CISO Chicago
Presentations
Day 1: General Session
Keynote Presentation: Rewriting Leadership: Leading Humans and Machines Together
As artificial intelligence reshapes how organizations operate, compete, and innovate, leadership itself is undergoing a fundamental rewrite. No longer confined to managing people and processes, today’s leaders must orchestrate dynamic ecosystems where humans and intelligent machines collaborate, learn, and make decisions together.
This keynote explores what it truly means to lead in a world where algorithms influence strategy, automation drives execution, and data becomes a core leadership asset. It challenges traditional management models and introduces a new leadership paradigm - one that blends human judgment, ethical responsibility, and emotional intelligence with the speed, scale, and precision of AI systems. Attendees will gain practical insights into building high-performing hybrid teams, fostering trust between humans and AI, and navigating the complex risks surrounding cybersecurity, bias, and governance. The session will also examine how leaders can create cultures that embrace continuous learning, adaptability, and responsible innovation while maintaining accountability in increasingly autonomous environments.
Designed for forward-thinking executives and decision-makers, this keynote will equip leaders with the mindset and strategies needed to thrive at the intersection of human potential and machine intelligence - where the future of leadership is not just managed, but co-created.
Jigar Shah
Chief Information Security Officer, MEDUSIND
Keynote Presentation: Security Teams That See Around Corners: Mitigating AI Risk in Real Time
From vibe coding and autonomous agents to generative chatbots in everyday workflows, AI adoption is occurring at a pace that most security programs have not been able to realistically govern. Well-intentioned employees, misaligned agents, overly permissive access, and weak data controls are introducing new forms of risk, often without malicious intent. At the same time, adversaries are actively probing these gaps through indirect prompt injection and jailbreaking techniques. However, there's good news. More often than not, failures leave signals long before they become significant incidents.
In this session, you'll learn how an AI security blueprint can help you identify emerging risk and align security controls to new and existing AI deployments, ensuring AI initiatives at every stage can realize their business value without security acting as a bottleneck
Marc Tabago
Senior Solutions Engineer, TRENDAI
Download TBC
Viken Shah
Senior Sales Engineer, FASTLY
Keynote Presentation: Email Is Still the #1 Breach Vector - and AI Is Changing the Threat Model
- How to defend against AI-driven email threats that bypass traditional security controls
- Exploring how generative AI is reshaping phishing, BEC, and social engineering at scale
- Insights into why identity, not email, is now the true breach vector and what to do next
Shelby Kiger
Cybersecurity Engineer, MCDONALD’S
Keynote Presentation: Who Owns AI Risk When Things Go Wrong?
- Exploring accountability models when AI systems cause financial, legal, or reputational damage.
- What boards and regulators will expect CISOs to answer after an AI-driven incident.
- How to define ownership across security, data, legal, and product teams.
Mel Fenner
Chief Digital Innovation Officer, LINCOLN UNIVERSITY
Download TBC
Keynote Presentation: From Breach Headlines to Board Confidence
- Insights into how public cyber incidents are reshaping board expectations.
- How to proactively address reputational risk before an incident occurs.
- What boards now expect CISOs to explain in the first 48 hours after a breach.
Anamika Roy
Director, IT Audit & Data Analytics, OLD REPUBLIC GENERAL INSURANCE (former)
Keynote Presentation: A Framework for Managing Artificial Intelligence & Third Party Risk Management: Medicare Advantage
- How to design onboarding and ongoing monitoring practices that reduce third-party cyber risk before incidents occur.
Josh Aubey
Chief Compliance & Privacy Officer, WELLBE SENIOR MEDICAL
Brandin Brooks
Senior Credentialing Specialist, WELLBE SENIOR MEDICAL