IN-PERSON

Detroit CISO Executive Summit

June 18, 2024 | The Henry, Autograph Collection

June 18, 2024
The Henry, Autograph Collection

APPLY TO PARTICIPATE

Collaborate with your peers

Get together with Detroit's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Leveraging technology and modernizing processes to enhance operational efficiency

Ensuring resiliency and mitigating risk is top of mind within cybersecurity strategies

Using data-driven insights to sustain a competitive advantage in the age of digital intelligence

Detroit CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Janette Barretto

Yazaki North America
Global Security and Risk Manager

Brent Cieszynski

Blue Cross Blue Shield of Michigan
VP & CISO

Russ Gordon

PHINIA
CISO

Steven Herrin

DTE
Director, Cybersecurity/CISO

Rich Hook

Penske
EVP & CIO

Rachelle Putnam

General Dynamics Land Systems
Chief Information Technology Officer

Jeff Small

Great Lakes Water Authority
CIO

Ryan Talbott

BorgWarner
VP & Global CIO

Erik Wille

Cabinetworks Group
CISO

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Detroit CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


June 18, 2024

7:45am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

Body Language Secrets for Enhanced Executive Presence

Chris Ulrich headshot

Chris Ulrich

Body Language Expert

Guest Speaker

Uncovering the mysteries of body language — how people communicate their thoughts and feelings without saying a word — is a decisive first step toward mastering any business and social situation.  Top executives know that detecting split-second signals from your team and  leadership then taking immediate action is crucial to being a persuasive communicator and problem-solver especially during tricky internal matters or high-level negotiations.

During this session you will learn how to:

  • Move beyond the vacuum of artificial body language to a behavioral approach based on YOU
  • Strengthen interpersonal relationships, be a more decisive leader and manage your nerves better
  • Uncover the less obvious needs of others and improve your team’s confidence and competence

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

The CIO Tech Stack — Embracing Cloud, Security, and Innovation

Loren Hudziak headshot

Loren Hudziak

Customer Engineer Manager, ChromeOS

Google

IT leaders are being asked to do more with less, like adopting innovative tech like GenAI, reducing risks of cyber threats, lowering costs all while spending significant time just on IT maintenance. Balancing the maintenance of existing tech while finding time to invest in innovative work is a foundational priority for all CIOs, but what are best practices to navigate the complexities of an evolving tech landscape? This session empowers CIOs by exploring strategies for cloud-based transformation to achieve superior security, streamlined management, and user-centric, modern experiences.

Join this session and breakout-style conversation with your peers to discuss:

  • Practical solutions for enhancing productivity
  • How to adopt AI-driven tools for a competitive edge
  • Cybersecurity considerations with modernization

9:40am - 10:25am  Executive Boardroom

Optimize Application Rationalization to Reduce Cost

Mark Coggin headshot

Mark Coggin

VP, Portfolio Marketing

Rimini Street

Scott Bennett headshot

Scott Bennett

CIO

Lear Corporation

CIOs are balancing an ever-increasing number of service providers which requires a strong vendor and application rationalization integrated into strategic decision-making. In order to allocate more funds towards innovation and differentiation initiatives, mission-critical systems need to be optimized, cost effective, and flexible.

Join this session to discuss:

  • Incorporate effective contract management
  • Strategies to avoid vendor lock-in
  • Financially optimizing the vendor portfolio

9:40am - 10:25am  Executive Boardroom

The Business of Security — Bridging the Gap Between Cyber Initiatives and Business Impact

Tyler Zito headshot

Tyler Zito

Senior Solutions Architect

Expel

Marty Christensen headshot

Marty Christensen

Head of Cyber Security for Enterprise, Cloud, and Supply Chain

Ford

Homyar Naterwala headshot

Homyar Naterwala

Business Information Security Officer

GE Aerospace

Michael Prieur headshot

Michael Prieur

Director, Security Risk

Centene Corporation

Economic trends have tightened purse strings everywhere, leaving CISOs and security leaders to demonstrate ROI and defend their budgets. But ROI is notoriously tough to quantify when the primary return for security investment is reduction in risk. As a result, bridging the gap between security investments and actual business impact can be easier said than done, particularly if your cybersecurity spend doesn’t clearly map to organizational goals.

Join this session to discuss:

  • Identifying the right metrics for quantifying security ROI and business impact        
  • Positioning security as a business enabler, rather than a cost center
  • Aligning security investments to organizational goals

9:40am - 10:25am  Executive Boardroom

Managing OT to Fully Secure the Business

Laura Davidson headshot

Laura Davidson

CISO

American Axle & Manufacturing

Adam Keagle headshot

Adam Keagle

CISO

Detroit Diesel Corporation

For most organizations, the number of connected, essential devices is growing by the second. In response, the CISO's jurisdiction is changing just as rapidly. Now, in the case of any security issue, the rest of the C-suite may be looking to you for answers.

Join this session and start understanding:

  • Your new or growing operational technology responsibilities
  • What you can do to smoothly plot and control your OT workload
  • How you can best juggle IT and OT security simultaneously

10:25am - 11:05am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:05am - 11:50am  Breakout Session

Embracing Innovation — Real-World GenAI Use Cases

Ryan Olivier headshot

Ryan Olivier

VP & CIO

American Axle & Manufacturing

The present moment offers an opportunity to unlock GenAI's transformative power, but maturity across organizations varies. Business leaders recognize this technology is a catalyst for innovation. By understanding real-world case studies with lessons learned, those leaders can create real movement forward inside of their own organizations.

Bring your questions to this INTERACTIVE session as you discuss with other executives who have:

  • Implemented practical GenAI use cases and identified opportunities
  • Compared and measured platforms and solutions for value outcomes
  • Balanced approach to value and risk

11:05am - 11:50am  Executive Boardroom

Digital Inclusion and the CIO’s Path Forward

Rohan Pal headshot

Rohan Pal

Chief Transformation Officer

ServiceNow

Mike Rogers headshot

Mike Rogers

CIO

Nexteer

While many CEOs are tasking the business to advance digital priorities, challenges block progress due to legacy IT, transitioning to the cloud, and the unrelenting task of IT operations. Breaking the bottleneck of transformation is not straightforward, but creating ownership with the wider business can prove to be a winning strategy.

Join this session to discuss:

  • Infusing “digital inclusion” into the organization
  • Incorporating the wider business to drive its own digital priorities
  • Collaborating across the C-Suite to meet enterprise goals

11:05am - 11:50am  Executive Boardroom

Transformative Shockwaves: Navigating Unpredictability Through Strategic Control

KJ Kusch headshot

KJ Kusch

Global Field Chief Technology Officer

WalkMe

James McFarlane headshot

James McFarlane

CIO & VP

HoMedics

As lines of business continue to invest in new applications and processes, disconnected, siloed, and individual initiatives are creating shockwaves throughout the organization. Such random acts of digital lack the necessary degrees of strategic oversight and organizational change control, leading to unpredictability and elevated levels of organizational risk.

Join this boardroom to discuss how to:

  • Adopt new digital solutions with proactive approaches
  • Eliminate chance outcomes from random acts of digital
  • Promote unity while mitigating risks

11:05am - 11:50am  Executive Boardroom

Communicating and Measuring Cyber Risk More Effectively

Russ Gordon headshot

Russ Gordon

CISO

PHINIA

Erik Wille headshot

Erik Wille

CISO

Cabinetworks Group

In today’s environment, it is even more challenging for security leaders to communicate and measure their cyber risk and program to their executive board. Being fully transparent about an organization’s weaknesses, strengths, and investments as it relates to cyber risk can be an uncomfortable conversation to have, but it is essential to the overall health of the business.

Join this session to learn:

  • Metrics that quantify challenges & risks
  • How to create trust with dialogue delivery and engage leadership with non-security terms
  • Using data to communicate and explain the risks and how to best leverage this data

11:50am - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

Worth the Business Risk? Security That Advances Innovation

Pamela Kubiatowski headshot

Pamela Kubiatowski

Global VP, CTO in Residence

Zscaler

IT and security must strike an intricate balance between enablement and protection. Cyber and business risk considerations should mesh into a strategy that both propels innovation and creates business value. As CIOs and CISOs grapple with increasingly complex decisions and evolving digital transformation roadmaps, how can leaders position cybersecurity as a pillar for advancing innovation?

Join this session to learn:

  • How to foster inclusive conversations on cybersecurity by framing issues in terms of business risk
  • Identifying initial steps and key phases of zero trust implementation within a broader risk strategy
  • Demystifying zero trust architecture for other leaders and recruit business champions for transformation

1:10pm - 1:35pm  Break

1:35pm - 2:20pm  Breakout Session

A New Era of Compliance & Regulation

Janette Barretto headshot

Janette Barretto

Global Security and Risk Manager

Yazaki North America

Steven Herrin headshot

Steven Herrin

Director, Cybersecurity/CISO

DTE

Scott Sadlocha headshot

Scott Sadlocha

SVP, CISO

United Wholesale Mortgage

With the continuous advancement of technology, businesses face new and evolving threats that require a proactive response. New laws and precedents expose cybersecurity leaders to personal liability and leave security leaders questioning their protection.

Join this interactive session to discuss:

  • Essential questions to ask your legal team
  • Best practices for keeping up to date with the evolving governance, risk, and compliance landscape
  • C-Suite liability and information security risk

1:35pm - 2:20pm  Executive Boardroom

Generative AI — Should CISOs be Guardians or Gatekeepers?

Lior Yaari headshot

Lior Yaari

CEO and Co-Founder

Grip Security

Mick Leach headshot

Mick Leach

Field CISO

Abnormal Security

Jeremy Hyland headshot

Jeremy Hyland

Director of Cyber Defense

Dow

Mo Wehbi headshot

Mo Wehbi

Vice President, Information Security & PMO

Penske

From content generation to data analysis, generative AI is transforming the way people work and drastically improving productivity. However, the benefits do not come without risks, and the technology has the potential to do more harm than good when placed in the wrong hands. So what do security leaders need to know about the risks of generative AI, and how do they mitigate them?

Join this session for an insightful discussion on the latest cybersecurity challenges associated with generative AI, including:

  • How the threat landscape is changing as a result of generative AI
  • How businesses can ensure the privacy and security of sensitive data used in generative AI applications and govern them appropriately
  • What tools and capabilities are necessary to protect organizations from malicious uses of generative AI

1:35pm - 2:20pm  Executive Boardroom

Securing a Modern Data Governance Program

David Bobryk headshot

David Bobryk

Director, Health Informatics and Analytics

Trinity Health

Nicole Rembert headshot

Nicole Rembert

Global Cybersecurity Governance, Risk and Compliance Director

UL Solutions

Establishing a secure governance program that successfully aligns with business priorities is crucial especially in an age of AI innovation. CIOs and CISOs must balance providing accurate and accessible data with compliance and security concerns.

Join this session to discuss:

  • Aligning data governance strategy with the organization’s goals
  • Addressing data privacy, compliance and security concerns
  • Focusing on data ownership and stewardship for effective management

1:35pm - 2:20pm  Executive Boardroom

Stress Management Strategies for Effective Leadership

Heidi Mattison headshot

Heidi Mattison

CTO

Cabinetworks Group

Ryan Talbott headshot

Ryan Talbott

VP & Global CIO

BorgWarner

Technology and security leaders' worlds are complex, challenging, and often exhausting. If you’re not dealing with vulnerabilities or implementing and managing security solutions, you’re navigating governance and company-wide risk perspectives. When do leaders get a chance to breathe and beat the fatigue?

Join this peer-led boardroom to discuss:

  • Understanding the critical role CIOs & CISOs can play in stress management for themselves and their employees
  • Exploring how trust and openness with your team can improve well-being and mental health
  • Actionable takeaways on how to manage stress within the workplace

2:20pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

Digital Leader's Compass: A Framework for Leading in the Digital Age

Raj Polanki headshot

Raj Polanki

Head of IT / Divisional CIO

Wacker Chemical

 More details coming soon.

3:00pm - 3:45pm  Executive Boardroom

Strategic Third-Party Risk Management — From Due Diligence to Continuous Oversight

Travis Bray headshot

Travis Bray

Director, Global Information Security

Magna Powertrain USA

Pamela Hensley headshot

Pamela Hensley

Director, Information Security

AAA Life Insurance

Vendor selection, pre-partner due diligence, and trusted implementation are merely the beginning of a healthy third-party management culture. With those pieces in place, the real work (like battling for constant visibility and enforcing your requirements) begins. You’ll need to be prepared.

Gather and discuss how to CISOs have successfully:

  • Vetted new and prospective third-parties
  • Monitored network of existing third-parties
  • Asserted security requirements with vulnerable, but critical, third-parties

3:00pm - 3:45pm  Executive Boardroom

Routing Your Generative AI Implementation Marathon

Bill McCreary headshot

Bill McCreary

Vice President CIO/CTO

The University of Toledo

Dan Rainey headshot

Dan Rainey

CIO

Detroit Water & Sewerage Department

John Wei headshot

John Wei

CTO & SVP

Integreon

Early adopters confirm, AI-implementation isn't for the faint of heart (or the light of checkbook). Yet, the expectation to welcome this booming tech advancement into your organization remains. Today, studying the efforts of those same early adopters proves the easiest first step in drawing up your own AI road map.

 Gather with your peers to:

  • Compare your varying stages of AI-adoption progress
  • Share what you've learned through that progress so far
  • Gather proactive tips on clearing hurdles to come

3:45pm - 4:10pm  Break

4:10pm - 4:45pm  Keynote

The Path of Most Resistance

Juman Doleh-Alomary headshot

Juman Doleh-Alomary

CISO

BorgWarner

Navigating the complex landscape of IT and cybersecurity demands a strategic and intentional approach that values diversity and mentorship. Embracing the path of most resistance fosters unconventional professional growth and leads to significant technological and security breakthroughs. By leveraging unique perspectives and experiences, IT and security leaders can drive innovation and establish a more resilient organizational strategy.

Join Juman Doleh-Alomary, CISO at BorgWarner, as she shares about:

  • Building a personal board of directors and excellence in teams
  • Tackling complex projects to cultivate innovation and secure a competitive advantage
  • Enhancing flexibility and collaboration by valuing diverse opinions and ideas, strengthening trust across the industry

4:45pm - 5:00pm  Closing Comments and Prize Drawing

7:45am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

Body Language Secrets for Enhanced Executive Presence

Chris Ulrich headshot

Chris Ulrich

Body Language Expert

Guest Speaker

Uncovering the mysteries of body language — how people communicate their thoughts and feelings without saying a word — is a decisive first step toward mastering any business and social situation.  Top executives know that detecting split-second signals from your team and  leadership then taking immediate action is crucial to being a persuasive communicator and problem-solver especially during tricky internal matters or high-level negotiations.

During this session you will learn how to:

  • Move beyond the vacuum of artificial body language to a behavioral approach based on YOU
  • Strengthen interpersonal relationships, be a more decisive leader and manage your nerves better
  • Uncover the less obvious needs of others and improve your team’s confidence and competence

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

The CIO Tech Stack — Embracing Cloud, Security, and Innovation

Loren Hudziak headshot

Loren Hudziak

Customer Engineer Manager, ChromeOS

Google

IT leaders are being asked to do more with less, like adopting innovative tech like GenAI, reducing risks of cyber threats, lowering costs all while spending significant time just on IT maintenance. Balancing the maintenance of existing tech while finding time to invest in innovative work is a foundational priority for all CIOs, but what are best practices to navigate the complexities of an evolving tech landscape? This session empowers CIOs by exploring strategies for cloud-based transformation to achieve superior security, streamlined management, and user-centric, modern experiences.

Join this session and breakout-style conversation with your peers to discuss:

  • Practical solutions for enhancing productivity
  • How to adopt AI-driven tools for a competitive edge
  • Cybersecurity considerations with modernization

9:40am - 10:25am  Executive Boardroom

Optimize Application Rationalization to Reduce Cost

Mark Coggin headshot

Mark Coggin

VP, Portfolio Marketing

Rimini Street

Scott Bennett headshot

Scott Bennett

CIO

Lear Corporation

CIOs are balancing an ever-increasing number of service providers which requires a strong vendor and application rationalization integrated into strategic decision-making. In order to allocate more funds towards innovation and differentiation initiatives, mission-critical systems need to be optimized, cost effective, and flexible.

Join this session to discuss:

  • Incorporate effective contract management
  • Strategies to avoid vendor lock-in
  • Financially optimizing the vendor portfolio

9:40am - 10:25am  Executive Boardroom

The Business of Security — Bridging the Gap Between Cyber Initiatives and Business Impact

Tyler Zito headshot

Tyler Zito

Senior Solutions Architect

Expel

Marty Christensen headshot

Marty Christensen

Head of Cyber Security for Enterprise, Cloud, and Supply Chain

Ford

Homyar Naterwala headshot

Homyar Naterwala

Business Information Security Officer

GE Aerospace

Michael Prieur headshot

Michael Prieur

Director, Security Risk

Centene Corporation

Economic trends have tightened purse strings everywhere, leaving CISOs and security leaders to demonstrate ROI and defend their budgets. But ROI is notoriously tough to quantify when the primary return for security investment is reduction in risk. As a result, bridging the gap between security investments and actual business impact can be easier said than done, particularly if your cybersecurity spend doesn’t clearly map to organizational goals.

Join this session to discuss:

  • Identifying the right metrics for quantifying security ROI and business impact        
  • Positioning security as a business enabler, rather than a cost center
  • Aligning security investments to organizational goals

9:40am - 10:25am  Executive Boardroom

Managing OT to Fully Secure the Business

Laura Davidson headshot

Laura Davidson

CISO

American Axle & Manufacturing

Adam Keagle headshot

Adam Keagle

CISO

Detroit Diesel Corporation

For most organizations, the number of connected, essential devices is growing by the second. In response, the CISO's jurisdiction is changing just as rapidly. Now, in the case of any security issue, the rest of the C-suite may be looking to you for answers.

Join this session and start understanding:

  • Your new or growing operational technology responsibilities
  • What you can do to smoothly plot and control your OT workload
  • How you can best juggle IT and OT security simultaneously

10:25am - 11:05am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:05am - 11:50am  Breakout Session

Embracing Innovation — Real-World GenAI Use Cases

Ryan Olivier headshot

Ryan Olivier

VP & CIO

American Axle & Manufacturing

The present moment offers an opportunity to unlock GenAI's transformative power, but maturity across organizations varies. Business leaders recognize this technology is a catalyst for innovation. By understanding real-world case studies with lessons learned, those leaders can create real movement forward inside of their own organizations.

Bring your questions to this INTERACTIVE session as you discuss with other executives who have:

  • Implemented practical GenAI use cases and identified opportunities
  • Compared and measured platforms and solutions for value outcomes
  • Balanced approach to value and risk

11:05am - 11:50am  Executive Boardroom

Digital Inclusion and the CIO’s Path Forward

Rohan Pal headshot

Rohan Pal

Chief Transformation Officer

ServiceNow

Mike Rogers headshot

Mike Rogers

CIO

Nexteer

While many CEOs are tasking the business to advance digital priorities, challenges block progress due to legacy IT, transitioning to the cloud, and the unrelenting task of IT operations. Breaking the bottleneck of transformation is not straightforward, but creating ownership with the wider business can prove to be a winning strategy.

Join this session to discuss:

  • Infusing “digital inclusion” into the organization
  • Incorporating the wider business to drive its own digital priorities
  • Collaborating across the C-Suite to meet enterprise goals

11:05am - 11:50am  Executive Boardroom

Transformative Shockwaves: Navigating Unpredictability Through Strategic Control

KJ Kusch headshot

KJ Kusch

Global Field Chief Technology Officer

WalkMe

James McFarlane headshot

James McFarlane

CIO & VP

HoMedics

As lines of business continue to invest in new applications and processes, disconnected, siloed, and individual initiatives are creating shockwaves throughout the organization. Such random acts of digital lack the necessary degrees of strategic oversight and organizational change control, leading to unpredictability and elevated levels of organizational risk.

Join this boardroom to discuss how to:

  • Adopt new digital solutions with proactive approaches
  • Eliminate chance outcomes from random acts of digital
  • Promote unity while mitigating risks

11:05am - 11:50am  Executive Boardroom

Communicating and Measuring Cyber Risk More Effectively

Russ Gordon headshot

Russ Gordon

CISO

PHINIA

Erik Wille headshot

Erik Wille

CISO

Cabinetworks Group

In today’s environment, it is even more challenging for security leaders to communicate and measure their cyber risk and program to their executive board. Being fully transparent about an organization’s weaknesses, strengths, and investments as it relates to cyber risk can be an uncomfortable conversation to have, but it is essential to the overall health of the business.

Join this session to learn:

  • Metrics that quantify challenges & risks
  • How to create trust with dialogue delivery and engage leadership with non-security terms
  • Using data to communicate and explain the risks and how to best leverage this data

11:50am - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

Worth the Business Risk? Security That Advances Innovation

Pamela Kubiatowski headshot

Pamela Kubiatowski

Global VP, CTO in Residence

Zscaler

IT and security must strike an intricate balance between enablement and protection. Cyber and business risk considerations should mesh into a strategy that both propels innovation and creates business value. As CIOs and CISOs grapple with increasingly complex decisions and evolving digital transformation roadmaps, how can leaders position cybersecurity as a pillar for advancing innovation?

Join this session to learn:

  • How to foster inclusive conversations on cybersecurity by framing issues in terms of business risk
  • Identifying initial steps and key phases of zero trust implementation within a broader risk strategy
  • Demystifying zero trust architecture for other leaders and recruit business champions for transformation

1:10pm - 1:35pm  Break

1:35pm - 2:20pm  Breakout Session

A New Era of Compliance & Regulation

Janette Barretto headshot

Janette Barretto

Global Security and Risk Manager

Yazaki North America

Steven Herrin headshot

Steven Herrin

Director, Cybersecurity/CISO

DTE

Scott Sadlocha headshot

Scott Sadlocha

SVP, CISO

United Wholesale Mortgage

With the continuous advancement of technology, businesses face new and evolving threats that require a proactive response. New laws and precedents expose cybersecurity leaders to personal liability and leave security leaders questioning their protection.

Join this interactive session to discuss:

  • Essential questions to ask your legal team
  • Best practices for keeping up to date with the evolving governance, risk, and compliance landscape
  • C-Suite liability and information security risk

1:35pm - 2:20pm  Executive Boardroom

Generative AI — Should CISOs be Guardians or Gatekeepers?

Lior Yaari headshot

Lior Yaari

CEO and Co-Founder

Grip Security

Mick Leach headshot

Mick Leach

Field CISO

Abnormal Security

Jeremy Hyland headshot

Jeremy Hyland

Director of Cyber Defense

Dow

Mo Wehbi headshot

Mo Wehbi

Vice President, Information Security & PMO

Penske

From content generation to data analysis, generative AI is transforming the way people work and drastically improving productivity. However, the benefits do not come without risks, and the technology has the potential to do more harm than good when placed in the wrong hands. So what do security leaders need to know about the risks of generative AI, and how do they mitigate them?

Join this session for an insightful discussion on the latest cybersecurity challenges associated with generative AI, including:

  • How the threat landscape is changing as a result of generative AI
  • How businesses can ensure the privacy and security of sensitive data used in generative AI applications and govern them appropriately
  • What tools and capabilities are necessary to protect organizations from malicious uses of generative AI

1:35pm - 2:20pm  Executive Boardroom

Securing a Modern Data Governance Program

David Bobryk headshot

David Bobryk

Director, Health Informatics and Analytics

Trinity Health

Nicole Rembert headshot

Nicole Rembert

Global Cybersecurity Governance, Risk and Compliance Director

UL Solutions

Establishing a secure governance program that successfully aligns with business priorities is crucial especially in an age of AI innovation. CIOs and CISOs must balance providing accurate and accessible data with compliance and security concerns.

Join this session to discuss:

  • Aligning data governance strategy with the organization’s goals
  • Addressing data privacy, compliance and security concerns
  • Focusing on data ownership and stewardship for effective management

1:35pm - 2:20pm  Executive Boardroom

Stress Management Strategies for Effective Leadership

Heidi Mattison headshot

Heidi Mattison

CTO

Cabinetworks Group

Ryan Talbott headshot

Ryan Talbott

VP & Global CIO

BorgWarner

Technology and security leaders' worlds are complex, challenging, and often exhausting. If you’re not dealing with vulnerabilities or implementing and managing security solutions, you’re navigating governance and company-wide risk perspectives. When do leaders get a chance to breathe and beat the fatigue?

Join this peer-led boardroom to discuss:

  • Understanding the critical role CIOs & CISOs can play in stress management for themselves and their employees
  • Exploring how trust and openness with your team can improve well-being and mental health
  • Actionable takeaways on how to manage stress within the workplace

2:20pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

Digital Leader's Compass: A Framework for Leading in the Digital Age

Raj Polanki headshot

Raj Polanki

Head of IT / Divisional CIO

Wacker Chemical

 More details coming soon.

3:00pm - 3:45pm  Executive Boardroom

Strategic Third-Party Risk Management — From Due Diligence to Continuous Oversight

Travis Bray headshot

Travis Bray

Director, Global Information Security

Magna Powertrain USA

Pamela Hensley headshot

Pamela Hensley

Director, Information Security

AAA Life Insurance

Vendor selection, pre-partner due diligence, and trusted implementation are merely the beginning of a healthy third-party management culture. With those pieces in place, the real work (like battling for constant visibility and enforcing your requirements) begins. You’ll need to be prepared.

Gather and discuss how to CISOs have successfully:

  • Vetted new and prospective third-parties
  • Monitored network of existing third-parties
  • Asserted security requirements with vulnerable, but critical, third-parties

3:00pm - 3:45pm  Executive Boardroom

Routing Your Generative AI Implementation Marathon

Bill McCreary headshot

Bill McCreary

Vice President CIO/CTO

The University of Toledo

Dan Rainey headshot

Dan Rainey

CIO

Detroit Water & Sewerage Department

John Wei headshot

John Wei

CTO & SVP

Integreon

Early adopters confirm, AI-implementation isn't for the faint of heart (or the light of checkbook). Yet, the expectation to welcome this booming tech advancement into your organization remains. Today, studying the efforts of those same early adopters proves the easiest first step in drawing up your own AI road map.

 Gather with your peers to:

  • Compare your varying stages of AI-adoption progress
  • Share what you've learned through that progress so far
  • Gather proactive tips on clearing hurdles to come

3:45pm - 4:10pm  Break

4:10pm - 4:45pm  Keynote

The Path of Most Resistance

Juman Doleh-Alomary headshot

Juman Doleh-Alomary

CISO

BorgWarner

Navigating the complex landscape of IT and cybersecurity demands a strategic and intentional approach that values diversity and mentorship. Embracing the path of most resistance fosters unconventional professional growth and leads to significant technological and security breakthroughs. By leveraging unique perspectives and experiences, IT and security leaders can drive innovation and establish a more resilient organizational strategy.

Join Juman Doleh-Alomary, CISO at BorgWarner, as she shares about:

  • Building a personal board of directors and excellence in teams
  • Tackling complex projects to cultivate innovation and secure a competitive advantage
  • Enhancing flexibility and collaboration by valuing diverse opinions and ideas, strengthening trust across the industry

4:45pm - 5:00pm  Closing Comments and Prize Drawing

June 18, 2024

We look forward to seeing you at an upcoming in-person gathering


Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

The Henry, Autograph Collection

A block of rooms has been reserved at the The Henry, Autograph Collection at a reduced conference rate. Reservations should be made online or by calling (313) 441-2000.

Deadline to book using the discounted room rate of $249 USD (plus tax) is May 27, 2024.

Your Community Partners


Global Thought Leaders
CISO Thought Leader
Key Partners
Program Partners

Community Program Managers


For inquiries related to this community, please reach out to your dedicated contacts.

Alex Shimrat

Community Program Manager

315-857-5945

alex.shimrat@evanta.com

Jeff Hull

Community Program Manager

214-649-0033

jeff.hull@evanta.com