager, ChromeOS

Google

IT & security leaders are under pressure to innovate their organization’s tech stack to meet the demands of modern business. While web-based apps, AI and other modern solutions offer a better user experience, advanced security and simpler management, many businesses are still critically dependent on legacy apps and systems. How can IT & security teams innovate their infrastructure without disrupting operations and end users? This session breaks down some common misconceptions about modernization and reveals a direct path for IT & security leaders towards more efficient, secure, and cost-effective endpoint management.

Join this session and breakout-style conversation with your peers to discuss:

  • What the modern endpoint looks like for enterprises today
  • How modernization unlocks the power of AI and sharpens your competitive edge
  • How to continue using legacy apps while you innovate

9:40am - 10:25am  Executive Boardroom

Factors to Consider in Optimizing Your Application Portfolio

Mark Coggin headshot

Mark Coggin

VP, Portfolio Marketing

Rimini Street

Scott Bennett headshot

Scott Bennett

CIO

Lear Corporation

Joseph Simpson headshot

Joseph Simpson

CIO

Edward Rose & Sons

CIOs are balancing an ever-increasing number of demands from the business – strong innovation balanced with cost optimization. This is further complicated with talent shortages and vendor pressure to migrate and upgrade. To allocate more funds towards innovation, mission-critical systems need to be optimized, cost effective, and flexible. This is why strong vendor and application rationalization must be integrated into your IT strategy.

Join this session to discuss:

  • How to incorporate emerging technology like AI without complete re-platforming
  • Understand approaches to take for application portfolio rationalization
  • Strategies to avoid vendor mandated roadmaps

9:40am - 10:25am  Executive Boardroom

The Business of Security — Bridging the Gap Between Cyber Initiatives and Business Impact

Tyler Zito headshot

Tyler Zito

Senior Solutions Architect

Expel

Marty Christensen headshot

Marty Christensen

Head of Cyber Security for Enterprise, Cloud, and Supply Chain

Ford

Homyar Naterwala headshot

Homyar Naterwala

Business Information Security Officer

GE Aerospace

Economic trends have tightened purse strings everywhere, leaving CISOs and security leaders to demonstrate ROI and defend their budgets. But ROI is notoriously tough to quantify when the primary return for security investment is reduction in risk. As a result, bridging the gap between security investments and actual business impact can be easier said than done, particularly if your cybersecurity spend doesn’t clearly map to organizational goals.

Join this session to discuss:

  • Identifying the right metrics for quantifying security ROI and business impact        
  • Positioning security as a business enabler, rather than a cost center
  • Aligning security investments to organizational goals

9:40am - 10:25am  Executive Boardroom

Managing OT to Fully Secure the Business

Laura Davidson headshot

Laura Davidson

CISO

American Axle & Manufacturing

Adam Keagle headshot

Adam Keagle

CISO

Detroit Diesel Corporation

For most organizations, the number of connected, essential devices is growing by the second. In response, the CISO's jurisdiction is changing just as rapidly. Now, in the case of any security issue, the rest of the C-suite may be looking to you for answers.

Join this session and start understanding:

  • Your new or growing operational technology responsibilities
  • What you can do to smoothly plot and control your OT workload
  • How you can best juggle IT and OT security simultaneously

9:40am - 10:25am  Workshop

Office Hours with Chris Ulrich

Chris Ulrich headshot

Chris Ulrich

Body Language Expert

Guest Speaker

What does your body language say about you? What shifts might you make to change how others perceive you? Join this special one-on-one session exclusively for Governing Body members with body-language expert Chris Ulrich for candid feedback on your in-person and online body language. Sessions are 20-minutes and pre-registration is required.

In this unique, private session, you’ll receive:

  • One-on-one consultation with a premier expert
  • Live analysis of your unique body language cues
  • Personalized executive presence improvements

10:25am - 11:05am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:05am - 11:50am  Breakout Session

Embracing Innovation — Real-World GenAI Use Cases

Ryan Olivier headshot

Ryan Olivier

VP & CIO

American Axle & Manufacturing

Scott Bennett headshot

Scott Bennett

CIO

Lear Corporation

The present moment offers an opportunity to unlock GenAI's transformative power, but maturity across organizations varies. Business leaders recognize this technology is a catalyst for innovation. By understanding real-world case studies with lessons learned, those leaders can create real movement forward inside of their own organizations.

Bring your questions, advice, and challenges to this INTERACTIVE session as you discuss with other executives who have:

  • Implemented practical GenAI use cases and identified opportunities
  • Compared and measured platforms and solutions for value outcomes
  • Balanced approach to value and risk

11:05am - 11:50am  Executive Boardroom

Digital Inclusion and the CIO’s Path Forward

Rohan Pal headshot

Rohan Pal

Chief Transformation Officer

ServiceNow

Debi Brobst headshot

Debi Brobst

CIO

ProMedica

Mike Rogers headshot

Mike Rogers

CIO

Nexteer

While many CEOs are tasking the business to advance digital priorities, challenges block progress due to legacy IT, transitioning to the cloud, and the unrelenting task of IT operations. Breaking the bottleneck of transformation is not straightforward, but creating ownership with the wider business can prove to be a winning strategy.

Join this session to discuss:

  • Infusing “digital inclusion” into the organization
  • Incorporating the wider business to drive its own digital priorities
  • Collaborating across the C-Suite to meet enterprise goals

11:05am - 11:50am  Executive Boardroom

Transformative Shockwaves: Navigating Unpredictability Through Strategic Control

KJ Kusch headshot

KJ Kusch

Global Field Chief Technology Officer

WalkMe

James McFarlane headshot

James McFarlane

CIO & VP

HoMedics

Stefan Ott headshot

Stefan Ott

VP Enterprise Architecture and Planning – JET Delivery

Jackson

As lines of business continue to invest in new applications and processes, disconnected, siloed, and individual initiatives are creating shockwaves throughout the organization. Such random acts of digital lack the necessary degrees of strategic oversight and organizational change control, leading to unpredictability and elevated levels of organizational risk.

Join this boardroom to discuss how to:

  • Adopt new digital solutions with proactive approaches
  • Eliminate chance outcomes from random acts of digital
  • Promote unity while mitigating risks

11:05am - 11:50am  Executive Boardroom

Communicating and Measuring Cyber Risk More Effectively

Russ Gordon headshot

Russ Gordon

CISO

PHINIA

Erik Wille headshot

Erik Wille

CISO

Cabinetworks Group

In today’s environment, it is even more challenging for security leaders to communicate and measure their cyber risk and program to their executive board. Being fully transparent about an organization’s weaknesses, strengths, and investments as it relates to cyber risk can be an uncomfortable conversation to have, but it is essential to the overall health of the business.

Join this session to learn:

  • Metrics that quantify challenges & risks
  • How to create trust with dialogue delivery and engage leadership with non-security terms
  • Using data to communicate and explain the risks and how to best leverage this data

11:50am - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

Worth the Business Risk? Security That Advances Innovation

Pamela Kubiatowski headshot

Pamela Kubiatowski

Global VP, CTO in Residence

Zscaler

Jeremy Hyland headshot

Jeremy Hyland

Director of Cyber Defense

Dow

IT and security must strike an intricate balance between enablement and protection. Cyber and business risk considerations should mesh into a strategy that both propels innovation and creates business value. As CIOs and CISOs grapple with increasingly complex decisions and evolving digital transformation roadmaps, how can leaders position cybersecurity as a pillar for advancing innovation?

Join this session to learn:

  • How to foster inclusive conversations on cybersecurity by framing issues in terms of business risk
  • Identifying initial steps and key phases of zero trust implementation within a broader risk strategy
  • Demystifying zero trust architecture for other leaders and recruit business champions for transformation

1:10pm - 1:35pm  Break

1:35pm - 2:20pm  Breakout Session

A New Era of Compliance & Regulation

Janette Barretto headshot

Janette Barretto

Global Security and Risk Manager

Yazaki North America

Steven Herrin headshot

Steven Herrin

Director, Cybersecurity/CISO

DTE

Scott Sadlocha headshot

Scott Sadlocha

SVP, CISO

United Wholesale Mortgage

With the continuous advancement of technology, businesses face new and evolving threats that require a proactive response. New laws and precedents expose cybersecurity leaders to personal liability and leave security leaders questioning their protection.

Join this interactive session to discuss:

  • Essential questions to ask your legal team
  • Best practices for keeping up to date with the evolving governance, risk, and compliance landscape
  • C-Suite liability and information security risk

1:35pm - 2:20pm  Executive Boardroom

Generative AI — Should CISOs be Guardians or Gatekeepers?

Lior Yaari headshot

Lior Yaari

CEO and Co-Founder

Grip Security

Mick Leach headshot

Mick Leach

Field CISO

Abnormal Security

Jeremy Hyland headshot

Jeremy Hyland

Director of Cyber Defense

Dow

Mo Wehbi headshot

Mo Wehbi

Vice President, Information Security & PMO

Penske

From content generation to data analysis, generative AI is transforming the way people work and drastically improving productivity. However, the benefits do not come without risks, and the technology has the potential to do more harm than good when placed in the wrong hands. So what do security leaders need to know about the risks of generative AI, and how do they mitigate them?

Join this session for an insightful discussion on the latest cybersecurity challenges associated with generative AI, including:

  • How the threat landscape is changing as a result of generative AI
  • How businesses can ensure the privacy and security of sensitive data used in generative AI applications and govern them appropriately
  • What tools and capabilities are necessary to protect organizations from malicious uses of generative AI

1:35pm - 2:20pm  Executive Boardroom

Securing a Modern Data Governance Program

David Bobryk headshot

David Bobryk

Director, Health Informatics and Analytics

Trinity Health

Nicole Rembert headshot

Nicole Rembert

Global Cybersecurity Governance, Risk and Compliance Director

UL Solutions

Establishing a secure governance program that successfully aligns with business priorities is crucial especially in an age of AI innovation. CIOs and CISOs must balance providing accurate and accessible data with compliance and security concerns.

Join this session to discuss:

  • Aligning data governance strategy with the organization’s goals
  • Addressing data privacy, compliance and security concerns
  • Focusing on data ownership and stewardship for effective management

1:35pm - 2:20pm  Executive Boardroom

Stress Management Strategies for Effective Leadership

Heidi Mattison headshot

Heidi Mattison

CTO

Cabinetworks Group

Ryan Talbott headshot

Ryan Talbott

VP & Global CIO

BorgWarner

Technology and security leaders' worlds are complex, challenging, and often exhausting. If you’re not dealing with vulnerabilities or implementing and managing security solutions, you’re navigating governance and company-wide risk perspectives. When do leaders get a chance to breathe and beat the fatigue?

Join this peer-led boardroom to discuss:

  • Understanding the critical role CIOs & CISOs can play in stress management for themselves and their employees
  • Exploring how trust and openness with your team can improve well-being and mental health
  • Actionable takeaways on how to manage stress within the workplace

2:20pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

Digital Leader's Compass — A Framework for Leading in the Digital Age

Raj Polanki headshot

Raj Polanki

Head of IT & Digital / US CIO

Wacker Chemical

In today's rapidly evolving digital landscape, IT leaders are faced with the daunting task of steering their organizations through a complex array of challenges and opportunities. It is common to hope for a compass or a framework to help balance technology changes and business transformation needs. Raj Polanki, Head of IT & Digital / US CIO, Wacker Chemical, will explore the critical components of transforming the current IT landscape for agility and scalability while implementing robust cybersecurity measures.

Join this interactive session to discuss:

  • Maximizing impact with limited resources
  • Leveraging and integrating current and emerging technologies
  • Fostering a culture of experimentation by refining processes, driving optimization, and leveraging data and analytics
  • Analyzing scenarios to determine the right approach based on organizational goals and market conditions

3:00pm - 3:45pm  Executive Boardroom

Strategic Third-Party Risk Management — From Due Diligence to Continuous Oversight

Travis Bray headshot

Travis Bray

Director Business Transformation & Cybersecurity

Magna Powertrain USA

Pamela Hensley headshot

Pamela Hensley

Director, Information Security

AAA Life Insurance

Vendor selection, pre-partner due diligence, and trusted implementation are merely the beginning of a healthy third-party management culture. With those pieces in place, the real work (like battling for constant visibility and enforcing your requirements) begins. You’ll need to be prepared.

Gather and discuss how to CISOs have successfully:

  • Vetted new and prospective third-parties
  • Monitored network of existing third-parties
  • Asserted security requirements with vulnerable, but critical, third-parties

3:00pm - 3:45pm  Executive Boardroom

Routing Your Generative AI Implementation Marathon

Dan Rainey headshot

Dan Rainey

CIO

Detroit Water & Sewerage Department

John Wei headshot

John Wei

EVP, CTO

Integreon

Early adopters confirm, AI-implementation isn't for the faint of heart (or the light of checkbook). Yet, the expectation to welcome this booming tech advancement into your organization remains. Today, studying the efforts of those same early adopters proves the easiest first step in drawing up your own AI road map.

 Gather with your peers to:

  • Compare your varying stages of AI-adoption progress
  • Share what you've learned through that progress so far
  • Gather proactive tips on clearing hurdles to come

3:00pm - 3:45pm  Workshop

Office Hours with Chris Ulrich

Chris Ulrich headshot

Chris Ulrich

Body Language Expert

Guest Speaker

What does your body language say about you? What shifts might you make to change how others perceive you? Join this special one-on-one session exclusively for Governing Body members with body-language expert Chris Ulrich for candid feedback on your in-person and online body language. Sessions are 20-minutes and pre-registration is required.

In this unique, private session, you’ll receive:

  • One-on-one consultation with a premier expert
  • Live analysis of your unique body language cues
  • Personalized executive presence improvements

3:45pm - 4:10pm  Break

4:10pm - 4:45pm  Keynote

The Path of Most Resistance

Juman Doleh-Alomary headshot

Juman Doleh-Alomary

CISO

BorgWarner

Navigating the complex landscape of IT and cybersecurity demands a strategic and intentional approach that values diversity and mentorship. Embracing the path of most resistance fosters unconventional professional growth and leads to significant technological and security breakthroughs. By leveraging unique perspectives and experiences, IT and security leaders can drive innovation and establish a more resilient organizational strategy.

Join Juman Doleh-Alomary, CISO at BorgWarner, as she shares about:

  • Building a personal board of directors and excellence in teams
  • Tackling complex projects to cultivate innovation and secure a competitive advantage
  • Enhancing flexibility and collaboration by valuing diverse opinions and ideas, strengthening trust across the industry

4:45pm - 5:00pm  Closing Comments and Prize Drawing

6:00pm - 8:30pm  Networking

Governing Body Welcome Reception

Governing Body members host this dinner for attendees to launch the event with an evening of peer networking, live music and an open bar.

7:45am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

Body Language Secrets for Enhanced Executive Presence

Chris Ulrich headshot

Chris Ulrich

Body Language Expert

Guest Speaker

Uncovering the mysteries of body language — how people communicate their thoughts and feelings without saying a word — is a decisive first step toward mastering any business and social situation.  Top executives know that detecting split-second signals from your team and  leadership then taking immediate action is crucial to being a persuasive communicator and problem-solver especially during tricky internal matters or high-level negotiations.

During this session you will learn how to:

  • Move beyond the vacuum of artificial body language to a behavioral approach based on YOU
  • Strengthen interpersonal relationships, be a more decisive leader and manage your nerves better
  • Uncover the less obvious needs of others and improve your team’s confidence and competence

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

From Familiar to Future — Breaking the Barriers to IT Innovation

Loren Hudziak headshot

Loren Hudziak

Customer Engineer Manager, ChromeOS

Google

IT & security leaders are under pressure to innovate their organization’s tech stack to meet the demands of modern business. While web-based apps, AI and other modern solutions offer a better user experience, advanced security and simpler management, many businesses are still critically dependent on legacy apps and systems. How can IT & security teams innovate their infrastructure without disrupting operations and end users? This session breaks down some common misconceptions about modernization and reveals a direct path for IT & security leaders towards more efficient, secure, and cost-effective endpoint management.

Join this session and breakout-style conversation with your peers to discuss:

  • What the modern endpoint looks like for enterprises today
  • How modernization unlocks the power of AI and sharpens your competitive edge
  • How to continue using legacy apps while you innovate

9:40am - 10:25am  Executive Boardroom

Factors to Consider in Optimizing Your Application Portfolio

Mark Coggin headshot

Mark Coggin

VP, Portfolio Marketing

Rimini Street

Scott Bennett headshot

Scott Bennett

CIO

Lear Corporation

Joseph Simpson headshot

Joseph Simpson

CIO

Edward Rose & Sons

CIOs are balancing an ever-increasing number of demands from the business – strong innovation balanced with cost optimization. This is further complicated with talent shortages and vendor pressure to migrate and upgrade. To allocate more funds towards innovation, mission-critical systems need to be optimized, cost effective, and flexible. This is why strong vendor and application rationalization must be integrated into your IT strategy.

Join this session to discuss:

  • How to incorporate emerging technology like AI without complete re-platforming
  • Understand approaches to take for application portfolio rationalization
  • Strategies to avoid vendor mandated roadmaps

9:40am - 10:25am  Executive Boardroom

The Business of Security — Bridging the Gap Between Cyber Initiatives and Business Impact

Tyler Zito headshot

Tyler Zito

Senior Solutions Architect

Expel

Marty Christensen headshot

Marty Christensen

Head of Cyber Security for Enterprise, Cloud, and Supply Chain

Ford

Homyar Naterwala headshot

Homyar Naterwala

Business Information Security Officer

GE Aerospace

Economic trends have tightened purse strings everywhere, leaving CISOs and security leaders to demonstrate ROI and defend their budgets. But ROI is notoriously tough to quantify when the primary return for security investment is reduction in risk. As a result, bridging the gap between security investments and actual business impact can be easier said than done, particularly if your cybersecurity spend doesn’t clearly map to organizational goals.

Join this session to discuss:

  • Identifying the right metrics for quantifying security ROI and business impact        
  • Positioning security as a business enabler, rather than a cost center
  • Aligning security investments to organizational goals

9:40am - 10:25am  Executive Boardroom

Managing OT to Fully Secure the Business

Laura Davidson headshot

Laura Davidson

CISO

American Axle & Manufacturing

Adam Keagle headshot

Adam Keagle

CISO

Detroit Diesel Corporation

For most organizations, the number of connected, essential devices is growing by the second. In response, the CISO's jurisdiction is changing just as rapidly. Now, in the case of any security issue, the rest of the C-suite may be looking to you for answers.

Join this session and start understanding:

  • Your new or growing operational technology responsibilities
  • What you can do to smoothly plot and control your OT workload
  • How you can best juggle IT and OT security simultaneously

9:40am - 10:25am  Workshop

Office Hours with Chris Ulrich

Chris Ulrich headshot

Chris Ulrich

Body Language Expert

Guest Speaker

What does your body language say about you? What shifts might you make to change how others perceive you? Join this special one-on-one session exclusively for Governing Body members with body-language expert Chris Ulrich for candid feedback on your in-person and online body language. Sessions are 20-minutes and pre-registration is required.

In this unique, private session, you’ll receive:

  • One-on-one consultation with a premier expert
  • Live analysis of your unique body language cues
  • Personalized executive presence improvements

10:25am - 11:05am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:05am - 11:50am  Breakout Session

Embracing Innovation — Real-World GenAI Use Cases

Ryan Olivier headshot

Ryan Olivier

VP & CIO

American Axle & Manufacturing

Scott Bennett headshot

Scott Bennett

CIO

Lear Corporation

The present moment offers an opportunity to unlock GenAI's transformative power, but maturity across organizations varies. Business leaders recognize this technology is a catalyst for innovation. By understanding real-world case studies with lessons learned, those leaders can create real movement forward inside of their own organizations.

Bring your questions, advice, and challenges to this INTERACTIVE session as you discuss with other executives who have:

  • Implemented practical GenAI use cases and identified opportunities
  • Compared and measured platforms and solutions for value outcomes
  • Balanced approach to value and risk

11:05am - 11:50am  Executive Boardroom

Digital Inclusion and the CIO’s Path Forward

Rohan Pal headshot

Rohan Pal

Chief Transformation Officer

ServiceNow

Debi Brobst headshot

Debi Brobst

CIO

ProMedica

Mike Rogers headshot

Mike Rogers

CIO

Nexteer

While many CEOs are tasking the business to advance digital priorities, challenges block progress due to legacy IT, transitioning to the cloud, and the unrelenting task of IT operations. Breaking the bottleneck of transformation is not straightforward, but creating ownership with the wider business can prove to be a winning strategy.

Join this session to discuss:

  • Infusing “digital inclusion” into the organization
  • Incorporating the wider business to drive its own digital priorities
  • Collaborating across the C-Suite to meet enterprise goals

11:05am - 11:50am  Executive Boardroom

Transformative Shockwaves: Navigating Unpredictability Through Strategic Control

KJ Kusch headshot

KJ Kusch

Global Field Chief Technology Officer

WalkMe

James McFarlane headshot

James McFarlane

CIO & VP

HoMedics

Stefan Ott headshot

Stefan Ott

VP Enterprise Architecture and Planning – JET Delivery

Jackson

As lines of business continue to invest in new applications and processes, disconnected, siloed, and individual initiatives are creating shockwaves throughout the organization. Such random acts of digital lack the necessary degrees of strategic oversight and organizational change control, leading to unpredictability and elevated levels of organizational risk.

Join this boardroom to discuss how to:

  • Adopt new digital solutions with proactive approaches
  • Eliminate chance outcomes from random acts of digital
  • Promote unity while mitigating risks

11:05am - 11:50am  Executive Boardroom

Communicating and Measuring Cyber Risk More Effectively

Russ Gordon headshot

Russ Gordon

CISO

PHINIA

Erik Wille headshot

Erik Wille

CISO

Cabinetworks Group

In today’s environment, it is even more challenging for security leaders to communicate and measure their cyber risk and program to their executive board. Being fully transparent about an organization’s weaknesses, strengths, and investments as it relates to cyber risk can be an uncomfortable conversation to have, but it is essential to the overall health of the business.

Join this session to learn:

  • Metrics that quantify challenges & risks
  • How to create trust with dialogue delivery and engage leadership with non-security terms
  • Using data to communicate and explain the risks and how to best leverage this data

11:50am - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

Worth the Business Risk? Security That Advances Innovation

Pamela Kubiatowski headshot

Pamela Kubiatowski

Global VP, CTO in Residence

Zscaler

Jeremy Hyland headshot

Jeremy Hyland

Director of Cyber Defense

Dow

IT and security must strike an intricate balance between enablement and protection. Cyber and business risk considerations should mesh into a strategy that both propels innovation and creates business value. As CIOs and CISOs grapple with increasingly complex decisions and evolving digital transformation roadmaps, how can leaders position cybersecurity as a pillar for advancing innovation?

Join this session to learn:

  • How to foster inclusive conversations on cybersecurity by framing issues in terms of business risk
  • Identifying initial steps and key phases of zero trust implementation within a broader risk strategy
  • Demystifying zero trust architecture for other leaders and recruit business champions for transformation

1:10pm - 1:35pm  Break

1:35pm - 2:20pm  Breakout Session

A New Era of Compliance & Regulation

Janette Barretto headshot

Janette Barretto

Global Security and Risk Manager

Yazaki North America

Steven Herrin headshot

Steven Herrin

Director, Cybersecurity/CISO

DTE

Scott Sadlocha headshot

Scott Sadlocha

SVP, CISO

United Wholesale Mortgage

With the continuous advancement of technology, businesses face new and evolving threats that require a proactive response. New laws and precedents expose cybersecurity leaders to personal liability and leave security leaders questioning their protection.

Join this interactive session to discuss:

  • Essential questions to ask your legal team
  • Best practices for keeping up to date with the evolving governance, risk, and compliance landscape
  • C-Suite liability and information security risk

1:35pm - 2:20pm  Executive Boardroom

Generative AI — Should CISOs be Guardians or Gatekeepers?

Lior Yaari headshot

Lior Yaari

CEO and Co-Founder

Grip Security

Mick Leach headshot

Mick Leach

Field CISO

Abnormal Security

Jeremy Hyland headshot

Jeremy Hyland

Director of Cyber Defense

Dow

Mo Wehbi headshot

Mo Wehbi

Vice President, Information Security & PMO

Penske

From content generation to data analysis, generative AI is transforming the way people work and drastically improving productivity. However, the benefits do not come without risks, and the technology has the potential to do more harm than good when placed in the wrong hands. So what do security leaders need to know about the risks of generative AI, and how do they mitigate them?

Join this session for an insightful discussion on the latest cybersecurity challenges associated with generative AI, including:

  • How the threat landscape is changing as a result of generative AI
  • How businesses can ensure the privacy and security of sensitive data used in generative AI applications and govern them appropriately
  • What tools and capabilities are necessary to protect organizations from malicious uses of generative AI

1:35pm - 2:20pm  Executive Boardroom

Securing a Modern Data Governance Program

David Bobryk headshot

David Bobryk

Director, Health Informatics and Analytics

Trinity Health

Nicole Rembert headshot

Nicole Rembert

Global Cybersecurity Governance, Risk and Compliance Director

UL Solutions

Establishing a secure governance program that successfully aligns with business priorities is crucial especially in an age of AI innovation. CIOs and CISOs must balance providing accurate and accessible data with compliance and security concerns.

Join this session to discuss:

  • Aligning data governance strategy with the organization’s goals
  • Addressing data privacy, compliance and security concerns
  • Focusing on data ownership and stewardship for effective management

1:35pm - 2:20pm  Executive Boardroom

Stress Management Strategies for Effective Leadership

Heidi Mattison headshot

Heidi Mattison

CTO

Cabinetworks Group

Ryan Talbott headshot

Ryan Talbott

VP & Global CIO

BorgWarner

Technology and security leaders' worlds are complex, challenging, and often exhausting. If you’re not dealing with vulnerabilities or implementing and managing security solutions, you’re navigating governance and company-wide risk perspectives. When do leaders get a chance to breathe and beat the fatigue?

Join this peer-led boardroom to discuss:

  • Understanding the critical role CIOs & CISOs can play in stress management for themselves and their employees
  • Exploring how trust and openness with your team can improve well-being and mental health
  • Actionable takeaways on how to manage stress within the workplace

2:20pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

Digital Leader's Compass — A Framework for Leading in the Digital Age

Raj Polanki headshot

Raj Polanki

Head of IT & Digital / US CIO

Wacker Chemical

In today's rapidly evolving digital landscape, IT leaders are faced with the daunting task of steering their organizations through a complex array of challenges and opportunities. It is common to hope for a compass or a framework to help balance technology changes and business transformation needs. Raj Polanki, Head of IT & Digital / US CIO, Wacker Chemical, will explore the critical components of transforming the current IT landscape for agility and scalability while implementing robust cybersecurity measures.

Join this interactive session to discuss:

  • Maximizing impact with limited resources
  • Leveraging and integrating current and emerging technologies
  • Fostering a culture of experimentation by refining processes, driving optimization, and leveraging data and analytics
  • Analyzing scenarios to determine the right approach based on organizational goals and market conditions

3:00pm - 3:45pm  Executive Boardroom

Strategic Third-Party Risk Management — From Due Diligence to Continuous Oversight

Travis Bray headshot

Travis Bray

Director Business Transformation & Cybersecurity

Magna Powertrain USA

Pamela Hensley headshot

Pamela Hensley

Director, Information Security

AAA Life Insurance

Vendor selection, pre-partner due diligence, and trusted implementation are merely the beginning of a healthy third-party management culture. With those pieces in place, the real work (like battling for constant visibility and enforcing your requirements) begins. You’ll need to be prepared.

Gather and discuss how to CISOs have successfully:

  • Vetted new and prospective third-parties
  • Monitored network of existing third-parties
  • Asserted security requirements with vulnerable, but critical, third-parties

3:00pm - 3:45pm  Executive Boardroom

Routing Your Generative AI Implementation Marathon

Dan Rainey headshot

Dan Rainey

CIO

Detroit Water & Sewerage Department

John Wei headshot

John Wei

EVP, CTO

Integreon

Early adopters confirm, AI-implementation isn't for the faint of heart (or the light of checkbook). Yet, the expectation to welcome this booming tech advancement into your organization remains. Today, studying the efforts of those same early adopters proves the easiest first step in drawing up your own AI road map.

 Gather with your peers to:

  • Compare your varying stages of AI-adoption progress
  • Share what you've learned through that progress so far
  • Gather proactive tips on clearing hurdles to come

3:00pm - 3:45pm  Workshop

Office Hours with Chris Ulrich

Chris Ulrich headshot

Chris Ulrich

Body Language Expert

Guest Speaker

What does your body language say about you? What shifts might you make to change how others perceive you? Join this special one-on-one session exclusively for Governing Body members with body-language expert Chris Ulrich for candid feedback on your in-person and online body language. Sessions are 20-minutes and pre-registration is required.

In this unique, private session, you’ll receive:

  • One-on-one consultation with a premier expert
  • Live analysis of your unique body language cues
  • Personalized executive presence improvements

3:45pm - 4:10pm  Break

4:10pm - 4:45pm  Keynote

The Path of Most Resistance

Juman Doleh-Alomary headshot

Juman Doleh-Alomary

CISO

BorgWarner

Navigating the complex landscape of IT and cybersecurity demands a strategic and intentional approach that values diversity and mentorship. Embracing the path of most resistance fosters unconventional professional growth and leads to significant technological and security breakthroughs. By leveraging unique perspectives and experiences, IT and security leaders can drive innovation and establish a more resilient organizational strategy.

Join Juman Doleh-Alomary, CISO at BorgWarner, as she shares about:

  • Building a personal board of directors and excellence in teams
  • Tackling complex projects to cultivate innovation and secure a competitive advantage
  • Enhancing flexibility and collaboration by valuing diverse opinions and ideas, strengthening trust across the industry

4:45pm - 5:00pm  Closing Comments and Prize Drawing

June 17, 2024

June 18, 2024

We look forward to seeing you at an upcoming in-person gathering


Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

The Henry, Autograph Collection

A block of rooms has been reserved at the The Henry, Autograph Collection at a reduced conference rate. Reservations should be made online or by calling (313) 441-2000.

Deadline to book using the discounted room rate of $249 USD (plus tax) is May 27, 2024.

Your Community Partners


Global Thought Leaders
CISO Thought Leader
Key Partners
Program Partners

Community Program Managers


For inquiries related to this community, please reach out to your dedicated contacts.

Alex Shimrat

Community Program Manager

315-857-5945

alex.shimrat@evanta.com

Jeff Hull

Community Program Manager

214-649-0033

jeff.hull@evanta.com