June 20, 2024

Cybersecurity Summit: North America Midwest

9:00 AM CT - 5:00 PM CT

Event Overview

ISMG Summits feature carefully curated agendas delivering a Keynote Address from an Industry Luminary, Case-Based Learning, Networking and more. The Summits are geo-targeted, industry-specific, and topic-driven events designed for security leaders.
 
ISMG’s agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.

Venue

TBA

Chicago

NOTE:  All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.

Highlight Topics

  • Enhancing Your Security Posture
  • Third Party Risk Management
  • Cyber Governance
  • 5G Network Security and Business Opportunities
  • Zero Trust

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

Gary Phipps

Vice President Strategy & Business Transformation, GRCP CTPRP, CyberGRX

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Matanda Doss

Executive Director, Cybersecurity and Technology Controls, Commercial Bank JPMorgan Chase & Co.

Greg Thompson

VP, CISO, ManuLife

Aaron Bostick

CISO, ThriveDX

Eric Sanchez

CISO, Kyowa Kirin Pharmaceutical

Colin Barry

Director, Cyber Threat Intelligence Expedia Group

Michael Bray

CISO, The Vancouver Clinic

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

Sample Agenda

You can now view or download a PDF version of the attendee guide.

Registration & Breakfast

Midwest Cybersecurity Summit

Organizational Security Measures: The 80% of What CISOs Can Control and Should Put Efforts Into

Midwest Cybersecurity Summit

Data Privacy Risk Management: Bridging the Gap Between Privacy and Security

The DPO can help the CISO secure data more efficiently by collating only the most necessary data and keeping customers well-informed about the transfer and usage of data.

So, what are some best practices to improve collaboration? 

This session will discuss:

  • Similarities and differences between security and privacy risk;
  • Where security and privacy teams can leverage each other;
  • How to quantify and qualify data risk.

Midwest Cybersecurity Summit

Addressing Security in Modern Application Development: What You Need to Know Now

Clearly, Modern Application Development, or MAD, processes and innovative, cloud-native approaches are critical for organizations to stay viable.

Not surprisingly, leadership support for MAD initiatives is building – and quickly. But MAD comes with cultural changes and some inherent application security challenges that need to be addressed proactively.

In this live session, we’ll cover what you’ll need to know about MAD, including:

  • Expected benefits and outcomes;
  • Likely hurdles and bumps you’ll run into; 
  • MAD’s expanding risk landscape;
  • Solutions and approaches you’ll need to properly secure MAD.

Networking & Exhibition Break

Midwest Cybersecurity Summit

Solution Room Workshop

What is a Solution Room?

The Solution Room is a highly engaging and interactive conference session that aims to provide cybersecurity leaders with peer-to-peer support and subject matter expertise to tackle their most pressing challenges. Through a combination of small group discussions, expert moderators, and support from U.S. Secret Service Agents, attendees will work through the lifecycle of a Business Email Compromise (BEC) attack.

What does participation in the Solution Room look like?

To enhance your learning experience, we invite you to join one of the ten tables for this collaborative session. Each table will be moderated by a knowledgeable CyberEdBoard member, and a U.S. Secret Service Agent will be present to provide valuable insights into law enforcement partnerships during a compromise. 

To kick off the session, Tom Field, Senior Vice President of Editorial at ISMG, will set the stage with a fictitious Business Email Compromise (BEC) scenario. Each group will receive identical sets of questions and work collaboratively to find the answers. As the exercise progresses, new information will be revealed, adding unexpected twists and turns to the scenario. Through this dynamic approach, participants will be challenged to apply critical thinking skills and work as a cohesive team to effectively respond to the evolving situation. Our goal is to provide a stimulating and engaging learning experience that equips you with the skills and knowledge needed to handle real-world BEC scenarios.

 

Lunch & Exhibition

Midwest Cybersecurity Summit

Rationalizing Data Investments

Cybersecurity teams need processes and tools to measure ROI and manage data sprawl. What are the best ways to think about optimizing your existing and upcoming data investments, and how have others approached the issue?

In this panel, Randy Lariar, practice director with Optiv’s Big Data and Analytics, discusses what he sees in the market and challenges organizations faced with rationalizing data investments. Top business leaders join Lariar to discuss what has worked for their organizations and their perspectives on how others can successfully decide what data investments are right for them.

Midwest Cybersecurity Summit

Next-Generation Cyber Attacks – An Upstream and Downstream Moving Target

By shifting their focus “upstream,” adversaries can infect a single component that is then distributed “downstream” using legitimate software workflows and update mechanisms.

Next-generation cyberattacks targeting open-source software projects have increased 430% year-over-year. The attacks are possible because:

  • Open-source projects rely on contributions from thousands of volunteer developers and discriminating between those with good or malicious intent is difficult, if not impossible. 
  • Open-source projects incorporate hundreds to thousands of dependencies from other open-source projects, many of which contain known vulnerabilities. 
  • The ethos of open source is built on shared trust between a global community of individuals, which creates a fertile environment for bad actors. 

When adversaries deliberately and secretly inject malicious code into open-source projects, they can surreptitiously “set traps” upstream and then carry out attacks downstream. This session explores: 

  • The evolution of software supply chain attacks; 
  • Their impact on open-source ecosystems; 
  • How companies can proactively protect themselves.

Midwest Cybersecurity Summit

Cyber Insurance and Risk: What's New in 2022?

Networking & Exhibition Break

Midwest Cybersecurity Summit

To CERT or Not to CERT: Establishing Trust Without Certificates

It is time to remove the calendar reminder for our certificate renewal.  Health Applications can verify enrollment into corporate management systems without deploying certificates. Learn how this is done with some common asset management solutions.

Closing Comments

Register

RSVP here to attend our events. You can select for multiple or individual tickets.

NOTE:  All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity. 

Past Sponsors

Gary Phipps

Vice President Strategy & Business Transformation, GRCP CTPRP, CyberGRX

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Matanda Doss

Executive Director, Cybersecurity and Technology Controls, Commercial Bank JPMorgan Chase & Co.

Greg Thompson

VP, CISO, ManuLife

Aaron Bostick

CISO, ThriveDX

Eric Sanchez

CISO, Kyowa Kirin Pharmaceutical

Colin Barry

Director, Cyber Threat Intelligence Expedia Group

Michael Bray

CISO, The Vancouver Clinic

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

The Summit Experience

CPE Credits

Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.

Future Events

February 15, 2024

Dynamic CISO Summit & Excellence Awards, 10th Ed.

April 16, 2024

Cybersecurity Implications of AI Summit: North America West Summit

February 13, 2024

Fraud, Security & Risk Management Summit: New York

December 7, 2023

Preparing for a Quantum-Safe Future by Managing Cryptographic Risk

December 14, 2023

Advancing Identity Governance: Transitioning from Legacy to Modern Solutions

Future Events

February 15, 2024

Dynamic CISO Summit & Excellence Awards, 10th Ed.

April 16, 2024

Cybersecurity Implications of AI Summit: North America West Summit

February 13, 2024

Fraud, Security & Risk Management Summit: New York