San Francisco CISO Community
Executive Summit
June 11, 2026 | Grand Hyatt at SFO
June 11, 2026
Grand Hyatt at SFO
Collaborate with your peers
Get together with San Francisco's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.
Join your peers to discuss the most critical issues impacting CISOs today:
Maximizing AI for strategic growth while empowering safe integration for users
Streamlining access management and controls across both traditional and non-human identities
Reframing risk reduction as minimizing business impact and improving resilience
San Francisco CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.
Governing Body Co-Chairs

Krishnan Chellakarai
Gilead Sciences
CISO, Head of Information Security, Risk & Compliance

Bryan Green
MGM Resorts International
CISO

Mandy Huth
Ultra Clean Technology
SVP, CISO

Jeremiah Kung
AppLovin
CISO

Leda Muller
Stanford University
Chief Information Security & Privacy Officer

David Tugwell
Agilent Technologies
AVP & CISO
What to Expect
Agenda
Keynote Session
Security Culture — Built, Not Bolted On
What would it look like if security wasn’t just a function—but a shared cultural instinct across your entire organization? As CISOs face mounting pressure to drive resilience, the mandate is shifting from enforcing compliance to inspiring security‑first thinking at every level. Organizations can embed security into daily behaviors, decision‑making, and business operations, so protection becomes a natural extension of how the company works, innovates, and grows.
Join Fritz Wetschnig, Chief Information Security & Data Privacy Officer of Flex, to discuss how:
- Security culture starts with leadership modeling and reinforcement
- Embedding security into workflows boosts adoption and reduces risk
- Shared ownership drives stronger, more sustainable security outcomes
Breakout Sessions
Ownership and Oversight for Nonhuman Identities
AI agents are rapidly expanding the nonhuman identity landscape, operating at machine speed with delegated authority that outpaces today’s governance models. As boards begin asking who owns these agents, what they’re allowed to do, and how they can be stopped, CISOs must move beyond monitoring and establish identity‑centric guardrails that ensure control before action. How can CISOs enable AI innovation without losing command of their environment?
Join Clarence Foster, BISO of T-Mobile for Business and your peers to:
- Understand why nonhuman identity sprawl makes AI agents a new risk frontier
- Learn how proactive, identity‑first controls must precede autonomous agent actions
- Explore governance guardrails that clearly define ownership, permissions, and safe shutdown paths for AI agents
Identity-Aware Resilience for Business Continuity
As identity compromise becomes the fastest path to operational disruption, CISOs must shift from blocking every attack to limiting its impact. Compromised users, machines, and services now dictate incident severity. Building identity aware resilience requires coordinated action across security, identity, IT operations, and recovery teams to contain incident spread, restore trusted state, and maintain continuity.
In this session to explore how to:
- Detect and contain identity driven incidents
- Prioritize accounts, systems, and data for rapid recovery
- Strengthen cross functional collaboration with continuity metrics
Securing the Agentic Workforce
As AI agents move from passive tools to active workforce members, CISOs face new governance and security challenges. The risks of rapid, autonomous action are real—but so are the opportunities for transformation. This session offers a practical, forward-looking approach to securely unlocking the value of agents.
Join this session to explore:
- Reining in shadow agents
- Protecting agents from malicious context
- Protecting your business from rogue agents
Executive Boardroom Sessions
Rethinking Security for Agentic AI — From Control to Orchestration
As AI agents start acting across business environments, data becomes the true control surface. These agents require broad access to data, identities, and business processes, creating new risk patterns as sensitive data and outbound actions converge at machine speed. This is a control shift. CISOs must modernize their data approach to adopt agentic AI confidently while maintaining oversight.
Join this session to discuss how to:
- Detect emerging risk behaviors in autonomous AI
- Build a data-centric and intent-aware security model
- Establish the CISO as the orchestrator of scalable AI and business growth enabler
Securing Tomorrow — Rethinking Data Recovery Strategies
CISOs are challenged by the growing sophistication of cyberattacks and the increasing complexity of IT environments, making traditional recovery approaches insufficient. Ensuring rapid, reliable recovery is now central to organizational resilience and trust, yet many security leaders struggle to integrate recovery into overall security strategy. Exploring new paradigms in cyber recovery can empower CISOs to proactively safeguard business continuity.
Join this session to explore:
- Integrating recovery into incident response plans
- Assessing cyber resilience beyond prevention
- Bridging gaps between security and IT operations
The New Power Seat — Redefining what CISO Means
What does it mean for CISOs to occupy a new power seat—one where you are no longer just managing risk, but actively co‑architecting the enterprise’s technology strategy? As security and IT converge, CISOs must assess how they will influence modernization, reshape governance, and redefine responsibility for risk in a rapidly evolving environment.
Join this session to discuss:
- How dual CISO–CIO responsibilities are reshaping governance models and accelerating security‑aligned modernization
- Strategies for influencing technology architecture earlier in the lifecycle while maintaining business alignment
- What “owning risk” now means as security and IT increasingly operate as a unified strategic function
From Bottleneck to Boost — The AppSec Glow‑Up
How can CISOs ensure that application security becomes a seamless part of the SDLC rather than a development bottleneck? Organizations that standardize secure design practices, automate testing in CI/CD, and adopt risk‑aligned remediation workflows consistently reduce late‑stage vulnerabilities and strengthen engineering partnership. This approach accelerates remediation and gives leadership clearer, real‑time visibility into application risk.
Join your peers to discuss how:
- Embedded security and automated testing reduce downstream defects
- Risk‑based workflows drive developer adoption and collaboration
- Clear metrics improve executive visibility into application risk
Apply to Participate
Apply to participate in the San Francisco CISO Community Executive Summit.
Gartner facilitates exclusive, C-level communities by personally qualifying and understanding the priorities, challenges and interests of each member.
Our selective approach maintains the high quality of the network and ensures top-level discussions with peers from the world’s leading organizations.
Each application will be reviewed, and once your participation is confirmed, you will have access to year-round community programs.
Location
Venue & Accommodation
Grand Hyatt at SFOA block of rooms has been reserved at the Grand Hyatt at SFO at a reduced conference rate. Reservations should be made online or by calling 650-452-1234 . Please mention San Francisco Executive Summit to ensure the appropriate room rate.
Deadline to book using the discounted room rate of $309 USD (plus tax) is May 18, 2026.
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.
