June 20, 2024

Cybersecurity Summit: North America Midwest

9:00 AM CT - 5:00 PM CT

Event Overview

The Cybersecurity Summit: North America Midwest offers a pivotal day of advanced cybersecurity learning and dialogue, catering to a diverse audience of professionals in cybersecurity, manufacturing, and beyond.

Highlighting this event is a distinctive tabletop simulation on Deep Fakes, led by the United States Secret Service and CyberEdBoard, exploring the intricacies of protecting digital ecosystems from advanced threats. Participants in this tabletop simulation will immerse in a scenario involving deepfake technology, focusing on crafting comprehensive incident response strategies and fostering interagency collaboration.

Dive into the heart of cybersecurity innovation at our Summit, where a dynamic array of sessions and workshops await, designed to master the art of cybersecurity in a digital realm that never stands still. Crafted with precision, our agenda cuts through the noise of the cybersecurity world, offering a day rich in enlightening discussions and hands-on collaboration. Here, the forefront of cybersecurity thought converges, promising to equip professionals from all walks with the tools needed to navigate today’s challenges and tomorrow’s opportunities. This event is a must-attend for CISOs and cybersecurity leaders aiming to deepen their understanding of the current and future state of cybersecurity, shining a light on the path to innovation, security, and unparalleled organizational agility.

View our ISMG Event Experience video to see what your peers are saying about their participation. 

Venue

TBA

Chicago

Highlight Topics

  • Operational Technology
  • Third Party Risk Management
  • Upskilling Cybersecurity Teams
  • Ransomware
  • Fraud Prevention & Threat Intelligence

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

Patrick Dunphy

Head of Cybersecurity, Omron

Bradley Schaufenbuel

Vice President and Chief Information Security Officer, Paychex

David Ortiz

CISO, Church & Dwight

Erik Hart

CISO, Cushman & Wakefield

Katie Hanahan

Deputy CISO, Ingredion Incorporated

Peter Tapling

Board Member, US Faster Payments Council

Karen Habercoss

Chief Privacy Officer, UChicago Medicine

Rajesh David

VP, Global CISO, Molex

Shefali Mookencherry

Chief Information Security Officer; Chief Privacy Officer, University of Illinois at Chicago

Todd Covert

CISO, National General, Allstate

Keith Bergin

Vice President, Corporate Claims, Tokio Marine HCC

Matanda Doss

Executive Director Cybersecurity & Technology Controls, JP Morgan Chase

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

Sample Agenda

You can now view or download a PDF version of the attendee guide.

Registration & Breakfast

Todd Covert

CISO, National General, Allstate

Karen Habercross

Chief Privacy Officer, UChicago Medicine

Matanda Doss

Executive Director Cybersecurity & Technology Controls, JP Morgan Chase

Organizational Security Measures: The 80% of What CISOs Can Control and Should Put Efforts Into

Erik Hart

CISO, Cushman & Wakefield

Data Privacy Risk Management: Bridging the Gap Between Privacy and Security

The DPO can help the CISO secure data more efficiently by collating only the most necessary data and keeping customers well-informed about the transfer and usage of data.

So, what are some best practices to improve collaboration? 

This session will discuss:

  • Similarities and differences between security and privacy risk;
  • Where security and privacy teams can leverage each other;
  • How to quantify and qualify data risk.

Katie Hanahan

Deputy CISO, Ingredion Incorporated

Keith Bergin

Vice President, Corporate Claims, Tokio Marine HCC

Addressing Security in Modern Application Development: What You Need to Know Now

Clearly, Modern Application Development, or MAD, processes and innovative, cloud-native approaches are critical for organizations to stay viable.

Not surprisingly, leadership support for MAD initiatives is building – and quickly. But MAD comes with cultural changes and some inherent application security challenges that need to be addressed proactively.

In this live session, we’ll cover what you’ll need to know about MAD, including:

  • Expected benefits and outcomes;
  • Likely hurdles and bumps you’ll run into; 
  • MAD’s expanding risk landscape;
  • Solutions and approaches you’ll need to properly secure MAD.

Networking & Exhibition Break

Shefali Mookencherry

Chief Information Security Officer; Chief Privacy Officer, University of Illinois at Chicago

Erik Hart

CISO, Cushman & Wakefield

Matanda Doss

Executive Director Cybersecurity & Technology Controls, JP Morgan Chase

Katie Hanahan

Deputy CISO Ingredion Incorporated

Deepfakes, Real Stakes: Unmasking Cyber Deception in a High-Stakes Interactive Tabletop Simulation

This interactive session is meticulously crafted to mimic a sophisticated cyberattack. It aims to bolster strategic response capabilities and enhance operational readiness against the backdrop of advanced cyberthreats. The focal point of this exercise is a strategically crafted deepfake incident targeting a corporate executive, weaving together elements of social engineering, financial fraud, and the challenges posed by emerging technological threats.

What you will gain from this experience:

  • Enhanced Organizational Readiness: To critically assess and improve organizational preparedness in response to intricate cyber incidents involving deepfake technology and social engineering.
  • Interagency Collaboration and Knowledge Exchange: To strengthen the partnership and information sharing between the Secret Service and leaders in the private sector cybersecurity community.
  • Strategic Response Development: To create all-encompassing incident response strategies that cover legal, technical and communicational facets, while also identifying and rectifying weaknesses in existing cybersecurity policies and governance.

Lunch & Exhibition

David Ortiz

CISO, Church & Dwight

Rationalizing Data Investments

Cybersecurity teams need processes and tools to measure ROI and manage data sprawl. What are the best ways to think about optimizing your existing and upcoming data investments, and how have others approached the issue?

In this panel, Randy Lariar, practice director with Optiv’s Big Data and Analytics, discusses what he sees in the market and challenges organizations faced with rationalizing data investments. Top business leaders join Lariar to discuss what has worked for their organizations and their perspectives on how others can successfully decide what data investments are right for them.

Shefali Mookencherry

Chief Information Security Officer; Chief Privacy Officer, University of Illinois at Chicago

Peter Tapling

Board Member, U.S. Faster Payments Council

Bruce Phillips

SVP, CISO, MyHome, a Williston Financial Group Company

Next-Generation Cyber Attacks – An Upstream and Downstream Moving Target

By shifting their focus “upstream,” adversaries can infect a single component that is then distributed “downstream” using legitimate software workflows and update mechanisms.

Next-generation cyberattacks targeting open-source software projects have increased 430% year-over-year. The attacks are possible because:

  • Open-source projects rely on contributions from thousands of volunteer developers and discriminating between those with good or malicious intent is difficult, if not impossible. 
  • Open-source projects incorporate hundreds to thousands of dependencies from other open-source projects, many of which contain known vulnerabilities. 
  • The ethos of open source is built on shared trust between a global community of individuals, which creates a fertile environment for bad actors. 

When adversaries deliberately and secretly inject malicious code into open-source projects, they can surreptitiously “set traps” upstream and then carry out attacks downstream. This session explores: 

  • The evolution of software supply chain attacks; 
  • Their impact on open-source ecosystems; 
  • How companies can proactively protect themselves.

Rajesh David

VP, Global CISO, Molex

Patrick Dunphy

Head of Cybersecurity, Omron

Cyber Insurance and Risk: What's New in 2022?

Networking & Exhibition Break

Brent Deterding

CISO, Afni, Inc.

To CERT or Not to CERT: Establishing Trust Without Certificates

It is time to remove the calendar reminder for our certificate renewal.  Health Applications can verify enrollment into corporate management systems without deploying certificates. Learn how this is done with some common asset management solutions.

Closing Comments

Register

RSVP here to attend our events. You can opt for multiple or individual tickets.

NOTE:  All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.

Sponsors

Gary Phipps

Vice President Strategy & Business Transformation, GRCP CTPRP, CyberGRX

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Matanda Doss

Executive Director, Cybersecurity and Technology Controls, Commercial Bank JPMorgan Chase & Co.

Greg Thompson

VP, CISO, ManuLife

Aaron Bostick

CISO, ThriveDX

Eric Sanchez

CISO, Kyowa Kirin Pharmaceutical

Colin Barry

Director, Cyber Threat Intelligence Expedia Group

Michael Bray

CISO, The Vancouver Clinic

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

The Summit Experience

CPE Credits

Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.

Future Events

May 15, 2024

Prevent, Contain, Minimise the Impact of Cyberattacks to Ensure your Organization's Resilience

April 24, 2024

Securing OT/IoT in the Age of Automation and Cloud Integration

April 10, 2024

Strategies and Mandates for Phishing-Resistant MFA in Financial Services and Healthcare

April 16, 2024

Cybersecurity Implications of AI Summit: North America West Summit

June 13, 2024

Cybersecurity & Business Transformation Summit: Bengaluru​

Future Events

May 15, 2024

Prevent, Contain, Minimise the Impact of Cyberattacks to Ensure your Organization's Resilience

April 16, 2024

Cybersecurity Implications of AI Summit: North America West Summit

April 24, 2024

Securing OT/IoT in the Age of Automation and Cloud Integration