IN-PERSON

Southern California CISO Inner Circle

September 25, 2019 | Dodger Stadium

September 25, 2019
Dodger Stadium

Collaborate with your peers

Get together with your peers to tackle top business challenges through peer-driven content and discussions at the Southern California CISO Inner Circle.

Join your peers to discuss the most critical issues impacting CISOs today:

Strategies for a risk-aligned, resilient organization

Developing and investing in the security workforce of tomorrow

Creating business value and supporting agile business operations

Southern California CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Bently Au

AEG Worldwide
VP, CISO

Nikolay Chernavsky

PennyMac Mortgage Investment Trust
SVP & CISO

Matt Crouse

Taco Bell Corporation
Director of Information Security

Delaram Divi

Dine Brands Global
VP, CISO

Arthur Lessard

Universal Music Group and Brands
SVP & CSO

Dan Meacham

Legendary Entertainment
Vice President, Security & Operations

Nick Reva

Snap Inc.
Security Engineering Lead

Marty Simmons

Kite Pharma
Director, IT Security & Compliance

Terrence Weekes

Jack in the Box
CISO

Agenda


September 25, 2019

4:00pm - 5:00pm  Executive Networking Reception

5:00pm - 6:30pm  Discussion Topics

An Embedded and Sustainable Culture of Security

Kimberly Ebright headshot

Kimberly Ebright

VP & Chief Privacy Officer

loanDepot

Eddie Galang headshot

Eddie Galang

Chief Information Security Officer

Port of Long Beach

Wes Gavins headshot

Wes Gavins

CISO

NASA Jet Propulsion Laboratory

Gary Martino headshot

Gary Martino

Director of Information Security

AMN Healthcare

Michael Mongold headshot

Michael Mongold

Director, Information Security

Deckers Brands

Jared Phillips headshot

Jared Phillips

Digital Security Manager

Red Bull

A.J. Soria headshot

A.J. Soria

Director of Information Security

Age of Learning

Chris Niggel headshot

Chris Niggel

Sr. Director, Security & Compliance

Okta

Do you know who your champions are? Just as risk management is about so much more than being compliant, creating a culture of security requires more than baseline awareness. It’s about creating champions – in your Board, employees, and your customers. It’s also about enmeshing security into the heart of your digital vision and core business processes with security-first mindsets. Uncover tangible steps with your peers to weave security into the fabric of your organization’s culture and competitive position.  

Processes and Planning

  • Where does responsibility for security lie within your organization (and where should it lie)? Centralized within a single group, across several groups, with department heads?
  • When launching digital initiatives, what are some tactics you’ve employed to bring security into the conversation early and continuously?
  • What tools or frameworks (SOAR tools, virtualization, etc) do you use to gain insight into evolving systems, devices, things, and data across your environment? How do you maintain visibility into new tools and initiatives that may increase risk?  

One Size Fits None?

  • Security awareness needs are unique to every organization: How successful would you consider your current security awareness programs, and how do you measure them?
  • Moving past awareness and into engagement: how do you tailor security education for every part of the business (first-level to the Board)? What are some strategies that work to embed security into everyday activities and functions?
  • Do you have/are you planning to launch a “security champion” program? How do you identify and train potential champions, and with whom should CISOs partner to lead/launch the program?  

Thriving and Sustainable

  • How do you continuously draw clear connections between business objectives and risk?
  • How do you balance business autonomy and scale in deploying new digital technologies with security controls? What safeguards need to be in place?
  • Digital customers (internal and external) expect a level of personal control and customization – how should CISOs look at delivering on those expectations while still minimizing risk?
  • As a security leader, how do you specifically build your influence in the organization, and the influence of the security function?

6:30pm - 7:00pm  Networking Break

7:00pm - 8:00pm  Summary Discussion & Dinner

8:00pm - 9:00pm  Social Hour

Location


Your Community Partners


National Thought Leader
Summary Discussion Partner
National Sponsors
Local Sponsors
Global Thought Leader

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Kody Paine

Senior Program Manager

971-222-2377

kody.paine@evanta.com