2018 Chief Information Security Officer (CISO) Leadership Forum
Why You Should Attend!#ArgyleCISO
Argyle Executive Forum is bringing together leading InfoSec, IT, and Risk executives for our annual CISO Forum in Chicago. Throughout a full day of content and networking, we will focus on the most pressing issues that InfoSec professionals are facing moving into 2018. With an agenda geared specifically towards leaders in InfoSec, IT and Risk, topics discussed will include:
- Properly preparing for an inevitable multi-cloud future - fully and securely embracing the cloud
- Strategizing recovery plans and solutions from an organizational cyberattack – transitioning from recovery to resilience
- Discovering emerging security capabilities and how leading organizations are managing the adoption process
- Exploring new ways to secure the mobile network, particularly when traditional security measures are no longer effective
- Understanding how emerging regulatory changes will impact global business operations, and how to best prepare
- Building a workforce for the future of InfoSec - attaining, training, and retaining talent through in-demand skillset development and mentoring opportunities
Our keynote presentations, fireside chats, panel sessions and networking breaks will encourage candid discussions with your peers focused on these topics and more. We look to hosting you alongside our community of Fortune 500 CISO leaders hailing from Chicago and beyond!
This event will feature insights from top executives, including:
If you'd like to recommend a speaker, please email Natasha Guzman at firstname.lastname@example.org.
Nexteer Automotive View Bio »
Arun DeSouza has extensive global IT and security leadership experience. He is currently Chief Information Security & Privacy Officer at Nexteer Automotive Corporation. Prior roles include Chief Information Security Officer and Director, Strategic Planning and Information Security at Inergy Automotive Systems.
Arun’s areas of expertise include security strategy, risk management, identity management, cloud and privacy. His current interests include the Internet of Things (IoT) and security analytics.
Arun earned Master’s and PhD degrees from Vanderbilt University and a Bachelor’s degree in Chemical Engineering from Indian Institute of Technology (Madras).
Arun is a Certified Information Systems Security professional (CISSP). He has won multiple industry honors: Computerworld Premier 100 IT Leaders Award, CIO Ones to Watch Award and the Network World Enterprise All Star Award. He is a member of the Society for Information Management and the International Association of Privacy Professionals.
Fifth Third Bank View Bio »
A 7th grade career test revealed that Cherisse Estes was destined to be a System Analyst, not a Dentist as her 5 year old self had proclaimed. With detours down the path of want-to-be roller coaster designer, nuclear engineer and mathematician, she landed right where that career test directed, an Analyst in Information Technology.
With over 20 years and counting in Information Technology, Cherisse has acquired a tapestry of experience from System Support, Project and Program Management to Portfolio Ownership, Process Design and Improvement. Additionally she has acquired PMP and Lean Six Sigma certifications and has made an art form of applying agile type mythologies to waterfall and Mainframe development projects.
Today she spends her days in the trenches as a Business System Analyst, helping solve business challenges with technical solutions, teaching and mentoring Junior Analysts in the ways of the big project life as well as nurturing relationships with her Business partners. She spends her evenings being a wife, mom, daughter and sister but most notably as “Truth Teller”, writing and speaking about the challenges in life and how we overcome them but not always gracefully.
Northern Trust Corporation View Bio »
An information security professional and technology thought-leader with over 25 years of experience in technology and over 20 years in financial services, Ed Giles works with senior executives in risk, compliance, and the business to develop strategies and design solutions to securely enable the business. He brings to the table enterprise level experience in the areas of security strategy, architecture, operations, and innovation. Currently, he is a senior vice president for Security Technology Operations and Architecture at a global financial services company headquartered in Chicago.
Lookout View Bio »
As Chief Product Officer at Lookout, Santosh is responsible for product management and the ongoing development of predictive security solutions that protect individuals and enterprises alike from mobile attacks. Previously, he was the head of ventures at Akamai Technologies where he focused on strategic investments in early-stage companies. He also served as Senior Director of Product Management at Akamai for the licensed CDN portfolio. In 2006, Santosh co-founded Verivue, a CDN solutions company, and served as Vice President of Products, until the company was acquired by Akamai in 2012. Santosh started his career as a research scientist and product architect at Bell Labs (then part of Lucent Technologies), where among other projects, he was an architect of Lucent’s best-selling switching chipset. Santosh holds a PhD with distinction from Columbia University and a B. Tech. from Indian Institute of Technology (IIT), Bombay, both in Computer Science.
General Growth Properties View Bio »
Speaker bio coming soon...
A leading healthcare company View Bio »
Zulzani Noordin, Director of Network Security at a leading healthcare organization.
Zulzani has 20 plus years experience in the following IT areas - Enterprise Architecture Security, System Administration, Infrastructure architecture, Identity Management, Data Security, Incident Response and Cloud Security. Created a IT security strategy that redirected focus from traditional perimeter security to a data centric approach focusing on protecting high value data. Security evangelist, communicating to different departments in an effort to educate security in an organization.
Currently, I am a Director of Network Security responsible for securing two separate networks in the organization. One is a private network that supports business operations between licensees and the company’s network. I am designing a context and identity based network access that will simplify access to the network while enhancing authorization and monitoring capabilities.
Zulzani has a CCSK and CISSP certifications and holds a CISO executive certification from Carnegie-Mellon.
JLL View Bio »
Susan Nuccio is a senior-level leader responsible for management and delivery of JLL’s Global Information Security Governance, Risk, Compliance, and Disaster Recovery Programs under the umbrella of the firm’s Global Information Security Group and serves on the firm’s Global Operating Board.
Ms. Nuccio is responsible for managing a professional team devoted to Information Security Governance, Risk Management, Compliance, and Disaster Recovery, creating, testing, and managing the firm’s global technology compliance and recovery strategies aligned to ISO27001 and SOC2 certifications -- in order to guarantee a commitment to security policies and processes, and system availability and resilience, thus assuring protection of JLL systems and their data on behalf of the firm and its clients, and creating a firmwide culture of security awareness.
Ms. Nuccio has been a member of JLL's Global Technology Architecture and Security Team and the Global Technology Operations Group responsible for multiple significant programs and projects delivered across all regions of the firm, serving as a trusted advisor to business teams within JLL.
CIBC US View Bio »
Nazia is a Technology Executive with 15+ years of successfully directing innovative technology solutions, supporting business, bridging gaps and improving collaboration globally between business, technology and operations for companies like The PrivateBank, Northern Trust, Neuberger Berman, and Lehman Brothers.
Analytical Intel, LLC View Bio »
Sarah Reeser, PMP, ITIL, CISM brings 20+ years of leading within domestic and international teams to provide technology enabled business solutions and services, specifically accommodating those organizations that have gone through acquisitions, mergers and separations. She has led many large projects and efforts within various industries, including, Banking/Capital Markets, Healthcare/Life Sciences, Insurance, Manufacturing, Energy/Technology, Consumer/Retail, Travel/Transportation and Government.
Sarah believes in being a “silo-surfer” and taking a holistic approach to leading projects. She has expertise in facilitating interactive cooperation, consensus, and commitment with stakeholders, business users, and team members. Her vast experience working with multiple methodologies and attention to the ‘details’ has given her the ability to assist organizations in bringing the awareness around ‘business impacts’ of their respective operational processes, applications, data interfaces and back office systems to exceed business, security, compliance and customer needs.
Big 4 advisory service providers have sought to bring in Sarah to consult for their respective clients to problem solve business challenges in blending technology, mining and joining data from multiple sources while applying data governance best practices.
Motorola Mobility View Bio »
Mr. Richard Rushing is the Chief Information Security Officer for Motorola Mobility LLC.; Richard participates in several corporate, community, private, and government security council’s and working groups setting standards, policies, and solutions to current and emerging security issues. As Chief Information Security Officer for Motorola Mobility he has lead the security effort by developing an international team to tackle the emerging threats of mobile devices, targeted attacks, and cyber-crime. He organized, developed and deployed practices, tools and techniques to protect the intellectual property across the world-wide enterprise. A much-in-demand international speaker on information security Richard has presented at many leading security conferences and seminars around the world.
Kellogg's View Bio »
Raghbir Singh Sandhu is Senior Security Architect at Kellogg. I lead in resolving the risks of operating in the 21st Century digital age. Strategic and proactive Information Security Executive specializing in balancing business needs with the risks and cost of controls. Partnered with business executives to create direction, drives alignment, delivers results and organizes to win. Act as a change agent, with a history of building and enforcing comprehensive security and compliance programs that exceed business needs with minimal overhead costs. As Cyber Security Executive, I protect company’s tangible and intangible assets from cyber and internal threats. Established, managed, and performed Cyber Security Operations Programs effectively in way that limits damage, increases the confidence of stakeholders, and reduces recovery time and cost. Manage the development and implementation of global security policy, standards, guidelines and procedures. Strong record of successfully deploying the robust IT security solutions to protect the organization brand, intellectual property and information assets.
As a lead founding member of the Kellogg Global Security Organization reporting to CISO, comprehensively contributed to build a world class global Information Security organization, establish security strategy and framework, setup a strong Security Engineering and Operations Center (SOC) teams. Accountable for maintain the privacy and security of the confidential data and ensuring the confidentiality, integrity, and availability of the systems, personal computers, network environment. Provided direction, guidance, and Due-Diligence support for the overall security and risk management to the various IT programs and initiatives.
Raghbir is a CISSP (Certified Information System Security Professional), a CRISC (Certified Risk and Information System Control), a CISM (Certified Information Security Manager), a PMP (Certified Project Management Professional), and an ITIL Certification.
Ivanti View Bio »
Ray Shum has over 15 years of experience helping IT teams address their challenges and enable the business. He is currently an enterprise account manager representing Ivanti Unified IT software solutions:
* IT Asset Management
* Service Management
* Operational Security
* Unified Endpoint Management
* Identity Management
Ivanti helps organizations protect themselves from security threats, reduce logon times, track IT assets, keep the user experience clean, and deliver IT service to their users more quickly.
Fugue View Bio »
Josh Stella is Co-founder and CEO of Fugue, which radically simplifies cloud operations and centralizes cloud control by automating and enforcing infrastructure at scale. Previously, Josh was a Principal Solutions Architect at Amazon Web Services. He has served as CTO for a prior startup and in numerous other technical and leadership roles over the last 25 years. With the Fugue team, Josh authored Scalable Cloud Ops with Fugue, published by The Pragmatic Bookshelf and the O’Reilly guide: Immutable Infrastructure: Considerations for the Cloud and Distributed Systems, as well as numerous articles.
UW-Madison View Bio »
Bob Turner is the Chief Information Security Officer at the University of Wisconsin-Madison. He leads the development and delivery of a comprehensive information security and privacy program by collaboratively implementing information security controls to protect UW-Madison information and its infrastructure from external or internal threats, and to assure that UW-Madison complies with statutory and regulatory requirements regarding information access, security and privacy.
Prior to joining the UW-Madison, Bob was Senior Associate with the strategy and technology consulting firm of Booz Allen Hamilton where he focused on cybersecurity policy and compliance with assessment and approval of information systems along with cyber security inspection as principal strengths. Before Booz Allen Hamilton, Bob had a 23 year Navy career in telecommunications and information systems management.
Bob earned a BS degree in Administration and Management from Excelsior College and holds a MS in IT from Capella University. He is a Certified Information Systems Security Professional and Certified Business Continuity Professional with National Information Assurance Training Standard certificates as a Senior Systems Manager and Systems Certifier issued from the Naval Post Graduate School.
Bob has experience as Adjunct Faculty at ECPI University’s Newport News, Virginia campus teaching upper level courses in the Network Security Degree program within the Computer Information Systems Department.
Trend Micro View Bio »
Milan Urban Jr. has worked extensively in the cyber security, networking, information technology, and financial arenas. He currently is the Regional Manager for Trend Micro, Inc. - a global leader in cybersecurity solutions, helping to make the world safe for exchanging digital information. Trend Micro’s innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud environments, networks, and endpoints. Milan has served in both analyst and sales roles for various security and networking companies for more than 20 years – MCI, Systemhouse, Litton Enterprise Solutions, Packeteer, Citrix, Varonis, Blue Coat, and others. He has worked closely with numerous large companies to develop services and solutions. Milan earned a Bachelor of Science in engineering and a Master of Business in Finance / Economics from the University of Illinois, graduating with honors in both programs.
DePaul University View Bio »
Arlene Yetnikoff is the Director of Information Security for DePaul University. DePaul University is one of the ten largest private universities in the United States, offering numerous degrees in Computer Science and other fields, including a Masters in Computer, Information and Network Security and a Bachelor’s in Information Assurance and Security Engineering. Arlene has worked in Information Security for over twenty years both as a consultant, educator and hands-on practitioner. Arlene’s many years of consulting experience in the Technology Risk group of a major accounting firm allowed her to help clients of varied sizes in numerous industries assess and design their information protection architecture, policies and processes. Today, Arlene leads DePaul’s Information Security initiatives. Arlene is also an Adjunct Assistant Professor in the University of Chicago’s Masters of Computer Science program, where she teaches Computer and Network Security. Arlene is a CISSP and a CISA. She holds a Bachelor’s degree in Mathematics from the University of Chicago and a Masters in Computer Science, Telecommunications from DePaul University.
7:45am – 8:45am Breakfast
8:45am – 8:50am Argyle Opening Remarks
8:50am – 9:25am Keynote Presentation: "From FUD to Forward: A CISO’s Journey"
read more »
Higher education and research is, in practice and by necessity, an open and collaborative society driven by the need to share information without hindrance. The daily business practices have the potential to expose protected personal or healthcare information, protected and unpublished research, patentable discoveries and inventions, and large volumes of financial information. Communicating the practices and policies may easily result in promoting fear, uncertainty and doubt, also known as FUD, to motivate users and data owners toward the “right” behaviors. The University of Wisconsin-Madison’s Office of Cybersecurity chooses to move in the direction of partnership as they inform and involve the community of over 22,000 faculty, researchers and staff along with 43,000 students; without FUD as the centerpiece.
In his key note address, Bob Turner provides insight into the issues of communication and community engagement the University of Wisconsin-Madison has travelled with a glimpse of the trail ahead.
Chief Information Security Officer (CISO)
9:25am – 9:45am Thought Leadership Spotlight: "Why Phishing is Both Different and More Problematic on Mobile"
read more »
The traditional corporate perimeter is evaporating as the enterprise continues its fundamental shift to a mobile-enabled workplace. Now, all endpoints, but particularly mobile devices, are outside the firewall and freely accessing not just enterprise apps and SaaS, but also personal services like social media and email. In this new world, attackers take advantage of the blending of personal and enterprise accounts and the vulnerability of devices outside the firewall to gain access to corporate data and credentials via new vectors for phishing attacks, including SMS and messaging platforms like WhatsApp, Facebook Messenger, etc.
Chief Product Officer
9:45am – 10:10am Networking Break
10:10am – 10:55am Panel Discussion: "Security Innovation: Unifying Proactive & Reactive"
read more »
Session topics include, but are not limited to:
- What are some insider threats that are top of mind for you at your organization?
- How do you pinpoint top weaknesses that increase risk within the company?
- Discuss the importance of implementing both a proactive & reactive strategy within your organization?
- How do you drive innovation while mitigating risk, ensuring continuous compliance & maintaining security?
- How do you leverage tools like the cloud to promote efficiency while maintaining a secure digital environment?
- What are primary threats to the business in the cloud, and what practices & controls are necessary for compliance?
- What’s the best method to plan and prevent insider threats and cyberattacks?
- How do you balance demands that are potential threats to corporate data within your organization
Chief Information Security Officer (CISO)
CISO and Privacy Officer
Senior Director, Cyber & Information Security
Director of Network Security
A Leading Healthcare Provider
10:55am – 11:15am Thought Leadership Spotlight: "Data Center Attack: The Game"
read more »
In this session we will put you in the shoes of a CISO at a hospital to see if you can go back in time to prevent a data center attack from holding critical patient data hostage. See if you have the knowledge it takes to stop a data center attack, and if not, learn what defenses you need to prevent one.
You will be prompted to make decisions that will impact your security posture. Wrong choices could result in ransomware hijacking your patient data and putting lives at risk. Right choices will show you what happens with DevOps and IT work together, will allow doctors to see patient data, and the hospital will run as expected.
Regional Account Manager
*This session will be off the record.
11:15am – 11:35am Networking Break
11:35am – 12:10pm Keynote Presentation featuring Motorola Mobility
read more »
Chief Information Security Officer
12:10pm – 1:10pm Lunch
read more »
1:10pm – 1:55pm Panel Discussion: "Women in Information Security: Breaking the Digital Ceiling"
read more »
Session topics will include but are not limited to:
- Describe your career journey and your personal experience in your previous and current role in the industry.
- In your experience, how have you seen women break down barriers in regards to challenges in your department and organization?
- How do you define InfoSec excellence?
- If we understood and valued more of the right skills needed in today’s environment, would that naturally translate to more women in InfoSec?
- How are you partnering with HR and other departments in efforts to bring in more women into InfoSec?
- What advice do you have for the audience to increase the number of women working and holding management positions in Infosec
Analytical Intel, LLC
Assistant Vice President, Information Technology Product Management
Fifth Third Bank
SVP, Global Manager
Information Security Compliance
Managing Director - Transformational Strategist / Technology Business Partner
Director of Information Security
1:55pm – 2:15pm Networking Break
2:15pm - 2:20pm Session Introduction featuring Ivanti
read more »
Enterprise Account Manager
2:20pm – 2:55pm Keynote Session: “Know, Control, Enable”
read more »
The Business often views Security as an obstacle to pursuing new opportunities -- serving as little more than business "unablers." Regulators, auditors, compliance officers, prospects, and clients constantly challenge Security to demonstrate due care in all matters related to protecting the assets of the company. Can security ever satisfy all parties? Probably not. It can enable the business while improving the security posture of the company. With demands to patch vulnerable system, fix vulnerable code, protect sensitive data on and off network, limit access to certain websites, it's no surprise when business innovators steer clear of Risk and Information Security teams. Recent media coverage of cyber security threats and incidents supports the need for information security. Nevertheless, many perceive the information security as a necessary evil rather than a force for good.
In this key note address, Ed Giles offers that through a change in perspective and approach, information security professionals can provide a smoother more secure path to enable business innovation and profitability.
Senior Vice President, Security Technology Operations & Architecture
2:55pm – 3:30pm Keynote Session: "Cybersecurity Practice Overview"
read more »
New technologies driving the digital transformation and intensifying the new risks have emerged to the business. Despite how sophisticated information security has become, the fundamental of Cyber Security Framework to integrate the People, Process, and Technology is the key to successfully protect the organization from the cyber threats and risks.
Sr. Security Architect
3:30pm – 3:35pm Argyle Closing Remarks
3:35pm – 4:35pm Closing Reception
What will be discussed? Explore security hot topics and challenge areas such as:
Security and innovation
Evaluate what technologies will have the biggest impact on the business world in the year ahead, and reflect on the reality of IT security becoming a business enabler. Our speakers will discuss:
- Tracking the improvement of wireless networks
- Choosing the best devices to support internally
- Cutting costs through cloud technology
- Taking stock of risks imposed by the mobile channel
Building an Effective Security Strategy
Review the major changes the field of IT has experienced over the past few years, the driving forces behind them, and the barriers they present. Get briefed on:
- Driving long-term business initiatives
- Overcoming barriers to a solid mobile strategy
- Aligning risk management with business priorities
- Developing a successful incident response plan for security incidents
The Evolution of IT
Discuss the importance of having accurate information on customers and prospects in real time, and how the rise of apps, data management tools and practices like hosting have added made the business of protecting enterprise information more complex. Gain insight into:
- Enriching the customer experience with real-time data
- Staying alert to prevent theft of data and/or funds
- Overcoming barriers to implementing multichannel integration
- Evaluating security risks mobile devices present and how to respond
Transparency and security
Define how the concepts of identity and access management are building and shaping new security perimeters, and hear how successful organizations are managing identities in applications. Learn how top CIOs and CISOs are:
- Lowering costs and risks related to security
- Achieving success through data management
- Defining the key benefits of SSO
- Protecting enterprise data across the organization
Still have questions? We have answers.
I want to attend, but what if I'm unsure of my schedule and need to cancel my participation?
Just let us know. We understand that schedules
we always have a waiting list for this event,
and if you don't
cancel, we will assume you are still attending
and your spot will
go unused. If you must, cancel at least 48 hours
prior to the
event to make room for others!
What if I can't be OOO for a whole day, or need
to come late?
We have wifi and private rooms available for
attendees to take
calls and spend some quiet time on emails, as
well as access to
printing. Have a morning meeting you can't miss?
No problem. This
event was designed for busy executives - we get
I'd like to bring some colleagues. Do I need to
Events are more fun with friends, and we'd be happy to host your team. You can have them register online, or send us their names, titles and email addresses and we will take care of it for you!
I don't see the event venue listed. Where will
the meeting be
To maintain exclusivity, we don't release the
venue address until
the registration process has been completed. All
details will be shared once you have requested a
pass and been
The "2018 Chief Information Security Officer (CISO) Leadership Forum" in Chicago
is proudly sponsored by:
"Not only are the speakers relevant and experts in their fields, but I was able to make some great connections at the meetings as well."
The Chief Technology Officer at PC Richard and Son on the quality of past Argyle CIO Forums.
"Argyle's meetings are well balanced in terms of panels and presentations and networking opportunities with local business leaders."
A Head of Emerging Business and Technology at Ericsson on attending Argyle CIO events.
"The meetings that Argyle Executive Forum runs are truly enjoyable and well put together....I'm looking forward to the next forum."
A VP of Information Systems at Garmin International on attending Argyle events.
Traveling for the event? Stay at one of our
Please note the below is the preferred hotel of Argyle Executive Forum. Please specify that you are part of the Argyle group when booking sleeping rooms in order to receive a discounted rate of $189 per night, taxes not included. For details on where the event will take place, please contact your Argyle relationship manager.