IN-PERSON

Dallas CISO Executive Summit

November 7, 2024 | Renaissance Dallas Richardson Hotel

November 7, 2024
Renaissance Dallas Richardson Hotel

Collaborate with your peers

Get together with Dallas's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Facilitating Secure Decision-Making with Outcome-Driven Metrics

Equipping users with safely-integrated AI tools and practices per the demand of advancing businesses

Strengthening influence and partnerships across organization

Dallas CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Sara Andrews

Experian
Global CISO

Sujeet Bambawale

7-Eleven
VP, CISO

David Bell

CBRE
Senior Vice President & Chief Information Security Officer

Mustapha Kebbeh

Ultimate Kronos Group
Chief Security Officer

Scot Miller

Mr. Cooper
SVP, CISO

Scott Moser

Sabre Corporation
SVP, Chief Information Security Officer

Becky Palmer

National Life Group
Chief Information Security Officer

Harold Rivas

Trellix
SVP & CISO

Shamoun Siddiqui

Upbound
VP, CISO

Sonya Wickel

Triumph Group
CISO & Sr. Director, Compliance

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Dallas CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


November 7, 2024

7:45am - 8:30am  Registration & Breakfast

8:00am - 8:30am  Networking

Rising Together - Women in Security Networking

Female, non-binary, and allied cyber leaders are invited to start the day off right - with coffee, networking, and inspiration. Forge new connections and empower your fellow executives through open, informal discussions on the future of cybersecurity. 

This session is aimed at, but not limited to, women who are leading the cybersecurity function at their organizations (CISO or equivalent) and those reporting directly to the CISO/equivalent. Priority access will be reserved to these groups.

8:30am - 9:15am  Keynote

Words That Work — Using Impactful Language to Deliver Results

Val Wright headshot

Val Wright

Global Leadership & Innovation Expert, Author

Guest Speaker

Effective communication is a critical component of success for CISOs. The most successful executives realize this and prepare what to say and when to say it with precision using "words that matter". In this keynote conversation, author Val Wright offers fresh perspective and techniques to help you elevate the conversation to deliver results. 

In this session Val shares how to:  

  • Create communication that resonates and simplifies complex information
  • Foster productive relationships with internal and external stakeholders
  • Develop powerful responses to navigate resistance and achieve results

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

A New Paradigm for Managing Third-Party Risk

Shimon Modi headshot

Shimon Modi

VP, Product Management, Cyber

Dataminr

In the past 12 months, 87% of F1000 businesses were affected by significant cyber incidents as a result of a third-party. And yet, most rely on ‘snapshot in time’ questionnaires. While necessary, snapshots are insufficient by themselves, and must be augmented with continuous monitoring in support of ongoing security operations. This requires a different approach, that includes external threat detection capabilities by using AI across Public Data.

Join this session to learn about:

  • The Public Data opportunity: collect, process, alert across multiple languages / modalities
  • Real-time external threat detection on a rapidly evolving threat landscape
  • The most advanced AI techniques for automating the collection, processing, delivery, and initial analysis of millions of public data sources

  

9:40am - 10:25am  Executive Boardroom

Fulfill the Promise of Zero Trust — Navigating Access, Risk, and Common Obstacles

Stan Choflet headshot

Stan Choflet

VP, Security GTM

Citrix Systems, Inc.

Eric Fisch headshot

Eric Fisch

Head of Information Security Governance, Risk, and Controls

USAA

Eric Bowerman headshot

Eric Bowerman

CISO

Dallas/Fort Worth International Airport

Joey Rachid headshot

Joey Rachid

VP, Information Security and CISO

UST Global

Everyone understands the promise and potential of zero trust. However, with the expense and effort involved in implementing new security policies, solidifying Identity Access Management (IAM), and supporting on-prem or legacy systems (just to name a few), it's no wonder that the journey to zero trust is moving slower than expected. What have CISOs learned in dealing with these obstacles and building institutional support to start or continue driving towards the north star of zero trust?

Join this session to discuss:

  • Overcoming common obstacles to implementing zero trust by leveraging innovative solutions and building institutional support
  • Solidifying IAM frameworks to ensure secure access while maintaining business agility
  • Communicating the balancing act of scaling access and managing cyber risk to the C-suite and board within broader business risk discussions

9:40am - 10:25am  Executive Boardroom

Unpacking the Vital Role of the CISO in Data Security

Blayne Henke headshot

Blayne Henke

Director Information Security

Omni Hotels & Resorts

Marc Johnson headshot

Marc Johnson

Chief Information Security Officer

Atos North America

Jeff Kirby headshot

Jeff Kirby

CISO

Interstate Batteries

The CISO plays a key role in safeguarding digital assets, emphasizing robust Data Governance in strategic IT plans. This is becoming especially key as companies embrace AI and open their data sets to LLMs. Having the CISO play an active role in data governance fortifies security, enables data-driven decisions, and enhances resilience against cyberattacks. Cultivating a security culture, supported by Data Governance, transforms data protection into a strategic asset driving organizational success.

Join this session to discover:

  • CISO Leadership: Implementing robust Data Governance, led by the CISO, safeguards digital assets amidst AI adoption 
  • Enhanced Security: Active CISO involvement strengthens security measures, enabling data-driven decisions and proactive defense
  • Security Culture: Embedding Data Governance cultivates a security-centric culture


10:25am - 11:05am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:05am - 11:50am  Breakout Session

Metrics that Matter

Mustapha Kebbeh headshot

Mustapha Kebbeh

Chief Security Officer

Ultimate Kronos Group

CISOs spend a considerable amount of time and energy quantifying and qualifying security posture for boards of directors/executive leadership. But what if the way risk is being reported to the board just isn’t resonating? 

In this session, Mustapha Kebbeh the Chief Security Officer at Ultimate Kronos Group will share highlights, examples and lessons learned and discuss:

  • Discovering where and why disconnects are happening
  • Reviewing, redefining and repositioning risk and security metrics
  • Linking risk measurement with technical metrics to demonstrate cyber risk’s role in company decision making


11:05am - 11:50am  Executive Boardroom

Risk to the Nth-Party Degree

John Chisum headshot

John Chisum

VP, Solutions Consulting

RiskRecon - A MasterCard Company

Boulton Fernando headshot

Boulton Fernando

CISO

Rithm Capital

Joseph Moore headshot

Joseph Moore

CISO

Haynes International

Third party relationships are closest and may prove to be the most tangible risks to your business, yet the whole supply chain of your business partners still pose a substantial threat. Most organizations’ vendor relationships extend to the 8th party. CISOs need to understand this web of connectedness in order to better manage and communicate enterprise risk.

Join this session to discuss:

  • Gaining visibility into risk across the whole supply chain
  • Strategies for effective risk management and monitoring business partners
  • Overcoming resource challenges to prioritize third-party and extended supply chain risk

11:05am - 11:50am  Executive Boardroom

How to Assess Security Maturity and Why It Matters

Tyler Zito headshot

Tyler Zito

Senior Solutions Architect

Expel

Bryce Carter headshot

Bryce Carter

Chief Information Security Officer

City of Arlington

KC Condit headshot

KC Condit

CISO

G6 Hospitality

Sailaja Kotra-Turner headshot

Sailaja Kotra-Turner

CISO and VP Infrastructure and Operations

Brown-Forman

Maturing your security posture requires knowing how to objectively assess your organization, use industry best practices and frameworks, and select the right tools to advance your business. This complex, time-intensive process often takes a backseat to defending yourself against ever-evolving threats. Getting started can be overwhelming, so finding time to assess and improve your security maturity is a tall task.

Join this session to discuss:

  • Benchmarking SOC performance using common assessment frameworks and tools
  • Determining your security maturity level, and how to fill gaps you’ve identified
  • Analyzing the impact of data and AI on your security posture

11:50am - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

Transforming Application and Service Delivery for the Modern Security Environment

Jason Trunk headshot

Jason Trunk

Chief Enterprise Architect

Island

Delivering business critical applications safely is a delicate balancing act. The user experience is frequently compromised as application, infrastructure, and security teams negotiate the adoption of new services. Unfortunate trade-offs are sometimes necessary to address operational needs for the sake of maintaining security, but these trade-offs can make certain use cases unfeasible or diminish their value to the organization.

In this session, we will discuss:

  • Revolutionizing workspaces by balancing productivity, security, availability and user experience
  • How quickly new technologies like the enterprise browser can be adopted to provide a competitive advantage
  • Strategies for reducing the effort required to deliver applications and enhance organizational operations

 

1:10pm - 1:35pm  Break

1:35pm - 2:20pm  Breakout Session

CISO's Responsibility to Resiliency

Ajay Gupta headshot

Ajay Gupta

SVP & CISO

Cencora

David Bell headshot

David Bell

Senior Vice President & Chief Information Security Officer

CBRE

Ian Schneller headshot

Ian Schneller

CISO

Health Care Service Corporation

Organizations are constantly being targeted and attacked. It's inevitable that the attacks will happen, but it's up to CISOs to strategically plan for how to keep business going as usual and minimize disruption.

During this session you will explore:

  • What resilience means, how to prioritize achieving it, and lessons learned
  • Holistic approaches to architecting a tried-and-true cyber resiliency plan
  • Enabling prevention and defense operations to move through turbulence

1:35pm - 2:20pm  Executive Boardroom

Maximizing the Value of Your Security Investments

Nats Elluri headshot

Nats Elluri

Director, Cyber Security

United Surgical Partners International

Glen Armes headshot

Glen Armes

Chief Information Security Officer

Old Republic International Corporation

Threats don't brake for CISOs with budget restrictions. And even when funds are low, the business expects you to ward off attacks. That's means you'll have to increase success without increasing tools or talent.

Together with your C-level peers, discuss how to:

  • Expand coverage without spreading it thin
  • Deliver on the business's existing security investments
  • Demonstrate the linkage between a safe business and a profitable one

1:35pm - 2:20pm  Executive Boardroom

The Silent Spread of AI — And Why You’re Losing Control Over It

Lior Yaari headshot

Lior Yaari

CEO and Co-Founder

Grip Security

Scott Deluke headshot

Scott Deluke

Director of Enterprise Sales Engineering

Abnormal Security

Scott Moser headshot

Scott Moser

SVP, Chief Information Security Officer

Sabre Corporation

AI risk is quietly creeping into every corner of your enterprise, and you don’t even realize it. As more employees adopt AI-powered tools, applications, and processes, it is becoming deeply embedded in your tech stack — but it’s not just your employees using AI. Attackers are also leveraging AI to enhance their own tactics and sharpen their attacks. The real question for CISOs is: Do you have visibility into the countless ways AI is spreading, and what’s the best way to use AI to protect against AI?

Join this session to discuss:

  • The hidden ways AI is entering your enterprise—from third-party tools to shadow AI projects—and why it’s slipping under the radar
  • How attackers are using AI to improve their attacks and making them harder to detect by both legacy security tools and humans themselves
  • Actionable steps for CISOs to gain visibility and control over AI use across the organization

1:35pm - 2:20pm  Executive Boardroom

Eliminating the Blindspot of Application Detection and Response

Larry Maccherone headshot

Larry Maccherone

Dev[Sec]Ops Transformation Architect

Contrast Security

Zach Vinduska headshot

Zach Vinduska

CISO

Confidential - Insurance Industry

Amy Chaney headshot

Amy Chaney

Executive Risk Officer - Cybersecurity, Technology Infrastructure & Multi-Cloud Environment

Huntington Bancshares

Cybersecurity measures are adept at detecting and responding to incidents across various layers, but the application layer often remains vulnerable. Many organizations have a massive vulnerability backlog that demands timely and effective defense.

Join us to explore:

  • Understanding the scale of the backlog and strategies to prevent exploitation
  • The intricacies of application and API protection within the security operations ecosystem
  • Benefits of having a comprehensive blueprint that reveals attack surfaces, defenses, dangers, and connections

2:20pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

Data at the Core — Demystifying Artificial Intelligence

Manish Motiramani headshot

Manish Motiramani

Director, Analytics & Insights, Global Operation

Medtronic

Jeffery Schilling headshot

Jeffery Schilling

Global CISO

Teleperformance

Artificial Intelligence is reshaping our world, with machines that can learn, adapt, and even create. For those at the helm of information security, understanding AI, Machine Learning and Generative AI is crucial for optimizing decision-making and staying ahead in a competitive landscape.

Join Manish Motiramani, Data and Analytics Leader at Medtronic, and Jeffery Schilling, Global CISO at Teleperformance, as they explore:

  • The intersection of cybersecurity and data analytics in the age of AI
  • Understanding AI as encompassing ML, which learns from data
  • Differentiating AI types — narrow for tasks, general mimics humans

3:00pm - 3:45pm  Executive Boardroom

Trusted Ties — The Art of Secure Partnerships

Manish Jain headshot

Manish Jain

Head of Information Security

Amazon

Dewakar Garg headshot

Dewakar Garg

Sr. Director of Information Security & Compliance

Mavenir

 Vendor selection, pre-partner due diligence, and trusted implementation are merely the beginning of a healthy third-party management culture. With those pieces in place, the real work (like battling for constant visibility and enforcing your requirements) begins. You’ll need to be prepared.  

Gather and discuss how to CISOs have successfully:

  • Vetted new and prospective third-parties
  • Monitored network of existing third-parties
  • Asserted security requirements with vulnerable, but critical, third-parties


3:00pm - 3:45pm  Executive Boardroom

Controlled Chaos — Mastering Incident Response

Art Harvey headshot

Art Harvey

CISO

Dovenmuehle

Gaurav Kapil headshot

Gaurav Kapil

SVP, CISO

Bread Financial

Aaron Munoz headshot

Aaron Munoz

Chief Information Security Officer

Texas Christian University

CISOs need more than a plan. They need to know what it takes to master the art of containment, eradication and recovery while keeping the business's costs (both financial and reputational) to a minimum.

Only in a room of your security-focused peers will you:

  • Unlock specific, essential incident response practices
  • Hear relatable cases of what is and isn't working for others in your position
  • Gather the threat mitigation insights of your fellow cyber leaders


3:45pm - 4:10pm  Break

4:10pm - 4:45pm  Keynote

Repeatability and Scalability in the Age of Outcome Driven Metrics

Patrick Long headshot

Patrick Long

Sr Principal Analyst

Gartner

Outcome-driven metrics can be a useful tool for cybersecurity governance and advancing cybersecurity maturity. Security leaders need to evolve their approach to cybersecurity metrics to be more aligned with the business rather than doing cybersecurity for the sake of cybersecurity.

Join this keynote with Gartner analyst Patrick Long to learn how CISOs can:

  • Rationalize traditional, operational metrics with the outcome-driven metrics approach
  • Define a level of cybersecurity that's defensible with key stakeholders
  • Find synergy and a better way to show the business value of cybersecurity

4:45pm - 5:00pm  Closing Comments and Prize Drawing

5:00pm - 6:30pm  Governing Body Reception

Governing Body Reception

Governing Body members host this reception for executives to close out the event with an evening of peer networking, food and drinks.

November 7, 2024

We look forward to seeing you at an upcoming in-person gathering


Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

Renaissance Dallas Richardson Hotel
MORE INFORMATION

A block of rooms has been reserved at the Renaissance Dallas Richardson Hotel at a reduced conference rate. Reservations should be made online or by calling 800-264-0359. Please mention Evanta CISO Executive Summit to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $179 USD (plus tax) is October 14, 2024.

Your Community Partners


Global Thought Leader
CISO Thought Leader
Key Partners
Program Partners

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Fernanda Casillas

Community Program Manager

469-933-4731

fer.casillas@evanta.com