In the cloud era, data-centric security is paramount to safeguarding sensitive information. Traditional security measures are inadequate in protecting dispersed data. In this fireside chat, we will discuss the principles of data-centric security, such as data discovery, access controls, and data classification. Prioritizing data protection optimizes resource allocation, improves incident response, and builds trust with stakeholders in today's data-driven world.
The Future of IT & Cybersecurity
CISO & CIO Think Tank
Speakers & Visionaries
Brent Deterding
CISO
Afni, Inc.
Justin Metallo
CISO, Credit & Finance
Volkswagen of America, Inc
About Me
Richard Rushing
CISO
Motorola Mobility
About Me
Ramprakash Ramamoorthy
Director - AI Research
ManageEngine
About Me
Walter Lefmann
Director of Security
CTC Trading Group, LLC
Asaf Kochan
President & Co-Founder
Sentra Inc.
About Me
Calvin Nobles Ph.D.
Chair IT & Management (Former)
Illinois Institute of Technology
About Me
Michael Boucher
Executive Director, Global Information Security
JLL
About Me
Mike Blake
CTO
American Hotel & Lodging Association
Paul Valente
CEO and Co-Founder
VISO Trust
About Me
Philip Burnett
Information Security Officer
Navistar
About Me
John Kellerhals
President / CISO
InfraGard Chicago
About Me
Lonnie Washington
Executive Director Enterprise Systems
City Colleges of Chicago
About Me
Jay Jamison
President, Product & Technology
LogicGate
Chris Ochynski
Director, Product Management
Tanium
About Me
Seong Park
Head of Sales Engineering
Chronosphere
Cole Sinkford
CISO
Globalfoundries
About Me
Katie Hanahan
Strategy VP, Cybersecurity
ITsavvy
Wade Lance
Field CISO
Synack, Inc.
About Me
Michael Gross
Manager, Cybersecurity Intelligence
Cleveland Clinic
About Me
Ari Weil
VP, GTM Strategy
Cyera US Inc.
About Me
Yotam Segev
Co-Founder & CEO
Cyera US Inc.
About Me
Shane Coleman
VP, Solutions Engineering
Cyera US Inc.
About Me
Lee Painter
Global Head of IS Governance
Zurich Insurance Group
About Me
Michael Gross
CEO
Engrossed Advisory
About Me
EVENT DETAILS
September 19, 2023
Agenda
8:30 AM-9:00 AM
Registration
9:00 AM-9:30 AM
Morning Networking
9:30 AM-9:40 AM
Opening Remarks
10:50 AM-11:15 AM
Keynote
Future Proofing Security: Redesigning Cybersecurity Tactics Through AI and ML
In this talk, we'll examine the constraints of traditional cybersecurity and highlight the potential of AI in IT Operations Management. We'll discuss how AI enhances reactive and proactive tools, improves threat detection, risk assessment and reduces incident response times. Ultimately, we'll underscore the pivotal role AI plays in future-proofing your cybersecurity strategy
Panelists
11:15 AM-11:30 AM
Coffee Break
11:30 AM-11:45 AM
Find Your Digital Ally
Finding a digital ally for your IT initiatives means identifying partners or stakeholders who understand the transformative power of technology in the business landscape. Such allies can offer strategic insights, financial support, or resources to help drive your digital strategy forward. With their backing, navigating the challenges of digital transformation becomes more collaborative and effective, ensuring that digital initiatives align perfectly with business objectives. How can CIOs and other digital leaders identify and align their digital strategies with ideal partners from the business?
Panelists
11:50 AM-12:05 PM
Vision Voices
Poor Cyber Hygiene
In the digital age, practicing good cyber hygiene is essential to maintaining the security and integrity of personal and business data. However, in 2023, the lack of basic cyber hygiene practices will continue to be a major cause of cyber incidents. Cybercriminals exploit these vulnerabilities to gain unauthorized access to sensitive information, steal data, and launch damaging cyber attacks. It's crucial for individuals and businesses to prioritize basic cyber hygiene practices, such as using strong passwords, regularly updating software, and backing up data. Additionally, individuals and businesses must educate themselves and their employees on cybersecurity best practices and the latest threats to stay ahead of the evolving threat landscape. By taking these proactive steps, individuals and businesses can protect themselves from cybercriminals who prey on poor cyber hygiene practices.
Panelists
12:10 PM-12:25 PM
Disruptor
Using a Converged Approach: Prioritizing Compliance, Security, and Operations
Converged endpoint management can help teams prioritize and de-risk the IT estate. Converged vulnerability assessments help prioritize the most dangerous and active exploits based on context from the environment, reducing manual analysis. Converged reporting means that security and operations teams are working on the same real-time data to remediate and de-risk the IT estate. Finding, patching, and controlling the IT estate across multiple teams is more effective and easier to automate using a single converged platform.
Panelists
12:25 PM-1:35 PM
Lunch & Disruptor Showcase
1:20 PM-1:35 PM
Lunch & Disruptor Showcase
Shifting Cloud Native Observability to the Left
Cloud native environments have changed the way we develop software. Developers are now expected to deliver, maintain, and support all aspects of the platform. This can be overwhelming, but there is hope. By shifting left and reducing time on triaging failures, developers can spend more time on projects that matter.
This session will provide insights into DevOps and cloud native tips and tricks for spending more time on your projects and less time on call. Attendees will gain real-world actionable insights that bring value to their daily roles.
Panelists
Speaker
Seong Park
Head of Sales Engineering
Chronosphere
1:40 PM-2:05 PM
Keynote
Using Strategic Security Testing to Transform Your Security Posture
Most security testing today is purely tactical- we find vulnerabilities and sometimes fix them. We use this process to satisfy compliance requirements and report point-in-time status to regulators, but we rarely learn anything about our overall security posture and use that information to change our strategy and priorities. Strategic, transformational security testing is the solution.
Strategic security testing uses aggregated data from individual penetration tests to reveal the root cause of persistent weaknesses in security posture due to broken processes and overwhelmed staff. Security and IT management can use that data to invest in training and solutions that are specifically targeted at organizational deficiencies. Moreover, a strategic security testing program will track improvements in overall security posture over time so those improvements can be communicated to senior leadership and the board.
Panelists
2:10 PM-2:55 PM
Panel
AI-Driven Transformation: Ensuring Security and Scalable Growth in the Digital Era
The digital era has ushered in a new wave of opportunities and challenges, with AI emerging as a driving force behind transformative business strategies. Join our in-person panel to explore how CIOs and CISOs can orchestrate AI-driven transformations while safeguarding their organizations against evolving threats. Discover proven approaches for integrating AI into strategic decision-making processes, fostering a secure AI ecosystem alongside existing technologies, and optimizing operational efficiency to achieve scalable growth. Gain valuable insights from industry leaders on leveraging AI for competitive advantage and creating a resilient business environment in the face of growing cybersecurity risks.
Panelists
Chair
John Kellerhals
President / CISO
InfraGard Chicago
Speaker
Michael Boucher
Executive Director, Global Information Security
JLL
Speaker
Mike Blake
CTO
American Hotel & Lodging Association
Speaker
Paul Valente
CEO and Co-Founder
VISO Trust
Speaker
Philip Burnett
Information Security Officer
Navistar
3:00 PM-3:15 PM
Disruptor
Managing Cyber Risk with Quantification
Managing Cyber Risk is a constantly evolving, complex process to address a key challenge all modern enterprises face. Evolving from the qualitative "Red, Yellow, Green," to a more quantitatively grounded analysis is key to driving the right executive and board discussions to make the most effective decisions for your organization. To deliver on this, Cyber Risk leaders need an efficient way to deliver quantitative analysis against their organization's key cyber risks and their plans to mitigate them.
Panelists
Speaker
Jay Jamison
President, Product & Technology
LogicGate
3:15 PM-3:35 PM
Networking Break
3:35 PM-3:50 PM
Disruptor
Cloud Data Security
According to Gartner, 79% of companies have experienced at least one cloud data breach during the pandemic. But the migration of critical business data to the cloud shows no sign of slowing. In fact, it’s accelerating. Yet, despite powerful trends and mounting threats, traditional data security has simply not kept pace with the cloud. Security teams still struggle to even understand the reality of what sensitive data they have in the cloud and its associated risks. This is not a sustainable status quo. Data is increasingly a business most valuable asset. And until organizations can align around a shared Data Reality, cloud security will remain several steps behind intensifying security threats and tightening data regulations.
Panelists
3:55 PM-4:10 PM
Greatest Fears From Our Perspective
The biggest fear for many has not always been the technology but the potential of human error that could expose an organization to a cyberattack. CISOs have agreed that an employee carelessly falling victim to a malware, ransomware and phishing scams are the most likely cause of a security breach. How do we guard against human error without limiting employee efficiency and productivity. What’s working?
Panelists
4:15 PM-5:00 PM
Vision Keynote Panel
Social Engineering: New in 2023
Social engineering attacks are a growing concern for businesses and individuals alike, as cybercriminals continue to use advanced techniques to trick people into divulging sensitive information or performing actions that can lead to data breaches. In 2023, these attacks are expected to become even more sophisticated, making it increasingly challenging for individuals and businesses to identify and prevent them. To protect themselves, individuals and businesses must be vigilant and aware of these tactics. They must also implement comprehensive security measures, such as security awareness training, anti-phishing software, two-factor authentication, and access controls. Additionally, businesses must establish policies and procedures for responding to social engineering attacks, including incident response plans, data backup and recovery, and regular security assessments. By taking these proactive steps, businesses and individuals can better protect themselves from the risks associated with social engineering attacks in 2023 and beyond.
Panelists
Chair
John Kellerhals
President / CISO
InfraGard Chicago
Speaker
Walter Lefmann
Director of Security
CTC Trading Group, LLC
Speaker
Cole Sinkford
CISO
Globalfoundries
Speaker
Lee Painter
Global Head of IS Governance
Zurich Insurance Group
5:00 PM-5:15 PM
Leaders Explore Transferable Skills in the Evaluation Process
In today's swiftly evolving business landscape, the evaluation of leadership must transcend technical expertise and encompass transferable skills such as adaptability, communication, and problem-solving. This holistic approach equips leaders to excel amidst uncertainty, nurture team collaboration, and adeptly navigate multifaceted challenges. By emphasizing these skills, organizations can cultivate resilient leaders capable of driving sustained success and innovation in an ever-changing world.
Panelists
Speaker
Katie Hanahan
Strategy VP, Cybersecurity
ITsavvy




