Why You Should Attend!


Argyle Forum is bringing together leading InfoSec, IT, and Risk executives for our annual CISO Summit in Chicago. Throughout a full day of content and networking, we will focus on the most pressing issues that InfoSec professionals are facing moving into 2017, with an agenda geared specifically towards CISOs, CSOs, Security VPs, and Directors in a leadership role.  Topics will include:

  • Properly preparing for an inevitable multi-cloud future
  • Strategizing recovery plans and solutions from an organizational cyberattack
  • Discovering emerging security capabilities and how leading organizations are managing the adoption process
  • Exploring new ways to secure the mobile network
  • Understanding how emerging regulatory changes will impact global business operations
  • Conducting comprehensive and regular information security risk assessments
  • Building a workforce for the future of InfoSec

Our keynote addresses, fireside chats, and panel sessions, and interactive group discussions will give you the perspective and actionable takeaways that only a room of the best minds in Chicago can provide. Speakers at our 2016 Chicago Forums included John Dolce, CISO and Director at American Medical Association; Bob Eichler, Head of Information Security at Cancer Treatment Centers of America; Aman Raheja, CISO at BMO Harris Bank; Richard Rushing, CISO at Motorola Mobility and more.

We look forward to bringing together another fantastic faculty in 2017, and to hosting you alongside our community of Fortune 500 CISO leaders hailing from Chicago and beyond.

Register to Attend

This event will feature insights from top executives, including:

If you'd like to recommend a speaker, please email Rhonda Le at rle@argyleforum.com.

Tim Bengson Vice President, Global Cyber Security & Risk Management
View Bio »
John Iatonna Senior Vice President, Information Security
View Bio »
David Komendat Vice President & Chief Security Officer
View Bio »
Fred Kwong Chief Information Security Officer
Delta Dental
View Bio »
Ricardo Lafosse Chief Information Security Officer
Cook County
View Bio »
Seth McCallister Chief Information Security Officer
Hub International
View Bio »
Matthew Memming Chief Information Security Officer
Navistar International
View Bio »
Aman Raheja Chief Information Security Officer
BMO Harris Bank
View Bio »
Jill Rhodes Chief Information Security Officer (CISO) and Vice President
Option Care
View Bio »
Richard Rushing Chief Information Security Officer
Motorola Mobility
View Bio »
John Sander Senior Director and Chief Information Security Officer
DeVry Inc.
View Bio »
Jenifer White Visek Vice President, Cyber, Tech E&O
Aon Corporation
View Bio »
  • BREAKFAST Kick off the day with a healthy breakfast and networking. Connect with your peers in the CISO community from a variety of industries before the morning’s content begins.
  • OPENING KEYNOTE Keynote Session: “Starting your Insider Threat Program, it’s not as easy as you might think”
    read more »

    What does it take to build an effective insider threat program within your company? Do you have the right support, people, culture and emotional resilience to be successful? We will share many of the lessons learned…both good and bad…in our journey to create an industry leading Insider Threat Program. 

    Dave Komendat
    Vice President & Chief Security Officer
    The Boeing Company

  • MORNING NETWORKING BREAKS Take a break to make new connections and discuss the morning presentations over coffee and snacks.
  • PANEL DISCUSSION “Combatting Malvertising, Ransomware, and the Rise of Cyber Threats”
    read more »

    Session topics include, but are not limited to:

    • Discussing  heavily targeted industries for ransomware
    • How organizations are taking precautionary measures
    • Examining the evolution of the CISO role in relation to the rise of cyber threats
    • Taking a look at the latest developments within the ransomware and malvertising space
    • Pinpointing top weaknesses that are impacting the organizations
    • Best practices for detecting and combatting advanced threats

  • LUNCH Take a midday break to grab lunch, network with your peers, and discuss the morning presentations.
  • PANEL DISCUSSION “Securing and Closing the Gap on IT Talent”
    read more »

    Session topics include, but are not limited:

    • Laying the groundwork for IT & HR to collaborate in your business  Best practices and lessons learned for establishing this collaborative relationship
      • Partnering with different functions outside of IT to develop the skills of existing teams
      • Addressing training and development challenges for these new skills 
      • Creating organizational changes around employee engagement to create long-term development of talent and align business objectives
      • Efforts impacting retention rate
      • Hiring differently with regards to the millennial generation
        • Organizations adapting to better accommodate millennials in terms of the tools that they expect

  • AFTERNOON NETWORKING BREAKS Take a break to switch tables, meet some new peers, and discuss the afternoon presentations over coffee and snacks.
  • CLOSING RECEPTION Wrap up the day with a cocktail (or a few!) and hors d'Oeuvres. Head home with new connections and a notebook full of key takeaways to implement back at the office.

What will be discussed? Explore security hot topics and challenge areas such as:

Security and innovation

Evaluate what technologies will have the biggest impact on the business world in the year ahead, and reflect on the reality of IT security becoming a business enabler. Our speakers will discuss:

  • Tracking the improvement of wireless networks
  • Choosing the best devices to support internally
  • Cutting costs through cloud technology
  • Taking stock of risks imposed by the mobile channel


Review the major changes the field of IT has experienced over the past few years, the driving forces behind them, and the barriers they present. Get briefed on:

  • Driving long-term business initiatives
  • Overcoming barriers to a solid mobile strategy
  • Aligning risk management with business priorities
  • Developing a successful incident response plan for security incidents

The Evolution of IT

Discuss the importance of having accurate information on customers and prospects in real time, and how the rise of apps, data management tools and practices like hosting have added made the business of protecting enterprise information more complex. Gain insight into:

  • Enriching the customer experience with real-time data
  • Staying alert to prevent theft of data and/or funds
  • Overcoming barriers to implementing multichannel integration
  • Evaluating security risks mobile devices present and how to respond

Transparency and security

Define how the concepts of identity and access management are building and shaping new security perimeters, and hear how successful organizations are managing identities in applications. Learn how top CIOs and CISOs are:

  • Lowering costs and risks related to security
  • Achieving success through data management
  • Defining the key benefits of SSO
  • Protecting enterprise data across the organization

Still have questions? We have answers.

I want to attend, but what if I'm unsure of my schedule and need to cancel my participation?

Just let us know. We understand that schedules change! However, we always have a waiting list for this event, and if you don't cancel, we will assume you are still attending and your spot will go unused. If you must, cancel at least 48 hours prior to the event to make room for others!

What if I can't be OOO for a whole day, or need to come late?

We have wifi and private rooms available for attendees to take calls and spend some quiet time on emails, as well as access to printing. Have a morning meeting you can't miss? No problem. This event was designed for busy executives - we get it.

I'd like to bring some colleagues. Do I need to register them online?

Events are more fun with friends, and we'd be happy to host your team. You can have them register online, or send us their names, titles and email addresses and we will take care of it for you! request a pass.

I don't see the event venue listed. Where will the meeting be held?

To maintain exclusivity, we don't release the venue address until the registration process has been completed. All logistical details will be shared once you have requested a pass and been approved.

The "2017 Chief Information Security Officer (CISO) Leadership Forum in Chicago"
is proudly sponsored by:

About Image
  • "Not only are the speakers relevant and experts in their fields, but I was able to make some great connections at the meetings as well."

    The Chief Technology Officer at PC Richard and Son on the quality of past Argyle CIO Forums.

  • "Argyle's meetings are well balanced in terms of panels and presentations and networking opportunities with local business leaders."

    A Head of Emerging Business and Technology at Ericsson on attending Argyle CIO events.

  • "The meetings that Argyle Executive Forum runs are truly enjoyable and well put together....I'm looking forward to the next forum."

    A VP of Information Systems at Garmin International on attending Argyle events.

BG Image

Traveling for the event? Stay at one of our recommended hotels nearby:

Please note the below is the preferred hotel of Argyle Executive Forum. Please specify that you are part of the Argyle group when booking sleeping rooms in order to receive a discounted rate of $189.00 per night, taxes not included.


Hotel Blake Chicago

500 South Dearborn
Chicago, IL 60605
Telephone: (312) 986-1234