IN-PERSON

Washington, DC CISO Executive Summit

November 19, 2024 | Sheraton Pentagon City Hotel

November 19, 2024
Sheraton Pentagon City Hotel

Collaborate with your peers

Get together with Washington, DC's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Strengthening influence and partnerships across organization

Thoughtfully leveraging AI to develop needed, business-enabling tools and processes

Building a culture of security to enable smart, secure decision-making

Washington, DC CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Washington, DC CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


November 19, 2024

7:45am - 8:30am  Registration & Breakfast

Registration, Breakfast and Leadership Book Swap

Please join us for breakfast to start out the day. We also invite you to bring your favorite leadership books for a Book Swap at the Executive Summit throughout the day. Which books have influenced you as a leader? Bring a book with your notes in the margins or a fresh copy to leave, and then swap for a book one of your fellow executives has brought. This idea was inspired by one of your own Governing Body Members!

8:30am - 9:15am  Keynote

You Speak, They Swarm — The Power of Story in Reaching Your Audience

Arthur Zards headshot

Arthur Zards

Thought Leader, TED/TEDx Speaker, Coach & Producer

Guest Speaker

"Those who tell the stories rule society." (Plato) Busy executives don’t have time to learn complex communication models or esoteric storytelling processes — you need a simple, effective framework that can help you not only connect with any audience, but also elicit real change. Enter the SWARM Effect.

Join this session with Arthur Zards — an expert on storytelling, TEDster and provocateur — to:

  • Hone your skills in executive influence
  • Adopt a more authentic and engaging approach to speaking
  • Take your next presentation from “understandable” to “compelling”

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Modern Workforce, Modern Security Strategy

Erin Joe headshot

Erin Joe

Senior Executive, Cybersecurity, OCISO

Google Chrome Enterprise

In the age of remote and hybrid work, employees now spend the majority of their time in the browser or in virtual meetings. The workforce is more mobile and distributed than ever before. At the same time, we are seeing an increase in cyber attacks and a higher average cost of data breaches. We must think more about protecting users right where they interface with web threats, the browser, without disrupting productivity.

Join this conversation with your peers to discuss:

  • The browser's role in a business's security strategy
  • Zero trust architecture
  • Managing resources for cybersecurity in a time of economic uncertainty

9:40am - 10:25am  Executive Boardroom

AI Vs AI — How Adversaries and Security Teams Use AI

Mani Keerthi Nagothu headshot

Mani Keerthi Nagothu

Americas Field CISO Associate Director

SentinelOne

Carol Assi headshot

Carol Assi

Cybersecurity Chief Operations Officer

Department of Defense

Anne Kottmeier headshot

Anne Kottmeier

CIO

Chemonics International

With the explosion of Generative AI into widespread use over the past year, there are rising indications that threat actors are exploiting AI to launch cyberattacks. Tackling the evolving threat landscape means getting ahead of the threat - cyber defenders need to be prepared, using the power of AI to defend their organizations.

Join this session to discuss:

  • Analyzing how threat actors use AI offensively in their attack methods
  • Turning the tables on attackers by leveraging emerging technologies to bolster cybersecurity defense
  • Deploying AI for maximum impact to build capabilities and improve incident response

9:40am - 10:25am  Executive Boardroom

Mastering Boardroom Communication – Presenting with Impact

Amit Khosla headshot

Amit Khosla

Business Information Security Officer

Fannie Mae

Presenting to a boardroom or advisory committee can be intimidating for any C-level executive, especially in the age of GenAI. C-suite leaders must show alignment between their objectives and the organization’s strategic goals. But becoming a truly impactful leader who gets desired outcomes consistently is easier said than done and will take learning from others who have been in the same position.

Join this session to share with peers:

  • Specific successful and unsuccessful experiences
  • Best practices for impactful presentations
  • Approaches to provide clear and meaningful metrics & KPIs

9:40am - 10:25am  Workshop

Office Hours with Arthur Zards

Arthur Zards headshot

Arthur Zards

Thought Leader, TED/TEDx Speaker, Coach & Producer

Guest Speaker

Join this special one-on-one session exclusively for Governing Body members with TED/TEDx Speaker, Coach & Producer Arthur Zards for candid feedback on your in-person presence and storytelling. Sessions are 20-minutes and pre-registration is required.

In this unique, private session, you’ll receive:

  • One-on-one consultation with a premier expert

  • Live analysis to adopt a more authentic and engaging approach to speaking

  • Personalized executive presence improvements

10:25am - 11:05am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:05am - 11:50am  Breakout Session

A Data & Analytics Dialogue

Massimo Favro headshot

Massimo Favro

CISO

NVR

Jennifer Bruder headshot

Jennifer Bruder

Senior Manager Data and Analytics

NVR

As organizations collect more and more data, it’s crucial for leaders to empower the enterprise to use that data to ensure better business outcomes. How are you creating an effective D&A strategy that enables the entire organization for growth and innovation?

Join this interactive session to discuss:

  • Ensuring data quality standards and ownership
  • Utilizing analytics to allow for better decision making across the business and measurable outcomes
  • Building a foundation for successful innovation including AI

11:05am - 11:50am  Executive Boardroom

Securing the Everywhere World — Building Cyber Resilience through a “Connectivity Cloud”

Oren Falkowitz headshot

Oren Falkowitz

Field CSO

Cloudflare

Amit Chaudhary headshot

Amit Chaudhary

VP & Head of Cyber Security North America & Defense

Rolls-Royce North America

John Toney headshot

John Toney

CISO

State of Vermont

When users are everywhere and digital operations span cloud, SaaS, and on-premises environments, achieving cyber resilience becomes paramount. The challenge lies in navigating this complexity and maintaining visibility and control to ensure continuous operation despite cyber threats.

Join this interactive roundtable to discuss:

  • Optimizing costs and improving security across diverse cloud environments
  • Adopting Zero Trust philosophies to protect users, data, and applications
  • Innovating with AI while addressing global regulatory and data privacy requirements

11:05am - 11:50am  Executive Boardroom

Delivering Business Value through Cybersecurity Investments

Vishal Gupta headshot

Vishal Gupta

CTO & CIO, SVP Connected Technology

Lexmark

Stan Lowe headshot

Stan Lowe

CISO

Department of the Interior

Cybersecurity is the No. 1 spend item on the IT budget according to Gartner, and it remains a board-level concern. But spend does not always equal protection. CIOs and CISOs can make a difference by making sure investments into cybersecurity can create business value. Now is the time to measure the return on investment and make sure the organization’s goals are aligned.
Join this session to discuss:

  • Choosing the right investments that deliver value to the business especially in an age of AI innovation
  • Going beyond the metric of number attacks to outcome-driven metrics
  • Communicating with the board about cybersecurity through a business perspective

11:50am - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

Transforming Application and Service Delivery for the Modern IT Environment

Scott Montgomery headshot

Scott Montgomery

VP, Strategic Initiatives

Island

Ryan Boulais headshot

Ryan Boulais

CISO

AES Corporation

Delivering business critical applications safely is a delicate balancing act. The user experience is frequently compromised as application, infrastructure, and security teams negotiate the adoption of new services. Unfortunate trade-offs are sometimes necessary to address operational needs for the sake of maintaining security, but these trade-offs can make certain use cases unfeasible or diminish their value to the organization.

In this session, we will discuss:

  • Revolutionizing workspaces by balancing productivity, security, availability, and user experience.
  • How quickly new technologies like the enterprise browser can be adopted to provide a competitive advantage
  • Strategies for reducing the effort required to deliver applications and enhance organizational operations

1:10pm - 1:35pm  Networking Break

1:35pm - 2:20pm  Breakout Session

Beyond the Hype — Navigating the LLM Security Challenges

Alex Attumalil headshot

Alex Attumalil

Global CISO

Under Armour

As AI capabilities expand, businesses will be driving to introduce capabilities to gain efficiency and stay competitive in the market. GenAI techs are mature and cost effective and the original use cases are proving to be a value add. Standing on the sidelines and not taking advantage of the efficiencies are no longer a choice. Organizations must roadmap their journey, plan their execution and avoid unplanned reflex reactions in deploying LLM solutions.

Join this interactive session to hear about:

  • Four sequential steps needed for your LLM journey
  • Being an equal partner to other parts of the business in executing an AI journey
  • Setting up clear guardrails, faster user acceptance and sustainable risk mitigation

1:35pm - 2:20pm  Executive Boardroom

Securing the Future of Work — Challenges and Strategies for the Hybrid Landscape

Demetris Charalambous headshot

Demetris Charalambous

CIO

BankFund Credit Union

Randy Marchany headshot

Randy Marchany

CISO

Virginia Tech

Damien DeVille headshot

Damien DeVille

Principal Architect, Director

Palo Alto Networks

The rise of unmanaged devices, dispersed teams, and sophisticated AI-powered attacks demands a comprehensive rethinking of security architectures. Organizations must examine the critical challenges facing the modern workplace and explore emerging strategies to future-proof security. Join this keynote discussion to learn:

  • How organizations can maintain control and visibility in a BYOD and contractor-driven environment
  • How AI and LLMs are reshaping data protection and proactively identifying risks as well as how to safely enable GenAI in your organization
  • Today’s emerging technologies that can deliver seamless application experiences, even across distributed workforces

1:35pm - 2:20pm  Executive Boardroom

Buy or Build? Investing Time and Resources in Applications

Raylene Dufresne headshot

Raylene Dufresne

Vice President of IT

Miller & Long

Christine Wang headshot

Christine Wang

Acting CTO & Deputy CTO

Export-Import Bank of the United States

Gartner research shows a near split of CIOs opting to build an application in-house versus buying or partnering with a third-party. Regardless of the choice, IT executives must deliver programs that are relevant and both cost and time effective to manage.

In this boardroom, you will discuss:

  • Customizing build or buy strategies that evolve with business needs
  • Maximizing the value of applications while remaining agile
  • Incorporating effective contract management to avoid vendor lock-in

2:20pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

The Essential Qualities of an Effective and Impactful Leader

Amit Chaudhary headshot

Amit Chaudhary

VP & Head of Cyber Security North America & Defense

Rolls-Royce North America

Supro Ghose headshot

Supro Ghose

CISO

EagleBank

Truly exceptional leaders create a culture of trust and respect, inspire innovation, and drive high performance. They lead by example and encourage collaboration. This session will explore stories of leadership and strategies on how to have a lasting impact on not just an organization, but on people.

Join this interactive session to discuss:

  • Building High-Performing Teams: Attracting and retaining quality talent in growth-focused environments
  • Influencing Across the Organization: Strategically engaging stakeholders through strong communication
  • Navigating Evolving Responsibilities: Embracing accountability with authenticity and resiliency

3:00pm - 3:45pm  Executive Boardroom

A New Era of Compliance, Regulation & Personal Liability

Jimmy Benoit headshot

Jimmy Benoit

VP, Cybersecurity & Program Management

Public Broadcasting Service

Paul Curylo headshot

Paul Curylo

VP, CISO

Inova

IT and security leaders are under immense pressure to protect the enterprise from increasingly sophisticated threats. The stakes are high, and the challenges are numerous. With new laws and regulations exposing leaders to personal liability more than ever before, how can executives be proactive in protecting themselves?

Gather with your peers to discuss:

  • How you're approaching protecting yourself in this state of heightened liability
  • How the increasing personal risk for security leaders is affecting the industry
  • Which cases in the news are of importance and why

3:00pm - 3:45pm  Executive Boardroom

The Critical Importance of Managing Third-Party Risk

Vikas Mahajan headshot

Vikas Mahajan

VP & CISO

American Red Cross

Kevin McCarty headshot

Kevin McCarty

CISO, US Healthcare

Cigna

The recent incidents highlight the critical importance of managing third (or even fourth)-party risk in today's interconnected business ecosystem. As CIOs and CISOs, it is crucial to understand the potential vulnerabilities that arise from third-party relationships, develop effective strategies to mitigate these risks and communicate those risks to the business.

In this session you will discuss:

  • Enhancing vendor selection criteria to prioritize security and risk management capabilities
  • Developing robust incident response plans specifically tailored to third-party incidents
  • Implementing practical strategies to enhance your organization's approach to third parties

3:45pm - 4:10pm  Networking Break

4:10pm - 4:45pm  Keynote

Maximizing Your GenAI ROI

Frances Karamouzis headshot

Frances Karamouzis

Distinguished VP Analyst

Gartner

As the scope, scale and price of GenAI initiatives grow, aligning the economics (cost, risk and value) is a top priority to make sure innovative ideas lead to business value. But while calculating what financial gains will come from GenAI implementation, there’s one factor that plays into ROI that might not be top of mind – trust. Engendering trust is a critical differentiator for maximizing AI success. Yet, trust can be elusive, subjective and difficult to measure.

Join Frances Karamouzis, a Distinguished VP Analyst at Gartner who has appeared and/or contributed to reports showcased on 60 Minutes, CNN, CNBC, PBS, Business Week, Forbes and the Council for Foreign Relations as she explores:

  • Keys to improving digital adoption and increasing ROI
  • Determining the framework for identifying, vetting and funding AI and GenAI initiatives
  • Why trust is one of the biggest differentiators in the AI and GenAI landscape, plus how to measure it

4:45pm - 5:00pm  Closing Comments and Prize Drawing

5:00pm - 6:30pm  Governing Body Reception

Governing Body Reception

Governing Body members host this reception for executives to close out the event with an evening of peer networking, food and drinks.

7:45am - 8:30am  Registration & Breakfast

Registration, Breakfast and Leadership Book Swap

Please join us for breakfast to start out the day. We also invite you to bring your favorite leadership books for a Book Swap at the Executive Summit throughout the day. Which books have influenced you as a leader? Bring a book with your notes in the margins or a fresh copy to leave, and then swap for a book one of your fellow executives has brought. This idea was inspired by one of your own Governing Body Members!

8:30am - 9:15am  Keynote

You Speak, They Swarm — The Power of Story in Reaching Your Audience

Arthur Zards headshot

Arthur Zards

Thought Leader, TED/TEDx Speaker, Coach & Producer

Guest Speaker

"Those who tell the stories rule society." (Plato) Busy executives don’t have time to learn complex communication models or esoteric storytelling processes — you need a simple, effective framework that can help you not only connect with any audience, but also elicit real change. Enter the SWARM Effect.

Join this session with Arthur Zards — an expert on storytelling, TEDster and provocateur — to:

  • Hone your skills in executive influence
  • Adopt a more authentic and engaging approach to speaking
  • Take your next presentation from “understandable” to “compelling”

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Modern Workforce, Modern Security Strategy

Erin Joe headshot

Erin Joe

Senior Executive, Cybersecurity, OCISO

Google Chrome Enterprise

In the age of remote and hybrid work, employees now spend the majority of their time in the browser or in virtual meetings. The workforce is more mobile and distributed than ever before. At the same time, we are seeing an increase in cyber attacks and a higher average cost of data breaches. We must think more about protecting users right where they interface with web threats, the browser, without disrupting productivity.

Join this conversation with your peers to discuss:

  • The browser's role in a business's security strategy
  • Zero trust architecture
  • Managing resources for cybersecurity in a time of economic uncertainty

9:40am - 10:25am  Executive Boardroom

AI Vs AI — How Adversaries and Security Teams Use AI

Mani Keerthi Nagothu headshot

Mani Keerthi Nagothu

Americas Field CISO Associate Director

SentinelOne

Carol Assi headshot

Carol Assi

Cybersecurity Chief Operations Officer

Department of Defense

Anne Kottmeier headshot

Anne Kottmeier

CIO

Chemonics International

With the explosion of Generative AI into widespread use over the past year, there are rising indications that threat actors are exploiting AI to launch cyberattacks. Tackling the evolving threat landscape means getting ahead of the threat - cyber defenders need to be prepared, using the power of AI to defend their organizations.

Join this session to discuss:

  • Analyzing how threat actors use AI offensively in their attack methods
  • Turning the tables on attackers by leveraging emerging technologies to bolster cybersecurity defense
  • Deploying AI for maximum impact to build capabilities and improve incident response

9:40am - 10:25am  Executive Boardroom

Mastering Boardroom Communication – Presenting with Impact

Amit Khosla headshot

Amit Khosla

Business Information Security Officer

Fannie Mae

Presenting to a boardroom or advisory committee can be intimidating for any C-level executive, especially in the age of GenAI. C-suite leaders must show alignment between their objectives and the organization’s strategic goals. But becoming a truly impactful leader who gets desired outcomes consistently is easier said than done and will take learning from others who have been in the same position.

Join this session to share with peers:

  • Specific successful and unsuccessful experiences
  • Best practices for impactful presentations
  • Approaches to provide clear and meaningful metrics & KPIs

9:40am - 10:25am  Workshop

Office Hours with Arthur Zards

Arthur Zards headshot

Arthur Zards

Thought Leader, TED/TEDx Speaker, Coach & Producer

Guest Speaker

Join this special one-on-one session exclusively for Governing Body members with TED/TEDx Speaker, Coach & Producer Arthur Zards for candid feedback on your in-person presence and storytelling. Sessions are 20-minutes and pre-registration is required.

In this unique, private session, you’ll receive:

  • One-on-one consultation with a premier expert

  • Live analysis to adopt a more authentic and engaging approach to speaking

  • Personalized executive presence improvements

10:25am - 11:05am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:05am - 11:50am  Breakout Session

A Data & Analytics Dialogue

Massimo Favro headshot

Massimo Favro

CISO

NVR

Jennifer Bruder headshot

Jennifer Bruder

Senior Manager Data and Analytics

NVR

As organizations collect more and more data, it’s crucial for leaders to empower the enterprise to use that data to ensure better business outcomes. How are you creating an effective D&A strategy that enables the entire organization for growth and innovation?

Join this interactive session to discuss:

  • Ensuring data quality standards and ownership
  • Utilizing analytics to allow for better decision making across the business and measurable outcomes
  • Building a foundation for successful innovation including AI

11:05am - 11:50am  Executive Boardroom

Securing the Everywhere World — Building Cyber Resilience through a “Connectivity Cloud”

Oren Falkowitz headshot

Oren Falkowitz

Field CSO

Cloudflare

Amit Chaudhary headshot

Amit Chaudhary

VP & Head of Cyber Security North America & Defense

Rolls-Royce North America

John Toney headshot

John Toney

CISO

State of Vermont

When users are everywhere and digital operations span cloud, SaaS, and on-premises environments, achieving cyber resilience becomes paramount. The challenge lies in navigating this complexity and maintaining visibility and control to ensure continuous operation despite cyber threats.

Join this interactive roundtable to discuss:

  • Optimizing costs and improving security across diverse cloud environments
  • Adopting Zero Trust philosophies to protect users, data, and applications
  • Innovating with AI while addressing global regulatory and data privacy requirements

11:05am - 11:50am  Executive Boardroom

Delivering Business Value through Cybersecurity Investments

Vishal Gupta headshot

Vishal Gupta

CTO & CIO, SVP Connected Technology

Lexmark

Stan Lowe headshot

Stan Lowe

CISO

Department of the Interior

Cybersecurity is the No. 1 spend item on the IT budget according to Gartner, and it remains a board-level concern. But spend does not always equal protection. CIOs and CISOs can make a difference by making sure investments into cybersecurity can create business value. Now is the time to measure the return on investment and make sure the organization’s goals are aligned.
Join this session to discuss:

  • Choosing the right investments that deliver value to the business especially in an age of AI innovation
  • Going beyond the metric of number attacks to outcome-driven metrics
  • Communicating with the board about cybersecurity through a business perspective

11:50am - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

Transforming Application and Service Delivery for the Modern IT Environment

Scott Montgomery headshot

Scott Montgomery

VP, Strategic Initiatives

Island

Ryan Boulais headshot

Ryan Boulais

CISO

AES Corporation

Delivering business critical applications safely is a delicate balancing act. The user experience is frequently compromised as application, infrastructure, and security teams negotiate the adoption of new services. Unfortunate trade-offs are sometimes necessary to address operational needs for the sake of maintaining security, but these trade-offs can make certain use cases unfeasible or diminish their value to the organization.

In this session, we will discuss:

  • Revolutionizing workspaces by balancing productivity, security, availability, and user experience.
  • How quickly new technologies like the enterprise browser can be adopted to provide a competitive advantage
  • Strategies for reducing the effort required to deliver applications and enhance organizational operations

1:10pm - 1:35pm  Networking Break

1:35pm - 2:20pm  Breakout Session

Beyond the Hype — Navigating the LLM Security Challenges

Alex Attumalil headshot

Alex Attumalil

Global CISO

Under Armour

As AI capabilities expand, businesses will be driving to introduce capabilities to gain efficiency and stay competitive in the market. GenAI techs are mature and cost effective and the original use cases are proving to be a value add. Standing on the sidelines and not taking advantage of the efficiencies are no longer a choice. Organizations must roadmap their journey, plan their execution and avoid unplanned reflex reactions in deploying LLM solutions.

Join this interactive session to hear about:

  • Four sequential steps needed for your LLM journey
  • Being an equal partner to other parts of the business in executing an AI journey
  • Setting up clear guardrails, faster user acceptance and sustainable risk mitigation

1:35pm - 2:20pm  Executive Boardroom

Securing the Future of Work — Challenges and Strategies for the Hybrid Landscape

Demetris Charalambous headshot

Demetris Charalambous

CIO

BankFund Credit Union

Randy Marchany headshot

Randy Marchany

CISO

Virginia Tech

Damien DeVille headshot

Damien DeVille

Principal Architect, Director

Palo Alto Networks

The rise of unmanaged devices, dispersed teams, and sophisticated AI-powered attacks demands a comprehensive rethinking of security architectures. Organizations must examine the critical challenges facing the modern workplace and explore emerging strategies to future-proof security. Join this keynote discussion to learn:

  • How organizations can maintain control and visibility in a BYOD and contractor-driven environment
  • How AI and LLMs are reshaping data protection and proactively identifying risks as well as how to safely enable GenAI in your organization
  • Today’s emerging technologies that can deliver seamless application experiences, even across distributed workforces

1:35pm - 2:20pm  Executive Boardroom

Buy or Build? Investing Time and Resources in Applications

Raylene Dufresne headshot

Raylene Dufresne

Vice President of IT

Miller & Long

Christine Wang headshot

Christine Wang

Acting CTO & Deputy CTO

Export-Import Bank of the United States

Gartner research shows a near split of CIOs opting to build an application in-house versus buying or partnering with a third-party. Regardless of the choice, IT executives must deliver programs that are relevant and both cost and time effective to manage.

In this boardroom, you will discuss:

  • Customizing build or buy strategies that evolve with business needs
  • Maximizing the value of applications while remaining agile
  • Incorporating effective contract management to avoid vendor lock-in

2:20pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

The Essential Qualities of an Effective and Impactful Leader

Amit Chaudhary headshot

Amit Chaudhary

VP & Head of Cyber Security North America & Defense

Rolls-Royce North America

Supro Ghose headshot

Supro Ghose

CISO

EagleBank

Truly exceptional leaders create a culture of trust and respect, inspire innovation, and drive high performance. They lead by example and encourage collaboration. This session will explore stories of leadership and strategies on how to have a lasting impact on not just an organization, but on people.

Join this interactive session to discuss:

  • Building High-Performing Teams: Attracting and retaining quality talent in growth-focused environments
  • Influencing Across the Organization: Strategically engaging stakeholders through strong communication
  • Navigating Evolving Responsibilities: Embracing accountability with authenticity and resiliency

3:00pm - 3:45pm  Executive Boardroom

A New Era of Compliance, Regulation & Personal Liability

Jimmy Benoit headshot

Jimmy Benoit

VP, Cybersecurity & Program Management

Public Broadcasting Service

Paul Curylo headshot

Paul Curylo

VP, CISO

Inova

IT and security leaders are under immense pressure to protect the enterprise from increasingly sophisticated threats. The stakes are high, and the challenges are numerous. With new laws and regulations exposing leaders to personal liability more than ever before, how can executives be proactive in protecting themselves?

Gather with your peers to discuss:

  • How you're approaching protecting yourself in this state of heightened liability
  • How the increasing personal risk for security leaders is affecting the industry
  • Which cases in the news are of importance and why

3:00pm - 3:45pm  Executive Boardroom

The Critical Importance of Managing Third-Party Risk

Vikas Mahajan headshot

Vikas Mahajan

VP & CISO

American Red Cross

Kevin McCarty headshot

Kevin McCarty

CISO, US Healthcare

Cigna

The recent incidents highlight the critical importance of managing third (or even fourth)-party risk in today's interconnected business ecosystem. As CIOs and CISOs, it is crucial to understand the potential vulnerabilities that arise from third-party relationships, develop effective strategies to mitigate these risks and communicate those risks to the business.

In this session you will discuss:

  • Enhancing vendor selection criteria to prioritize security and risk management capabilities
  • Developing robust incident response plans specifically tailored to third-party incidents
  • Implementing practical strategies to enhance your organization's approach to third parties

3:45pm - 4:10pm  Networking Break

4:10pm - 4:45pm  Keynote

Maximizing Your GenAI ROI

Frances Karamouzis headshot

Frances Karamouzis

Distinguished VP Analyst

Gartner

As the scope, scale and price of GenAI initiatives grow, aligning the economics (cost, risk and value) is a top priority to make sure innovative ideas lead to business value. But while calculating what financial gains will come from GenAI implementation, there’s one factor that plays into ROI that might not be top of mind – trust. Engendering trust is a critical differentiator for maximizing AI success. Yet, trust can be elusive, subjective and difficult to measure.

Join Frances Karamouzis, a Distinguished VP Analyst at Gartner who has appeared and/or contributed to reports showcased on 60 Minutes, CNN, CNBC, PBS, Business Week, Forbes and the Council for Foreign Relations as she explores:

  • Keys to improving digital adoption and increasing ROI
  • Determining the framework for identifying, vetting and funding AI and GenAI initiatives
  • Why trust is one of the biggest differentiators in the AI and GenAI landscape, plus how to measure it

4:45pm - 5:00pm  Closing Comments and Prize Drawing

5:00pm - 6:30pm  Governing Body Reception

Governing Body Reception

Governing Body members host this reception for executives to close out the event with an evening of peer networking, food and drinks.

November 19, 2024

We look forward to seeing you at an upcoming in-person gathering


Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

Sheraton Pentagon City Hotel
MORE INFORMATION

A block of rooms has been reserved at the Sheraton Pentagon City Hotel at a reduced conference rate. Reservations should be made online or by calling 703-521-1900. Please mention Evanta CIO CISO Executive Summit to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $209 USD (plus tax) is October 28, 2024.

Your Community Partners


Global Thought Leaders
CISO Thought Leader
Key Partners
Program Partners

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Melissa Tarpley

Community Program Manager

619-300-6401

melissa.tarpley@evanta.com