CISO Institute: USA

CISO Institute: USA

Location: Booth School of Business, Gleacher Centre, Chicago

Date: Thursday March 28th 2024

Time: 08:00 - 18:30 CST

Event Summary

This year, we're thrilled to announce a ground-breaking addition: CISO Institute will be co-located with the CDO Institute, CIO Institute and the NEW LAUNCH of our AI Institute stream. The only event series in the world that unites the entire Technology Board of Directors, offering delegates a unique opportunity to select from 4 distinct content streams. This convergence of events is not just about sharing physical space; it's about creating an environment where professionals from diverse domains can synergize, network, and engage in shared learning experiences. The fusion of insights from these distinct but interconnected fields promises to open up a whole new world of possibilities and collaborations.

This unique event offers delegates the opportunity to customize their experience by choosing sessions from these three streams. Whether you are shaping your organization's technological vision, safeguarding its digital fortresses, or harnessing the power of data, this conference provides an unparalleled platform for networking, learning, and mapping the way forward.

Immerse yourself in the vibrant atmosphere of Chicago as we bring together the brightest minds in the industry. It's a space where insights flourish, connections deepen, and strategies evolve. Embrace the future of tech leadership at this extraordinary conference - your guiding light. Mark the date and prepare for an unforgettable day of knowledge exchange and collaboration.

Agenda Highlights include:

  • AI Advancements: Dive into the latest in Artificial Intelligence (AI) and its transformative impact on businesses.
  • Digital Transformation: Learn strategies to navigate the digital transformation landscape and harness its full potential.
  • IT Architecture Insights: Gain insights into cutting-edge IT architecture trends and best practices.
  • Leadership Challenges: Explore leadership challenges in the ever-evolving tech ecosystem and uncover solutions.

And there's more! We're excited to introduce peer-to-peer networking sessions, a first-of-its-kind opportunity in Chicago. Forge valuable connections, share experiences, and build a network of like-minded professionals. Your journey towards tech leadership excellence starts here.

2024 Attendees

2024 Speakers

2024 Agenda

Join us for coffee and pastries to prepare for the day of learning and networking

Speakers: 
Sandeep Pulavarty. CIO - Paper Transport Sanchita Sarkar, Global Vice President, Corporate Enterprise Systems at Marriott International Glendon Schmitz CISO , Virginia Department of Behavioral Health and Developmental Services Prashant, Head of AI - All State

Artificial intelligence (AI) is rapidly transforming businesses across all industries. In order to stay ahead of the competition, CxOs across the board need to be leading the AI transformation within their organizations.

This session will explore the key role that you play in leading AI transformation, and will provide insights on how to successfully implement AI initiatives.

  • Setting the AI strategy for the organization and ensuring that it is aligned with the business goals.
  • Building a strong team of AI experts and ensure that they have the resources they need to succeed, how be a champion for AI within the organization and work to overcome any resistance to change
  • Skills and qualities that CxO's need to be successful in leading AI transformation

Speaker

  • Mike Leuzinger , AVP & Chief Architect, Information Risk Management - Nationwide

What does trust look like in our rapidly digitizing world, where social media, generative AI, and digital deception are omnipresent? 'Beyond Assumptions: Zero Trust in 2024' offers an insightful look at the intersection of human behavior and technological advancement.

Join us for an exploration of the core principles of the Zero Trust mindset and how they apply to a disruptive world that is full of assumptions.

Speakers

  • Todd Covert, CISO - Allstate

In today's interconnected business ecosystem, organizations increasingly rely on third-party vendors and partners to deliver essential services and products. This dependence, while beneficial for business growth and operational efficiency, introduces a myriad of risks that can threaten data security, compliance, and overall business continuity. "This session delves into the complexities of third-party risk management (TPRM), providing readers with a comprehensive guide to identifying, assessing, and mitigating risks associated with external entities.

Speaker

  • Glendon Schmitz CISO , Virginia Department of Behavioral Health and Developmental Services

How are you leading technology teams effectively in today’s dynamic business landscape? The focus of this enlightening discussion is on three core pillars: C-level Engagement, Business Objectives, and Collaboration and Motivation.Starting through C-level Engagement, exploring the vital role of top executives in setting a tone of cooperation and forward-thinking. Once you have the strategy in place, focusing on the Business Objectives, aligning team efforts with the overarching goals of the organization, ensuring that every member understands and contributes towards these targets. Lastly, Collaboration and Motivation, tackling the challenges of fostering a productive and innovative environment where team members are encouraged to collaborate and stay motivated.

Join Glendon Schmitz,CISO at Virginia Department of Behavioral Health and Developmental Services and Board Chairman for Tech for Troops, to unpack this comprehensive discussion, tailored specifically for CIOs and CISOs, and aiming to equip them with the insights and strategies needed to lead their tech teams to new heights of success and innovation. resilient against the evolving cyber landscape.

Speaker:

Sean Costigan Managing Director of Resilience Strategy - Red Sift

In this presentation we unpack critical lessons in cybersecurity resilience, drawing on recent experiences from Ukraine's formidable defense against cyber threats and practical experiences on scorecards and more from our global customers.

This fireside chat will cover:
- Proactive cybersecurity measures, underscoring the vital need to intimately know your digital assets to shield your organization's crown jewels effectively.
- Proven strategies for identifying, prioritizing, and securing critical assets, inspired by examples of real-world resilience and detailed strategies for risk reduction.
- Navigating through the processes of detecting problems and rebounding from incidents, transforming challenges into resilience-building milestones.

By embedding a culture deeply rooted in proactive defense and recovery, this session aims to arm you with the insights and tools necessary to preempt threats, respond with agility, and become resilient against the evolving cyber landscape.

Speaker: Aidan Walden, Global Director, Cloud Devops Engineering & Architecture at Fortinet

Artificial Intelligence and machine learning have been integrated discretely into individual components across the security practice. The challenge of bringing tools into a framework that improves SOC efficiency and provides human scale remains elusive. Complications center on bringing multi-provider and multi-vendor ecosystems into harmony across security workflows, recruiting multiple organizational roles as security contributors, and managing the practice with scarce resources in people and skills. Artificial intelligence and machine learning provide a path to solve for these challenges, drives down risk, and allow security practitioners to focus on evolved threat hunting activities.

Speakers

  • Keisha McClellan, VP, Global Crisis & Issues Weber at Shandwick
  • Brett SanPietro VP, Global Crisis & Issues at Weber Shandwick

Cyber intrusions can become very public, very fast. While CXO teams focus their resources on internal efforts, there is often an external crisis that not only demands attention – it has the potential to further complicate or exacerbate the effects of the attack. 

 

We will discuss how leaders can work across CXO and Communication roles to manage risk before, during, and after an attack. From building resilience as a soft skill within your organization to unlocking the value of social and traditional media data leveraging A.I. analysis and human insights for protecting your brand.

Speaker

  • Rachel Bush, BISO - Nationwide

Companies of all sizes are more likely than ever to experience a material cybersecurity attack. This topic will explore best practices in incident response readiness, preparing you and your team to respond confidently in order minimize containment time and maximize your partnership with business leaders and key stakeholders.

Speaker

  • Jeff Kruger, Vice President - IT Recruitment at Gallagher

In the dynamic realm of technology, executives face the crucial challenge of acquiring and retaining top technical talent. We will discuss best practices to empower leaders in effectively navigating the complexities of talent acquisition while staying up to date on the ever-evolving market and trends. 

Key Points: 

  • Proactive Recruitment Strategies: Utilize diversified channels like specialized job boards, networking opportunities, and educational partnerships to proactively engage top-tier technical talent. 

  • Alignment with Organizational Goals: Calibrate talent acquisition strategies with organizational objectives, ensuring a workforce prepared for current and future challenges. 

  • Cultivating an Inclusive Workplace Culture: Create an environment conducive to innovation and collaboration, advocate for diversity, and encourage continuous development to recruit and retain a best-in-class team. 

By mastering technical talent acquisition, CIOs can strategically position their organizations for sustained success in the digital age, drive innovation and deliver exceptional value to stakeholders. 

Speaker

IT Executive: Senior Advisor to ACIO - Internal Revenue Service

As organizations prioritize digitization, the focus on cloud security is rapidly growing. Unfortunately, many organizations still consider data and application security as an afterthought, creating a void that bad actors can easily exploit. Generative AI can be a powerful tool for organizations to proactively identify new threats and take corrective actions. As the frequency and severity of cybersecurity threats continue to rise, the likelihood of attacks also becomes increasingly high.

This session provides some good insights and thought-provoking ideas on how to leverage Gen AI technology and enhance the digital cybersecurity posture. However, generative AI requires significant training and cultural change to ensure confidential data is not compromised. Additionally, the security data model training infrastructure requires a significant investment and strong business support. We will also discuss the challenges in this adoption.

Join us as we serve up a tempting selection of beverages and canapés tofinish the day.

But that's not all – by sharing your valuable feedback throughout the day, you not only help us improve but also stand a chance to win big in our exciting prize draw.

This is your opportunity to unwind, mingle, and celebrate both new friendships and the potential for fabulous prizes. Let's make memories and connections that last a lifetime!

2024 Featured Partners

Red Sift
Informatica
Rectangle 3-1

Apply for your 2024 VIP Ticket

Apply here to join our exclusive event.

Get in Touch

    Would you like to receive exciting news and information from GBI Digital?


    Scroll to Top