2018 Chief Information Security Officer (CISO) Leadership Forum
Why You Should Attend!#ArgyleCISO
Argyle Executive Forum is bringing together leading InfoSec, IT, and Risk executives for our annual CISO Forum in Chicago. Throughout a full day of content and networking, we will focus on the most pressing issues that InfoSec professionals are facing moving into 2018. With an agenda geared specifically towards leaders in InfoSec, IT and Risk, topics discussed will include:
- Properly preparing for an inevitable multi-cloud future - fully and securely embracing the cloud
- Strategizing recovery plans and solutions from an organizational cyberattack – transitioning from recovery to resilience
- Discovering emerging security capabilities and how leading organizations are managing the adoption process
- Exploring new ways to secure the mobile network, particularly when traditional security measures are no longer effective
- Understanding how emerging regulatory changes will impact global business operations, and how to best prepare
- Building a workforce for the future of InfoSec - attaining, training, and retaining talent through in-demand skillset development and mentoring opportunities
Our keynote presentations, fireside chats, panel sessions and networking breaks will encourage candid discussions with your peers focused on these topics and more. We look to hosting you alongside our community of Fortune 500 CISO leaders hailing from Chicago and beyond!
Register to Attend
This event will feature insights from top executives, including:
If you'd like to recommend a speaker, please email Natasha Guzman at firstname.lastname@example.org.
Nexteer Automotive View Bio »
Arun DeSouza has extensive global IT and security leadership experience. He is currently Chief Information Security & Privacy Officer at Nexteer Automotive Corporation. Prior roles include Chief Information Security Officer and Director, Strategic Planning and Information Security at Inergy Automotive Systems.
Arun’s areas of expertise include security strategy, risk management, identity management, cloud and privacy. His current interests include the Internet of Things (IoT) and security analytics.
Arun earned Master’s and PhD degrees from Vanderbilt University and a Bachelor’s degree in Chemical Engineering from Indian Institute of Technology (Madras).
Arun is a Certified Information Systems Security professional (CISSP). He has won multiple industry honors: Computerworld Premier 100 IT Leaders Award, CIO Ones to Watch Award and the Network World Enterprise All Star Award. He is a member of the Society for Information Management and the International Association of Privacy Professionals.
Fifth Third Bank View Bio »
A 7th grade career test revealed that Cherisse Estes was destined to be a System Analyst, not a Dentist as her 5 year old self had proclaimed. With detours down the path of want-to-be roller coaster designer, nuclear engineer and mathematician, she landed right where that career test directed, an Analyst in Information Technology.
With over 20 years and counting in Information Technology, Cherisse has acquired a tapestry of experience from System Support, Project and Program Management to Portfolio Ownership, Process Design and Improvement. Additionally she has acquired PMP and Lean Six Sigma certifications and has made an art form of applying agile type mythologies to waterfall and Mainframe development projects.
Today she spends her days in the trenches as a Business System Analyst, helping solve business challenges with technical solutions, teaching and mentoring Junior Analysts in the ways of the big project life as well as nurturing relationships with her Business partners. She spends her evenings being a wife, mom, daughter and sister but most notably as “Truth Teller”, writing and speaking about the challenges in life and how we overcome them but not always gracefully.
Northern Trust Corporation View Bio »
Speaker bio coming soon...
Lookout View Bio »
As Chief Product Officer at Lookout, Santosh is responsible for product management and the ongoing development of predictive security solutions that protect individuals and enterprises alike from mobile attacks. Previously, he was the head of ventures at Akamai Technologies where he focused on strategic investments in early-stage companies. He also served as Senior Director of Product Management at Akamai for the licensed CDN portfolio. In 2006, Santosh co-founded Verivue, a CDN solutions company, and served as Vice President of Products, until the company was acquired by Akamai in 2012. Santosh started his career as a research scientist and product architect at Bell Labs (then part of Lucent Technologies), where among other projects, he was an architect of Lucent’s best-selling switching chipset. Santosh holds a PhD with distinction from Columbia University and a B. Tech. from Indian Institute of Technology (IIT), Bombay, both in Computer Science.
General Growth Properties View Bio »
Speaker bio coming soon...
A leading healthcare company View Bio »
Speaker bio coming soon...
CIBC US View Bio »
Speaker bio coming soon...
Analytical Intel, LLC View Bio »
Sarah Reeser, PMP, ITIL, CISM brings 20+ years of leading within domestic and international teams to provide technology enabled business solutions and services, specifically accommodating those organizations that have gone through acquisitions, mergers and separations. She has led many large projects and efforts within various industries, including, Banking/Capital Markets, Healthcare/Life Sciences, Insurance, Manufacturing, Energy/Technology, Consumer/Retail, Travel/Transportation and Government.
Sarah believes in being a “silo-surfer” and taking a holistic approach to leading projects. She has expertise in facilitating interactive cooperation, consensus, and commitment with stakeholders, business users, and team members. Her vast experience working with multiple methodologies and attention to the ‘details’ has given her the ability to assist organizations in bringing the awareness around ‘business impacts’ of their respective operational processes, applications, data interfaces and back office systems to exceed business, security, compliance and customer needs.
Big 4 advisory service providers have sought to bring in Sarah to consult for their respective clients to problem solve business challenges in blending technology, mining and joining data from multiple sources while applying data governance best practices.
Motorola Mobility View Bio »
Mr. Richard Rushing is the Chief Information Security Officer for Motorola Mobility LLC.; Richard participates in several corporate, community, private, and government security council’s and working groups setting standards, policies, and solutions to current and emerging security issues. As Chief Information Security Officer for Motorola Mobility he has lead the security effort by developing an international team to tackle the emerging threats of mobile devices, targeted attacks, and cyber-crime. He organized, developed and deployed practices, tools and techniques to protect the intellectual property across the world-wide enterprise. A much-in-demand international speaker on information security Richard has presented at many leading security conferences and seminars around the world.
Kellogg's View Bio »
Raghbir Singh Sandhu is Senior Security Architect at Kellogg. I lead in resolving the risks of operating in the 21st Century digital age. Strategic and proactive Information Security Executive specializing in balancing business needs with the risks and cost of controls. Partnered with business executives to create direction, drives alignment, delivers results and organizes to win. Act as a change agent, with a history of building and enforcing comprehensive security and compliance programs that exceed business needs with minimal overhead costs. As Cyber Security Executive, I protect company’s tangible and intangible assets from cyber and internal threats. Established, managed, and performed Cyber Security Operations Programs effectively in way that limits damage, increases the confidence of stakeholders, and reduces recovery time and cost. Manage the development and implementation of global security policy, standards, guidelines and procedures. Strong record of successfully deploying the robust IT security solutions to protect the organization brand, intellectual property and information assets.
As a lead founding member of the Kellogg Global Security Organization reporting to CISO, comprehensively contributed to build a world class global Information Security organization, establish security strategy and framework, setup a strong Security Engineering and Operations Center (SOC) teams. Accountable for maintain the privacy and security of the confidential data and ensuring the confidentiality, integrity, and availability of the systems, personal computers, network environment. Provided direction, guidance, and Due-Diligence support for the overall security and risk management to the various IT programs and initiatives.
Raghbir is a CISSP (Certified Information System Security Professional), a CRISC (Certified Risk and Information System Control), a CISM (Certified Information Security Manager), a PMP (Certified Project Management Professional), and an ITIL Certification.
Fugue View Bio »
Josh Stella is Co-founder and CEO of Fugue, which radically simplifies cloud operations and centralizes cloud control by automating and enforcing infrastructure at scale. Previously, Josh was a Principal Solutions Architect at Amazon Web Services. He has served as CTO for a prior startup and in numerous other technical and leadership roles over the last 25 years. With the Fugue team, Josh authored Scalable Cloud Ops with Fugue, published by The Pragmatic Bookshelf and the O’Reilly guide: Immutable Infrastructure: Considerations for the Cloud and Distributed Systems, as well as numerous articles.
UW-Madison View Bio »
Bob Turner is the Chief Information Security Officer at the University of Wisconsin-Madison. He leads the development and delivery of a comprehensive information security and privacy program by collaboratively implementing information security controls to protect UW-Madison information and its infrastructure from external or internal threats, and to assure that UW-Madison complies with statutory and regulatory requirements regarding information access, security and privacy.
Prior to joining the UW-Madison, Bob was Senior Associate with the strategy and technology consulting firm of Booz Allen Hamilton where he focused on cybersecurity policy and compliance with assessment and approval of information systems along with cyber security inspection as principal strengths. Before Booz Allen Hamilton, Bob had a 23 year Navy career in telecommunications and information systems management.
Bob earned a BS degree in Administration and Management from Excelsior College and holds a MS in IT from Capella University. He is a Certified Information Systems Security Professional and Certified Business Continuity Professional with National Information Assurance Training Standard certificates as a Senior Systems Manager and Systems Certifier issued from the Naval Post Graduate School.
Bob has experience as Adjunct Faculty at ECPI University’s Newport News, Virginia campus teaching upper level courses in the Network Security Degree program within the Computer Information Systems Department.
OSI Group View Bio »
Michael Welch is Global Chief Information Security Officer at OSI Group, LLC and has worked in the Information Security Industry for 18 years. The last ten years have focused in the utility industry with the concentration on implementing preventative and detective technical controls as it relates to the convergence of IT and OT technologies. In addition, his focus is on building security strategies that align with the business needs, corporate governance, risk management and data privacy. He has held a number of industry certifications such as CISSP, CISM, CISA and GICSP and recently completed his MBA with specializations in Project Management and Information Security. Prior to joining OSI Group, LLC he worked for Burns & McDonnell Engineering and NextEra Energy.
7:45am – 8:45am Breakfast
8:45am – 8:50am Argyle Opening Remarks
8:50am – 9:25am Keynote Presentation featuring UW-Madison: "From FUD to Forward: A CISO’s Journey"
read more »
Higher education and research is, in practice and by necessity, an open and collaborative society driven by the need to share information without hindrance. The daily business practices have the potential to expose protected personal or healthcare information, protected and unpublished research, patentable discoveries and inventions, and large volumes of financial information. Communicating the practices and policies may easily result in promoting fear, uncertainty and doubt, also known as FUD, to motivate users and data owners toward the “right” behaviors. The University of Wisconsin-Madison’s Office of Cybersecurity chooses to move in the direction of partnership as they inform and involve the community of over 22,000 faculty, researchers and staff along with 43,000 students; without FUD as the centerpiece.
In his key note address, Bob Turner provides insight into the issues of communication and community engagement the University of Wisconsin-Madison has travelled with a glimpse of the trail ahead.
Chief Information Security Officer (CISO)
9:25am – 9:45am Thought Leadership Spotlight featuring Lookout: "Why Phishing is Both Different and More Problematic on Mobile"
read more »
The traditional corporate perimeter is evaporating as the enterprise continues its fundamental shift to a mobile-enabled workplace. Now, all endpoints, but particularly mobile devices, are outside the firewall and freely accessing not just enterprise apps and SaaS, but also personal services like social media and email. In this new world, attackers take advantage of the blending of personal and enterprise accounts and the vulnerability of devices outside the firewall to gain access to corporate data and credentials via new vectors for phishing attacks, including SMS and messaging platforms like WhatsApp, Facebook Messenger, etc.
Chief Product Officer
9:45am – 10:10am Networking Break
10:10am – 10:55am Panel Discussion: Security Innovation: Unifying Proactive & Reactive
read more »
Session topics include, but are not limited to:
- What are some insider threats that are top of mind for you at your organization?
- How do you pinpoint top weaknesses that increase risk within the company?
- Discuss the importance of implementing both a proactive & reactive strategy within your organization?
- How do you drive innovation while mitigating risk, ensuring continuous compliance & maintaining security?
- How do you leverage tools like the cloud to promote efficiency while maintaining a secure digital environment?
- What are primary threats to the business in the cloud, and what practices & controls are necessary for compliance?
- What’s the best method to plan and prevent insider threats and cyberattacks?
- How do you balance demands that are potential threats to corporate data within your organization
CISO and Privacy Officer
Senior Director, Cyber & Information Security
Director of Network Security
A Leading Healthcare Provider
10:55am – 11:15am Thought Leadership Spotlight featuring TrendMicro
11:15am – 11:35am Networking Break
11:35am – 12:10pm Keynote Presentation featuring Motorola Mobility
read more »
Chief Information Security Officer
12:10pm – 1:10pm Lunch
read more »
1:10pm – 1:55pm Panel Discussion: Women in Information Security: Breaking the Digital Ceiling
read more »
Session topics will include but are not limited to:
- Describe your career journey and your personal experience in your previous and current role in the industry.
- In your experience, how have you seen women break down barriers in regards to challenges in your department and organization?
- How do you define InfoSec excellence?
- If we understood and valued more of the right skills needed in today’s environment, would that naturally translate to more women in InfoSec?
- How are you partnering with HR and other departments in efforts to bring in more women into InfoSec?
- What advice do you have for the audience to increase the number of women working and holding management positions in Infosec
Analytical Intel, LLC
Assistant Vice President, Information Technology Product Management
Fifth Third Bank
Managing Director - Transformational Strategist / Technology Business Partner
1:55pm – 2:15pm Networking Break
2:15pm – 2:50pm Keynote Session featuring Northern Trust
read more »
Senior Vice President, Security Technology Operations & Architecture
2:50pm – 3:25pm Keynote Session featuring Kellogg's: "Cybersecurity Practice Overview"
read more »
New technologies driving the digital transformation and intensifying the new risks have emerged to the business. Despite how sophisticated information security has become, the fundamental of Cyber Security Framework to integrate the People, Process, and Technology is the key to successfully protect the organization from the cyber threats and risks.
Sr. Security Architect
3:30pm – 3:35pm Argyle Closing Remarks
3:35pm – 4:35pm Closing Reception
What will be discussed? Explore security hot topics and challenge areas such as:
Security and innovation
Evaluate what technologies will have the biggest impact on the business world in the year ahead, and reflect on the reality of IT security becoming a business enabler. Our speakers will discuss:
- Tracking the improvement of wireless networks
- Choosing the best devices to support internally
- Cutting costs through cloud technology
- Taking stock of risks imposed by the mobile channel
Building an Effective Security Strategy
Review the major changes the field of IT has experienced over the past few years, the driving forces behind them, and the barriers they present. Get briefed on:
- Driving long-term business initiatives
- Overcoming barriers to a solid mobile strategy
- Aligning risk management with business priorities
- Developing a successful incident response plan for security incidents
The Evolution of IT
Discuss the importance of having accurate information on customers and prospects in real time, and how the rise of apps, data management tools and practices like hosting have added made the business of protecting enterprise information more complex. Gain insight into:
- Enriching the customer experience with real-time data
- Staying alert to prevent theft of data and/or funds
- Overcoming barriers to implementing multichannel integration
- Evaluating security risks mobile devices present and how to respond
Transparency and security
Define how the concepts of identity and access management are building and shaping new security perimeters, and hear how successful organizations are managing identities in applications. Learn how top CIOs and CISOs are:
- Lowering costs and risks related to security
- Achieving success through data management
- Defining the key benefits of SSO
- Protecting enterprise data across the organization
Still have questions? We have answers.
I want to attend, but what if I'm unsure of my schedule and need to cancel my participation?
Just let us know. We understand that schedules
we always have a waiting list for this event,
and if you don't
cancel, we will assume you are still attending
and your spot will
go unused. If you must, cancel at least 48 hours
prior to the
event to make room for others!
What if I can't be OOO for a whole day, or need
to come late?
We have wifi and private rooms available for
attendees to take
calls and spend some quiet time on emails, as
well as access to
printing. Have a morning meeting you can't miss?
No problem. This
event was designed for busy executives - we get
I'd like to bring some colleagues. Do I need to
Events are more fun with friends, and we'd be happy to host your team. You can have them register online, or send us their names, titles and email addresses and we will take care of it for you! request a pass.
I don't see the event venue listed. Where will
the meeting be
To maintain exclusivity, we don't release the
venue address until
the registration process has been completed. All
details will be shared once you have requested a
pass and been
The "2018 Chief Information Security Officer (CISO) Leadership Forum" in Chicago
is proudly sponsored by:
"Not only are the speakers relevant and experts in their fields, but I was able to make some great connections at the meetings as well."
The Chief Technology Officer at PC Richard and Son on the quality of past Argyle CIO Forums.
"Argyle's meetings are well balanced in terms of panels and presentations and networking opportunities with local business leaders."
A Head of Emerging Business and Technology at Ericsson on attending Argyle CIO events.
"The meetings that Argyle Executive Forum runs are truly enjoyable and well put together....I'm looking forward to the next forum."
A VP of Information Systems at Garmin International on attending Argyle events.
Request a Pass
DON'T MISS OUT! SECURE YOUR PLACE TODAY.
Register to Attend
Reserve a complimentary ticket
*EXECUTIVES AT THE DIRECTOR-LEVEL AND ABOVE FROM ORGANIZATIONS WITH OVER 100MM IN REVENUES ONLY
Traveling for the event? Stay at one of our
Please note the below is the preferred hotel of Argyle Executive Forum. Please specify that you are part of the Argyle group when booking sleeping rooms in order to receive a discounted rate of $189 per night, taxes not included. For details on where the event will take place, please contact your Argyle relationship manager.