The Future of IT & Cybersecurity

CIO & CISO Think Tank

September 19, 2024 - Chicago, IL

Past and Present Visionaries

Richard Rushing

CISO

Motorola Mobility Inc

Think Tank Speaker

Mr. Richard Rushing is the Chief Information Security Officer for Motorola Mobility LLC.; Richard participates in several corporate, community, private, and government Security Council’s and working groups setting standards, policies, and solutions to current and emerging security issues. As Chief Information Security Officer for Motorola Mobility, he has led the security effort by developing an international team to tackle the emerging threats of mobile devices, targeted attacks, and cyber-crime. He organized developed and deployed practices, tools and techniques to protect the intellectual property across the worldwide enterprise. A much-in-demand international speaker on information security Richard has presented at many leading security conferences and seminars around the world.

Calvin Nobles Ph.D.

Chair IT & Management (Former)

Illinois Institute of Technology

Think Tank Speaker

A recognized practitioner in human factors engineering and cybersecurity operations with 25 years of increasing responsibilities in leading security operations, advising senior executives on cyber policies, and driving enterprise-level solutions. An innovative and strategic leader with a record of delivering cyber solutions that impact national efforts; noted for driving change to achieve cybersecurity objectives.

Devin Rudnicki

CISO

Fitch Ratings

Think Tank Speaker

Devin Rudnicki is the Chief Information Security Officer (CISO) at Fitch Group, and oversees information security for all of Fitch Group's business units. Prior to assuming this position, Devin was the Head of Application Security at Fitch Group. She joined Fitch in 2021 to build the Application Security program and team. Prior to joining Fitch, Devin was at Options Clearing Corporation, where she had multiple roles in Application Security and Security Governance.

John Tryon

Deputy CISO

Health Care Service Corporation

Think Tank Speaker

Joined Health Care Service Corporation, the nation’s largest customer owned health insurer offering Blue Cross Blue Shield plans in Illinois, Montana, Oklahoma, New Mexico and Texas, in September of 2017 as DVP Information Security Architecture and Design. In this role, John was responsible for driving the future state Cyber Security Architecture with a focus on securely enabling HCSC’s use of the public cloud for sensitive workloads, overall modernization of HCSC’s Member facing and Enterprise Identity & Access Management products and enhancements to Cyber Defense capabilities. Promoted to Deputy CISO / Head of Information Security for Health Care Service Corporation (HCSC) in Fall of 2021. John is responsible for delivering a fiscally responsible and pragmatic Information Security program that securely enables the HCSC enterprise, systems development entities, and strategic initiatives. He is an Information Services Security thought leader with over twenty-five years combined experience with Fortune 500 firms in life sciences, healthcare and consumer products industries. Actively participates on Executive Customer Advisory Boards and Healthcare Industry Executive Leadership forums. John has a bachelor’s degree in computer science from Temple University and holds CISSP certification.

Cole Sinkford

Global CISO

GlobalFoundries

Think Tank Speaker

Cole Sinkford the Global CISO at Globalfoundries Inc. Prior to this he was GE Renewable Energy’s Global Chief Information and Product Cyber Security Officer, responsible for cybersecurity across the organization. In this role, he is responsible for all aspects of cybersecurity strategy and operations for Renewable Energy products and enterprise. Prior to his current role, Cole served as the Deputy Chief Information Security officer of Renewable Energy, establishing Renewables’ standalone Cybersecurity capabilities. Prior to that, Cole spent 3 years as part of GE’s Corporate Audit Staff, leading numerous projects and audits across the Digital Technology and business environments. Cole began his career as an Aviation DTLP located in Cincinnati, OH and now resides in Chicago, IL. Cole holds a bachelor’s degree in Electrical Engineering from the University of Cincinnati.

Kenneth Townsend

Global CISO

Ingredion

Think Tank Speaker

Founded in 1906, Ingredion together with its subsidiaries, refines corn and produces sweeteners and starches. The company also provides animal feed products; edible corn oil; refined corn oil to packers of cooking oil and to producers of margarine, salad dressings, shortening, mayonnaise, and other foods; and corn gluten feed used as protein feed for chickens, pet food, and aquaculture. The company is headquartered in Westchester, Illinois.

John Kellerhals

President / CISO

InfraGard

Think Tank Speaker

Innovative executive that has experience making sound business decisions and can think rationally in difficult situations. Visualizes the big picture and provides proper context and perspective tailored for the target audience. Clearly articulates the mission, standards, and priorities to achieve strategic and tactical objectives.

September 19, 2024

Agenda

All times Central Time

8:30 AM-9:00 AM

Registration


9:00 AM-9:30 AM

Morning Networking


9:30 AM-9:40 AM

Opening Remarks


9:40 AM-10:05 AM
Vision Voices Keynote

Bridging the Gap: Mastering the Art of Business-Technology Harmony

Bridging the gap between business and technology is not easy and requires discipline and balance between technology, people, and business. For so many organizations today, technology is the business. Technology needs to be understood as a critical enabler in every part of the organization from the front line to the back office. It creates new value by crunching data to deliver new insights, it spurs innovation, and it disrupts traditional business models.

For business and technology leaders alike, new actions and behavioral changes can help their organizations make this shift. CIOs and CISOs must take responsibility for problems, they should convey that when technology fails, many people typically share responsibility.


10:10 AM-10:35 AM
Keynote

Fortifying Cyber Security Together: A CISO's Call to Increase Cyber Transparency

In the evolving landscape of cybersecurity, the imperative to increase transparency takes center stage, driven by new laws and regulations mandating prompt reporting of cyber breaches. A notable example is the SEC's cyber disclosure rule, necessitating companies to report incidents within 72 hours. This shift from voluntary to mandatory information-sharing not only presents challenges but also opportunities. Compliance empowers organizations to construct more comprehensive defenses and actions against cyber risks. Regulatory guardrails provide confidence, allowing companies to explore, experiment, and compete securely. To stay ahead, a tech-enabled approach embedding cybersecurity across the enterprise is crucial. Looking forward, collaboration with the C-suite, particularly the Chief Risk Officer and General Counsel, is vital. Crafting a consistent narrative, setting priorities, and adapting to new cyber risk management practices become essential. Moreover, understanding board expectations, simplifying complex cyber regulations, and extending cybersecurity measures to external reporting teams are key considerations for navigating the regulatory landscape effectively.


10:35 AM-10:55 AM

Coffee Break


10:55 AM-11:10 AM
Vision Voices

Data Revolution Leadership: CIOs at the Helm of Modernization for Strategic Value

This session explores the pivotal role of CIOs in modernizing data to unlock its full value. In the contemporary digital landscape, data stands as a strategic asset, and CIOs are at the forefront of harnessing its potential. The abstract emphasizes the CIO's responsibility in implementing cutting-edge technologies and data management strategies that go beyond mere storage, enabling organizations to derive actionable insights. By adopting innovative approaches, such as advanced analytics, artificial intelligence, and cloud solutions, CIOs can transform data into a valuable resource, driving efficiency, innovation, and informed decision-making across the enterprise. The discussion delves into the evolving responsibilities of CIOs in leading the charge towards data modernization, ensuring organizations remain competitive and agile in an increasingly data-centric world.


11:15 AM-11:30 AM
Disruptor

Building Cyber Fortitude: CISO Strategies for Resilient Cybersecurity

In the realm of building cyber resilience, organizations confront increased risk exposure amidst bold moves and evolving external challenges. Despite investments in technology and data, risk leaders, including CISOs, express difficulty in keeping pace with the persistent threat of cyber crises. However, in today's business landscape, discussions of digital transformation or reinvention are inseparable from considerations of cybersecurity. Looking ahead, stakeholders, from the board to frontline cybersecurity operations, pose critical questions about resiliency. This includes inquiries about the adequacy of efforts to safeguard the company and its customers in the face of cyber attacks. The focus shifts to identifying opportunities to minimize the impact on business and shareholder value through effective threat response. Embracing cybersecurity as a whole-of-business endeavor, organizations are urged to align themselves with business owners, adapting to changes in the cyber landscape and fortifying resilience against disruptions. Building confidence in the cybersecurity program becomes paramount in navigating the dynamic and challenging cyber landscape effectively.


11:30 AM-12:30 PM

Lunch & Panel Discussion


11:45 AM-12:30 PM
Panel

Embracing Innovation: Best-of-Breed Emerging Technologies from Silicon Valley ... and Beyond!

This panel discussion will take you on a journey through the forefront of technological innovation, featuring three visionary solutions poised to revolutionize the digital landscape. These pioneering solutions address pressing challenges faced by organizations worldwide, ranging from permissions management to troubleshooting live applications and system observability.

In today's dynamic digital landscape, managing permissions effectively poses a significant challenge for organizations. However, a pioneering solution emerges to address these pressing concerns by automating permissions management based on risk and usage patterns, ensuring alignment with business needs while minimizing security risks. Moreover, a revolutionary toolset empowers developers and SREs to troubleshoot live applications swiftly and efficiently, slashing mean time to resolution and delivering substantial cost savings. Dive deeper into how these groundbreaking approaches drive productivity gains and cost efficiencies for organizations worldwide.


12:30 PM-12:45 PM
Vision Voices

Navigating the Cyber Frontier: CISO Strategies for Effective Risk Management

In the context of effective cyber risk management, the challenge lies in keeping up with evolving technology, particularly during cloud or technology transformations. The adoption of threat intelligence,GenAI, the metaverse, and machine learning presents both opportunities and challenges, with a need for technology leaders to grasp the security implications. While these technologies enhance cyber risk management, they also offer efficiencies through task automation. Striking a balance between risks and rewards is crucial for gaining trust and staying competitive. Looking forward, organizations must explore innovative approaches to cyber risk management, emphasizing resilience against third-party risks. Collaboration with the leadership team is essential to take an enterprise-wide view of current and future threats, develop action plans, safeguard critical assets, and facilitate quick recovery. Early collaboration with the executive team is encouraged to integrate risk management into transformation strategies and extract maximum benefits from emerging technologies.


12:50 PM-1:35 PM
Panel

Gen AI - The Hype, The Story & Cybersecurity

GenAI, a revolutionary innovation in the world of artificial intelligence, has garnered immense attention and hype in recent years. Its story is one of rapid evolution and limitless potential, as it promises to transform industries, enhance decision-making processes, and revolutionize the way we interact with technology. However, amid the excitement, the role of cybersecurity becomes paramount. With GenAI's ever-expanding capabilities, the need for robust cybersecurity measures is essential to safeguard against potential risks and vulnerabilities. As we continue to unlock the possibilities of GenAI, the fusion of its incredible power with stringent cybersecurity practices will be the key to a safer and more promising future.


1:35 PM-1:55 PM

Networking Break


1:55 PM-2:10 PM
Vision Voices

Data Empowerment: A CISO's Guide to Unlocking Strategic Value Safely

CISOs are challenged to redefine their role not only as guardians of security but also as enablers of responsible and innovative data utilization. This directive emphasizes the importance of striking a balance between data protection and leveraging the full potential of organizational data assets. CISOs must collaborate with stakeholders to establish robust data governance frameworks, ensuring compliance with privacy regulations while facilitating the ethical and strategic use of data. By unlocking the value of data, CISOs contribute to the organization's competitiveness, innovation, and overall digital transformation. This session explores strategies for CISOs to harness the power of data responsibly, thereby positioning cybersecurity as an integral driver of business success in the data-driven era.


2:15 PM-2:50 PM
Fireside Chat

Strategic Shifts: Reimagining Engineering Talent Deployment and Management in the Age of GenAI

Unlock insights into the evolving landscape of talent deployment and retention as board expectations drive CIOs to rethink traditional IT talent models. Explore the impact of GenAI on coding processes and the software engineering lifecycle, and discover strategies for optimizing talent allocation and headcounts. Gain actionable insights into defining new roles, cultivating essential skills, and charting GenAI-centric career paths to align with organizational goals and stay ahead in a rapidly changing technological landscape.

.


2:55 PM-3:10 PM
Disruptor

Cybersecurity Leadership in the Era of AI and ML: Navigating Innovation and Responsibility

In the dynamic realm of artificial intelligence (AI) and machine learning (ML), CISOs play a pivotal role in leveraging these advancements for enhanced cybersecurity. Strategic integration of AI and ML is essential for bolstering security measures, optimizing decision-making, and driving innovation. CISOs must adopt a comprehensive approach, considering the entire lifecycle of these technologies to ensure both efficiency and ethical use. Establishing robust governance frameworks becomes paramount, addressing biases, ensuring transparency, and minimizing unintended consequences.

Looking ahead, as AI and ML continue to advance, CISOs face evolving challenges and regulatory considerations. Proactive engagement involves staying informed about changing regulations, particularly in areas such as data privacy and ethical AI practices. CISOs should strive for a tech-enabled understanding of AI and ML systems, encompassing deployment, impact, and security measures. This approach positions organizations to navigate the regulatory landscape effectively, ensuring responsible and competitive integration of AI and ML into cybersecurity strategies.


3:10 PM-3:30 PM

Networking Break


3:30 PM-2:15 PM
Panel

Cyber Arms Race: Fortifying Cyber Readiness Against Ransomware Attacks

Let's dive into the intersection of AI, the cyber arms race, and ransomware resilience. Ransomware attacks continue to escalate, inflicting substantial financial losses, data breaches, and tarnished reputations across sectors. As we navigate through 2024, businesses must comprehend the true implications of these attacks within their operational context. Despite achieving cybersecurity compliance, vulnerabilities persist, necessitating a deeper understanding of ransomware's impact and broader strategies for mitigating overall cyber risk exposure. Advanced AI technologies are shaping both offensive and defensive cyber strategies, offering proactive threat detection, comprehensive risk management frameworks, and insights to fortify cybersecurity posture against ransomware and beyond. Don't miss this opportunity to fortify your defenses and stay ahead in the AI-powered cyber landscape.


4:10 PM-4:25 PM
Vision Voices

Fostering Digital Trailblazers: A Strategic Imperative for CIOs in 2024

Addressing the multifaceted challenges faced by CIOs in the contemporary technological landscape, the imperative to develop transformational leaders takes center stage. The heightened demand for innovation, enterprise-wide transformation, and evolving technology capabilities poses significant hurdles for CIOs, often leading to an overburdened IT department. To navigate this complexity, the focus shifts towards fostering digital transformation leaders, referred to as digital trailblazers. Gartner highlights leader and manager development as a top priority for HR in 2024, emphasizing the need for CIOs to collaborate with HR in tapping into training and development programs. By cultivating leaders skilled in transformation and change management, CIOs can enhance their department's capacity to oversee initiatives, standardize platforms, and deliver faster results, ultimately reducing friction to change within the organization. Looking ahead to 2024, this strategic approach becomes essential for CIOs seeking to strike the right balance in their digital transformation programs, avoiding the pitfalls of overpromising and under delivering.


4:25 PM-4:30 PM

Closing Remarks & Raffle Giveaway


4:30 PM-5:30 PM

Cocktail Hour


In Partnership With