IN-PERSON

Seattle CIO Executive Summit

December 5, 2024 | Grand Hyatt Seattle

December 5, 2024
Grand Hyatt Seattle

APPLY TO PARTICIPATE

Collaborate with your peers

Get together with Seattle's top CIOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CIOs today:

Making data-driven decisions to improve business outcomes and allow for innovation

Ensuring resiliency and mitigating risk is top of mind within cybersecurity strategies

Strengthening influence and partnerships across the organization to enhance operational efficiency

Seattle CIO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CIOs, for CIOs.

Governing Body Co-Chairs

Brian Abrahamson

Pacific Northwest National Laboratory
Chief Digital Officer & Associate Laboratory Director

Charu Jain

Alaska Airlines
Senior Vice President Merchandising & Innovation

Laurent Rotival

Cambia Health Solutions
EVP & CIO

What to Expect

Interactive Sessions

Hear from CIO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Seattle CIO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


December 5, 2024

7:45am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

PepsiCo's Secure Innovation Strategy — Empowering Talent and Driving Growth

Andrew Kirkland headshot

Andrew Kirkland

Global CISO, SVP Information Security

PepsiCo

In a rapidly evolving digital landscape, integrating security at the earliest stages of innovation is no longer optional — it's essential. Andy Kirkland, Global CISO at PepsiCo, will discuss how his team transforms security from a late-stage checkbox into a core component of the business process. By empowering team members to act as brokers of innovation, PepsiCo not only ensures seamless collaboration between security and business units but also fosters a culture of continuous improvement and professional growth.

In this keynote, you’ll hear:

  • How to embed security into the business case from the start
  • Strategies for leveraging and upskilling existing talent to champion security
  • The benefits of early security engagement in innovation processes

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Modern Workforce, Modern Security Strategy

Nasko Oskov headshot

Nasko Oskov

Software Engineer/Manager, Chrome Security

Google

In the age of remote and hybrid work, employees now spend the majority of their time in the browser or in virtual meetings. The workforce is more mobile and distributed than ever before. At the same time, we are seeing an increase in cyber attacks and a higher average cost of data breaches. We must think more about protecting users right where they interface with web threats, the browser, without disrupting productivity.

Join this conversation with your peers to discuss:

  • The browser's role in a business's security strategy
  • Zero trust architecture
  • Managing resources for cybersecurity in a time of economic uncertainty

9:40am - 10:25am  Executive Boardroom

Governing Generative AI in your Organization

Mandy Andress headshot

Mandy Andress

CISO

Elastic

Carlos Melvin headshot

Carlos Melvin

Global Data Privacy Officer

Starbucks

Brian Talbert headshot

Brian Talbert

Managing Director, CISO

Alaska Airlines

Generative AI is being utilized by companies and employees alike–sometimes without permission. The normalization of this emerging technology has expanded the attack surface and left many security leaders feeling anxious and uncertain. Is generative AI worth the risk, and how should it be governed in an organization?

Join this interactive roundtable to explore:

  • What to expect from the threat landscape as generative AI becomes increasingly normalized
  • What adopting generative AI does to your attack surface, and if you should even allow it
  • How to implement governance rules that your organization will follow

9:40am - 10:25am  Executive Boardroom

Applications Overload ― Strategies to Simplify, Optimize, and Mitigate

Jennifer Fitzgerald headshot

Jennifer Fitzgerald

Director, Product Management, IT Automation

IBM

Viggo Forde headshot

Viggo Forde

CIO and Director of IT

Snohomish County

Laurent Rotival headshot

Laurent Rotival

EVP & CIO

Cambia Health Solutions

Business today runs on an ever-growing landscape of enterprise technology across multiple cloud environments. The average enterprise uses 1,000 applications, multiple clouds, and thousands of physical assets. As generative AI improves developer productivity by almost 40%, an explosion of new applications will be created with AI embedded in the next few years. All this complexity creates operational inefficiency and exposure to vulnerabilities.

Join this session to learn about:

  • Creating visibility across disparate systems to resolve the right issues at the right time
  • Simplifying ecosystems to improve efficiencies and optimize costs
  • Mitigate security vulnerabilities in your applications

10:25am - 11:05am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:05am - 11:50am  Breakout Session

Navigating and Responding to the Evolving Threat Landscape — Phishing, Exploits and Credential Theft

Andy Wen headshot

Andy Wen

Sr. Director Product Management Workspace

Google Cloud

The threat landscape is rapidly evolving from state-sponsored adversaries to commercially-driven ransomware groups. With emerging trends in phishing, exploits and credential theft posing significant risks, organizations must stay vigilant to protect their data, especially if legacy technology is still being utilized.

Join this session to learn more about:

  • The attacks patterns that adversaries typically leverage
  • How decades-long architecture flaws make it hard to effectively defend
  • Why it's important to adopt platforms with security in mind

11:05am - 11:50am  Breakout Session

Navigating AI Implementation for Strategic Business Outcomes

David Stafford headshot

David Stafford

VP, Customer Experience & Success

Dropbox

As CIOs increasingly invest in AI, understanding how to leverage the technology for business growth while also mitigating risk is top of mind. In this interactive session we’ll explore key strategies and lessons learned from Dropbox’s own journey in building enterprise AI capabilities, offering insights for CIOs on how to adopt AI effectively.

Join your peers to discuss:

  • Identifying useful applications for AI that align with organizational needs
  • AI adoption strategies that balance immediate and long-term goals
  • Proactive measures to ensure effective data access governance and protect sensitive information

11:50am - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

Transforming IT with Zero Trust and AI

Jay Chaudhry headshot

Jay Chaudhry

CEO, Chairman & Founder

Zscaler

Zero trust transformation is not a straightforward, linear process. Modern CXOs must navigate a complex balance between technological advancement and the need to simplify and secure IT environments. The explosion of AI and recent technological disruptions served as a wake-up call to many organizations to scrutinize progress towards zero trust principles – for users, devices, and workloads. How can CXOs take advantage of this momentum to accelerate their zero trust and AI-enabled transformation?

Join this session to learn:

  • How a zero trust approach to IT can help secure organizations’ resources reliably and cost-effectively
  • How to foster a cultural shift within the organization, ensuring employees and leadership understand and embrace zero trust principles
  • How to manage the complexities of AI integration to create robust security frameworks

1:10pm - 1:35pm  Break

1:35pm - 2:20pm  Breakout Session

Preparing for the Future — Cybersecurity Update with DHS Chief and FBI Cyber Task Force

Christopher Callahan headshot

Christopher Callahan

Chief of Cybersecurity

Department of Homeland Security

Jon Chinn headshot

Jon Chinn

Special Agent

Federal Bureau of Investigation

Today's varied threat landscape features both foreign and domestic security concerns that could stop or delay business operations. With so many avenues for malicious actors, how should CIOs and CISOs prioritize their resources to improve resiliency? Local U.S. Department of Homeland Security Chief of Cybersecurity and a Seattle FBI Cyber Task Force Special Agent will share ways to collectively develop and bolster defenses.

In this session, you’ll learn:

  • Insights into the latest cyber threats and emerging trends
  • Effective strategies for addressing the evolving threat landscape and bolstering defenses
  • Best practices for collaboration between public and private entities

1:35pm - 2:20pm  Executive Boardroom

The Silent Spread of AI — And Why You’re Losing Control Over It

Young-Sae Song headshot

Young-Sae Song

CMO

Grip Security

Arun Singh headshot

Arun Singh

Head of Marketing

Abnormal Security

Aradhna Chetal headshot

Aradhna Chetal

Managing Director Executive Cloud Services and DevSecOps

TIAA

Dawn Mendenhall headshot

Dawn Mendenhall

Divisional CIO

Portland General Electric

AI risk is quietly creeping into every corner of your enterprise, and you don’t even realize it. As more employees adopt AI-powered tools, applications, and processes, it is becoming deeply embedded in your tech stack — but it’s not just your employees using AI. Attackers are also leveraging AI to enhance their own tactics and sharpen their attacks. The real question for CISOs is: Do you have visibility into the countless ways AI is spreading, and what’s the best way to use AI to protect against AI?

Join this session to discuss:

  • The hidden ways AI is entering your enterprise—from third-party tools to shadow AI projects—and why it’s slipping under the radar
  • How attackers are using AI to improve their attacks and making them harder to detect by both legacy security tools and humans themselves
  • Actionable steps for CISOs to gain visibility and control over AI use across the organization

1:35pm - 2:20pm  Executive Boardroom

How to Assess Security Maturity and Why It Matters Across the C-Suite

Andrew Larkin headshot

Andrew Larkin

Principal Engagement Manager

Expel

Steve Person headshot

Steve Person

Chief Information Security Officer

Cambia Health Solutions

Alexander Marquardt headshot

Alexander Marquardt

Global Head of Identity & Access Management

SAS

Maturing your security posture requires knowing how to objectively assess your organization, use industry best practices and frameworks, and select the right tools to advance your business. This complex, time-intensive process often takes a backseat to defending yourself against ever-evolving threats. Getting started can be overwhelming, so finding time to assess and improve your security maturity is a tall task.

Join this session to discuss:

  • Benchmarking SOC performance using common assessment frameworks and tools
  • Determining your security maturity level, and how to fill gaps you’ve identified
  • Analyzing the impact of data and AI on your security posture

2:20pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

Where You Stand — The Evolving Role of the Technology & Security Leader

Chuck Markarian headshot

Chuck Markarian

CISO

PACCAR

Megan Clarke headshot

Megan Clarke

CIO

King County, WA

Sean Murphy headshot

Sean Murphy

SVP, CISO

Boeing Employees Credit Union

Increased digitization over the past 50 years has transformed CIOs and CISOs from technical leaders to global business executives who leverage technology to achieve enterprise value. As today’s leaders promote the establishment of optimal technology responsibilities and accountabilities, they must also evolve their own roles to deal with evolving obligations and opportunities.

Join this peer chat to explore:

  • What business outcomes you’re trying to drive
  • How you are strategically approaching those drivers
  • Ways to elevate your role for influence across the C-suite and beyond

3:00pm - 3:45pm  Executive Boardroom

Strengthening Business Continuity through Rapid IT Recovery

Markie Duby headshot

Markie Duby

Director, Solutions Engineering, Western Region

Dynatrace

Lutz Beck headshot

Lutz Beck

CIO

Daimler Truck North America


Recovering quickly from system disruptions is crucial for business resilience and the bottom line. Recent incidents have further highlighted the need for robust recovery strategies. CIOs can leverage best practices, advanced technologies and communication across the organization to maintain stability during crises. Join this session to discuss:

  • Implementing capabilities for immediate situational awareness
  • Building resilient IT infrastructure to withstand future challenges
  • Safeguarding operations through application reliability and early issue detection


3:00pm - 3:45pm  Executive Boardroom

Upskilling for an AI-Integrated World

Eric Sanchez headshot

Eric Sanchez

CISO

Orrick, Herrington & Sutcliffe

According to Gartner, by 2026, AI will augment 50% of office workers in global enterprises. When IT talent demand outweighs supply, CIOs must face skills gaps head on and create a future-proof talent strategy.

Join this session to discuss:

  • Preparing your workforce for AI Implementation
  • Identifying employee skills to build upon
  • Prioritizing talent planning for long term success

3:45pm - 4:10pm  Break

4:10pm - 5:00pm  Keynote

Authentic Leadership in Times of Change

Mike Robbins headshot

Mike Robbins

Author & Thought Leader

Guest Speaker

Change is inevitable. The one constant in the midst of all the change, stress, and uncertainty we face at work and in life is us. Leaders with a strong sense of emotional intelligence (EQ), a willingness to be courageous and vulnerable, and the capacity to inspire others in a genuine way, have a distinct advantage in keeping their teams engaged and motivated in any circumstances.

In this keynote, author and thought leader Mike Robbins will share practical tips for:

  • Learning to be transparent in a way that’s both liberating and inspiring
  • Connecting at a deeper level with your teams and building real trust
  • Dealing effectively with change and uncertainty — and thriving in the process

4:45pm - 5:00pm  Closing Comments and Prize Drawing

5:00pm - 6:30pm  Governing Body Reception

Governing Body Reception

Governing Body members host this reception for executives to close out the event with an evening of peer networking, food and drinks.

7:45am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

PepsiCo's Secure Innovation Strategy — Empowering Talent and Driving Growth

Andrew Kirkland headshot

Andrew Kirkland

Global CISO, SVP Information Security

PepsiCo

In a rapidly evolving digital landscape, integrating security at the earliest stages of innovation is no longer optional — it's essential. Andy Kirkland, Global CISO at PepsiCo, will discuss how his team transforms security from a late-stage checkbox into a core component of the business process. By empowering team members to act as brokers of innovation, PepsiCo not only ensures seamless collaboration between security and business units but also fosters a culture of continuous improvement and professional growth.

In this keynote, you’ll hear:

  • How to embed security into the business case from the start
  • Strategies for leveraging and upskilling existing talent to champion security
  • The benefits of early security engagement in innovation processes

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Modern Workforce, Modern Security Strategy

Nasko Oskov headshot

Nasko Oskov

Software Engineer/Manager, Chrome Security

Google

In the age of remote and hybrid work, employees now spend the majority of their time in the browser or in virtual meetings. The workforce is more mobile and distributed than ever before. At the same time, we are seeing an increase in cyber attacks and a higher average cost of data breaches. We must think more about protecting users right where they interface with web threats, the browser, without disrupting productivity.

Join this conversation with your peers to discuss:

  • The browser's role in a business's security strategy
  • Zero trust architecture
  • Managing resources for cybersecurity in a time of economic uncertainty

9:40am - 10:25am  Executive Boardroom

Governing Generative AI in your Organization

Mandy Andress headshot

Mandy Andress

CISO

Elastic

Carlos Melvin headshot

Carlos Melvin

Global Data Privacy Officer

Starbucks

Brian Talbert headshot

Brian Talbert

Managing Director, CISO

Alaska Airlines

Generative AI is being utilized by companies and employees alike–sometimes without permission. The normalization of this emerging technology has expanded the attack surface and left many security leaders feeling anxious and uncertain. Is generative AI worth the risk, and how should it be governed in an organization?

Join this interactive roundtable to explore:

  • What to expect from the threat landscape as generative AI becomes increasingly normalized
  • What adopting generative AI does to your attack surface, and if you should even allow it
  • How to implement governance rules that your organization will follow

9:40am - 10:25am  Executive Boardroom

Applications Overload ― Strategies to Simplify, Optimize, and Mitigate

Jennifer Fitzgerald headshot

Jennifer Fitzgerald

Director, Product Management, IT Automation

IBM

Viggo Forde headshot

Viggo Forde

CIO and Director of IT

Snohomish County

Laurent Rotival headshot

Laurent Rotival

EVP & CIO

Cambia Health Solutions

Business today runs on an ever-growing landscape of enterprise technology across multiple cloud environments. The average enterprise uses 1,000 applications, multiple clouds, and thousands of physical assets. As generative AI improves developer productivity by almost 40%, an explosion of new applications will be created with AI embedded in the next few years. All this complexity creates operational inefficiency and exposure to vulnerabilities.

Join this session to learn about:

  • Creating visibility across disparate systems to resolve the right issues at the right time
  • Simplifying ecosystems to improve efficiencies and optimize costs
  • Mitigate security vulnerabilities in your applications

10:25am - 11:05am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:05am - 11:50am  Breakout Session

Navigating and Responding to the Evolving Threat Landscape — Phishing, Exploits and Credential Theft

Andy Wen headshot

Andy Wen

Sr. Director Product Management Workspace

Google Cloud

The threat landscape is rapidly evolving from state-sponsored adversaries to commercially-driven ransomware groups. With emerging trends in phishing, exploits and credential theft posing significant risks, organizations must stay vigilant to protect their data, especially if legacy technology is still being utilized.

Join this session to learn more about:

  • The attacks patterns that adversaries typically leverage
  • How decades-long architecture flaws make it hard to effectively defend
  • Why it's important to adopt platforms with security in mind

11:05am - 11:50am  Breakout Session

Navigating AI Implementation for Strategic Business Outcomes

David Stafford headshot

David Stafford

VP, Customer Experience & Success

Dropbox

As CIOs increasingly invest in AI, understanding how to leverage the technology for business growth while also mitigating risk is top of mind. In this interactive session we’ll explore key strategies and lessons learned from Dropbox’s own journey in building enterprise AI capabilities, offering insights for CIOs on how to adopt AI effectively.

Join your peers to discuss:

  • Identifying useful applications for AI that align with organizational needs
  • AI adoption strategies that balance immediate and long-term goals
  • Proactive measures to ensure effective data access governance and protect sensitive information

11:50am - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

Transforming IT with Zero Trust and AI

Jay Chaudhry headshot

Jay Chaudhry

CEO, Chairman & Founder

Zscaler

Zero trust transformation is not a straightforward, linear process. Modern CXOs must navigate a complex balance between technological advancement and the need to simplify and secure IT environments. The explosion of AI and recent technological disruptions served as a wake-up call to many organizations to scrutinize progress towards zero trust principles – for users, devices, and workloads. How can CXOs take advantage of this momentum to accelerate their zero trust and AI-enabled transformation?

Join this session to learn:

  • How a zero trust approach to IT can help secure organizations’ resources reliably and cost-effectively
  • How to foster a cultural shift within the organization, ensuring employees and leadership understand and embrace zero trust principles
  • How to manage the complexities of AI integration to create robust security frameworks

1:10pm - 1:35pm  Break

1:35pm - 2:20pm  Breakout Session

Preparing for the Future — Cybersecurity Update with DHS Chief and FBI Cyber Task Force

Christopher Callahan headshot

Christopher Callahan

Chief of Cybersecurity

Department of Homeland Security

Jon Chinn headshot

Jon Chinn

Special Agent

Federal Bureau of Investigation

Today's varied threat landscape features both foreign and domestic security concerns that could stop or delay business operations. With so many avenues for malicious actors, how should CIOs and CISOs prioritize their resources to improve resiliency? Local U.S. Department of Homeland Security Chief of Cybersecurity and a Seattle FBI Cyber Task Force Special Agent will share ways to collectively develop and bolster defenses.

In this session, you’ll learn:

  • Insights into the latest cyber threats and emerging trends
  • Effective strategies for addressing the evolving threat landscape and bolstering defenses
  • Best practices for collaboration between public and private entities

1:35pm - 2:20pm  Executive Boardroom

The Silent Spread of AI — And Why You’re Losing Control Over It

Young-Sae Song headshot

Young-Sae Song

CMO

Grip Security

Arun Singh headshot

Arun Singh

Head of Marketing

Abnormal Security

Aradhna Chetal headshot

Aradhna Chetal

Managing Director Executive Cloud Services and DevSecOps

TIAA

Dawn Mendenhall headshot

Dawn Mendenhall

Divisional CIO

Portland General Electric

AI risk is quietly creeping into every corner of your enterprise, and you don’t even realize it. As more employees adopt AI-powered tools, applications, and processes, it is becoming deeply embedded in your tech stack — but it’s not just your employees using AI. Attackers are also leveraging AI to enhance their own tactics and sharpen their attacks. The real question for CISOs is: Do you have visibility into the countless ways AI is spreading, and what’s the best way to use AI to protect against AI?

Join this session to discuss:

  • The hidden ways AI is entering your enterprise—from third-party tools to shadow AI projects—and why it’s slipping under the radar
  • How attackers are using AI to improve their attacks and making them harder to detect by both legacy security tools and humans themselves
  • Actionable steps for CISOs to gain visibility and control over AI use across the organization

1:35pm - 2:20pm  Executive Boardroom

How to Assess Security Maturity and Why It Matters Across the C-Suite

Andrew Larkin headshot

Andrew Larkin

Principal Engagement Manager

Expel

Steve Person headshot

Steve Person

Chief Information Security Officer

Cambia Health Solutions

Alexander Marquardt headshot

Alexander Marquardt

Global Head of Identity & Access Management

SAS

Maturing your security posture requires knowing how to objectively assess your organization, use industry best practices and frameworks, and select the right tools to advance your business. This complex, time-intensive process often takes a backseat to defending yourself against ever-evolving threats. Getting started can be overwhelming, so finding time to assess and improve your security maturity is a tall task.

Join this session to discuss:

  • Benchmarking SOC performance using common assessment frameworks and tools
  • Determining your security maturity level, and how to fill gaps you’ve identified
  • Analyzing the impact of data and AI on your security posture

2:20pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

Where You Stand — The Evolving Role of the Technology & Security Leader

Chuck Markarian headshot

Chuck Markarian

CISO

PACCAR

Megan Clarke headshot

Megan Clarke

CIO

King County, WA

Sean Murphy headshot

Sean Murphy

SVP, CISO

Boeing Employees Credit Union

Increased digitization over the past 50 years has transformed CIOs and CISOs from technical leaders to global business executives who leverage technology to achieve enterprise value. As today’s leaders promote the establishment of optimal technology responsibilities and accountabilities, they must also evolve their own roles to deal with evolving obligations and opportunities.

Join this peer chat to explore:

  • What business outcomes you’re trying to drive
  • How you are strategically approaching those drivers
  • Ways to elevate your role for influence across the C-suite and beyond

3:00pm - 3:45pm  Executive Boardroom

Strengthening Business Continuity through Rapid IT Recovery

Markie Duby headshot

Markie Duby

Director, Solutions Engineering, Western Region

Dynatrace

Lutz Beck headshot

Lutz Beck

CIO

Daimler Truck North America


Recovering quickly from system disruptions is crucial for business resilience and the bottom line. Recent incidents have further highlighted the need for robust recovery strategies. CIOs can leverage best practices, advanced technologies and communication across the organization to maintain stability during crises. Join this session to discuss:

  • Implementing capabilities for immediate situational awareness
  • Building resilient IT infrastructure to withstand future challenges
  • Safeguarding operations through application reliability and early issue detection


3:00pm - 3:45pm  Executive Boardroom

Upskilling for an AI-Integrated World

Eric Sanchez headshot

Eric Sanchez

CISO

Orrick, Herrington & Sutcliffe

According to Gartner, by 2026, AI will augment 50% of office workers in global enterprises. When IT talent demand outweighs supply, CIOs must face skills gaps head on and create a future-proof talent strategy.

Join this session to discuss:

  • Preparing your workforce for AI Implementation
  • Identifying employee skills to build upon
  • Prioritizing talent planning for long term success

3:45pm - 4:10pm  Break

4:10pm - 5:00pm  Keynote

Authentic Leadership in Times of Change

Mike Robbins headshot

Mike Robbins

Author & Thought Leader

Guest Speaker

Change is inevitable. The one constant in the midst of all the change, stress, and uncertainty we face at work and in life is us. Leaders with a strong sense of emotional intelligence (EQ), a willingness to be courageous and vulnerable, and the capacity to inspire others in a genuine way, have a distinct advantage in keeping their teams engaged and motivated in any circumstances.

In this keynote, author and thought leader Mike Robbins will share practical tips for:

  • Learning to be transparent in a way that’s both liberating and inspiring
  • Connecting at a deeper level with your teams and building real trust
  • Dealing effectively with change and uncertainty — and thriving in the process

4:45pm - 5:00pm  Closing Comments and Prize Drawing

5:00pm - 6:30pm  Governing Body Reception

Governing Body Reception

Governing Body members host this reception for executives to close out the event with an evening of peer networking, food and drinks.

December 5, 2024

We look forward to seeing you at an upcoming in-person gathering


Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

Grand Hyatt Seattle
MORE INFORMATION

A block of rooms has been reserved at the Grand Hyatt Seattle at a reduced conference rate. Reservations should be made online or by calling 402-935-5352. Please mention Evanta CIO and CISO Executive Summit to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $189 USD (plus tax) is November 12, 2024.

Your Community Partners


Global Thought Leaders
CIO Thought Leader
Key Partners
Program Partners

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Monica Mickelson

Senior Community Program Manager

+17577054864

monica.podolsky@evanta.com