Indianapolis CISO Executive Summit
June 6, 2019 | JW Marriott Indianapolis
June 6, 2019
JW Marriott Indianapolis
Collaborate with your peers
Get together with your peers to tackle top business challenges through peer-driven content and discussions at the Indianapolis CISO Executive Summit.
Join your peers to discuss the most critical issues impacting CISOs today:
Investing in your people and the right technologies
Innovating with advanced technologies and new delivery models
Influencing business stakeholders and enterprise outcomes
Indianapolis CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.
Governing Body Co-Chairs
Karen Delozier
Sallie Mae
VP, IT Risk Management & Compliance
Meredith Harper
Eli Lilly
Chief Information Security Officer
Dewand Neely
State of Indiana
CIO
Judd Williams
NCAA
CIO
Agenda
June 5, 2019
June 6, 2019
7:00am - 7:45am Registration & Breakfast
7:45am - 8:30am Keynote
What's Trust Got to Do With It?
Hosted by CrowdStrike
David Horsager
CEO and Best-Selling Author, "The Trust Edge"
Trust is both a fundamental business issue and the biggest asset of a company. Without trust, companies lose reputations, relationships, and revenue. With trust, organizations enjoy greater creativity, productivity, and results. Through extensive research and experience, David Horsager learned what it takes to gain — and keep — the “Trust Edge.”
Join this session as Horsager outlines:
- The keys to building morale, sales, and customer loyalty
- His Eight-Pillar Framework for building trust in an organization
- Creating successful leaders and organizations centered on the tenants of trust
8:30am - 9:00am Networking Break
9:00am - 9:50am CIO & CISO Featured Session
Next Gen Talent – Developing Indy’s Tech Community
Bill Russell
CISO
Cummins
Katie Sauls
IT Director, Indianapolis CoE & Commercial Systems
GEICO
Mike Langellier
President & CEO
TechPoint
With rapid digital transformation both in recent years and moving forward into the foreseeable future, there is a need to profoundly address the tech talent shortage. This session will confront the challenges of building out a workforce with the right skills that will translate across decades of transformation.
In this interactive brainstorming session, we’ll explore:
- Attracting and retaining top tech talent
- Educating the next generation of IT professionals
- Innovating internal development strategies
9:00am - 9:50am CISO Featured Session
The CISO’s Role in Digital Transformation
Hosted by Zscaler
Chandra Olson
CISO Americas
Zscaler
Leon Ravenna
CISO
KAR Auction Services
Whether you love or hate buzzwords, digital transformation is having a major impact on business culture. As more data moves to the cloud and employees, partners, and customers interact outside the traditional enterprise perimeter, security should play an active part.
In this session, we’ll discuss:
- How digital transformation impacts an enterprise’s existing security posture
- The proactive role security should play as applications move to the cloud
- How security leaders can avoid becoming obstacles and instead become catalysts for change
9:00am - 9:50am CISO Executive Boardroom
Building the Infrastructure for Sound Data Governance
Mitchell Brett Parker
Exec Director Information Security & Compliance
Indiana University Health
Dustin Wilcox
CISO
Anthem
A data-driven organization must have clearly defined governance and business alignment if there is any hope of imbuing their information with meaning. In this discussion, executives examine challenges in taking next steps on the data path and share best practices in driving analytics forward.
Join this peer-to-peer discussion to explore:
- Data trust and confidence in an ever fragmented cloud world
- Efficiency in data management
- Data classification and e-discovery
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact Chris Carcich at christopher.carcich@evanta.com or 971-978-5000.
9:50am - 10:20am Networking Break
10:20am - 11:10am CISO Featured Session
The Fundamentals of Cybersecurity — What Changes in the Cloud?
Hosted by Trend Micro Incorporated
Dustin Wilcox
CISO
Anthem
As the number of cloud-based systems continues to increase and more risk solutions become available, the foundations of cybersecurity can oftentimes get lost in the shuffle. Join Dustin Wilcox for a review of the fundamentals of a sound security strategy and how they can be applied to securing the cloud perimeter.
This session will explore:
- Control services of the cloud – what remains the same
- Tactics for achieving your strategy in the cloud – what changes
- Specific examples and how to deploy them
10:20am - 11:10am CIO & CISO Executive Boardroom
Becoming Agile and Staying Agile
Meredith Harper
Chief Information Security Officer
Eli Lilly
James Jordan
Chief Information Officer
Ascension Health Ministry Service Center
Agile methodologies are an increasingly attractive way for organizations to accelerate the pace of innovation. Yet transitioning to new modes of work can create friction for existing employees, and success depends on buy-in across the organization.
Join your peers in this round table discussion to consider:
- How to take agile dev-ops to the next level
- Challenges to adopting and implementing agile methodologies
- What are some common misconceptions about agile dev-ops
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact Chris Carcich at christopher.carcich@evanta.com or 971-978-5000.
10:20am - 11:10am CISO Executive Boardroom
Strengthening Your Security Operations Center
Bill Russell
CISO
Cummins
William Tucek
Chief Information Security Officer
Toyota Tsusho
When it comes to taking your data from you, cyber criminals never rest. If they can’t get in one way, they will try another. Therefore, when managing incidents for your enterprise, it is critical to ensure that threats and attacks are properly identified, analyzed, communicated, defended, investigated and reported.
During this boardroom discussion on cyber operations, discover:
- How to develop effective principles and procedures for security operations centers
- How determine what is best to outsource vs what should be kept internal
- How to create effective communication and reporting strategies for the entire organization
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact Chris Carcich at christopher.carcich@evanta.com or 971-978-5000.
11:10am - 11:40am Networking Break
June 5, 2019
June 6, 2019
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.