IN-PERSON

Southern California CISO Executive Summit

December 3, 2024 | Marriott Long Beach Downtown

December 3, 2024
Marriott Long Beach Downtown

APPLY TO PARTICIPATE

Collaborate with your peers

Get together with Southern California's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Strategizing for a risk-aligned, resilient organization

Building a solid framework for an effective data governance program

Sharpening leadership skills to become a stronger ally for your board & team

Southern California CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Matt Crouse

Solar Turbines
CISO

Trina Ford

iHeartMedia
SVP, CISO

Todd Friedman

ResMed
CISO

Nemi George

Pacific Dental Services
Vice President, Information Security Officer

Arthur Lessard

Universal Music Group
SVP & CISO

Dan Meacham

Legendary
VP, Global Security and Corporate Operations, CISO

Jeremy Smith

Avery Dennison
VP, CISO

David Tyburski

Wynn Resorts
Vice President, Chief Information Security Officer

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Southern California CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


December 3, 2024

7:45am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

You Speak, They Swarm — The Power of Story in Reaching Your Audience

Arthur Zards headshot

Arthur Zards

Thought Leader, TED/TEDx Speaker, Coach & Producer

Guest Speaker

"Those who tell the stories rule society." (Plato) Busy executives don’t have time to learn complex communication models or esoteric storytelling processes — you need a simple, effective framework that can help you not only connect with any audience, but also elicit real change. Enter the SWARM Effect.

Join this session with Arthur Zards — an expert on storytelling, TEDster and provocateur — to:

  • Hone your skills in executive influence
  • Adopt a more authentic and engaging approach to speaking
  • Take your next presentation from “understandable” to “compelling”


9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Cloud Success — The Process of Lifting and Shifting from A - Z

Awwab Arif headshot

Awwab Arif

SVP & CISO

Bank of Hope

Quincey Collins headshot

Quincey Collins

Chief Security Officer

Sheppard Mullin Richter & Hampton

Sasha Pereira headshot

Sasha Pereira

CISO / Director of IT Security

Wash Multifamily Laundry Systems

Cloud services have revolutionized the way businesses operate, but they also introduce new security challenges. This presents a holistic approach to cloud security, focusing on the interplay between security architecture, vendor management, and contractual obligations. By leveraging Cloud Security Posture Management (CSPM) tools and conducting thorough security architecture reviews, we outline strategies to fortify SaaS environments against potential vulnerabilities.

Join this session to discuss:

  • Comprehensive cloud security framework & a holistic approach to security architecture, vendor management, and contractual obligations.
  • Strategic use of CSPM tools which underscores the importance of your cloud security posture to strengthen the security of SaaS environments.
  • importance of enforceable contracts, emphasizing the necessity for clear and lawful contracts to ensure compliance and accountability.

9:40am - 10:25am  Executive Boardroom

How to Assess Security Maturity and Why It Matters

Yanek Korff headshot

Yanek Korff

Co-Founder and COO

Expel

Maturing your security posture requires knowing how to objectively assess your organization, use industry best practices and frameworks, and select the right tools to advance your business. This complex, time-intensive process often takes a backseat to defending yourself against ever-evolving threats. Getting started can be overwhelming, so finding time to assess and improve your security maturity is a tall task.

Join this session to discuss:

  • Benchmarking SOC performance using common assessment frameworks and tools
  • Determining your security maturity level, and how to fill gaps you’ve identified
  • Analyzing the impact of data and AI on your security posture

9:40am - 10:25am  Executive Boardroom

Solving Supply Chain Risk with Intelligence, Analytics, and Action

Kelly White headshot

Kelly White

Co-Founder & CEO

RiskRecon - A MasterCard Company

Virginia Lyons headshot

Virginia Lyons

SVP, Chief Information Security Officer

Sony Pictures Entertainment

Intelligence-driven decisions and actions are often embedded into the enterprise security fabric, with defenses against malware, malicious sites, and application attacks updated based on rapid deployment of intelligence-based rules. In contrast, most third-party risk management programs are rooted in episodic, questionnaire-based assessments which, according to RiskRecon surveys, are trusted by less than 20% of third-party risk teams.

Join this session to discuss:

  • Gaining full visibility into risks across the entire supply chain using advanced analytics and AI
  • Effective strategies for utilizing intelligence to manage and monitor business partners
  • Actionable steps to overcome resource challenges and scale risk management efforts

9:40am - 10:25am  Executive Boardroom

Routing Your Generative AI Implementation Marathon

Early adopters confirm, AI-implementation isn't for the faint of heart (or the light of checkbook). Yet the expectation to welcome this booming tech advancement into your organization remains. Today, studying the efforts of those same early adopters proves the easiest first step in drawing up your own AI road map.

Gather with your CISO peers to:

  • Compare your varying stages of AI-adoption progress
  • Share what you've learned through that progress so far
  • Gather proactive tips on clearing hurdles to come

10:25am - 11:05am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:05am - 11:50am  Breakout Session

Embracing Innovation — Real-World GenAI Use Cases

Alex Hall headshot

Alex Hall

Global CISO

Gensler

The present moment offers an opportunity to unlock GenAI's transformative power, but maturity across organizations varies. Business leaders recognize this technology is a catalyst for innovation. By understanding real-world case studies with lessons learned, those leaders can create real movement forward inside of their own organizations.

Bring your questions to this session as you hear from executives who have:

  • Implemented practical GenAI use cases and identified opportunities
  • Compared and measured platforms and solutions for value outcomes
  • Balanced approach to value and risk


11:05am - 11:50am  Executive Boardroom

Cyber Risk — Telling the Right Story

In an era where cybersecurity incidents often dominate headlines, managing stakeholder risk expectations has become more critical than ever. CISOs must ensure key stakeholders remain informed and confident in the organization’s risk posture.

Join this session to discuss:

  • Telling the story of cybersecurity’s impact on people, processes, and technology
  • Navigating the complexities of risk management in a highly interconnected digital world
  • Articulating the business impact of assumed risk


11:05am - 11:50am  Executive Boardroom

Beyond Detection — Ensuring Business Resiliency

Cybersecurity incidents are not an 'if' but a 'when,' even for organizations with mature programs. Security teams must go beyond initial detection and response to ensure business resilience in today's interconnected digital landscape.

Join this boardroom session to discuss:

  • Identifying cybersecurity's role in business resiliency
  • Engaging and communicating proactively with key partners and stakeholders
  • Enabling security and business operations to move forward through turbulence

11:05am - 11:50am  Executive Boardroom

Paving a Path for Tomorrow's CISOs

Greg Kim headshot

Greg Kim

CISO

Skyworks

Succession planning is critical for CISOs to ensure continuity and resilience in leadership roles. By identifying and developing internal talent, organizations can mitigate risks associated with unexpected departures and maintain strategic momentum.

Join this boardroom session to discuss:

  • Identifying emerging leaders and enabling development 
  • Cultivating a forward-thinking security culture
  • Ensuring leadership continuity and organizational resilience


11:50am - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

How Zero Trust and AI Enable Innovation That Outpaces Adversaries

Deepen Desai headshot

Deepen Desai

Chief Security Officer

Zscaler

The modern CISO must navigate the complex balance between technological advancement and the need to simplify and secure IT environments. This requires overhauling legacy architectures to be VPN and firewall-free, responding to shifting threats with AI-enabled defenses, overcoming financial constraints, and accommodating cloud-first businesses with distributed workforces. Leaders must lay a secure foundation using zero trust principles – for users, devices, and workloads – and harness the power of AI to consistently stay one step ahead of the attackers.

Join this session to learn:

  • AI’s role in enabling both organizations and their adversaries, with an emphasis on staying a step ahead of cybercriminals
  • Navigating the evolution of the CISO roles in light of greater expectations and oversight from senior business leaders
  • Securing organizations’ resources – from end users to branches and factories – reliably and cost-effectively with zero trust

1:10pm - 1:35pm  Break

1:35pm - 2:20pm  Executive Boardroom

The Harsh Truth about Navigating Ransomware Response

Bashar Shaba headshot

Bashar Shaba

CISO

Hankey Group

IT leaders across the globe are asking themselves that question as ransomware grows increasingly prevalent and as attackers continue to raise their demands. It may seem difficult to prioritize building out your recovery plan when you could spend that time focused on increasing defensive measures but recovering from ransomware is not a process you want to wing.

Join this session to discuss:

  • Best practices for ransomware recovery
  • Key pitfalls most organizations make when attempting a ransomware recovery and how to avoid them
  • How to build a foundation for developing a thorough, practical, and well-documented plan of action and why timing is critical


1:35pm - 2:20pm  Executive Boardroom

The Dark Side of Gen AI

Generative AI is changing the way software is developed and is already a part of every developer's life. However, there is a dark side to using GenAI when it comes to security. What are the upcoming risks of using GenAI solutions and what has been done about them? 

Join this session to discuss: 

  • Your security exposure and risks based on your GenAI use
  • New types of manufacturing attacks 
  • Prompt-injection attacks and how to minimize your risk

1:35pm - 2:20pm  Executive Boardroom

Leading the Way – Talent Development as a Business Enabler

As CISOs look to build their array of leadership skills, effective talent and team career development cannot be overlooked. This critical skill has evolved from "nice to have" to instrumental in building a resilient cybersecurity team and pushing the business forward.

 Join this session to hear more on:

  • Fostering an environment of continuous learning and skill development
  • Leveraging talent development within the security function as a business enabler
  • Promoting and enabling a team to take ownership of their career paths


2:20pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

Why CISOs and CDOs Should be Best Friends

Chris Stoneley headshot

Chris Stoneley

CISO

Cathay Bank

Banji Oke headshot

Banji Oke

SVP, Data Governance

Cathay Bank

Business leaders are faced with the challenge of developing a data & analytics strategy that not only ensures a robust data governance but also expands the business value. As organizations navigate increasing data volumes and evolving technologies, the need for an effective data governance program has never been so critical. CISOs and CDOs must work as a team to securely enable the business.

Join this boardroom with your peers to discuss:

  • Why a strong partnership between your CDO and CISO matter?
  • How important are critical data elements including non-publicly traded companies
  • Why is a good data classification schema important?


3:00pm - 3:45pm  Executive Boardroom

Maximizing the Value of Your Security Investments

Konrad Fellmann headshot

Konrad Fellmann

VP & CISO

Cubic Corporation

Threats don't brake for CISOs with budget restrictions. And even when funds are low, the business expects you to ward off attacks. That's means you'll have to increase success without increasing tools or talent.

Together with your C-level peers, discuss how to:

  • Expand coverage without spreading it thin
  • Deliver on the business's existing security investments
  • Demonstrate the linkage between a safe business and a profitable one

3:00pm - 3:45pm  Executive Boardroom

Cyber Resilience in Times of Geopolitical Conflict

As global tensions rise, coordinated cyber-attacks are impacting organizations globally. Cyber-conflict isn’t just a security problem, it’s a business problem that requires a strategic partnership between CISOs and leaders across the enterprise.

Join this peer-led conversation to discuss:

  • Gauging the business’ appetite for risk amidst geopolitical unrest
  • Engaging leadership to make informed cybersecurity risk decisions
  • Identifying and responding to politically charged TTPs


3:00pm - 3:45pm  Executive Boardroom

The Slippery Slope of Third Party Management

You won’t luck your way into safe and successful third-party relationships. But, by thoughtfully developing a cadence of third-party risk identification, assessment and mitigation, CISOs can safeguard their own operations, protect key data, prevent reputational damage, avoid financial losses and bring peace to stakeholders.

Join your CISO peers to: 

  • Develop new risk-aware relationships, or perfect existing ones
  • Share and gather insights on a growing network of third parties
  • Confirm the importance of a well-developed third-party risk management plan


3:45pm - 4:10pm  Break

4:10pm - 4:45pm  Keynote

CISOs on the Hot Seat — A New Era of Liability

Kris Virtue headshot

Kris Virtue

Global Head of Cybersecurity

Qualcomm

Aravind Swaminathan headshot

Aravind Swaminathan

Global Co-Chair Cybersecurity & Data Privacy, Orrick

Orrick, Herrington & Sutcliffe

As cybersecurity attacks increase in sophistication, the financial and reputational impact for companies has never been more pronounced. CISOs responsible for navigating a company through a data breach, the stakes are even higher. CISOs confront significant personal civil and criminal liability in connection with their handling of breaches and associated disclosures. This raises serious concerns not only for CISOs, but also for companies’ abilities to secure expert personnel to safeguard their data and systems.

Join this keynote to discuss:

  • Protecting executives on the front lines of cybersecurity incidents
  • Implementing best practices aimed at reducing the potential liability of key stakeholders
  • Managing liability risks which includes how to work with the Board and the broader executive team


4:45pm - 5:00pm  Closing Comments and Prize Drawing

December 3, 2024

We look forward to seeing you at an upcoming in-person gathering


Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

Marriott Long Beach Downtown

A block of rooms has been reserved at the Marriott Long Beach Downtown at a reduced conference rate. Reservations should be made online or by calling 1 888 236 2427. Please mention Evanta Executive Summit to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $249 USD (plus tax) is November 11, 2024.

Your Community Partners


Global Thought Leader
CISO Thought Leader
Key Partners
Program Partners

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Zack Hellmann

Senior Community Program Manager

971-717-6691

zack.hellmann@evanta.com