-
8:00
Registration and Light Breakfast
-
8:45
Chair's Opening Remarks
-
8:50
OPENING PANEL: Confessions of CISOs – Today’s Operational Reality
OPENING PANEL: Confessions of CISOs – Today’s Operational Reality
• Insights into the unfiltered realities CISOs face as cyber risk, AI adoption, and regulatory scrutiny converge.
• Exploring how security leaders are balancing innovation demands with shrinking tolerance for failure.
• What CISOs wish boards understood about operational risk, talent constraints, and security debt.
George Coleman, Vice President, Chief Information Security Officer, ARIEL INVESTMENTS
Isaac Tseng, Chief Information Security Officer, HARRIS|OAKMARK
Oscar J Giraldo, Assistant Vice President of Data Security, WATERTON
Tellis Williams, Chief Information Security Officer, THE DREAM EXCHANGE -
9:35
EXPERT AMA: AI, Governance & Regulatory Complexity
• What CISOs need to know about evolving AI regulation and executive accountability.
• How to manage uncertainty when laws, standards, and expectations are still forming.
• Insights from peers on engaging legal, risk, and compliance teams early.
Bruce Phillips, Senior Vice President, & Chief Information Security Officer, WILLISTON FINANCIAL GROUP
Oscar J Giraldo, Assistant Vice President of Data Security, WATERTON
Mel Fenner, Chief Digital Innovation Officer, LINCOLN UNIVERSITY -
10:05
Security as a Growth Engine: Turning Cyber Investment into Competitive Advantage
• Learn how leading CISOs translate cyber investments into measurable impact on revenue protection, operational uptime, and customer trust.
• Discover how to move from tool sprawl to integrated security ecosystems that deliver better visibility, faster response, and lower total cost of ownership.
• Understand how to strengthen supply chains, third-party relationships, and incident readiness to keep the business running in the face of evolving threats.
Reserved -
10:35
10 Minute Spotlight Session – Trend Micro
-
10:45
Morning Break & Networking
-
11:15
Intelligent Defense: Orchestrating Security at the Edge in the Age of Automated Attacks
Viken Shah - Senior Sales Engineer - Fastly
-
11:30
Presentation: AI Security in Enterprise Operations – Opportunities & Risks
• Insights into how generative AI is simultaneously strengthening security operations while expanding the attack surface.
• Exploring the emerging threat landscape driven by AI-enabled phishing, fraud, and automation.
• How to establish governance, oversight, and accountability for enterprise AI adoption. -
11:50
Presentation: Who Owns AI Risk When Things Go Wrong?
• Exploring accountability models when AI systems cause financial, legal, or reputational damage.
• What boards and regulators will expect CISOs to answer after an AI-driven incident.
• How to define ownership across security, data, legal, and product teams.
Mel Fenner, Chief Digital Innovation Officer, LINCOLN UNIVERSITY -
12:20
PANEL DISCUSSION: Reality Check: Security Investments That Truly Deliver
• Insights into which security investments are driving measurable risk reduction versus noise.
• How to justify spend using business-aligned metrics instead of technical outputs.
• What CISOs are deprioritizing to reduce tool sprawl and operational friction.
Allah Rakha Sheikh, Chief Information Officer, MADISON MUTUAL
Mike Koleno, Chief Technology Officer, BETTER TRUCKS
Kiran Rallabandi, Chief Technology Officer, WARRANTY PROCESSING
Jeremiah Johnson, Associate Director of AV Collaboration, THE KRAFT HEINZ
Venkata BrahmeswarReddy Aanam, Assistant Vice President, Senior IAM Business Analytics/Risk, NORTHERN TRUST -
12:50
Presentation: From Breach Headlines to Board Confidence
• Insights into how public cyber incidents are reshaping board expectations.
• How to proactively address reputational risk before an incident occurs.
• What boards now expect CISOs to explain in the first 48 hours after a breach.
Anamika Roy, Director, IT Audit & Data Analytics, OLD REPUBLIC GENERAL INSURANCE -
1:30
Presentation: Leadership Masterclass: How to Communicate Risk in Business Terms
• How to translate cyber threats into financial, operational, and reputational impact.
• Insights into metrics and dashboards that resonate with boards and executives.
• What separates high-trust CISOs from those stuck in technical reporting.
Pal Vankayalapati, Chief Information Security Officer, PLZ CORP -
1:45
Lunch Break & Networking
-
2:30
FIRESIDE CHAT: Multi-Cloud Resilience, Regulatory Proof Points & Preparing for Post-Quantum Risk
• Exploring how organizations are proving security and compliance across hybrid estates.
• How to maintain resilience when visibility, controls, and ownership are fragmented.
• What regulators and auditors increasingly expect to see.
• How to inventory cryptographic dependencies and prepare for post-quantum migration across multi-cloud environments.
Abiola Olamoyegun, Vice President, Information Technology IA, PHEAA -
2:50
KEYNOTE: Email Is Still the #1 Breach Vector — and AI Is Changing the Threat Model
• How to defend against AI-driven email threats that bypass traditional security controls
• Exploring how generative AI is reshaping phishing, BEC, and social engineering at scale
• Insights into why identity, not email, is now the true breach vector and what to do next
Shelby Kiger, Cybersecurity Engineer, MCDONALD’S -
3:10
LIVE DEBATE: Risk Roulette
In cybersecurity, every decision comes with trade-offs, and not all risks are created equal. In this high-energy, live debate, top security leaders face off to tackle some of the toughest “what-if” scenarios CISOs encounter daily, from ransomware vs. silent data breaches, to strict access controls vs. business agility, and everything in between.
Audiences will witness real-time arguments, expert insights, and a clash of perspectives as panelists defend their stance on difficult security dilemmas. Attendees will gain insights into:
• A deeper understanding of the trade-offs behind major security decisions
• Actionable frameworks for prioritizing risk in their own organizations
• Fresh insights into how leading CISOs think under pressure
Expect surprises, audience polling, and lively debate, because in cybersecurity, sometimes there is no right answer… only what’s worse.
Arpine Long, Deputy Chief Information Security Officer, COLLECTIVE HEALTH
Tammy Klotz, Chief Information Security Officer, TRINSEO
Karen Habercoss, Chief Information Security & Privacy Officer, UCHICAGO MEDICINE
Dave Gerleman, Board Member, INFRAGARD CHICAGO MEMBER ALLIANCE -
3:50
Afternoon Break & Networking Break
-
4:30
Keynote: Rethinking Third-Party Cyber Risk: From “Obvious Controls” to Proactive Prevention
• Insights into why foundational TPRM controls are often undervalued and how reframing them drives stronger adoption.
• How to design onboarding and ongoing monitoring practices that reduce third-party cyber risk before incidents occur.
• Exploring peer collaboration as a catalyst for improving TPRM maturity and prevention strategies.
Josh Aubey, Chief Compliance & Privacy Officer, WELLBE SENIOR MEDICAL
Brandin Brooks, Senior Credentialing Specialist, WELLBE SENIOR MEDICAL -
4:40
KEYNOTE: Leading With Empathy & Grace – Secrets to Developing High Performing Teams
In a world where leadership is often measured by metrics, margins, and milestones, Leading with Empathy & Grace offers a timely and transformative perspective. Tammy Klotz—a seasoned cybersecurity executive—delivers a deeply personal and practical blueprint for leading with humanity, humility, and heart.
• Build psychological safety and team resilience by leading with authenticity in high-stakes, high-velocity security environments
• Protect your leadership energy through boundary-setting and intentional self-care to avoid burnout in 24/7 incident response roles
• Leverage empathy and cultural awareness as strategic tools for improving stakeholder alignment, zero-trust adoption, and security-first culture -
5:00
KEYNOTE: Jigar Shah, Chief Information Security Officer, MEDUSIND
-
5:20
Closing Remarks & End of Conference
-
5:30 - 6:30
Networking Reception
Not Found
Join us at CISO Chicago 2026
Get shoulder to shoulder with your peers and see what's next in InfoSec
#CISOChicago