Why You Should Attend!

Argyle Executive Forum is bringing together leading InfoSec, IT, and Risk executives for our annual CISO Forum in Chicago. Throughout a full day of content and networking, we will focus on the most pressing issues that InfoSec professionals are facing moving into 2018. With an agenda geared specifically towards leaders in InfoSec, IT and Risk, topics discussed will include:

  • Properly preparing for an inevitable multi-cloud future - fully and securely embracing the cloud
  • Strategizing recovery plans and solutions from an organizational cyberattack – transitioning from recovery to resilience
  • Discovering emerging security capabilities and how leading organizations are managing the adoption process
  • Exploring new ways to secure the mobile network, particularly when traditional security measures are no longer effective
  • Understanding how emerging regulatory changes will impact global business operations, and how to best prepare
  • Building a workforce for the future of InfoSec - attaining, training, and retaining talent through in-demand skillset development and mentoring opportunities


Our keynote presentations, fireside chats, panel sessions and networking breaks will encourage candid discussions with your peers focused on these topics and more. We look to hosting you alongside our community of Fortune 500 CISO leaders hailing from Chicago and beyond!

Register to Attend

Event RSVP

Need assistance with this form?

This event will feature insights from top executives, including:

If you'd like to recommend a speaker, please email Natasha Guzman at nguzman@argyleforum.com.

Arun Desouza Chief Information Security and Privacy Officer
Nexteer Automotive
View Bio »
Cherisse Estes Assistant Vice President, Information Technology Product Management
Fifth Third Bank
View Bio »
Ed Giles Senior Vice President, Security Technology Operations & Architecture
Northern Trust Corporation
View Bio »
Santosh Krishnan Chief Product Officer
View Bio »
Sean Nealon Director, Cyber security Architecture and Operations
General Growth Properties
View Bio »
Zulzani Noordin Director of Network Security
A leading healthcare company
View Bio »
Nazia Raoof Managing Director - Transformational Strategist / Technology Business Partner
View Bio »
Sarah Reeser CEO
Analytical Intel, LLC
View Bio »
Richard Rushing Chief Information Security Officer
Motorola Mobility
View Bio »
Raghbir Sandhu Sr. Security Architect
View Bio »
Josh Stella CEO
View Bio »
Bob Turner Chief Information Security Officer (CISO)
View Bio »
Michael Welch Chief Information Security Officer
OSI Group
View Bio »
  • 7:45am – 8:45am Breakfast
  • 8:45am – 8:50am Argyle Opening Remarks
  • 8:50am – 9:25am Keynote Presentation featuring UW-Madison: "From FUD to Forward: A CISO’s Journey"
    read more »

    Higher education and research is, in practice and by necessity, an open and collaborative society driven by the need to share information without hindrance.  The daily business practices have the potential to expose protected personal or healthcare information, protected and unpublished research, patentable discoveries and inventions, and large volumes of financial information.  Communicating the practices and policies may easily result in promoting fear, uncertainty and doubt, also known as FUD, to motivate users and data owners toward the “right” behaviors.  The University of Wisconsin-Madison’s Office of Cybersecurity chooses to move in the direction of partnership as they inform and involve the community of over 22,000 faculty, researchers and staff along with 43,000 students; without FUD as the centerpiece.    

    In his key note address, Bob Turner provides insight into the issues of communication and community engagement the University of Wisconsin-Madison has travelled with a glimpse of the trail ahead.

    Bob Turner
    Chief Information Security Officer (CISO)

  • 9:25am – 9:45am Thought Leadership Spotlight featuring Lookout: "Why Phishing is Both Different and More Problematic on Mobile"
    read more »

    The traditional corporate perimeter is evaporating as the enterprise continues its fundamental shift to a mobile-enabled workplace. Now, all endpoints, but particularly mobile devices, are outside the firewall and freely accessing not just enterprise apps and SaaS, but also personal services like social media and email. In this new world, attackers take advantage of the blending of personal and enterprise accounts and the vulnerability of devices outside the firewall to gain access to corporate data and credentials via new vectors for phishing attacks, including SMS and messaging platforms like WhatsApp, Facebook Messenger, etc.

    Santosh Krishnan
    Chief Product Officer

  • 9:45am – 10:10am Networking Break
  • 10:10am – 10:55am Panel Discussion: Security Innovation: Unifying Proactive & Reactive
    read more »

    Session topics include, but are not limited to:

    • What are some insider threats that are top of mind for you at your organization?
    • How do you pinpoint top weaknesses that increase risk within the company?
    • Discuss the importance of implementing both a proactive & reactive strategy within your organization?
    • How do you drive innovation while mitigating risk, ensuring continuous compliance & maintaining security?
    • How do you leverage tools like the cloud to promote efficiency while maintaining a secure digital environment?
    • What are primary threats to the business in the cloud, and what practices & controls are necessary for compliance?
    • What’s the best method to plan and prevent insider threats and cyberattacks?
    • How do you balance demands that are potential threats to corporate data within your organization



    Arun Desouza
    CISO and Privacy Officer
    Nexteer Automotive

    Sean Nealon
    Senior Director, Cyber & Information Security

    Zulzani Noordin
    Director of Network Security
    A Leading Healthcare Provider

    Josh Stella

    Michael Welch
    OSI Group

  • 10:55am – 11:15am Thought Leadership Spotlight featuring TrendMicro
  • 11:15am – 11:35am Networking Break
  • 11:35am – 12:10pm Keynote Presentation featuring Motorola Mobility
    read more »

    Richard Rushing
    Chief Information Security Officer
    Motorola Mobility

  • 12:10pm – 1:10pm Lunch
    read more »

  • 1:10pm – 1:55pm Panel Discussion: Women in Information Security: Breaking the Digital Ceiling
    read more »

    Session topics will include but are not limited to:

    • Describe your career journey and your personal experience in your previous and current role in the industry.
    • In your experience, how have you seen women break down barriers in regards to challenges in your department and organization?
    • How do you define InfoSec excellence?
    • If we understood and valued more of the right skills needed in today’s environment, would that naturally translate to more women in InfoSec?
    • How are you partnering with HR and other departments in efforts to bring in more women into InfoSec?
    • What advice do you have for the audience to increase the number of women working and holding management positions in Infosec


    Sarah Reeser
    Analytical Intel, LLC


    Cherisse Estes
    Assistant Vice President, Information Technology Product Management
    Fifth Third Bank

    Nazia Raoof
    Managing Director - Transformational Strategist / Technology Business Partner

  • 1:55pm – 2:15pm Networking Break
  • 2:15pm – 2:50pm Keynote Session featuring Northern Trust
    read more »

    Ed Giles
    Senior Vice President, Security Technology Operations & Architecture
    Northern Trust

  • 2:50pm – 3:25pm Keynote Session featuring Kellogg's: "Cybersecurity Practice Overview"
    read more »

    New technologies driving the digital transformation and intensifying the new risks have emerged to the business. Despite how sophisticated information security has become, the fundamental of Cyber Security Framework to integrate the People, Process, and Technology is the key to successfully protect the organization from the cyber threats and risks.

    Raghbir Sandhu
    Sr. Security Architect

  • 3:30pm – 3:35pm Argyle Closing Remarks
  • 3:35pm – 4:35pm Closing Reception

What will be discussed? Explore security hot topics and challenge areas such as:

Security and innovation

Evaluate what technologies will have the biggest impact on the business world in the year ahead, and reflect on the reality of IT security becoming a business enabler. Our speakers will discuss:

  • Tracking the improvement of wireless networks
  • Choosing the best devices to support internally
  • Cutting costs through cloud technology
  • Taking stock of risks imposed by the mobile channel

Building an Effective Security Strategy

Review the major changes the field of IT has experienced over the past few years, the driving forces behind them, and the barriers they present. Get briefed on:

  • Driving long-term business initiatives
  • Overcoming barriers to a solid mobile strategy
  • Aligning risk management with business priorities
  • Developing a successful incident response plan for security incidents

The Evolution of IT

Discuss the importance of having accurate information on customers and prospects in real time, and how the rise of apps, data management tools and practices like hosting have added made the business of protecting enterprise information more complex. Gain insight into:

  • Enriching the customer experience with real-time data
  • Staying alert to prevent theft of data and/or funds
  • Overcoming barriers to implementing multichannel integration
  • Evaluating security risks mobile devices present and how to respond

Transparency and security

Define how the concepts of identity and access management are building and shaping new security perimeters, and hear how successful organizations are managing identities in applications. Learn how top CIOs and CISOs are:

  • Lowering costs and risks related to security
  • Achieving success through data management
  • Defining the key benefits of SSO
  • Protecting enterprise data across the organization

Still have questions? We have answers.

I want to attend, but what if I'm unsure of my schedule and need to cancel my participation?

Just let us know. We understand that schedules change! However, we always have a waiting list for this event, and if you don't cancel, we will assume you are still attending and your spot will go unused. If you must, cancel at least 48 hours prior to the event to make room for others!

What if I can't be OOO for a whole day, or need to come late?

We have wifi and private rooms available for attendees to take calls and spend some quiet time on emails, as well as access to printing. Have a morning meeting you can't miss? No problem. This event was designed for busy executives - we get it.

I'd like to bring some colleagues. Do I need to register them online?

Events are more fun with friends, and we'd be happy to host your team. You can have them register online, or send us their names, titles and email addresses and we will take care of it for you! request a pass.

I don't see the event venue listed. Where will the meeting be held?

To maintain exclusivity, we don't release the venue address until the registration process has been completed. All logistical details will be shared once you have requested a pass and been approved.

The "2018 Chief Information Security Officer (CISO) Leadership Forum" in Chicago
is proudly sponsored by:

About Image
  • "Not only are the speakers relevant and experts in their fields, but I was able to make some great connections at the meetings as well."

    The Chief Technology Officer at PC Richard and Son on the quality of past Argyle CIO Forums.

  • "Argyle's meetings are well balanced in terms of panels and presentations and networking opportunities with local business leaders."

    A Head of Emerging Business and Technology at Ericsson on attending Argyle CIO events.

  • "The meetings that Argyle Executive Forum runs are truly enjoyable and well put together....I'm looking forward to the next forum."

    A VP of Information Systems at Garmin International on attending Argyle events.

BG Image

Traveling for the event? Stay at one of our recommended hotels nearby:

Please note the below is the preferred hotel of Argyle Executive Forum. Please specify that you are part of the Argyle group when booking sleeping rooms in order to receive a discounted rate of $189 per night, taxes not included. For details on where the event will take place, please contact your Argyle relationship manager.


Hotel Blake Chicago

500 South Dearborn
Chicago, IL 60605
Telephone: (312) 986-1234