CIO Chicago Summit | May 24, 2022 | Convene - 333 North Green Street - Chicago, IL, USA
Edward Wagoner
Executive Director & Chief Information Officer (Digital)
JLL
Edward Wagoner, Executive Director & Chief Information Officer (Digital) of JLL joins us for a keynote presentation as we look at the technology professional in the new era of transformation.
Edward will take us through how you build an IT and tech division from the ground up while restructuring IT from a foundational standpoint with various business technologies. Do you build, buy, or partner to push your department and company forward?
The CIO and IT leaders have moved from the back office to the front office where IT used to be a "nice to have" and now is a "must have". Join this session to learn how you can move to become a transformational leader at your organization.
Edward Wagoner
Executive Director & Chief Information Officer (Digital)
JLL
Amy Swotinsky
Vice President, Marketing
IBM
Amy Swotinsky is a dynamic, passionate leader who brings energy, a growth mindset, and a laser focus to everything she does. Having worked in tech, both at startups as well as at billion-dollar global enterprises, Amy shapes marketing strategies to grow businesses in ever-changing markets. Currently, Amy oversees the marketing organization for US industries at IBM and is responsible for driving growth in Top Accounts. She has expertise in empowering diverse teams and co-creating with Sales through a culture of experimentation with the speed of a startup. Previously, she led marketing for IBM Services spearheading the launch of the industry’s first AI-based services platform, which helped tech leaders harness their data to drive improved outcomes. Known as a creative leader and storyteller and having a keen interest in social responsibility, Amy was selected for the IBM Corporate Service Corps, where she worked closely with the Ghana Ministry of Health to help them achieve their vision for an accessible, affordable, and quality health care system. Amy is also a founding member of WPI’s Women’s Impact Network, a philanthropic group providing pathways to advance women in STEM, and the Vice Chair for The Possibility Project, a non-profit organization that empowers teenagers to transform their lives and communities through digital and live-performance storytelling. Before joining IBM, Amy was the Director of Marketing at Optiant, a startup where she spearheaded the company's marketing strategy and executed launches for its leading supply chain solutions. As Senior Product Manager at Akamai Technologies, she managed the P&L for several product lines and was instrumental in increasing sales and customer acquisitions for new industry solutions. Amy has also held a variety of Engineering Management positions, including driving the full product development lifecycle and launch while serving as both engineering project manager and marketing manager. Amy holds an MS in Systems Engineering from the University of Massachusetts-Lowell and a BS in Electrical Engineering from Worcester Polytechnic Institute. Amy received the 2021 Robert H. Goddard Alumni Award for Outstanding Professional Achievement. A native of Massachusetts and lifelong Red Sox fan, you can find Amy at an early morning boot camp when she’s not traveling the globe for business or adventure
Technology and transformation have always gone hand-in-hand, but the pace of transformational change accelerated over the last 2 years in every organization. IBM's VP of Marketing, Amy Swotinsky, will get our creative juices flowing as she shares stories and best practices sourced from thousands of IBM digital transformation engagements with the “new creators” - the change agents and forward thinkers in every organization - including yours. She’ll cover a wide-range of areas, from cybersecurity to AI and data-driven transformations, how to use hyper-automation to make your business supersonic, and give you the tools to get creative to solve your organization’s biggest challenges. Welcome to today's IBM.
Amy Swotinsky
Vice President, Marketing
IBM
Rita Fisher
CIO and EVP Supply Chain
Reynolds Consumer Products
Join Rita Fisher as she speaks on lessons learned on her personal journey leading her company through an IPO and adding responsibility
Rita Fisher
CIO and EVP Supply Chain
Reynolds Consumer Products
Motti Elloul
Director, Technical Services
Perception Point
The need to communicate, collaborate and do business on a global level has created a proliferation of cloud based applications and services. Email. Cloud Storage. Messaging platforms. CRM. Digital Apps and Services. Organizations continue to add new cloud channels to support their business needs. But with new channels come new security blind spots that must be addressed.
In this session we'll discuss:
Motti Elloul
Director, Technical Services
Perception Point
Colin Crowley
CX Advisor
Freshworks
Colin Crowley is CX Advisor at Freshworks and has spent over 12 years managing global customer experience organizations and promoting technological changemaking. He specializes in building customer service departments from the ground-up, with a focus on scalability, infrastructural agility, product innovation, and gold-standard quality and efficiency. Previously, he served as AVP of Consumer Transactions at the event ticket marketplace TicketNetwork, the inaugural VP of Customer Experience at the food tech company Freshly, and also SVP of Customer Experience at the fintech company Albert. Colin is also an award-winning playwright whose plays have been performed across fifteen states, as well as New York City and London.
The pandemic has led to a growing dependence on technology for customer support. Consumers are increasing their digital purchases by 160 percent and are expecting businesses to support them across their channels of choice like WhatsApp, Facebook Messenger, and more.
To stay competitive, businesses have responded by rapidly purchasing new point solutions to support customers on their channels of choice. Now the pressure is on the IT teams to ensure these siloed solutions work together smoothly. They need to deliver consistent cross-channel experiences for their customers’ journeys, an easy to use tech stack for their employees, and a future-proof IT strategy for their business leaders.
Join this session to learn:
Colin Crowley
CX Advisor
Freshworks
Michael Pegues
Chief Information Officer | Information Technology Division
City of Aurora, IL
Michael Pegues
Chief Information Officer | Information Technology Division
City of Aurora, IL
Ray Trygstad
Associate Director Cyber Security Education
Illinois Institute of Technology
Former Navy cybersecurity and security professional and higher education information technology director, now leading the field in curriculum development in IT and cybersecurity as a founder of the Information Technology and Cybersecurity degree programs at Illinois Institute of Technology in Chicago. Working with individuals across the fields as Chair of the ACM Special Interest Group on Information Technology Education (ACM SIGITE), a Commissioner on the ABET Computing Accreditation Commission, and a member of the NICE Community Coordinating Council gives him a keen understanding and perspectives on preparing the IT and cybersecurity workforce of the future.
Ray Trygstad
Associate Director Cyber Security Education
Illinois Institute of Technology
Kevin Bocek
VP, Security Strategy & Threat Intelligence
Venafi
The number of machines of all types – from Kubernetes, to cloud, to IoT – is on the rise. Every machine requires an identity – TLS, SSH, and code signing keys and certificates – that control encryption, authentication, and code execution. However, compromise, misuse, and fraud of machine identities are prime attack vectors for hackers. Errors are creating debilitating outages and resulting in millions of dollars in lost revenue and impacted customer satisfaction and trust. For all these reasons and more, Gartner has named Machine Identity Management a top cyber trend for 2021.
Attend this session to learn:
· Errors, outages, and incidents happen every day when machine identities fail
· The top machine identity attacks targeting your organisation and software supply chain
· How to use the machine identity threat model built on standard ATTACK
· Three things your organisation can do today to stay #fastsecure with Machine Identity Management
Kevin Bocek
VP, Security Strategy & Threat Intelligence
Venafi
Jennifer Cichoski
Director, Mid-west
Virsec Systems
In the world of ransomware, supply chain poisoning, zero-day attacks, and unknown vulnerabilities, milliseconds matter. Attackers can get access and manipulate workloads within minutes or even seconds.
Our current tools allow attackers to dwell for hours, days, weeks, and months.
There must be a better way.
Powerful tools are needed to help organizations stop being reactive and start being proactive. Adoption of new security tools and frameworks can make a big difference. Enterprises should not have to settle for response if protection can be achieved.
Join this session to learn how you can proactively protect your workloads from ransomware or other zero-day attacks in milliseconds and stop reacting to them after the fact. Patch your vulnerabilities at your own tempo without opening yourself up to costly breaches.
Jennifer Cichoski
Director, Mid-west
Virsec Systems
Greg Bee
VP - Chief Risk Officer & Chief Information Security Officer
Pekin Insurance
Greg Bee
VP - Chief Risk Officer & Chief Information Security Officer
Pekin Insurance
Llyr Garner
Mission Systems
Dispel
Cyber Security has long been following the strategy of static defense, i.e an exercise of building castles and, over time, adding additional walls and improving the ones one already had. This fell out of fashion in the physical world over a century ago because castles and other fixed fortifications are quite vulnerable to unanticipated forms of attack. In this session we will be focusing at why implementing a Moving Target Defense is needed and its benefits.
Llyr Garner
Mission Systems
Dispel
Paul Kim
Enterprise Account Executive
Torii
Paul Kim
Enterprise Account Executive
Torii
Brent Deterding
Chief Information Security Officer
Afni
Brent Deterding is an Executive CISO. Today his mission is to enable Afni and their ~10k employee workforce securely and confidently support their customers. Brent was previously a security practitioner with a security vendor for 20+ years. He specialized in threat detection, incident response, and security strategy. His efforts helped hundreds of organizations detect, respond, and mitigate attacks. Brent is a spirited and thoughtful conversationalist, and does not shy away from challenging topics. He has been known to hold a and defend few controversial opinions. He'll gladly share his views with you while enjoying a nice bourbon. Both Brent and his wife of 20 years share a passion for adoption, foster care, and leading youth.
Brent Deterding
Chief Information Security Officer
Afni
Richard Rushing
Chief Information Security Officer
Lenovo
Join Richard Rushing for a CISO Think Tank.
Cybersecurity Attacks are ever-increasing. Ransomware is shutting organizations around the globe. Cybersecurity has been around since the computer was invented and progressed into the foundations around many aspects of our lives. So when does Cybersecurity mature? Just what is Cybersecurity Maturity about? Does it mean that my Cybersecurity program can start “shaving now” and see a R-rated Movies, or could buy alcohol now? This humor-filled view of Cybersecure Maturity or immaturity.
Richard Rushing
Chief Information Security Officer
Lenovo
Dov Goldman
Director of Risk and Compliance
Panorays
Dov has years of experience in the third-party risk and compliance field, as well as a long history as a serial entrepreneur, software and network engineer. He focuses on the evolving best practices and industry standards in third-party management and regulatory compliance. Previously, Dov was VP of Innovation at Opus, Director of Product Marketing at Navigant, and Founder and CEO of Cognet Corp and Dynalog Technologies. Dov has spoken at industry events around the world and has been quoted in numerous industry press articles, as well as The Wall Street Journal, about information security and privacy.
InfoSec, IT risk and digital supply chain management professionals know the key to minimizing the risk of third-party breaches is to implement a comprehensive and efficient third-party security risk management (TPRSM) process. Dov Goldman discusses the increasing challenges surrounding third-party security as well as ways to efficiently and effectively manage the TPSRM process.
Dov Goldman
Director of Risk and Compliance
Panorays
Deepkia DiGiovine
VP Digital Applications and Connected Factory
Dover Corporation
Deepkia DiGiovine
VP Digital Applications and Connected Factory
Dover Corporation
Jigar Shah
Head of Identity and Access Management
R1 RCM
IAM has become central to many organizations security architecture today. Like a bouncer at the door of a nightclub with a list of who is allowed in, who isn’t, and who gets access to the VIP area – IAM allows your organization to have better visibility and protections of your systems. With that in mind, deciding what to do when it comes to IAM and what systems to have in place can be a nightmare. Jigar Shah is going to help us navigate through complex IAM system to give you the tools you need to make the best decisions possible.
Jigar Shah
Head of Identity and Access Management
R1 RCM
Alyssa Miller
Business Information Security Officer
S&P Global Ratings
What can a hacker possibly know about navigating the world of the corporate boardroom? Well, as it turns out, quite a bit actually. CISOs and senior security leaders have fought for years to get our place at the table and our voices heard in these high-level conversations. Now with cyber security on the top of everyone’s minds and even regulatory pressures to bring cyber security topics to the agenda, we’ve got that voice. Yet all to often security leaders find resistance and frustration trying to connect with the board and secure support for our initiatives.
In this session, life-long hacker turned executive security leader Alyssa Miller, digs into the common pitfalls that security leaders fall into. She’ll illustrate many of the counter productive strategies that some leaders still attempt with very little success. She’ll use the lessons of neuroscience, her own experiences, and the guiding principle of truly being a business enabler to shine light on better ways to make those conversations count. She’ll share practical tips from a hacker’s perspective that have proven invaluable in gaining the trust of board member and building excitement for security programs.
Alyssa Miller
Business Information Security Officer
S&P Global Ratings
Llyr Garner
Mission Systems
Dispel
Cyber Security has long been following the strategy of static defense, i.e an exercise of building castles and, over time, adding additional walls and improving the ones one already had. This fell out of fashion in the physical world over a century ago because castles and other fixed fortifications are quite vulnerable to unanticipated forms of attack. In this session we will be focusing at why implementing a Moving Target Defense is needed and its benefits.
Llyr Garner
Mission Systems
Dispel