IN-PERSON

Indianapolis CISO Executive Summit

June 6, 2019 | JW Marriott Indianapolis

June 6, 2019
JW Marriott Indianapolis

Collaborate with your peers

Get together with your peers to tackle top business challenges through peer-driven content and discussions at the Indianapolis CISO Executive Summit.

Join your peers to discuss the most critical issues impacting CISOs today:

Investing in your people and the right technologies

Innovating with advanced technologies and new delivery models

Influencing business stakeholders and enterprise outcomes

Indianapolis CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Karen Delozier

Sallie Mae
VP, IT Risk Management & Compliance

Meredith Harper

Eli Lilly
Chief Information Security Officer

Dewand Neely

State of Indiana
CIO

Judd Williams

NCAA
CIO

Agenda


June 5, 2019

6:00pm - 8:30pm  Governing Body Welcome Reception

Governing Body Welcome Reception

Governing Body members host this dinner to launch the event with an evening of peer networking.

7:00am - 7:45am  Registration & Breakfast

7:45am - 8:30am  Keynote

What's Trust Got to Do With It?

David Horsager headshot

David Horsager

CEO and Best-Selling Author, "The Trust Edge"

Trust is both a fundamental business issue and the biggest asset of a company. Without trust, companies lose reputations, relationships, and revenue. With trust, organizations enjoy greater creativity, productivity, and results. Through extensive research and experience, David Horsager learned what it takes to gain — and keep — the “Trust Edge.”

Join this session as Horsager outlines:

  • The keys to building morale, sales, and customer loyalty
  • His Eight-Pillar Framework for building trust in an organization
  • Creating successful leaders and organizations centered on the tenants of trust

8:30am - 9:00am  Networking Break

9:00am - 9:50am  CIO & CISO Featured Session

Next Gen Talent – Developing Indy’s Tech Community

Bill Russell headshot

Bill Russell

CISO

Cummins

Katie Sauls headshot

Katie Sauls

IT Director, Indianapolis CoE & Commercial Systems

GEICO

Mike Langellier headshot

Mike Langellier

President & CEO

TechPoint

With rapid digital transformation both in recent years and moving forward into the foreseeable future, there is a need to profoundly address the tech talent shortage. This session will confront the challenges of building out a workforce with the right skills that will translate across decades of transformation. 

In this interactive brainstorming session, we’ll explore:

  • Attracting and retaining top tech talent
  • Educating the next generation of IT professionals
  • Innovating internal development strategies


9:00am - 9:50am  CISO Featured Session

The CISO’s Role in Digital Transformation

Chandra Olson headshot

Chandra Olson

CISO Americas

Zscaler

Leon Ravenna headshot

Leon Ravenna

CISO

KAR Auction Services

Whether you love or hate buzzwords, digital transformation is having a major impact on business culture. As more data moves to the cloud and employees, partners, and customers interact outside the traditional enterprise perimeter, security should play an active part.

In this session, we’ll discuss:

  • How digital transformation impacts an enterprise’s existing security posture
  • The proactive role security should play as applications move to the cloud
  • How security leaders can avoid becoming obstacles and instead become catalysts for change


9:00am - 9:50am  CISO Executive Boardroom

Building the Infrastructure for Sound Data Governance

Mitchell Brett Parker headshot

Mitchell Brett Parker

Exec Director Information Security & Compliance

Indiana University Health

Dustin Wilcox headshot

Dustin Wilcox

CISO

Anthem

A data-driven organization must have clearly defined governance and business alignment if there is any hope of imbuing their information with meaning. In this discussion, executives examine challenges in taking next steps on the data path and share best practices in driving analytics forward.

Join this peer-to-peer discussion to explore:

  • Data trust and confidence in an ever fragmented cloud world
  • Efficiency in data management
  • Data classification and e-discovery


Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact Chris Carcich at christopher.carcich@evanta.com or 971-978-5000. 

9:50am - 10:20am  Networking Break

10:20am - 11:10am  CISO Featured Session

The Fundamentals of Cybersecurity — What Changes in the Cloud?

Dustin Wilcox headshot

Dustin Wilcox

CISO

Anthem

As the number of cloud-based systems continues to increase and more risk solutions become available, the foundations of cybersecurity can oftentimes get lost in the shuffle. Join Dustin Wilcox for a review of the fundamentals of a sound security strategy and how they can be applied to securing the cloud perimeter.

This session will explore:

  • Control services of the cloud – what remains the same
  • Tactics for achieving your strategy in the cloud – what changes
  • Specific examples and how to deploy them

10:20am - 11:10am  CIO & CISO Executive Boardroom

Becoming Agile and Staying Agile

Meredith Harper headshot

Meredith Harper

Chief Information Security Officer

Eli Lilly

James Jordan headshot

James Jordan

Chief Information Officer

Ascension Health Ministry Service Center

Agile methodologies are an increasingly attractive way for organizations to accelerate the pace of innovation. Yet transitioning to new modes of work can create friction for existing employees, and success depends on buy-in across the organization.

Join your peers in this round table discussion to consider:

  • How to take agile dev-ops to the next level
  • Challenges to adopting and implementing agile methodologies
  • What are some common misconceptions about agile dev-ops


Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact Chris Carcich at christopher.carcich@evanta.com or 971-978-5000. 

10:20am - 11:10am  CISO Executive Boardroom

Strengthening Your Security Operations Center

Bill Russell headshot

Bill Russell

CISO

Cummins

William Tucek headshot

William Tucek

Chief Information Security Officer

Toyota Tsusho

When it comes to taking your data from you, cyber criminals never rest. If they can’t get in one way, they will try another. Therefore, when managing incidents for your enterprise, it is critical to ensure that threats and attacks are properly identified, analyzed, communicated, defended, investigated and reported.

During this boardroom discussion on cyber operations, discover:

  • How to develop effective principles and procedures for security operations centers
  • How determine what is best to outsource vs what should be kept internal
  • How to create effective communication and reporting strategies for the entire organization


Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact Chris Carcich at christopher.carcich@evanta.com or 971-978-5000. 

11:10am - 11:40am  Networking Break

11:40am - 12:50pm  Keynote

Networking Lunch

 Join the Governing Body for a lunch and interactive networking.

12:50pm - 1:20pm  Networking Break

1:20pm - 2:10pm  CISO Featured Session

Wear the Black Hat in a Cybersecurity Escape Room

Kai Chin headshot

Kai Chin

Senior Security Engineer, Global IT

Boston Scientific

Allan Lam headshot

Allan Lam

Sr. Manager of Cybersecurity Architecture and Engineering

Boston Scientific

As a security executive, you know how many disparate pieces of information can together leave you vulnerable to hackers. Framed photos. Letters from family. Personal documents tucked away in a drawer. For 50 minutes, you’ll try on the black hat, assuming the role of a hacker trying to access an organization’s most sensitive data.

The catch—you only have 40 minutes to gather all the correct intel to gain access to the data, and you’re limited to the clues around the room.

In this session, be prepared to:

  • Hack a Facebook account using information left behind on employees’ desks
  • Identify which sensitive documents commonly found on employees’ desks can be used to access important accounts
  • Learn a new way to gamify insider threat training


1:20pm - 2:10pm  CISO Executive Boardroom

The Current Privacy Policy Landscape

Clyde Hague headshot

Clyde Hague

Information Security Officer

NCAA

Leon Ravenna headshot

Leon Ravenna

CISO

KAR Auction Services

Jared Tidemann headshot

Jared Tidemann

Director of Legal Affairs and Assistant General Counsel

NCAA

Since the rollout of GDPR, many countries and U.S. states have been developing their own legislation with similar requirements and fines for organizations that fail to meet them. Join this peer-to-peer discussion for an update on how to maintain compliance with recent legislations and what a U.S. federal privacy law could look like.

In this session you will discuss:

  • The imperative to create trust with the customer about their data
  • Ways to change key company values in regards to data
  • How to determine which compliance frameworks to adopt


Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact Chris Carcich at christopher.carcich@evanta.com or 971-978-5000. 

2:10pm - 2:30pm  Networking Break

2:30pm - 3:20pm  CISO Featured Session

Cyber Metrics — How Good (or Bad!) Are We, and Does it Matter?

Jim Richberg headshot

Jim Richberg

Field CISO

Fortinet, Inc.

“Cyber metrics” means different things to different people and often differs based on context and situation. From asset owner actions, to threat activity, to internal and external factors – these dimensions contribute to the confusion of those who decide whether networks and data are “safe.” Join this session for an exploration of how metrics can best contribute to informed decisions about risk management.

This session will consider:

  • Which metrics provide an accurate depiction of risk
  • Meaningful prioritization based on threats and vulnerability
  • Risk management and ROI in cybersecurity

2:30pm - 3:20pm  CISO Executive Boardroom

The People the Problem - Security Awareness Training

Karen Delozier headshot

Karen Delozier

VP, IT Risk Management & Compliance

Sallie Mae

James Yang headshot

James Yang

CISO

OneAmerica Financial Partners, Inc

Even as security tools become increasingly advanced, the biggest vulnerability in a company continues to be its people. With attacks on the rise, executives must make employee training even more sophisticated.

In this boardroom, you’ll discuss:

  • Different educational approaches with your peers
  • How to evaluate the level of training needed
  • Key training components and methods of measuring their efficacy


Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact Chris Carcich at christopher.carcich@evanta.com or 971-978-5000. 

2:30pm - 3:20pm  CIO & CISO Featured Session

Wear the Black Hat in a Cybersecurity Escape Room

Kai Chin headshot

Kai Chin

Senior Security Engineer, Global IT

Boston Scientific

Allan Lam headshot

Allan Lam

Sr. Manager of Cybersecurity Architecture and Engineering

Boston Scientific

As a security executive, you know how many disparate pieces of information can together leave you vulnerable to hackers. Framed photos. Letters from family. Personal documents tucked away in a drawer. For 50 minutes, you’ll try on the black hat, assuming the role of a hacker trying to access an organization’s most sensitive data.

The catch—you only have 40 minutes to gather all the correct intel to gain access to the data, and you’re limited to the clues around the room.

In this session, be prepared to:

  • Hack a Facebook account using information left behind on employees’ desks
  • Identify which sensitive documents commonly found on employees’ desks can be used to access important accounts
  • Learn a new way to gamify insider threat training

3:20pm - 3:40pm  Networking Break

3:40pm - 4:20pm  Keynote

Diversity in Tech — Opening the Door to New Perspectives

Meredith Harper headshot

Meredith Harper

Chief Information Security Officer

Eli Lilly

It is no secret that digital transformation continues to bring forth disruption and massive cultural change to organizations. As a woman of color who has built a successful career in tech, Meredith Harper has a unique perspective on how disruption provides the opportunity to not only drive growth, but also radically transform diversity and inclusion in tech.

Join Harper as she shares insights on:

  • Building diverse teams to increase innovation
  • Eliminating the fear of having difficult conversations about diversity
  • Looking for talent in nontraditional spaces

4:20pm - 5:00pm  Closing Reception & Prize Drawing

June 5, 2019

Location


Venue & Accommodation

JW Marriott Indianapolis

Your Community Partners


National Thought Leaders
National Sponsors
Local Sponsors
Global Thought Leader

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Christopher Carcich

Program Manager

310-383-9390

christopher.carcich@gartner.com