June 20, 2024

Cybersecurity Summit: North America Midwest

9:00 AM CT - 5:00 PM CT

Event Overview

ISMG Summits feature carefully curated agendas delivering keynotes from industry luminaries, case-based learning, solution room workshops, private roundtable discussions, one-to-one networking and more. Our geo-targeted, industry-specific, and topic-driven events provide actionable education for security leaders’ top priorities and challenges.

View our ISMG Event Experience video to see what your peers are saying about their participation. 

Venue

TBA

Chicago

NOTE:  All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.

Highlight Topics

  • Enhancing Your Security Posture
  • Third Party Risk Management
  • Cyber Governance
  • 5G Network Security and Business Opportunities
  • Zero Trust

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

Richard Walzer

CISO, Clean Harbours

Bradley Schaufenbuel

Vice President and Chief Information Security Officer, Paychex

David Ortiz

CISO, Church & Dwight

Erik Hart

CISO, Cushman & Wakefield

Katie Hanahan

Deputy CISO, Ingredion Incorporated

Peter Tapling

Board Member, US Faster Payments Council

Karen Habercoss

Chief Privacy Officer, UChicago Medicine

Rajesh David

VP, Global CISO, Molex

Shefali Mookencherry

Chief Information Security Officer; Chief Privacy Officer, University of Illinois at Chicago

Peter Tapling

Board Member, US Faster Payments Council

Karen Habercoss

Chief Privacy Officer, UChicago Medicine

Rajesh David

VP, Global CISO, Molex

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

Sample Agenda

You can now view or download a PDF version of the attendee guide.

Registration & Breakfast

Midwest Cybersecurity Summit

Organizational Security Measures: The 80% of What CISOs Can Control and Should Put Efforts Into

Midwest Cybersecurity Summit

Data Privacy Risk Management: Bridging the Gap Between Privacy and Security

The DPO can help the CISO secure data more efficiently by collating only the most necessary data and keeping customers well-informed about the transfer and usage of data.

So, what are some best practices to improve collaboration? 

This session will discuss:

  • Similarities and differences between security and privacy risk;
  • Where security and privacy teams can leverage each other;
  • How to quantify and qualify data risk.

Midwest Cybersecurity Summit

Addressing Security in Modern Application Development: What You Need to Know Now

Clearly, Modern Application Development, or MAD, processes and innovative, cloud-native approaches are critical for organizations to stay viable.

Not surprisingly, leadership support for MAD initiatives is building – and quickly. But MAD comes with cultural changes and some inherent application security challenges that need to be addressed proactively.

In this live session, we’ll cover what you’ll need to know about MAD, including:

  • Expected benefits and outcomes;
  • Likely hurdles and bumps you’ll run into; 
  • MAD’s expanding risk landscape;
  • Solutions and approaches you’ll need to properly secure MAD.

Networking & Exhibition Break

Midwest Cybersecurity Summit

Solution Room Workshop

What is a Solution Room?

The Solution Room is a highly engaging and interactive conference session that aims to provide cybersecurity leaders with peer-to-peer support and subject matter expertise to tackle their most pressing challenges. Through a combination of small group discussions, expert moderators, and support from U.S. Secret Service Agents, attendees will work through the lifecycle of a Business Email Compromise (BEC) attack.

What does participation in the Solution Room look like?

To enhance your learning experience, we invite you to join one of the ten tables for this collaborative session. Each table will be moderated by a knowledgeable CyberEdBoard member, and a U.S. Secret Service Agent will be present to provide valuable insights into law enforcement partnerships during a compromise. 

To kick off the session, Tom Field, Senior Vice President of Editorial at ISMG, will set the stage with a fictitious Business Email Compromise (BEC) scenario. Each group will receive identical sets of questions and work collaboratively to find the answers. As the exercise progresses, new information will be revealed, adding unexpected twists and turns to the scenario. Through this dynamic approach, participants will be challenged to apply critical thinking skills and work as a cohesive team to effectively respond to the evolving situation. Our goal is to provide a stimulating and engaging learning experience that equips you with the skills and knowledge needed to handle real-world BEC scenarios.

 

Lunch & Exhibition

Midwest Cybersecurity Summit

Rationalizing Data Investments

Cybersecurity teams need processes and tools to measure ROI and manage data sprawl. What are the best ways to think about optimizing your existing and upcoming data investments, and how have others approached the issue?

In this panel, Randy Lariar, practice director with Optiv’s Big Data and Analytics, discusses what he sees in the market and challenges organizations faced with rationalizing data investments. Top business leaders join Lariar to discuss what has worked for their organizations and their perspectives on how others can successfully decide what data investments are right for them.

Midwest Cybersecurity Summit

Next-Generation Cyber Attacks – An Upstream and Downstream Moving Target

By shifting their focus “upstream,” adversaries can infect a single component that is then distributed “downstream” using legitimate software workflows and update mechanisms.

Next-generation cyberattacks targeting open-source software projects have increased 430% year-over-year. The attacks are possible because:

  • Open-source projects rely on contributions from thousands of volunteer developers and discriminating between those with good or malicious intent is difficult, if not impossible. 
  • Open-source projects incorporate hundreds to thousands of dependencies from other open-source projects, many of which contain known vulnerabilities. 
  • The ethos of open source is built on shared trust between a global community of individuals, which creates a fertile environment for bad actors. 

When adversaries deliberately and secretly inject malicious code into open-source projects, they can surreptitiously “set traps” upstream and then carry out attacks downstream. This session explores: 

  • The evolution of software supply chain attacks; 
  • Their impact on open-source ecosystems; 
  • How companies can proactively protect themselves.

Midwest Cybersecurity Summit

Cyber Insurance and Risk: What's New in 2022?

Networking & Exhibition Break

Midwest Cybersecurity Summit

To CERT or Not to CERT: Establishing Trust Without Certificates

It is time to remove the calendar reminder for our certificate renewal.  Health Applications can verify enrollment into corporate management systems without deploying certificates. Learn how this is done with some common asset management solutions.

Closing Comments

Register

RSVP here to attend our events. You can select for multiple or individual tickets.

NOTE:  All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity. 

Sponsors

Gary Phipps

Vice President Strategy & Business Transformation, GRCP CTPRP, CyberGRX

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Matanda Doss

Executive Director, Cybersecurity and Technology Controls, Commercial Bank JPMorgan Chase & Co.

Greg Thompson

VP, CISO, ManuLife

Aaron Bostick

CISO, ThriveDX

Eric Sanchez

CISO, Kyowa Kirin Pharmaceutical

Colin Barry

Director, Cyber Threat Intelligence Expedia Group

Michael Bray

CISO, The Vancouver Clinic

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

The Summit Experience

CPE Credits

Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.

Future Events

March 6, 2024

Driving Autonomy and Automation to Maximize Security Defenses

March 13, 2024

CIO Business Transformation Awards and Summit

April 10, 2024

Strategies and Mandates for Phishing-Resistant MFA in Financial Services and Healthcare

April 16, 2024

Cybersecurity Implications of AI Summit: North America West Summit

June 13, 2024

Cybersecurity & Business Transformation Summit: Bengaluru​

Future Events

March 6, 2024

Driving Autonomy and Automation to Maximize Security Defenses

April 16, 2024

Cybersecurity Implications of AI Summit: North America West Summit

March 13, 2024

CIO Business Transformation Awards and Summit