In-Person

Boston CISO Community

Executive Summit

November 13, 2025 | Hyatt Regency Boston- Cambridge

November 13, 2025
Hyatt Regency Boston- Cambridge

Collaborate with your peers

Get together with Boston's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Maintaining Operations Through Cyber Resilience Strategies

Enhancing User Access with Smart Solutions

Maximizing AI for Strategic Advantage

Boston CISO Governing Body

The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.

Governing Body Co-Chairs

Julie Fitton

Analog Devices
CISO

Eric Galis

Cengage
CISO

Javed Ikbal

Bright Horizons
VP/CISO

Brian McGowan

SharkNinja
CISO

Ravi Thatavarthy

Rite Aid
Chief Information Security Officer

Gernette Wright

Schneider Electric North America
IT Security Officer

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Boston CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda

November 13, 2025

8:00am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

CISOs on the Hot Seat — A New Era of Liability

Aravind Swaminathan headshot

Aravind Swaminathan

Global Co-Chair Cybersecurity & Data Privacy

Orrick, Herrington & Sutcliffe

As cybersecurity attacks increase in sophistication, the financial and reputational impact for companies has never been more pronounced. CISOs responsible for navigating a company through a data breach, the stakes are even higher. CISOs confront significant personal civil and criminal liability in connection with their handling of breaches and associated disclosures. This raises serious concerns not only for CISOs, but also for companies’ abilities to secure expert personnel to safeguard their data and systems.

Join this keynote to discuss:

  • Protecting executives on the front lines of cybersecurity incidents
  • Implementing best practices aimed at reducing the potential liability of key stakeholders 
  • Managing liability risks which includes how to work with the Board and the broader executive team

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Breakout Session

Details coming Soon!

9:40am - 10:25am  Breakout Session

Breakout Session

Details coming soon!

9:40am - 10:25am  Executive Boardroom

Cyber Resilience Showdown — CISOs Unite to Tackle Geopolitical Challenges

Robert Sullivan headshot

Robert Sullivan

CISO, VP Technology Shared Services

Agero

As global tensions rise, coordinated cyber-attacks are impacting organizations globally. Cyber-conflict isn’t just a security problem, it’s a business problem that requires a strategic partnership between CISOs and leaders across the enterprise.

Join this peer-led conversation to discuss:

  • How to keep your cybersecurity priorities in sync with business goals while riding the risk appetite rollercoaster
  • Learn the steps to engage your leadership in a dance of informed decision-making that keeps your digital assets safe and sound
  • Arm yourself with the latest strategies against politically charged TTPs to bop those threats on the head and turn vulnerabilities into victories


9:40am - 10:25am  Executive Boardroom

The Future of Cyber Defense is Autonomous

As cyber threats become faster, more sophisticated, and AI-enabled, human-only security teams are struggling to keep pace. Autonomous systems are emerging as the next phase of security, offering real-time, adaptive, and scalable protection. How are CISOs leveraging technology to allow their team to focus on stopping threats before they impact the organization?

Join this session to discuss:

  • Keeping pace with rapid attacks
  • Efficiently manage big data and risks
  • Supporting the team to tackle complex issues


10:25am - 11:10am  Networking Break

10:35am - 11:00am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:10am - 11:55am  Breakout Session

Over the Horizon — CISOs to Chief Cyber Resilience Officers

John Murphy headshot

John Murphy

CISO-in-Residence

Rubrik

The CISO remit increasingly includes GenAI governance, securing cyber-physical systems, and a range of value-driving services — yet its core charge remains safeguarding operations. As breaches become inevitable and board risk appetites shift, cyber resilience will demand even greater focus. CISOs must define recovery goals, guarantee reliable backups, and restore critical services with speed — focusing on measurable resilience to earn their future role as Chief Cyber Resilience Officers.

Join this session to learn about:

  • Defining and measuring resilience for real business outcomes
  • Orchestrating reliable backup and rapid recovery strategies
  • Embedding resilience across teams as a cultural and leadership priority

11:10am - 11:55am  Breakout Session

Cloud Network Security Meets Zero Trust Architecture

Willie Tejada headshot

Willie Tejada

GM & SVP, Cloud Native Security Fabric

Aviatrix

As enterprises expand cloud use, CISOs must reduce risk, ensure resilience, and maintain compliance. Zero Trust in the cloud goes beyond identity — it hinges on segmentation, continuous visibility, and policy enforcement across multi-cloud networks. Closing gaps in east-west traffic, containerization, and egress controls is vital for protecting operations and reporting risk effectively.

Join this session to learn how to:

  • Embed zero trust principles into cloud network architecture
  • Eliminate blind spots across multicloud and containerized environments
  • Demonstrate risk reduction and regulatory compliance with confidence

11:10am - 11:55am  Executive Boardroom

Taming Cyber Risk with Advanced Technologies

Ashish Gupta headshot

Ashish Gupta

VP, Solutions Consulting Services

Mastercard Cybersecurity

Brian Cayer headshot

Brian Cayer

CISO

Keck Medicine of USC

Heinrich Piard headshot

Heinrich Piard

Chief Information Security Officer & Head of Global IT Operations

Hamilton Insurance Group

Cyber threats are increasingly sophisticated and pervasive, making conventional risk management approaches inadequate. AI/ML and threat intelligence have the potential to transform how organizations handle cyber threats, as well as extending into areas such as TPRM, security analytics, and more. Leveraging key insights can help CISOs stay ahead of evolving risks and enhance security programs, even with limited resources.

Join this session to discuss:

  • Practical strategies for leveraging threat intelligence in cyber risk management
  • Critical alignment of people and process elements with advanced technologies
  • Acting on useful insights and data to manage cyber risk

11:55am - 12:30pm  Lunch Service

12:30pm - 1:05pm  Keynote

Securing Data Flow in the AI-Quantum Era

Stephen White headshot

Stephen White

CXO Advisor

Netskope

Sensitive data movement can be risky but restricting it outright can create operational and security challenges. In an era of agentic AI, generative AI, and emerging quantum computing, organizations need security frameworks that protect data while ensuring agility. This session explores how modern security platforms enable secure data flow, adapt to diverse use cases and prepare for the post-quantum encryption (PQE) shift.

Join this keynote to learn:

  • How to choose the right secure access method for each use case
  • Why security must be adaptive to risk, user behavior and AI-driven interactions
  • How to prepare for post-quantum encryption and its enterprise security impact

1:05pm - 1:30pm  Break

1:30pm - 2:15pm  Breakout Session

Outsmarting Insider Threats — North Korea’s Evolving Tactics in Workforce Infiltration

Brandon Catalan headshot

Brandon Catalan

CISO

The Boston Beer Company

Anthony Hannon headshot

Anthony Hannon

Sr. Director, Cyber Security

Insulet

 As foreign operatives infiltrate organizations under false identities, traditional hiring and security processes are being tested like never before. This session will dissect real-world attack chains, highlight subtle red flags and technical indicators, and offer actionable strategies for cross-functional response and risk mitigation. Walk away with practical tools to detect, disrupt and prevent these sophisticated insider threats.

Join this talk to learn:

  • Proven methods to identify behavioral and technical warning signs during hiring and employment
  • Effective cross-functional controls and incident response strategies for rapid mitigation
  • Best practices for strengthening organizational resilience through training, ID verification and stakeholder alignment

1:30pm - 2:15pm  Breakout Session

Breakout Session

 Details coming Soon! 

1:30pm - 2:15pm  Executive Boardroom

Looking to the FUTURE — What's Next and Where Will We Get Left Behind?

Gernette Wright headshot

Gernette Wright

IT Security Officer

Schneider Electric North America

Subrata Baguli headshot

Subrata Baguli

Head of Cybersecurity

Massachusetts State Lottery Commission

As we look toward 2026 and 2027, the futurist landscape extends beyond AI, with breakthroughs in areas like synthetic biology, quantum computing, and climate adaptation reshaping business possibilities. However, we’ve given less thought to challenges such as ethical governance, psychological impacts of technology, and the resilience of global supply chains. To stay ahead, organizations must expand their foresight, anticipate overlooked trends, and foster adaptability. By thinking broadly and planning proactively, businesses can better navigate uncertainty and seize emerging opportunities.

Join this discussion to:

  • Identify underexplored trends and technologies that could disrupt your industry in the next 2-3 years
  • Learn strategies for building organizational resilience and adaptability amid rapid change
  • Explore actionable foresight tools to future-proof your business across operations, talent, and innovation


2:15pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

Crafting a Powerful and Purposeful Executive Presence

Eric Galis headshot

Eric Galis

CISO

Cengage

Robyn Ready headshot

Robyn Ready

SVP, CISO

KnitWell Group

Your career trajectory is shaped by more than just your achievements—how others perceive your executive presence can open doors or close them. Personal branding is about consciously shaping those perceptions. Are you aware of how others see you?

Join this engaging session to explore:

  • Steps to intentionally develop a genuine executive brand
  • Identifying your blind spots and leverage opportunities for influence
  • Methods for building or restoring recognition for what matters most to you


3:00pm - 3:45pm  Executive Boardroom

Wired & Inspired — Securing IT/OT in a Connected World

Pat Ford headshot

Pat Ford

Chief Information Security Officer, Americas

Schneider Electric North America

Christine Horan headshot

Christine Horan

Deputy Chief Risk Officer

Commonwealth of Massachusetts

As IT and OT systems converge, CISOs must address new security risks and complexities. For CISOs, ensuring the security of both IT and OT is essential to safeguarding organizational resilience, maintaining regulatory compliance, protecting sensitive data and physical assets. Addressing the unique challenges of IT/OT integration requires practical strategies to protect critical infrastructure in an interconnected world, empowering CISOs to proactively manage risks and enable secure digital transformation.

Join this session to:

  • Review key IT/OT cyber threats and real-world incidents
  • Learn governance and collaboration best practices
  • Get actionable steps to improve visibility and response


3:00pm - 3:45pm  Executive Boardroom

The AI Tightrope — Security Leadership When the Rules Keep Changing

Andy Rappaport headshot

Andy Rappaport

Director of Enterprise Security

iRobot

Christina Mazzone headshot

Christina Mazzone

Deputy CISO

Omnicom Group

As artificial intelligence becomes deeply embedded in business operations, the White House’s AI Action Plan is testing traditional governance and risk management processes like never before. How will CISOs recognize and respond to subtle warning signs and governance gaps in AI adoption? What strategies can help navigate the evolving landscape of regulatory expectation sand cross-functional oversight? How can organizations ensure their security frameworks keep pace with the speed and complexity of AI-driven threats? How can CISOs detect, disrupt, and prevent emerging AI-driven threats while aligning their organizations with evolving regulatory expectations?

Join this session to learn:

  • Proven methods to identify governance, ethical, and technical warning signs in AI adoption & deployment
  • Effective cross-functional controls and incident response strategies for rapid mitigation of AI-related risks
  • Best practices for strengthening organizational resilience through board engagement, AI risk training, and robust oversight frameworks

3:45pm - 4:00pm  Networking Break

4:00pm - 4:35pm  Keynote

Leveraging Outcome-Driven Metrics for Strategic Impact

Chet Geschickter headshot

Chet Geschickter

VP Analyst

Gartner

 

4:35pm - 4:45pm  Closing Comments and Prize Drawing

4:45pm - 6:00pm  Governing Body Reception

Governing Body Reception

Finish the day sharing lessons learned with your peers over light fare and drinks at this closing reception hosted by your governing body members.

November 13, 2025

We look forward to seeing you at an upcoming in-person gathering

Gartner cares about the health and safety of our community. If you are feeling unwell, please refrain from attending the conference. At this time, Gartner does not have any health-related requirements in place for attendance. Should this change, we will follow up with updated guidance.

Location

Venue & Accommodation

Hyatt Regency Boston- Cambridge

A block of rooms has been reserved at the Hyatt Regency Boston- Cambridge at a reduced conference rate. Reservations should be made online or by calling 617-492-1234. Please mention G-EV12 to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $279 USD (plus tax) is October 20, 2025.

Your Community Sponsors

CISO Thought Leaders

Key Sponsor

Program Sponsors

Community Program Manager

For inquiries related to this community, please reach out to your dedicated contact.

Allie Brodie

Senior Program Manager Territory Specialist

336-416-6852

allie.brodie@gartner.com