The Illinois Public Sector Cybersecurity Summit is where government defends the future.
This public sector-focused event brings together IT security leaders, risk managers, and public officials to tackle the evolving cyber threats facing state and local government. Through expert-led sessions, peer exchange, and real-world case studies, attendees gain practical strategies to strengthen cyber resilience, protect critical infrastructure, and lead with confidence in an age of constant risk. Designed specifically for the public sector, this summit delivers insights you can act on and alliances you can trust!
The Illinois Public Sector Cybersecurity Summit is a powerful reminder of what we can accomplish when we work together with a shared purpose. As we modernize our systems and reimagine the digital services that support millions of Illinois residents, we have a unique opportunity to build a more connected, efficient, and innovative government. This summit will bring together the visionaries and problem-solvers who turn challenges into progress. I’m grateful for the leadership, dedication, and collaboration within this community, and I’m inspired by the work ahead. This work will strengthen our State and deliver lasting impact for the people we serve.
– Brandon Ragle, State Chief Information Officer and Acting Secretary of the Illinois Department of Innovation & Technology
Our strength comes from our connections. By uniting security professionals, sharing insights, and committing to resilient and secure services, we reinforce the essential circuits that power government - and ensure they remain strong for every resident who relies on them. I look forward to seeing you at this year's Illinois Public Sector Security Summit and continuing to build the connections that make us stronger."
– Jason Bowen, Illinois Department of Innovation & Technology Statewide Chief Information Security Officer
Wednesday, April 8 |
|
8:00 am Central |
Registration and Morning Refreshments in the Exhibit Area |
9:00 am Central |
Welcome and Opening Remarks |
9:15 am Central |
Hacking the Hackers: Strategies for Building Cyber Resilient OrganizationsAs cyber threats grow more sophisticated, organizations must stay ahead to protect their data, operations, and reputation. This session offers a glimpse into a hacker’s mindset, revealing both common and lesser-known threats. Attendees will learn practical strategies to strengthen system defenses, reduce vulnerabilities, and foster resilience. The session also explores the human side of cybersecurity, emphasizing how leaders can empower their people to play their part in upholding the organization’s cyber defense strategy. Tarah Wheeler, Cybersecurity Expert, White Hat Hacker |
10:15 am Central |
Networking Break in the Exhibit Area |
10:45 am Central |
Concurrent SessionsPractical AI and Automation for Local GovernmentIllinois agencies are experimenting with AI while actively pushing back on hype and “AI theater.” What’s working today comes into focus: introducing AI through clear policies, training staff on practical tools, and using automation to help small teams scale impact. This conversation explores how to build comfort among non-technical users, avoid overpromising, and align AI efforts with governance and security frameworks such as zero trust and defense-in-depth, keeping adoption realistic, responsible, and valuable. Doing More with Less in Public Sector CybersecurityFrom three-person municipal IT shops to lean statewide teams supporting multiple agencies, many Illinois organizations are expected to deliver enterprise-grade security with limited staff and budget. Practical strategies already in use across the state take center stage, prioritizing continuous learning to build in-house expertise, structuring roles so generalists can still cover critical functions, and engaging vendors and events with intention rather than urgency. Peer examples highlight how teams balance daily operations with long-term maturity, offering tactics that work even without a large security organization. Managing Vendor and Third-Party Risk Across GovernmentAs reliance on SaaS, cloud platforms, and specialized vendors grows, third-party risk has become a shared responsibility across the government. End-to-end risk management is examined, from understanding what agencies still own when services are outsourced, to embedding security expectations into procurement and evaluating incident-response partners. Real-world examples from state and local initiatives ground the discussion, with practical checklists and talking points participants can use with purchasing, legal, and leadership teams. |
11:45 am Central |
Lunch |
12:45 pm Central |
General Session - Building a Shared Cybersecurity Responsibility Across IllinoisAcross Illinois, cybersecurity success depends on collaboration across agencies, sectors, and levels of government. State, local, and higher education leaders explore how shared responsibility, coordinated services, and strategic partnerships are strengthening cyber resilience across the state. Learn how to leverage programs delivered by the Department of Innovation and Technology (DoIT), build regional and university partnerships, and structure vendor relationships more effectively. The takeaways include a practical understanding of ownership, access points into statewide initiatives and identifying where limited resources can deliver the greatest return. |
1:30 pm Central |
Short BreakPlease proceed to the concurrent sessions. |
1:40 pm Central |
Concurrent SessionsIncident Response That Works When It MattersLocal leaders consistently ask for real-world incident response guidance, not theory. Lessons from the field highlight how agencies build test response playbooks and incident response plans that hold up during nights, weekends, and holidays. Join us as we discuss working with vendors during live incidents, aligning documentation with what happens under pressure, and using risk assessments and audits as tools for readiness rather than shelfware. Discover how clearer expectations emerge around what “prepared” truly looks like. Threat Intelligence and Data Sharing Without Federal BackstopsWith growing concern about reduced reliance on federal programs, Illinois leaders are rethinking how threat intelligence is shared at the state, regional, and local levels. Together, we will share practical data-sharing models and explore what “useful” threat intelligence looks like for small and mid-size teams. We will address legal and risk constraints, with an emphasis on Illinois-specific approaches that agencies can begin using immediately. Securing Critical Infrastructure in MunicipalitiesFor municipalities operating utilities, generators, hydro facilities, or municipal fiber networks, cybersecurity extends far beyond email and endpoints. Attention turns to operational technology security, integrating IT and OT risk management, and coordinating across multiple vendors and compliance requirements. Together, we will examine realistic funding strategies and regional collaboration models to demonstrate how meaningful improvements in critical infrastructure security are being achieved today. |
2:40 pm Central |
Networking Break in the Exhibit Area |
3:00 pm Central |
General Session – Why Do Security Pros and Teams Fail, and What Can You Do About It?Why do cybersecurity and technology professionals and their teams fail? Drawing on years of experience as Michigan’s former CISO and enterprise-level CIO, CTO, and CSO, Dan Lohrmann explores this question through surprising real-world stories and insights from leading award-winning government teams. While many believe the solution lies in more training, certifications, higher salaries, bigger budgets, better leadership skills, or stronger executive buy-in, Lohrmann reveals why even well-resourced teams can still fall short and what truly drives success. This keynote outlines seven ways to revitalize your role, your team, and your professional outlook, offering practical, actionable guidance along with interactive table discussions designed to help attendees personally apply the lessons learned. Dan Lohrman, Senior Fellow, Center for Digital Government |
3:50 pm Central |
Reception in the Exhibit Area |
4:20 pm Central |
End of ConferenceConference times, agenda, and speakers are subject to change. |
3000 South Dirksen Parkway
Springfield, IL 62703
(217) 529-7777
Austin Alaria
Deputy Chief Information Officer
Office of the State Treasurer
State of Illinois
Chris Blanding
Chief Information Officer
Lake County
Jason Bowen
Chief Information Security Officer
Department of Innovation and Technology
State of Illinois
Bruce Coffing
Chief Information Security Officer
City of Chicago
Carl Conner
Associate Director
IT Security & Compliance
University of Illinois
Jason Donisch
Chief Information Officer
Will County
Vasudha (Vasu) Gadhiraju
Director of Innovation & Technology
Town of Normal
Jenifer L. Johnson
Chief of Staff
Department of Innovation and Technology
State of Illinois
Waseem Khan
Chief Information Officer
City of Rolling Meadows
Brandon Ragle
Secretary / State Chief Information Officer
Department of Innovation and Technology
State of Illinois
Tom Rieman
IT Director
City of Oak Forest
Stephen Rounds
Information Technology Director
City of Peru
Dan Sluga
Chief Information Security Officer
Office of the Comptroller
State of Illinois
Open to Public Sector only.
Registration - Free
If you represent a Private Sector organization and are interested in Sponsorship Opportunities, please contact Heather Earney.
This event is open to all individuals who meet the eligibility criteria, without regard to race, color, religion, gender, gender identity, age, disability, or any other protected class. We are committed to fostering an inclusive and welcoming environment for all participants.
Need help registering, or have general event questions? Contact:
Lindsay Anthis
Government Technology
A division of e.Republic
Phone: (916) 932-1495
E-mail: lanthis@erepublic.com
Already a sponsor, but need a hand? Reach out to:
Mireya Gaton
Government Technology
A division of e.Republic
Phone:(916) 296-2617
E-Mail: mgaton@erepublic.com
Want to sponsor and stand out? Reach out to explore opportunities!
Heather Earney
Government Technology
A division of e.Republic
Phone: (916) 365-2308
E-mail: heather.earney@erepublic.com