
Minneapolis CISO Virtual Executive Summit
December 2, 2020 | 8:00am - 1:15pm CST
December 2, 2020 | 8:00am - 1:15pm CST
Collaborate with your peers
Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the Minneapolis CISO Virtual Executive Summit.
Join your peers to discuss the most critical issues impacting CISOs today:
Strategies for a risk-aligned, resilient organization
Developing and investing in the security workforce of tomorrow
Creating business value and supporting agile business operations
Governing Body Co-Chairs

Pat Joyce
Medtronic
VP, Global IT & CSO

Mike Kearn
US Bank
Director, Threat Informed Defense

Tris Lingen
3M
Chief Information Security Officer

Jim O'Conner
Cargill
CISO
Agenda
December 2, 2020
11:00am - 12:00pm CST Virtual Summit Boardroom
The Future of Network Security – SASE Implementation
Hosted by Palo Alto Networks

Brad Abbott
Director of Information Security, CISO
Medica

Richard Coleman
Senior Security Analyst
Andersen Corporation

Jason Georgi
Global Field Chief Technology Officer for Prisma Access
Palo Alto Networks
Information security is in a sprint to match the velocity of digital transformation at organizations. Driven by a number of factors such as remote work and bring-your-own device, CISOs face the puzzle of implementing access controls in a way that works well with borderless organizations, without slowing down the business.
In this session, you will discuss:
- Common friction points between IT and security for enabling remote work and digital transformation
- Ways to efficiently deploy security controls without slowing down work
- The strategic measure and application of SASE to give session protection
11:00am - 12:00pm CST Virtual Summit Boardroom
Cloud IAM – Enlightenment or Inferno
Hosted by DivvyCloud by Rapid 7

Judy Hatchett
VP & CISO
Surescripts

Tris Lingen
Chief Information Security Officer
3M

Chris Hertz
VP Cloud Solutions
DivvyCloud
A strong IAM is one key to preventing data breaches and limiting the blast radius, should a security incident occur. But cloud IAM presents a new set of constructs for organizations to build and manage. Is this the most comprehensive identity and access control out there, or yet another layer of complexity added to your program?
In this session, you will discuss:
- Why managing cloud IAM is so complex
- The challenges cloud IAM creates for IT and cybersecurity professionals
- How leading organizations are governing cloud IAM to reduce risk and the chance of a data breach
11:00am - 12:00pm CST Virtual Summit Boardroom
Security Operations – Empowering Teams
Hosted by Arctic Wolf Networks

Becky MacDonald
CISO
Essentia Health

Dinah Davis
VP of the Security Operations Platform
Arctic Wolf Networks

Mike Kearn
Director, Threat Informed Defense
US Bank

Peter Christy
Director Information Security
Patterson Companies
Automation in the world of information security allows teams to move more swiftly in the face of persistent threats while stitching together best-in-class tools that get the job done. For smaller companies, the challenge may be having to do more, with less. Rather than eliminating the need for security talent, the use of a security operations team is freeing up bandwidth for analysts and others to engage in the meaningful work that requires a human touch.
Join this session to learn:
- The role of automation and orchestration in today’s security stack
- How the dispersion of the workforce has caused an increase in compromises
- How to stay vigilant in the face of Account Takeover Attacks (ATO)
12:00pm - 12:45pm CST Virtual Summit Keynote
Tomorrow’s Cyberthreats — Staying One Step Ahead
Hosted by Cybereason

Israel Barak
CISO
Cybereason

Jeff Johnson
Director, IT Security
Digi-Key Electronics
At a time when customer trust is paramount and private data is precious, a major breach can be catastrophic for any organization. Effective security is an essential part of effective business strategy, yet security leaders face an ever-growing challenge to guide their enterprise through the evolving threat landscape.
Join this virtual keynote to explore:
- Strategies for addressing the emerging threat landscape
- The role today’s CISO plays in guiding business strategy to mitigate risk
- Communication strategies for educating users about security – and holding them accountable
12:45pm - 1:15pm CST Networking
Networking to Build Diverse Talent

Rich Agostino
SVP, Chief Information Security Officer
Target

Larry Whiteside Jr.
Co-Founder & President
International Consortium of Minority Cybersecurity Professionals
Hear from the International Consortium of Minority Cybersecurity Professionals and your peers as they share actionable strategies to build a diverse cybersecurity workforce. Learn how you can support this non-profit and help tackle the “great cyber divide.” ICMCP's mission is to achieve the consistent representation of women and minorities in the cybersecurity industry – it offers scholarships, diverse workforce development, and mentoring programs. Listen, learn, and join them if you want to help drive the mission. Then break for some fun and informal networking with your peers to wrap-up the day.
8:00am - 8:45am CST Virtual Summit Keynote
Defending Your Data in a Remote Working World
Hosted by Proofpoint

Pat Joyce
VP, Global IT & CSO
Medtronic

Jim Stephani
VP - Director of Business Technology
Federated Insurance

Lucia Milica
Global Resident CISO
Proofpoint
It’s one of the oldest maxims in cybersecurity – you can’t protect what you can’t see. And with organizations shifting to remote work and the traditional enterprise network going dark in more ways than one, new thinking is required to protect the data that matters to your organization. After all, data doesn’t just leave on its own – a compromised account, malicious insider, or simply negligent user is almost always involved.
Join Lucia Milica, Resident CISO at Proofpoint as she and a CISO panel discuss:
- How to adapt your security architecture to give you visibility in a remote work and cloud-oriented landscape
- The ways in which remote work and the move to the cloud has changed the nature of threats to data
- Approaches to better detect and respond to risky user actions with sensitive data
8:45am - 9:00am CST Break
9:00am - 10:00am CST Virtual Summit Boardroom
Data Governance as a Business Enabler
Hosted by Boldon James, A HelpSystems Company

Linda Goettler
CISO
City of Saint Paul

Aimee Martin
Director, Information Security, Compliance and PMO.
Vista Outdoor

Stéphane Charbonneau
CTO, Co-Founder
Titus, A HelpSystems Company
Some organizations lack resources to help them track and govern their data at scale. With large segments of the workforce now remote, data protection is more critical than ever. How can organizations work to combat this problem and ensure the data is properly managed and secured without impacting productivity or the customer experience?
Join this boardroom for a discussion on:
- Advances in automated processes that will improve efficiency
- Strategies to map and govern data
- How to ensure data compliance in a remote or hybrid workforce
9:00am - 10:00am CST Virtual Summit Boardroom
Bringing Cloud Back Down to Earth
Hosted by CrowdStrike

Pat Joyce
VP, Global IT & CSO
Medtronic

Greg Matthias
EVP, CISO
TCF Bank

Elia Zaitsev
CTO of the Americas
CrowdStrike
CISOs face a constant tension between enterprise agility and enterprise security, and in today’s world, this dynamic often plays out in the context of cloud services. How can CISOs gain a centralized view over cloud security posture and workloads?
Join this session to discuss:
- Methodical approaches to securing cloud-based technologies, workloads and products
- Ways to standardize cloud environments
- Strategies to ensure compliance
9:00am - 10:00am CST Virtual Summit Boardroom
2020 – Lessons Learned for What’s Next with Cyber Risk Management
Hosted by Cycognito

Randy Kirsch
VP of IT
Presbyterian Homes and Services

Bernie Rominski
Director, Information Security
Regis Corporation

Rob Gurzeev
CEO
Cycognito
The disruption of a global pandemic was a significant test for information security executives in 2020, forcing many to flex evolving strategic plans to the massive challenges of remote work, transforming business models and more. Clearly this year validated the CISO’s importance to business continuity. Was it also an opportunity for CISOs to learn valuable lessons to transform their approach to cyber risk management?
Join your peers in this virtual town hall to discuss:
- Enduring lessons learned from 2020
- The state of cyber risk management entering 2021
- How to build security assurance capabilities for the future
10:00am - 10:45am CST Virtual Summit Keynote
The Convergence of Zero Trust and SASE
Hosted by Netskope

Christopher Burger
Vice President, Information Security & Governance
Slalom

James Christiansen
VP, CSO Cloud Security Transformation
Netskope
Organizations are feeling a shift in the world of networking and security as they rapidly adopt and embrace the cloud. On-premises private data centers are no longer the place for data and workloads to exist. With this shift, security and networking are brought closer than ever. Enterprises need speed, visibility, security and reliability without compromise. Enter, the secure access service edge, better known as SASE. Its’ inevitable that SASE implementations and zero trust implementations need to collide to provide a more comprehensive security capability to truly support digital transformation. How can your organization best position itself for the transition?
In this session, you will discuss:
- Problems SASE can address in the modern enterprise
- Benefits of planning both SASE and zero trust implementations
- Insights from organizations adopting SASE and zero trust today
10:45am - 11:00am CST Break
December 2, 2020
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.