Chicago IT & Security Leaders Collaborative

Chicago IT & Security Leaders Collaborative

The Chicago IT & Security Leaders Collaborative will bring together the top Leaders from the city for a day of interactive sessions. We will address topics that are impactful to our Community and structure the sessions so our Executives can collaborate with one another via roundtables and workshop sessions.

The Chicago IT & Security Leaders Collaborative will be geared towards strengthening the IT community across Chicago, while creating beneficial networking opportunities that will contribute to the IT industry’s growth throughout the city.

Register Here

Collaborative Agenda April 27th, 2023

11:30 - 12:30 PM CST
NETWORKING LUNCH

Open seating buffet meal serving 5-star food and great Peer engagement before we kick off the day

12:35 - 12:40 PM CST
SINC OPENING REMARKS

A Thank You from SINC – setting the tone for a great day! A brief rundown of the session format, App overview and how to win some great prizes

12:40 - 1:10 PM CST
MASTER OF CEREMONIES KEYNOTE PRESENTATION - Preparing IT & Cybersecurity Strategies and Budgets for a Volatile 2023

With many economists are anticipating a recession in 2023, the impact on IT departments is unclear. One would expect companies to pull back across the board and for those cuts to include IT. But the big surprise is that spending on IT is expected to increase.

That said, decision makers will be quick to slash frivolous spending and non-essential tech stacks.

1:20 - 1:50 PM CST
WORKSHOP - Security Validation as the Heart of Exposure Management

To increase security readiness given today’s dynamic attack surfaces and diverse cyberthreats, security professionals need to move away from traditional vulnerability-centric methods to a new approach that identifies exploitable security exposures in their live IT environments.

Gartner describes Exposure Management (EM) as a new framework that incorporates the adversary’s view to continuously uncover exploitable security gaps, and prioritize remediation accordingly. One of the pillars of EM is security validation, which provides evidence of attackers’ possible achievements in the context of an organization’s deployed assets, configurations, and security controls.

During this session, we will present a pragmatic approach to implementing an Exposure Management strategy, focusing on automated security validation.

Presented by: Pentera

2:00 - 2:30 PM CST
WORKSHOP - Cloud Defense in Depth: Shift Left, and Shield Right

Cloud security grows increasingly complex. The types of solutions, the vendors, the promises, and the jargon around cloud security continue to grow in an already crowded market. But with all of these offerings, the attacks aren’t decreasing. The business benefits of the cloud are clear: flexibility, scalability, and innovation at speed- one of the last true competitive differentiators – but how do you protect your business, and keep the risks from outweighing the benefits? A defense in depth strategy enables organizations to innovate and scale confidently and security. Join SentinelOne’s Laura Roantree, to explore the anatomy of a real cloud ransomware attack, and how a pragmatic defense in depth strategy will help you resist, and recover.

Speaker: Laura Roantree, Director of Cloud Security MarketingDirector, SentinelOne

Presented by: SentinelOne

2:30 - 2:45 PM CST
REFRESHMENT BREAK

Circle back with your Peers on the content so far while grabbing a coffee and a snack

2:50 - 3:40 PM CST
INTERACTIVE ROUNDTABLE - Driving the Business Through Technology

Organizations are losing productivity from managing the limitations of yesterday’s technology. The business is changing and the current communications solution no longer adequately connects end users. Old communications technology, including legacy telephony systems, disjointed messaging and communication or collaboration mediums, and unintuitive video conferencing, deteriorates the ability of users to work together in a productive manner.

This session will cover:

  • What does your Organizations Communication Infrastructure look like?
  • Is there a plan in place to move from legacy systems? If so, what does that plan look like?
  • How do you gain the business buy-in for the updating of technologies that doesn’t necessarily equate with directly driving revenue?

For the first 30 minutes of this session, we will be grouped in roundtables (10-12 Executives/table) with one table monitor. The last 20 minutes, each table monitor will take to the stage and discuss their group’s findings in a panel recap.

Panelist: David Beaver, IT Director, Kriete Group

3:45 - 4:15 PM CST
WORKSHOP

Check back for updates on this session.

Presented by: CrowdStrike

4:15 - 4:25 PM CST
REFRESHMENT BREAK

Circle back with your Peers on the content so far while grabbing a coffee and a snack

4:30 - 5:20 PM CST
INTERACTIVE ROUNDTABLE - Siloed in Cyber

Siloed security data hampers the ability for Organizations to achieve a collective defense. According to a 2022 Forrester study, 71% of security leaders report their teams need access to threat intelligence, security operations data, incident response data, and vulnerability data, yet 65% of respondents find it very challenging to provide security teams with cohesive data access.

With today’s evolving threats, security operations teams cannot succeed without the access to and a centralized view of the data from other cyber and IT applications within their environments.

This session will cover:

  • How is your Organization implementing a unified security strategy?
  • What are some best practices for a stronger security strategy?
  • How do you determine exactly what intelligence is required and how you can apply it to your business?

For the first 30 minutes of this session we will be grouped in roundtables (10-12 Executives/table) with one table monitor. The last 20 minutes, each table monitor will take to the stage and discuss their group’s findings in a panel recap.

Moderator: Bill Slater, CISO, Slater Technologies

Panelists: 

Jonathan Reiber, Vice President for Cybersecurity Strategy and Policy, AttackIQ

DigiCert

5:20 - 7:00 PM CST
COCKTAIL & CANAPE NETWORKING RECEPTION

Stick around, avoid the traffic and mingle with your peers! Open bar and serving a few finger foods to hold you over

Speakers