IN-PERSON

Southern California CISO Executive Summit

December 3, 2024 | Marriott Long Beach Downtown

December 3, 2024
Marriott Long Beach Downtown

APPLY TO PARTICIPATE

Collaborate with your peers

Get together with Southern California's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Strategizing for a risk-aligned, resilient organization

Building a solid framework for an effective data governance program

Sharpening leadership skills to become a stronger ally for your board & team

Southern California CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Matt Crouse

Solar Turbines
CISO

Trina Ford

iHeartMedia
SVP, CISO

Todd Friedman

ResMed
CISO

Nemi George

Pacific Dental Services
Vice President, Information Security Officer

Arthur Lessard

Universal Music Group
SVP & CISO

Dan Meacham

Legendary
VP, Global Security and Corporate Operations, CISO

Jeremy Smith

Avery Dennison
VP, CISO

David Tyburski

Wynn Resorts
Vice President, Chief Information Security Officer

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Southern California CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


December 3, 2024

7:45am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

You Speak, They Swarm — The Power of Story in Reaching Your Audience

Arthur Zards headshot

Arthur Zards

Thought Leader, TED/TEDx Speaker, Coach & Producer

Guest Speaker

"Those who tell the stories rule society." (Plato) Busy executives don’t have time to learn complex communication models or esoteric storytelling processes — you need a simple, effective framework that can help you not only connect with any audience, but also elicit real change. Enter the SWARM Effect.

Join this session with Arthur Zards — an expert on storytelling, TEDster and provocateur — to:

  • Hone your skills in executive influence
  • Adopt a more authentic and engaging approach to speaking
  • Take your next presentation from “understandable” to “compelling”


9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Cloud Success — The Process of Lifting and Shifting from A - Z

Quincey Collins headshot

Quincey Collins

Chief Security Officer

Sheppard Mullin Richter & Hampton

Sasha Pereira headshot

Sasha Pereira

CISO / Director of IT Security

Wash Multifamily Laundry Systems

Cloud services have revolutionized the way businesses operate, but they also introduce new security challenges. This presents a holistic approach to cloud security, focusing on the interplay between security architecture, vendor management, and contractual obligations. By leveraging Cloud Security Posture Management (CSPM) tools and conducting thorough security architecture reviews, we outline strategies to fortify SaaS environments against potential vulnerabilities.

Join this session to discuss:

  • Comprehensive cloud security framework & a holistic approach to security architecture, vendor management, and contractual obligations.
  • Strategic use of CSPM tools which underscores the importance of your cloud security posture to strengthen the security of SaaS environments.
  • importance of enforceable contracts, emphasizing the necessity for clear and lawful contracts to ensure compliance and accountability.

9:40am - 10:25am  Executive Boardroom

Cyber Resilience in Times of Geopolitical Conflict

Matt Crouse headshot

Matt Crouse

CISO

Solar Turbines

Eddie Galang headshot

Eddie Galang

Chief Information Security Officer

Port of Long Beach

Jeremy Smith headshot

Jeremy Smith

VP, CISO

Avery Dennison

As global tensions rise, coordinated cyber-attacks are impacting organizations globally. Cyber-conflict isn’t just a security problem, it’s a business problem that requires a strategic partnership between CISOs and leaders across the enterprise.

Join this peer-led conversation to discuss:

  • Gauging the business’ appetite for risk amidst geopolitical unrest
  • Engaging leadership to make informed cybersecurity risk decisions
  • Identifying and responding to politically charged TTPs


9:40am - 10:25am  Executive Boardroom

How to Assess Security Maturity and Why It Matters

Yanek Korff headshot

Yanek Korff

Co-Founder and COO

Expel

Rushton James headshot

Rushton James

VP, CISO

Liberty Dental Plan

Steve Schwartz headshot

Steve Schwartz

Vice President and CISO

Lionsgate Entertainment

Shoaib Qazi headshot

Shoaib Qazi

Chief Information Security and Technology Officer

RXO

Maturing your security posture requires knowing how to objectively assess your organization, use industry best practices and frameworks, and select the right tools to advance your business. This complex, time-intensive process often takes a backseat to defending yourself against ever-evolving threats. Getting started can be overwhelming, so finding time to assess and improve your security maturity is a tall task.

Join this session to discuss:

  • Benchmarking SOC performance using common assessment frameworks and tools
  • Determining your security maturity level, and how to fill gaps you’ve identified
  • Analyzing the impact of data and AI on your security posture

9:40am - 10:25am  Executive Boardroom

Solving Supply Chain Risk with Intelligence, Analytics, and Action

Kelly White headshot

Kelly White

Co-Founder & CEO

RiskRecon - A MasterCard Company

Webb Deneys headshot

Webb Deneys

SVP, Information Technology, CISO

Cardinal Financial Company

Virginia Lyons headshot

Virginia Lyons

SVP, Chief Information Security Officer

Sony Pictures Entertainment

Sunil Agarwal headshot

Sunil Agarwal

CISO, VP Information Security and Risk Management

OSI Systems

Intelligence-driven decisions and actions are often embedded into the enterprise security fabric, with defenses against malware, malicious sites, and application attacks updated based on rapid deployment of intelligence-based rules. In contrast, most third-party risk management programs are rooted in episodic, questionnaire-based assessments which, according to RiskRecon surveys, are trusted by less than 20% of third-party risk teams.

Join this session to discuss:

  • Gaining full visibility into risks across the entire supply chain using advanced analytics and AI
  • Effective strategies for utilizing intelligence to manage and monitor business partners
  • Actionable steps to overcome resource challenges and scale risk management efforts

10:25am - 11:05am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:05am - 11:50am  Breakout Session

Embracing Innovation — Real-World GenAI Use Cases

Alex Hall headshot

Alex Hall

Global CISO

Gensler

The present moment offers an opportunity to unlock GenAI's transformative power, but maturity across organizations varies. Business leaders recognize this technology is a catalyst for innovation. By understanding real-world case studies with lessons learned, those leaders can create real movement forward inside of their own organizations.

Bring your questions to this session as you hear from executives who have:

  • Implemented practical GenAI use cases and identified opportunities
  • Compared and measured platforms and solutions for value outcomes
  • Balanced approach to value and risk


11:05am - 11:50am  Executive Boardroom

Cyber Risk — Telling the Right Story

Trina Ford headshot

Trina Ford

SVP, CISO

iHeartMedia

Chris Stoneley headshot

Chris Stoneley

CISO

Cathay Bank

Tony Velleca headshot

Tony Velleca

CISO

UST Global

In an era where cybersecurity incidents often dominate headlines, managing stakeholder risk expectations has become more critical than ever. CISOs must ensure key stakeholders remain informed and confident in the organization’s risk posture.

Join this session to discuss:

  • Telling the story of cybersecurity’s impact on people, processes, and technology
  • Navigating the complexities of risk management in a highly interconnected digital world
  • Articulating the business impact of assumed risk


11:05am - 11:50am  Executive Boardroom

Beyond Detection — Ensuring Business Resiliency

Raj Gupta headshot

Raj Gupta

AVP Information and Security Officer & Data Governance

Pacific Life Insurance

John Rojas headshot

John Rojas

VP, Head of IT (CIO/CISO)

Air Lease Corporation

John Underwood headshot

John Underwood

VP, Information Security

Big 5 Sporting Goods

Cybersecurity incidents are not an 'if' but a 'when,' even for organizations with mature programs. Security teams must go beyond initial detection and response to ensure business resilience in today's interconnected digital landscape.

Join this boardroom session to discuss:

  • Identifying cybersecurity's role in business resiliency
  • Engaging and communicating proactively with key partners and stakeholders
  • Enabling security and business operations to move forward through turbulence

11:05am - 11:50am  Executive Boardroom

Paving a Path for Tomorrow's CISOs

Eddie Galang headshot

Eddie Galang

Chief Information Security Officer

Port of Long Beach

Doug Murray headshot

Doug Murray

Global Head of Information Security

Centerfield Media

Succession planning is critical for CISOs to ensure continuity and resilience in leadership roles. By identifying and developing internal talent, organizations can mitigate risks associated with unexpected departures and maintain strategic momentum.

Join this boardroom session to discuss:

  • Identifying emerging leaders and enabling development 
  • Cultivating a forward-thinking security culture
  • Ensuring leadership continuity and organizational resilience


11:50am - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

How Zero Trust and AI Enable Innovation That Outpaces Adversaries

Deepen Desai headshot

Deepen Desai

Chief Security Officer

Zscaler

The modern CISO must navigate the complex balance between technological advancement and the need to simplify and secure IT environments. This requires overhauling legacy architectures to be VPN and firewall-free, responding to shifting threats with AI-enabled defenses, overcoming financial constraints, and accommodating cloud-first businesses with distributed workforces. Leaders must lay a secure foundation using zero trust principles – for users, devices, and workloads – and harness the power of AI to consistently stay one step ahead of the attackers.

Join this session to learn:

  • AI’s role in enabling both organizations and their adversaries, with an emphasis on staying a step ahead of cybercriminals
  • Navigating the evolution of the CISO roles in light of greater expectations and oversight from senior business leaders
  • Securing organizations’ resources – from end users to branches and factories – reliably and cost-effectively with zero trust

1:10pm - 1:35pm  Break

1:35pm - 2:20pm  Breakout Session

Strengthening Supply Chain Cyber Resiliency

Kevin Kealy headshot

Kevin Kealy

CISO

Light & Wonder

In today's interconnected digital landscape, potential outages and breaches of vendors pose significant risks to organizational operations and security. Ensuring cyber resiliency involves rigorous vendor vetting, continuous monitoring, and comprehensive incident response planning to mitigate these threats.

Join this session to strategize on:

  • Adopting a proactive and holistic approach to improve supply chain risk
  • Enhancing resiliency against third-party disruptions
  • Safeguarding digital ecosystems from emerging cyber threats

1:35pm - 2:20pm  Executive Boardroom

The Harsh Truth about Navigating Ransomware Response

Mike Brown headshot

Mike Brown

CISO

loanDepot

Bashar Shaba headshot

Bashar Shaba

CISO

Hankey Group

Jeremy Smith headshot

Jeremy Smith

VP, CISO

Avery Dennison


As ransomware grows increasingly prevalent and attackers continue to raise their demands, security leaders are taking a new look at their response tactics. It may seem difficult to prioritize building out your recovery plan when you could spend that time focused on increasing defensive measures, but recovering from ransomware is not a process you want to wing.

Join this session to discuss:

  • New best practices for ransomware recovery
  • Key pitfalls in response and recovery and how to avoid them
  • How to build a foundation for developing a thorough, practical, and well-documented plan of action


1:35pm - 2:20pm  Executive Boardroom

The Dark Side of Gen AI

Sasha Pereira headshot

Sasha Pereira

CISO / Director of IT Security

Wash Multifamily Laundry Systems

David Suh headshot

David Suh

Director of Security

Sorenson Communications

Jeff Wade headshot

Jeff Wade

Global Director, Cybersecurity

Taco Bell

Generative AI is changing the way software is developed and is already a part of every developer's life. However, there is a dark side to using GenAI when it comes to security. What are the upcoming risks of using GenAI solutions and what has been done about them? 

Join this session to discuss: 

  • Your security exposure and risks based on your GenAI use
  • New types of manufacturing attacks 
  • Prompt-injection attacks and how to minimize your risk

1:35pm - 2:20pm  Executive Boardroom

Leading the Way – Talent Development as a Business Enabler

Trina Ford headshot

Trina Ford

SVP, CISO

iHeartMedia

Nemi George headshot

Nemi George

Vice President, Information Security Officer

Pacific Dental Services

Shoaib Qazi headshot

Shoaib Qazi

Chief Information Security and Technology Officer

RXO

As CISOs look to build their array of leadership skills, effective talent and team career development cannot be overlooked. This critical skill has evolved from "nice to have" to instrumental in building a resilient cybersecurity team and pushing the business forward.

 Join this session to hear more on:

  • Fostering an environment of continuous learning and skill development
  • Leveraging talent development within the security function as a business enabler
  • Promoting and enabling a team to take ownership of their career paths


2:20pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

Why CISOs and CDOs Should be Best Friends

Chris Stoneley headshot

Chris Stoneley

CISO

Cathay Bank

Banji Oke headshot

Banji Oke

SVP, Data Governance

Cathay Bank

Business leaders are faced with the challenge of developing a data & analytics strategy that not only ensures a robust data governance but also expands the business value. As organizations navigate increasing data volumes and evolving technologies, the need for an effective data governance program has never been so critical. CISOs and CDOs must work as a team to securely enable the business.

Join this boardroom with your peers to discuss:

  • Why a strong partnership between your CDO and CISO matter?
  • How important are critical data elements including non-publicly traded companies
  • Why is a good data classification schema important?


3:00pm - 3:45pm  Executive Boardroom

Maximizing the Value of Your Security Investments

Webb Deneys headshot

Webb Deneys

SVP, Information Technology, CISO

Cardinal Financial Company

Konrad Fellmann headshot

Konrad Fellmann

VP & CISO

Cubic Corporation

Doug Murray headshot

Doug Murray

Global Head of Information Security

Centerfield Media

Threats don't brake for CISOs with budget restrictions. And even when funds are low, the business expects you to ward off attacks. That's means you'll have to increase success without increasing tools or talent.

Together with your C-level peers, discuss how to:

  • Expand coverage without spreading it thin
  • Deliver on the business's existing security investments
  • Demonstrate the linkage between a safe business and a profitable one

3:00pm - 3:45pm  Executive Boardroom

The Slippery Slope of Third Party Management

Nemi George headshot

Nemi George

Vice President, Information Security Officer

Pacific Dental Services

Mike Villegas headshot

Mike Villegas

CISO

TRISTAR

Jeff Zabel headshot

Jeff Zabel

VP, IT Infrastructure & Digital Security

Red Bull

You won’t luck your way into safe and successful third-party relationships. But, by thoughtfully developing a cadence of third-party risk identification, assessment and mitigation, CISOs can safeguard their own operations, protect key data, prevent reputational damage, avoid financial losses and bring peace to stakeholders.

Join your CISO peers to: 

  • Develop new risk-aware relationships, or perfect existing ones
  • Share and gather insights on a growing network of third parties
  • Confirm the importance of a well-developed third-party risk management plan


3:00pm - 3:45pm  Executive Boardroom

Deception Detection — Safeguarding Your Organization from Social Engineering

Billy Norwood headshot

Billy Norwood

Chief Information Security Officer

FFF Enterprises

Arlene Yetnikoff headshot

Arlene Yetnikoff

CISO

University of California - San Diego

Phishing and social engineering remain the top methods used by cybercriminals to infiltrate organizations. It is fundamental for CISOs to implement strong technical solutions as well as cultivate effective training programs to consistently educate employees and increase awareness of potential threats.

Join this boardroom to discuss:

  • The latest trends in social engineering attacks, including spear phishing, pretexting, baiting, and tailgating and methods to identify and respond effectively
  • Leveraging data to better understand your adversaries
  • Best practices to build a resilient security culture and raise employee awareness of social engineering threats

3:45pm - 4:10pm  Break

4:10pm - 5:00pm  Keynote

CISOs on the Hot Seat — A New Era of Liability

Kris Virtue headshot

Kris Virtue

Global Head of Cybersecurity

Qualcomm

Aravind Swaminathan headshot

Aravind Swaminathan

Global Co-Chair Cybersecurity & Data Privacy, Orrick

Orrick, Herrington & Sutcliffe

As cybersecurity attacks increase in sophistication, the financial and reputational impact for companies has never been more pronounced. CISOs responsible for navigating a company through a data breach, the stakes are even higher. CISOs confront significant personal civil and criminal liability in connection with their handling of breaches and associated disclosures. This raises serious concerns not only for CISOs, but also for companies’ abilities to secure expert personnel to safeguard their data and systems.

Join this keynote to discuss:

  • Protecting executives on the front lines of cybersecurity incidents
  • Implementing best practices aimed at reducing the potential liability of key stakeholders
  • Managing liability risks which includes how to work with the Board and the broader executive team


5:00pm - 5:15pm  Closing Comments and Prize Drawing

5:15pm - 6:45pm  Governing Body Reception

Governing Body Reception

Governing Body members host this reception for executives to celebrate the event with an evening of peer networking, specialty holiday cocktails, food, including a seafood bar & drinks.

December 3, 2024

We look forward to seeing you at an upcoming in-person gathering


Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

Marriott Long Beach Downtown
MORE INFORMATION

A block of rooms has been reserved at the Marriott Long Beach Downtown at a reduced conference rate. Reservations should be made online or by calling 1 888 236 2427. Please mention Evanta Executive Summit to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $249 USD (plus tax) is November 11, 2024.

Your Community Partners


Global Thought Leader
CISO Thought Leader
Key Partners
Program Partners

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Zack Hellmann

Senior Community Program Manager

971-717-6691

zack.hellmann@evanta.com