IN-PERSON

Seattle CISO Executive Summit

November 16, 2022 | Grand Hyatt Seattle

November 16, 2022
Grand Hyatt Seattle

Collaborate with your peers

Get together with Seattle's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Mastering the art of change and adaptability

Accelerating high growth and a data-first mindset

Empowering talent, protecting the enterprise

Seattle CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Brian Abrahamson

Pacific Northwest National Laboratory
CIO

Anja Canfield-Budde

University of Washington
Associate Vice President, Information Technology

Laurent Rotival

Cambia Health Solutions
SVP, Strategic Technology Solutions & CIO

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Seattle CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


November 15, 2022

November 16, 2022

6:00pm - 8:30pm  Governing Body Welcome Reception

Governing Body Welcome Reception

Governing Body members host this session for attendees to launch the event with an evening of peer networking, a specialty holiday cocktail, and a charity activity to give back to the local community. 

11:20am - 12:05pm  Breakout Session

Shadow in the Darkness — Cyberdefense in a Changing Threat Landscape

John Jacobs headshot

John Jacobs

Field CISO

Fortinet

Cybercrime and cybercrime activities are not only increasing exponentially each year, but also easier to execute successfully. Complicated attack crime toolkits can be created or purchased easily, making sophisticated attacks more attainable. Furthermore, the changing geopolitical and economic landscapes have provided State-sponsored threat attackers with unlimited resources to target NGOs and critical resources.

In this session we will examine:

  • Techniques, tools and deceptions threat actors use to bypass perimeter security, compromise cloud environments, and manipulate users
  • Methods cybercriminals use to cover tracks and stay hidden
  • Both cloud and on-premise strategies on how to protect your organization from motivated and sophisticated attackers

11:20am - 12:05pm  Breakout Session

Fueling Trust, Collaboration and Empowerment with Technology

Mike Chill headshot

Mike Chill

CIO

Johnstone Supply

Patrick Voon headshot

Patrick Voon

CISO

Loma Linda University Health

Micah Schaafsma headshot

Micah Schaafsma

CIO

Seattle Pacific University

Technology is no longer just an enabler of employee productivity; it is invaluable empowerment. To thrive in a world teeming with opportunity and potential pitfalls, organizations must create deeply considered strategies that include intelligent IT, empathic leadership, secure platforms, and tech empowerment.

Join this session to discuss:

  • Securing and simplifying the digital landscape while navigating evolving user requirements
  • Designing efficient workflows to meet modern work challenges
  • Leveraging technology to foster flexibility, collaboration and trust across the dispersed enterprise

11:20am - 12:05pm  Executive Boardroom

Data Trust, Protection and Compliance Through Automated Governance

Martin Oberhofer headshot

Martin Oberhofer

Director, Development for Data Fabric

IBM

Jeffrey Jones headshot

Jeffrey Jones

CISO

Milliman

Ira Ham headshot

Ira Ham

CISO

MediaAlpha

Jason Hester headshot

Jason Hester

Chief Innovation and Information Officer

Columbia Bank

Actionable data is key to remain competitive in the marketplace. Yet, the growing volume of data spread across many clouds and applications presents a challenge for data governance and protection. A data fabric architecture can abstract away the technological complexities to provide ‘always on’ reliable compliance.

Join this interactive boardroom to discuss:

  • Reducing compliance and audit costs and risks
  • Balancing data protection with innovation through highly automated governance
  • Leveling up governance and compliance efforts by automatically applying policies and rules to data assets at scale

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees 

(seating priority is given to CIOs & CISOs).

To reserve your seat, please contact: Tony Stach

Tony.Stach@evanta.com

11:20am - 12:05pm  Executive Boardroom

Manage Security Posture and Risk Across SaaS Environments

Harold Byun headshot

Harold Byun

Chief Product Officer

AppOmni

Will Longman headshot

Will Longman

Chief Information Security Officer

Blue Origin

As the adoption of enterprise SaaS grows, high-profile SaaS application data breaches are also on the rise. CISOs are ultimately responsible for the security of their organization’s data, including access by third party applications, and must implement appropriate security settings and data governance for their environments. The challenge, the most widely used gateway architecture solutions don’t deliver visibility into the complex, unique characteristics of different SaaS applications.

Join this Boardroom to discuss:

  • How to gain immediate visibility into what data can be accessed by all types of users and integrations, including third party applications
  • How to build the business case for a comprehensive SaaS security program, including funding sources
  • How to integrate security into the Software Development Lifecycle to improve DevSecOps during the product development process

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CIOs & CISOs).

To reserve your seat, please contact: 

Tony Stach at Tony.Stach@evanta.com

12:05pm - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

The ROI of Creativity

Noah Scalin headshot

Noah Scalin

Artist, Innovation Consultant

Guest Speaker

The World Economic Forum named creativity one of the top must-have skills for success in all industries. It is the key to thriving in this era of rapid innovation and change. But very few organizations have truly invested in the development of this essential capability. Why? Because creativity is considered too intangible to measure, too messy to fit into a strategic plan or simply something that is only for a few specially talented people.  In this engaging presentation, Artist/Author Noah Scalin pulls back the curtain on his own creative practice to explain the real ROI of creativity.

In this session, we will learn:

  • Why creativity is a crucial skill for fostering innovation at your organization
  • How to use creativity strategically for long-term impact
  • Simple strategies that anyone can use to innovate, grow and inspire others

1:10pm - 1:25pm  Break

1:25pm - 2:10pm  Breakout Session

The Evolving Role of the Technology Leader

Michael Armer headshot

Michael Armer

VP, CISO

RingCentral

Matt Knox headshot

Matt Knox

CIO

Sound Physicians

Laurent Rotival headshot

Laurent Rotival

SVP, Strategic Technology Solutions & CIO

Cambia Health Solutions

The scope of the technology leaders' responsibilities expands beyond borders and beyond managing the IT and security of an organization.  They must be business leaders looking to add value to a company, talent leaders finding the right employees and adaptive leaders who first need to identify the problem before they can solve it.  So, what’s in the job description?

Join this session to hear the panelists discuss:

  • Preparing for what the technology leadership role will entail in the coming years
  • Delivering at the bottom line while juggling other responsibilities company-wide
  • Strategizing how to be an agile leader who enables others to make quick decisions

1:25pm - 2:10pm  Breakout Session

#EpicFail — A Ransomware Choose Your Own Adventure

Chuck Markarian headshot

Chuck Markarian

CISO

PACCAR

Whether it comes from across the globe or down the street, the ever-looming threat of a ransomware attack is always in the back of the IT and security executive’s mind. Get your collaborative and creative juices flowing in this gamified choose-your-own-adventure.

In this interactive session attendees will:

  • Collaborate to identify threat responses
  • Respond to choices and forces out of their control
  • Discuss pitfalls and best practices

1:25pm - 2:10pm  Executive Boardroom

Architecting a More Adaptive and Integrated IAM Strategy

Wolfgang Goerlich headshot

Wolfgang Goerlich

Advisory CISO

Cisco Secure

Dave Wolf headshot

Dave Wolf

Senior Vice President, Chief Information Security Officer

Washington Federal

Greg Smith headshot

Greg Smith

CISO, Director Security & Infrastructure

City of Seattle

IAM systems are the digital keys to your company’s castle. But the transition to remote, connect anywhere computing means there are thousands of keys created every day, each one exponentially increasing the risk of unauthorized access through any one of the systems your users access daily. So if identity is now the ultimate perimeter and that perimeter is constantly expanding and becoming more complex, how do you build a defense structure capable of protecting it?

During this peer-discussion you will explore:

  • The role of zero trust in access management
  • How to implement IAM tools without negatively impacting the user experience or core business operations
  • How to engage other stakeholders and functions on their access needs to move beyond surface-level coordination

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CIOs & CISOs).

To reserve your seat, please contact: 

Tony Stach at Tony.Stach@evanta.com

1:25pm - 2:10pm  Executive Boardroom

Third-Party Cyber Risk — Zero-Day Findings and Mitigation

Brendan Conlon headshot

Brendan Conlon

Vice Chairman

BlueVoyant

Ronald Jimerson headshot

Ronald Jimerson

CISO

Port Of Seattle

Mark Sauer headshot

Mark Sauer

CIO

Oregon Department of Transportation

Managing distributed risk is today’s defining cybersecurity challenge. Mitigation of zero-day vulnerabilities is critical as adversaries exploit supply chain entities. This session explores how to identify all third parties impacted by zero-day vulnerabilities and guide their mitigation efforts. Your vendor, supplier, and partner ecosystem is now your enterprise attack surface.

Join this session to learn:

  • How to manage distributed risk associated with hundreds and even thousands of vendors, suppliers, and partners 
  • Approaches to identify, prioritize, and mitigate active threats and critical/zero-day vulnerabilities 
  • Strategies to reduce supply chain/external ecosystem risk associated with zero-day

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CIOs & CISOs).

To reserve your seat, please contact: 

Tony Stach at Tony.Stach@evanta.com

7:45am - 8:45am  Registration & Breakfast

8:45am - 9:30am  Keynote

Scaling Technology Teams with a Culture-First Approach

Julie Averill headshot

Julie Averill

EVP, CTO

Lululemon

At the core of lululemon is its culture: innovative, diverse, inclusive and authentic. When Julie Averill, EVP and Chief Technology Officer, set out to scale lululemon’s technology team, she led with a culture-first approach. In this engaging session, Julie will discuss lululemon’s journey - where they’ve been, and where they’re going.

Join this keynote to hear highlights from lululemon technology’s journey including:

  • Attracting top talent and finding leaders who share in the company’s core value and mission
  • Introducing lululemon into new communities while honoring the local culture & heritage
  • Overcoming barriers and the work that lies ahead

9:30am - 10:00am  Networking Break

10:00am - 10:45am  Breakout Session

The Road to Zero

Brett James headshot

Brett James

Field CTO

Zscaler

Zero Trust architecture is disrupting the IT industry as enterprises are forced to react to ransomware and strive for cloud adoption. Zero Trust, however, isn’t just another appliance in your data center. Rather, it’s a philosophical reimagining of your network architecture that touches every corner of the enterprise, not just IT.

Join Brett James, Field CTO as he explores:

  • The birth of Zero Trust
  • What it means to the modern enterprise
  • Kick starting a Zero Trust transformation

10:00am - 10:45am  Breakout Session

Aligning With the Business — IT’s Gameplan

Zafar Chaudry headshot

Zafar Chaudry

SVP and CDIO

Seattle Children's

Matt Modarelli headshot

Matt Modarelli

CIO & Director, IT

Washington State Department of Transportation

Reema Nath headshot

Reema Nath

Vice President Information Technology

Thermo Fisher Scientific

Getting total buy-in from leadership isn’t easy, but it can accelerate your initiatives and increase success and adoption. By aligning IT priorities with enterprise objectives, IT’s effectiveness will be recognized, inspiring trust and future buy-in across the enterprise.

Join this session to hear the panel discuss:

  • Communicating with your board
  • Creating cases for change
  • Empowering your team to take ownership
  • Building relationships with stakeholders

10:00am - 10:45am  Executive Boardroom

The Rise of Big Security Data

Michael Leland headshot

Michael Leland

Chief Cybersecurity Evangelist

SentinelOne

Adam Zoller headshot

Adam Zoller

Chief Information Security Officer

Providence

Sean Mooney headshot

Sean Mooney

Chief Research Information Officer

University of Washington Medicine

Data is growing exponentially. The challenge is that with the rise of data stored in the cloud and the rise of endpoints and IoT devices, the enterprises looking to improve their security posture by leveraging this abundant wealth of data. However, data without context becomes superfluous and that more data does not equate to better security. Data needs to be contextualized and assembled into actionable results.

Come to this session to discuss:

  • How cyber hackers are exploiting weaknesses posed by legacy SIEM and EDR solutions
  • How rogue devices and shadow IT are leaving your enterprise even more vulnerable
  • How data retention is key to effective threat hunting, but it comes at a cost

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CIOs & CISOs).

To reserve your seat, please contact: Tony Stach

Tony.Stach@evanta.com

10:00am - 10:45am  Executive Boardroom

Managing Third Party and Supply Chain Risk

Lewis Howell headshot

Lewis Howell

Senior Security Architect

Sirius Computer Solutions

Michael Boyd headshot

Michael Boyd

CISO

Qorvo

Randy Coggan headshot

Randy Coggan

Senior Manager, Business Continuity

Premera Blue Cross

Today’s increasingly complex and interconnected supply chain creates more opportunities than ever for malicious actors to cause damage to your business. Third-party data breaches are at an all-time high, and legacy approaches to third-party risk management can’t keep up.

Join this boardroom to explore:

  • Continuous assessment and monitoring of third parties and supply chain partners
  • How to create an accurate inventory of all vendors within your ecosystem
  • What to do when your third party gets breached

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CIOs & CISOs).

To reserve your seat, please contact: 

Tony Stach at Tony.stach@evanta.com

10:45am - 11:20am  Networking Break

10:50am - 11:15am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

2:10pm - 2:45pm  Networking Break

2:15pm - 2:40pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

2:45pm - 3:30pm  Breakout Session

Passwordless Is Just the Start — Why CIOs & CISOs Must Rethink the Customer Identity Experience

Raj Galagali headshot

Raj Galagali

Vice President, Global Solutions Engineering

Transmit Security

Threat actors constantly target customer passwords, which is why many CISOs view passwordless as a big leap in authentication security. Eliminating passwords is essential, but attackers are still able to takeover customer accounts or create their own fake accounts with more sophisticated methods. To close off all threat vectors and improve the customer experience, identity professionals must take a comprehensive CIAM approach to assess risk and trust throughout the lifecycle of the user journey, from first registration and passwordless authentication to account recovery.

This session explores:

  • The role of passwordless authentication in improving protection and customer experience
  • How attackers are invading accounts at other points in the identity lifecycle
  • Why companies must take a more comprehensive approach to account protection, inclusive of passwordless authentication
  • How to deliver security-first CIAM without compromising the user experience

2:45pm - 3:30pm  Breakout Session

Leading Through People, Culture & Technology to Transform the Guest Experience

Charu Jain headshot

Charu Jain

Senior Vice President Merchandising & Innovation

Alaska Airlines

Alaska Airlines has always had a culture of world-class customer experience. But continuing this legacy requires continuous innovation. When innovation can mean so many things, how do you operationalize it to effectively lead change across the organization? As Senior Vice President Merchandising & Innovation, Charu Jain has taken on the mantle to define and transform the customer experience.

Join this session to learn about:

  • Defining innovation with the board
  • Working with teams across the business to operationalize innovation
  • Empowering employees with the information they need to transform the customer experience

2:45pm - 3:30pm  Executive Boardroom

Build and Protect for Tomorrow

Akil Muralidharan headshot

Akil Muralidharan

Senior Director of Product Management

Fastly

Jose Perezchica headshot

Jose Perezchica

Director of Information Systems

Reser's Fine Foods

Dave Wolf headshot

Dave Wolf

Senior Vice President, Chief Information Security Officer

Washington Federal

The pandemic not only accelerated the pace of digital transformation— it heightened customer expectations as they now require personalized, intuitive, and immediate experiences in our increasingly digital world. However, this demand also creates a need for secure, performant, and resilient technology. That increase pushes businesses to expand their technological ecosystems and grow the way they think about interfacing with customers and employees. With this expansion and change, come inherent risks.

Join this session sponsored by Fastly as your peers discuss:

  • Creating unique opportunities for business transformation
  • Balancing innovation, while managing and protecting new technologies
  • Implementing strategies for future-proofing a framework that allows for faster modernization

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CIOs & CISOs).

To reserve your seat, please contact: Tony Stach

Tony.Stach@evanta.com

2:45pm - 3:30pm  Executive Boardroom

What Matters Most for Your Security Operations

Matt Peters headshot

Matt Peters

Chief Product Officer

Expel

Will Longman headshot

Will Longman

Chief Information Security Officer

Blue Origin

Alexander Marquardt headshot

Alexander Marquardt

Global Head of Identity & Access Management

SAS

Since cybercriminals never rest, a sound SOC - staffed by the right people using the right tools in the right way - should be a key part of your cyber defense strategy. Whether your security operations program is completely in-house, outsourced, or operating in a hybrid model you’ll want to measure its effectiveness. How do you think about measuring efficacy and how do these metrics feedback into your program to increase operational maturity over time?

In this session you will discuss:

  • Volume and trend metrics that speak to effectiveness; what does good look like?
  • How does automation come into play and how do you monitor what the robots are doing?
  • What impact does this have on hiring and ongoing job satisfaction?

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees 

(seating priority is given to CIOs & CISOs).

To reserve your seat, please contact: Tony Stach

Tony.Stach@evanta.com

3:30pm - 3:45pm  Networking Break

3:45pm - 4:20pm  Keynote

Redefining Community — CIO & CISO Collaboration

Steve Person headshot

Steve Person

Chief Information Security Officer

Cambia Health Solutions

Laurent Rotival headshot

Laurent Rotival

SVP, Strategic Technology Solutions & CIO

Cambia Health Solutions

Join this keynote for a collaborative discussion between the CIO & CISO of Cambia Health Solutions.

4:20pm - 4:50pm  Closing Reception & Prize Drawing

6:00pm - 8:30pm  Governing Body Welcome Reception

Governing Body Welcome Reception

Governing Body members host this session for attendees to launch the event with an evening of peer networking, a specialty holiday cocktail, and a charity activity to give back to the local community. 

11:20am - 12:05pm  Breakout Session

Shadow in the Darkness — Cyberdefense in a Changing Threat Landscape

John Jacobs headshot

John Jacobs

Field CISO

Fortinet

Cybercrime and cybercrime activities are not only increasing exponentially each year, but also easier to execute successfully. Complicated attack crime toolkits can be created or purchased easily, making sophisticated attacks more attainable. Furthermore, the changing geopolitical and economic landscapes have provided State-sponsored threat attackers with unlimited resources to target NGOs and critical resources.

In this session we will examine:

  • Techniques, tools and deceptions threat actors use to bypass perimeter security, compromise cloud environments, and manipulate users
  • Methods cybercriminals use to cover tracks and stay hidden
  • Both cloud and on-premise strategies on how to protect your organization from motivated and sophisticated attackers

11:20am - 12:05pm  Breakout Session

Fueling Trust, Collaboration and Empowerment with Technology

Mike Chill headshot

Mike Chill

CIO

Johnstone Supply

Patrick Voon headshot

Patrick Voon

CISO

Loma Linda University Health

Micah Schaafsma headshot

Micah Schaafsma

CIO

Seattle Pacific University

Technology is no longer just an enabler of employee productivity; it is invaluable empowerment. To thrive in a world teeming with opportunity and potential pitfalls, organizations must create deeply considered strategies that include intelligent IT, empathic leadership, secure platforms, and tech empowerment.

Join this session to discuss:

  • Securing and simplifying the digital landscape while navigating evolving user requirements
  • Designing efficient workflows to meet modern work challenges
  • Leveraging technology to foster flexibility, collaboration and trust across the dispersed enterprise

11:20am - 12:05pm  Executive Boardroom

Data Trust, Protection and Compliance Through Automated Governance

Martin Oberhofer headshot

Martin Oberhofer

Director, Development for Data Fabric

IBM

Jeffrey Jones headshot

Jeffrey Jones

CISO

Milliman

Ira Ham headshot

Ira Ham

CISO

MediaAlpha

Jason Hester headshot

Jason Hester

Chief Innovation and Information Officer

Columbia Bank

Actionable data is key to remain competitive in the marketplace. Yet, the growing volume of data spread across many clouds and applications presents a challenge for data governance and protection. A data fabric architecture can abstract away the technological complexities to provide ‘always on’ reliable compliance.

Join this interactive boardroom to discuss:

  • Reducing compliance and audit costs and risks
  • Balancing data protection with innovation through highly automated governance
  • Leveling up governance and compliance efforts by automatically applying policies and rules to data assets at scale

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees 

(seating priority is given to CIOs & CISOs).

To reserve your seat, please contact: Tony Stach

Tony.Stach@evanta.com

11:20am - 12:05pm  Executive Boardroom

Manage Security Posture and Risk Across SaaS Environments

Harold Byun headshot

Harold Byun

Chief Product Officer

AppOmni

Will Longman headshot

Will Longman

Chief Information Security Officer

Blue Origin

As the adoption of enterprise SaaS grows, high-profile SaaS application data breaches are also on the rise. CISOs are ultimately responsible for the security of their organization’s data, including access by third party applications, and must implement appropriate security settings and data governance for their environments. The challenge, the most widely used gateway architecture solutions don’t deliver visibility into the complex, unique characteristics of different SaaS applications.

Join this Boardroom to discuss:

  • How to gain immediate visibility into what data can be accessed by all types of users and integrations, including third party applications
  • How to build the business case for a comprehensive SaaS security program, including funding sources
  • How to integrate security into the Software Development Lifecycle to improve DevSecOps during the product development process

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CIOs & CISOs).

To reserve your seat, please contact: 

Tony Stach at Tony.Stach@evanta.com

12:05pm - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

The ROI of Creativity

Noah Scalin headshot

Noah Scalin

Artist, Innovation Consultant

Guest Speaker

The World Economic Forum named creativity one of the top must-have skills for success in all industries. It is the key to thriving in this era of rapid innovation and change. But very few organizations have truly invested in the development of this essential capability. Why? Because creativity is considered too intangible to measure, too messy to fit into a strategic plan or simply something that is only for a few specially talented people.  In this engaging presentation, Artist/Author Noah Scalin pulls back the curtain on his own creative practice to explain the real ROI of creativity.

In this session, we will learn:

  • Why creativity is a crucial skill for fostering innovation at your organization
  • How to use creativity strategically for long-term impact
  • Simple strategies that anyone can use to innovate, grow and inspire others

1:10pm - 1:25pm  Break

1:25pm - 2:10pm  Breakout Session

The Evolving Role of the Technology Leader

Michael Armer headshot

Michael Armer

VP, CISO

RingCentral

Matt Knox headshot

Matt Knox

CIO

Sound Physicians

Laurent Rotival headshot

Laurent Rotival

SVP, Strategic Technology Solutions & CIO

Cambia Health Solutions

The scope of the technology leaders' responsibilities expands beyond borders and beyond managing the IT and security of an organization.  They must be business leaders looking to add value to a company, talent leaders finding the right employees and adaptive leaders who first need to identify the problem before they can solve it.  So, what’s in the job description?

Join this session to hear the panelists discuss:

  • Preparing for what the technology leadership role will entail in the coming years
  • Delivering at the bottom line while juggling other responsibilities company-wide
  • Strategizing how to be an agile leader who enables others to make quick decisions

1:25pm - 2:10pm  Breakout Session

#EpicFail — A Ransomware Choose Your Own Adventure

Chuck Markarian headshot

Chuck Markarian

CISO

PACCAR

Whether it comes from across the globe or down the street, the ever-looming threat of a ransomware attack is always in the back of the IT and security executive’s mind. Get your collaborative and creative juices flowing in this gamified choose-your-own-adventure.

In this interactive session attendees will:

  • Collaborate to identify threat responses
  • Respond to choices and forces out of their control
  • Discuss pitfalls and best practices

1:25pm - 2:10pm  Executive Boardroom

Architecting a More Adaptive and Integrated IAM Strategy

Wolfgang Goerlich headshot

Wolfgang Goerlich

Advisory CISO

Cisco Secure

Dave Wolf headshot

Dave Wolf

Senior Vice President, Chief Information Security Officer

Washington Federal

Greg Smith headshot

Greg Smith

CISO, Director Security & Infrastructure

City of Seattle

IAM systems are the digital keys to your company’s castle. But the transition to remote, connect anywhere computing means there are thousands of keys created every day, each one exponentially increasing the risk of unauthorized access through any one of the systems your users access daily. So if identity is now the ultimate perimeter and that perimeter is constantly expanding and becoming more complex, how do you build a defense structure capable of protecting it?

During this peer-discussion you will explore:

  • The role of zero trust in access management
  • How to implement IAM tools without negatively impacting the user experience or core business operations
  • How to engage other stakeholders and functions on their access needs to move beyond surface-level coordination

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CIOs & CISOs).

To reserve your seat, please contact: 

Tony Stach at Tony.Stach@evanta.com

1:25pm - 2:10pm  Executive Boardroom

Third-Party Cyber Risk — Zero-Day Findings and Mitigation

Brendan Conlon headshot

Brendan Conlon

Vice Chairman

BlueVoyant

Ronald Jimerson headshot

Ronald Jimerson

CISO

Port Of Seattle

Mark Sauer headshot

Mark Sauer

CIO

Oregon Department of Transportation

Managing distributed risk is today’s defining cybersecurity challenge. Mitigation of zero-day vulnerabilities is critical as adversaries exploit supply chain entities. This session explores how to identify all third parties impacted by zero-day vulnerabilities and guide their mitigation efforts. Your vendor, supplier, and partner ecosystem is now your enterprise attack surface.

Join this session to learn:

  • How to manage distributed risk associated with hundreds and even thousands of vendors, suppliers, and partners 
  • Approaches to identify, prioritize, and mitigate active threats and critical/zero-day vulnerabilities 
  • Strategies to reduce supply chain/external ecosystem risk associated with zero-day

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CIOs & CISOs).

To reserve your seat, please contact: 

Tony Stach at Tony.Stach@evanta.com

7:45am - 8:45am  Registration & Breakfast

8:45am - 9:30am  Keynote

Scaling Technology Teams with a Culture-First Approach

Julie Averill headshot

Julie Averill

EVP, CTO

Lululemon

At the core of lululemon is its culture: innovative, diverse, inclusive and authentic. When Julie Averill, EVP and Chief Technology Officer, set out to scale lululemon’s technology team, she led with a culture-first approach. In this engaging session, Julie will discuss lululemon’s journey - where they’ve been, and where they’re going.

Join this keynote to hear highlights from lululemon technology’s journey including:

  • Attracting top talent and finding leaders who share in the company’s core value and mission
  • Introducing lululemon into new communities while honoring the local culture & heritage
  • Overcoming barriers and the work that lies ahead

9:30am - 10:00am  Networking Break

10:00am - 10:45am  Breakout Session

The Road to Zero

Brett James headshot

Brett James

Field CTO

Zscaler

Zero Trust architecture is disrupting the IT industry as enterprises are forced to react to ransomware and strive for cloud adoption. Zero Trust, however, isn’t just another appliance in your data center. Rather, it’s a philosophical reimagining of your network architecture that touches every corner of the enterprise, not just IT.

Join Brett James, Field CTO as he explores:

  • The birth of Zero Trust
  • What it means to the modern enterprise
  • Kick starting a Zero Trust transformation

10:00am - 10:45am  Breakout Session

Aligning With the Business — IT’s Gameplan

Zafar Chaudry headshot

Zafar Chaudry

SVP and CDIO

Seattle Children's

Matt Modarelli headshot

Matt Modarelli

CIO & Director, IT

Washington State Department of Transportation

Reema Nath headshot

Reema Nath

Vice President Information Technology

Thermo Fisher Scientific

Getting total buy-in from leadership isn’t easy, but it can accelerate your initiatives and increase success and adoption. By aligning IT priorities with enterprise objectives, IT’s effectiveness will be recognized, inspiring trust and future buy-in across the enterprise.

Join this session to hear the panel discuss:

  • Communicating with your board
  • Creating cases for change
  • Empowering your team to take ownership
  • Building relationships with stakeholders

10:00am - 10:45am  Executive Boardroom

The Rise of Big Security Data

Michael Leland headshot

Michael Leland

Chief Cybersecurity Evangelist

SentinelOne

Adam Zoller headshot

Adam Zoller

Chief Information Security Officer

Providence

Sean Mooney headshot

Sean Mooney

Chief Research Information Officer

University of Washington Medicine

Data is growing exponentially. The challenge is that with the rise of data stored in the cloud and the rise of endpoints and IoT devices, the enterprises looking to improve their security posture by leveraging this abundant wealth of data. However, data without context becomes superfluous and that more data does not equate to better security. Data needs to be contextualized and assembled into actionable results.

Come to this session to discuss:

  • How cyber hackers are exploiting weaknesses posed by legacy SIEM and EDR solutions
  • How rogue devices and shadow IT are leaving your enterprise even more vulnerable
  • How data retention is key to effective threat hunting, but it comes at a cost

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CIOs & CISOs).

To reserve your seat, please contact: Tony Stach

Tony.Stach@evanta.com

10:00am - 10:45am  Executive Boardroom

Managing Third Party and Supply Chain Risk

Lewis Howell headshot

Lewis Howell

Senior Security Architect

Sirius Computer Solutions

Michael Boyd headshot

Michael Boyd

CISO

Qorvo

Randy Coggan headshot

Randy Coggan

Senior Manager, Business Continuity

Premera Blue Cross

Today’s increasingly complex and interconnected supply chain creates more opportunities than ever for malicious actors to cause damage to your business. Third-party data breaches are at an all-time high, and legacy approaches to third-party risk management can’t keep up.

Join this boardroom to explore:

  • Continuous assessment and monitoring of third parties and supply chain partners
  • How to create an accurate inventory of all vendors within your ecosystem
  • What to do when your third party gets breached

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CIOs & CISOs).

To reserve your seat, please contact: 

Tony Stach at Tony.stach@evanta.com

10:45am - 11:20am  Networking Break

10:50am - 11:15am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

2:10pm - 2:45pm  Networking Break

2:15pm - 2:40pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

2:45pm - 3:30pm  Breakout Session

Passwordless Is Just the Start — Why CIOs & CISOs Must Rethink the Customer Identity Experience

Raj Galagali headshot

Raj Galagali

Vice President, Global Solutions Engineering

Transmit Security

Threat actors constantly target customer passwords, which is why many CISOs view passwordless as a big leap in authentication security. Eliminating passwords is essential, but attackers are still able to takeover customer accounts or create their own fake accounts with more sophisticated methods. To close off all threat vectors and improve the customer experience, identity professionals must take a comprehensive CIAM approach to assess risk and trust throughout the lifecycle of the user journey, from first registration and passwordless authentication to account recovery.

This session explores:

  • The role of passwordless authentication in improving protection and customer experience
  • How attackers are invading accounts at other points in the identity lifecycle
  • Why companies must take a more comprehensive approach to account protection, inclusive of passwordless authentication
  • How to deliver security-first CIAM without compromising the user experience

2:45pm - 3:30pm  Breakout Session

Leading Through People, Culture & Technology to Transform the Guest Experience

Charu Jain headshot

Charu Jain

Senior Vice President Merchandising & Innovation

Alaska Airlines

Alaska Airlines has always had a culture of world-class customer experience. But continuing this legacy requires continuous innovation. When innovation can mean so many things, how do you operationalize it to effectively lead change across the organization? As Senior Vice President Merchandising & Innovation, Charu Jain has taken on the mantle to define and transform the customer experience.

Join this session to learn about:

  • Defining innovation with the board
  • Working with teams across the business to operationalize innovation
  • Empowering employees with the information they need to transform the customer experience

2:45pm - 3:30pm  Executive Boardroom

Build and Protect for Tomorrow

Akil Muralidharan headshot

Akil Muralidharan

Senior Director of Product Management

Fastly

Jose Perezchica headshot

Jose Perezchica

Director of Information Systems

Reser's Fine Foods

Dave Wolf headshot

Dave Wolf

Senior Vice President, Chief Information Security Officer

Washington Federal

The pandemic not only accelerated the pace of digital transformation— it heightened customer expectations as they now require personalized, intuitive, and immediate experiences in our increasingly digital world. However, this demand also creates a need for secure, performant, and resilient technology. That increase pushes businesses to expand their technological ecosystems and grow the way they think about interfacing with customers and employees. With this expansion and change, come inherent risks.

Join this session sponsored by Fastly as your peers discuss:

  • Creating unique opportunities for business transformation
  • Balancing innovation, while managing and protecting new technologies
  • Implementing strategies for future-proofing a framework that allows for faster modernization

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CIOs & CISOs).

To reserve your seat, please contact: Tony Stach

Tony.Stach@evanta.com

2:45pm - 3:30pm  Executive Boardroom

What Matters Most for Your Security Operations

Matt Peters headshot

Matt Peters

Chief Product Officer

Expel

Will Longman headshot

Will Longman

Chief Information Security Officer

Blue Origin

Alexander Marquardt headshot

Alexander Marquardt

Global Head of Identity & Access Management

SAS

Since cybercriminals never rest, a sound SOC - staffed by the right people using the right tools in the right way - should be a key part of your cyber defense strategy. Whether your security operations program is completely in-house, outsourced, or operating in a hybrid model you’ll want to measure its effectiveness. How do you think about measuring efficacy and how do these metrics feedback into your program to increase operational maturity over time?

In this session you will discuss:

  • Volume and trend metrics that speak to effectiveness; what does good look like?
  • How does automation come into play and how do you monitor what the robots are doing?
  • What impact does this have on hiring and ongoing job satisfaction?

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees 

(seating priority is given to CIOs & CISOs).

To reserve your seat, please contact: Tony Stach

Tony.Stach@evanta.com

3:30pm - 3:45pm  Networking Break

3:45pm - 4:20pm  Keynote

Redefining Community — CIO & CISO Collaboration

Steve Person headshot

Steve Person

Chief Information Security Officer

Cambia Health Solutions

Laurent Rotival headshot

Laurent Rotival

SVP, Strategic Technology Solutions & CIO

Cambia Health Solutions

Join this keynote for a collaborative discussion between the CIO & CISO of Cambia Health Solutions.

4:20pm - 4:50pm  Closing Reception & Prize Drawing

November 15, 2022

November 16, 2022

We look forward to seeing you at an upcoming in-person gathering


Location


Venue & Accommodation

Grand Hyatt Seattle
MORE INFORMATION

A block of rooms has been reserved at the Grand Hyatt Seattle at a reduced conference rate. Reservations should be made online or by calling 1-888-421-1442. Please mention G-EVAE to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $229 USD (plus tax) is October 25, 2022.

Your Community Partners


Global Thought Leader
CIO Thought Leaders
CISO Thought Leaders
CIO and CISO Thought Leader
Program Partners

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Tony Stach

Program Manager

3604335583

tony.stach@evanta.com