
ABOUT
Janet Heins is a Chief Information Security Officer (CISO) and author who has spent over two decades proving that visibility is strategy. Known for protecting global systems and educating the workforces behind them, Janet is a self-described builder who believes security is strongest when powered by diverse perspectives.
​
In her book, Go Ahead…ASK FOR IT!, Janet distills twenty years of C-suite experience into a system for leadership transformation. She teaches professionals how to unearth their buried talent, build credibility that compounds, and activate a "flywheel" of momentum that carries them into the rooms where decisions are made.
Honors and Awards




SPEAKER TOPICS
Quantum Computing: Prepare to be Prepared
The topic of quantum computing sounds complex unless you are an expert mathematician. Most of us are not, but we can still understand the concepts, follow the evolution and learn what we need to do to be prepared
Eliminating the
After-Market of
Security
Today, information security is a top priority for every company due to constantly growing and evolving threats. That makes building security into applications from the start more important than ever. What applications don’t do are equally as important as what they are intended to do.
Preparing for The Journey To A Mature Security Model
Maturing the security capabilities of an organization takes intentional planning and execution. It is more than securing funding. To pave the way we must align with the company's goals, assess where we are, and engage all parts of the company.
Thriving as a Woman in Leadership: Strategies for Success
Gender biases and stereotypes are still prevalent and being a female leader can be challenging. However, with the right mindset, skills, support and qualities, women can overcome these obstacles and make a significant impact in their industries. By exploring the challenges, advantages, and qualities of female leaders, you will be better equipped with inspiration and guidance to become effective and empowering leaders.
You Can't Measure What You Don't See
Session Blurb: Having visibility into an organization's digital environment is key to protecting a company. Where do you start and who do you ask? Learn how to use what you have and know today to build out the visibility needed to protect your company.
Strategies for a Stronger Security Program: Lessons from Across Industries
There are both commonalities and differences when implementing a security program in different industries. As cyber-attacks continue to rise, it's essential for businesses to implement a robust security program to protect themselves and their customers. Hear the strategy that is effective across industries, how to recognize where there may be differences, and how you can apply them to your own company.

Business Impact As A Strategic Leader
A strategic leader and critical business advisor establishing and overseeing execution of technology roadmap to enable achievement of business objectives while protecting intellectual property, information, and information systems in growing and dynamic businesses.
Effective executive presence gaining buy-in from senior leadership for adoption of strategies and approval of associated budgets to develop robust information security programs and maturing global IT functions. Leverage technology, innovation, and business acumen to develop and implement an Information Technology strategic plan.
Record of building, leading, and maintaining highly connected and committed cross-organization teams to govern and execute multiple, large scale transformational projects. Comprehensive knowledge of technology operations, mergers & acquisitions, and financial management.


.png)


.png)




.png)