IN-PERSON

Washington, DC CIO Executive Summit

June 13, 2024 | Convene at 1201 Wilson Blvd

June 13, 2024
Convene at 1201 Wilson Blvd

Collaborate with your peers

Get together with Washington, DC's top CIOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CIOs today:

Mitigating risks and improving efficiencies with cybersecurity strategies

Making data-driven decisions to improve business outcomes and allow for innovation

Improving communication to better align business goals with IT and security priorities

Washington, DC CIO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CIOs, for CIOs.

What to Expect

Interactive Sessions

Hear from CIO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Washington, DC CIO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


June 12, 2024

June 13, 2024

6:00pm - 8:30pm  Networking

Governing Body Welcome Reception

Ahead of the Washington DC Executive Summit, Governing Body members will host an exclusive networking reception for CIO and CISO attendees that includes learning how to create craft cocktails and mocktails. Please join your peers for an evening of great drinks, wonderful food and lively networking.

7:45am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

Body Language Secrets for Enhanced Executive Presence

Chris Ulrich headshot

Chris Ulrich

Body Language Expert

Guest Speaker

Uncovering the mysteries of body language — how people communicate their thoughts and feelings without saying a word — is a decisive first step toward mastering any business and social situation. Top executives know that detecting split-second signals from your team and leadership then taking immediate action is crucial to being a persuasive communicator and problem-solver especially during tricky internal matters or high-level negotiations.

During this session you will learn how to:

  • Move beyond the vacuum of artificial body language to a behavioral approach based on YOU
  • Strengthen interpersonal relationships, be a more decisive leader and manage your nerves better
  • Uncover the less obvious needs of others and improve your team’s confidence and competence

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Building an AI-Powered and Secure Unstructured Data Strategy

Jon Herstein headshot

Jon Herstein

Chief Customer Officer

Box

Ryan Bateman headshot

Ryan Bateman

CTO

Sands Capital

Chris Tonjes headshot

Chris Tonjes

Chief Information Officer, Department of Employment Services

District of Columbia

Your unstructured data holds immense value in the files that define your business. To maximize the potential of this data, it's crucial to establish a comprehensive unstructured data strategy that prioritizes both security and AI integration.

Join this session to learn about:

  • Identifying your valuable unstructured data sources and tools
  • Developing robust security measures for internal and external data use
  • Balancing AI with stringent security and compliance protocols to increase utility

9:40am - 10:25am  Executive Boardroom

Threat Intelligence and Third-Party Risk ― Doubling Down on Critical Vulnerabilities

John Chisum headshot

John Chisum

VP, Solutions Consulting

RiskRecon - A MasterCard Company

Addie Adeniji headshot

Addie Adeniji

Deputy CISO

United States House of Representatives

Keith Young headshot

Keith Young

Enterprise Information Security Official

Montgomery County

The complete entanglement of cyber risk with business risk is becoming increasingly more visible. CISOs now have an opportunity to better pinpoint third parties that present a threat to the organization. Yet the increasing complexities of third party, and even fourth party, risk management, prompted by a wide range of evolving threats, demands heightened attention. How can CISOs ensure they have a clear overview of the threat landscape and vulnerabilities across ecosystems and supply chains?

Join this session to discuss:

  • Identification of vulnerabilities across your vendor landscape to prioritize response efforts
  • Best practices for mitigating a new wave of sophisticated attacks to keep assets safe
  • The role threat intelligence plays in risk management strategies to safeguard your digital ecosystem

9:40am - 10:25am  Executive Boardroom

Analyzing Your Application and Infrastructure Technology Strategy

Terry Carpenter headshot

Terry Carpenter

CIO & CTO

National Science Foundation

Christine Wang headshot

Christine Wang

Acting CTO & Deputy CTO

Export-Import Bank of the United States

Applications can make or break an organization’s growth. Too many and you create an opportunity for redundancies and inefficiencies; too few and you risk getting left in the past.  How can leaders evolve their application strategies to optimize cost, increase operational efficiencies, and remain agile in the face of constant change?

Join your peers to discuss:

  • Driving growth through application modernization
  • Creating architectures that evolve with ever-changing business requirements
  • Buying, building or both strategies

10:25am - 11:05am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:05am - 11:50am  Breakout Session

The Ripple Effect – What's Next after a Third-Party Breach?

Kevin McCarty headshot

Kevin McCarty

CISO, US Healthcare

Cigna

A massive third-party breach that put personal data of Americans at risk is making headlines and causing headaches for health care institutions across the country.  Now security teams in the highly regulated industry are working overtime to figure out what data has been leaked and where to go from here.  As we watch the fallout and legal actions get underway, what lessons for IT and security leaders can be learned from this breach no matter what industry you work in?

Join this session to learn about:

  • Keeping up with the pace of business while handling a breach
  • Strategizing for continuous assessment of your organization’s security and the monitoring of third parties
  • Communicating with cross-functional leaders and the board

11:05am - 11:50am  Executive Boardroom

Preparing for Battle — Getting Ahead of Security Challenges of Tomorrow

Tom McWalters headshot

Tom McWalters

Security Value Advisor

Google Cloud

Tony Parrillo headshot

Tony Parrillo

VP, Enterprise IT Global Head of Security

Schneider Electric North America

Tony Plater headshot

Tony Plater

DON CISO

US Navy

When it comes to GenAI and nascent technologies being rapidly adopted, CIOs and CISOs must be proactive and thorough in their planning efforts and essentially attempt to predict the future. Today, we know data, access control, and IP must be protected while delighting users amid a changing threat landscape. But what does tomorrow bring?

Join this session to explore:

  • How to take advantage of the AI opportunity while also developing a foundationally secure enterprise
  • Ways to ensure your data, policies, and practices are clean and secure to minimize the risk of AI usage
  • Developing guidelines and policies for enabling business leaders, employees, and customers to realize the AI opportunity

11:05am - 11:50am  Executive Boardroom

Optimizing Decision-Making with Advanced Analytics

Carol Assi headshot

Carol Assi

Cybersecurity Chief Operations Officer

Department of Defense

Kevin Apperson headshot

Kevin Apperson

CIO

Amergis Healthcare Staffing

The term "data-driven" is often used as a coveted descriptor for business excellence. But does this description hit the mark? A data-driven enterprise must convert trusted data while leaning heavily into predictive analytics to inform decision-making.

Join this session as CIOs discuss:

  • Ensuring data quality standards truly benefit from analytical insights
  • Empowering the enterprise to make more data informed decisions
  • Troubleshooting to drive business value

11:50am - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

Leveraging Emerging Technologies for Cybersecurity Strategy

Sanjit Ganguli headshot

Sanjit Ganguli

CTO in Residence

Zscaler

New, special demands constantly arise for decision-makers who steer the fortunes of companies. Recently, business success has become linked to IT infrastructure. Seamless and secure connectivity is the key to unlocking innovation and accelerating business outcomes. To reach this state, enterprises are transforming their networks and security to a zero trust architecture augmented by AI/ML capabilities, thereby reducing risk, eliminating cost and complexity and increasing agility.

Join this session and learn:

  • How zero trust architecture secures users, workloads, IoT/OT devices, and your business partners by addressing critical security shortcomings of legacy network architecture
  • How to reduce network complexity without exposing your organization to new risks
  • How AI/ML adds defensive and business analytics capabilities that have the power to turn IT into the engine propelling business success forward

1:10pm - 1:35pm  Break

1:35pm - 2:20pm  Breakout Session

Embracing Innovation — Real-World GenAI Use Cases

Vishal Gupta headshot

Vishal Gupta

CTO & CIO, SVP Connected Technology

Lexmark

Dave Shive headshot

Dave Shive

CIO

General Services Administration

The present moment offers an opportunity to unlock GenAI's transformative power, but maturity across organizations varies. Business leaders recognize this technology is a catalyst for innovation. By understanding real-world case studies with lessons learned, those leaders can create real movement forward inside of their own organizations.

Bring your questions to this session as you hear from executives who have:

  • Implemented practical GenAI use cases and identified opportunities
  • Compared and measured platforms and solutions for value outcomes
  • Balanced approach to value and risk

1:35pm - 2:20pm  Executive Boardroom

Securing a Modern Data Governance Program

Robert Keefer headshot

Robert Keefer

Associate Director, Security Operations

The Pew Charitable Trusts

John McClure headshot

John McClure

CISO & SVP, Enterprise Infrastructure & Cloud

Sinclair, Inc.

Establishing a secure governance program that successfully aligns with business priorities is crucial especially in an age of AI innovation. CIOs and CISOs must balance providing accurate and accessible data with compliance and security concerns.

Join this session to discuss:

  • Aligning data governance strategy with the organization’s goals
  • Addressing data privacy, compliance and security concerns
  • Focusing on data ownership and stewardship for effective management

1:35pm - 2:20pm  Executive Boardroom

Driving Operational Change with Strategic Collaboration

Ryan Boulais headshot

Ryan Boulais

CISO

AES Corporation

Omar Chaudhry headshot

Omar Chaudhry

Chief Engineer, Enterprise IT Integration

MITRE

CIOs can increase the value of IT through operating model changes and creating alignment efficiencies across the organization. By working collaboratively, CIOs can prioritize technology needs and invest in capabilities to achieve excellence in operating model structure. 

Join this session to discuss:

  • Building an IT strategy closely aligned with the organization's strategy
  • Driving operational change with strategic change management
  • Working with key stakeholders across the organization to allow for smooth transitions

2:20pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

Bridging the Gap — Public and Private Sector Similarities

Traci Knight headshot

Traci Knight

Deputy CISO, Director of Global Security Operations

Under Armour

Manny Castillo headshot

Manny Castillo

CISO

Prince George's

It might seem simple to point out key differences within the public and private sectors, especially when choosing a career or networking. For today's technology leader, it's important to also understand the similarities within these two areas of business. Who knows, there might be a process worth adapting across industries. Whether the topic is innovation, data security, work-life balance or the structure of the c-suite, it's important for IT and security professionals to myth bust commonly associated with working in the private versus the public sector.

Join this session to discuss:

  • What differences and similarities are found when public and private companies decide to innovate
  • How data security is paramount across industries
  • The role the c-suite's structure plays in relationships and company culture

3:00pm - 3:45pm  Executive Boardroom

CISOs in the Hot Seat — Understanding Personal Liability

Ryan Boulais headshot

Ryan Boulais

CISO

AES Corporation

James Crimens headshot

James Crimens

VP of Global IT Security & CISO

Stericycle

With cyber threats escalating and the increase of legal and financial risks, CISOs are feeling the pressure. New laws and precedents expose cybersecurity leaders to personal liability, and watching the news isn’t helping. How can CISOs protect themselves and their families in this new era?

Join this session to discuss:

  • Elements for effective D&O policies
  • Essential questions to ask your legal team
  • Incidents in the news and details to note

3:00pm - 3:45pm  Executive Boardroom

Delivering Business Value through AI Investments

David Lackey headshot

David Lackey

CISO & Chief Privacy Officer

World Vision

Chris Panagiotopoulos headshot

Chris Panagiotopoulos

CTO

LifeBridge Health

As AI technologies evolve, the opportunities are pushing organizations into a new era of efficiency and competitiveness. CIOs and CISOs are creating comprehensive strategies that lead to business outcomes and prioritizes data security and privacy. Whether creating an in-house tool or looking at vendor platforms, now is the time to assess current capabilities and identify where AI can add value.

Join your CIO and CISO community to discuss:

  • Identifying and aligning business needs and use cases for AI implementation
  • Zeroing in on the right AI investments for the organization
  • Assessing data security and privacy to fully harness the power of AI

3:45pm - 4:10pm  Networking Break

4:10pm - 5:00pm  Keynote

Ransomware Is Changing — Are You Ready?

Paul Furtado headshot

Paul Furtado

VP Analyst

Gartner

The bad actors are adapting and pivoting their attacks. This keynote will highlight the changing landscape of ransomware and discuss the new tactics being deployed and how to best position your organization to combat them. Paul Furtado has held roles including CIO and CISO before joining Gartner as a Vice President, Analyst where he is responsible for providing insights into cybersecurity trends, threats, prevention and governance.  In his current role, he helps leaders around the world develop and enhance their cybersecurity programs.  With his expertise in ransomware, insider risk and executive cyber risk awareness, Paul was named the 2023 Gartner CIO Analyst of the year.

For this keynote, bring your questions for Furtado and listen as he discusses:

  • Importance of strong leadership in adversity
  • The impact AI advancement is having on ransomware
  • The current eco system driving Ransomware-as-a-Service

5:00pm - 5:15pm  Closing Comments and Prize Drawing

6:00pm - 8:30pm  Networking

Governing Body Welcome Reception

Ahead of the Washington DC Executive Summit, Governing Body members will host an exclusive networking reception for CIO and CISO attendees that includes learning how to create craft cocktails and mocktails. Please join your peers for an evening of great drinks, wonderful food and lively networking.

7:45am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

Body Language Secrets for Enhanced Executive Presence

Chris Ulrich headshot

Chris Ulrich

Body Language Expert

Guest Speaker

Uncovering the mysteries of body language — how people communicate their thoughts and feelings without saying a word — is a decisive first step toward mastering any business and social situation. Top executives know that detecting split-second signals from your team and leadership then taking immediate action is crucial to being a persuasive communicator and problem-solver especially during tricky internal matters or high-level negotiations.

During this session you will learn how to:

  • Move beyond the vacuum of artificial body language to a behavioral approach based on YOU
  • Strengthen interpersonal relationships, be a more decisive leader and manage your nerves better
  • Uncover the less obvious needs of others and improve your team’s confidence and competence

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Building an AI-Powered and Secure Unstructured Data Strategy

Jon Herstein headshot

Jon Herstein

Chief Customer Officer

Box

Ryan Bateman headshot

Ryan Bateman

CTO

Sands Capital

Chris Tonjes headshot

Chris Tonjes

Chief Information Officer, Department of Employment Services

District of Columbia

Your unstructured data holds immense value in the files that define your business. To maximize the potential of this data, it's crucial to establish a comprehensive unstructured data strategy that prioritizes both security and AI integration.

Join this session to learn about:

  • Identifying your valuable unstructured data sources and tools
  • Developing robust security measures for internal and external data use
  • Balancing AI with stringent security and compliance protocols to increase utility

9:40am - 10:25am  Executive Boardroom

Threat Intelligence and Third-Party Risk ― Doubling Down on Critical Vulnerabilities

John Chisum headshot

John Chisum

VP, Solutions Consulting

RiskRecon - A MasterCard Company

Addie Adeniji headshot

Addie Adeniji

Deputy CISO

United States House of Representatives

Keith Young headshot

Keith Young

Enterprise Information Security Official

Montgomery County

The complete entanglement of cyber risk with business risk is becoming increasingly more visible. CISOs now have an opportunity to better pinpoint third parties that present a threat to the organization. Yet the increasing complexities of third party, and even fourth party, risk management, prompted by a wide range of evolving threats, demands heightened attention. How can CISOs ensure they have a clear overview of the threat landscape and vulnerabilities across ecosystems and supply chains?

Join this session to discuss:

  • Identification of vulnerabilities across your vendor landscape to prioritize response efforts
  • Best practices for mitigating a new wave of sophisticated attacks to keep assets safe
  • The role threat intelligence plays in risk management strategies to safeguard your digital ecosystem

9:40am - 10:25am  Executive Boardroom

Analyzing Your Application and Infrastructure Technology Strategy

Terry Carpenter headshot

Terry Carpenter

CIO & CTO

National Science Foundation

Christine Wang headshot

Christine Wang

Acting CTO & Deputy CTO

Export-Import Bank of the United States

Applications can make or break an organization’s growth. Too many and you create an opportunity for redundancies and inefficiencies; too few and you risk getting left in the past.  How can leaders evolve their application strategies to optimize cost, increase operational efficiencies, and remain agile in the face of constant change?

Join your peers to discuss:

  • Driving growth through application modernization
  • Creating architectures that evolve with ever-changing business requirements
  • Buying, building or both strategies

10:25am - 11:05am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:05am - 11:50am  Breakout Session

The Ripple Effect – What's Next after a Third-Party Breach?

Kevin McCarty headshot

Kevin McCarty

CISO, US Healthcare

Cigna

A massive third-party breach that put personal data of Americans at risk is making headlines and causing headaches for health care institutions across the country.  Now security teams in the highly regulated industry are working overtime to figure out what data has been leaked and where to go from here.  As we watch the fallout and legal actions get underway, what lessons for IT and security leaders can be learned from this breach no matter what industry you work in?

Join this session to learn about:

  • Keeping up with the pace of business while handling a breach
  • Strategizing for continuous assessment of your organization’s security and the monitoring of third parties
  • Communicating with cross-functional leaders and the board

11:05am - 11:50am  Executive Boardroom

Preparing for Battle — Getting Ahead of Security Challenges of Tomorrow

Tom McWalters headshot

Tom McWalters

Security Value Advisor

Google Cloud

Tony Parrillo headshot

Tony Parrillo

VP, Enterprise IT Global Head of Security

Schneider Electric North America

Tony Plater headshot

Tony Plater

DON CISO

US Navy

When it comes to GenAI and nascent technologies being rapidly adopted, CIOs and CISOs must be proactive and thorough in their planning efforts and essentially attempt to predict the future. Today, we know data, access control, and IP must be protected while delighting users amid a changing threat landscape. But what does tomorrow bring?

Join this session to explore:

  • How to take advantage of the AI opportunity while also developing a foundationally secure enterprise
  • Ways to ensure your data, policies, and practices are clean and secure to minimize the risk of AI usage
  • Developing guidelines and policies for enabling business leaders, employees, and customers to realize the AI opportunity

11:05am - 11:50am  Executive Boardroom

Optimizing Decision-Making with Advanced Analytics

Carol Assi headshot

Carol Assi

Cybersecurity Chief Operations Officer

Department of Defense

Kevin Apperson headshot

Kevin Apperson

CIO

Amergis Healthcare Staffing

The term "data-driven" is often used as a coveted descriptor for business excellence. But does this description hit the mark? A data-driven enterprise must convert trusted data while leaning heavily into predictive analytics to inform decision-making.

Join this session as CIOs discuss:

  • Ensuring data quality standards truly benefit from analytical insights
  • Empowering the enterprise to make more data informed decisions
  • Troubleshooting to drive business value

11:50am - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

Leveraging Emerging Technologies for Cybersecurity Strategy

Sanjit Ganguli headshot

Sanjit Ganguli

CTO in Residence

Zscaler

New, special demands constantly arise for decision-makers who steer the fortunes of companies. Recently, business success has become linked to IT infrastructure. Seamless and secure connectivity is the key to unlocking innovation and accelerating business outcomes. To reach this state, enterprises are transforming their networks and security to a zero trust architecture augmented by AI/ML capabilities, thereby reducing risk, eliminating cost and complexity and increasing agility.

Join this session and learn:

  • How zero trust architecture secures users, workloads, IoT/OT devices, and your business partners by addressing critical security shortcomings of legacy network architecture
  • How to reduce network complexity without exposing your organization to new risks
  • How AI/ML adds defensive and business analytics capabilities that have the power to turn IT into the engine propelling business success forward

1:10pm - 1:35pm  Break

1:35pm - 2:20pm  Breakout Session

Embracing Innovation — Real-World GenAI Use Cases

Vishal Gupta headshot

Vishal Gupta

CTO & CIO, SVP Connected Technology

Lexmark

Dave Shive headshot

Dave Shive

CIO

General Services Administration

The present moment offers an opportunity to unlock GenAI's transformative power, but maturity across organizations varies. Business leaders recognize this technology is a catalyst for innovation. By understanding real-world case studies with lessons learned, those leaders can create real movement forward inside of their own organizations.

Bring your questions to this session as you hear from executives who have:

  • Implemented practical GenAI use cases and identified opportunities
  • Compared and measured platforms and solutions for value outcomes
  • Balanced approach to value and risk

1:35pm - 2:20pm  Executive Boardroom

Securing a Modern Data Governance Program

Robert Keefer headshot

Robert Keefer

Associate Director, Security Operations

The Pew Charitable Trusts

John McClure headshot

John McClure

CISO & SVP, Enterprise Infrastructure & Cloud

Sinclair, Inc.

Establishing a secure governance program that successfully aligns with business priorities is crucial especially in an age of AI innovation. CIOs and CISOs must balance providing accurate and accessible data with compliance and security concerns.

Join this session to discuss:

  • Aligning data governance strategy with the organization’s goals
  • Addressing data privacy, compliance and security concerns
  • Focusing on data ownership and stewardship for effective management

1:35pm - 2:20pm  Executive Boardroom

Driving Operational Change with Strategic Collaboration

Ryan Boulais headshot

Ryan Boulais

CISO

AES Corporation

Omar Chaudhry headshot

Omar Chaudhry

Chief Engineer, Enterprise IT Integration

MITRE

CIOs can increase the value of IT through operating model changes and creating alignment efficiencies across the organization. By working collaboratively, CIOs can prioritize technology needs and invest in capabilities to achieve excellence in operating model structure. 

Join this session to discuss:

  • Building an IT strategy closely aligned with the organization's strategy
  • Driving operational change with strategic change management
  • Working with key stakeholders across the organization to allow for smooth transitions

2:20pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

Bridging the Gap — Public and Private Sector Similarities

Traci Knight headshot

Traci Knight

Deputy CISO, Director of Global Security Operations

Under Armour

Manny Castillo headshot

Manny Castillo

CISO

Prince George's

It might seem simple to point out key differences within the public and private sectors, especially when choosing a career or networking. For today's technology leader, it's important to also understand the similarities within these two areas of business. Who knows, there might be a process worth adapting across industries. Whether the topic is innovation, data security, work-life balance or the structure of the c-suite, it's important for IT and security professionals to myth bust commonly associated with working in the private versus the public sector.

Join this session to discuss:

  • What differences and similarities are found when public and private companies decide to innovate
  • How data security is paramount across industries
  • The role the c-suite's structure plays in relationships and company culture

3:00pm - 3:45pm  Executive Boardroom

CISOs in the Hot Seat — Understanding Personal Liability

Ryan Boulais headshot

Ryan Boulais

CISO

AES Corporation

James Crimens headshot

James Crimens

VP of Global IT Security & CISO

Stericycle

With cyber threats escalating and the increase of legal and financial risks, CISOs are feeling the pressure. New laws and precedents expose cybersecurity leaders to personal liability, and watching the news isn’t helping. How can CISOs protect themselves and their families in this new era?

Join this session to discuss:

  • Elements for effective D&O policies
  • Essential questions to ask your legal team
  • Incidents in the news and details to note

3:00pm - 3:45pm  Executive Boardroom

Delivering Business Value through AI Investments

David Lackey headshot

David Lackey

CISO & Chief Privacy Officer

World Vision

Chris Panagiotopoulos headshot

Chris Panagiotopoulos

CTO

LifeBridge Health

As AI technologies evolve, the opportunities are pushing organizations into a new era of efficiency and competitiveness. CIOs and CISOs are creating comprehensive strategies that lead to business outcomes and prioritizes data security and privacy. Whether creating an in-house tool or looking at vendor platforms, now is the time to assess current capabilities and identify where AI can add value.

Join your CIO and CISO community to discuss:

  • Identifying and aligning business needs and use cases for AI implementation
  • Zeroing in on the right AI investments for the organization
  • Assessing data security and privacy to fully harness the power of AI

3:45pm - 4:10pm  Networking Break

4:10pm - 5:00pm  Keynote

Ransomware Is Changing — Are You Ready?

Paul Furtado headshot

Paul Furtado

VP Analyst

Gartner

The bad actors are adapting and pivoting their attacks. This keynote will highlight the changing landscape of ransomware and discuss the new tactics being deployed and how to best position your organization to combat them. Paul Furtado has held roles including CIO and CISO before joining Gartner as a Vice President, Analyst where he is responsible for providing insights into cybersecurity trends, threats, prevention and governance.  In his current role, he helps leaders around the world develop and enhance their cybersecurity programs.  With his expertise in ransomware, insider risk and executive cyber risk awareness, Paul was named the 2023 Gartner CIO Analyst of the year.

For this keynote, bring your questions for Furtado and listen as he discusses:

  • Importance of strong leadership in adversity
  • The impact AI advancement is having on ransomware
  • The current eco system driving Ransomware-as-a-Service

5:00pm - 5:15pm  Closing Comments and Prize Drawing

June 12, 2024

June 13, 2024

We look forward to seeing you at an upcoming in-person gathering


Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

Convene at 1201 Wilson Blvd
MORE INFORMATION

Your Community Partners


Global Thought Leader
CIO Thought Leader
CISO Thought Leader
Key Partner
Program Partners

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Melissa Tarpley

Community Program Manager

619-300-6401

melissa.tarpley@evanta.com