IN-PERSON

Houston CISO Executive Summit

June 25, 2025 | Hyatt Regency Houston Galleria

June 25, 2025
Hyatt Regency Houston Galleria

APPLY TO PARTICIPATE

Collaborate with your peers

Get together with Houston's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Implementing and optimizing robust data sharing and lifecycle management practices

Equipping users with safely-integrated AI tools and practices

Charting the future of the CISO role amid increasing regulatory scrutiny and organizational shifts

Houston CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.

Governing Body Co-Chairs

Mike Coogan

Brinks Home
VP, IT Services & CISO

Doug Rinehart

Marigold
CISO

Anthony Souza

Corteva Inc
VP & CISO

Genady Vishnevetsky

Stewart Title Company
CISO

Joy Wangdi

LyondellBasell
Cybersecurity Trust Officer

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Houston CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


June 25, 2025

8:00am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

Building Trust – The Essential Component for Success as a CISO

Billy Spears headshot

Billy Spears

CISO

Teradata

To get trust, you have to give trust first. It's a concept that can be challenging for CISOs, who more often operate on principles of zero trust, managed trust or "trust but verify." But if you want to be more than just a technology leader, you can never get to the level of trust you need to succeed if you can't embrace the idea of extending trust first.

Billy Spears, a five-time CISO across multiple industries, shares how learning to lead from a place of reinforcing trust with his teams, industry peers, executive leaders and customers has led to his own success as a CISO, and offers strategies for how his CISO peers can do the same.

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

The State of the CISO Market

Jamey Cummings headshot

Jamey Cummings

Partner

JM Search

Linda Marcone headshot

Linda Marcone

CISO & VP, Information Security

Crate & Barrel

The time to keep abreast of what's happening in the CISO market -- in Houston and beyond -- is not when you're ready to make your next move, it's now. Jamey Cummings, a partner at JM Search and co-leader of the firm’s security practice, brings us a frank conversation informed by what he's hearing from both organizations and CISOs as they go through the search process.

Join this session to hear insights and ask questions about:

  • Understanding the dynamics and trends influencing the CISO market
  • Calibrating requirements and expectations around hot topics like total compensation and protections for CISOs
  • Preparing and positioning yourself -- or members of your team -- as a top candidate for that next opportunity

9:40am - 10:25am  Executive Boardroom

Establishing Cyber Resilience Across the Cloud

In an era where users are ubiquitous and digital operations sit in the cloud and beyond, it’s key to move beyond a foundational security approach and focus on achieving cyber resilience. The task at hand involves navigating complexity and upholding visibility and control to ensure uninterrupted operation despite cyber threats.

Join this session to explore:

  • Enhancing security and cost-effectiveness across diverse cloud environments
  • Leveraging AI innovations while addressing global regulatory and data privacy standards
  • Sharing best practices for implementing effective cloud best practices across a global footprint

9:40am - 10:25am  Executive Boardroom

Cutting Through the Noise – Bringing Clarity to Security

Doug Jaworski headshot

Doug Jaworski

CISO

Global Atlantic Financial Group

There's a lot of "noise" in cybersecurity every day: alerts, reports, emails, tickets, notices, checklists, meetings, etc. But all this activity doesn't automatically translate into forward progress, and CISOs know it's their job to find the meaning mixed up in all the noise to lead their teams with clarity.

Join your peers for a frank discussion about:

  • Discerning the difference between true signals and noise
  • Leveraging these signals to add meaningful context to security strategies
  • Elevating risk conversations to move beyond checklists and frameworks

10:25am - 11:10am  Networking Break

10:35am - 11:00am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:10am - 11:55am  Breakout Session

Presenting with Impact – Crafting a Compelling Risk Narrative

Keith Turpin headshot

Keith Turpin

CISO

The Friedkin Group Inc

Stephanie Franklin-Thomas headshot

Stephanie Franklin-Thomas

VP & Global CISO

Medtronic

John Barrow headshot

John Barrow

CISO & Senior Director, Cybersecurity

J.B. Poindexter

Gaining leadership buy-in for risk mitigation is not just about the metrics; it’s about the story. Truly impactful cybersecurity leaders work to reframe conversations about risk by not only developing consistent and quantifiable models, but also ensuring key stakeholders can understand risk on an emotional level, meeting ELT and board members where they are and equipping them to engage thoughtfully in risk discussions. 

Join this session to hear from CISO peers who have a strong grasp on crafting compelling risk narratives and have collaborative table discussions focused on:

  • Sharing best approaches for clear, impactful reporting that contextualizes risk
  • Speaking the language of business to show alignment between cybersecurity objectives and organizational goals
  • Identifying the key elements of risk reporting that build visibility and trust with top leadership

11:10am - 11:55am  Executive Boardroom

Reducing Application Delivery Tech Debt from the Inside Out

Matt Pour headshot

Matt Pour

VP, Solutions Engineering

Island

Darwin Jebha headshot

Darwin Jebha

VP & CIO

Thermon Manufacturing

 With high volumes of sensitive data now flowing through web browsers, three in five organizations say data leakage is likely given current IT and security infrastructures. Stop playing catch-up. Discover new approaches to enterprise operations to reduce risk while simplifying operations.

Join this roundtable to discover:

  • How disparate IT and security solutions create technical debt
  • What challenges impact internal and end user stakeholders
  • How simplifying IT can strengthen security, and boost productivity

11:10am - 11:55am  Executive Boardroom

Checking in on Your Operating Model — A CISO Deep Dive

Marc Crudgington headshot

Marc Crudgington

VP, IT Infrastructure & Cybersecurity

Crane Worldwide Logistics

As enterprises rapidly accelerate their digital initiatives, CISOs are tasked with striking a delicate balance between implementing the right structures and strategies to safeguard organizational assets and delivering services and applications faster than ever before. How are CISOs updating their operating models and team structures to keep pace with the changing nature of business priorities and the changing technology landscape?

Join this conversation to hear how your peers are:

  • Evolving security operating models to deliver better speed, agility and security while optimizing cost savings  
  • Assessing how their business units may evolve in line with new technological innovations
  • Positioning their team as security advocates and demonstrating business value

11:55am - 12:30pm  Lunch Service

12:30pm - 1:05pm  Keynote

Lunch Keynote

Khalid Kark headshot

Khalid Kark

Field CIO

Cloudflare

Session details coming soon!

1:05pm - 1:30pm  Break

1:30pm - 2:15pm  Breakout Session

How to Strengthen Cybersecurity Value

Kristin Moyer headshot

Kristin Moyer

Distinguished VP and Gartner Fellow

Gartner

Most CEOs have a clear mandate when it comes to cybersecurity: don’t let us get hacked and stop bothering me about it. And while protecting the organization is paramount, CISOs know that the true business value of cybersecurity goes far beyond mitigating risk.

Kristin Moyer, Distinguished VP and Gartner Fellow, outlines how CISOs can bridge this divide by sharing research-backed, practical guidance for:

  • Reframing cybersecurity initiatives by focusing on business value: risk, cost and revenue
  • Setting strategic ambition for cybersecurity by aligning with business value
  • Communicating value by identifying how cybersecurity supports CEO investments

1:30pm - 2:15pm  Executive Boardroom

Should CISOs be Responsible for Business Continuity?

Mary Dickerson headshot

Mary Dickerson

AVP & CISO

University of Texas Health Science Center at Houston

Nikki Jackson headshot

Nikki Jackson

SVP & CISO

Woodforest National Bank

While incident response, business continuity, and disaster recovery are unquestionably linked, each is a separate initiative with its own distinct objectives. While it makes sense for CISOs to own IR, business continuity is increasingly also finding its way onto CISOs' already overloaded plates -- but is that where it should be? Since so much of BCP is tied to the service impacts on the organization such as financial, reputation, etc. as CISO do you feel you have sufficient qualifications/expertise to address?

Join your peers for a thought-provoking discussion about:

  • Where business continuity should optimally sit in the organization
  • What CISOs with BCP under their purview are doing to manage it
  • How CISOs are navigating BCP challenges whether they're responsible for it or not

2:15pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:35pm  Keynote

Brain-Driven Resilience — Neuro-Optimizing for Executive Edge

Megs Gelfgot headshot

Megs Gelfgot

Two-time founder, TEDx, International and Fortune 500 speaker on neuroscience & resilience

In the high-stakes arena of billion-dollar enterprises, resilience isn't just an asset; it's a necessity. Learn how elite athletes, Navy SEALs, and top executives leverage cutting-edge neuroscience and cognitive training to elevate their relationship with adversity to yield more resilient outcomes. Cognitive training can help boost executive function and enhance decision making under pressure.

Join Megs Gelfgot, Tedx speaker and two-time founder, as she shares:

  • Hacks for gaining a competitive edge
  • Tactical resilience leadership strategies
  • Ways to mitigate symptoms of cognitive decline

3:35pm - 3:45pm  Closing Comments and Prize Drawing

3:45pm - 5:00pm  Governing Body Reception

Governing Body Reception

Finish the day sharing lessons learned with your peers over light fare and drinks at this closing reception hosted by the Houston CISO Governing Body.

June 25, 2025

We look forward to seeing you at an upcoming in-person gathering


Gartner cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

Hyatt Regency Houston Galleria
MORE INFORMATION

A block of rooms has been reserved at the Hyatt Regency Houston Galleria at a reduced conference rate. Reservations should be made online or by calling 832-803-1234. Please mention Houston CISO Executive Summit to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $169 USD (plus tax) is June 2, 2025.

Your Community Sponsors


CISO Thought Leader
Key Sponsors
Program Sponsor

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Caroline Timothy

Community Program Manager

8177732790

caroline.timothy@gartner.com