In-Person

Chicago CISO Community

Executive Summit

May 13, 2026 | Convene at 233 South Wacker Drive (Willis Tower)

May 13, 2026
Convene at 233 South Wacker Drive (Willis Tower)

Collaborate with your peers

Get together with Chicago's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Strengthening cybersecurity's position as a creator and driver of business value

Streamlining access management and controls across both traditional and non-human identities

Reframing risk reduction as minimizing business impact and improving resilience

Chicago CISO Governing Body

The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Chicago CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda

May 13, 2026

8:00am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

Human Leadership—A New Mandate for CISOs as People Leaders

Jérôme Mackowiak headshot

Jérôme Mackowiak

Director, Business & Technology Insights, Human Resources Practice

Gartner

Today’s CISOs are not just guardians of technology and enterprise risk—they are people leaders at the heart of organizational resilience. But the unique pressures, expectations, and backgrounds associated with the CISO role often make it challenging to embrace a human leadership approach compared to other enterprise leaders.

Drawing on Gartner’s latest research and insights, this session is a call to embrace the new mandate of CISO leadership: securing the future through empowered, resilient teams.

Join this session for guidance and insights on:

  • Understanding why people leadership is now just as critical for security success as any technology solution
  • Expanding a technical problem-solving mindset to also prioritize authenticity and empathy
  • Balancing the high-stakes nature of enterprise cybersecurity with necessary people-centric initiatives

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Leading the Shift — Brunswick’s Journey to Passwordless Identity Management

Julie Myerholtz headshot

Julie Myerholtz

VP & CISO

Brunswick

Anurag Parikh headshot

Anurag Parikh

Head of Cyber Resilience

Brunswick

CISOs have known for years that the days of passwords as the cornerstone of identity and access management were numbered. Now—amid a surge in credential-based attacks, rising demands for seamless user experiences, and the looming threat of quantum computing—shifting away from password reliance has become not just a future aspiration, but an urgent strategic imperative. 

Julie Myerholtz, VP & CISO, and Anurag Parikh, Head of Cyber Resilience, saw this writing on the wall early and have spent the last two years leading Brunswick through a transformative identity journey: from virtually no MFA to being well on the way toward a fully passwordless domain. Join this session for a candid conversation as they reflect on the challenges, milestones, and lessons learned along their path to passwordless, including:

  • Why passwordless authentication is not just a milestone, but the future of identity
  • How to build a compelling business case and secure executive buy-in
  • Strategies for navigating user adoption and integrating with legacy systems

9:40am - 10:25am  Breakout Session

Decoding Tomorrow’s Threats — Trends & Insights Unveiled

Ben Cook headshot

Ben Cook

Global Security Architect

Google Cloud Security

CISOs today are pulled in multiple directions, facing a relentless onslaught of evolving threats while balancing competing priorities and limited resources. As adversaries leverage new technologies—especially AI—organizations must rethink how they utilize threat intelligence and set security priorities. Yet, with historical knowledge and ongoing engagement in adversary tracking, there is hope: we can anticipate and outmaneuver tomorrow’s threats.

Join this session to explore:

  • Key findings and use cases from 2025
  • Predictions for 2026’s threat landscape and adversary tactics
  • Actionable strategies for prioritizing and mitigating emerging threats

9:40am - 10:25am  Executive Boardroom

High-Profile, High Risk — Securing the C-Suite

Executives and their families are now prime targets for converging physical and cyber threats, expanding risk far beyond the corporate perimeter. CISOs must address overlapping vulnerabilities and bridge security silos to protect both personal and professional spheres.

Join this boardroom to discuss:

  • Conducting holistic threat assessments for executive risk
  • Bridging IT and physical security teams for unified protection
  • Implementing comprehensive strategies for safeguarding leaders

9:40am - 10:25am  Executive Boardroom

Securing the Rise of AI Identities

Bruce Coffing headshot

Bruce Coffing

CISO

City of Chicago

According to the International Data Corporation, the number of AI identities is expected to reach 1.3 billion in just two years. Yet many organizations don’t secure AI identities effectively, granting excessive access and relying on outdated, slow processes.

Join this session to learn how to:

  • Identify gaps in agent access visibility, ownership, and governance
  • Address the unique challenges of identity security in AI environments
  • Build scalable identity foundations to enable innovation and efficiency

10:25am - 11:10am  Networking Break

10:35am - 11:00am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:10am - 11:55am  Breakout Session

Rethinking Security for Agentic AI — From Control to Orchestration

Bob West headshot

Bob West

Data & AI Security Officer

Cyera

As AI agents start acting across business environments, data becomes the true control surface. These agents require broad access to data, identities, and business processes, creating new risk patterns as sensitive data and outbound actions converge at machine speed. This is a control shift. CISOs must modernize their data approach to adopt agentic AI confidently while maintaining oversight.

Join this session to explore how to:

  • Detect emerging risk behaviors in autonomous AI
  • Build a data-centric and intent-aware security model
  • Establish the CISO as the orchestrator of scalable AI and business growth enabler

11:10am - 11:55am  Breakout Session

Identity-Aware Resilience for Business Continuity

Session details coming soon.

11:10am - 11:55am  Executive Boardroom

Empowering Innovation While Strengthening Security and Control

Matt Pour headshot

Matt Pour

VP, Solutions Engineering

Island

Kirk Patten headshot

Kirk Patten

CISO & VP Infrastructure

Madison Air

 As browser-based and unapproved applications reshape the future of work, CISOs face growing security and compliance risks, including data leakage and policy gaps. Proactively addressing these threats with effective safeguards protects enterprise data, supports innovation, and ensures resilience in an evolving workplace.

Join this session to discuss:

  • Risks from unmanaged and shadow tools
  • Policies to safeguard sensitive data
  • Maintaining compliance and robust security controls

11:10am - 11:55am  Executive Boardroom

Securing the AI-First Enterprise—SaaS Security for Agentic AI

The modern SaaS supply chain is a double-edged sword—both a catalyst for AI and a labyrinth of hidden vulnerabilities. And as enterprise ecosystems become an increasingly complex web of interconnected tools, CISOs are rethinking their SaaS supply chains to prioritize not just capability, but confidence—the confidence to give an AI agent access to sensitive systems and critical workflows, and know that there are guardrails, visibility, and intelligence wrapped around every action it takes.

Join this boardroom to discuss:

  • How CISOs can confidently champion agentic AI for SaaS security
  • Strategies for achieving deep visibility into SaaS-to-SaaS connections, user activity, and third-party integrations for effective AI management
  • Cross-industry best practices in AI security from CISO peers

11:55am - 12:30pm  Lunch Service

12:30pm - 1:05pm  Keynote

Zero Trust & AI — Move from Reactive Response to Continuous AI Assurance

Jay Chaudhry headshot

Jay Chaudhry

CEO, Chairman & Founder

Zscaler

AI adoption is advancing faster than traditional security and governance models can absorb. Unmanaged AI usage, opaque model behavior, and emerging attack techniques—such as prompt injection and jailbreaks—can rapidly translate into data exposure, compliance concerns, and board-level scrutiny. IT and Security leaders need an approach that enables AI while reducing operational volatility and producing governance that is defensible to risk stakeholders. A Zero Trust foundation across internet access, AI applications, SaaS, and private applications supports automated AI Red Teaming and secure access plus runtime guardrails to enforce policy in production.

Join this session to discuss:

  • Implementing continuous AI Red Teaming to identify vulnerabilities and misuse paths across build, deploy, and runtime
  • Operationalizing findings through policy-driven guardrails that help prevent data leakage, prompt injection, and unsafe content outcomes
  • Delivering board-consumable governance with clear visibility into AI usage, risk posture, and remediation progress

1:05pm - 1:30pm  Break

1:30pm - 2:15pm  Breakout Session

CISO Leadership in M&A—Balancing Speed, Security & Culture

David Fagan headshot

David Fagan

Director of Cybersecurity (CISO)

Ferrara

Matthew Zielinski headshot

Matthew Zielinski

CISO

Corient

JJ Markee headshot

JJ Markee

Global CISO

Danaher

In today’s high-stakes M&A environment, cybersecurity is more than a technical checkpoint—it’s a critical driver of deal success and enterprise value. As boards increasingly recognize the impact of cyber risk on M&A outcomes, the role of the CISO is evolving from operational guardian to strategic business partner. And when acquisitions cross international borders, the challenges of securing these transactions scale dramatically—introducing new complexities that CISOs must address alongside standard risks.

In this panel discussion, CISOs who have recently navigated both domestic and international M&A will share firsthand accounts of the unique challenges, surprises, and successes they encountered, and offer strategies for:

  • Balancing swift deal execution with robust risk management
  • Building adaptable playbooks to standardize due diligence and integration across diverse environments
  • Fostering a unified security culture post-acquisition

1:30pm - 2:15pm  Breakout Session

Building Verified Trust—Defending Against Deepfake Threats

Advait Deodhar headshot

Advait Deodhar

VP Solutions Engineering

Ping Identity

Deepfakes are a growing challenge, making it harder to protect identities and maintain trust. Learn practical strategies for digital identity, advanced verification, and risk-aware authentication to defend your organization against AI-driven threats. Establishing verified trust through rigorous controls is essential for restoring confidence and resilience in digital interactions.

Join this session as CISOs discuss:

  • Recognition of deepfake-driven identity risks
  • Implementation of digital identity and authentication controls to establish verified trust
  • Restoration of trust through identity-first security

1:30pm - 2:15pm  Executive Boardroom

Securing Tomorrow — Rethinking Data Recovery Strategies

Ray Heffer headshot

Ray Heffer

Field CISO

Veeam

Joe Mendel headshot

Joe Mendel

CISO

Kimberly-Clark Corporation

CISOs are challenged by the growing sophistication of cyberattacks and the increasing complexity of IT environments, making traditional recovery approaches insufficient. Ensuring rapid, reliable recovery is now central to organizational resilience and trust, yet many security leaders struggle to integrate recovery into overall security strategy. Exploring new paradigms in cyber recovery can empower CISOs to proactively safeguard business continuity.

Join this session to explore:

  • Integrating recovery into incident response plans
  • Assessing cyber resilience beyond prevention
  • Bridging gaps between security and IT operations

1:30pm - 2:15pm  Executive Boardroom

AI Security Is a Lifecycle, Not a Feature

Tim Chase headshot

Tim Chase

Field CISO

Orca Security

Amir Niaz headshot

Amir Niaz

VP, Global CISO

Culligan

AI is no longer experimental. It is embedded across development pipelines, cloud services, SaaS platforms, and operational workflows. Yet most AI security conversations remain narrowly focused on model risk or prompt injection. For CISOs, the challenge is broader: how to establish control over AI across the enterprise lifecycle - from code to cloud to runtime execution - without slowing innovation. 

Join this boardroom to discuss:

  • Managing non-human identities, AI agents and blast radius expansion
  • Aligning DevOps, Cloud Security, AppSec and Governance under a unified AI risk framework
  • Measuring and reporting AI exposure at the board level

2:15pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

Leading by Example—Improving Your Own Security Posture as a CISO

Christopher Clai headshot

Christopher Clai

Senior Director, Information Security (CISO)

Green Thumb

As the digital threat landscape intensifies, CISOs are not only at the forefront of safeguarding their organization—they themselves are also on the front lines as one of the most frequently attacked users in any enterprise. And even seasoned security leaders can benefit from re-examining how they're securing their own digital footprints in this era of more sophisticated social engineering and AI-enabled attacks.

Join this session to explore and share ideas for:

  • Recognizing the vulnerabilities of the CISO position as a high-value target for attackers 
  • Up-leveling personal vigilance as CISOs become (more) public figures 
  • Leveraging your own example to educate and empower your executives and organization

3:00pm - 3:45pm  Executive Boardroom

From Firefighting to Fireproofing — Building Preemptive Security in the Age of AI

Tal Kollender headshot

Tal Kollender

CEO

Remedio

AI is reshaping the economics of cyber risk. Attack surfaces are expanding, threats are accelerating, and traditional reactive security models are reaching their limits. Today, risk stems not only from external adversaries but also from the rapid adoption of internal AI tools—often deployed with excessive permissions and limited oversight. How can organizations move from incident response to preemptive cybersecurity, identifying and addressing vulnerabilities before they’re exploited?

Join this boardroom to discuss:

  • Building resilience at scale with proactive security measures
  • Reducing operational friction by addressing vulnerabilities early
  • Shifting from constant firefighting to engineered fireproofing

3:00pm - 3:45pm  Executive Boardroom

Executive Boardroom moderated by Salesforce

Eoghan Casey headshot

Eoghan Casey

Field CTO

Salesforce

Session details coming soon.

3:00pm - 3:45pm  Executive Boardroom

The New Power Seat—Redefining the CISO Role

Brian Ekkebus headshot

Brian Ekkebus

Director of IT & CISO

USG

What does it mean for CISOs to occupy a new power seat—one where you are no longer just managing risk, but actively co‑architecting the enterprise’s technology strategy? As security and IT converge, CISOs must assess how they will influence modernization, reshape governance, and redefine responsibility for risk in a rapidly evolving environment.

Join this session to discuss:

  • How dual CISO–CIO responsibilities are reshaping governance models and accelerating security‑aligned modernization
  • Strategies for influencing technology architecture earlier in the lifecycle while maintaining business alignment
  • What “owning risk” now means as security and IT increasingly operate as a unified strategic function

3:45pm - 4:00pm  Networking Break

4:00pm - 4:35pm  Keynote

Rewiring for Resilience—Biohacking Your Brain for Burnout-Proof Leadership

Megs Gelfgot headshot

Megs Gelfgot

Two-time founder, TEDx, International and Fortune 500 speaker on neuroscience & resilience

In the high-stakes arena of billion-dollar enterprises, resilience isn't just an asset; it's a necessity. This session draws on cutting-edge neuroscience and biohacking protocols to equip CISOs with practical, brain-based tools to rewire stress responses, reclaim cognitive bandwidth, and build unbreakable mental fitness with the goal of leveraging personal resilience for strategic advantage. 

Attendees will learn strategies for:

  • Biohacking Stress & Recovery: Apply targeted neuroscience tools to combat burnout and maintain sharp decision-making under pressure
  • Building Daily Resilience Habits: Implement micro-biohacks and boundary strategies to counter alert fatigue, decision depletion, and chronic overload for sustained leadership
  • Leading with Adaptive Brain Optimization: Use brain science to enhance focus and agility, governing emerging risks while fostering resilient teams

4:35pm - 4:45pm  Closing Comments and Prize Drawing

4:45pm - 6:00pm  Governing Body Reception

Governing Body Reception

Finish the day sharing lessons learned with your peers over light fare and drinks at this closing reception hosted by your governing body members.

May 13, 2026

We look forward to seeing you at an upcoming in-person gathering

Gartner cares about the health and safety of our community. If you are feeling unwell, please refrain from attending the conference. At this time, Gartner does not have any health-related requirements in place for attendance. Should this change, we will follow up with updated guidance.

Location

More Information

Your Community Sponsors

Global Thought Leaders

CISO Thought Leaders

Key Sponsors

Program Sponsors

Community Program Manager

For inquiries related to this community, please reach out to your dedicated contact.

Nick Hall

Senior Community Program Manager

+1 (847) 789-1343

nick.hall@gartner.com