The Future of IT & Cybersecurity

CIO & CISO Luncheon

June 22, 2023 - Minneapolis, MN

Speakers

Thomas Hammel

CISO

Allianz

Luncheon Speaker

The Allianz Group is an insurance and asset management company offering a broad range of personal and corporate insurance services, ranging from property, life and health insurance to assistance services to credit insurance and global business insurance.

Allison Miller

CISO & SVP

Optum

Luncheon Speaker

Allison Miller serves as the Chief Information Security Officer and Senior Vice President for Optum. As SVP & CISO at Optum, Miller has accountability for the Enterprise Information Security Officers and the Global Cyber Regulatory Programs. In addition, she has developed a global security framework focusing on patient safety, the security of clinical operations, and a global cyber crisis response plan Prior to her role with the Global Enterprise Information Security Office, Allison was the Director of National Healthcare Compliance for UnitedHealthcare, Chief Privacy Officer for OptumHealth, and Deputy Chief Privacy Officer, National Privacy Director for UnitedHealthcare. In addition to global cybersecurity, Allison has over 20 years of experience in health information systems and crisis management. During her tenure at UnitedHealth Group, Allison has developed methods to identify gaps in care and predict health outcomes for individuals with chronic conditions. Additionally, Allison is a volunteer EMT and First Responder in Louisiana, serving residents during Hurricanes Katrina and Isaac. Most recently, Allison was privileged to serve refugees in Greece, providing healthcare support to front-line clinicians. Allison has earned various degrees and certificates from Upsala College, the Wharton School, Kellogg Executive Education, ISC2, and MIT Sloan School of Management. She holds certifications from GIAC, ISACA, HCCS, and other technology areas of focus beyond security. She is also involved with several groups, including UHCL Cyber Security Institute, Health Care Compliance Association, NIST Cybersecurity Framework, and HIPAA Security Officers. Allison continues to volunteer her time across organizations to help raise awareness regarding the emerging cybersecurity landscape and the global threats they present to patient care. Allison is passionate about diversity and inclusion. She serves on the Board of Directors for Women in Cybersecurity (WiCyS) and speaks publicly at schools and colleges around the globe.

Scott Dillon

CEO, Digital Evangelist, Board Advisor & Investor

Luncheon Speaker

A rare C-suite digitally native executive with deep operational and advisory leadership experience, passionate about helping clients envision and execute aggressive transformation agendas while ensuring operational resilience. Expert in leading consensus-rooted change to automate and streamline legacy operations, digitally transform the customer experience, and create a security-first, data-centric mindset, no matter the industry involved. Adept at working with CEO’s, Boards, and Investors to envision, launch, and successfully implement multi-billion-dollar technology transformations, merger integrations and divestitures, and new products. Demonstrated ability to view business portfolios (legacy, existing or acquisition targets) dispassionately, and to transform, reposition, integrate, or divest as needed to accomplish strategic aims while preserving essential culture.

Paul Valente

CEO and Co-Founder

VISO Trust

Luncheon Speaker

Paul Valente is the current CEO & Co-Founder of VISO Trust. He was also the former CISO and built successful security teams and programs at ASAPP, LendingClub, and Restoration Hardware. Paul's third-party risk management programs have been vetted by hundreds of Fortune 1000 companies and his teams have vetted thousands of third parties.

Mike Bitz

RVP, Technical Account Management

Tanium

Luncheon Speaker

Mike Bitz is a Regional Vice President of Technical Account Management at Tanium. In this role he helps global organizations identify, control, and remediate their endpoints, and takes pride in furthering the company's mission to protect people, defend data, and secure the systems behind the critical infrastructure and services that make up the backbone of our society and economy. Mike gravitates toward solving difficult problems and has over 20 years of software engineering experience in a variety of roles at companies including Apple and Sonifi. He is a Computer Science graduate of Dakota State University, and is currently an MBA candidate at the University of South Dakota. Outside of tech Mike enjoys traveling with his family, astronomy, anything to do with cars or rockets, and solving Rubik's Cubes competitively.

June 22, 2023

Agenda

All times Central Time

11:30 AM-12:00 PM

Lunch & Registration


12:15 PM-12:20 PM

Opening Remarks


12:20 PM-1:05 PM
Panel

Bridging the Gap Between IT and the Business

Bridging the gap between business and technology is not easy and requires discipline and balance between technology, people, and the business. For so many organizations today, technology is the business. Technology needs to be understood as a critical enabler in every part of the organization from the front line to the back office. It creates new value by crunching data to deliver new insights, it spurs innovation, and it disrupts traditional business models.

For business and technology leaders alike, new actions and behavioral changes can help their organizations make this shift. CIOs must take responsibility for problems, they should convey that when technology fails, many people typically share responsibility.

In partnership with:

1:10 PM-1:25 PM
Disruptor

Secure the Supply Chain: Effective Third-Party Risk Management for the Modern Enterprise

In today's interconnected world, securing the supply chain has become a critical priority for modern enterprises. Companies are progressing towards an end state where nearly 100% of their tech stack is owned by third-party vendors. Therefore, it is essential to implement effective third-party risk management strategies to protect sensitive data, maintain operational integrity, and ensure business acceleration and security culture. Ineffective third-party cyber risk programs can actually pose a risk to your business, hindering innovation and increasing vulnerabilities. However, by rethinking your third-party risk program and approach, proven strategies can be employed to mitigate risks without stifling innovation. These strategies aim to reduce the overall risk posture to your business while maintaining a strong security foundation and fostering a culture of innovation. By conducting thorough due diligence, assessing security controls, and establishing clear contractual agreements, organizations can secure their supply chain, maintain stakeholder trust, and drive business success.

In partnership with:

1:25 PM-1:45 PM

Networking Break


1:45 PM-2:30 PM
Panel

Cloud Computing

Cloud computing is a rapidly growing area that CIOs must keep in mind. CIOs must evaluate the risks and benefits of cloud computing as its adoption continues to grow. While cloud solutions offer benefits like cost savings and flexibility, they also pose data security risks. CIOs must assess their organization's needs and integrate cloud solutions effectively. By managing these risks and benefits, CIOs can fully leverage cloud technology for their organization's success.


2:30 PM-2:45 PM

Raffle Giveaway & Networking


In Partnership With