The Future of Cybersecurity

CISO Think Tank

June 27, 2024 - Chicago, IL

Visionaries

John Tryon

Deputy CISO

Health Care Service Corporation

Think Tank Speaker

Joined Health Care Service Corporation, the nation’s largest customer owned health insurer offering Blue Cross Blue Shield plans in Illinois, Montana, Oklahoma, New Mexico and Texas, in September of 2017 as DVP Information Security Architecture and Design. In this role, John was responsible for driving the future state Cyber Security Architecture with a focus on securely enabling HCSC’s use of the public cloud for sensitive workloads, overall modernization of HCSC’s Member facing and Enterprise Identity & Access Management products and enhancements to Cyber Defense capabilities. Promoted to Deputy CISO / Head of Information Security for Health Care Service Corporation (HCSC) in Fall of 2021. John is responsible for delivering a fiscally responsible and pragmatic Information Security program that securely enables the HCSC enterprise, systems development entities, and strategic initiatives. He is an Information Services Security thought leader with over twenty-five years combined experience with Fortune 500 firms in life sciences, healthcare and consumer products industries. Actively participates on Executive Customer Advisory Boards and Healthcare Industry Executive Leadership forums. John has a bachelor’s degree in computer science from Temple University and holds CISSP certification.

David Schaar

Director, IT Security & Compliance (CISO)

Genuine Cable Group

Think Tank Speaker

Genuine Cable Group (GCG) is a major value-added distributor of wire, cable, and related products to a variety of niche markets, including Industrial Automation, Building Infrastructure, Communications and Industrial OEM. GCG also has cable assembly operations and is proud to be a leading wire and cable provider to the U.S. Navy.

Kenneth Townsend

Global CISO

Ingredion

Think Tank Speaker

Founded in 1906, Ingredion together with its subsidiaries, refines corn and produces sweeteners and starches. The company also provides animal feed products; edible corn oil; refined corn oil to packers of cooking oil and to producers of margarine, salad dressings, shortening, mayonnaise, and other foods; and corn gluten feed used as protein feed for chickens, pet food, and aquaculture. The company is headquartered in Westchester, Illinois.

Abhay Shah

Head of Technology, Infosec Risk & Compliance

DoorDash

Think Tank Speaker

Dynamic and results-driven IT and Cybersecurity professional with a proven track record in risk management, compliance assurance, third-party security, and governance. Adept at building high-performing teams and implementing innovative technology compliance programs. Experienced in leading audits for global organizations, ensuring adherence to industry standards and regulations such as PCI DSS, SOC1, SOC2, ISO 27001, ITSOX, and GDPR. Skilled in developing information security policies, risk management, third-party security, and driving positive change. Holds certifications including CISA, CDPSE, and PCI Internal Self Assessor. Currently serving as Head of Technology & Cybersecurity Risk and Compliance Assurance at DoorDash, driving impactful decision-making and building scalable programs.

Erik Hart

CISO

Cushman & Wakefield

Think Tank Speaker

Erik Hart oversees global information security for Cushman & Wakefield, one of the world’s largest commercial real estate services firms. A recognized thought leader with more than 20 years of experience in providing information security services to various industries and organizations, he also serves in an advisory role for numerous companies and organizations in the information security field, including Mimecast, CrowdStrike, InfraGard Chicago Members Alliance and Western Illinois University. Before joining Cushman & Wakefield in 2018, he served as CISO and Director of IT Risk Management for Zebra Technologies, a provider of mobile, logistics and point-of-sale technology and systems to retail, health care, transportation, manufacturing and other industries. Erik earned his Bachelors from Western Illinois University and Masters from Western Governors University.

Cole Sinkford

Global CISO

GlobalFoundries

Think Tank Speaker

Cole Sinkford the Global CISO at Globalfoundries Inc. Prior to this he was GE Renewable Energy’s Global Chief Information and Product Cyber Security Officer, responsible for cybersecurity across the organization. In this role, he is responsible for all aspects of cybersecurity strategy and operations for Renewable Energy products and enterprise. Prior to his current role, Cole served as the Deputy Chief Information Security officer of Renewable Energy, establishing Renewables’ standalone Cybersecurity capabilities. Prior to that, Cole spent 3 years as part of GE’s Corporate Audit Staff, leading numerous projects and audits across the Digital Technology and business environments. Cole began his career as an Aviation DTLP located in Cincinnati, OH and now resides in Chicago, IL. Cole holds a bachelor’s degree in Electrical Engineering from the University of Cincinnati.

Richard Rushing

CISO

Motorola Mobility Inc

Think Tank Speaker

Mr. Richard Rushing is the Chief Information Security Officer for Motorola Mobility LLC.; Richard participates in several corporate, community, private, and government Security Council’s and working groups setting standards, policies, and solutions to current and emerging security issues. As Chief Information Security Officer for Motorola Mobility, he has led the security effort by developing an international team to tackle the emerging threats of mobile devices, targeted attacks, and cyber-crime. He organized developed and deployed practices, tools and techniques to protect the intellectual property across the worldwide enterprise. A much-in-demand international speaker on information security Richard has presented at many leading security conferences and seminars around the world.

John Kellerhals

President / CISO

InfraGard

Think Tank Speaker

Innovative executive that has experience making sound business decisions and can think rationally in difficult situations. Visualizes the big picture and provides proper context and perspective tailored for the target audience. Clearly articulates the mission, standards, and priorities to achieve strategic and tactical objectives.

June 27, 2024

Agenda

All times Central Time

8:30 AM-9:00 AM

Registration


9:00 AM-9:30 AM

Morning Networking


9:30 AM-9:40 AM

Opening Remarks


9:40 AM-10:05 AM
Vision Voices Keynote

Cyber Security Evolution of Artificial Intelligence (AI): Friend or Foe?

The potential of Artificial Intelligence (AI) is vast, as it is now being utilized across all industries. With the combination of machine learning, AI has made significant improvements in the field of cybersecurity. Automated security systems, natural language processing, face detection, and automatic threat detection are some examples of how AI is revolutionizing cybersecurity. However, AI is also being used to create intelligent malware and attacks, which can bypass the most up-to-date security protocols, making it a double-edged sword. On the positive side, AI-enabled threat detection systems have the ability to predict new attacks and immediately notify administrators in case of a data breach.


10:10 AM-10:35 AM
Keynote

Building Cyber Fortitude: CISO Strategies for Resilient Cybersecurity

In the realm of building cyber resilience, organizations confront increased risk exposure amidst bold moves and evolving external challenges. Despite investments in technology and data, risk leaders, including CISOs, express difficulty in keeping pace with the persistent threat of cyber crises. However, in today's business landscape, discussions of digital transformation or reinvention are inseparable from considerations of cybersecurity. Looking ahead, stakeholders, from the board to frontline cybersecurity operations, pose critical questions about resiliency. This includes inquiries about the adequacy of efforts to safeguard the company and its customers in the face of cyber attacks. The focus shifts to identifying opportunities to minimize the impact on business and shareholder value through effective threat response. Embracing cybersecurity as a whole-of-business endeavor, organizations are urged to align themselves with business owners, adapting to changes in the cyber landscape and fortifying resilience against disruptions. Building confidence in the cybersecurity program becomes paramount in navigating the dynamic and challenging cyber landscape effectively.


10:35 AM-10:55 AM

Coffee Break


10:55 AM-11:10 AM
Vision Voices

Fortifying Cyber Security Together: A CISO's Call to Increase Cyber Transparency

In the evolving landscape of cybersecurity, the imperative to increase transparency takes center stage, driven by new laws and regulations mandating prompt reporting of cyber breaches. A notable example is the SEC's cyber disclosure rule, necessitating companies to report incidents within 72 hours. This shift from voluntary to mandatory information-sharing not only presents challenges but also opportunities. Compliance empowers organizations to construct more comprehensive defenses and actions against cyber risks. Regulatory guardrails provide confidence, allowing companies to explore, experiment, and compete securely. To stay ahead, a tech-enabled approach embedding cybersecurity across the enterprise is crucial. Looking forward, collaboration with the C-suite, particularly the Chief Risk Officer and General Counsel, is vital. Crafting a consistent narrative, setting priorities, and adapting to new cyber risk management practices become essential. Moreover, understanding board expectations, simplifying complex cyber regulations, and extending cybersecurity measures to external reporting teams are key considerations for navigating the regulatory landscape effectively.


11:15 AM-12:00 PM
Keynote Panel

CISO Mastery: The Nexus of Seamless Business-Technology Harmony

In 2024, CISOs and CIOs take center stage in fostering harmony between business and technology, balancing discipline and ownership. This session emphasizes their pivotal role, introducing 'Gen AI' as a crucial topic. Gen AI explores securing AI-driven technologies responsibly and ethically. Recognizing technology as a key enabler, CISOs navigate the evolving landscape, ensuring the integrity of data, driving innovation, and challenging traditional business models. Join us to explore the multifaceted responsibilities of CISOs, shaping a secure, agile, and ethically-driven future for organizations in the dynamic landscape of 2024.

Navigating the evolving landscape between business and technology demands a strategic blend of discipline and equilibrium. Recognizing that, for many organizations, technology is the business itself, this session underscores the imperative of understanding technology as a critical enabler across all facets of the organization. From the front lines to the back office, technology serves as a potent tool for creating value by processing data, driving innovation, and challenging traditional business models.


12:00 PM-1:00 PM

Lunch & Disruptor Showcase


12:40 PM-12:55 PM
Lunch & Disruptor Showcase

Cybersecurity Leadership in the Era of AI and ML: Navigating Innovation and Responsibility

In the dynamic realm of artificial intelligence (AI) and machine learning (ML), CISOs play a pivotal role in leveraging these advancements for enhanced cybersecurity. Strategic integration of AI and ML is essential for bolstering security measures, optimizing decision-making, and driving innovation. CISOs must adopt a comprehensive approach, considering the entire lifecycle of these technologies to ensure both efficiency and ethical use. Establishing robust governance frameworks becomes paramount, addressing biases, ensuring transparency, and minimizing unintended consequences.

Looking ahead, as AI and ML continue to advance, CISOs face evolving challenges and regulatory considerations. Proactive engagement involves staying informed about changing regulations, particularly in areas such as data privacy and ethical AI practices. CISOs should strive for a tech-enabled understanding of AI and ML systems, encompassing deployment, impact, and security measures. This approach positions organizations to navigate the regulatory landscape effectively, ensuring responsible and competitive integration of AI and ML into cybersecurity strategies.


1:00 PM-1:15 PM
Vision Voices

Building a Cyber Resilient Culture

The ability of an organization to prepare for, respond to, and recover from cyber threats. A cyber-resilient organization can adapt to known and unknown crises, threats, adversities, and challenges.

In today's dynamic digital landscape, fostering a cyber-resilient culture is paramount. It involves not only fortifying defenses against current threats but also anticipating and preparing for tomorrow's uncertainties. To achieve this, organizations must prioritize both technical measures and cultivate a workforce that is informed, vigilant, and adept at responding effectively. This holistic approach extends beyond individual organizations, requiring collaborative efforts, information sharing, and awareness of emerging threat landscapes to create a network of resilience in the face of evolving cyber challenges.


1:20 PM-2:05 PM
Panel

Data Empowerment: A CISO's Guide to Unlocking Strategic Value Safely

CISOs are challenged to redefine their role not only as guardians of security but also as enablers of responsible and innovative data utilization. This directive emphasizes the importance of striking a balance between data protection and leveraging the full potential of organizational data assets. CISOs must collaborate with stakeholders to establish robust data governance frameworks, ensuring compliance with privacy regulations while facilitating the ethical and strategic use of data. By unlocking the value of data, CISOs contribute to the organization's competitiveness, innovation, and overall digital transformation. This session explores strategies for CISOs to harness the power of data responsibly, thereby positioning cybersecurity as an integral driver of business success in the data-driven era.


2:10 PM-2:25 PM
Vision Voices

Guarding the Cloud: Navigating the Rising Tide of Cloud Vulnerabilities and Cyber Threats in 2024

Cloud computing services have become a cornerstone of modern business operations, providing organizations with the agility and scalability needed to thrive in the digital age. However, in 2024, the threat of cloud vulnerabilities will continue to grow as more companies adopt cloud services. Cybercriminals are constantly finding new ways to exploit vulnerabilities in cloud infrastructure, which can result in data breaches, unauthorized access, and financial losses. To mitigate the risks of cloud-related security incidents, businesses must prioritize implementing robust security measures such as multi-factor authentication, encryption, and regular penetration testing. Additionally, businesses must develop comprehensive incident response plans that take into account the unique challenges of cloud-based attacks. By taking these steps, businesses can protect themselves and their customers from the growing threat of cloud vulnerabilities in the digital age.


2:25 PM-2:45 PM

Networking Break


2:45 PM-3:00 PM
Disruptor

In the Cloud We Trust: Elevating Cybersecurity Leadership Amidst Cloud Advancements

In the era of rapid digital transformation, the surge in cloud adoption has revolutionized business operations, demanding a heightened focus on cloud security. CISOs, as guardians of organizational cybersecurity, are at the forefront of navigating this evolution. This session explores the imperative for CISOs to advance cloud security strategies, emphasizing the need for a comprehensive understanding of cloud infrastructure, data protection, and regulatory compliance. As organizations increasingly migrate to cloud environments, CISOs play a pivotal role in orchestrating security measures that not only defend against cyber threats but also foster innovation. A proactive approach to cloud security involves staying abreast of evolving technologies, anticipating regulatory shifts, and implementing robust governance frameworks. This abstract delves into the multifaceted responsibilities of CISOs in ensuring the security, resilience, and compliance of cloud-based operations, ultimately shaping a secure and agile future for organizations in the cloud-centric landscape.


3:05 PM-3:20 PM
Vision Voices

Cyber Hygiene 2024: Building a Secure Future in the Digital Era

In the digital age, practicing good cyber hygiene is essential to maintaining the security and integrity of personal and business data. However, in 2024, the lack of basic cyber hygiene practices will continue to be a major cause of cyber incidents. Cybercriminals exploit these vulnerabilities to gain unauthorized access to sensitive information, steal data, and launch damaging cyber-attacks. It's crucial for individuals and businesses to prioritize basic cyber hygiene practices, such as using strong passwords, regularly updating software, and backing up data. Additionally, individuals and businesses must educate themselves and their employees on cybersecurity best practices and the latest threats to stay ahead of the evolving threat landscape. By taking these proactive steps, individuals and businesses can protect themselves from cybercriminals who prey on poor cyber hygiene practices.


3:25 PM-4:00 PM
Fireside Chat

Ransomware and Cyber Readiness

Ransomware attacks are in the headlines, affecting businesses and individuals in all sectors. Through 2024, these attacks have continued to grow, resulting in significant financial losses, data theft, and reputational damage. Even businesses that have achieved a level of cybersecurity compliance remain at risk unless they have understood what impact a ransomware attack really means in the context of their business.

The good news? When you have identified how to protect your business from a ransomware attack you have already defined what needs to be done to reduce your total cyber risk exposure across all levels of attack. Ransomware might be the most reported attack, but is nowhere near the most expensive or damaging cyber attack you might face.


4:25 PM-4:30 PM

Closing Remarks & Raffle Giveaway


4:30 PM-5:30 PM

Cocktail Hour