The Future of Cybersecurity & IT

CIO & CISO Think Tank

June 27, 2024 - Chicago, IL

Visionaries

Richard Rushing Motorola Mobility Inc
Richard Rushing

CISO

Motorola Mobility Inc

Think Tank Speaker

Mr. Richard Rushing is the Chief Information Security Officer for Motorola Mobility LLC.; Richard participates in several corporate, community, private, and government Security Council’s and working groups setting standards, policies, and solutions to current and emerging security issues. As Chief Information Security Officer for Motorola Mobility, he has led the security effort by developing an international team to tackle the emerging threats of mobile devices, targeted attacks, and cyber-crime. He organized developed and deployed practices, tools and techniques to protect the intellectual property across the worldwide enterprise. A much-in-demand international speaker on information security Richard has presented at many leading security conferences and seminars around the world.

Phil Japikse Pintas & Mullins Law Firm
Phil Japikse

CTO

Pintas & Mullins Law Firm

Think Tank Speaker

An international keynote speaker, Microsoft MVP, ASPInsider, MCSD, PSM II, PSD, PSPO, and PST, and a passionate member of the developer community, Phil Japikse has been working with .NET since the first betas, developing software for over 35 years, and heavily involved in the agile community since 2005 as well as a Professional Scrum Trainer. Phil has taken over the best-selling Pro C# books (Apress Publishing), including "Pro C# 10", is the Lead Director for the Cincinnati .NET User’s Group and the Cincinnati Software Architect Group, co-hosted the Hallway Conversations podcast, founded and runs the CincyDeliver conference, and volunteers for the National Ski Patrol. During the day, Phil works as the CTO for Pintas & Mullins. Phil always enjoys learning new tech and is always striving to improve his craft. You can follow Phil on Twitter and read his blog.

David Schaar Genuine Cable Group
David Schaar

CISO / Director, IT Security & Compliance

Genuine Cable Group

Think Tank Speaker

Genuine Cable Group (GCG) is a major value-added distributor of wire, cable, and related products to a variety of niche markets, including Industrial Automation, Building Infrastructure, Communications and Industrial OEM. GCG also has cable assembly operations and is proud to be a leading wire and cable provider to the U.S. Navy.

Lonnie Washington City Colleges of Chicago
Lonnie Washington

Executive Director Infrastructure Services

City Colleges of Chicago

Think Tank Speaker

Responsible for managing infrastructure services for City Colleges of Chicago. City Colleges of Chicago, officially known as Community College District 508, is one of the nation's largest community college districts and the largest in Illinois. About 5,000 thousand faculty and staff help prepare 80,000 students each year to enter the workforce, pursue higher education and advance their careers. The District serves students on seven campuses and five satellite sites. It also oversees two restaurants and five child care centers.

Raju Chekuri Netenrich, Inc
Raju Chekuri

CEO

Netenrich, Inc

Think Tank Speaker

Mr. Chekuri is a serial Silicon Valley entrepreneur and technology leader, Raju founded and leads Netenrich, Inc. Previously, he was a Founder and Chairman at OpsRamp, eventually navigating its acquisition by HPE. Additionally, as a founder of Velio Communications, Inc. he led its acquisition by LSI Logic and Rambus. He also serves as investor and advisor at early-stage startups, Two Brothers Organic Farms and the Department of Lore. Currently serving as Chairman, President and CEO at Netenrich, Mr. Chekuri earned his MBA at St. Mary’s College of California and a Bachelor of Technology at Kakatiya University.

John Kellerhals InfraGard
John Kellerhals

President / CISO

InfraGard

Think Tank Speaker

Innovative executive that has experience making sound business decisions and can think rationally in difficult situations. Visualizes the big picture and provides proper context and perspective tailored for the target audience. Clearly articulates the mission, standards, and priorities to achieve strategic and tactical objectives.

Yael Gomez Walgreens
Yael Gomez

Fractional CIO/CTO Former VP, Global IT Integration

Walgreens

Think Tank Speaker

Yaël Gomez is a fractional CIO/CTO and former Vice President, Global IT, Integration & Intelligent Automation at Walgreens Boots Alliance. As an accomplished technology executive, technologist, and strategic business partner across large-scale enterprise organizations, Yaël has proven expertise in successfully developing technology delivery centers, delivering complex technology strategies and transformations generating business growth. He is skilled at driving global strategies whilst meeting business specific local requirements, with the goal of enabling business innovation, agility and performance with the right technologies. Yael finds his energy at the intersection of people, business and technology, and taps into 25 years of experience in small and large organizations such as Walgreens, in aligning business and technology, and in bringing clarity to complex problems to drive growth, operational excellence and product/service leadership for the businesses he serves.

June 27, 2024

Agenda

All times Central Time

8:30 AM-9:00 AM

Registration


9:00 AM-9:30 AM

Morning Networking


9:30 AM-9:40 AM

Opening Remarks


9:40 AM-10:05 AM
Keynote

Cybersecurity Resiliency Through Data Driven Operations

In today's rapidly changing cyber landscape, mere protection of your environment is insufficient. To achieve true cybersecurity resiliency, ingesting data at scale to eliminate blind spots while leveraging analytics and machine learning to identify potential threats and issues is crucial. Cybersecurity teams must shift from reactive to proactive, they must shift to dedicating more than 90% of their efforts to preventing incidents before they occur rather than responding post-incident, they must shift from the practices of traditional EDR and SIEM operations. Embracing Adaptive MDR (Managed Detection and Response) is the key to this proactive approach, ensuring robust and resilient cybersecurity.

In partnership with:
Netenrich, Inc

10:10 AM-10:55 AM
Keynote Panel

Elevating Agility: The Strategic Imperative for CIOs in Prioritizing Cloud Engineering

In this session, we delve into the imperative for CIOs to prioritize cloud engineering in the contemporary digital landscape. As organizations increasingly rely on cloud computing for operational efficiency and innovation, CIOs play a central role in shaping robust strategies. The session emphasizes the strategic importance of cloud engineering in optimizing infrastructure, ensuring scalability, and fostering agile application development. Attendees will explore practical approaches to resource management, automation, and aligning cloud initiatives with overarching business goals. The discussion navigates the evolving realm of cloud technologies, highlighting how CIOs can strategically prioritize cloud engineering to drive competitiveness and resilience in the dynamic digital ecosystem.


10:55 AM-11:15 AM

Coffee Break


11:15 AM-11:50 AM
Fireside Chat

CISO Mastery: The Nexus of Seamless Business-Technology Harmony

In 2024, CISOs and CIOs take center stage in fostering harmony between business and technology, balancing discipline and ownership. This session emphasizes their pivotal role, introducing 'Gen AI' as a crucial topic. Gen AI explores securing AI-driven technologies responsibly and ethically. Recognizing technology as a key enabler, CISOs navigate the evolving landscape, ensuring the integrity of data, driving innovation, and challenging traditional business models. Join us to explore the multifaceted responsibilities of CISOs, shaping a secure, agile, and ethically-driven future for organizations in the dynamic landscape of 2024.

Navigating the evolving landscape between business and technology demands a strategic blend of discipline and equilibrium. Recognizing that, for many organizations, technology is the business itself, this session underscores the imperative of understanding technology as a critical enabler across all facets of the organization. From the front lines to the back office, technology serves as a potent tool for creating value by processing data, driving innovation, and challenging traditional business models.


11:55 AM-12:10 PM
Vision Voices

Navigating the Upcoming CCPA Cybersecurity Audit Regulations: Key Requirements and Best Practices for Compliance

On November 8, 2023, the California Privacy Protection Agency (CPPA) published a proposed draft of its cybersecurity audit regulations under the California Consumer Privacy Act (CCPA). Covered businesses in California must undergo a cybersecurity audit annually and submit a compliance notice to the Agency. These audit regulations are still in draft, but it is anticipated that a formal announcement can come soon as Q2 of 2024.
 
Is your organization impacted?
What are the CCPA Cybersecurity audit requirements?
Best practices to approach CCPA Cybersecurity audit requirements?

12:15 PM-12:30 PM
Disruptor

Java for the Modern Enterprise

Java has maintained its status as one of the top programming languages even after three decades. Java is everywhere today in how we live, work, and play from streaming services to online retail shopping to trading platforms and more.  Learn how a highly optimized version of OpenJDK can deliver superior performance, carrying capacity, and user experience for your key business applications. With changing licensing models, choosing the right OpenJDK distribution is key to secure, stable, and cost-effective builds of OpenJDK. Finally, we’ll provide insight into how to identify vulnerable code and unused code to boost productivity while increasing the overall security across the enterprise.

In partnership with:
Azul Systems

12:30 PM-1:30 PM

Lunch & Networking


1:30 PM-1:45 PM
Disruptor

Bridging the Cybersecurity Skills Gap: Cultivating a Talent Pipeline that Reduces Risk and Prevents Attacks

Demand for technology workers is exploding. Tech occupation employment over the next 10 years is expected to grow at about twice the rate of overall employment across the economy in the U.S. Organizations are adopting a skills-based approach to fill their needs through hiring and upskilling. This is especially important in cybersecurity, where the preparedness and expertise of employees are paramount in preventing, identifying, and resolving cyber risks and attacks. However, 38% of C-suite leaders report cybersecurity as the area with which they have the greatest difficulty hiring. We’ll explore the value of upskilling, reskilling, and certifications in bridging the IT and cybersecurity skills gap and discuss how leaders can cultivate a strong talent pipeline.

In partnership with:
CompTIA

1:50 PM-2:35 PM
Panel

Strategic Shifts: Reimagining Engineering Talent Deployment and Management in the Age of AI (GenAI)

Unlock insights into the evolving landscape of talent deployment and retention as board expectations drive CIOs and CISOs to rethink traditional IT talent models. Explore the impact of GenAI on coding processes and the software engineering lifecycle, and discover strategies for optimizing talent allocation and headcounts. Gain actionable insights into defining new roles, cultivating essential skills, and charting GenAI-centric career paths to align with organizational goals and stay ahead in a rapidly changing technological landscape.


2:40 PM-2:55 PM
Vision Voices

Guarding the Cloud: Navigating the Rising Tide of Cloud Vulnerabilities and Cyber Threats in 2024

Cloud computing services have become a cornerstone of modern business operations, providing organizations with the agility and scalability needed to thrive in the digital age. However, in 2024, the threat of cloud vulnerabilities will continue to grow as more companies adopt cloud services. Cybercriminals are constantly finding new ways to exploit vulnerabilities in cloud infrastructure, which can result in data breaches, unauthorized access, and financial losses. To mitigate the risks of cloud-related security incidents, businesses must prioritize implementing robust security measures such as multi-factor authentication, encryption, and regular penetration testing. Additionally, businesses must develop comprehensive incident response plans that take into account the unique challenges of cloud-based attacks. By taking these steps, businesses can protect themselves and their customers from the growing threat of cloud vulnerabilities in the digital age.


2:55 PM-3:15 PM

Networking Break


3:15 PM-3:30 PM
Vision Voices

Building a Cyber Resilient Culture

The ability of an organization to prepare for, respond to, and recover from cyber threats. A cyber-resilient organization can adapt to known and unknown crises, threats, adversities, and challenges.

In today's dynamic digital landscape, fostering a cyber-resilient culture is paramount. It involves not only fortifying defenses against current threats but also anticipating and preparing for tomorrow's uncertainties. To achieve this, organizations must prioritize both technical measures and cultivate a workforce that is informed, vigilant, and adept at responding effectively. This holistic approach extends beyond individual organizations, requiring collaborative efforts, information sharing, and awareness of emerging threat landscapes to create a network of resilience in the face of evolving cyber challenges.


3:35 PM-4:20 PM
Panel

Ransomware and Cyber Readiness

Ransomware attacks are in the headlines, affecting businesses and individuals in all sectors. Through 2024, these attacks have continued to grow, resulting in significant financial losses, data theft, and reputational damage. Even businesses that have achieved a level of cybersecurity compliance remain at risk unless they have understood what impact a ransomware attack really means in the context of their business.

The good news? When you have identified how to protect your business from a ransomware attack you have already defined what needs to be done to reduce your total cyber risk exposure across all levels of attack. Ransomware might be the most reported attack, but is nowhere near the most expensive or damaging cyber attack you might face.


4:20 PM-4:30 PM

Closing Remarks & Raffle Giveaway


4:30 PM-5:30 PM

Cocktail Networking


In Partnership With