The Future of Cybersecurity

CISO Think Tank

March 12, 2024 - Chicago, IL

Visionaries

Abhay Shah DoorDash
Abhay Shah

Head of Technology, Infosec Risk & Compliance

DoorDash

Think Tank Speaker

Dynamic and results-driven IT and Cybersecurity professional with a proven track record in risk management, compliance assurance, third-party security, and governance. Adept at building high-performing teams and implementing innovative technology compliance programs. Experienced in leading audits for global organizations, ensuring adherence to industry standards and regulations such as PCI DSS, SOC1, SOC2, ISO 27001, ITSOX, and GDPR. Skilled in developing information security policies, risk management, third-party security, and driving positive change. Holds certifications including CISA, CDPSE, and PCI Internal Self Assessor. Currently serving as Head of Technology & Cybersecurity Risk and Compliance Assurance at DoorDash, driving impactful decision-making and building scalable programs.

Richard Rushing Motorola Mobility Inc
Richard Rushing

CISO

Motorola Mobility Inc

Think Tank Speaker

Mr. Richard Rushing is the Chief Information Security Officer for Motorola Mobility LLC.; Richard participates in several corporate, community, private, and government Security Council’s and working groups setting standards, policies, and solutions to current and emerging security issues. As Chief Information Security Officer for Motorola Mobility, he has led the security effort by developing an international team to tackle the emerging threats of mobile devices, targeted attacks, and cyber-crime. He organized developed and deployed practices, tools and techniques to protect the intellectual property across the worldwide enterprise. A much-in-demand international speaker on information security Richard has presented at many leading security conferences and seminars around the world.

Kenneth Townsend Ingredion
Kenneth Townsend

Global CISO

Ingredion

Think Tank Speaker

Founded in 1906, Ingredion together with its subsidiaries, refines corn and produces sweeteners and starches. The company also provides animal feed products; edible corn oil; refined corn oil to packers of cooking oil and to producers of margarine, salad dressings, shortening, mayonnaise, and other foods; and corn gluten feed used as protein feed for chickens, pet food, and aquaculture. The company is headquartered in Westchester, Illinois.

Nitin Raina Thoughtworks
Nitin Raina

Global CISO

Thoughtworks

Think Tank Speaker

Nitin has 25+ years of experience in performing IT, Security and Risk leadership roles for various organizations and serves as a global advisor tasked with prioritizing and evaluating trade-offs and conflicts among various security initiatives within the realm of ThoughtWorks businesses. Proven leadership with key skills like security governance, compliance, budgeting, hiring, risk management, project management, mentoring, negotiation, and problem-solving skills demonstrated throughout his career. Expert in translating between technical and business contexts; people, processes, technical aspects of technology, and in assisting organizations delivering effective, secure, and business-enabling solutions. Stakeholders/CxO advisory experience in IT/ITes organizations. Customer-focused and strategic mentality. Problem-solving and process-oriented. Nitin holds a Bachelor's degree (B.S) in Electronics engineering and Masters (PGDIT) in Information technology. He also holds the Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM) industry certifications and Board Qualified Technology Executive (QTE).

Erik Hart Cushman & Wakefield
Erik Hart

CISO

Cushman & Wakefield

Think Tank Speaker

Erik Hart oversees global information security for Cushman & Wakefield, one of the world’s largest commercial real estate services firms. A recognized thought leader with more than 20 years of experience in providing information security services to various industries and organizations, he also serves in an advisory role for numerous companies and organizations in the information security field, including Mimecast, CrowdStrike, InfraGard Chicago Members Alliance and Western Illinois University. Before joining Cushman & Wakefield in 2018, he served as CISO and Director of IT Risk Management for Zebra Technologies, a provider of mobile, logistics and point-of-sale technology and systems to retail, health care, transportation, manufacturing and other industries. Erik earned his Bachelors from Western Illinois University and Masters from Western Governors University.

Cole Sinkford GlobalFoundries
Cole Sinkford

Global CISO

GlobalFoundries

Think Tank Speaker

Cole Sinkford the Global CISO at Globalfoundries Inc. Prior to this he was GE Renewable Energy’s Global Chief Information and Product Cyber Security Officer, responsible for cybersecurity across the organization. In this role, he is responsible for all aspects of cybersecurity strategy and operations for Renewable Energy products and enterprise. Prior to his current role, Cole served as the Deputy Chief Information Security officer of Renewable Energy, establishing Renewables’ standalone Cybersecurity capabilities. Prior to that, Cole spent 3 years as part of GE’s Corporate Audit Staff, leading numerous projects and audits across the Digital Technology and business environments. Cole began his career as an Aviation DTLP located in Cincinnati, OH and now resides in Chicago, IL. Cole holds a bachelor’s degree in Electrical Engineering from the University of Cincinnati.

John Kellerhals InfraGard
John Kellerhals

President / CISO

InfraGard

Think Tank Speaker

Innovative executive that has experience making sound business decisions and can think rationally in difficult situations. Visualizes the big picture and provides proper context and perspective tailored for the target audience. Clearly articulates the mission, standards, and priorities to achieve strategic and tactical objectives.

Philip Burnett Navistar
Philip Burnett

Information Security Officer

Navistar

Think Tank Speaker

Information Security executive with 20+ years of direct experience under DoD/Active Duty related duties and private sector. Expert in Strategic and Operational Information Security program design, measurement and execution. Certified Information Security Professional (CISSP) Certified Information Security Manager (CISM) Sans Security professional (GSEC) Masters Degree in Security management (MSM) Goals are to provide the absolute best security service to my company. To provide guidance, knowledge gained through experience to my staff and peers.

Steve Rubinow Illinois Institute of Technology
Steve Rubinow

Associate Teaching Professor, College of Computing

Illinois Institute of Technology

Think Tank Speaker

An exceptional, multifaceted, global executive, strategist and technology expert who has transformed companies in a variety of industries, including the New York Stock Exchange. Award-winning Chief Information and Technology Officer with deep experience on many boards and in university classrooms. • Versed in the latest advances in technology software and hardware. • Brings a multidisciplinary perspective and imagination to transforming industries from the bottom up in complex and highly competitive industries. • A visionary leader who often breaks free of conventional thinking and encourages others to do the same to create innovative strategies. • Valued for the exceptional ability to utilize existing and find new, substantial ways to use technology to improve and impact businesses, achieve company goals, reduce costs and develop people. • A creative problem-solver who generates first-in-industry business initiatives. Leader and manager of highly successful teams, who inspires and motivates people to perform at their highest levels. • Trusted advisor to top management. • A clear, persuasive communicator skilled at cultivating and fostering partnerships. • Extensive experience teaching university-level computer science courses. • Government clearance from major federal security, intelligence and law enforcement agencies for addressing cybersecurity/counter-terrorism issues.

David Schaar Genuine Cable Group
David Schaar

Director, IT Security & Compliance (CISO)

Genuine Cable Group

Think Tank Speaker

Genuine Cable Group (GCG) is a major value-added distributor of wire, cable, and related products to a variety of niche markets, including Industrial Automation, Building Infrastructure, Communications and Industrial OEM. GCG also has cable assembly operations and is proud to be a leading wire and cable provider to the U.S. Navy.

Ken Kazinski Abbott
Ken Kazinski

Global Application Security Sr Manager

Abbott

Think Tank Speaker

Ken Kazinski is the manager of Abbott Laboratories Attack Surface Management team and has over twenty years of experience in the field of cybersecurity. His current cybersecurity focus is in application security, which is enhanced with his substantial knowledge of system security in both government regulated and non-regulated industries. These environments have provided him with a deep contextual understanding on the impact of security in a variety of organizational environments. In his role at Abbott, Ken provides leadership, program vision, and integration guidance on attack surface areas, including Threat and Vulnerability Management, Application Security, Cloud Security, Mobility, and Brand Reputation. As an Air Force veteran with a Master of Science in Cybersecurity, Ken has used both his professional and educational experience to create critical application security programs at multiple Fortune 100 companies. Prior to joining Abbott, Ken managed application security for Johnson Controls, Power Solutions division. His professional and military experience has provided him with the opportunity to work and live in multiple countries around the world.

John Tryon Health Care Service Corporation
John Tryon

Deputy CISO

Health Care Service Corporation

Think Tank Speaker

Joined Health Care Service Corporation, the nation’s largest customer owned health insurer offering Blue Cross Blue Shield plans in Illinois, Montana, Oklahoma, New Mexico and Texas, in September of 2017 as DVP Information Security Architecture and Design. In this role, John was responsible for driving the future state Cyber Security Architecture with a focus on securely enabling HCSC’s use of the public cloud for sensitive workloads, overall modernization of HCSC’s Member facing and Enterprise Identity & Access Management products and enhancements to Cyber Defense capabilities. Promoted to Deputy CISO / Head of Information Security for Health Care Service Corporation (HCSC) in Fall of 2021. John is responsible for delivering a fiscally responsible and pragmatic Information Security program that securely enables the HCSC enterprise, systems development entities, and strategic initiatives. He is an Information Services Security thought leader with over twenty-five years combined experience with Fortune 500 firms in life sciences, healthcare and consumer products industries. Actively participates on Executive Customer Advisory Boards and Healthcare Industry Executive Leadership forums. John has a bachelor’s degree in computer science from Temple University and holds CISSP certification.

Arun Desouza
Arun Desouza

Managing Director and CISO

Profortis Solutions

Think Tank Speaker

Arun DeSouza is an award-winning thought leader with more than two decades of experience in global security leadership and organizational transformation. Working as CISO, DeSouza's areas of expertise include strategic planning, risk management, identity management, cloud computing, and privacy. DeSouza has also earned numerous industry accolades, including Top Global CISO by Cyber Defense Magazine, Top 10 InfoSec Professional by OnCon, and induction into the CISO Hall of Fame by the global Cyber Startup Observatory. Arun DeSouza's proven ability to set the strategic direction for security within the organization aligns with enterprise stakeholders to build strategic roadmaps and implement flexible security solutions.

Eric Chantin Center For Cyber Security Loyola University
Eric Chantin

Director Center of Cybersecurity

Center For Cyber Security Loyola University

Think Tank Speaker

Dr. Eric Chan-Tin is an associate professor in the Department of Computer Science and the Founding Director of the Loyola Center for Cybersecurity and Privacy at Loyola University Chicago. He received his Ph.D. degree from the University of Minnesota and his B.A. from Macalester College. His research areas are in network security, distributed systems, privacy, anonymity, and at the intersection of cybersecurity and social sciences. He has received over $5.5 million in funding from federal agencies such as NSF, NSA, and DoD, and from industry partners such as Motorola Solutions Foundation, Dr. Scholl Foundation, and Halliburton. He has published over 45 peer-reviewed papers. In 2020, he was recognized as a Master Researcher. He has given multiple talks at national and international academic and industry conferences.

Rogerio Godoy senhasegura
Rogerio Godoy

CMO

senhasegura

Think Tank Speaker

As an entrepreneur, he landed in the world of technology and software development when he became a partner in the company MediaPost Email Marketing. Despite his degree in Law, he specialized in Digital Marketing, Ecommerce Management, User Experience (UX), Digital Product Leadership & Product Management (PM), Growth Marketing, Data Analytics and, more recently, in Management of Exponential Business (XBA). As the CMO of senhasegura since 2018, he leads the brand's internationalization project in more than 50 countries, focusing on North America (USA), Europe (DACH) and the Middle East. He is also a speaker (Digitalks 2017/18/19; SEBRAE; Gartner IAM - Las Vegas - & Gartner Symposium - Orlando - USA 2022/23; Think Tank NYC and Chicago 2023; Cybersecurity Summit Brazil 2023; and etc) and a teacher (Comschool; Mirago; FATEC; etc.).

Grant Ecker
Grant Ecker

Founder, Chief Architect Forum. Former VP, Chief Enterprise Architect

Danaher

Think Tank Speaker

Grant Ecker is the Founder and Chairman of the Chief Architect Forum, and most recently the Vice President Chief Enterprise Architect at Danaher where he partnered closely with the architects across the company to lead strategy development, establish technology standards and to identify opportunities for modernization and transformation.  Prior to Danaher, Grant was the VP, Global Head of Architecture at Walgreens Boots Alliance, and he held a similar role at Medtronic. Earlier in Grant’s career he held architecture and management roles with expanding responsibility at Lowe’s and General Mills.  Grant is a Certified Professional Co-Active Coach, he received an MBA from University of Minnesota Carlson School of Management, and his BS in Computer Science from Washington University in St. Louis.  Grant is a board member of the Women in Architecture initiative and he holds various board advisory roles out of Chicago, Illinois. Please connect with Grant at

Fred Kwong
Fred Kwong

VP CISO

DeVry University

Think Tank Speaker

Dr. Fred Kwong has been in the information security and technology field for the past 20+ years in working in education, financial, telecommunication, healthcare, and insurance sectors. He is an award-winning thought leader in security and currently works at DeVry University where he currently serves as the VP and Chief Information Security Officer. He is a member of several advisory boards and is a frequent speaker at national security forums on cyber security and information technology and is often asked to consult on matters of security and leadership. In addition to working at DeVry, Fred serves as a Board member at the DuPage Habitat for Humanity and a Board member and Director of Communications at Chicago Infragard. He received his Bachelor of Arts in psychology and professional communications, Master of Business Administration in management information systems from Roosevelt University and holds his Doctorate in organization development from Benedictine University. Fred has earned several certifications including the CISSP, CISA, CISM, CDPE, PCIP, PMP and ITILv3f.

Casey Collins EliteOps
Casey Collins

Co-Founder

EliteOps

Think Tank Speaker

Casey Collins has been an entrepreneur and software executive for over 18 years. Earlier in his career, he founded, developed, and exited two companies responsible for manufacturing and distributing mobile applications in the pharmaceutical and medical device industries. For the past 7 years, he has served in a variety of commercial and sales leadership roles at AppDynamics, a Cisco Company, and Zscaler. He co-founded EliteOps in 2023 to help the world's best companies become more proactive, agile, and resilient in the areas of network security, cloud security, and secure data optimization and visibility.

Grant Ecker (1)
Grant Ecker

Founder, Chief Architect Forum. Former VP, Chief Enterprise Architect

Danaher

Think Tank Speaker

Grant Ecker is the Founder and Chairman of the Chief Architect Forum, and most recently the Vice President Chief Enterprise Architect at Danaher where he partnered closely with the architects across the company to lead strategy development, establish technology standards and to identify opportunities for modernization and transformation.  Prior to Danaher, Grant was the VP, Global Head of Architecture at Walgreens Boots Alliance, and he held a similar role at Medtronic. Earlier in Grant’s career he held architecture and management roles with expanding responsibility at Lowe’s and General Mills.  Grant is a Certified Professional Co-Active Coach, he received an MBA from University of Minnesota Carlson School of Management, and his BS in Computer Science from Washington University in St. Louis.  Grant is a board member of the Women in Architecture initiative and he holds various board advisory roles out of Chicago, Illinois. Please connect with Grant at

Steve Rubinow (1) Illinois Institute of Technology
Steve Rubinow

Associate Teaching Professor, College of Computing

Illinois Institute of Technology

Think Tank Speaker

An exceptional, multifaceted, global executive, strategist and technology expert who has transformed companies in a variety of industries, including the New York Stock Exchange. Award-winning Chief Information and Technology Officer with deep experience on many boards and in university classrooms. • Versed in the latest advances in technology software and hardware. • Brings a multidisciplinary perspective and imagination to transforming industries from the bottom up in complex and highly competitive industries. • A visionary leader who often breaks free of conventional thinking and encourages others to do the same to create innovative strategies. • Valued for the exceptional ability to utilize existing and find new, substantial ways to use technology to improve and impact businesses, achieve company goals, reduce costs and develop people. • A creative problem-solver who generates first-in-industry business initiatives. Leader and manager of highly successful teams, who inspires and motivates people to perform at their highest levels. • Trusted advisor to top management. • A clear, persuasive communicator skilled at cultivating and fostering partnerships. • Extensive experience teaching university-level computer science courses. • Government clearance from major federal security, intelligence and law enforcement agencies for addressing cybersecurity/counter-terrorism issues.

March 12, 2024

Agenda

All times Central Time

8:30 AM-9:00 AM

Registration


9:00 AM-9:30 AM

Morning Networking


9:30 AM-9:40 AM

Opening Remarks


9:40 AM-10:05 AM
Vision Voices Keynote

Building a Cyber Resilient Culture

The ability of an organization to prepare for, respond to, and recover from cyber threats. A cyber-resilient organization can adapt to known and unknown crises, threats, adversities, and challenges.

In today's dynamic digital landscape, fostering a cyber-resilient culture is paramount. It involves not only fortifying defenses against current threats but also anticipating and preparing for tomorrow's uncertainties. To achieve this, organizations must prioritize both technical measures and cultivate a workforce that is informed, vigilant, and adept at responding effectively. This holistic approach extends beyond individual organizations, requiring collaborative efforts, information sharing, and awareness of emerging threat landscapes to create a network of resilience in the face of evolving cyber challenges.


10:10 AM-10:35 AM
Keynote

Securing Sovereignty: PAM Strategies in Defending South America's Supreme Court and Healthcare Giant Against Ransomware

In the dynamic landscape of cybersecurity, the imperative to swiftly rebound from adversities resonates deeply. As Rogerio De Godoy, Chief Marketing Officer at Senha Segura, articulates, organizations besieged by cyber adversaries must harness resilience and strategic defense to navigate threats effectively. Drawing from the compelling narrative of South America's distinguished supreme court and a prominent healthcare conglomerate, Rogerio illuminates how Privileged Access Management (PAM) became the linchpin in their resilience journey. Through proactive measures and decisive action, these institutions neutralized threats and fortified their defenses, emerging stronger post-attack. Rogerio's insights underscore the transformative power of PAM in safeguarding critical infrastructure, offering invaluable lessons for organizations striving to bolster cybersecurity resilience in an ever-evolving threat landscape.

In partnership with:
senhasegura

10:35 AM-10:55 AM

Coffee Break


10:55 AM-11:50 AM
Panel

Gen AI - The Hype, The Story & Cybersecurity

GenAI, a revolutionary innovation in the world of artificial intelligence, has garnered immense attention and hype in recent years. Its story is one of rapid evolution and limitless potential, as it promises to transform industries, enhance decision-making processes, and revolutionize the way we interact with technology. However, amid the excitement, the role of cybersecurity becomes paramount. With GenAI's ever-expanding capabilities, the need for robust cybersecurity measures is essential to safeguard against potential risks and vulnerabilities. As we continue to unlock the possibilities of GenAI, the fusion of its incredible power with stringent cybersecurity practices will be the key to a safer and more promising future.


11:55 AM-12:10 PM
Disruptor

Hidden Market Inefficiencies In The Technology Ecosystem Inhibiting You From Growing Your Business and Reducing Risk

The expensive go-to-market motions of technology manufacturers and traditional partner ecosystems developed in the 1980s and 1990s have run their course. According to Gartner research, these outdated systems have contributed to 75% of B2B buyers preferring sales rep-free experiences from their suppliers. However, these rep-free experiences also lead to more buyer regret, underutilized software, and poor business outcomes. A better, more efficient model is needed to help today's digitally-minded companies continue to transform their businesses while dealing with increasingly complex threat and risk landscapes.

In partnership with:
EliteOps

12:10 PM-1:10 PM

Lunch


1:00 PM-1:35 PM
Fireside Chat

Third-Party Exposure

In today's interconnected business world, companies rely on vendors and suppliers for various services, which can pose significant cybersecurity risks. Third-party exposure is a major concern, as companies can be held liable for any data breaches or security incidents that occur due to the actions of their third-party providers. In 2024, this risk is expected to increase as companies continue to outsource work to third-party providers. This makes it more critical for companies to have effective security measures in place to properly secure third-party access. Failure to do so can result in data breaches, financial losses, and reputational damage. To mitigate this risk, companies must prioritize implementing comprehensive security measures that include vendor risk assessments, due diligence, contractual requirements, and ongoing monitoring. Additionally, companies must ensure that their third-party providers adhere to cybersecurity best practices and standards. By taking these proactive steps, companies can better protect themselves from the risks associated with third-party exposure in 2024 and beyond.


1:40 PM-1:55 PM
Vision Voices

CyberSculpt: Crafting a Resilient Future - Navigating Cyber Culture and IT Security Maturity

Cybersecurity culture is essential in today's interconnected and technology-driven world to safeguard individuals, organizations, and societies from the rising threats in the digital landscape. A cybersecurity culture encourages proactive risk management, prompt reporting of potential threats, and adherence to best practices across departments by instilling a sense of shared ownership. When employees at all levels recognize their role in maintaining a secure environment, the organization becomes better equipped to detect, prevent, and respond to cyber threats effectively.

How do we measure our cultural maturity? As a CISO, how do we engage executive leadership teams to embrace and drive a security culture?  Jeff will discuss different approaches and insights to engaging with the executive teams to improve security culture and drive a shared understanding of risks.”


2:00 PM-2:15 PM
Vision Voices

Guarding the Cloud: Navigating the Rising Tide of Cloud Vulnerabilities and Cyber Threats in 2024

Cloud computing services have become a cornerstone of modern business operations, providing organizations with the agility and scalability needed to thrive in the digital age. However, in 2024, the threat of cloud vulnerabilities will continue to grow as more companies adopt cloud services. Cybercriminals are constantly finding new ways to exploit vulnerabilities in cloud infrastructure, which can result in data breaches, unauthorized access, and financial losses. To mitigate the risks of cloud-related security incidents, businesses must prioritize implementing robust security measures such as multi-factor authentication, encryption, and regular penetration testing. Additionally, businesses must develop comprehensive incident response plans that take into account the unique challenges of cloud-based attacks. By taking these steps, businesses can protect themselves and their customers from the growing threat of cloud vulnerabilities in the digital age.


2:15 PM-2:35 PM

Networking Break


2:35 PM-3:20 PM
Panel

CISO Mastery: The Nexus of Seamless Business-Technology Harmony

In 2024 the spotlight is on CISOs and their role in fostering this critical harmony. Emphasizing the need for both discipline and balance, CISOs are called upon to take ownership of challenges, acknowledging that when technology encounters failures, shared responsibility extends beyond individual roles. 

Navigating the evolving landscape between business and technology demands a strategic blend of discipline and equilibrium, particularly as we enter 2024. Recognizing that, for many organizations, technology is the business itself, this session underscores the imperative of understanding technology as a critical enabler across all facets of the organization. From the front lines to the back office, technology serves as a potent tool for creating value by processing data, driving innovation, and challenging traditional business models.


3:25 PM-3:40 PM
Vision Voices

Quantum Computing and IoT Security: A Dual Challenge for CISOs

As quantum computing edges closer to reality, organizations face a paradigm shift in cybersecurity. This session explores the potential impact of quantum computing on existing encryption methods, emphasizing the need for proactive measures by CISOs to fortify digital defenses. With the looming threat of quantum decryption rendering conventional security protocols vulnerable, CISOs must strategize for the post-quantum era. Simultaneously, the rapid proliferation of Internet of Things (IoT) devices amplifies the attack surface, intensifying the significance of robust IoT security. CISOs are tasked with safeguarding interconnected devices, data integrity, and user privacy. This abstract underscores the dual challenge of quantum computing's transformative potential and the imperative for enhanced IoT security, urging CISOs to spearhead adaptive strategies that secure organizations in this evolving digital landscape.


3:45 PM-4:30 PM
Panel

Ransomware and Cyber Readiness

Ransomware attacks are in the headlines, affecting businesses and individuals in all sectors. Through 2024, these attacks have continued to grow, resulting in significant financial losses, data theft, and reputational damage. Even businesses that have achieved a level of cybersecurity compliance remain at risk unless they have understood what impact a ransomware attack really means in the context of their business.  

The good news?  When you have identified how to protect your business from a ransomware attack you have already defined what needs to be done to reduce your total cyber risk exposure across all levels of attack.  Ransomware might be the most reported attack, but is nowhere near the most expensive or damaging cyber attack you might face.


4:30 PM-4:40 PM

Closing Remarks & Raffle Giveaway


4:40 PM-5:30 PM

Cocktail Reception