VIRTUAL

St. Louis CISO Virtual Executive Summit

December 16, 2020 | 8:00am - 1:15pm CST

December 16, 2020 | 8:00am - 1:15pm CST

Collaborate with your peers

Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the St. Louis CISO Virtual Executive Summit.

Join your peers to discuss the most critical issues impacting CISOs today:

The Future of the CIO & CISO

Redefining Personal Data Protection and Privacy

Pursuing New Digitally-Enabled Business Models

Governing Body Co-Chairs

Joe Caro

Post Holdings
CIO

Kevin Hardcastle

Washington University in St. Louis
Associate Chief Information Security Officer

Dan Henke

Mercy
VP, CISO

Matt Modica

BJC HealthCare
CISO

Agenda


December 16, 2020

11:00am - 12:00pm  CST Virtual Summit Boardroom

Bracing for Seismic Shifts – Meeting the Demands of the Business

Tom Henry headshot

Tom Henry

Chief Data & Analytics Officer

Schnucks

Shri Ramachandran headshot

Shri Ramachandran

Vice President, IT

Boston Scientific

2020 forced technologists to innovate and work smarter [and faster] to meet increased business demands. To succeed, leaders were forced to become flexible and accommodating in delivering new digital and data solutions to their organizations at lightspeed, inciting endless channels of demand. Join your peers in a focused discussion on how to best leverage newfound operating structures/models and manage a rising need for speed, delivery, and value.

Join this virtual boardroom conversation to explore:

  • Riding the current momentum to influence and advance the enterprise
  • Balancing increased demands with the imperative of tangible business outcomes
  • Increasing the pace and reducing friction points in new technology and feature, functionality adoption
  • Implementing data and analytic strategies that inform and facilitate desired business outcomes

11:00am - 12:00pm  CST Virtual Summit Boardroom

The Continual Shifting of Threats

Craig Byrkit headshot

Craig Byrkit

VP, Global Information Security and Privacy Officer

Reinsurance Group of America

Aman Raheja headshot

Aman Raheja

SVP CISO & Head of IT Operations

Humana

Whether it’s cybercriminals motivated by profit or nation-state attackers with geopolitical motives, public and private organizations of all sizes have felt the impact of cyberattacks. Enterprise organizations are reeling from the onslaught of massively spread ransomware attacks to surgical pinpointed attacks on their assets from sophisticated state-sponsored actors. How can CISOs best face changing threat vectors?

Join this roundtable conversation to discuss:

  • The current threat landscape and development on ransomware attacks
  • How to best discover and prevent nation-state attacks
  • What security executives can do to build resiliency

12:00pm - 12:45pm  CST Virtual Summit Keynote

Cloud Strategies to Power Digital Transformation

Kyle Collins headshot

Kyle Collins

Interim VP, CIO and Chief Innovation Officer

Saint Louis University

Hillery Hunter headshot

Hillery Hunter

CTO, IBM Cloud

IBM

The most successful businesses today connect digital transformation to business goals using innovative technology and increasing moving more of their enterprise workload to the Cloud. CIOs are charged with clearing adoption hurdles to align mission-critical tasks and business priorities with the multiple cloud environments.

This interactive session explores:

  • Examples of transformations using open, flexible, and secure multicloud operating environments
  • Fostering digital transformation and creating a competitive advantage through a hybrid cloud strategy
  • Accelerating the skills and culture that leverages AI and cloud

By registering for this session, this serves as your authorization to Evanta or its vendor to provide your contact information to IBM to follow up on your interaction and participation. IBM’s use of your contact information is governed by the IBM Privacy Policy. If you need more information on how IBM is using your personal data you may refer to the IBM Privacy Statement. To withdraw your marketing consent and unsubscribe to receiving emails click on the unsubscribe button at this address: ibm.biz/marketingoptout.

12:45pm - 1:15pm  CST Networking

Community Discussion

Matt Modica headshot

Matt Modica

CISO

BJC HealthCare

Teresa Sanzottera headshot

Teresa Sanzottera

Vice President and CIO

Mallinckrodt Pharmaceuticals

An informal and interactive opportunity for you to network with peers in small groups. 

8:00am - 8:45am  CST Virtual Summit Keynote

Finding Success with Adopting a SASE Architecture

Jason Clark headshot

Jason Clark

Chief Strategy Officer

Netskope

Dustin Wilcox headshot

Dustin Wilcox

CISO

Anthem

Organizations are feeling a shift in the world of networking and security as they rapidly adopt and embrace the cloud. On-premises private data centers are no longer the place for data and workloads to exist. With this shift, security and networking are brought closer than ever. Enterprises need speed, visibility, security and reliability without compromise. Enter, the secure access service edge, better known as SASE. This evolved concept of cloud security architecture outlines a convergence of multiple security functions to offer identity-based secure access. How can your organization best position itself for the transition?

In this session, you will discuss:

  • Problems SASE can address in the modern enterprise
  • Benefits of moving to a SASE architecture
  • Insights from organizations adopting SASE today

8:45am - 9:00am  CST Break

9:00am - 10:00am  CST Virtual Summit Boardroom

How to Transform to a NextGen Data Center

Stacy Mill headshot

Stacy Mill

Chief Technology Officer

State of Kansas

Bala Nibhanupudi headshot

Bala Nibhanupudi

EVP, Chief Technology and Operations Officer

First Bank

Mark Hickey headshot

Mark Hickey

Sr Regional Principal, Consulting Services

Insight Enterprises

As technology continues to evolve in a changing world, IT leaders are often asked to increase speed to execution and operational cost optimization. Technical debt and complexity can act as barriers to these goals, but with the right strategy, CIOs can meet the needs of the enterprise.

This interactive boardroom will discuss:

  • Assessing the infrastructure and determining what is possible
  • Developing the strategy and execution plan
  • Understating all of the critical success components around cost, networking, security, governance, disaster recovery, cloud, and colocation facilities

9:00am - 10:00am  CST Virtual Summit Boardroom

RPA – Automation’s Golden Age

Steve Kappel headshot

Steve Kappel

VP & CIO

Safety National

JK Pareek headshot

JK Pareek

VP, Global IT and CIO

Nidec

Toss out the manual on redundancies in the business process; RPA is automating its way to greater efficiencies and a brighter bottom line. This peer-to-peer discussion is a mix of RPA advocates, early adopters and outside observers — joining forces to learn from each other and explore:

  • How peers have deployed RPA— what has worked and what needs work
  • How to measure the return on investment for automated processes
  • How automation is being successfully deployed across the enterprise
  • How to overcome human barriers — such as employee engagement ­and leadership buy-in — to realize the full potential of RPA

10:00am - 10:45am  CST Virtual Summit Keynote

Accelerate Your Secure Digital Transformation

Jay Chaudhry headshot

Jay Chaudhry

CEO, Chairman & Founder

Zscaler

Bruce Lee headshot

Bruce Lee

SVP, CTO

Centene Corporation

The cloud and mobility are powerful enablers of digital transformation, but many organizations are grappling with legacy architectures that haven't evolved much in decades. With most applications in the cloud and employees working remotely, legacy network and security models are not only ineffective, but they hinder your ability to take advantage of the agility, productivity, efficiency, and speed enabled by digital transformation. Network and security architectures need to evolve to securely connect any entities—users, devices, applications—to meet business needs in the digital era.

In this session, Zscaler CEO Jay Chaudhry talks with Bruce Lee of Centene, who will discuss how Centene's digital transformation has made the company more resilient, enabling its entire staff to work remotely with minimal disruption and no compromising on security.

  • “Owning the moment”: IT’s opportunity to accelerate secure digital transformation
  • Best practices for securing work-from-anywhere using Gartner’s secure access service edge (SASE) and zero trust network access (ZTNA) frameworks
  • What comes next: IT’s new role as strategic business enabler

10:45am - 11:00am  CST Break

11:00am - 12:00pm  CST Virtual Summit Boardroom

Creating a Secure, Digital, and Modern Environment

Gary Harbison headshot

Gary Harbison

Global CISO

Bayer Corporation

Andrew Wilder headshot

Andrew Wilder

Regional Security Manager

Nestle

Bill Lapp headshot

Bill Lapp

Solution Architecture, Global Leader

Zscaler

Information security is now, more than ever, playing a role in the organization’s mission to make security personal and collaborative. How are CIOs partnering with CISOs to help establish a security strategy that is an enabler of the digital business rather than an obstacle?

In this interactive session, you’ll discuss:

  • How the security team can enable strategy and be a successful partner with the IT team
  • Best practices for organizational change management
  • Create a communication strategy that ties security to organizational success

11:00am - 12:00pm  CST Virtual Summit Boardroom

Bracing for Seismic Shifts – Meeting the Demands of the Business

Tom Henry headshot

Tom Henry

Chief Data & Analytics Officer

Schnucks

Shri Ramachandran headshot

Shri Ramachandran

Vice President, IT

Boston Scientific

2020 forced technologists to innovate and work smarter [and faster] to meet increased business demands. To succeed, leaders were forced to become flexible and accommodating in delivering new digital and data solutions to their organizations at lightspeed, inciting endless channels of demand. Join your peers in a focused discussion on how to best leverage newfound operating structures/models and manage a rising need for speed, delivery, and value.

Join this virtual boardroom conversation to explore:

  • Riding the current momentum to influence and advance the enterprise
  • Balancing increased demands with the imperative of tangible business outcomes
  • Increasing the pace and reducing friction points in new technology and feature, functionality adoption
  • Implementing data and analytic strategies that inform and facilitate desired business outcomes

11:00am - 12:00pm  CST Virtual Summit Boardroom

The Continual Shifting of Threats

Craig Byrkit headshot

Craig Byrkit

VP, Global Information Security and Privacy Officer

Reinsurance Group of America

Aman Raheja headshot

Aman Raheja

SVP CISO & Head of IT Operations

Humana

Whether it’s cybercriminals motivated by profit or nation-state attackers with geopolitical motives, public and private organizations of all sizes have felt the impact of cyberattacks. Enterprise organizations are reeling from the onslaught of massively spread ransomware attacks to surgical pinpointed attacks on their assets from sophisticated state-sponsored actors. How can CISOs best face changing threat vectors?

Join this roundtable conversation to discuss:

  • The current threat landscape and development on ransomware attacks
  • How to best discover and prevent nation-state attacks
  • What security executives can do to build resiliency

12:00pm - 12:45pm  CST Virtual Summit Keynote

Cloud Strategies to Power Digital Transformation

Kyle Collins headshot

Kyle Collins

Interim VP, CIO and Chief Innovation Officer

Saint Louis University

Hillery Hunter headshot

Hillery Hunter

CTO, IBM Cloud

IBM

The most successful businesses today connect digital transformation to business goals using innovative technology and increasing moving more of their enterprise workload to the Cloud. CIOs are charged with clearing adoption hurdles to align mission-critical tasks and business priorities with the multiple cloud environments.

This interactive session explores:

  • Examples of transformations using open, flexible, and secure multicloud operating environments
  • Fostering digital transformation and creating a competitive advantage through a hybrid cloud strategy
  • Accelerating the skills and culture that leverages AI and cloud

By registering for this session, this serves as your authorization to Evanta or its vendor to provide your contact information to IBM to follow up on your interaction and participation. IBM’s use of your contact information is governed by the IBM Privacy Policy. If you need more information on how IBM is using your personal data you may refer to the IBM Privacy Statement. To withdraw your marketing consent and unsubscribe to receiving emails click on the unsubscribe button at this address: ibm.biz/marketingoptout.

12:45pm - 1:15pm  CST Networking

Community Discussion

Matt Modica headshot

Matt Modica

CISO

BJC HealthCare

Teresa Sanzottera headshot

Teresa Sanzottera

Vice President and CIO

Mallinckrodt Pharmaceuticals

An informal and interactive opportunity for you to network with peers in small groups. 

8:00am - 8:45am  CST Virtual Summit Keynote

Finding Success with Adopting a SASE Architecture

Jason Clark headshot

Jason Clark

Chief Strategy Officer

Netskope

Dustin Wilcox headshot

Dustin Wilcox

CISO

Anthem

Organizations are feeling a shift in the world of networking and security as they rapidly adopt and embrace the cloud. On-premises private data centers are no longer the place for data and workloads to exist. With this shift, security and networking are brought closer than ever. Enterprises need speed, visibility, security and reliability without compromise. Enter, the secure access service edge, better known as SASE. This evolved concept of cloud security architecture outlines a convergence of multiple security functions to offer identity-based secure access. How can your organization best position itself for the transition?

In this session, you will discuss:

  • Problems SASE can address in the modern enterprise
  • Benefits of moving to a SASE architecture
  • Insights from organizations adopting SASE today

8:45am - 9:00am  CST Break

9:00am - 10:00am  CST Virtual Summit Boardroom

Optimizing Security Operations

Alan Berry headshot

Alan Berry

VP of CyberSecurity

Centene Corporation

Matt Modica headshot

Matt Modica

CISO

BJC HealthCare

Larry Woods headshot

Larry Woods

Sr. Director, Enterprise Information Security

Post Holdings

Outsource? Insource? A hybrid model? Finding the right processes and design for an effective Security Operations Center (SOC) is a complex leadership challenge weaving technology, budget, talent management and, of course, risk. Learn what peers are doing and questions you should be asking yourself, and other senior leaders, to ensure your SOC is up to par.

Join this session to learn:

  • What other companies are doing to optimize their SIEM and SOC
  • Effectively managing and reducing false positives
  • Incident response and other SOC automation opportunities
  • SOC assessment and benchmarking options
  • KPIs for measuring SOC effectiveness 
  • Models and economics for effective insource, outsource and hybrid SOCs

9:00am - 10:00am  CST Virtual Summit Boardroom

RPA – Automation’s Golden Age

Steve Kappel headshot

Steve Kappel

VP & CIO

Safety National

JK Pareek headshot

JK Pareek

VP, Global IT and CIO

Nidec

Toss out the manual on redundancies in the business process; RPA is automating its way to greater efficiencies and a brighter bottom line. This peer-to-peer discussion is a mix of RPA advocates, early adopters and outside observers — joining forces to learn from each other and explore:

  • How peers have deployed RPA— what has worked and what needs work
  • How to measure the return on investment for automated processes
  • How automation is being successfully deployed across the enterprise
  • How to overcome human barriers — such as employee engagement ­and leadership buy-in — to realize the full potential of RPA

10:00am - 10:45am  CST Virtual Summit Keynote

Accelerate Your Secure Digital Transformation

Jay Chaudhry headshot

Jay Chaudhry

CEO, Chairman & Founder

Zscaler

Bruce Lee headshot

Bruce Lee

SVP, CTO

Centene Corporation

The cloud and mobility are powerful enablers of digital transformation, but many organizations are grappling with legacy architectures that haven't evolved much in decades. With most applications in the cloud and employees working remotely, legacy network and security models are not only ineffective, but they hinder your ability to take advantage of the agility, productivity, efficiency, and speed enabled by digital transformation. Network and security architectures need to evolve to securely connect any entities—users, devices, applications—to meet business needs in the digital era.

In this session, Zscaler CEO Jay Chaudhry talks with Bruce Lee of Centene, who will discuss how Centene's digital transformation has made the company more resilient, enabling its entire staff to work remotely with minimal disruption and no compromising on security.

  • “Owning the moment”: IT’s opportunity to accelerate secure digital transformation
  • Best practices for securing work-from-anywhere using Gartner’s secure access service edge (SASE) and zero trust network access (ZTNA) frameworks
  • What comes next: IT’s new role as strategic business enabler

10:45am - 11:00am  CST Break

December 16, 2020

Your Community Partners


CISO Thought Leader
Program Partner

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Josh Rybak

Program Manager

971-230-3539

josh.rybak@evanta.com