IN-PERSON

Southern California CISO Executive Summit

May 21, 2025 | Marriott Long Beach Downtown

May 21, 2025
Marriott Long Beach Downtown

APPLY TO PARTICIPATE

Collaborate with your peers

Get together with Southern California's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Strengthening cybersecurity's influence as a key factor in business decisions

Driving innovative ideas into a leadership vision that fosters cyber resilience and personal growth

Establishing trust and understanding amid complex compliance changes and data ecosystems

Southern California CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.

Governing Body Co-Chairs

Matt Crouse

Solar Turbines
CISO

Trina Ford

iHeartMedia
SVP, CISO

Todd Friedman

ResMed
CISO

Nemi George

Pacific Dental Services
Vice President, Information Security Officer

Arthur Lessard

Universal Music Group
SVP & CISO

Dan Meacham

Legendary Entertainment
VP & Global CISO

David Tyburski

Wynn Resorts
VP, CISO

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Southern California CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


May 21, 2025

8:00am - 8:30am  Registration & Breakfast

8:00am - 8:30am  Networking

Leadership Book Swap

You are invited to bring your favorite leadership books for a Book Swap at the Executive Summit throughout the day. Which books have influenced you as a leader? Bring a book with your notes in the margins or a fresh copy to leave, and then swap for a book one of your fellow executives has brought. This idea was inspired by a Governing Body Member!

This will start at 8:00am, but will take place throughout the whole day as attendees come and go.

8:30am - 9:15am  Keynote

Disruption Proof — High-Performing Teams that Conquer Change

Dr. Vijay Pendakur, Ph.D. headshot

Dr. Vijay Pendakur, Ph.D.

Leadership & Team Culture Strategy Advisor

Guest Speaker

In today’s fast-moving tech and security landscapes, disruption is inevitable—but it doesn’t have to derail your team’s performance. In this high-energy keynote, Dr. Vijay Pendakur will explore why disruption often leads teams to getting stuck and how this stagnation threatens business success. Using his Alchemy of Talent model, Dr. Pendakur will show how team complexity can become your superpower to conquer change. He’ll also share his three powerful catalysts that turn complexity into jet fuel for resilient, adaptable teams - and double-click on the first catalyst: trust.

Join this keynote to discover:

  • The critical impact that stuck teams have on business performances
  • How trust can unlock team potential and turn complexity into a competitive advantage
  • Actionable strategies to navigate change & help teams perform at their best when it matters most

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Leveraging AI to Better Prevent Data Loss

Kumar Mehta headshot

Kumar Mehta

CDO and Co-Founder

Versa Networks

By analyzing and identifying patterns indicative of a potential data breach, artificial intelligence within a unified framework can dramatically improve your efforts to protect your organization's most precious data.

In this session, you and your peers will gather:

  • Practical steps for better protecting data integrity
  • How intelligent frameworks can augment and refine existing DLP efforts
  • Ways of using these AI-supported frameworks to strengthen overall resilience

9:40am - 10:25am  Breakout Session

Mastering Risk Management — A CISO's Perspective on NIST

JD Rogers headshot

JD Rogers

CISO

American Financial Group

New AI technology brings great opportunities to organizations, but also new risks. A comprehensive NIST framework can be the tool that helps organizations identify, assess and handle threats more quickly and effectively. Despite its widespread use for years, seasoned CISOs including JD Rogers of American Financial Group believe that while NIST has been the key to risk management in the past, it will continue to be the key for the future– and it should not be overlooked.

Join JD for this session, where he’ll unpack:

  • Measuring and tracking maturity – the evolving journey from the first implementation of NIST until now
  • Leveraging NIST – a look at current risk models, roadmaps, governance and company culture
  • Addressing pros and cons – management of complexity and budget constraints

9:40am - 10:25am  Executive Boardroom

Protecting Innovation — Rethinking Data Security Strategies

Howard Ting headshot

Howard Ting

CEO

Cyberhaven

Jeff Blair headshot

Jeff Blair

CISO

CAA

Brett Cumming headshot

Brett Cumming

Sr. Director, Information Security Officer

Skechers

AI makes creating and consuming data easier than ever, with shadow AI and dark data presenting new challenges to security teams. As the tactics for protecting data evolve, security leaders must adopt a risk-based strategy to protect mission-critical data and safeguard innovation.

Join this session to discover:

  • Effective practices for ongoing monitoring to identify risks
  • Rapid investigation and response techniques for insider threats
  • Strategies for evolving your data protection approach

9:40am - 10:25am  Executive Boardroom

True Defense Against API & Application Incidents

Larry Maccherone headshot

Larry Maccherone

Dev[Sec]Ops Transformation Architect

Contrast Security

Andrew Bereczky headshot

Andrew Bereczky

CISO

Automobile Club of Southern California

James Steele headshot

James Steele

Sr Director Infomation Security

CalOptima Health

Cybersecurity measures are adept at detecting and responding to incidents across various layers, but the application layer often remains vulnerable. Many organizations have a massive vulnerability backlog that demands timely and effective defense.

Join us to explore:

  • Understanding the scale of the backlog and strategies to prevent exploitation
  • The intricacies of application and API protection within the security operations ecosystem
  • Benefits of having a comprehensive blueprint that reveals attack surfaces, defenses, dangers, and connections

10:25am - 11:10am  Networking Break

10:35am - 11:00am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:10am - 11:55am  Breakout Session

Special Session by Cloudflare

Trey Guinn headshot

Trey Guinn

Field CTO

Cloudflare

Details coming soon!

11:10am - 11:55am  Breakout Session

Mastering Communication – Presenting with Impact

Diana Lovati headshot

Diana Lovati

CISO

AEG

Bashar Shaba headshot

Bashar Shaba

CISO

Hankey Group

Presenting to a boardroom, advisory committee or even just key stakeholders in your organization can be intimidating for any CISO. A truly impactful cyber leader who achieves consistent, desired outcomes has mastered speaking the language of the business. The next time you are in a high-pressured interaction to show alignment between cybersecurity objectives and organizational goals, you'll be able to stay confident using some tools from this session to drive successful results.

Join this interactive session to:

  • Talk through best approaches for clear, impactful presentations
  • Practice with peers on using fewer words that pack a punch
  • Learn how to help everyone leave the room feeling like they've won

11:10am - 11:55am  Executive Boardroom

Executive Boardroom Hosted by Google Cloud Security

John Hultquist headshot

John Hultquist

Chief Analyst, Google Threat Intelligence Group

Google Cloud Security

 Details coming soon!

11:10am - 11:55am  Executive Boardroom

Taming Third Party Risk with Advanced Technologies

John Chisum headshot

John Chisum

VP, Solutions Consulting

Mastercard Cybersecurity

Adrian Giboi headshot

Adrian Giboi

CISO

Solenis

Arthur Lessard headshot

Arthur Lessard

SVP & CISO

Universal Music Group

Cyber threats are increasingly sophisticated and pervasive, making conventional TPRM approaches like questionnaires inadequate. AI/ML and threat intelligence have the potential to transform TPRM, as well as extending into 4th, 5th parties and beyond. Leveraging key insights can help CISOs stay ahead of evolving risks and enhance security programs, even with limited resources.

Join this session to discuss:

  • Practical strategies for leveraging threat intelligence in TPRM
  • Critical alignment of people and process elements with advanced technologies
  • Acting on useful insights and data to manage supply chain risk

11:55am - 12:30pm  Lunch Service

12:30pm - 1:05pm  Keynote

Zero Trust & AI — Strengthening Security, Reducing Complexity, and Driving Innovation

Jay Chaudhry headshot

Jay Chaudhry

CEO, Chairman & Founder

Zscaler

Businesses stand to benefit from AI in unprecedented ways, but only if IT and security leaders overcome transformation challenges. This includes implementing a modern zero trust architecture to protect data and users, embracing AI while managing its risks, and handling the technical and financial implications of ever-expanding environments. A risk-based approach to security ensures CISOs deliver a secure, phased transformation.

Join this session to:

  • Understand how zero trust and AI together, unlike firewalls, provide the strongest cyber defense by stopping threat actors from lateral movement within networks
  • Learn strategies for protecting AI applications developed in data centers and the cloud, while preventing data leaks from public AI applications
  • Discover how eliminating costly legacy hardware simplifies environments while cutting network and security costs

1:05pm - 1:30pm  Networking Break

1:30pm - 2:15pm  Breakout Session

Special Session by Mimecast

 Details Coming Soon!

1:30pm - 2:15pm  Breakout Session

Career Chess — Strategically Planning Your Next Move

Jeffrey Aguilar headshot

Jeffrey Aguilar

CISO

Hoag Health System

James Thurmond headshot

James Thurmond

CISO (Acting)

Los Angeles County, CA

Many tenured CISOs started their careers before "CISO" was even a position at most organizations. Now, if you ask 50 CISOs about their reporting structure and responsibilities, you'll likely get 50 different answers.  How do you decide what you want your CISO role to look like? And once that is done, do you play the long game and push for changes within your current position - refining your role?  Or do you opt for a bold move, declare checkmate and find a new organization that matches your vision for your future?

Join this session to learn:

  • When to say 'yes' or 'no' to that next job offer
  • How to prioritize the right fit
  • What the choice between public and private sector could mean

1:30pm - 2:15pm  Executive Boardroom

Employing Cyber Intelligence to Improve Resiliency

Chris Poulin headshot

Chris Poulin

Director of Customer Advocacy & Principal Architect

BitSight

Sunil Agarwal headshot

Sunil Agarwal

CISO, VP Information Security and Risk Management

OSI Systems

Mike Brown headshot

Mike Brown

CISO

loanDepot

As cyber threats escalate, organizations must build resilience to effectively withstand and recover from attacks. Real-time threat intelligence provides CISOs with crucial insights to understand the company's risk landscape and respond swiftly. Cyber Threat Intelligence (CTI) is essential for fortifying resilience and enhancing communication with the C-suite and Board.

Join this session to discuss:

  • Leveraging CTI to align cybersecurity strategies with organizational goals
  • Using evidence-based threat intelligence to boost proactive defense and recovery
  • Improving communication with executive leadership on risk management strategies

1:30pm - 2:15pm  Executive Boardroom

Winning the AI vs AI Cybersecurity Battle

Scott Deluke headshot

Scott Deluke

Director of Enterprise Sales Engineering

Abnormal Security

Ingrid Lohneiss headshot

Ingrid Lohneiss

Manager, IT Security Risk & Compliance

Dole Food

Jeremy Smith headshot

Jeremy Smith

VP, CISO

Avery Dennison

AI is the critical differentiator in the evolving battle between hackers and defenders.  CISOs are tasked with defending against AI-powered cyberattacks that humans can't always easily identify and then finding ways to use AI-powered technologies to bolster their organizations’ defenses.

Join this session to discuss:

  • The rise of AI-powered threats and responses to those attacks 
  • Better detection through automated monitoring
  • Improvement of analysis and context of behaviors to combat evolving threats

2:15pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

Security Hot Topics Workshop— Pulse Check Your Priorities

Security continues to find its way into the boardroom and even into headlines.  CISOs are feeling the heat to foster and explain strategic value, opportunities, and implications of key priorities and new innovations. In this workshop, you'll have the chance to pick tables with topics that most interest you and have a dynamic dialogue about them with your peers.

Join this interactive session to:

  • Engage with like-minded CISO peers on top-of-mind priorities
  • Validate strategies and look at topics from new perspectives
  • Share key lessons learned and proven best practices

Table Themes Include: Quantum Computing; AI vs. Talent; Personal Liability; Leading Through M&A; Next-Gen Technology; Passwordless Authentication; Building Your Brand; Life After CISO/Board Membership; Succession Planning

3:00pm - 3:45pm  Breakout Session

Breakout Session

Details coming soon!

3:00pm - 3:45pm  Executive Boardroom

Proactive, Preventative and Resilient Cloud Security

Keith Mokris headshot

Keith Mokris

VP, Product Marketing

Orca Security

Paul Miller headshot

Paul Miller

CISO & VP, IT

Public Storage

Security teams are on the front lines of a dynamically changing threat landscape, especially in the cloud. They need to understand their tech stacks while also building resilient processes. Detecting, investigating, and preventing threats in a multi-cloud environment, and ultimately securing those critical workloads starts with visibility.

Join this closed-door conversation with your C-Level peers and:

  • Consider the strengths and weaknesses of your current cloud environment
  • Evaluate the legitimacy of emerging, newsworthy or trending threats
  • Collaboratively address what is and isn't working for modern application security

3:00pm - 3:45pm  Executive Boardroom

Executive Boardroom

Details Coming Soon!

3:45pm - 4:00pm  Networking Break

4:00pm - 4:35pm  Keynote

Cyber Resiliency – Beyond the Headlines

Virginia Lyons headshot

Virginia Lyons

SVP, Chief Information Security Officer

Sony Pictures Entertainment

Stephen Roberts headshot

Stephen Roberts

Global CISO

Honda Motor

CISOs must protect their organizations from increasingly sophisticated cyber-attacks by preparing now to limit the impact and allow for as quick a recovery as possible. This requires a great defensive strategy that is practiced, communicated and understood throughout the organization well before any incident occurs. Balancing that preparation with what actually unfolds during an event is what fosters true resilience.

Join this interactive session to explore with peers:

  • Stories of detection and recovery – what strategies worked and which fell short
  • Mutual threat defense – the critical role of collaboration in the cybersecurity community
  • Best practices for organizational communication – before, during and after an incident

4:35pm - 4:45pm  Closing Comments and Prize Drawing

4:45pm - 6:00pm  Governing Body Reception

Governing Body Reception

Wrap up your day at our closing reception with tasty food and drinks hosted by the Governing Body members. Come celebrate all the sharing and learning done throughout the day, all set to some great music.

May 21, 2025

We look forward to seeing you at an upcoming in-person gathering


Gartner cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

Marriott Long Beach Downtown
MORE INFORMATION

A block of rooms has been reserved at the Marriott Long Beach Downtown at a reduced conference rate. Reservations should be made online or by calling (562) 437-5900. Please mention Southern California Exeuctive Summit to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $207 USD (plus tax) is April 28, 2025.

Your Community Sponsors


Global Thought Leader
CISO Thought Leaders
Key Sponsors

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Zack Hellmann

Senior Community Program Manager

971-717-6691

zack.hellmann@gartner.com