Detroit CISO Executive Summit
June 21, 2022 | Detroit Marriott at the Renaissance Center
June 21, 2022
Detroit Marriott at the Renaissance Center
Collaborate with your peers
Get together with Detroit's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.
Join your peers to discuss the most critical issues impacting CISOs today:
Supporting business agility with risk-based programs
Empowering Talent, Protecting the Enterprise
Mastering the Art of Change and Adaptability
Detroit CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.
Governing Body Co-Chairs
Brent Cieszynski
Blue Cross Blue Shield of Michigan
Vice President & Chief Information Security Officer
Earl Duby
Lear Corporation
VP & CISO
Russ Gordon
BorgWarner
Chief Information Security Officer
Richard Hook
Penske
EVP & CIO
Fred Killeen
General Motors
VP of Global Information Technology & CIO
Raman Mehta
Johnson Electric
SVP & CIO
Jeff Small
Great Lakes Water Authority
CIO
Sangy Vatsa
FIS Global
EVP, Chief Technology and Digital Officer
Erik Wille
American Axle & Manufacturing
CISO
What to Expect
Agenda
June 21, 2022
7:30am - 8:15am Registration & Breakfast
8:15am - 9:00am Keynote
Ransomware Response and Recovery for CIOs and CISOs
Hosted by CyberArk
Scott Bennett
CIO
Lear Corporation
Chris Burrows
CISO
Rocket Companies
Richard Hook
EVP & CIO
Penske
IT and security leaders across the globe are asking themselves how to protect the business as ransomware grows increasingly prevalent and as attackers continue to raise their demands. It may seem challenging to prioritize building out your recovery plan when you could spend that time focused on increasing defensive measures, but recovering from ransomware is not a process you want to wing. How can CIOs and CISOs move forward in creating roadmaps that weave together technology, security and business strategy to ensure a swift response and recovery?
Join this keynote as panelists discuss:
- Building internal partnerships to strengthen your security posture
- Reducing risk across the enterprise and minimizing your attack surface
- Having the right people, processes and policies in place for before and after an attack
9:00am - 9:30am Networking Break
9:30am - 10:15am Breakout Session
IoT Security: Guiding Principles & Strategy
Hosted by deepwatch
Arun DeSouza
Chief Information Security & Privacy Officer
Nexteer
The proliferation of the use of IoT devices on both the plant floor and at home has increased the attack surface as companies have embraced digital manufacturing to increase efficiency and optimize operating costs. IoT is crucial across business functions and the enterprise, meaning building IoT security programs are critical. Join Arun DeSouza to learn about his 7 IoT Security Guiding Principles.
9:30am - 10:15am Breakout Session
Architecting for a Secure and Effective Application Deployment
Hosted by Fortinet
Bob Turner
Field CISO
Fortinet
Buying or building and then deploying applications is complex and requires a detailed approach. CIOs were the heroes in making pandemic induced digital transformation happen. IT leaders are now rethinking the work from anywhere infrastructure strategies and the direct impact on premise data centers. The CISO can be an enabler by efficiently ensuring security of applications on premise, at the remote office, and in the cloud.
In this session, you will explore:
- Driving success while balancing business innovation, managing security, and creating an IT business strategy that works
- Evaluating investments in security against the need for rapid development
- Technology investments needed for 2022 and beyond
9:30am - 10:15am Executive Boardroom
Preparing for the Next Attack
Hosted by Cloudflare
Cynthia Weaver
VP, Information Technology
Walbridge
Homyar Naterwala
Business Information Security Officer
GE Aviation
Ling Wu
Director, Governance Risk & Compliance
Cloudflare
As API traffic surges, third-party networks rapidly expand, and the digital business accelerates, the threat of suffering a breach or disruption looms large on the horizon. CIOs & CISOs managing an ever-expanding attack surface must fortify the foundations of their infrastructure, applications, and teams so that when the next big vulnerability is uncovered…you’re ready to respond.
Join this peer conversation to discuss:
- Replacing static access controls and legacy security perimeters that delay incident response
- Identifying and mitigating the risks of third-party networks and software supply chains
- Trends in data privacy regulations and data protection measures
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CIOs & CISOs).
To reserve your seat, please contact:
Lilly Hoodenpyle, Program Manager | lilly.hoodenpyle@evanta.com
9:30am - 10:15am Executive Boardroom
Shift Left in API Security
Hosted by Noname Security
Jim Darrow
Director, IT
Detroit Tigers
John Carney
Chief Information Officer
PVS Chemicals
Robert Smith
Field CISO
Noname Security
As business and technology teams drive cloud adoption and implement modern application architectures, the security vulnerabilities of the sprawling IT stack multiply as visibility dwindles. Now is the time to explore new applications and API security strategies to proactively reduce risk, secure the environment, and capitalize on cloud-native capabilities to meet these challenges.
Join this boardroom to discuss:
- Establishing effective vulnerability management and application security programs
- Moving from a reactive to a proactive security posture
- API governance and security challenges and opportunities
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CIOs & CISOs).
To reserve your seat, please contact:
Lilly Hoodenpyle, Program Manager | lilly.hoodenpyle@evanta.com
10:15am - 10:45am Networking Break
10:20am - 10:45am Peer-to-Peer Meetings
Peer-to-Peer Meetings
Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.
10:45am - 11:30am Breakout Session
Bridging the Divide — Technology Inequity in Detroit
Hosted by Apptio
Art Thompson
CIO
City of Detroit
Approximately 110 Million households lack high-speed internet in America. In Detroit, over 40% of the residents are without high-speed internet. Based on internet usage, Detroit is considered the least connected city in America. In this session, you will learn how the City of Detroit is creating an innovative social impact model that leverages private and public sector leadership to ensure cities like Detroit are able to thrive in the digital economy.
Art Thompson, CIO, City of Detroit will cover:
- What is the digital divide and why should you care
- Why CIOs & CISOs are the most valuable player to help tackle this divide
- How you can get involved in Detroit and communities across America
10:45am - 11:30am Breakout Session
Security Is a Team Sport
Hosted by Netskope
Joe Murray
Director - IT Architecture
American Axle & Manufacturing
Rachelle Putnam
Director, Information Technology
General Dynamics Land Systems
Shamla Naidoo
Head of Cloud Strategy & Innovation
Netskope
Building trust and resilience across infrastructure and security teams is key to defending the enterprise. As companies execute zero trust strategies, the partnership between CIOs, CISOs, and their teams is more important than ever.
Join this session to learn about:
- The critical components of a modern zero trust strategy
- Proven practices for infrastructure and security collaboration
- Improving internal stakeholder relationships to make the right investments and fuel business outcomes
10:45am - 11:30am Executive Boardroom
The Indispensable Human Element of Cybersecurity
Hosted by SentinelOne
Michael Leland
Chief Cybersecurity Evangelist
SentinelOne
Kevin McLaughlin
Vice President, Global Security, Risk & Compliance
Stryker
Garrett McManaway
Senior Director & CISO
Wayne State University
Artificial Intelligence is a pervasive part of our lives today and cybersecurity teams and adversaries alike have learned to harness the speed and power of machines to strengthen their capabilities. With machine learning becoming one of the most important tools of defense, leaders must balance the overwhelming speed and accuracy advantage of AI with the need for measured and intuitive interactions with a real-world human element.
Join this session to discuss:
- What these trends mean for the hands-on practitioner
- When velocity of innovation outpaces the capabilities of human intellect
- The role of automation in the effective practice of securing our digital world
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CIOs & CISOs).
To reserve your seat, please contact:
Lilly Hoodenpyle, Program Manager | lilly.hoodenpyle@evanta.com
11:30am - 11:40am Break
June 21, 2022
Location
Venue & Accommodation
Detroit Marriott at the Renaissance CenterA block of rooms has been reserved at the Detroit Marriott at the Renaissance Center at a reduced conference rate. Reservations should be made online or by calling 877-901-6632.
Deadline to book using the discounted room rate of $199 USD (plus tax) is May 31, 2022.
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.