The Future of IT & Cybersecurity
CISO & CIO Think Tank
September 19, 2023 - Chicago, IL
Speakers & Visionaries




Think Tank Speaker


Think Tank Speaker


Think Tank Speaker




Think Tank Speaker


Think Tank Speaker


Think Tank Speaker




Think Tank Speaker


Think Tank Speaker


Think Tank Speaker


Think Tank Speaker




Think Tank Speaker




Think Tank Speaker




Think Tank Speaker


Think Tank Speaker




Think Tank Speaker




Think Tank Speaker
September 19, 2023
Attend this event
View other dates for the Think Tank
8:30 AM-9:45 AM
Registration & Morning Networking
9:45 AM-10:00 AM
Opening Remarks
10:00 AM-10:25 AM
Data-Centric Security: Safeguarding the Cloud Era
In the cloud era, data-centric security is paramount to safeguarding sensitive information. Traditional security measures are inadequate in protecting dispersed data. In this fireside chat, we will discuss the principles of data-centric security, such as data discovery, access controls, and data classification. Prioritizing data protection optimizes resource allocation, improves incident response, and builds trust with stakeholders in today's data-driven world.
10:50 AM-11:15 AM
Future Proofing Security: Redesigning Cybersecurity Tactics Through AI and ML
In this talk, we'll examine the constraints of traditional cybersecurity and highlight the potential of AI in IT Operations Management. We'll discuss how AI enhances reactive and proactive tools, improves threat detection, risk assessment and reduces incident response times. Ultimately, we'll underscore the pivotal role AI plays in future-proofing your cybersecurity strategy
11:15 AM-11:30 AM
Coffee Break
11:30 AM-11:45 AM
Find Your Digital Ally
Finding a digital ally for your IT initiatives means identifying partners or stakeholders who understand the transformative power of technology in the business landscape. Such allies can offer strategic insights, financial support, or resources to help drive your digital strategy forward. With their backing, navigating the challenges of digital transformation becomes more collaborative and effective, ensuring that digital initiatives align perfectly with business objectives. How can CIOs and other digital leaders identify and align their digital strategies with ideal partners from the business?
11:50 AM-12:05 PM
Poor Cyber Hygiene
In the digital age, practicing good cyber hygiene is essential to maintaining the security and integrity of personal and business data. However, in 2023, the lack of basic cyber hygiene practices will continue to be a major cause of cyber incidents. Cybercriminals exploit these vulnerabilities to gain unauthorized access to sensitive information, steal data, and launch damaging cyber attacks. It's crucial for individuals and businesses to prioritize basic cyber hygiene practices, such as using strong passwords, regularly updating software, and backing up data. Additionally, individuals and businesses must educate themselves and their employees on cybersecurity best practices and the latest threats to stay ahead of the evolving threat landscape. By taking these proactive steps, individuals and businesses can protect themselves from cybercriminals who prey on poor cyber hygiene practices.
12:10 PM-12:25 PM
Using a Converged Approach: Prioritizing Compliance, Security, and Operations
Converged endpoint management can help teams prioritize and de-risk the IT estate. Converged vulnerability assessments help prioritize the most dangerous and active exploits based on context from the environment, reducing manual analysis. Converged reporting means that security and operations teams are working on the same real-time data to remediate and de-risk the IT estate. Finding, patching, and controlling the IT estate across multiple teams is more effective and easier to automate using a single converged platform.
12:25 PM-1:35 PM
Lunch & Disruptor Showcase
1:20 PM-1:35 PM
Shifting Cloud Native Observability to the Left
Cloud native environments have changed the way we develop software. Developers are now expected to deliver, maintain, and support all aspects of the platform. This can be overwhelming, but there is hope. By shifting left and reducing time on triaging failures, developers can spend more time on projects that matter.
This session will provide insights into DevOps and cloud native tips and tricks for spending more time on your projects and less time on call. Attendees will gain real-world actionable insights that bring value to their daily roles.


1:40 PM-2:05 PM
Using Strategic Security Testing to Transform Your Security Posture
Most security testing today is purely tactical- we find vulnerabilities and sometimes fix them. We use this process to satisfy compliance requirements and report point-in-time status to regulators, but we rarely learn anything about our overall security posture and use that information to change our strategy and priorities. Strategic, transformational security testing is the solution.
Strategic security testing uses aggregated data from individual penetration tests to reveal the root cause of persistent weaknesses in security posture due to broken processes and overwhelmed staff. Security and IT management can use that data to invest in training and solutions that are specifically targeted at organizational deficiencies. Moreover, a strategic security testing program will track improvements in overall security posture over time so those improvements can be communicated to senior leadership and the board.
2:10 PM-2:55 PM
AI-Driven Transformation: Ensuring Security and Scalable Growth in the Digital Era
The digital era has ushered in a new wave of opportunities and challenges, with AI emerging as a driving force behind transformative business strategies. Join our in-person panel to explore how CIOs and CISOs can orchestrate AI-driven transformations while safeguarding their organizations against evolving threats. Discover proven approaches for integrating AI into strategic decision-making processes, fostering a secure AI ecosystem alongside existing technologies, and optimizing operational efficiency to achieve scalable growth. Gain valuable insights from industry leaders on leveraging AI for competitive advantage and creating a resilient business environment in the face of growing cybersecurity risks.








3:00 PM-3:15 PM
Managing Cyber Risk with Quantification
Managing Cyber Risk is a constantly evolving, complex process to address a key challenge all modern enterprises face. Evolving from the qualitative "Red, Yellow, Green," to a more quantitatively grounded analysis is key to driving the right executive and board discussions to make the most effective decisions for your organization. To deliver on this, Cyber Risk leaders need an efficient way to deliver quantitative analysis against their organization's key cyber risks and their plans to mitigate them.


3:15 PM-3:35 PM
Networking Break
3:35 PM-3:50 PM
Cloud Data Security
According to Gartner, 79% of companies have experienced at least one cloud data breach during the pandemic. But the migration of critical business data to the cloud shows no sign of slowing. In fact, it’s accelerating. Yet, despite powerful trends and mounting threats, traditional data security has simply not kept pace with the cloud. Security teams still struggle to even understand the reality of what sensitive data they have in the cloud and its associated risks. This is not a sustainable status quo. Data is increasingly a business most valuable asset. And until organizations can align around a shared Data Reality, cloud security will remain several steps behind intensifying security threats and tightening data regulations.


3:55 PM-4:10 PM
Greatest Fears From Our Perspective
The biggest fear for many has not always been the technology but the potential of human error that could expose an organization to a cyberattack. CISOs have agreed that an employee carelessly falling victim to a malware, ransomware and phishing scams are the most likely cause of a security breach. How do we guard against human error without limiting employee efficiency and productivity. What’s working?
4:15 PM-5:00 PM
Social Engineering: New in 2023
Social engineering attacks are a growing concern for businesses and individuals alike, as cybercriminals continue to use advanced techniques to trick people into divulging sensitive information or performing actions that can lead to data breaches. In 2023, these attacks are expected to become even more sophisticated, making it increasingly challenging for individuals and businesses to identify and prevent them. To protect themselves, individuals and businesses must be vigilant and aware of these tactics. They must also implement comprehensive security measures, such as security awareness training, anti-phishing software, two-factor authentication, and access controls. Additionally, businesses must establish policies and procedures for responding to social engineering attacks, including incident response plans, data backup and recovery, and regular security assessments. By taking these proactive steps, businesses and individuals can better protect themselves from the risks associated with social engineering attacks in 2023 and beyond.






5:00 PM-5:15 PM
Leaders Explore Transferable Skills in the Evaluation Process
In today's swiftly evolving business landscape, the evaluation of leadership must transcend technical expertise and encompass transferable skills such as adaptability, communication, and problem-solving. This holistic approach equips leaders to excel amidst uncertainty, nurture team collaboration, and adeptly navigate multifaceted challenges. By emphasizing these skills, organizations can cultivate resilient leaders capable of driving sustained success and innovation in an ever-changing world.


5:05 PM-5:15 PM
Closing Remarks & Raffle Giveaway
5:15 PM-6:15 PM
Cocktail Hour
C-Vision laid out an articulate plan for us to be much more targeted, presented a stronger ROI and on top have come through with the Results they Promised. They really have become an adjunct "team for hire" building trust with us all along the way. There is no second guessing on this relationship and consistently over-deliver. My kind of Partner.
I had the pleasure of joining the C-Vision International, Nordics CISO Council Roundtable with a wonderful group of cyber executives. We had a wonderful, insightful conversation and the whole experience was enjoyable. I made great new contacts and reconnected with existing contacts on really important topics that matter to CISO’s and all in cybersecurity. I’d highly recommend joining in any C-Vision event.
C-Vision has helped my company a great deal. They have trusted deep relationships that make the sales process a lot easier. Everyone wants to get in front of C-level execs today. C-Vision cuts through the noise to help build long lasting business relationships!
C-Vision was really professional, responsive, listened and are very thoughtful in their approach. They are very high touch and truly care about the customer and end result. Our speakers were impressed with the format, and who they brought to the table. I can't recommend them enough and with so many out there, it is hard to find the right fit!
Intimate, immersive experiences provided by a group of individuals always available to support our needs. Fantastic organization and very high-level executives. The promise was delivered!
C-vision's events combine relevant topics with a suitable audience. I found great value at my last attendance, and would definitely consider upcoming events.
Thoughtful discussion among experienced leaders regarding current challenges and complexities, and valuable exchange of pragmatic approaches and best practices. Well organized and facilitated.
A group very focused in bringing diversity to the discussion table
I love the engaging format of the councils. Very high level discussions and never a sales pitch. The C-Vision staff members are amazing.
A very warm welcome and interesting speakers. I was very pleased to be among such a dynamic group.
The process was very well organized by C-Vision. Perfect organization, honest and authentic speakers of high level.