The Future of IT & Cybersecurity

CISO & CIO Think Tank

September 19, 2023 - Chicago, IL

Speakers & Visionaries

Justin Metallo

CISO, Credit & Finance

Volkswagen of America, Inc

Think Tank Speaker

A proven and successful senior security leader with extensive technical and digital transformation experience, combined with a thorough understanding of technology. Justin has developed an extensive skillset across DevOps, AppSec and SecOps in addition to a strong network of contacts at a senior level across the security and development space, as well as more broadly across the industry. With a strong background in Product (Abbott, Beam Suntory), Finance (Volkswagen Group) and the National Security sector (Cyber Command, Joint Force HQ) spanning over 15 years, Justin's core expertise lies in helping organizations deliver transformational change in a safe and secure manner which is enabled by technology. An enthusiastic contributor to the business, passionate about customers and committed to making the world a safer place for you, your organization and your family. • Extensive Solution and secure Software Development experience • Digital transformation expertise • History of unblocking cloud markets and large platform migrations • Focused on growth and passionate about delivering solutions • Agent of change, creating a “growth mindset” culture in teams • Technology enthusiast with excellent knowledge right across the stack • Operates comfortably at C-Level (CISO/CRO/COO/CEO) and with business decision-makers • Equally comfortable with Technical and Security decision-makers • Experienced at working with all types of partners • Excellent presenter thought leader and speaker • Active Defense Security Clearance & approved National Security industry specialist Markets/Sector experience: Finance, Consumer Products, Social Platforms, Automotive, Gaming, Defence, National Security, Telecom, Medical & Healthcare, Biopharma.

Richard Rushing


Motorola Mobility Inc

Think Tank Speaker

Mr. Richard Rushing is the Chief Information Security Officer for Motorola Mobility LLC.; Richard participates in several corporate, community, private, and government Security Council’s and working groups setting standards, policies, and solutions to current and emerging security issues. As Chief Information Security Officer for Motorola Mobility, he has led the security effort by developing an international team to tackle the emerging threats of mobile devices, targeted attacks, and cyber-crime. He organized developed and deployed practices, tools and techniques to protect the intellectual property across the worldwide enterprise. A much-in-demand international speaker on information security Richard has presented at many leading security conferences and seminars around the world.

Ramprakash Ramamoorthy

Director - AI Research


Think Tank Speaker

Ramprakash Ramamoorthy leads the AI efforts for ManageEngine. Ramprakash has been instrumental in setting up ManageEngine's AI platform from scratch. He comes with a rich 11+ years of experience in building AI for the enterprises at ManageEngine., The AI platform currently serves over 6 billion requests a month and is growing strong. He is a passionate leader with a level-headed approach to emerging technologies, and a sought-after speaker at tech. conferences.

Asaf Kochan

President & Co-Founder

Sentra Inc.

Think Tank Speaker

President & Co-Founder of Sentra Former Commander of Unit 8200 (2017-2021) In 2021, I completed 31 years of service in the Israeli Defence Forces, reaching the rank of Brigadier General. My last assignment was commander of Unit 8200, widely considered one of the leading intelligence agencies in the world. While serving as the commander of Unit 8200, I applied a data-driven approach focused on applying insights across all levels of the organization. Leading the unit through uncertain times, I discovered that being resilient is more important than being smart and that teams which prioritize execution outperform those that just have a lot of ideas. I also found that diversity and a sense of meaning are elements shared by all high-performing teams. Today I'm the co-founder and President of Sentra, a data lifecycle security platform that protects data as it moves through cloud environments. Sentra provides automatic data discovery, classification, monitoring, and protection for cloud-first organizations - finding all sensitive data and understanding who has access to it, how it is being used, and the data’s security posture. This reduces the attack surface of critical data, helping enterprises leverage the scalability and speed of the cloud to drive business growth - while keeping their most sensitive data secure.

Calvin Nobles Ph.D.

Chair IT & Management (Former)

Illinois Institute of Technology

Think Tank Speaker

A recognized practitioner in human factors engineering and cybersecurity operations with 25 years of increasing responsibilities in leading security operations, advising senior executives on cyber policies, and driving enterprise-level solutions. An innovative and strategic leader with a record of delivering cyber solutions that impact national efforts; noted for driving change to achieve cybersecurity objectives.

Michael Boucher

Executive Director, Global Information Security


Think Tank Speaker

Jones Lang LaSalle Inc., is a professional services firm that specializes in real estate and investment management. The company also offers property and integrated facility management services. The company buys, builds, occupys and invests in a variety of assets including industrial, commercial, retail, residential and hotel real estate.

Paul Valente

CEO and Co-Founder

VISO Trust

Think Tank Speaker

Paul Valente is the current CEO & Co-Founder of VISO Trust. He was also the former CISO and built successful security teams and programs at ASAPP, LendingClub, and Restoration Hardware. Paul's third-party risk management programs have been vetted by hundreds of Fortune 1000 companies and his teams have vetted thousands of third parties.

Philip Burnett

Information Security Officer


Think Tank Speaker

Information Security executive with 20+ years of direct experience under DoD/Active Duty related duties and private sector. Expert in Strategic and Operational Information Security program design, measurement and execution. Certified Information Security Professional (CISSP) Certified Information Security Manager (CISM) Sans Security professional (GSEC) Masters Degree in Security management (MSM) Goals are to provide the absolute best security service to my company. To provide guidance, knowledge gained through experience to my staff and peers.

John Kellerhals

President / CISO


Think Tank Speaker

Innovative executive that has experience making sound business decisions and can think rationally in difficult situations. Visualizes the big picture and provides proper context and perspective tailored for the target audience. Clearly articulates the mission, standards, and priorities to achieve strategic and tactical objectives.

Lonnie Washington

Executive Director Infrastructure Services

City Colleges of Chicago

Think Tank Speaker

Responsible for managing infrastructure services for City Colleges of Chicago. City Colleges of Chicago, officially known as Community College District 508, is one of the nation's largest community college districts and the largest in Illinois. About 5,000 thousand faculty and staff help prepare 80,000 students each year to enter the workforce, pursue higher education and advance their careers. The District serves students on seven campuses and five satellite sites. It also oversees two restaurants and five child care centers.

Chris Ochynski

Director, Product Management


Think Tank Speaker

Chris Ochynski is a Director of Product Management at Tanium, overseeing cross-platform policy and configuration management, including Tanium Enforce, MDM, and ZeroTrust.

Cole Sinkford



Think Tank Speaker

Cole Sinkford the Global CISO at Globalfoundries Inc. Prior to this he was GE Renewable Energy’s Global Chief Information and Product Cyber Security Officer, responsible for cybersecurity across the organization. In this role, he is responsible for all aspects of cybersecurity strategy and operations for Renewable Energy products and enterprise. Prior to his current role, Cole served as the Deputy Chief Information Security officer of Renewable Energy, establishing Renewables’ standalone Cybersecurity capabilities. Prior to that, Cole spent 3 years as part of GE’s Corporate Audit Staff, leading numerous projects and audits across the Digital Technology and business environments. Cole began his career as an Aviation DTLP located in Cincinnati, OH and now resides in Chicago, IL. Cole holds a bachelor’s degree in Electrical Engineering from the University of Cincinnati.

Wade Lance

Field CISO

Synack, Inc.

Think Tank Speaker

Wade has been productizing new technologies in cyber security, education, and healthcare for more than 20 years. He has diverse experience in security solution design for global 1000 organizations, and a passion for mentoring and developing cyber security leaders.

Michael Gross

Manager, Cybersecurity Intelligence

Cleveland Clinic

Think Tank Speaker

With over 30 years of experience in the IT industry, including more than two decades specializing in cybersecurity, I am a seasoned professional known for visionary leadership and comprehensive expertise in safeguarding organizations from evolving cyber threats. Key Highlights: * Cybersecurity Visionary: Throughout my career, I have consistently developed and executed robust cybersecurity strategies that align seamlessly with organizational objectives. I excel at protecting critical assets, data, and systems while proactively identifying and mitigating risks. My specialties encompass advanced threat analysis, cyber risk management, incident response, security architecture design, and regulatory compliance. As a cybersecurity visionary, I have pioneered solutions that fortify organizations against emerging threats. * Agility and Problem-Solving: My career has been marked by my ability to tackle complex challenges with agility and innovation. I leverage my expertise in cybersecurity methodologies, industry best practices, and compliance standards to provide effective solutions. * Mentorship and Leadership: I take pride in guiding and mentoring cybersecurity teams to excel in vulnerability assessment, threat detection, incident response, and recovery. I am deeply committed to fostering a culture of continuous learning and professional growth. * Communication and Work Ethic: My strong work ethic, exceptional interpersonal skills, and adept relationship-building capabilities are complemented by my proficiency in multitasking and effective communication. I thrive on embracing challenging tasks and delivering results. I am passionate about the ever-evolving field of cybersecurity and committed to contributing my expertise to secure and protect businesses in the digital age. Let's connect and explore opportunities to collaborate or share insights in this dynamic industry.

Ari Weil

VP, GTM Strategy

Cyera US Inc.

Think Tank Speaker

With more than 20 years of cross-functional knowledge and experience focusing on data security, compliance, risk management, cloud adoption, digital transformation, and modern application architectures, Ariel (Ari) Weil leads Cyera’s go-to-market (GTM) efforts as the Vice President of GTM Strategy. As a hands-on executive, Ari brings his knowledge and expertise to Cyera’s customers as they navigate the evolving landscape of data risk and governance.

Yotam Segev

Co-Founder & CEO

Cyera US Inc.

Think Tank Speaker

Yotam Segev is the co-founder and CEO of Cyera, the leader in Cloud Data Security. Yotam is a cyber security expert with 15 years of experience in offensive cyber security and security architecture. Yotam is an alumni of Israel’s prestigious Talpiot program, where he met Tamar Bar-Ilan, Cyera’s co-founder and CTO. Together they served in cyber security leadership roles for over a decade in unit 8200, the Israeli Defense Force’s signals intelligence service. At the agency, they experienced firsthand the tremendous challenge of securing data in the cloud and founded Cyera to solve this problem. Cyera has raised over $60M in its first year of operations and is backed by leading venture capital firms Sequoia, Accel and Cyberstarts. Cyera’s mission is to enable organizations to unlock the true value of their data while keeping it secure.

Shane Coleman

VP, Solutions Engineering

Cyera US Inc.

Think Tank Speaker

Shane Coleman brings more than 20 years of combined security and compliance experience to his role as Head of Sales Engineering at Cyera. His extensive background involves leadership and engineering roles in networking, application, and data security at organizations that include Netskope, F5 Networks, vArmour, and Forescout Technologies. Shane brings this expert industry knowledge and experience supporting Cyera’s customers as they navigate the evolving landscape of data risk and governance. Holding a Master’s of Science in Operations & Technology Management from the Illinois Institute of Technology, as well as ISC2’s CISSP Certification, Shane lives in Chicago, Illinois with his wife and children.

Lee Painter

Global Head of IS Governance

Zurich Insurance Group

Think Tank Speaker

Lee has 20 years of experience in Cyber and Information Security. In his current role, he serves as the Global Head of Information Security Governance at Zurich Insurance group, a leading multi-line insurer that serves its customers in global and local markets. With about 55,000 employees, it provides a wide range of property and casualty, life insurance products and services in more than 215 countries and territories. Prior to Zurich Lee worked in various IT, Security, Governance, and Leadership roles including penetration testing, security consultant, network/domain administrator, and Director of Threat Analysis and Network Forensics for the US Navy’s enterprise environment. Lee has a significant amount of experience in Governance Risk and Compliance and works to maintain a current level of understanding on emerging threats as well as strategies to prepare, defend, and respond from an organizational standpoint.

September 19, 2023


All times Central Time

8:30 AM-9:00 AM


9:00 AM-9:30 AM

Morning Networking

9:30 AM-9:40 AM

Opening Remarks

10:00 AM-10:25 AM

Data-Centric Security: Safeguarding the Cloud Era

In the cloud era, data-centric security is paramount to safeguarding sensitive information. Traditional security measures are inadequate in protecting dispersed data. In this fireside chat, we will discuss the principles of data-centric security, such as data discovery, access controls, and data classification. Prioritizing data protection optimizes resource allocation, improves incident response, and builds trust with stakeholders in today's data-driven world.

10:50 AM-11:15 AM

Future Proofing Security: Redesigning Cybersecurity Tactics Through AI and ML

In this talk, we'll examine the constraints of traditional cybersecurity and highlight the potential of AI in IT Operations Management. We'll discuss how AI enhances reactive and proactive tools, improves threat detection, risk assessment and reduces incident response times. Ultimately, we'll underscore the pivotal role AI plays in future-proofing your cybersecurity strategy

11:15 AM-11:30 AM

Coffee Break

11:30 AM-11:45 AM

Find Your Digital Ally

 Finding a digital ally for your IT initiatives means identifying partners or stakeholders who understand the transformative power of technology in the business landscape. Such allies can offer strategic insights, financial support, or resources to help drive your digital strategy forward. With their backing, navigating the challenges of digital transformation becomes more collaborative and effective, ensuring that digital initiatives align perfectly with business objectives.  How can CIOs and other digital leaders identify and align their digital strategies with ideal partners from the business?

11:50 AM-12:05 PM
Vision Voices

Poor Cyber Hygiene

In the digital age, practicing good cyber hygiene is essential to maintaining the security and integrity of personal and business data. However, in 2023, the lack of basic cyber hygiene practices will continue to be a major cause of cyber incidents. Cybercriminals exploit these vulnerabilities to gain unauthorized access to sensitive information, steal data, and launch damaging cyber attacks. It's crucial for individuals and businesses to prioritize basic cyber hygiene practices, such as using strong passwords, regularly updating software, and backing up data. Additionally, individuals and businesses must educate themselves and their employees on cybersecurity best practices and the latest threats to stay ahead of the evolving threat landscape. By taking these proactive steps, individuals and businesses can protect themselves from cybercriminals who prey on poor cyber hygiene practices.

12:10 PM-12:25 PM

Using a Converged Approach: Prioritizing Compliance, Security, and Operations

Converged endpoint management can help teams prioritize and de-risk the IT estate. Converged vulnerability assessments help prioritize the most dangerous and active exploits based on context from the environment, reducing manual analysis. Converged reporting means that security and operations teams are working on the same real-time data to remediate and de-risk the IT estate. Finding, patching, and controlling the IT estate across multiple teams is more effective and easier to automate using a single converged platform.

In partnership with:

12:25 PM-1:35 PM

Lunch & Disruptor Showcase

1:20 PM-1:35 PM
Lunch & Disruptor Showcase

Shifting Cloud Native Observability to the Left

Cloud native environments have changed the way we develop software. Developers are now expected to deliver, maintain, and support all aspects of the platform. This can be overwhelming, but there is hope. By shifting left and reducing time on triaging failures, developers can spend more time on projects that matter.

This session will provide insights into DevOps and cloud native tips and tricks for spending more time on your projects and less time on call. Attendees will gain real-world actionable insights that bring value to their daily roles.

In partnership with:

1:40 PM-2:05 PM

Using Strategic Security Testing to Transform Your Security Posture

Most security testing today is purely tactical- we find vulnerabilities and sometimes fix them. We use this process to satisfy compliance requirements and report point-in-time status to regulators, but we rarely learn anything about our overall security posture and use that information to change our strategy and priorities.  Strategic, transformational security testing is the solution.

Strategic security testing uses aggregated data from individual penetration tests to reveal the root cause of persistent weaknesses in security posture due to broken processes and overwhelmed staff. Security and IT management can use that data to invest in training and solutions that are specifically targeted at organizational deficiencies. Moreover, a strategic security testing program will track improvements in overall security posture over time so those improvements can be communicated to senior leadership and the board.

In partnership with:

2:10 PM-2:55 PM

AI-Driven Transformation: Ensuring Security and Scalable Growth in the Digital Era

The digital era has ushered in a new wave of opportunities and challenges, with AI emerging as a driving force behind transformative business strategies. Join our in-person panel to explore how CIOs and CISOs can orchestrate AI-driven transformations while safeguarding their organizations against evolving threats. Discover proven approaches for integrating AI into strategic decision-making processes, fostering a secure AI ecosystem alongside existing technologies, and optimizing operational efficiency to achieve scalable growth. Gain valuable insights from industry leaders on leveraging AI for competitive advantage and creating a resilient business environment in the face of growing cybersecurity risks.

In partnership with:

3:00 PM-3:15 PM

Managing Cyber Risk with Quantification

Managing Cyber Risk is a constantly evolving, complex process to address a key challenge all modern enterprises face. Evolving from the qualitative "Red, Yellow, Green," to a more quantitatively grounded analysis is key to driving the right executive and board discussions to make the most effective decisions for your organization. To deliver on this, Cyber Risk leaders need an efficient way to deliver quantitative analysis against their organization's key cyber risks and their plans to mitigate them. 

In partnership with:

3:15 PM-3:35 PM

Networking Break

3:35 PM-3:50 PM

Cloud Data Security

According to Gartner, 79% of companies have experienced at least one cloud data breach during the pandemic. But the migration of critical business data to the cloud shows no sign of slowing. In fact, it’s accelerating. Yet, despite powerful trends and mounting threats, traditional data security has simply not kept pace with the cloud. Security teams still struggle to even understand the reality of what sensitive data they have in the cloud and its associated risks. This is not a sustainable status quo. Data is increasingly a business most valuable asset. And until organizations can align around a shared Data Reality, cloud security will remain several steps behind intensifying security threats and tightening data regulations.

3:55 PM-4:10 PM

Greatest Fears From Our Perspective

The biggest fear for many has not always been the technology but the potential of human error that could expose an organization to a cyberattack. CISOs have agreed that an employee carelessly falling victim to a malware, ransomware and phishing scams are the most likely cause of a security breach.   How do we guard against human error without limiting employee efficiency and productivity.  What’s working?

4:15 PM-5:00 PM
Vision Keynote Panel

Social Engineering: New in 2023

Social engineering attacks are a growing concern for businesses and individuals alike, as cybercriminals continue to use advanced techniques to trick people into divulging sensitive information or performing actions that can lead to data breaches. In 2023, these attacks are expected to become even more sophisticated, making it increasingly challenging for individuals and businesses to identify and prevent them. To protect themselves, individuals and businesses must be vigilant and aware of these tactics. They must also implement comprehensive security measures, such as security awareness training, anti-phishing software, two-factor authentication, and access controls. Additionally, businesses must establish policies and procedures for responding to social engineering attacks, including incident response plans, data backup and recovery, and regular security assessments. By taking these proactive steps, businesses and individuals can better protect themselves from the risks associated with social engineering attacks in 2023 and beyond.

5:00 PM-5:15 PM

Leaders Explore Transferable Skills in the Evaluation Process

In today's swiftly evolving business landscape, the evaluation of leadership must transcend technical expertise and encompass transferable skills such as adaptability, communication, and problem-solving. This holistic approach equips leaders to excel amidst uncertainty, nurture team collaboration, and adeptly navigate multifaceted challenges. By emphasizing these skills, organizations can cultivate resilient leaders capable of driving sustained success and innovation in an ever-changing world.

5:05 PM-5:15 PM

Closing Remarks & Raffle Giveaway

5:15 PM-6:15 PM

Cocktail Hour