Chicago CISO Executive Summit
May 24, 2022 | Chicago Marriott Downtown Magnificent Mile
May 24, 2022
Chicago Marriott Downtown Magnificent Mile
Collaborate with your peers
Get together with Chicago's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.
Join your peers to discuss the most critical issues impacting CISOs today:
Driving the business forward through strategic technology and management processes
Encouraging cross-company security ownership
Monitoring the threat horizon and bolstering your defenses
Chicago CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.
Governing Body Co-Chairs
Waqas Akkawi
SIRVA Worldwide
VP, CISO
Sarah Buerger
Coyote Logistics
Director, IT Security
Jim Cameli
Walgreens Boots Alliance
VP & Global Chief Information Security Officer
JJ Markee
Baxter
Chief Information Security Officer
Bill Podborny
Constellation Brands
CISO
Paolo Vallotti
Tate & Lyle
CISO & VP of Operations
What to Expect
Agenda
May 23, 2022
May 24, 2022
7:30am - 8:15am Registration & Breakfast
8:15am - 9:00am Keynote
Calling in Backup - The Benefits of a Partnership with the FBI
Hosted by CyberArk
Eric Shiffman
Supervisory Special Agent
Federal Bureau of Investigation
Erik Hart
CISO
Cushman & Wakefield
Jay Patel
Special Agent
Federal Bureau of Investigation
Tricia Maier
Chief Division Counsel
Federal Bureau of Investigation
After an attack on your organization, you might be more concerned with recovering your assets than nabbing the bad guy. So why call the FBI? Three Chicago-based agents say there are plenty of reasons.
Join our opening keynote to:
- Ask federal investigators your questions about today's threat climate
- Gain advice on when and how best you can utilize the Bureau's resources
- Learn why investigators say crypto, notification requirements and legal compliance are top of mind
9:00am - 9:30am Networking Break
9:30am - 10:15am Breakout Session
Going Passwordless —The Future of Access Management
Hosted by Transmit Security
Raj Galagali
Vice President, Solutions Engineering, Transmit Security
Transmit Security
Thanks to bots and automated tools capable of testing thousands of logins per second, bad actors today leverage harvested credentials at scale; resulting in a quietly-collected $16B a year. It's time to stop them in their tracks.
This session covers how to:
- Eliminate passwords from every step of customer authentication
- Implement passwordless without creating silos and security gaps
- Solve complex challenges to secure all customer scenarios and journeys
9:30am - 10:15am Breakout Session
Fire Away – CIO Office Hours
Hosted by SentinelOne
Julie Devine
CIO
Medulla
Tom Kirkham
CIO
Primient
Have you ever wished you could pop into your CIO's mind and instantly understand how they approach important topics and decisions? Now is your chance to anonymously pose questions to a CIO who will pull back the curtain on their thought process and share candid context for why and how they make certain choices.
The questions in this session will be decided by the audience and will touch on themes such as:
- Building relationships across the C-Suite, with stakeholders and within the enterprise
- Pursuing innovation while keeping the lights on
- What’s next for the role of CIO and CISO
9:30am - 10:15am Executive Boardroom
Securing Sprawl – Mitigating Risk
Hosted by Noname Security
Karl Mattson
CISO
Noname Security
Michelle Ayala
Director IT Security
Green Thumb
Waqas Akkawi
VP, CISO
SIRVA Worldwide
As business and technology teams drive cloud adoption and implement modern application architectures, the security vulnerabilities of the sprawling IT stack multiply as visibility dwindles. Now is the time to explore new applications and API security strategies to proactively reduce risk, secure the environment, and capitalize on cloud-native capabilities to meet these challenges.
Join this boardroom to discuss:
- Establishing effective vulnerability management and application security programs
- Moving from a reactive to a proactive security posture
- API governance and security challenges and opportunities
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).
To reserve your seat, please contact: Channelle Lawrence at chanelle.lawrence@evanta.com
9:30am - 10:15am Executive Boardroom
Future Challenges — Security, Transformation, Hybrid and More
Hosted by Appgate
Wayne Geils
Director, Technical Integrations
Appgate
Joe Puissant
Cyber Security Manager | Product & Service Management, Global Lead
Bosch
Matthew Zielinski
Director of Information Security (CISO)
Vivid Seats
Enterprises are forced to adopt wildly different logistical solutions while providing protection against ever-emerging threats. With greater reliance on the Cloud in 2022 and beyond, it’s time to improve efficiencies while still mitigating risks and protect ALL environments. Not just cloud transformation, but hybrid, multi-cloud, and on-prem.
Join this roundtable discussion to learn about:
- Improving processes and efficiencies
- Extending protections to all workloads
- Analyzing tools, strategies, and technologies available
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).
To reserve your seat, please contact: Chanelle Lawrence | chanelle.lawrence@evanta.com
10:15am - 10:45am Networking Break
10:20am - 10:45am Peer-to-Peer Meetings
Peer-to-Peer Meetings
Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.
10:45am - 11:30am Breakout Session
Third-Party Cyber Risk — Zero-Day Findings and Mitigation
Hosted by BlueVoyant
Joel Molinoff
Vice Chairman
BlueVoyant
Managing distributed risk is today’s defining cybersecurity challenge. Mitigation of zero-day vulnerabilities is critical as adversaries exploit supply chain entities. This session explores how to identify all third parties impacted by zero-day vulnerabilities and guide their mitigation efforts. Your vendor, supplier, and partner ecosystem is now your enterprise attack surface.
Join this session to learn:
- How to manage distributed risk associated with hundreds and even thousands of vendors, suppliers, and partners
- Approaches to identify, prioritize, and mitigate active threats and critical/zero-day vulnerabilities
- Strategies to reduce supply chain/external ecosystem risk associated with zero-day
10:45am - 11:30am Breakout Session
Zero Fluff – A Real, Helpful, Zero Trust Success Story
Hosted by deepwatch
Mike Zachman
VP & Chief Security Officer
Zebra Technologies
Colin Chisholm
Sr Manager, Information Security Management
Zebra Technologies
Racing to keep up with Zebra’s moving to the cloud, Mike Zachman, VP & Chief Security Officer, Zebra Technologies made selecting and deploying a Zero Trust/SASE platform a top priority. Gone were the days of Zero Trust theory or pontification. It was time for action. Multiple platform evaluations and 70+ use cases later, his team delivered and selected a final platform. Now, it’s time for you to benefit from his trials.
Join Mike Zachman and his team for:
- A boots-on-the-ground presentation about Zero Trust goals and successes
- Practical takeaways and lessons tested by the team at Zebra
- A glimpse at multiple methods and a spotlight on discovered best practices
10:45am - 11:30am Executive Boardroom
Beyond Initial Intrusion – Combating Advanced Threats on the Network
Hosted by ExtraHop
Keith Dillon
Area Vice President
ExtraHop
Jesse Magenheimer
Vice President & CISO
State Farm
Steven McLean
Senior Manager, Information Security
Ortho Clinical Diagnostics
Based on Gartner research, 75 percent of cybersecurity budgets go to preventing initial intrusion and only 25 percent on detection and mitigation. However, the real damage to the enterprise happens once the attacker is already inside the network, working their way toward carrying out a costly breach or extortion.
Join this session to discuss:
- Key areas to reduce cyber risk and build resilience
- The advanced attack techniques that bad actors are forced to rely on and how to spot them
- Strategies to increase the speed of detection and mitigation
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).
To reserve your seat, please contact: Chanelle Lawrence at chanelle.lawrence@evanta.com
10:45am - 11:30am Executive Boardroom
Ransomware — Covering the Attack Surface
Hosted by CrowdStrike
Jeff Trower
Principal Product Manager
CrowdStrike
Michael Boucher
CISO, Americas
JLL
Diane Brown
VP, IT Risk Management
Ulta Beauty
Cybersecurity is no longer a nice to have, it’s a front line defense that protects organizations from targeted attacks and sophisticated threat actors. Security leaders must always be one step ahead and deliver effective cybersecurity through active prevention and defense. How can CISOs mitigate threats against the attack surface, whilst providing the business and technical outcomes to both stay secure and advance business objectives?
Join this boardroom to discuss:
Leveraging proprietary data, analytics and technology to prevent attacks
Implementing proactive defense for businesses of all sizes to mitigate today’s threats
Pressure-testing your incident response plan and playbooks
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).
To reserve your seat, please contact:
Chanelle at chanelle.lawrence@evanta.com
11:30am - 11:40am Break
May 23, 2022
May 24, 2022
Location
Venue & Accommodation
Chicago Marriott Downtown Magnificent MileParking Information
Valet available located at 541 North Rush Street, Chicago, IL, for $70 per night.
Self Parking located at 50 East Ohio Street, Chicago, IL, for $51 per night.
A block of rooms has been reserved at the Chicago Marriott Downtown Magnificent Mile at a reduced conference rate. Reservations should be made online or by calling 1-877-303-0104.
Deadline to book using the discounted room rate of $309 USD (plus tax) is May 3, 2022.
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.