2. Our promise:
We only invite CISOs who
are top leaders regionally,
nationally and globally who
make strong contributions
to their peers by openly
sharing ideas, experiences,
successes and failures.
“by CISOs, for CISOs”
3. Zouhair Guelzim
VP & CISO
L’Oréal Americas
BREAKAWAY LEADER
Please join us at the New York CISO Executive Summit, a gathering
dedicated to CISOs. This is our opportunity to leverage the expertise of
our peers, share innovative ideas and inspire our community.
Your 2016 Governing Body Chairs
Raymond Lipps
Senior Director,
Global IT Security
Celgene Corporation
Mark Viola
VP, Global CISO
Henry Schein, Inc.
Michael Higgins
VP & CISO
NBCUniversal, Inc.
John J. Masserini
CSO
Miami International
Holdings
BREAKAWAY LEADER
Kylie Watson
CISO
Sumitomo Mitsui
Banking Corporation
Linda Betz
CISO
The Travelers
Companies, Inc.
Deborah Snyder
CISO
New York State
Mark Connelly
CISO
Thomson Reuters
BREAKAWAY LEADER
Jay Leek
CISO
Blackstone
4. Governing Body
As Governing Body members, we represent the largest organizations in our region
and are responsible for the strategic direction of the CISO Executive Summit.
Zulfi Ahmed
SVP & Global CISO
MetLife
George Antoniou
Director Information Security
Delaware North Companies
Chris Armstrong
CISO
CVR Energy, Inc.
Vikrant Arora
CISO & Corporate Risk Officer
New York City Health and
Hospitals Corporation
Anthony Basile
CISO
AllianceBernstein L.P.
Medha Bhalodkar
CISO
Columbia University
Dennis Brixius
VP & CSO
McGraw Hill Financial
Ken Brothers
VP & Director, Information
Security Services
Federal Home Loan
Bank Of New York
Ralph Carey
Manager, Global Information
Security & Privacy
Terex Corporation
David Cass
Chief Information Security
Officer Cloud & SaaS
Operational Services
IBM
Roland Cloutier
Global CSO
ADP
BREAKAWAY LEADER
Andrew Conte
IS Officer
The Guardian Life Insurance
Company of America
Brendan Conway
Global Director of Information
Security & Risk Management
Coty Inc.
Dennis Dickstein
Chief Privacy & Information
Security Officer
UBS Financial Services Inc.
Thomas Dunbar
SVP & Chief
Information Risk Officer
XL Catlin
Stephen Gilmer
CISO
Sikorsky Aircraft Corporation
Tariq Habib
CISO
Metropolitan Transportation
Authority
Ronen Halevy
Director of
Information Security
Sony Corporation of America
Christopher Hall
Deputy CISO
BNY Mellon
Jaswinder Hayre
CISO
Dow Jones & Company, Inc.
Shukri Khader
CISO
Keurig Green Mountain, Inc.
Neal Kirschner
CISO
The Madison Square
Garden Company
Jonathan Klein
CISO
Broadridge Financial
Solutions, Inc.
Mark Leary
VP & CISO
Xerox Corporation
Marty Leidner
CISO
The Rockefeller University
Brian Lozada
CISO
Duff & Phelps
5. RESERVE YOUR SEAT TODAYGoverning Body
Tomas Maldonado
Global CISO
International Flavors &
Fragrances Inc.
Latha Maripuri
Global CISO
News Corporation
John McCaffrey
CIO
Westchester County
Kevin McGee
Chief Risk Officer
HCL Technologies Limited
Sanju Misra
CISO
Praxair, Inc.
Michael Palmer
Chief Information
Security Officer
National Football League
Dan Reynolds
VP, Chief of Sec. & Info. Arch.
Omnicom Group Inc.
Timothy Rogers
Sr. Mgr., Chief Sec. Architect
United Technologies
Corporation
Ramin Safai
CISO
Jefferies & Company, Inc.
Diane Schwartz
Global Director, Information
Security & Compliance
Fast Retailing
Pat Stack
IT Director, Enterprise
Applications
Eastman Kodak Company
Roy Thetford
VP, ISO
Federal Reserve
Bank of New York
Derek Vadala
Managing Director, CISO
Moody’s Corporation
ViJay Viswanathan
VP & CISO
HD Supply Holdings, Inc.
Stephen Ward
CSO & CISO
TIAA Financial Services
Glenn Watt
VP & CISO
Medidata Solutions
Laraine Weglarz
CISO
Kering
John Whiting
CISO
DDB Worldwide
Robert Zandoli
Global CISO
Bunge Limited
BRE AK AWAY
LE ADERSHIP
2016
CIS
The Breakaway Leadership
Award honors CISOs who
are revolutionizing their
organization’s competitive
position in the evolving
economy through visionary
leadership and business
transformation.
Built on peer recognition, this
is the most influential CISO
leadership awards program
of the year.
BREAKAWAY LEADERSHIP AWARD
6. Speakers
Allan Carey
VP, Business
Development
PhishMe
David Cass
Chief Information Security
Officer Cloud & SaaS
Operational Services
IBM
Mark Connelly
CISO
Thomson Reuters
BREAKAWAY LEADER
Brian Lozada
CISO
Duff & Phelps
Tomas Maldonado
Global CISO
International Flavors &
Fragrances Inc.
Brian Contos
Chief Security Strategist
Securonix
Brendan Conway
Global Director of
Information Security
& Risk Management
Coty Inc.
Stephen Gilmer
CISO
Sikorsky
Aircraft Corporation
Greig Arnold
VP, Executive Advisory
(Financial Services)
Optiv
Vikrant Arora
CISO & Corporate
Risk Officer
New York City Health and
Hospitals Corporation
Mike Buratowski
SVP, Cybersecurity
Services
Fidelis Cybersecurity
Sam King
Chief Strategy Officer
Veracode
George Kurtz
President/CEO
& Co-Founder
CrowdStrike
Marty Leidner
CISO
The Rockefeller University
Mark Goldstein
Deputy CISO
Forcepoint
Gabriel Gumbs
VP & Chief Product
Strategist
Identity Finder
Chris Inglis
Former Deputy Director
National Security Agency
John J. Masserini
CSO
Miami International
Holdings
BREAKAWAY LEADER
7. RESERVE YOUR SEAT TODAYSpeakers
Michael Palmer
Chief Information
Security Officer
National Football League
Mariano Nunez
CEO & Co-Founder
Onapsis, Inc.
Ramin Safai
CISO
Jefferies &
Company, Inc.
Pat Stack
IT Director,
Enterprise Applications
Eastman
Kodak Company
Adam Vincent
CEO
Threat Connect
Mark Viola
VP, Global CISO
Henry Schein, Inc.
Kylie Watson
CISO
Sumitomo Mitsui
Banking Corporation
Glenn Watt
VP & CISO
Medidata Solutions
Jeff Williams
Chief Technology
Officer/Co-Founder
Contrast Security
Joe Quigg
Cyber Security &
Risk Leader
Bay Dynamic
Kurt Stammberger
Chief Marketing Officer
Fortscale
Stephen Ward
CSO & CISO
TIAA Financial Services
John Whiting
CISO
DDB Worldwide
8. May 23, 2016 | 7:00am – 5:00pm
Conrad New York
Registration & Breakfast
Opening Keynote
Breakout Sessions & Networking
Luncheon Keynote
Breakout Sessions & Networking
Closing Keynote
Closing Reception & Prize Drawings
7:00am
7:45am
8:30am
11:40am
12:50pm
3:40pm
4:20pm
Charitable
Partner
Our invitation-only conference is private and limited to
qualified senior leaders who meet strict delegate criteria.
For more information, please contact:
Mike Magura | 503-808-9819 | mike.magura@evanta.com
RESERVE YOUR SEAT TODAY
Agenda Overview
9. RESERVE YOUR SEAT TODAYKeynote
Lessons Learned in the New Era of Security
Chris Inglis
Former Deputy Director
National Security Agency
Former deputy director of the NSA, Chris Inglis acted as the agency’s COO. Prior to his
retirement in 2014, Inglis spent most of his time defending the NSA from revelations by former
contractor Edward Snowden. A 1976 graduate of the U.S. Air Force Academy, Inglis holds
advanced degrees in engineering and computer science from Columbia University, Johns
Hopkins University and The George Washington University. He is also a graduate of the
Kellogg Business School executive development program, the U.S. Air Force Air War College,
Air Command and Staff College, and Squadron Officers’ School.
As deputy director of the U.S. National Security Agency at the time of the country’s
most notorious insider attack – the Edward Snowden breach – Chris Inglis experienced
the dawning of a new age of security first-hand. Inglis shares his insights on the critical
actions that security leaders must take to evaluate their readiness for a major breach,
and the critical capabilities required to deal with modern cyberthreats. In this engaging
keynote, Inglis imparts the lessons learned from the Snowden case and other hard-
earned wisdom from the latest barrage of high-profile breaches.
10. Keynote
Stephen Ward is CISO at TIAA, providing direction and ingenuity over cybersecurity and
technology risk. In this role, he manages the identification and remediation of IT risks
and the security technologies that safeguard the company’s information assets from
attacks. In addition to cybersecurity and risk, Ward provides a comprehensive governance
structure pertaining to security standards, processes and threats across the firm’s various
security disciplines. He has more than 16 years of experience in physical security, fraud,
cybersecurity, risk and information security.
Stephen Ward
CSO & CISO
TIAA Financial Services
Presenting to Your Board – It’s All About the “What”
Effective board presentations aren’t necessarily about fancy slide decks or weeks
of rehearsal. As a CISO, successful board presentations rely on the ability to
clearly communicate three critical messages: the threats your industry faces, the
organization’s technology risk and control posture, and security’s road map and
progress. Steve Ward rolls these factors into one business measurement service
that simplistically shows the board how each has morphed over time. In this keynote,
Ward will not talk about “how” to present to your boards. Instead, he’ll provide real
examples of “what” to present to boards in order to earn a coveted voice at the table.
Session Sponsor:
IBM
11. Valuable Experience and Knowledge
“Time is valuable, and I guard it carefully, which is why I
make an effort to attend the CISO Executive Summit. The
interactions with my peers, and their shared experiences,
allow me to come away from the summit with new ideas that
allow for a superior outcome for our business.”
Stephen Gilmer
CISO
Sikorsky Aircraft Corporation
12. Featured Session
Session Sponsor:
NTT Com Solutions
Mark Connelly is the CISO for Thomson Reuters, overseeing security operations,
governance, risk and compliance, application security, policies and controls, infrastructure
security, and security awareness and training. Connelly was named CISO of the Year for
the Northeast region in 2011 and an a Top 10 Breakaway Leader in 2013. He holds an M.S.
from the Sever Institute at Washington University, a B.A. from Washington University, an
M.A. from University of Missouri, and is a CISM, CGEIT, and CRISC.
Business Value and Security – No Longer an Either/Or
In today’s business world, information security and risk management are at the
nexus of business opportunity and customer expectations. As a critical business
value attribute, CISOs and the functions they directly or indirectly influence play an
increasingly business-critical function. Boards know it, customers know it and CISOs
know it. Continuing to deliver value that the business truly understands and actively
supports is key to the overall success of CISOs and the business. Mark Connelly
shares his insights on how to best deliver that business value with information security
and risk management as a key attribute of the company’s value.
BREAKAWAY LEADER
Mark Connelly
CISO
Thomson Reuters
13. Featured Session RESERVE YOUR SEAT TODAY
As CSO, John Masserini is responsible for information security, physical security, business
continuity and privacy for the MIAX Options Exchange. Prior to joining MIAX, Masserini
was the CISO for Dow Jones, overseeing security and risk management for all of the
Dow Jones and Wall Street Journal brands. He has held key leadership positions at
several information security market leaders. Masserini was named ISE Northeast Security
Executive of the Year in 2010 and one of the Evanta Top 10 Breakaway Leaders of 2013.
John J. Masserini
CSO
Miami International Holdings
Beyond IAM – Moving the Needle on User Provisioning
and Identity Management
It’s one of the oldest problems in the security industry, and yet, it has few solutions,
fewer best practices and almost no attention. Addressing general user access
controls, along with privileged access, is one of the most complex and intimidating
efforts a CISO can face. With maturing biometric and geolocational solutions, as well
as the use of new tools like user-behavior analytics, CISOs can drastically improve
their identity monitoring, provisioning and management. John Masserini shares his
insights into this opportunity for CISOs to elevate their security posture and business-
leader profile at the same time.
Session Sponsor:
Dell Software
14. Featured Session
As CISO for Sumitomo Mitsui Banking Corporation, Kylie Watson is charged with
establishing security strategy and direction, and is the corporate advocate for information
security best practices. She is responsible for defining the company’s security vision in
support of the business and promoting a culture of security. Watson’s role also includes
system risk management and security operations. Watson has more than 20 years of
experience in IT. Prior to joining SMBC, Watson worked for IBM in Australia and Monbusho,
Japan. She holds CISSP, CISM and CRISC certifications.
Kylie Watson
CISO
Sumitomo Mitsui
Banking Corporation
Cyber Risk is Business Risk – Changing the
Security Narrative
As the world of cybersecurity grows scarier by the moment, the CISO is becoming
an integral business partner. While this elevated notoriety has brought increased
budgets, influence and engagement from leadership, it also has many business
leaders assuming that the CISO will simply manage all aspects of corporate cyber
risk. Changing the business’ mindset to view cyber risk as a business issue – not an
IT one – can be a challenging hurdle to clear. Learn how Kylie Watson successfully
shifted her organization’s thinking about cyber risk and gained sponsorship from her
CEO through the development of a cyber risk committee.
Session Sponsor:
Palo Alto Networks
15. Featured Session RESERVE YOUR SEAT TODAY
Session Sponsor:
CrowdStrike
Serial entrepreneur George Kurtz is president and co-founder of CrowdStrike, a big data
and security technology company focused on helping enterprises and governments protect
their most sensitive intellectual property and national security information. Kurtz is an
internationally recognized security expert, author, entrepreneur and speaker. He has more
than 20 years of experience in the security space, including extensive experience driving
revenue growth and scaling small and large organizations.
George Kurtz
President/CEO Co-Founder
CrowdStrike
Stop the Breach – Using Cloud as a Powerful Game
Changer in the Fight
Today’s hacktivist, criminal and nation-state adversaries have a tremendous
asymmetric advantage over defenders that manifests itself in the constant stream of
breaches. George Kurtz shares a new approach for meaningfully changing the game
and shifting the advantage to defense. Through fascinating war stories and real-world
examples, Kurtz will discuss how the use of cloud-based security technologies is
thwarting and deterring some of the most persistent and advanced adversaries.
16. Featured Session
Session Sponsor:
Forcepoint
As a senior security strategist for Forcepoint, Mark Goldstein is a cybersecurity and privacy
professional with more than 20 years’ experience in IT, security, sales, marketing, customer
support, legal and privacy in commercial enterprises. Previously, he worked at America
Online. Goldstein founded the “malvertising working group,” is a senior advisor for the
Online Trust Alliance, mentor at MACH37 (cybersecurity incubator), and a member of the
Northern Virginia Tech Council’s Cybersecurity and Privacy Committee as well as Infragard.
He holds CIPP and CISSP certifications and an MBA from American University.
Mark Goldstein
Deputy CISO
Forcepoint
Building a Successful Audit Program to Keep Insider
Threats at Bay
Insider threats encompass more than just the obvious data thief. According to the
CERT Insider Threat Center, in 2014, 53 percent of organizations experienced some
type of insider incident. While your IT system can be a witness, victim or enabler,
insider threat is more than a technology problem — policy, process, controls, risk
management, auditing and monitoring all play critical roles in managing this invisible
yet very real vulnerability. Mark Goldstein shares the key steps to managing and
mitigating insider threats within your organization.
17. Relevant, Applicable Content
“The CISO Executive Summit is the only information
security conference that speaks directly to the CISO,
addressing the issues and challenges facing us today.”
Ray Lipps
Senior Director, Global IT Security
Celgene Corporation
18. Featured Session
This session consists of three concise and compelling 15-minute presentations.
Each brief, high-value presentation will extract a leading best practice or a
breakthrough industry solution.
Application
Self-Protection
– Revolutionizing
Application Security
Today’s enterprise runs on
applications. Yet insecure
applications have been the
leading cause of breaches
over the last eight years. Deep
security instrumentation can
provide application vulnerability
detection and attack protection
in a single platform, increasing
power, accuracy and scalability.
Emerging Provider:
Fortscale
Emerging Provider:
Threat Connect
Emerging Provider:
Contrast Security
Jeff Williams
Chief Technology
Officer/Co-Founder
Contrast Security
Behaving Badly
– Analyzing
Insider Threats
Learn how to end insider
threats with a new generation
of autonomous, rule-free user
behavior analytics based on
machine learning.
Kurt Stammberger
Chief Marketing Officer
Fortscale
Adam Vincent
CEO
Threat Connect
In Hot Pursuit
– Faster and
Smarter Security
With adversaries moving at the
speed of digital, every moment
counts. CISOs must create
organizational capabilities to
swiftly detect and expel threats.
Embrace the challenge of
speedy security, examining
methods to close the gap
between you and your enemies.
19. RESERVE YOUR SEAT TODAYExecutive Boardroom
Executive boardrooms
are private, closed-door
sessions focused on
candid dialogue between
attendees. Seating is
limited and reserved for
CISOs (or equivalent).
Sam King
Chief Strategy Officer
Veracode
Moderator
John Whiting
CISO
DDB Worldwide
Discussion Leader
Securing Your Software Supply Chain
Enterprises are increasingly reliant on third-parties to speed
innovation. But as recent breaches have shown, third-party software
introduces significant risk and necessitates a security evaluation
from these supply chain partners. Purchasing software from a
vendor, outsourcing development, using open-source components
or moving to the cloud all introduce risk that is out of a CISO’s direct
control. Glenn Watt, John Whiting and Sam King lead this discussion
on third-party security threats and how to protect your enterprise.
Come prepared to share best practices for partnering with vendors
and implementing approaches to assess the third party software
protecting your enterprise.
Session Sponsor:
Veracode
Glenn Watt
VP CISO
Medidata Solutions
Discussion Leader
To reserve your seat,
please contact:
Mike Magura
503-808-9819
mike.magura@evanta.com
20. Executive Boardroom
Brian Contos
Chief Security
Strategist
Securonix
Moderator
Pat Stack
IT Director,
Enterprise Applications
Eastman Kodak Company
Discussion Leader
Addressing Cybersecurity Challenges With Applied
Security Analytics
Data-driven artificial intelligence and unsupervised machine learning can now answer the
question that has plagued information security practitioners since day one: How do you
know when something is happening in your environment that shouldn’t? Led by Michael
Palmer, Pat Stack and Securonix’s Brian Contos, this interactive discussion looks at
advances in behavioral analytics that address critical security problems, featuring insights
from security leaders who use advanced analytics to detect threats invisible to traditional
security measures.
Session Sponsor:
Securonix
21. Executive Boardroom
Greig Arnold
VP, Executive Advisory
(Financial Services)
Optiv
Moderator
Tomas Maldonado
Global CISO
International Flavors
Fragrances Inc.
Discussion Leader
Session Sponsor:
Optiv
From CISO to CIRO – Evolving Skills for the Future
The past year has seen a tidal shift from infrastructure-based to risk-based security
programs. Board meetings, executive briefings and risk management concepts are now
the norm. Successful CISOs are transforming their skills to meet the current and future
needs of their organization. A chief information risk officer understands information
risk management, third-party risk and regulatory requirements, and knows how to
prepare board presentations and balance each of those priorities with the needs of the
business. This boardroom discussion will focus on the changing role of the CISO and the
necessary skills to earn – and keep – a seat at the table.
RESERVE YOUR SEAT TODAY
Michael Palmer
Chief Information
Security Officer
National Football League
Discussion Leader
22. Executive Boardroom
Mike Buratowski
SVP, Cybersecurity Services
Fidelis Cybersecurity
Moderator
Stephen Gilmer
CISO
Sikorsky Aircraft Corporation
Discussion Leader
Session Sponsor:
Fidelis Cybersecurity
The First 72 Hours
The initial signs of a security incident are rarely black and white. The first questions CISOs must ask
are “Is this a real incident?” and “How should I respond?” Stephen Gilmer and Mike Buratowski lead
this discussion on the first and most critical hours of a potential incident response. While removing
the attacker is obviously the end goal, security teams must first understand the nature and scope of
the incident to identify the course of action that will be most effective while balancing the risk to the
organization and the disruption that the response can cause.
23. Executive Boardroom
Marty Leidner
CISO
The Rockefeller University
Discussion Leader
David Cass
Chief Information Security Officer
Cloud SaaS Operational Services
IBM
Discussion Leader
Session Sponsor:
Bay Dynamics
Managing Cyber Risk – Effective Communication with
the Board
CISOs are confident in what cybersecurity threat information to present to the board and
what type of information the board wants to hear. However, much of this information is
either misunderstood or too technical. How can CISOs streamline the process and provide
more actionable information? For the board to make decisions regarding an organization’s
cybersecurity risk posture, they need quantitative information framed in the context of relevant
business concerns. This interactive dialogue provides insights on the tools and processes
modern CISOs can use to translate cybersecurity risk into a language that non-security
practitioners can understand and use to drive decisions.
RESERVE YOUR SEAT TODAY
Joe Quigg
Cyber Security Risk Leader
Bay Dynamics
Moderator
24. Executive Boardroom
Pat Stack
IT Director,
Enterprise Applications
Eastman Kodak Company
Discussion Leader
Mariano Nunez
CEO Co-Founder
Onapsis, Inc.
Moderator
Brendan Conway
Global Director of Information
Security Risk Management
Coty Inc.
Discussion Leader
Session Sponsor:
Onapsis, Inc.
Defending Against the Rising Trend of SAP Cyberattacks
Business-critical applications running on SAP are a goldmine for cyberattackers. They
are also the highest-cost blind spot for many CISOs. As SAP applications continue to be
the target of stealthy breaches, organizations must implement the right security products
and ensure they have an SAP cybersecurity strategy. Brendan Conway, Pat Stack and
Mariano Nunez lead this discussion on SAP cyber readiness, including recommendations
for remediation plans, industry best practices for SAP cybersecurity, the latest vulnerability
research, business-critical application security, and aligning internal and SAP security
teams to operationalize SAP cybersecurity processes within an organization.
25. Executive Boardroom RESERVE YOUR SEAT TODAY
Gabriel Gumbs
VP Chief Product
Strategist
Identity Finder, LLC
Moderator
Ramin Safai
CISO
Jefferies Company, Inc.
Discussion Leader
Session Sponsor:
Identity Finder
Security Process Improvement – How to Stop Worrying and
Love Maturity Models
There is no shortage of information security maturity models – COBIT, C2M2,
Cybersecurity Capability Maturity Model, ISO/IEC 21827:2008, Sensitive Data Maturity
Model, and many more. Each of them complete with a set of activities that mostly exist
at a high level and are intended to protect data, specifically, sensitive data. Join Gabriel
Gumbs and discussion leader Ramin Safai for this executive boardroom discussion on
selecting and adopting processes improvement strategies, the pros and cons of existing
maturity models and best practices for prioritizing the protection of sensitive data.
26. Executive Boardroom
Brian Lozada
CISO
Duff Phelps
Discussion Leader
Vikrant Arora
CISO Corporate Risk Officer
New York City Health and
Hospitals Corporation
Discussion Leader
Session Sponsor:
PhishMe
2016, Year of Ransomware – Can Technology Alone
Prevent Phishing Attacks?
2016 is shaping up to be the year of the ransomware attack. As ransomware and
phishing attacks continue to grow in number and sophistication, organizations need
to reconsider their current security strategy. Companies continue to invest billions in
technology to shore up their defenses against these threats – but is that enough? Is
complete reliance on technology the answer? Or should we focus on the human and
human behavior? Vikrant Arora, Brian Lozada and Allan Carey lead this discussion on
the new threats faced by organizations, why relying on technology is dangerous and
how to leverage all resources – including humans – for a stronger security posture.
Allan Carey
VP, Business Development
PhishMe
Moderator
27. SM
SM
DON’T FACE CYBERSECURITY CHALLENGES ALONE
For every challenge, imagine having a fellow CISO available with a proven solution.
Join Your Peers Today at join.cisocoalition.com
For more information, please contact Stuart Cohen, General Manager of CISO Coalition
at 971-717-6665 or stuart.cohen@evanta.com.
NATIONAL LEADERSHIP BOARD
“Connecting with the best and brightest in the
industry makes each one of us better equipped to
combat the risk facing our organizations.”
Steven Young
VP, Security Risk Management, CISO
Kellogg’s
28. Thank you to our sponsors for their support.
Local Sponsors
National Thought Leaders
National Sponsors
Presenting Sponsors
29. Quality Networking.
Immeasurable Value.
“There are few events I ensure I make time for every year,
and the New York CISO Executive Summit is one of them.
Year after year, this conference provides immeasurable
value – from the breadth and depth of speakers, to the
quality of the networking and peer sessions, the New York
CISO Executive Summit is one to not be missed. It is truly a
day I look forward to each year.”
John J. Masserini
CSO
Miami International Holdings
30. Schedule of Programs
CIO Executive
Summit
Atlanta
Boston
Chicago
Cincinnati
Dallas
Detroit
Houston
Minneapolis
New Jersey
New York
Philadelphia
San Francisco
Southern California
Toronto
Vancouver, BC
Washington, DC
Global CIO
Executive Summit
Pennsylvania
CXO Executive
Summit
(CIO/CISO/CDO)
Calgary
Charlotte
Connecticut
Denver
Indianapolis
Miami
Milwaukee
Montreal
Orlando
Phoenix
Pittsburgh
Seattle
St. Louis
CISO Executive
Summit
Atlanta
Boston
Chicago
Cincinnati
Dallas
Detroit
Houston
Minneapolis
New Jersey
New York
Philadelphia
San Francisco
Southern California
Toronto
Vancouver, BC
Washington, DC
Global CISO
Executive Summit
Pennsylvania
CHRO Leadership
Summit
Atlanta
Boston
Chicago
Cincinnati
Dallas
Detroit
Houston
Minneapolis
New York
Philadelphia/New Jersey
San Francisco
Southern California
Toronto
Vancouver, BC
Washington, DC
CFO Executive
Summit
Atlanta
Chicago
Dallas
Houston
Los Angeles
New York
San Francisco
CISO Solutions Tour
Atlanta
Boston
Chicago
Cincinnati
Dallas
Detroit
Houston
Minneapolis
New Jersey
New York
Philadelphia
San Francisco
Southern California
Toronto
Vancouver, BC
Washington, DC
CIO Institute
Chicago
Columbia
Texas
UC Berkeley
CISO Institute
Chicago
Texas
UC Berkeley
31. RESERVE YOUR SEAT TODAYSchedule of Programs
CIO Inner Circle
Dinner Series
Atlanta
Boston
Chicago
Cincinnati
Dallas
Detroit
Houston
Minneapolis
New Jersey
New York
Philadelphia
San Francisco
Southern California
Toronto
Vancouver, BC
Washington, DC
CISO Inner Circle
Dinner Series
Atlanta
Boston
Chicago
Cincinnati
Dallas
Detroit
Houston
Minneapolis
New Jersey
New York
Philadelphia
San Francisco
Southern California
Toronto
Vancouver, BC
Washington, DC
CDO Inner Circle
Dinner Series
Atlanta
Boston
Chicago
Cincinnati
Dallas
Detroit
Houston
Minneapolis
New York
San Francisco
Southern California
Toronto
Washington, DC
CFO Invitational
Atlanta
Chicago
Detroit
Kansas City
Milwaukee
Minneapolis
Orange County
Pittsburgh
Portland
San Francisco
Seattle
Women’s Leadership
Invitational
San Francisco
Global Sports Summit
Aspen
Global Sports
Management Summit
New York
Collegiate Sports
Summit
Santa Monica
The most trusted brand in the industry.
Click here for
detailed schedule.
32. We make leaders better.
ContactAndrewSaderat503-445-6568orandrew.sader@evanta.com
Visit evantaacademy.com for more information.
“Severalofourmostpromisingfrontlinemanagerswereamongthefirstto
enroll.Wehaveseenimmediatevaluefromtheirparticipation.”
– Wes Hargrove, SVP Development, 7-Eleven
Guidance and thought leadership
provided by General Colin Powell,
Fortune 1000 CXOs and top professors
from the most prestigious universities.
UPCOMING CLASSES
Frontline IT
Leadership
June 6
Enterprise
Cybersecurity
July 25
High Performance
Leadership
July 25
Women in
Leadership
July 25
ENROLL NOW
Place PDA video here
33. Our purpose:
Evanta brings together the world’s
most accomplished leaders to improve
awareness and performance, because we
believe effective collaboration is the key to
individual and organizational prosperity.