
Ohio CISO Virtual Executive Summit
October 27, 2020 | 8:00am - 1:15pm EDT
October 27, 2020 | 8:00am - 1:15pm EDT
Collaborate with your peers
Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the Ohio CISO Virtual Executive Summit.
Join your peers to discuss the most critical issues impacting CISOs today:
Leading through disruption
Creating a data-driven enterprise
Embracing accelerated change
Governing Body Co-Chairs

Michael Erickson
Baptist Health
CISO

Kiran Govindaraju
Ohio National Financial Services
Actuarial Illustrations

Lisa Heckler
CareSource
Chief Information Security Officer

Phani Konduru
Humana
Chief Enterprise Architect & VP, Technology Advancement

Talvis Love
Cardinal Health
Senior VP & Chief Information Officer (Pharmaceutical Segment)

Deval Motka
Quicken Loans
VP Data Intelligence/Analytics Empowerment

Robert Schuetter
Ashland
Chief Information Security Officer

Marc Varner
YUM! Brands
Corporate VP & Global Chief Information Security Officer

Nelson Vincent
University of Cincinnati
Vice President & Chief Information Officer (Info Technology)
Agenda
October 27, 2020
11:00am - 12:00pm EDT CISO Executive Boardroom
The Changing Face of Insider Threat
Hosted by Exabeam

Stephen Moore
Chief Security Strategist
Exabeam

Amy Lett
Chief Information Security Officer
SCOTTS Miracle-Gro

Mathews Thomas
AVP, IT Risk Mgmt.
Nationwide
As an organizational capability, insider threat management is changing - again. Firstly, the idea of context has changed the categories of insider threat, and secondly insider threat programs now maturing – evolving into a more justifiable and friendly trusted insider program.
Join this virtual boardroom to discuss:
- The evolving landscape of insider threats and its challenges
- The impact of changing behaviors, employee culture and workplace environment on insider risk
- Practical strategies for improving an insider risk management program.
11:00am - 12:00pm EDT CIO & CISO Executive Boardroom
The New Language of Risk
Hosted by CrowdStrike

Elia Zaitsev
CTO of the Americas
CrowdStrike

Michael Speas
Vice President & Chief Information Security Officer
Western & Southern Financial Group
From frontline employees to top-level directors, CIOs & CISOs must be able to communicate cyber risk in a way that compels others to act. What metrics, measures, methods and messages resonate in today’s risk environment?
Join this boardroom to discuss:
- Defining what risk management mean to your organization and identifying priorities
- Implementing a controls framework and improving data quality and compliance
- Translating IT risk into business risk to ensure understanding at board level
12:00pm - 12:45pm EDT Virtual Summit Keynote
Leading Through Disruption
Hosted by IBM

Marc Varner
Corporate VP & Global Chief Information Security Officer
YUM! Brands

Amir Khan
Corporate CISO
IBM
The timeline for adopting strategic technology and security trends rapidly increased in recent months, and now CIOs and CISOs are on the forefront of leading innovative business opportunities.
Join this session for a discussion on:
- Dynamic leadership in a volatile world
- Remastering your brand in times of transition
- Practical examples of adaptive strategy in action
By registering for this session, this serves as your authorization to Evanta or its vendor to provide your contact information to IBM to follow up on your interaction and participation. IBM’s use of your contact information is governed by the IBM Privacy Policy. If you need more information on how IBM is using your personal data you may refer to the IBM Privacy Statement. To withdraw your marketing consent and unsubscribe to receiving emails click on the unsubscribe button at this address: ibm.biz/marketingoptout.
12:45pm - 1:15pm EDT Networking
Community Discussion & Networking

Kiran Govindaraju
Actuarial Illustrations
Ohio National Financial Services
An informal and interactive opportunity for you to network with peers in small groups.
8:00am - 8:45am EDT Virtual Summit Keynote
The Convergence of Zero Trust and SASE
Hosted by Netskope

Jason Clark
Chief Strategy Officer
Netskope

Dustin Wilcox
CISO
Anthem
Organizations are feeling a shift in the world of networking and security as they rapidly adopt and embrace the cloud. On-premises private data centers are no longer the place for data and workloads to exist. With this shift, security and networking are brought closer than ever. Enterprises need speed, visibility, security and reliability without compromise. Enter, the secure access service edge, better known as SASE. Its’ inevitable that SASE implementations and zero trust implementations need to collide to provide a more comprehensive security capability to truly support digital transformation. How can your organization best position itself for the transition?
In this session, you will discuss:
- Problems SASE can address in the modern enterprise
- Benefits of planning both SASE and zero trust implementations
- Insights from organizations adopting SASE and zero trust today
8:45am - 9:00am EDT Break
9:00am - 10:00am EDT CISO Executive Boardroom
Identity, Access, and the Strategic Approach to Zero Trust
Hosted by Zscaler

Lisa Lorenzin
Director of Transformation Strategy
Zscaler

Bryan Fite
Global Account CISO
BT

Mike Orosz
Chief Information Security Officer
Vertiv
As endpoints expand to include a variety of unmanaged devices and users access applications and systems from across the globe, the need to verify identity has become more critical and more complex. Each roadblock on the way to identity verification and permission authorization hinders enterprise agility, requiring CISOs to address identity and access management (IAM) from a strategic risk-management approach.
Join this session to learn:
- Which technologies enable seamless identity management across platforms
- How to right-size identity verification at your organization
- What the latest zero trust strategies are and where do they make sense
9:00am - 10:00am EDT CISO Executive Boardroom
Data Governance as a Business Enabler
Hosted by Boldon James

Stéphane Charbonneau
CTO, Co-Founder
Titus

Shannon Culp
Director, Security Governance
ADM
Some organizations lack resources to help them track and govern their data at scale. With large segments of the workforce now remote, data protection is more critical than ever. How can organizations work to combat this problem and ensure the data is properly managed and secured without impacting productivity or the customer experience?
Join this boardroom for a discussion on:
- Advances in automated processes that will improve efficiency
- Strategies to map and govern data
- How to ensure data compliance in a remote or hybrid workforce
10:00am - 10:45am EDT Virtual Summit Keynote
Protecting People, the New Perimeter
Hosted by Proofpoint

Ryan Kalember
EVP, Cybersecurity Strategy
Proofpoint

Jessica Walpole
Vice President, Global IT Security Operations
Lincoln Electric

Lisa Heckler
Chief Information Security Officer
CareSource
As 2020 changes the way we live and work, cyber criminals are adapting as well. Join us as we examine the biggest challenges security leaders face, and why a people-centric approach to security is everyone’s biggest opportunity to stop attackers and protect their organization.
Join this keynote for a discussion on:
- Why social engineering dominates among today’s cyber threat actors
- How remote work and the move to the cloud has changed the nature of threats
- The ways their organizations are building controls to better understand and protect people
10:45am - 11:00am EDT Break
October 27, 2020
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.