Why You Should Attend!



EXPLORE THE LATEST TRENDS AND TECHNOLOGICAL CAPABILITIES IMPACTING THE INFOSEC LANDSCAPE

Argyle Forum is bringing together leading InfoSec, IT, and Risk executives for our annual CISO Summit in Chicago. Throughout a full day of content and networking, we will focus on the most pressing issues that InfoSec professionals are facing moving into 2017, with an agenda geared specifically towards CISOs, CSOs, Security VPs, and Directors in a leadership role.  Topics will include:

  • Properly preparing for an inevitable multi-cloud future
  • Strategizing recovery plans and solutions from an organizational cyberattack
  • Discovering emerging security capabilities and how leading organizations are managing the adoption process
  • Exploring new ways to secure the mobile network
  • Understanding how emerging regulatory changes will impact global business operations
  • Conducting comprehensive and regular information security risk assessments
  • Building a workforce for the future of InfoSec

Our keynote addresses, fireside chats, and panel sessions, and interactive group discussions will give you the perspective and actionable takeaways that only a room of the best minds in Chicago can provide. Speakers at our 2016 Chicago Forums included John Dolce, CISO and Director at American Medical Association; Bob Eichler, Head of Information Security at Cancer Treatment Centers of America; Aman Raheja, CISO at BMO Harris Bank; Richard Rushing, CISO at Motorola Mobility and more.

We look forward to bringing together another fantastic faculty in 2017, and to hosting you alongside our community of Fortune 500 CISO leaders hailing from Chicago and beyond.

This event will feature insights from top executives, including:

If you'd like to recommend a speaker, please email Rhonda Le at rle@argyleforum.com.

Speaker
ARGYLE HOST Fred Kwong Chief Information Security Officer
Delta Dental
View Bio »
Speaker
Tim Bengson Vice President, Global Cyber Security & Risk Management
Kellogg's
View Bio »
Speaker
Michael Cruger Regional Sales Manager
Vidder
View Bio »
Speaker
Daren Glenister Field Chief Technology Officer
Synchronoss
View Bio »
Speaker
John Iatonna Senior Vice President, Information Security
Edelman
View Bio »
Speaker
David Komendat Vice President & Chief Security Officer
Boeing
View Bio »
Speaker
Ricardo Lafosse Chief Information Security Officer
Cook County
View Bio »
Speaker
Seth McCallister Chief Information Security Officer
Hub International
View Bio »
Speaker
Michael McKee CEO
ObserveIT
View Bio »
Speaker
Matthew Memming Chief Information Security Officer
Navistar International
View Bio »
Speaker
Jim Motes Vice President, Information Security
Kohler Co.
View Bio »
Speaker
Aman Raheja Chief Information Security Officer
BMO Harris Bank
View Bio »
Speaker
Jill Rhodes Chief Information Security Officer (CISO) and Vice President
Option Care
View Bio »
Speaker
Aurelie Richard Senior Vice President, People Strategy, Global Human Resources
Schneider Electric
View Bio »
Speaker
Richard Rushing Chief Information Security Officer
Motorola Mobility
View Bio »
Speaker
Raghbir Sandhu Chief Security Architect
Kellogg's
View Bio »
Speaker
Jeremy Wittkop Chief Technology Officer
InteliSecure
View Bio »
  • 8:00am – 9:00am Breakfast
  • 9:00am – 9:10am Opening Remarks featuring Argyle Host Fred Kwong
    read more »

    Fred Kwong
    Chief Information Security Officer 
    Delta Dental

  • 9:10am – 9:45am Keynote Presentation featuring Boeing: “Starting your Insider Threat Program, it’s not as easy as you might think”
    read more »

    What does it take to build an effective insider threat program within your company? Do you have the right support, people, culture and emotional resilience to be successful? We will share many of the lessons learned…both good and bad…in our journey to create an industry leading Insider Threat Program. 

    Dave Komendat
    Vice President & Chief Security Officer
    The Boeing Company

  • 9:45am – 10:05am Thought Leadership Spotlight featuring Synchronoss: "The State of Enterprise Mobility"
    read more »

    Daren Glenister
    Field Chief Technology Officer
    Synchronoss

  • 10:05am – 10:30am Networking Break
  • 10:30am – 10:50am Thought Leadership Spotlight featuring ObserveIT: "Best Practices for Building an Insider Threat Program"
    read more »

    The greatest cybersecurity threat an organization faces is no longer the malicious outsider hacking from beyond network firewalls. It is the insiders – the contractors, vendors, privileged users and business users - whose actions create the most risk. Whether intentional or malicious, you need to quickly identify and eliminate insider threat risk. Attend this session to learn best practices for building and maintaining an effective insider threat program.


    Michael McKee
    CEO
    ObserveIT

  • 10:50am – 10:55am Session Introduction featuring Vidder
    read more »

    Michael Cruger
    Regional Sales Manager 
    Vidder

  • 10:55am – 11:40am Panel Discussion: “Proactively Securing the Business Today for a Better Tomorrow”
    read more »

    Session topics include, but are not limited to:

    • Best practices for improving the entire application life cycle, alleviating common security concerns associated with the cloud
    • New skillsets necessary to differentiate the organization with data
    • Balancing all of these demands with potential threats to corporate data
    • Pinpointing top weaknesses that increase risk
    • Detecting and combatting advanced threats
    • The transformation of the CISO in relation to cyber threats

    Moderator:

    Jill Rhodes
    Chief Information Security Officer (CISO) and Vice President 
    Option Care

    Panelists:

    Fred Kwong
    Chief Information Security Officer 
    Delta Dental

    Ricardo Lafosse
    Chief Information Security Officer 
    Cook County

    Raghbir Sandhu
    Chief Security Architect 
    Kellogg's

    Jeremy Wittkop
    Chief Technology Officer 
    InteliSecure

  • 11:40am – 12:00pm Networking Break
  • 12:00pm – 12:35pm Keynote Presentation featuring Kohler Co.: "A Community Approach to Cyber Security"
    read more »

    Years ago, CISOs were struggling to find budget dollars to implement necessary control measures throughout their enterprise and were often forced to make tough decisions about where to invest their limited security dollars.  Today, company executives and boards are far more attuned to cyber security risks and have increased security budgets resulting in many security departments having access to funds for implementing a more comprehensive security program.  Unfortunately, this can often be an inaccurate measure of a corporation’s security posture. Granted, there may be a collection of controls, countermeasures, and procedures in place to detect and prevent threats, but there is another critical factor to consider; Are there adequate numbers of trained resources available to implement the strategy and ensure all the functions and features are enabled?  How many associates are monitoring and/or responding to alerts and logs generated by these systems?  Basically, it comes down to resources and as we all know, there is a critical shortage of cyber security professionals.

    This immediate need for qualified security personnel won’t wait the five or more years it will take to develop adequate numbers of qualified security staff.  Many security teams are overtasked and failing to perform all the duties necessary to accomplish their operational objectives.  Teams have severe gaps in training and experience.  The very best in each security organization will often be overwhelmed by their formal workloads and the informal mentoring they do to support other team members.  This puts retention of the most talented individuals at risk but there’s little room for security management to maneuver away from these scenarios.

    This discussion will focus on a community approach to meeting this critical challenge to protecting corporate operations, intellectual property, and critical systems.  We will discuss how security executives might seek out their peers and establish a Mutual Security Support Agreement to engage their peers during a security crisis and effectively augment their own security team at no additional cost A Mutual Security Support Agreement is simply a formal document stating that each “member” is entitled to receive information, security resources and assistance in the event of a security request from other members.  We will also discuss other benefits of a Mutual Security Support Agreement in areas of training, joint team exercises, and skill development.

    Intended Audience

    • Information security leaders
    • Business leaders

    Take Aways

    • Familiarity with a shift in how we think about security staff augmentation
    • Understand how this approach can offset the ever-increasing risk to your organization
    • Handout of a Mutual Security Support Agreement template for attendees use

    Jim Motes
    Vice President, Information Security 
    Kohler Co.

  • 12:35pm – 1:35pm Lunch
  • 1:35pm – 2:20pm Panel Discussion: “Securing and Closing the Gap on IT Talent”
    read more »

    Session topics include, but are not limited:

    • Laying the groundwork for IT & HR to collaborate in your business  
    • Best practices and lessons learned for establishing this collaborative relationship
      • Partnering with different functions outside of IT to develop the skills of existing teams
      • Addressing training and development challenges for these new skills 
      • Creating organizational changes around employee engagement to create long-term development of talent and align business objectives
      • Efforts impacting retention rate
    • Hiring differently with regards to the millennial generation
      • Organizations adapting to better accommodate millennials in terms of the tools that they expect

    Moderator:

    John Iatonna
    Senior Vice President, Information Security 
    Edelman

    Panelists: 

    Tim Bengson
    Vice President, Global Cyber Security & Risk Management
    Kellogg's

    Seth McCallister
    Chief Information Security Officer 
    Hub International

    Matthew Memming
    Chief Information Security Officer 
    Navistar International

    Aurelie Richard
    Senior Vice President, People Strategy, Global Human Resources
    Schneider Electric

  • 2:20pm – 2:40pm Networking Break
  • 2:40pm – 3:15pm Keynote Presentation featuring Motorola Mobility: "Fast Crime, Friendenemies and the Borg The State of CyberSecurity 2017"
    read more »

    So if we take a look at the past and use it to judge what our future will be, the cybersecurity ocean is a dark, and scary place.  We are just a small boat, being pushed about by the waves of attacks, and new threats, with no navigation system or lighthouse to guide us, We just drift about seemingly waiting for the pirates to board our ship.

    Not such a nice picture but this is where we are heading,  So how can we change our directions, are our businesses or organizations rudderless ships to be pushed about by the waves of cybercrime.  The good news is that we do not need to drift about anymore, we can move in any direction we wish.

    We will have to learn to live with the storm, but what is is a little rain and the wind.  Batten Down the Hatches, and hold on, is the new normal. We discover the speed is critical, and so many of the ways we have done things in the past, need to be redesigned, we need to take away the simple tasks and simplify the complex. Information is our strength so we should use it.

    We have more tools, people, and support than we have ever had in the history of security, so use it NOW!

    Richard Rushing
    Chief Information Security Officer 
    Motorola Mobility

  • 3:15pm – 3:50pm Keynote Presentation featuring BMO Harris Bank: "The Weakest Link in Information Security Programs"
    read more »

    Try asking around the room, “What is the weakest link in your organization that could expose you to a potential significant security incident?” You will likely get answers that run the gamut:  technology weaknesses (such as legacy systems, missing patches, etc.); process weaknesses (such as lack of security engagement in SDLC); and human factors (such as clicking on phishing emails). How do you prioritize what the organization should tackle first that could be more consequential than others? Further, how do you consider external threats, compliance requirements, business impact and investment? In this session we will discuss how you identify the opportunities, prioritize and then act upon these weak links.

    Aman Raheja
    Chief Information Security Officer 
    BMO Harris Bank

  • 3:50pm – 4:00pm Closing Remarks featuring Argyle Host Fred Kwong
    read more »

    Fred Kwong
    Chief Information Security Officer 
    Delta Dental

  • 4:00pm – 5:00pm Closing Reception

What will be discussed? Explore security hot topics and challenge areas such as:

Transparency and security

Define how the concepts of identity and access management are building and shaping new security perimeters, and hear how successful organizations are managing identities in applications. Learn how top CIOs and CISOs are:

  • Lowering costs and risks related to security
  • Achieving success through data management
  • Defining the key benefits of SSO
  • Protecting enterprise data across the organization

Security and innovation

Evaluate what technologies will have the biggest impact on the business world in the year ahead, and reflect on the reality of IT security becoming a business enabler. Our speakers will discuss:

  • Tracking the improvement of wireless networks
  • Choosing the best devices to support internally
  • Cutting costs through cloud technology
  • Taking stock of risks imposed by the mobile channel

The Evolution of IT

Discuss the importance of having accurate information on customers and prospects in real time, and how the rise of apps, data management tools and practices like hosting have added made the business of protecting enterprise information more complex. Gain insight into:

  • Enriching the customer experience with real-time data
  • Staying alert to prevent theft of data and/or funds
  • Overcoming barriers to implementing multichannel integration
  • Evaluating security risks mobile devices present and how to respond

Still have questions? We have answers.

I want to attend, but what if I'm unsure of my schedule and need to cancel my participation?

Just let us know. We understand that schedules change! However, we always have a waiting list for this event, and if you don't cancel, we will assume you are still attending and your spot will go unused. If you must, cancel at least 48 hours prior to the event to make room for others!

What if I can't be OOO for a whole day, or need to come late?

We have wifi and private rooms available for attendees to take calls and spend some quiet time on emails, as well as access to printing. Have a morning meeting you can't miss? No problem. This event was designed for busy executives - we get it.

I'd like to bring some colleagues. Do I need to register them online?

Events are more fun with friends, and we'd be happy to host your team. You can have them register online, or send us their names, titles and email addresses and we will take care of it for you!

I don't see the event venue listed. Where will the meeting be held?

To maintain exclusivity, we don't release the venue address until the registration process has been completed. All logistical details will be shared once you have requested a pass and been approved.

The "2017 Chief Information Security Officer (CISO) Leadership Forum in Chicago"
is proudly sponsored by:

About Image
  • "Not only are the speakers relevant and experts in their fields, but I was able to make some great connections at the meetings as well."

    The Chief Technology Officer at PC Richard and Son on the quality of past Argyle CIO Forums.

  • "Argyle's meetings are well balanced in terms of panels and presentations and networking opportunities with local business leaders."

    A Head of Emerging Business and Technology at Ericsson on attending Argyle CIO events.

  • "The meetings that Argyle Executive Forum runs are truly enjoyable and well put together....I'm looking forward to the next forum."

    A VP of Information Systems at Garmin International on attending Argyle events.

Traveling for the event? Stay at one of our recommended hotels nearby:

Please note the below is the preferred hotel of Argyle Executive Forum. Please specify that you are part of the Argyle group when booking sleeping rooms in order to receive a discounted rate of $189.00 per night, taxes not included.

Venue

Hotel Blake Chicago


500 South Dearborn
Chicago, IL 60605
Telephone: (312) 986-1234
Website