IN-PERSON

Philadelphia CIO Executive Summit

December 10, 2024 | Convene at CityView

December 10, 2024
Convene at CityView

APPLY TO PARTICIPATE

Collaborate with your peers

Get together with Philadelphia's top CIOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CIOs today:

Leveraging technology and modernizing processes to enhance operational efficiency

Ensuring resiliency and mitigating risk is top of mind within cybersecurity strategies

Using data-driven insights to sustain a competitive advantage in the age of digital intelligence

Philadelphia CIO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CIOs, for CIOs.

Governing Body Co-Chairs

Joshua Beeman

University of Pennsylvania
Associate VP of IT & Associate CIO

Tricia Blair

Aon Corporation US
Chief Digital Officer

Vishi Viswanathan

Day & Zimmermann Group
CIO & SVP Business Services

What to Expect

Interactive Sessions

Hear from CIO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Philadelphia CIO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


December 10, 2024

7:45am - 8:30am  Registration & Breakfast

8:15am - 9:15am  Keynote

Body Language Secrets for Enhanced Executive Presence

Chris Ulrich headshot

Chris Ulrich

Body Language Expert

Guest Speaker

Uncovering the mysteries of body language — how people communicate their thoughts and feelings without saying a word — is a decisive first step toward mastering any business and social situation.  Top executives know that detecting split-second signals from your team and  leadership then taking immediate action is crucial to being a persuasive communicator and problem-solver especially during tricky internal matters or high-level negotiations.

During this session you will learn how to:

  • Move beyond the vacuum of artificial body language to a behavioral approach based on YOU
  • Strengthen interpersonal relationships, be a more decisive leader and manage your nerves better
  • Uncover the less obvious needs of others and improve your team’s confidence and competence

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

From Familiar to Future — Breaking the Barriers to IT Innovation

Loren Hudziak headshot

Loren Hudziak

Customer Engineer Manager, ChromeOS

Google

IT leaders are under pressure to innovate their organization’s tech stack to meet the demands of modern business. While web-based apps, AI and other modern solutions offer a better user experience, advanced security and simpler management, many businesses are still critically dependent on legacy apps and systems. How can IT teams innovate their infrastructure without disrupting operations and end users? This session breaks down some common misconceptions about modernization and reveals a direct path for IT leaders towards more efficient, secure, and cost-effective endpoint management.

Join this session and breakout-style conversation with ChromeOS and your peers to discuss:

  • What the modern endpoint looks like for enterprises today
  • How modernization unlocks the power of AI and sharpens your competitive edge
  • How to continue using legacy apps while you innovate

9:40am - 10:25am  Executive Boardroom

Securing the Everywhere World — Building Cyber Resilience through a “Connectivity Cloud”

John Engates headshot

John Engates

Field CTO

Cloudflare

Dave Snyder headshot

Dave Snyder

Cloud Security Architect, Chief Information Security Leader Emeritus

Independence Blue Cross

Reginald Williams headshot

Reginald Williams

Chief Information Security Officer

The Chemours Co

When users are everywhere and digital operations span cloud, SaaS, and on-premises environments, achieving cyber resilience becomes paramount. The challenge lies in navigating this complexity and maintaining visibility and control to ensure continuous operation despite cyber threats.

Join this interactive roundtable to discuss:

  • Optimizing costs and improving security across diverse cloud environments
  • Adopting Zero Trust philosophies to protect users, data, and applications
  • Innovating with AI while addressing global regulatory and data privacy requirements

9:40am - 10:25am  Executive Boardroom

Secure Every Identity — Human and Machine

Brandon Traffanstedt headshot

Brandon Traffanstedt

Senior Director, Global Technology Office

CYBERARK

Melissa Miller headshot

Melissa Miller

CIO

Penn Dental Medicine

The path to stronger identity security strategies lies within an agile and connected digital system. CISOs are often challenged with keeping disparate identities up to date, but when leveraged correctly, easy-to-use technology can be a game changer.

Join this boardroom to discuss:

  • The essentials for building seamless and secure access
  • The challenges faced when protecting against malicious actors
  • How to automate the management of digital identities

9:40am - 10:25am  Executive Boardroom

Upskilling for an AI-Integrated World

Samantha Davis headshot

Samantha Davis

CIO Americas

Arkema Inc.

Ed Maule headshot

Ed Maule

CIO

AdvoCare

According to Gartner, by 2026, AI will augment 50% of office workers in global enterprises. When IT talent demand outweighs supply, CIOs must face skills gaps head on and create a future-proof talent strategy.

Join this session to discuss:

  • Preparing your workforce for AI Implementation
  • Identifying employee skills to build upon
  • Prioritizing talent planning for long term success

10:25am - 11:05am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:05am - 11:50am  Breakout Session

C-suite Success & Succession — Planning What Comes Next

Nancy Hunter headshot

Nancy Hunter

Retired, VP, CISO

Federal Reserve Bank of Philadelphia

Ted Bredikin headshot

Ted Bredikin

CIO

UnitedHealth Group

Monique St. John headshot

Monique St. John

VP, ACIO & CISO

Children's Hospital of Philadelphia

Succession planning is critical for CIOs and CISOs to ensure continuity and resilience in leadership roles. By identifying and developing internal talent, organizations can mitigate risks associated with unexpected departures and maintain strategic momentum.

Join this panel conversation to strategize on:

  • Establishing a roadmap for leadership transition
  • Assessing current capabilities and providing targeted development opportunities
  • Ensuring leadership continuity and organizational resilience

11:05am - 11:50am  Breakout Session

Building Resilience in the Age of Ransomware — Real-World Insights

Todd Bearman headshot

Todd Bearman

VP, CISO

TE Connectivity

Ransomware attacks are not just a technological challenge; they test the very resilience of your organization. Todd Bearman, CISO of TE Connectivity, will share valuable insights from a year-long project on ransomware preparedness. Gain a fresh perspective on navigating the complexities of modern cyber threats and making informed decisions under pressure.

Join this session, to discuss:

  • Building a robust incident response framework tailored to ransomware threats
  • Engaging and communicating proactively with key partners and stakeholders
  • Strategies to enhance recovery speed and minimize operational downtime

11:05am - 11:50am  Executive Boardroom

Scaling Generative AI Technologies

Lane Shelton headshot

Lane Shelton

Vice President, Microsoft & Software Advisory Group

SHI International

James Edmunds headshot

James Edmunds

Vice President, Information Technology

Allan Myers

Scaling GenAI tools, like Copilot, beyond the proof of concept stage can be challenging. Yet, the expectation to integrate this transformative technology into your organization remains. Learning from the successes and challenges of others can provide the insights needed to navigate your AI journey effectively.

Gather with your peers to:

  • Share success stories and challenges in AI implementation
  • Discuss financial, operational, and governance hurdles of deploying AI at scale
  • Explore approaches to AI implementation, from persona-based to integrated experiences

11:05am - 11:50am  Executive Boardroom

A New Era of Compliance & Regulation

Mark Eggleston headshot

Mark Eggleston

CISO

Corporation Service Co

Kim Sassaman headshot

Kim Sassaman

CISO

Universal Health Services

With the continuous advancement of technology, businesses face new and evolving threats that require a proactive response. New laws and precedents expose cybersecurity leaders to personal liability and leave security leaders questioning their protection.

Join this interactive session to discuss:

  • Essential questions to ask your legal team
  • Best practices for keeping up to date with the evolving governance, risk, and compliance landscape
  • C-Suite liability and information security risk

11:50am - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

The Art of Data Security — Protecting Your Most Important Asset

Nathan Smolenski headshot

Nathan Smolenski

Head of Risk and Incident Response Services

Cyera

As a security leader you’re being asked to find ways to securely enable your business to use data to drive innovation - and become a data master. But this takes a fundamental understanding of what data exists within your environment, where it's running, its risk level, who has access to it, and how it's being used. The modern security leader must discover their data attack surface, monitor, detect and respond to data threats - including the scope of breach identification - and ensure data compliance.

Join this session to discuss:

  • Gaining data visibility as a foundation for data governance
  • Managing the evolving landscape of laws, regulations, and industry standards around data security
  • Working with the right tools and teams across a shared responsibility model to ensure compliance

1:10pm - 1:35pm  Break

1:35pm - 2:20pm  Breakout Session

Embracing Innovation — Real-World GenAI Use Cases

Vincent Miller headshot

Vincent Miller

CIO US Food & Facilities

Aramark

The present moment offers an opportunity to unlock GenAI's transformative power, but maturity across organizations varies. Business leaders recognize this technology is a catalyst for innovation. By understanding real-world case studies with lessons learned, those leaders can create real movement forward inside of their own organizations.

Bring your questions, advice, and challenges to this INTERACTIVE session as you discuss with other executives who have:

  • Implemented practical GenAI use cases and identified opportunities
  • Compared and measured platforms and solutions for value outcomes
  • Balanced approach to value and risk

1:35pm - 2:20pm  Breakout Session

Aligning IT and OT for Success

Mike Bizzoco headshot

Mike Bizzoco

VP, IT Service Delivery, Data & Analytics

South Jersey Industries

Jamie Clark headshot

Jamie Clark

VP, Information Security

South Jersey Industries

In the dynamic world of renewable energy, integrating IT and OT systems is essential for driving innovation and efficiency. Join Jamie Clark and Mike Bizzoco of South Jersey Industries to explore a pioneering security-by-design solution that enables seamless data flow across energy farms. This approach ensures enhanced cybersecurity, resiliency, and compliance, setting a benchmark for future projects.

In this fireside chat, you’ll learn:

  • Strategies for effective IT and OT alignment
  • Techniques to bolster cybersecurity and resiliency
  • Best practices for achieving compliance and safety

1:35pm - 2:20pm  Executive Boardroom

Putting Culture at the Center of Cybersecurity

Mike DiLoreto headshot

Mike DiLoreto

Sr. Director, Infosec Strategy and Governance

Anywhere Real Estate

Antonio Crespo headshot

Antonio Crespo

CISO Americas

Arkema Inc.

At a time when new threats emerge daily, cybersecurity leaders understand they must be one thing above all others: enablers of business. And what's the foundation of business enablement? Culture.

Join this session to hear how your peers are successfully leveling up the security culture at their organizations and share your own insights about:

  • Separating awareness and training from conversations about culture
  • Leveraging culture to drive business impact through cybersecurity
  • Tailoring approaches to security culture for different levels/groups

1:35pm - 2:20pm  Executive Boardroom

Maximizing Resources — Strategic Budget Planning

Ed Jablonski headshot

Ed Jablonski

EVP, CTO

Fulton Financial

Tracey Brand - Sanders headshot

Tracey Brand - Sanders

VP & CISO

UGI Corporation

According to Gartner, improving operating margins and ensuring compliance/minimizing risks are the most-critical outcomes of digital technology investments across industries. As these priorities shape the future, CIOs and CISOs must align strategies for impactful results.

In this session, you’ll discuss:

  • Leveraging technology investment trends
  • Navigating IT budget changes and vendor choices
  • Maximizing outcomes of digital investments

2:20pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

Empathetic Cybersecurity Leadership — Uniting Teams Through Trust and Transparency

Tammy Klotz headshot

Tammy Klotz

CISO

Trinseo

In today’s fast-paced digital landscape, effective cybersecurity leadership requires more than just technical expertise. Tammy Klotz, CISO at Trinseo, will share her approach to leadership that emphasizes empathy, transparency, and collaboration. Discover how these principles can foster a culture of trust and drive organizational success.

In this session, you’ll learn:

  • Building a collaborative and transparent organizational culture
  • Effective communication strategies to break down barriers
  • Techniques for providing and receiving timely, constructive feedback

3:00pm - 3:45pm  Executive Boardroom

D&A Strategies that Improve Organizational Outcomes

Kevin Gokey headshot

Kevin Gokey

EVP & Global CIO

Church & Dwight

Bistra Lutz headshot

Bistra Lutz

Director Global Information Security Operations

Crown Holdings

In the quest to leverage data and analytics for business growth, IT leaders face both cultural and technical challenges. To succeed, they must collaborate closely with business leaders to develop a powerful, long-term analytics strategy that drives data-driven decision-making across the organization.

Join this session to explore:

  • Ensuring data quality standards and ownership
  • Utilizing analytics to allow for better decision making across the business and measurable outcomes
  • Building a foundation for successful innovation including AI

3:00pm - 3:45pm  Executive Boardroom

Strategic Third-Party Risk Management: From Due Diligence to Continuous Oversight

Michael DaGrossa headshot

Michael DaGrossa

Vice President, Information Security

Genesis HealthCare

Julian Mihai headshot

Julian Mihai

CISO

Penn Medicine

Vendor selection, pre-partner due diligence, and trusted implementation are merely the beginning of a healthy third-party management culture. With those pieces in place, the real work (like battling for constant visibility and enforcing your requirements) begins. You’ll need to be prepared.

Gather and discuss how to CISOs have successfully:

  • Vetted new and prospective third-parties
  • Monitored network of existing third-parties
  • Asserted security requirements with vulnerable, but critical, third-parties

3:00pm - 3:45pm  Executive Boardroom

Strategic Harmony — IT & Business Alignment

David Beltz headshot

David Beltz

VP, CIO

Trinseo

Greg Driscoll headshot

Greg Driscoll

CIO

Penn Mutual Life Insurance

As IT's role within the business continues to evolve, CIOs must create a clear line of sight between IT strategy and business outcomes and priorities.

Join this boardroom session to discuss:

  • Aligning IT strategy with business goals and objectives
  • Positioning IT as a value driver for the business
  • Shaping a business-driven culture within IT

3:45pm - 4:10pm  Break

4:10pm - 4:45pm  Keynote

The New Face of Change — Cultivating A Core-Competency Across Leaders

Kevin Smith headshot

Kevin Smith

Senior Director Analyst

Gartner

Transformative technology and security leaders are agents for change. However, managing change using traditional methods can still be challenging and may not yield the transformative results we desire. In this session, we will reexamine our approach to change, embrace owning our roles in leading change, and strengthen the link between strategy and transformation. With this enhanced approach, today’s CIOs & CISOs can get in front of change, resulting in decreased change resistance and sustained performance.

Join Kevin Smith, Gartner Analyst, to learn:

  • Strategies to decrease change resistance
  • Methods to link strategy with transformation
  • Techniques to sustain performance during change

4:45pm - 5:00pm  Closing Comments and Prize Drawing

5:00pm - 6:30pm  Governing Body Reception

Governing Body Reception

Governing Body members host this reception for executives to close out the event with an evening of peer networking, food and drinks.

7:45am - 8:30am  Registration & Breakfast

8:15am - 9:15am  Keynote

Body Language Secrets for Enhanced Executive Presence

Chris Ulrich headshot

Chris Ulrich

Body Language Expert

Guest Speaker

Uncovering the mysteries of body language — how people communicate their thoughts and feelings without saying a word — is a decisive first step toward mastering any business and social situation.  Top executives know that detecting split-second signals from your team and  leadership then taking immediate action is crucial to being a persuasive communicator and problem-solver especially during tricky internal matters or high-level negotiations.

During this session you will learn how to:

  • Move beyond the vacuum of artificial body language to a behavioral approach based on YOU
  • Strengthen interpersonal relationships, be a more decisive leader and manage your nerves better
  • Uncover the less obvious needs of others and improve your team’s confidence and competence

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

From Familiar to Future — Breaking the Barriers to IT Innovation

Loren Hudziak headshot

Loren Hudziak

Customer Engineer Manager, ChromeOS

Google

IT leaders are under pressure to innovate their organization’s tech stack to meet the demands of modern business. While web-based apps, AI and other modern solutions offer a better user experience, advanced security and simpler management, many businesses are still critically dependent on legacy apps and systems. How can IT teams innovate their infrastructure without disrupting operations and end users? This session breaks down some common misconceptions about modernization and reveals a direct path for IT leaders towards more efficient, secure, and cost-effective endpoint management.

Join this session and breakout-style conversation with ChromeOS and your peers to discuss:

  • What the modern endpoint looks like for enterprises today
  • How modernization unlocks the power of AI and sharpens your competitive edge
  • How to continue using legacy apps while you innovate

9:40am - 10:25am  Executive Boardroom

Securing the Everywhere World — Building Cyber Resilience through a “Connectivity Cloud”

John Engates headshot

John Engates

Field CTO

Cloudflare

Dave Snyder headshot

Dave Snyder

Cloud Security Architect, Chief Information Security Leader Emeritus

Independence Blue Cross

Reginald Williams headshot

Reginald Williams

Chief Information Security Officer

The Chemours Co

When users are everywhere and digital operations span cloud, SaaS, and on-premises environments, achieving cyber resilience becomes paramount. The challenge lies in navigating this complexity and maintaining visibility and control to ensure continuous operation despite cyber threats.

Join this interactive roundtable to discuss:

  • Optimizing costs and improving security across diverse cloud environments
  • Adopting Zero Trust philosophies to protect users, data, and applications
  • Innovating with AI while addressing global regulatory and data privacy requirements

9:40am - 10:25am  Executive Boardroom

Secure Every Identity — Human and Machine

Brandon Traffanstedt headshot

Brandon Traffanstedt

Senior Director, Global Technology Office

CYBERARK

Melissa Miller headshot

Melissa Miller

CIO

Penn Dental Medicine

The path to stronger identity security strategies lies within an agile and connected digital system. CISOs are often challenged with keeping disparate identities up to date, but when leveraged correctly, easy-to-use technology can be a game changer.

Join this boardroom to discuss:

  • The essentials for building seamless and secure access
  • The challenges faced when protecting against malicious actors
  • How to automate the management of digital identities

9:40am - 10:25am  Executive Boardroom

Upskilling for an AI-Integrated World

Samantha Davis headshot

Samantha Davis

CIO Americas

Arkema Inc.

Ed Maule headshot

Ed Maule

CIO

AdvoCare

According to Gartner, by 2026, AI will augment 50% of office workers in global enterprises. When IT talent demand outweighs supply, CIOs must face skills gaps head on and create a future-proof talent strategy.

Join this session to discuss:

  • Preparing your workforce for AI Implementation
  • Identifying employee skills to build upon
  • Prioritizing talent planning for long term success

10:25am - 11:05am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:05am - 11:50am  Breakout Session

C-suite Success & Succession — Planning What Comes Next

Nancy Hunter headshot

Nancy Hunter

Retired, VP, CISO

Federal Reserve Bank of Philadelphia

Ted Bredikin headshot

Ted Bredikin

CIO

UnitedHealth Group

Monique St. John headshot

Monique St. John

VP, ACIO & CISO

Children's Hospital of Philadelphia

Succession planning is critical for CIOs and CISOs to ensure continuity and resilience in leadership roles. By identifying and developing internal talent, organizations can mitigate risks associated with unexpected departures and maintain strategic momentum.

Join this panel conversation to strategize on:

  • Establishing a roadmap for leadership transition
  • Assessing current capabilities and providing targeted development opportunities
  • Ensuring leadership continuity and organizational resilience

11:05am - 11:50am  Breakout Session

Building Resilience in the Age of Ransomware — Real-World Insights

Todd Bearman headshot

Todd Bearman

VP, CISO

TE Connectivity

Ransomware attacks are not just a technological challenge; they test the very resilience of your organization. Todd Bearman, CISO of TE Connectivity, will share valuable insights from a year-long project on ransomware preparedness. Gain a fresh perspective on navigating the complexities of modern cyber threats and making informed decisions under pressure.

Join this session, to discuss:

  • Building a robust incident response framework tailored to ransomware threats
  • Engaging and communicating proactively with key partners and stakeholders
  • Strategies to enhance recovery speed and minimize operational downtime

11:05am - 11:50am  Executive Boardroom

Scaling Generative AI Technologies

Lane Shelton headshot

Lane Shelton

Vice President, Microsoft & Software Advisory Group

SHI International

James Edmunds headshot

James Edmunds

Vice President, Information Technology

Allan Myers

Scaling GenAI tools, like Copilot, beyond the proof of concept stage can be challenging. Yet, the expectation to integrate this transformative technology into your organization remains. Learning from the successes and challenges of others can provide the insights needed to navigate your AI journey effectively.

Gather with your peers to:

  • Share success stories and challenges in AI implementation
  • Discuss financial, operational, and governance hurdles of deploying AI at scale
  • Explore approaches to AI implementation, from persona-based to integrated experiences

11:05am - 11:50am  Executive Boardroom

A New Era of Compliance & Regulation

Mark Eggleston headshot

Mark Eggleston

CISO

Corporation Service Co

Kim Sassaman headshot

Kim Sassaman

CISO

Universal Health Services

With the continuous advancement of technology, businesses face new and evolving threats that require a proactive response. New laws and precedents expose cybersecurity leaders to personal liability and leave security leaders questioning their protection.

Join this interactive session to discuss:

  • Essential questions to ask your legal team
  • Best practices for keeping up to date with the evolving governance, risk, and compliance landscape
  • C-Suite liability and information security risk

11:50am - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

The Art of Data Security — Protecting Your Most Important Asset

Nathan Smolenski headshot

Nathan Smolenski

Head of Risk and Incident Response Services

Cyera

As a security leader you’re being asked to find ways to securely enable your business to use data to drive innovation - and become a data master. But this takes a fundamental understanding of what data exists within your environment, where it's running, its risk level, who has access to it, and how it's being used. The modern security leader must discover their data attack surface, monitor, detect and respond to data threats - including the scope of breach identification - and ensure data compliance.

Join this session to discuss:

  • Gaining data visibility as a foundation for data governance
  • Managing the evolving landscape of laws, regulations, and industry standards around data security
  • Working with the right tools and teams across a shared responsibility model to ensure compliance

1:10pm - 1:35pm  Break

1:35pm - 2:20pm  Breakout Session

Embracing Innovation — Real-World GenAI Use Cases

Vincent Miller headshot

Vincent Miller

CIO US Food & Facilities

Aramark

The present moment offers an opportunity to unlock GenAI's transformative power, but maturity across organizations varies. Business leaders recognize this technology is a catalyst for innovation. By understanding real-world case studies with lessons learned, those leaders can create real movement forward inside of their own organizations.

Bring your questions, advice, and challenges to this INTERACTIVE session as you discuss with other executives who have:

  • Implemented practical GenAI use cases and identified opportunities
  • Compared and measured platforms and solutions for value outcomes
  • Balanced approach to value and risk

1:35pm - 2:20pm  Breakout Session

Aligning IT and OT for Success

Mike Bizzoco headshot

Mike Bizzoco

VP, IT Service Delivery, Data & Analytics

South Jersey Industries

Jamie Clark headshot

Jamie Clark

VP, Information Security

South Jersey Industries

In the dynamic world of renewable energy, integrating IT and OT systems is essential for driving innovation and efficiency. Join Jamie Clark and Mike Bizzoco of South Jersey Industries to explore a pioneering security-by-design solution that enables seamless data flow across energy farms. This approach ensures enhanced cybersecurity, resiliency, and compliance, setting a benchmark for future projects.

In this fireside chat, you’ll learn:

  • Strategies for effective IT and OT alignment
  • Techniques to bolster cybersecurity and resiliency
  • Best practices for achieving compliance and safety

1:35pm - 2:20pm  Executive Boardroom

Putting Culture at the Center of Cybersecurity

Mike DiLoreto headshot

Mike DiLoreto

Sr. Director, Infosec Strategy and Governance

Anywhere Real Estate

Antonio Crespo headshot

Antonio Crespo

CISO Americas

Arkema Inc.

At a time when new threats emerge daily, cybersecurity leaders understand they must be one thing above all others: enablers of business. And what's the foundation of business enablement? Culture.

Join this session to hear how your peers are successfully leveling up the security culture at their organizations and share your own insights about:

  • Separating awareness and training from conversations about culture
  • Leveraging culture to drive business impact through cybersecurity
  • Tailoring approaches to security culture for different levels/groups

1:35pm - 2:20pm  Executive Boardroom

Maximizing Resources — Strategic Budget Planning

Ed Jablonski headshot

Ed Jablonski

EVP, CTO

Fulton Financial

Tracey Brand - Sanders headshot

Tracey Brand - Sanders

VP & CISO

UGI Corporation

According to Gartner, improving operating margins and ensuring compliance/minimizing risks are the most-critical outcomes of digital technology investments across industries. As these priorities shape the future, CIOs and CISOs must align strategies for impactful results.

In this session, you’ll discuss:

  • Leveraging technology investment trends
  • Navigating IT budget changes and vendor choices
  • Maximizing outcomes of digital investments

2:20pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

Empathetic Cybersecurity Leadership — Uniting Teams Through Trust and Transparency

Tammy Klotz headshot

Tammy Klotz

CISO

Trinseo

In today’s fast-paced digital landscape, effective cybersecurity leadership requires more than just technical expertise. Tammy Klotz, CISO at Trinseo, will share her approach to leadership that emphasizes empathy, transparency, and collaboration. Discover how these principles can foster a culture of trust and drive organizational success.

In this session, you’ll learn:

  • Building a collaborative and transparent organizational culture
  • Effective communication strategies to break down barriers
  • Techniques for providing and receiving timely, constructive feedback

3:00pm - 3:45pm  Executive Boardroom

D&A Strategies that Improve Organizational Outcomes

Kevin Gokey headshot

Kevin Gokey

EVP & Global CIO

Church & Dwight

Bistra Lutz headshot

Bistra Lutz

Director Global Information Security Operations

Crown Holdings

In the quest to leverage data and analytics for business growth, IT leaders face both cultural and technical challenges. To succeed, they must collaborate closely with business leaders to develop a powerful, long-term analytics strategy that drives data-driven decision-making across the organization.

Join this session to explore:

  • Ensuring data quality standards and ownership
  • Utilizing analytics to allow for better decision making across the business and measurable outcomes
  • Building a foundation for successful innovation including AI

3:00pm - 3:45pm  Executive Boardroom

Strategic Third-Party Risk Management: From Due Diligence to Continuous Oversight

Michael DaGrossa headshot

Michael DaGrossa

Vice President, Information Security

Genesis HealthCare

Julian Mihai headshot

Julian Mihai

CISO

Penn Medicine

Vendor selection, pre-partner due diligence, and trusted implementation are merely the beginning of a healthy third-party management culture. With those pieces in place, the real work (like battling for constant visibility and enforcing your requirements) begins. You’ll need to be prepared.

Gather and discuss how to CISOs have successfully:

  • Vetted new and prospective third-parties
  • Monitored network of existing third-parties
  • Asserted security requirements with vulnerable, but critical, third-parties

3:00pm - 3:45pm  Executive Boardroom

Strategic Harmony — IT & Business Alignment

David Beltz headshot

David Beltz

VP, CIO

Trinseo

Greg Driscoll headshot

Greg Driscoll

CIO

Penn Mutual Life Insurance

As IT's role within the business continues to evolve, CIOs must create a clear line of sight between IT strategy and business outcomes and priorities.

Join this boardroom session to discuss:

  • Aligning IT strategy with business goals and objectives
  • Positioning IT as a value driver for the business
  • Shaping a business-driven culture within IT

3:45pm - 4:10pm  Break

4:10pm - 4:45pm  Keynote

The New Face of Change — Cultivating A Core-Competency Across Leaders

Kevin Smith headshot

Kevin Smith

Senior Director Analyst

Gartner

Transformative technology and security leaders are agents for change. However, managing change using traditional methods can still be challenging and may not yield the transformative results we desire. In this session, we will reexamine our approach to change, embrace owning our roles in leading change, and strengthen the link between strategy and transformation. With this enhanced approach, today’s CIOs & CISOs can get in front of change, resulting in decreased change resistance and sustained performance.

Join Kevin Smith, Gartner Analyst, to learn:

  • Strategies to decrease change resistance
  • Methods to link strategy with transformation
  • Techniques to sustain performance during change

4:45pm - 5:00pm  Closing Comments and Prize Drawing

5:00pm - 6:30pm  Governing Body Reception

Governing Body Reception

Governing Body members host this reception for executives to close out the event with an evening of peer networking, food and drinks.

December 10, 2024

We look forward to seeing you at an upcoming in-person gathering


Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

Convene at CityView
MORE INFORMATION

Your Community Partners


Global Thought Leader
CISO Thought Leader
Key Partners
Program Partners

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Jeff Hull

Community Program Manager

214-649-0033

jeff.hull@evanta.com