IN-PERSON

Chicago CISO Executive Summit

June 6, 2018 | Hyatt Regency Chicago

June 6, 2018
Hyatt Regency Chicago

Collaborate with your peers

Get together with your peers to tackle top business challenges through peer-driven content and discussions at the Chicago CISO Executive Summit.

Join your peers to discuss the most critical issues impacting CISOs today:

Strategies for a risk-aligned, resilient organization

Developing and investing in the security workforce of tomorrow

Creating business value and supporting agile business operations

Chicago CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Waqas Akkawi

SIRVA, Inc.
VP, CISO

Jim Cameli

Walgreens Boots Alliance
Global CISO

Nicole Ford

Baxter International Inc.
Global CISO

Emily Heath

United Airlines
VP & CISO

JJ Markee

Kraft Heinz Company
CISO

John Reed

True Value Company
IT Security Program Manager

Steve Weber

OptumRx
Sr. Director, Information Security and IT Compliance

Agenda


11:30am - 12:00pm  Networking Break

12:00pm - 1:10pm  Keynote

Establishing Risk Ownership Across The Business

Kevin Novak headshot

Kevin Novak

CISO & IT Risk Manager

Northern Trust Corporation

Kevin Novak struggled for years to gain support for implementation of cyber security controls because of a traditionally siloed approach towards responsibility for cyber protection. Diverging from the traditional approach of keeping cyber security the problem of the information security department, he’s helped his business evolve to think of information security is a fundamental, integral part of business. By establishing an environment where everyone owns risk, Novak has ensured other areas of the business understand the necessity of common ownership. Join this session to learn how to partner with leaders across the business to make security a collective effort.

1:10pm - 1:40pm  Networking Break

7:00am - 7:45am  Registration & Breakfast

7:45am - 8:50am  Keynote

The Innovation Cycle

Tim Wu headshot

Tim Wu

Columbia Law School Professor, Author of "The Attention Merchants"

All industries go through long cycles of innovation, openness, consolidation and monopolization. What stage of the cycle is your industry in? Tim Wu is one of the most influential commentators on the tech industry and the future of America's information economy. In this keynote presentation, Wu illustrates the innovation cycle as it pertains to some of the most important technologies of the last century, including the telephone, radio, and television, while giving perspective on the evolution of the internet, its associated business and the rise and fall of information empires.

8:50am - 9:20am  Networking Break

9:20am - 10:10am  Breakout Session

Diversity in Security – Cultivating a Culture of Inclusion

Nicole Ford headshot

Nicole Ford

Global CISO

Baxter International Inc.

Emily Heath headshot

Emily Heath

VP & CISO

United Airlines

Sarah Buerger headshot

Sarah Buerger

VP, Head IT Security

ATI Physical Therapy

To overcome the cybersecurity talent shortage, CISOs must focus on leveraging talent management techniques and attracting diverse candidates. Broadening the talent pool will require honing in on specific skillsets that are integral to protecting the enterprise. What keeps women and people of color from getting into cybersecurity – and how can security leaders find unconventional ways to attract diverse candidates? This panel shares their career journeys and thoughts on how to bridge the gap.

9:20am - 10:10am  Breakout Session

The New Standards for Data Protection in the Trust Economy

Tim Upton headshot

Tim Upton

CEO & Co-Founder

TITUS

Data is derived from virtually every interaction we make online. As a result, consumers have now turned their attention to how companies protect their information. Why? Because along the journey towards digital transformation, globalization, and increased collaboration, something very fundamental was compromised – the trust between customers and the companies they do business with. The message is loud and clear: People expect a standard of reliability and transparency when it comes to how their data is handled. Tim Upton from TITUS will share his thoughts about how businesses can thrive amid increasing social and political pressures for data protection.

9:20am - 10:10am  Executive Boardroom

Securing the Virtual Data Center with Predictive Analytics

Devin Arteman headshot

Devin Arteman

CISO

Pekin Insurance

Larry Lidz headshot

Larry Lidz

CISO

CNA Insurance

James Treinen headshot

James Treinen

VP of Threat

Carbon Black

How do you scale security in the cloud without compromise? As organizations go into a majority cloud environment, priorities change – often at the expense of increased risk to an ever-changing environment where employees expect “instant gratification” and access to data anywhere, anytime. Join this peer dialogue to discuss how the definition of endpoint shifts when you’re working in a virtual environment – and how behavioral threat detection can stop emerging threats in the shift to 100% cloud.

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).

To reserve your seat, please contact: Tom Ward at 971-271-6883 or tom.ward@evanta.com.

10:10am - 10:40am  Networking Break

10:40am - 11:30am  Breakout Session

Six Steps to GDPR Readiness

Dannie Combs headshot

Dannie Combs

CISO

Donnelley Financial Solutions

Joe Prempeh headshot

Joe Prempeh

Director, Global Data Privacy

Donnelley Financial Solutions

Donnelley Financial Solutions has been undergoing a dedicated effort to meet the requirements of the GDPR, taking steps to ensure their systems and processes are fully compliant. Donnelley shares their learnings and guidance by describing what GDPR means for CISOs and steps you can take to help your company on its compliance journey. Dannie Combs, SVP and CISO, and Joe Prempeh, Director, Global Data Privacy at Donnelley, distill their insights and wisdom into six steps to take to ensure your organization is GDPR ready.

10:40am - 11:30am  Breakout Session

Cybercriminal Operations Revealed

Jon Clay headshot

Jon Clay

Director, Global Threat Communications

Trend Micro Inc.

Most criminal syndicates today include a cyber arm because of the vast amounts of money they can make targeting businesses around the world. Jon Clay dives into how these organizations are set up, how they pick their targets, their infection routines and how they maximize breach access for the highest profits. Join this session and leave with a better understanding of how cybercriminals work.

10:40am - 11:30am  Executive Boardroom

How Can We Measure, Monitor, and Manage Cyber Risk for Organizations?

Mike Pflieger headshot

Mike Pflieger

VP of Enterprise Info Management, CISO

CDW

Jody Schwartz headshot

Jody Schwartz

Director - IT Security & Compliance

Marsh

Jason Pappalexis headshot

Jason Pappalexis

Managing Director, Enterprise Architecture Research Group

NSS Labs

Historically, enterprises have relied largely on the intuition and talent of their technical teams to manage cybersecurity risk. But with the annual cost of cybercrime for the global economy anticipated to reach $500 billion, board members’ expectations of enterprise security teams are changing. Technical teams must now learn to speak the language of business. What KPIs are your team using to measure the effectiveness of your cybersecurity strategy, and how are you obtaining this data? Join this conversation with your peers to discuss how enterprises can begin to eliminate the obscurity that is associated with cybersecurity.

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).

To reserve your seat, please contact: Tom Ward at 971-271-6883 or tom.ward@evanta.com.

10:40am - 11:30am  Executive Boardroom

Cyber Ops — Building an Effective SOC

Seth McCallister headshot

Seth McCallister

CISO

HUB International Limited

John Reed headshot

John Reed

IT Security Program Manager

True Value Company

Paul Bowen headshot

Paul Bowen

Principal Security Technologist

NETSCOUT | Arbor

When it comes to taking your data from you, cyber criminals never rest. If they can’t get in one way, they will try another. Therefore, when managing incidents for your enterprise, it is critical to ensure that threats and attacks are properly identified, analyzed, communicated, defended, investigated and reported. Join this peer-discussion on cyber operations and discover guiding principles for security operations centers, advanced threat detection and enhanced situational awareness.

1:40pm - 2:30pm  Breakout Session

Qualitative vs. Quantitative Metrics – Where Do You Stand?

Arlan McMillan headshot

Arlan McMillan

CSO

Kirkland and Ellis

Fawaz Rasheed headshot

Fawaz Rasheed

CISO

Trustmark Companies

How can security leaders best use metrics to paint the picture of risk for the organization? Join this interactive session where Arlan McMillan, CSO of Kirkland and Ellis, and Fawaz Rasheed, CISO of Trustmark, deliberate and discuss the merits of qualitative and quantitative metrics and the ideal use cases for each category. Throughout the session, the pair polls the audience to find consensus on how to best use metrics in the real world. 

1:40pm - 2:30pm  Breakout Session

GDPR Has Arrived – What Now?

Joe Sturonas headshot

Joe Sturonas

Chief Technology Officer

PKWARE, Inc.

Organizations have scrambled to meet the data protection regulations set forth by the EU, taking effect on May 25th, 2018. Now that GDPR has taken effect, where does your organization stand – and what’s next for meeting requirements? Joe Sturonas from PKWARE shares common successes and pitfalls organizations faced on the journey to be compliant, and where security executives go from here to avoid regulators and auditors knocking at their door.

1:40pm - 2:30pm  Executive Boardroom

Implementing Operational Metrics to Effectively Communicate Cyber Exposure

Michael Boucher headshot

Michael Boucher

Sr. Director, Information Risk Management

FTD Group, Inc

Ricardo Lafosse headshot

Ricardo Lafosse

CISO

Morningstar, Inc.

Eitan Goldstein headshot

Eitan Goldstein

Senior Director, Growth Initiatives

Tenable

Cyber exposure is all about coverage – ensuring that you’re measuring the right things to secure the business. Equally important, defining your operational metrics creates a strategic baseline for a business discussion between the CISO, the CIO and the business, translating raw security data into a common language for communicating your security program goals and needs. Join us as we discuss how building the right approach to operational metrics enables organizations to better understand and address their cyber exposure gap to best defend the modern attack surface.

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).

To reserve your seat, please contact: Tom Ward at 971-271-6883 or tom.ward@evanta.com.

2:10pm - 2:30pm  Networking Break

2:50pm - 3:40pm  Breakout Session

Practical Threat Intelligence

Richard Rushing headshot

Richard Rushing

CISO

Motorola Mobility, Inc.

In a recent survey 57% of security professionals rated their organization’s ability to operationalize threat intelligence as “below average,” while 84% of organizations indicated threat intelligence is “essential to a strong security posture.” Given the number of signals, it’s easy to get lost in a sea of noise. Security teams must be able to rapidly and effectively translate large volumes of threat information into intelligence to help detect threats. Richard Rushing discusses the concept of threat intelligence, what it means and why it’s crucial to have context to understand which signals are highest priority, why, and what actions to take.

2:50pm - 3:40pm  Breakout Session

Next Generation SOC - High-Impact Automation Strategies for SOC Investigations

John Matthews headshot

John Matthews

CIO

ExtraHop Networks

Improved breach detection and threat response are good reasons to up level your security operations center (SOC) from basic monitoring and response to advanced analytics and threat hunting. Automation and orchestration of tedious steps and workflows can increase SOC incident capacity, focus resources, and shorten time to resolution. Effective strategies reduce false positives, blind spots, and data silos to create headroom for more proactive SOC activities — the elusive next-gen SOC. Learn ways to apply automation to the NIST 800 framework from better preparation using dynamic discovery, automated classification of critical assets, and behavioral baselining to anomaly-driven threat detection and real-time investigations.

2:50pm - 3:40pm  Executive Boardroom

Formalizing Governance to Effectively Manage Security Risk

Daniel Jesudason headshot

Daniel Jesudason

Global Information Security Director/CISO

Ingredion

Rick Weinberg headshot

Rick Weinberg

Vice President, Product Management

SailPoint

How can an identity-aware enterprise improve your risk posture? It is estimated by 2021, organizations with complementary/integrated identity governance capabilities across applications and files will suffer 60% fewer data breaches. During this discussion, we will talk about how organizations are leveraging identity to govern access across all users, applications and data while also strengthening and maximizing their investments in existing security solutions, like SIEM, PAM and DLP.

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).

To reserve your seat, please contact: Tom Ward at 971-271-6883 or tom.ward@evanta.com.

2:50pm - 3:40pm  Executive Boardroom

Adding Workflows, Automation and Orchestration for Better Incident Response

JJ Markee headshot

JJ Markee

CISO

Kraft Heinz Company

Tony LoCascio headshot

Tony LoCascio

Security and Risk Advisory Solution Architect

ServiceNow

Your team discovers a potential breach. Now what? For many organizations, it means smart people go into a room and try to figure out what to do. Manual processes for responding to security incidents simply can’t keep up with attackers. Building a security response runbook while layering automation and orchestration where appropriate is emerging as the winning strategy. But how do you get started? What do you prioritize? Join ServiceNow for a discussion on best practices around adding workflows, automation and orchestration to your security incident-response plan.

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).

To reserve your seat, please contact: Tom Ward at 971-271-6883 or tom.ward@evanta.com.

3:40pm - 4:00pm  Networking Break

4:00pm - 4:40pm  Keynote

We Ain’t Seen Nothing Yet

Andrej Bolkovic headshot

Andrej Bolkovic

CEO

ABN AMRO Clearing Chicago

Automation and globalization have made industries more susceptible to security incidents and attacks. The drive for efficiency and value creates continuous development in automating processes and AI. The increased dependency on IT amplifies the chance of an attack on our data. The interest from governments and regulators in the stability of core infrastructure services across the globe shows how we are becoming increasingly aware of the threats that come with this new world. From the CEO’s perspective, Andrej Bolkovic shares his thoughts on how organizations can increase dependability and stability through security – and how, if not addressed properly, the threat is far greater than what we have seen so far.

4:40pm - 5:00pm  Closing Reception & Prize Drawing

Location


Venue & Accommodation

Hyatt Regency Chicago

Your Community Partners


National Thought Leader
Presenting Sponsors
National Sponsors

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Tom Ward

Senior Program Manager

971-271-6883

tom.ward@evanta.com