IN-PERSON

Dallas CISO Executive Summit

May 8, 2025 | Renaissance Dallas Richardson Hotel

May 8, 2025
Renaissance Dallas Richardson Hotel

APPLY TO PARTICIPATE

Collaborate with your peers

Get together with Dallas's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Establishing asset visibility while working to create a strong Cloud Governance

Building cyber resilience to withstand & quickly recover from attacks

Creating Robust DLP Strategies to Up Your Risk Management Game

Dallas CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.

Governing Body Co-Chairs

Sara Andrews

Experian
Global CISO

David Bell

CBRE
SVP, CISO

Mustapha Kebbeh

Ultimate Kronos Group
Chief Security Officer

Scot Miller

Mr. Cooper
SVP, CISO

Scott Moser

Sabre Corporation
SVP, Chief Information Security Officer

Becky Palmer

National Life Group
Chief Information Security Officer

Shamoun Siddiqui

The Upbound Group
VP, CISO

Sonya Wickel

Triumph Group
VP, Information Technology & CISO

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Dallas CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


May 8, 2025

8:00am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

Disruption Proof — High Performing Teams that Conquer Change

Vijay Pendakur, Ph.D. headshot

Vijay Pendakur, Ph.D.

Team Effectiveness Coach

Guest Speaker

In today’s fast-moving tech and security landscapes, disruption is inevitable—but it doesn’t have to derail your team’s performance. In this high-energy, 30-minute keynote, Dr. Vijay Pendakur will explore why disruption often leads teams to get stuck and how this stagnation threatens business success. Vijay will share his Alchemy of Talent model and explain how leaders can increase productivity and efficiency on their teams, even when it feels like we’re working in an endless earthquake!

Join this keynote to learn:

  • Why disruption can lead to stuck teams and how to avoid it
  • The critical impact of stuck teams on business performance and results
  • How to make your teams more resilient, adaptable, and willing to learn from failure

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Breakout Session

Details coming soon!

9:40am - 10:25am  Executive Boardroom

Protecting Innovation — Rethinking Data Security Strategies

Howard Ting headshot

Howard Ting

CEO

Cyberhaven

AI makes creating and consuming data easier than ever, with shadow AI and dark data presenting new challenges to security teams. As the tactics for protecting data evolve, security leaders must adopt a risk-based strategy to protect mission-critical data and safeguard innovation.

Join this session to discover:

  • Effective practices for ongoing monitoring to identify risks
  • Rapid investigation and response techniques for insider threats
  • Strategies for evolving your data protection approach

9:40am - 10:25am  Executive Boardroom

True Defense Against API & Application Incidents

Larry Maccherone headshot

Larry Maccherone

Dev[Sec]Ops Transformation Architect

Contrast Security

Cybersecurity measures are adept at detecting and responding to incidents across various layers, but the application layer often remains vulnerable. Many organizations have a massive vulnerability backlog that demands timely and effective defense.

Join us to explore:

  • Understanding the scale of the backlog and strategies to prevent exploitation
  • The intricacies of application and API protection within the security operations ecosystem
  • Benefits of having a comprehensive blueprint that reveals attack surfaces, defenses, dangers, and connections


10:25am - 11:10am  Networking Break

10:35am - 11:00am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:10am - 11:55am  Executive Boardroom

Taming Third Party Risk with Advanced Technologies

Jonathan Ehret headshot

Jonathan Ehret

VP, Global Cybersecurity

Mastercard

Eric Bowerman headshot

Eric Bowerman

CISO

Dallas/Fort Worth International Airport

Cyber threats are increasingly sophisticated and pervasive, making conventional TPRM approaches like questionnaires inadequate. AI/ML and threat intelligence have the potential to transform TPRM, as well as extending into 4th, 5th parties and beyond. Leveraging key insights can help CISOs stay ahead of evolving risks and enhance security programs, even with limited resources.

Join this session to discuss:

  • Practical strategies for leveraging threat intelligence in TPRM
  • Critical alignment of people and process elements with advanced technologies
  • Acting on useful insights and data to manage supply chain risk

11:10am - 11:55am  Executive Boardroom

Securing Data Flow in the AI-Quantum Era

Mike Anderson headshot

Mike Anderson

Chief Digital & Information Officer

Netskope

Sensitive data movement poses risks, but outright restriction can hinder operations. Organizations need agile security frameworks to protect data in the AI and quantum era. This session explores modern security platforms that enable secure data flow and prepare for post-quantum encryption (PQE).

Join this session to learn:

  • Choosing secure access methods for diverse use cases
  • Adapting security to risk, user behavior and AI interactions
  • Preparing for post-quantum encryption's enterprise impact

11:55am - 12:30pm  Lunch Service

12:30pm - 1:05pm  Keynote

Lunch Keynote by Zscaler

Jay Chaudhry headshot

Jay Chaudhry

CEO, Chairman & Founder

Zscaler

 More details coming soon.

1:05pm - 1:30pm  Break

1:30pm - 2:15pm  Breakout Session

Cyber Resilience — Not One Size Fits All

David Bell headshot

David Bell

SVP, CISO

CBRE

Mustapha Kebbeh headshot

Mustapha Kebbeh

Chief Security Officer

Ultimate Kronos Group

Sonja Hammond headshot

Sonja Hammond

VP, CISO

National Veterinary Associates

Cyber resilience is not a binary element; it is a dynamic and multifaceted concept that varies depending on one's security perspective. As organizations strive to increase operational efficiencies, leaders must deepen their understanding of the business side of cybersecurity. The question is not just about having resilience against current threats but also about preparing for what comes next. CISOs need to ask this critical question: Is your organization resilient enough to recover swiftly and effectively?

Join this session to discuss:

  • Changing the way leaders think about cyber resiliency, it's not a simple equation
  • Empowering leaders to gain a deeper understanding of cyber resiliency & business operations
  • Evaluating your organizations ability to recover quickly and effectively against cyber incidents

1:30pm - 2:15pm  Breakout Session

The Paradox of Third-Party Risks

Scott Moser headshot

Scott Moser

SVP, Chief Information Security Officer

Sabre Corporation

Robert Pace headshot

Robert Pace

VP, CISO

Invitation Homes LP

Third-party risk can be considered both "good" and "bad" depending on the context. The "good" side represents potential benefits, access to specialized expertise and cost savings, while the "bad" side signifies increased risk of disruptions, data breaches, or reputational  damage due to reliance on an external entity you can't fully control. Join this session to learn from CISOs Scott Moser & Robert Pace as they square off on third-party risk.

In this session we will explore:

  • Why third-party partnerships are failing
  • Who benefits most from third-party providers B2B or B2C
  • Why CISOs need to let go of controlling the outcome


1:30pm - 2:15pm  Executive Boardroom

Executive Boardroom

Chris Zamora headshot

Chris Zamora

VP of Global Executive Engagement

Nagomi Security

 Details coming soon!

1:30pm - 2:15pm  Executive Boardroom

Escape the Dark – lluminating Security Data Visibility

Yasmine Abdillahi headshot

Yasmine Abdillahi

BISO and Executive Director, Cyber GRC

Comcast

CISOs face a barrage of threats, but the true danger lies in the unseen vulnerabilities lurking in the shadows. To effectively safeguard critical data, organizations must transcend reactive defenses and embrace a proactive approach that illuminates the "blind spots." By expanding visibility and fostering transparent communication, we can dismantle the "unknown" and "hidden" areas of risk, ensuring threats are neutralized before they materialize.

Join this session to discuss:

  • Moving beyond reactive threat response to a proactive, anticipatory security posture
  • Strategies for identifying and eliminating unseen vulnerabilities that compromise critical data
  • Leveraging frameworks like the Johari Window model to enhance security visibility and reduce blind spots

2:15pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

Strengthening Cyber Resilience in Uncertain Times

Jeff Kirby headshot

Jeff Kirby

CISO

Interstate Batteries

Ian Schneller headshot

Ian Schneller

CISO

Health Care Service Corporation

In today's world of heightened global tensions, organizations face an ever-increasing risk of sophisticated cyber-attacks targeting their operations and data integrity both domestically and internationally. These large-scale attacks target weaknesses in digital infrastructure, causing severe disruptions and financial setbacks. This session delves into the pressing cybersecurity challenges organizations encounter and outlines strategic measures to bolster defenses against such threats.

Join this peer-led conversation to discuss: 

  • Equipping CISOs with insights into the current geopolitical climate
  • Engaging leadership for informed cybersecurity risk decisions abroad
  • Modifying cyber resilience components to counteract new vulnerabilities

3:00pm - 3:45pm  Breakout Session

AI Implementation – How Early Adopters Are Reaping The Benefits

Wei Dong headshot

Wei Dong

CISO

Michaels Stores

Cecil Pineda headshot

Cecil Pineda

CISO

R1 RCM

Early adopters confirm, AI-application isn't for the faint of heart (or the light of checkbook). Yet the expectation to welcome this booming tech advancement into your organization remains. Today, studying the efforts of those same early adopters proves the easiest first step in drawing up your own AI road map. Join Wei Dong, CISO, Michaels Stores who shares his journey to AI success.  

Join this session to:

  • Learn about AI adoption with practical use cases
  • Utilize AI to strengthen security posture
  • Gather proactive tips on clearing hurdles to come


3:00pm - 3:45pm  Executive Boardroom

The Cloud Network Security Illusion ― Are You Really Protected?

Doug Merritt headshot

Doug Merritt

Chairman, CEO, and President

Aviatrix

Thomas Pigeon headshot

Thomas Pigeon

CISO

Dallas Independent School District

CISOs today face an uncomfortable truth ― traditional cloud security models leave critical blind spots. Perimeter defenses and firewalls create a false sense of security while real threats move undetected within your cloud. Recent Advanced Persistent Threats (APTs) reveal the limitations of static security approaches, proving that securing only the 'front door' is insufficient.

Join this session to discuss:

  • Hidden risks inside cloud environments missed by traditional security
  • The necessity of deep insights into data workloads, application security, and Kubernetes compliance
  • Best practices to ensure control over your cloud security posture

3:00pm - 3:45pm  Executive Boardroom

Generative to Agentic — Is The Risk Worth The Evolution?

Mandy Andress headshot

Mandy Andress

CISO

Elastic

Nathan Wright headshot

Nathan Wright

CISO

Textron

GenAI is changing rapidly, and the next major step is agentic AI — systems that are capable of taking actions without human oversight. This brings a new level of complexity, but there are benefits for security teams as well. Security leaders are now exploring the value and risk of agentic AI to determine how to advance safely. 

Join Elastic’s security leadership to explore:

  • The use of GenAI in security and how it's advanced to meet different team needs
  • How AI adoption changes your attack surface 
  • The different ways AI augments security teams and workflows

3:45pm - 4:00pm  Networking Break

4:00pm - 4:35pm  Keynote

CISOs on the Hot Seat — A New Era of Liability

Aravind Swaminathan headshot

Aravind Swaminathan

Global Co-Chair Cybersecurity & Data Privacy

Orrick, Herrington & Sutcliffe

As cybersecurity attacks increase in sophistication, the financial and reputational impact for companies has never been more pronounced. CISOs responsible for navigating a company through a data breach, the stakes are even higher. CISOs confront significant personal civil and criminal liability in connection with their handling of breaches and associated disclosures. This raises serious concerns not only for CISOs, but also for companies’ abilities to secure expert personnel to safeguard their data and systems.

Join this keynote to discuss:

  • Protecting executives on the front lines of cybersecurity incidents
  • Implementing best practices aimed at reducing the potential liability of key stakeholders 
  • Managing liability risks which includes how to work with the Board and the broader executive team

4:35pm - 4:45pm  Closing Comments and Prize Drawing

4:45pm - 6:00pm  Governing Body Reception

Governing Body Reception

Finish the day sharing lessons learned with your peers over light fare and drinks at this closing reception hosted by your governing body members.

May 8, 2025

We look forward to seeing you at an upcoming in-person gathering


Gartner cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

Renaissance Dallas Richardson Hotel
MORE INFORMATION

A block of rooms has been reserved at the Renaissance Dallas Richardson Hotel at a reduced conference rate. Reservations should be made online or by calling 800-264-0359 . Please mention GE1GE1A to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $179 USD (plus tax) is April 14, 2025.

Your Community Sponsors


Global Thought Leader
CISO Thought Leader
Key Sponsors

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Fernanda Casillas

Senior Community Program Manager

469-933-4731

fer.casillas@gartner.com