IN-PERSON

Washington, DC CISO Executive Summit

December 14, 2021 | Hyatt Regency Washington on Capitol Hill

December 14, 2021
Hyatt Regency Washington on Capitol Hill

Collaborate with your peers

Get together with Washington, DC's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Seizing momentum – influencing and leading the enterprise

Thriving through uncertainty - empowering people and delivering value

Advancing and scaling strategic, outcome-based technologies

Washington, DC CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Mike Gordon

Lockheed Martin
VP & CISO

André Mendes

Department of Commerce
Acting CIO

Shamim Mohammad

CarMax Inc
EVP, Chief Information and Technology Officer

Christopher Porter

Fannie Mae
CISO

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Washington, DC CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


December 13, 2021

December 14, 2021

6:00pm - 8:30pm  Governing Body Welcome Reception

Governing Body Private Dinner

Exclusive to Governing Body members and select guests, this dinner is a can’t-miss opportunity to connect with your peers prior to tomorrow’s Executive Summit. Please join your colleagues for an evening of good food, wine, and lively networking.

7:30am - 8:15am  Registration & Breakfast

8:15am - 9:00am  Keynote

Rising to the Occasion — The Information Executive's Growing Power and Responsibility

Ryan Boulais headshot

Ryan Boulais

CISO

AES Corporation

Jamie Holcombe headshot

Jamie Holcombe

Chief Information Officer

United States Patent & Trademark Office

Roberta Hyland headshot

Roberta Hyland

Chief Data Officer

National Student Clearinghouse

With threat levels and vulnerabilities becoming more advanced in today’s hybrid workplace, company leadership is depending on the CIOs, CISOs, CDOs and other information executives to take charge, anticipate attacks and limit risks. Building relationships and successfully wielding the power of your position is crucial in this new, shifting environment.

Today’s CIOs and CISOs should know: 

  • How to speak to leadership in relatable, business-focused terms
  • How to best utilize the budget and manpower secured inboard negotiations
  • What it takes to not only survive but grow stronger, in an ever-challenging business climate

9:00am - 9:15am  Break

9:15am - 10:00am  Breakout Session

Never Waste a Breach — Lessons from a Ransomware Survivor

Randy Marchany headshot

Randy Marchany

CISO

Virginia Tech

They say you can’t know the impact of a ransomware attack until you’ve lived through one. But what if that’s not entirely true? What if you could gain all the post-breach wisdom of a cyber attack veteran, without putting your company at risk?  

Get ready to learn:

  • The keys to a quick and painless ransomware recovery
  • How to avoid paying into bad actors
  • Real-life tools and techniques for identifying and protecting your most sensitive data

9:15am - 10:00am  Executive Boardroom

Connecting Business, Data, and Technology

Lawrence Anderson headshot

Lawrence Anderson

Deputy CIO

Department of Commerce

Kamalika Sandell headshot

Kamalika Sandell

CIO

New Jersey Institute of Technology

According to Gartner, the challenge for many IT and business leaders today is to instill a culture of data-driven decision-making  across the organization. Those who want to exploit the potential of new data and advanced analytics capabilities at scale typically face numerous challenges. It's critical to develop a strong, clear strategy connecting business, technology, and data and analytics to maintain your competitive advantage and mitigate these challenges.

In this session, we'll:

  • Discuss best practices for designing data and analytics programs
  • Identify and define quick-win opportunities supporting the business data strategy
  • Brainstorm technology and resource alignment

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact your event Program Manager, Haydn McKee (haydn.mckee@evanta.com).

9:15am - 10:00am  Executive Boardroom

Activating a Cybersecurity Force for a New Era

Bob Turner headshot

Bob Turner

Field CISO

Fortinet

Joseph Dyer headshot

Joseph Dyer

CISO

ICF

Amit Khosla headshot

Amit Khosla

Business Information Security Officer

Fannie Mae

With an increase in threat vectors comes the increased need for a sound yet dynamic cybersecurity program. CIOs must take a proactive approach in ensuring cybersecurity risk is considered at every step, even in times of rapid disruption. 

Join this boardroom for a discussion on:

  • Managing third parties and holding them to cybersecurity standards
  • Quantifying, measuring, and communicating risk across the organization
  • Upskilling your cybersecurity teams to stay ahead of emerging threats

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact your event Program Manager, Haydn McKee (haydn.mckee@evanta.com).

9:15am - 10:00am  Executive Boardroom

Sorting and Protecting New APIs in the Era of Public Cloud

Chris McCauley headshot

Chris McCauley

Vice President, API Strategy & Platform Adoption

Axway

Nicolas Leshock headshot

Nicolas Leshock

CIO

General Dynamics

Ryan Boulais headshot

Ryan Boulais

CISO

AES Corporation

SaaS and public cloud services are driving a fundamental paradigm shift and a resulting API explosion. As we do our best to navigate this newly-grown jungle of connectivity, it can be hard to notice system vulnerabilities.

Let’s start talking about:

  • Ways to manage and protect these seemingly-endless connections
  • Best practices for distributing APIs through Cloud and SaaS
  • The public cloud transition process and why it doesn’t necessarily mean starting over

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact your event Program Manager, Haydn McKee (haydn.mckee@evanta.com).

10:00am - 10:30am  Networking Break

10:30am - 11:15am  Breakout Session

Managing Knowledge Workers, Tele-work Jealousies and Enterprise Risk

Howard Spira headshot

Howard Spira

Senior Vice President and CIO

Export-Import Bank of the United States

During the workplace evolution, Howard Spira, SVP and CIO of the Export-Import Bank of the United States, was brave enough to commit his ideas regarding a metamorphic work culture to publication. Now, still admittedly mid-journey, he's eager to refine these findings with your help.

Join Howard to workshop:

  • Workplace culture maintenance techniques
  • Solutions for a tired and risk-susceptible talent pool
  • Ways of staying ahead of our new and often-challenging work dynamics

10:30am - 11:15am  Breakout Session

Driving an Agenda That Enables and Transforms Your Business

Robert DeVito headshot

Robert DeVito

Global Director, Customer & Partner Sales Engineering

Google

Kevin Coyne headshot

Kevin Coyne

Director for the Office of Technology Evaluation

U.S. Department of Commerce Bureau of Industry and Security

Chris Nelson headshot

Chris Nelson

EVP & CIO

Beacon Roofing

One of the biggest challenges facing the modern CIO is balance. When it comes to business transformation, the sky is the limit…until you run into budget, time and resource constraints. How can CIOs balance these real limitations while encouraging their teams to dream big and come up with outside-the-box solutions?

Join this panel to discuss:

  • Crafting a technology and cultural transformational strategy
  • Successful frameworks that allow space for a “test fast, learn quick” environment
  • Strategies for enabling and securing a hybrid WFH workforce

10:30am - 11:15am  Executive Boardroom

Vulnerability Management — Prioritizing Zero-Day Threats

Brett Conlon headshot

Brett Conlon

Chief Information Security Officer

Edelman Financial Engines

Jerry Stabile headshot

Jerry Stabile

Area Vice President

deepwatch

Mark Booth headshot

Mark Booth

CIO

Perdue Farms

Identifying, classifying and mitigating vulnerabilities continues to be a cornerstone of CISOs overarching risk management strategy. But how are you prioritizing and mitigating zero-day vulnerabilities? 

Join this boardroom discussion to learn how to: 

  • Ensure you have visibility of your organization's assets, threats, and vulnerabilities
  • Decrease your time to remediate vulnerabilities by leveraging new approaches, tools, and people
  • Profile assets by function, services, environment, and life cycle

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact your event Program Manager.


11:15am - 11:25am  Break

11:25am - 12:40pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:45am - 1:15pm  Lunch Service

12:40pm - 1:00pm  Break

1:00pm - 1:35pm  Keynote

The Business Value of a SASE — Zero-Trust Journey

Nathan Smolenski headshot

Nathan Smolenski

CISO, Head of Cyber Intelligence Strategy

Netskope

With people working remotely and most user traffic destined for SaaS and cloud, network security requires transformation. It’s no longer efficient or cost-effective to route traffic through the corporate network to apply security controls. Adopting a Secure Access Service Edge (SASE) Architecture while focusing on Zero-Trust principles ensures that your employees can be productive and secure working from anywhere.

In this session, we will discuss:

  • The economics and business case for a SASE journey
  • Best practices for implementing Zero Trust within a SASE architecture
  • The importance of granular Cloud and SaaS visibility in a SASE architecture

1:35pm - 1:50pm  Break

1:50pm - 2:35pm  Breakout Session

An In-Depth Look at Present and Future eCrime Threats

Jason Rivera headshot

Jason Rivera

Director - Strategic Threat Advisory Group, Global

CrowdStrike

Listen in as Jason Rivera, Director - Strategic Threat Advisory Group, Global, CrowdStrike shares the latest and most relevant intelligence trends pertaining to criminal cyber threat actors, ransomware capabilities, and their associated tactics, techniques, & procedures (TTPs). 

Topics covered will include:

  • Initial access mechanisms
  • Post-exploitation techniques
  • Ransomware capabilities and TTPs

1:50pm - 2:35pm  Executive Boardroom

Next Gen Innovation Offense — Uniting DevSecOps

Michael Levin headshot

Michael Levin

Vice President, Enterprise Information Security - Optum Health

UnitedHealth Group

Jamie Holcombe headshot

Jamie Holcombe

Chief Information Officer

United States Patent & Trademark Office

Matt Howard headshot

Matt Howard

SVP & Chief Marketing Officer

Sonatype

This is NOT your typical security conversation. We won’t be talking about how to play better "perimeter defense" at the end of your software supply chain. Instead, we will be talking about how to play better digital “innovation offense” as next-generation software supply chain attacks become more sinister with bad actors actively injecting malicious code into open source projects that feed the global software supply chain.

Join us to discuss:

  • The prevalence of software supply chain attacks with real-world examples such as dependency confusion and how to continuously identify and remediate open source risk, without slowing down innovation
  • Ways to integrate security guardrails directly within your DevOps pipeline
  • The importance of uniting developers, security, and operations on the same team

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact your event Program Manager.

1:50pm - 2:35pm  Executive Boardroom

Back to Basics — Cybersecurity Accountability and Hygiene

André Mendes headshot

André Mendes

Acting CIO

Department of Commerce

Izhar Mujaddidi headshot

Izhar Mujaddidi

VP, CISO

Beacon Health Options

Alan Dare headshot

Alan Dare

Senior Director

Tanium

According to Gartner's research, 27% more boards of directors now see cybersecurity as a threat to the business at large, no longer limited to the realm of IT.  Though the responsibility for cybersecurity strategies is now spreading across the enterprise and despite expanded awareness of security hygiene, well-intentioned users remain a major area of risk for every organization. How can CIOs establish new governance for this shared accountability and integrate cyber hygiene into the very fabric of the enterprise?

Join this boardroom session as CIOs discuss:

  • Involving more organizational decision-makers in cybersecurity efforts
  • Holding users accountable for good security hygiene
  • Helping the most complex organizations increase user and asset visibility to prevent breaches, outages and disruptions

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact your event Program Manager, Haydn McKee (haydn.mckee@evanta.com).

2:35pm - 3:05pm  Networking Break

3:05pm - 3:40pm  Keynote

Self-Disruption and the Keys to Digital Transformation

Shamim Mohammad headshot

Shamim Mohammad

EVP, Chief Information and Technology Officer

CarMax Inc

About five years ago, CarMax leadership decided to shock the system and launch a company-wide journey to digitalization. It would require some self-disruption but the payoff wouldn't take long. Today, technology reigns an integral part of the overall business strategy and CarMax's award-winning digital organization thrives — more flexible, nimble and ready for rapid change.  

You'll learn:

  • The benefits of marrying tech and business strategy
  • Why you should disrupt yourself before something else can
  • What hurdles you can expect while developing your change-ready team

3:40pm - 4:10pm  Closing Reception & Prize Drawing

6:00pm - 8:30pm  Governing Body Welcome Reception

Governing Body Private Dinner

Exclusive to Governing Body members and select guests, this dinner is a can’t-miss opportunity to connect with your peers prior to tomorrow’s Executive Summit. Please join your colleagues for an evening of good food, wine, and lively networking.

7:30am - 8:15am  Registration & Breakfast

8:15am - 9:00am  Keynote

Rising to the Occasion — The Information Executive's Growing Power and Responsibility

Ryan Boulais headshot

Ryan Boulais

CISO

AES Corporation

Jamie Holcombe headshot

Jamie Holcombe

Chief Information Officer

United States Patent & Trademark Office

Roberta Hyland headshot

Roberta Hyland

Chief Data Officer

National Student Clearinghouse

With threat levels and vulnerabilities becoming more advanced in today’s hybrid workplace, company leadership is depending on the CIOs, CISOs, CDOs and other information executives to take charge, anticipate attacks and limit risks. Building relationships and successfully wielding the power of your position is crucial in this new, shifting environment.

Today’s CIOs and CISOs should know: 

  • How to speak to leadership in relatable, business-focused terms
  • How to best utilize the budget and manpower secured inboard negotiations
  • What it takes to not only survive but grow stronger, in an ever-challenging business climate

9:00am - 9:15am  Break

9:15am - 10:00am  Breakout Session

Never Waste a Breach — Lessons from a Ransomware Survivor

Randy Marchany headshot

Randy Marchany

CISO

Virginia Tech

They say you can’t know the impact of a ransomware attack until you’ve lived through one. But what if that’s not entirely true? What if you could gain all the post-breach wisdom of a cyber attack veteran, without putting your company at risk?  

Get ready to learn:

  • The keys to a quick and painless ransomware recovery
  • How to avoid paying into bad actors
  • Real-life tools and techniques for identifying and protecting your most sensitive data

9:15am - 10:00am  Executive Boardroom

Connecting Business, Data, and Technology

Lawrence Anderson headshot

Lawrence Anderson

Deputy CIO

Department of Commerce

Kamalika Sandell headshot

Kamalika Sandell

CIO

New Jersey Institute of Technology

According to Gartner, the challenge for many IT and business leaders today is to instill a culture of data-driven decision-making  across the organization. Those who want to exploit the potential of new data and advanced analytics capabilities at scale typically face numerous challenges. It's critical to develop a strong, clear strategy connecting business, technology, and data and analytics to maintain your competitive advantage and mitigate these challenges.

In this session, we'll:

  • Discuss best practices for designing data and analytics programs
  • Identify and define quick-win opportunities supporting the business data strategy
  • Brainstorm technology and resource alignment

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact your event Program Manager, Haydn McKee (haydn.mckee@evanta.com).

9:15am - 10:00am  Executive Boardroom

Sorting and Protecting New APIs in the Era of Public Cloud

Chris McCauley headshot

Chris McCauley

Vice President, API Strategy & Platform Adoption

Axway

Nicolas Leshock headshot

Nicolas Leshock

CIO

General Dynamics

Ryan Boulais headshot

Ryan Boulais

CISO

AES Corporation

SaaS and public cloud services are driving a fundamental paradigm shift and a resulting API explosion. As we do our best to navigate this newly-grown jungle of connectivity, it can be hard to notice system vulnerabilities.

Let’s start talking about:

  • Ways to manage and protect these seemingly-endless connections
  • Best practices for distributing APIs through Cloud and SaaS
  • The public cloud transition process and why it doesn’t necessarily mean starting over

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact your event Program Manager, Haydn McKee (haydn.mckee@evanta.com).

10:00am - 10:30am  Networking Break

10:30am - 11:15am  Breakout Session

Managing Knowledge Workers, Tele-work Jealousies and Enterprise Risk

Howard Spira headshot

Howard Spira

Senior Vice President and CIO

Export-Import Bank of the United States

During the workplace evolution, Howard Spira, SVP and CIO of the Export-Import Bank of the United States, was brave enough to commit his ideas regarding a metamorphic work culture to publication. Now, still admittedly mid-journey, he's eager to refine these findings with your help.

Join Howard to workshop:

  • Workplace culture maintenance techniques
  • Solutions for a tired and risk-susceptible talent pool
  • Ways of staying ahead of our new and often-challenging work dynamics

10:30am - 11:15am  Breakout Session

Driving an Agenda That Enables and Transforms Your Business

Robert DeVito headshot

Robert DeVito

Global Director, Customer & Partner Sales Engineering

Google

Kevin Coyne headshot

Kevin Coyne

Director for the Office of Technology Evaluation

U.S. Department of Commerce Bureau of Industry and Security

Chris Nelson headshot

Chris Nelson

EVP & CIO

Beacon Roofing

One of the biggest challenges facing the modern CIO is balance. When it comes to business transformation, the sky is the limit…until you run into budget, time and resource constraints. How can CIOs balance these real limitations while encouraging their teams to dream big and come up with outside-the-box solutions?

Join this panel to discuss:

  • Crafting a technology and cultural transformational strategy
  • Successful frameworks that allow space for a “test fast, learn quick” environment
  • Strategies for enabling and securing a hybrid WFH workforce

10:30am - 11:15am  Executive Boardroom

Vulnerability Management — Prioritizing Zero-Day Threats

Brett Conlon headshot

Brett Conlon

Chief Information Security Officer

Edelman Financial Engines

Jerry Stabile headshot

Jerry Stabile

Area Vice President

deepwatch

Mark Booth headshot

Mark Booth

CIO

Perdue Farms

Identifying, classifying and mitigating vulnerabilities continues to be a cornerstone of CISOs overarching risk management strategy. But how are you prioritizing and mitigating zero-day vulnerabilities? 

Join this boardroom discussion to learn how to: 

  • Ensure you have visibility of your organization's assets, threats, and vulnerabilities
  • Decrease your time to remediate vulnerabilities by leveraging new approaches, tools, and people
  • Profile assets by function, services, environment, and life cycle

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact your event Program Manager.


11:15am - 11:25am  Break

11:25am - 12:40pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:45am - 1:15pm  Lunch Service

12:40pm - 1:00pm  Break

1:00pm - 1:35pm  Keynote

The Business Value of a SASE — Zero-Trust Journey

Nathan Smolenski headshot

Nathan Smolenski

CISO, Head of Cyber Intelligence Strategy

Netskope

With people working remotely and most user traffic destined for SaaS and cloud, network security requires transformation. It’s no longer efficient or cost-effective to route traffic through the corporate network to apply security controls. Adopting a Secure Access Service Edge (SASE) Architecture while focusing on Zero-Trust principles ensures that your employees can be productive and secure working from anywhere.

In this session, we will discuss:

  • The economics and business case for a SASE journey
  • Best practices for implementing Zero Trust within a SASE architecture
  • The importance of granular Cloud and SaaS visibility in a SASE architecture

1:35pm - 1:50pm  Break

1:50pm - 2:35pm  Breakout Session

An In-Depth Look at Present and Future eCrime Threats

Jason Rivera headshot

Jason Rivera

Director - Strategic Threat Advisory Group, Global

CrowdStrike

Listen in as Jason Rivera, Director - Strategic Threat Advisory Group, Global, CrowdStrike shares the latest and most relevant intelligence trends pertaining to criminal cyber threat actors, ransomware capabilities, and their associated tactics, techniques, & procedures (TTPs). 

Topics covered will include:

  • Initial access mechanisms
  • Post-exploitation techniques
  • Ransomware capabilities and TTPs

1:50pm - 2:35pm  Executive Boardroom

Next Gen Innovation Offense — Uniting DevSecOps

Michael Levin headshot

Michael Levin

Vice President, Enterprise Information Security - Optum Health

UnitedHealth Group

Jamie Holcombe headshot

Jamie Holcombe

Chief Information Officer

United States Patent & Trademark Office

Matt Howard headshot

Matt Howard

SVP & Chief Marketing Officer

Sonatype

This is NOT your typical security conversation. We won’t be talking about how to play better "perimeter defense" at the end of your software supply chain. Instead, we will be talking about how to play better digital “innovation offense” as next-generation software supply chain attacks become more sinister with bad actors actively injecting malicious code into open source projects that feed the global software supply chain.

Join us to discuss:

  • The prevalence of software supply chain attacks with real-world examples such as dependency confusion and how to continuously identify and remediate open source risk, without slowing down innovation
  • Ways to integrate security guardrails directly within your DevOps pipeline
  • The importance of uniting developers, security, and operations on the same team

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact your event Program Manager.

1:50pm - 2:35pm  Executive Boardroom

Back to Basics — Cybersecurity Accountability and Hygiene

André Mendes headshot

André Mendes

Acting CIO

Department of Commerce

Izhar Mujaddidi headshot

Izhar Mujaddidi

VP, CISO

Beacon Health Options

Alan Dare headshot

Alan Dare

Senior Director

Tanium

According to Gartner's research, 27% more boards of directors now see cybersecurity as a threat to the business at large, no longer limited to the realm of IT.  Though the responsibility for cybersecurity strategies is now spreading across the enterprise and despite expanded awareness of security hygiene, well-intentioned users remain a major area of risk for every organization. How can CIOs establish new governance for this shared accountability and integrate cyber hygiene into the very fabric of the enterprise?

Join this boardroom session as CIOs discuss:

  • Involving more organizational decision-makers in cybersecurity efforts
  • Holding users accountable for good security hygiene
  • Helping the most complex organizations increase user and asset visibility to prevent breaches, outages and disruptions

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to C-level executives). To reserve your seat, please contact your event Program Manager, Haydn McKee (haydn.mckee@evanta.com).

2:35pm - 3:05pm  Networking Break

3:05pm - 3:40pm  Keynote

Self-Disruption and the Keys to Digital Transformation

Shamim Mohammad headshot

Shamim Mohammad

EVP, Chief Information and Technology Officer

CarMax Inc

About five years ago, CarMax leadership decided to shock the system and launch a company-wide journey to digitalization. It would require some self-disruption but the payoff wouldn't take long. Today, technology reigns an integral part of the overall business strategy and CarMax's award-winning digital organization thrives — more flexible, nimble and ready for rapid change.  

You'll learn:

  • The benefits of marrying tech and business strategy
  • Why you should disrupt yourself before something else can
  • What hurdles you can expect while developing your change-ready team

3:40pm - 4:10pm  Closing Reception & Prize Drawing

December 13, 2021

December 14, 2021

We look forward to seeing you at an upcoming in-person gathering


Location


A block of rooms has been reserved at the Hyatt Regency Washington on Capitol Hill at a reduced conference rate. Reservations should be made online or by calling 1-800-233-1234. Please mention G-GART to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $185 USD (plus tax) is November 22, 2021.

Your Community Partners


CIO Thought Leader
Key Partners
Program Partners

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Haydn Mckee

Program Manager

971-717-6655

haydn.mckee@evanta.com