The Future of IT & Cybersecurity

CIO & CISO Ohio Think Tank

June 4, 2025 - Cleveland, OH

Past and Present Visionaries

Rich N (Filler) The Ohio State University
Rich Nagle

Deputy CISO

The Ohio State University

Think Tank Speaker

Ohio State University, founded in 1870 and headquartered in Columbus, Ohio, is a public research university for students.

Bill Morgan Fortinet
Bill Morgan

Vice President, Systems Engineering

Fortinet

Think Tank Speaker

Seasoned technology executive with over 25 years of experience in systems engineering, presales, and technical leadership. Currently, he serves as the Vice President of Systems Engineering at Fortinet, bridging technical and business objectives across all organizational levels to solve complex business challenges using cutting-edge technology. His prior experience includes key engineering positions at Cisco, where he led significant projects like deploying IP Telephony on the International Space Station and supporting the DoD’s next-gen satellite communications network. He holds an MBA and a Bachelor’s in Computer Science from Purdue University. Recognized for his leadership, he has received multiple awards, including Cisco’s “Technical Leadership of the Year.

David Schaar Genuine Cable Group
David Schaar

CISO / Director, IT Security & Compliance

Genuine Cable Group

Think Tank Speaker

Genuine Cable Group (GCG) is a major value-added distributor of wire, cable, and related products to a variety of niche markets, including Industrial Automation, Building Infrastructure, Communications and Industrial OEM. GCG also has cable assembly operations and is proud to be a leading wire and cable provider to the U.S. Navy.

Philip Japikse Pintas & Mullins Law Firm
Philip Japikse

CTO

Pintas & Mullins Law Firm

Think Tank Speaker

An international keynote speaker, Microsoft MVP, ASPInsider, MCSD, PSM II, PSD, PSPO, and PST, and a passionate member of the developer community, Phil Japikse has been working with .NET since the first betas, developing software for over 35 years, and heavily involved in the agile community since 2005 as well as a Professional Scrum Trainer. Phil has taken over the best-selling Pro C# books (Apress Publishing), including "Pro C# 10", is the Lead Director for the Cincinnati .NET User’s Group and the Cincinnati Software Architect Group, co-hosted the Hallway Conversations podcast, founded and runs the CincyDeliver conference, and volunteers for the National Ski Patrol. During the day, Phil works as the CTO for Pintas & Mullins. Phil always enjoys learning new tech and is always striving to improve his craft. You can follow Phil on Twitter and read his blog.

June 4, 2025

Agenda

All times Eastern Time

8:30 AM-9:00 AM

Registration


9:00 AM-9:30 AM

Morning Networking


9:30 AM-9:40 AM

Opening Remarks


9:40 AM-10:05 AM
Keynote

The Future of SASE: Key Predictions for 2025 Shaping Hybrid Workforce Security with SASE today and tomorrow

Join us as we dive into the evolving landscape of Secure Access Service Edge (SASE) and unveil our top five predictions for the year ahead. 

Our cybersecurity expert will: 

  • Analyze key market trends, emerging technologies, and industry shifts shaping the future of SASE. 
  • Explore how SASE is transforming cybersecurity strategies for modern enterprises. 
  • Showcase upcoming innovations in SASE that can help you stay ahead in securing your hybrid workforce. 

Don’t miss this opportunity to gain expert insights and a competitive edge in the fast-changing world of cybersecurity. 

In partnership with:
Fortinet

10:10 AM-10:55 AM
Keynote Panel

Gen AI in 2025: The Hype, The Story, and Cybersecurity

We will explore the evolution of Gen AI, from its inception to its transformative impact across various industries. Experts will discuss the disparity between the media-driven hype and the technology's real-world capabilities, sharing case studies and addressing current challenges. The conversation will also cover the economic and ethical implications of Gen AI, providing insights into its future advancements and regulatory landscape. Attendees will gain a nuanced understanding of Gen AI's potential and the strategic considerations necessary for its successful integration into diverse sectors.


10:55 AM-11:15 AM

Coffee Break


11:15 AM-11:40 AM
Fireside Chat

The Vulnerable C-Suite: Why Personal Cybersecurity is the New Frontline for CISOs

Businesses and their leadership teams are increasingly being targeted – physically and digitally. Research from The Ponemon Institute shows that 42% of CISOs report attacks targeting executives' personal lives – a number that will only climb as cybercriminals evolve their attack methods.

Cybercriminals are increasingly leveraging executives’ personal digital presence as an entry point into corporate networks. Traditional cybersecurity focuses on corporate systems, leaving executives’ personal digital lives exposed – creating a significant risk vector for organizations.

This Fireside Chat between Richard and Chris is going to explore the ways that CISOs and CSOs can address this phenomenon to protect leadership, corporate assets, and brand reputation.

In partnership with:
BlackCloak

11:45 AM-12:00 PM
Disruptor

Building Cyber Fortitude: CISO Strategies for Resilient Cybersecurity

In the realm of building cyber resilience, organizations confront increased risk exposure amidst bold moves and evolving external challenges. Despite investments in technology and data, risk leaders, including CISOs, express difficulty in keeping pace with the persistent threat of cyber crises. However, in today's business landscape, discussions of digital transformation or reinvention are inseparable from considerations of cybersecurity. Looking ahead, stakeholders, from the board to frontline cybersecurity operations, pose critical questions about resiliency. This includes inquiries about the adequacy of efforts to safeguard the company and its customers in the face of cyber attacks. The focus shifts to identifying opportunities to minimize the impact on business and shareholder value through effective threat response. Embracing cybersecurity as a whole-of-business endeavor, organizations are urged to align themselves with business owners, adapting to changes in the cyber landscape and fortifying resilience against disruptions. Building confidence in the cybersecurity program becomes paramount in navigating the dynamic and challenging cyber landscape effectively.


12:05 PM-12:20 PM
Vision Voices

Elevating Agility: The Strategic Imperative for CIOs in Prioritizing Cloud Engineering

In this session, we delve into the imperative for CIOs to prioritize cloud engineering in the contemporary digital landscape. As organizations increasingly rely on cloud computing for operational efficiency and innovation, CIOs play a central role in shaping robust strategies. The session emphasizes the strategic importance of cloud engineering in optimizing infrastructure, ensuring scalability, and fostering agile application development. Attendees will explore practical approaches to resource management, automation, and aligning cloud initiatives with overarching business goals. The discussion navigates the evolving realm of cloud technologies, highlighting how CIOs can strategically prioritize cloud engineering to drive competitiveness and resilience in the dynamic digital ecosystem.


12:20 PM-1:20 PM

Lunch & Networking


1:20 PM-1:35 PM
Vision Voices

Navigating the Cyber Frontier: CISO Strategies for Effective Risk Management

In the context of effective cyber risk management, the challenge lies in keeping up with evolving technology, particularly during cloud or technology transformations. The adoption of threat intelligence, Gen AI, the metaverse, and machine learning presents both opportunities and challenges, with a need for technology leaders to grasp the security implications. While these technologies enhance cyber risk management, they also offer efficiencies through task automation. Striking a balance between risks and rewards is crucial for gaining trust and staying competitive. Looking forward, organizations must explore innovative approaches to cyber risk management, emphasizing resilience against third-party risks. Collaboration with the leadership team is essential to take an enterprise-wide view of current and future threats, develop action plans, safeguard critical assets, and facilitate quick recovery. Early collaboration with the executive team is encouraged to integrate risk management into transformation strategies and extract maximum benefits from emerging technologies.


1:40 PM-2:25 PM
Panel

2025 Executive Evolution: Mastering the Art of Business-Technology Harmony

Bridging the gap between business and technology is not easy and requires discipline and balance between technology, people, and business. For so many organizations today, technology is the business. Technology needs to be understood as a critical enabler in every part of the organization from the front line to the back office. It creates new value by crunching data to deliver new insights, it spurs innovation, and it disrupts traditional business models.

For business and technology leaders alike, new actions and behavioral changes can help their organizations make this shift. CIOs and CISOs must take responsibility for problems, they should convey that when technology fails, many people typically share responsibility.


2:30 PM-2:50 PM

Networking Break


2:55 PM-3:30 PM
Fireside Chat

Data Empowerment: A CISO's Guide to Unlocking Strategic Value Safely

CISOs are challenged to redefine their role not only as guardians of security but also as enablers of responsible and innovative data utilization. This directive emphasizes the importance of striking a balance between data protection and leveraging the full potential of organizational data assets. CISOs must collaborate with stakeholders to establish robust data governance frameworks, ensuring compliance with privacy regulations while facilitating the ethical and strategic use of data. By unlocking the value of data, CISOs contribute to the organization's competitiveness, innovation, and overall digital transformation. This session explores strategies for CISOs to harness the power of data responsibly, thereby positioning cybersecurity as an integral driver of business success in the data-driven era


3:35 PM-4:15 PM
Panel

Cultivating Inclusive Excellence: Driving Diversity in Technology Leadership

Let's explore the imperative of diversity in technology leadership roles, particularly within the CIO and Security domain. From gender and ethnicity to varied professional backgrounds, diverse perspectives foster innovation, resilience, and better decision-making in today's rapidly evolving tech landscape. Join us as industry leaders share their experiences, insights, and strategies for promoting inclusivity, breaking down barriers, and empowering underrepresented groups in technology leadership roles. From fostering inclusive cultures within organisations to implementing proactive recruitment and mentorship initiatives, attendees will gain actionable insights to drive meaningful change and cultivate diverse, high-performing technology teams. Let's chart a course towards inclusive excellence in technology leadership together


4:15 PM-4:30 PM

Closing Remarks & Raffle Giveaway.


4:30 PM-5:30 PM

Cocktail Hour


In Partnership With