In-Person

Boston CISO Community

Executive Summit

November 13, 2025 | Hyatt Regency Boston- Cambridge

November 13, 2025
Hyatt Regency Boston- Cambridge

Collaborate with your peers

Get together with Boston's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Maintaining Operations Through Cyber Resilience Strategies

Enhancing User Access with Smart Solutions

Maximizing AI for Strategic Advantage

Boston CISO Governing Body

The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.

Governing Body Co-Chairs

Julie Fitton

Analog Devices
CISO

Eric Galis

Cengage
CISO

Javed Ikbal

Bright Horizons
VP/CISO

Brian McGowan

SharkNinja
CISO

Ravi Thatavarthy

Rite Aid
Chief Information Security Officer

Gernette Wright

Schneider Electric North America
IT Security Officer

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Boston CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda

November 13, 2025

8:00am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

CISOs on the Hot Seat — A New Era of Liability

Aravind Swaminathan headshot

Aravind Swaminathan

Global Co-Chair Cybersecurity & Data Privacy

Orrick, Herrington & Sutcliffe

As cybersecurity attacks increase in sophistication, the financial and reputational impact for companies has never been more pronounced. CISOs responsible for navigating a company through a data breach, the stakes are even higher. CISOs confront significant personal civil and criminal liability in connection with their handling of breaches and associated disclosures. This raises serious concerns not only for CISOs, but also for companies’ abilities to secure expert personnel to safeguard their data and systems.

Join this keynote to discuss:

  • Protecting executives on the front lines of cybersecurity incidents
  • Implementing best practices aimed at reducing the potential liability of key stakeholders 
  • Managing liability risks which includes how to work with the Board and the broader executive team

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Crafting a Powerful and Purposeful Executive Presence

Eric Galis headshot

Eric Galis

CISO

Cengage

Robyn Ready headshot

Robyn Ready

SVP, CISO

KnitWell Group

Your career trajectory is shaped by more than just your achievements—how others perceive your executive presence can open doors or close them. Personal branding is about consciously shaping those perceptions. Are you aware of how others see you?

Join this engaging session to explore:

  • Steps to intentionally develop a genuine executive brand
  • Identifying your blind spots and leverage opportunities for influence
  • Methods for building or restoring recognition for what matters most to you


9:40am - 10:25am  Breakout Session

The Next Chapter— Embracing Modern Challenges in Liability

Aravind Swaminathan headshot

Aravind Swaminathan

Global Co-Chair Cybersecurity & Data Privacy

Orrick, Herrington & Sutcliffe

The escalating legal responsibilities of CISOs in today’s threat landscape often result in ongoing stress and vigilance. Join this open Q&A session following the morning Keynote to discuss the personal and professional impacts of liability, and to benchmark effective methods for maintaining resilience and safeguarding both your organization and yourself.

Join this interactive session to: 

  • Explore real-world examples of CISO liability and its impact on leadership
  • Share strategies for coping with stress and hypervigilance in high-pressure environments
  • Benchmark best practices for fostering resilience and well-being among security leaders


10:25am - 11:10am  Networking Break

10:35am - 11:00am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:10am - 11:55am  Breakout Session

Over the Horizon — CISOs to Chief Cyber Resilience Officers

Kavitha Mariappan headshot

Kavitha Mariappan

Chief Transformation Officer

Rubrik

The CISO remit increasingly includes GenAI governance, securing cyber-physical systems, and a range of value-driving services — yet its core charge remains safeguarding operations. As breaches become inevitable and board risk appetites shift, cyber resilience will demand even greater focus. CISOs must define recovery goals, guarantee reliable backups, and restore critical services with speed — focusing on measurable resilience to earn their future role as Chief Cyber Resilience Officers.

Join this session to learn about:

  • Defining and measuring resilience for real business outcomes
  • Orchestrating reliable backup and rapid recovery strategies
  • Embedding resilience across teams as a cultural and leadership priority

11:10am - 11:55am  Breakout Session

Cloud Network Security Meets Zero Trust Architecture

Willie Tejada headshot

Willie Tejada

GM & SVP, Cloud Native Security Fabric

Aviatrix

As enterprises expand cloud use, CISOs must reduce risk, ensure resilience, and maintain compliance. Zero Trust in the cloud goes beyond identity — it hinges on segmentation, continuous visibility, and policy enforcement across multi-cloud networks. Closing gaps in east-west traffic, containerization, and egress controls is vital for protecting operations and reporting risk effectively.

Join this session to learn how to:

  • Embed zero trust principles into cloud network architecture
  • Eliminate blind spots across multicloud and containerized environments
  • Demonstrate risk reduction and regulatory compliance with confidence

11:10am - 11:55am  Executive Boardroom

Identity Security in the Agentic AI Era

Mike Towers headshot

Mike Towers

Chief Security & Trust Officer

Veza

Eric Jacobsen headshot

Eric Jacobsen

Executive Director of Information Security

Boston University

Jasvinder Khera headshot

Jasvinder Khera

AVP & CISO

John Hancock

 The rise of Agentic AI is increasing risks and complexities for Non-Human Identities (NHIs) in cloud environments. AI agents need extensive NHI access, posing new challenges in identity governance and security.

Join this roundtable to discuss:

  • Exponential NHI growth impacting security
  •  Management of AI access models and permissions
  •  Complex AI interactions affecting identity management

11:10am - 11:55am  Executive Boardroom

Taming Third Party Risk with Advanced Technologies

John Chisum headshot

John Chisum

VP, Solutions Consulting

Mastercard Cybersecurity

Heinrich Piard headshot

Heinrich Piard

Chief Information Security Officer & Head of Global IT Operations

Hamilton Insurance Group

Cyber threats are increasingly sophisticated and pervasive, making conventional TPRM approaches like questionnaires inadequate. AI/ML and threat intelligence have the potential to transform TPRM, as well as extending into 4th, 5th parties and beyond. Leveraging key insights can help CISOs stay ahead of evolving risks and enhance security programs, even with limited resources.

Join this session to discuss:

  • Practical strategies for leveraging threat intelligence in TPRM
  • Critical alignment of people and process elements with advanced technologies
  • Acting on useful insights and data to manage supply chain risk

11:55am - 12:30pm  Lunch Service

12:30pm - 1:05pm  Keynote

Securing Data Flow in the AI-Quantum Era

Sensitive data movement can be risky but restricting it outright can create operational and security challenges. In an era of agentic AI, generative AI, and emerging quantum computing, organizations need security frameworks that protect data while ensuring agility. This session explores how modern security platforms enable secure data flow, adapt to diverse use cases and prepare for the post-quantum encryption (PQE) shift.

Join this keynote to learn:

  • How to choose the right secure access method for each use case
  • Why security must be adaptive to risk, user behavior and AI-driven interactions
  • How to prepare for post-quantum encryption and its enterprise security impact

1:05pm - 1:30pm  Break

1:30pm - 2:15pm  Breakout Session

Outsmarting Insider Threats — North Korea’s Evolving Tactics in Workforce Infiltration

Brandon Catalan headshot

Brandon Catalan

CISO

The Boston Beer Company

Anthony Hannon headshot

Anthony Hannon

Sr. Director, Cyber Security

Insulet

 As foreign operatives infiltrate organizations under false identities, traditional hiring and security processes are being tested like never before. This session will dissect real-world attack chains, highlight subtle red flags and technical indicators, and offer actionable strategies for cross-functional response and risk mitigation. Walk away with practical tools to detect, disrupt and prevent these sophisticated insider threats.

Join this talk to learn:

  • Proven methods to identify behavioral and technical warning signs during hiring and employment
  • Effective cross-functional controls and incident response strategies for rapid mitigation
  • Best practices for strengthening organizational resilience through training, ID verification and stakeholder alignment

1:30pm - 2:15pm  Executive Boardroom

Looking to the FUTURE — What's Next and Where Will We Get Left Behind?

Gernette Wright headshot

Gernette Wright

IT Security Officer

Schneider Electric North America

As we look toward 2026 and 2027, the futurist landscape extends beyond AI, with breakthroughs in areas like synthetic biology, quantum computing, and climate adaptation reshaping business possibilities. However, we’ve given less thought to challenges such as ethical governance, psychological impacts of technology, and the resilience of global supply chains. To stay ahead, organizations must expand their foresight, anticipate overlooked trends, and foster adaptability. By thinking broadly and planning proactively, businesses can better navigate uncertainty and seize emerging opportunities.

Join this discussion to:

  • Identify underexplored trends and technologies that could disrupt your industry in the next 2-3 years
  • Learn strategies for building organizational resilience and adaptability amid rapid change
  • Explore actionable foresight tools to future-proof your business across operations, talent, and innovation


2:15pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

CISO Exchange - Tackling Security’s Hottest Issue

Cybersecurity is now a headline issue, CISOs must bridge the gap between technical priorities, business strategy and mental health. This session offers a unique opportunity to choose pressing topics and collaborate with fellow security leaders in open, insightful conversations.

In this workshop, you’ll:

  • Identify and unpack industry-wide security concerns
  • Assess how new trends are shaping business decisions
  • Unpack mental health, it not the reward for high performance—it’s the foundation

3:00pm - 3:45pm  Executive Boardroom

Wired & Inspired — Securing IT/OT in a Connected World

Pat Ford headshot

Pat Ford

Chief Information Security Officer, Americas

Schneider Electric North America

Christine Horan headshot

Christine Horan

Deputy Chief Risk Officer

Commonwealth of Massachusetts

As IT and OT systems converge, CISOs must address new security risks and complexities. For CISOs, ensuring the security of both IT and OT is essential to safeguarding organizational resilience, maintaining regulatory compliance, and protecting sensitive data and physical assets. Addressing the unique challenges of IT/OT integration requires practical strategies to protect critical infrastructure in an interconnected world, empowering CISOs to proactively manage risks and enable secure digital transformation.

Join this session to:

  • Review key IT/OT cyber threats and real-world incidents
  • Learn governance and collaboration best practices
  • Get actionable steps to improve visibility and response


3:45pm - 4:00pm  Networking Break

4:00pm - 4:35pm  Keynote

Leveraging Outcome-Driven Metrics for Strategic Impact

Chet Geschickter headshot

Chet Geschickter

VP Analyst

Gartner

 

4:35pm - 4:45pm  Closing Comments and Prize Drawing

4:45pm - 6:00pm  Governing Body Reception

Governing Body Reception

Finish the day sharing lessons learned with your peers over light fare and drinks at this closing reception hosted by your governing body members.

November 13, 2025

We look forward to seeing you at an upcoming in-person gathering

Gartner cares about the health and safety of our community. If you are feeling unwell, please refrain from attending the conference. At this time, Gartner does not have any health-related requirements in place for attendance. Should this change, we will follow up with updated guidance.

Location

Venue & Accommodation

Hyatt Regency Boston- Cambridge

A block of rooms has been reserved at the Hyatt Regency Boston- Cambridge at a reduced conference rate. Reservations should be made online or by calling 617-492-1234. Please mention G-EV12 to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $279 USD (plus tax) is October 20, 2025.

Your Community Sponsors

CISO Thought Leaders

Key Sponsor

Program Sponsors

Community Program Manager

For inquiries related to this community, please reach out to your dedicated contact.

Spencer Bisgaard

Senior Community Program Manager

541-912-0183

spencer.bisgaard@gartner.com