
Southern California CISO Community
Executive Summit
May 21, 2024 | Marriott Long Beach Downtown
May 21, 2024
Marriott Long Beach Downtown
Collaborate with your peers
Get together with Southern California's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.
Join your peers to discuss the most critical issues impacting CISOs today:
Advancing business growth and modernization through solid budgeting and prioritization
Establishing security's critical role in protecting and advancing the business through AI adoption
Improve and Achieve Operational Resilience
Southern California CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.
Governing Body Co-Chairs

Matt Crouse
Solar Turbines
CISO

Lara Divi
Dine Brands Global, Inc.
VP, CISO

Todd Friedman
ResMed
CISO

Arthur Lessard
Universal Music Group
SVP & CISO

Dan Meacham
Legendary
VP, Global Security and Corporate Operations, CISO

Emily O'Carroll
Topgolf Callaway Brands Corp.
Sr. Director, Global Information Security & IT Compliance

David Tyburski
Wynn Resorts
Vice President, Chief Information Security Officer
What to Expect
Agenda
7:45am - 8:30am Registration & Breakfast
8:30am - 9:15am Keynote
Body Language — Secrets for Enhanced Executive Presence
Hosted by Netskope

Chris Ulrich
Body Language Expert
Guest Speaker
Uncovering the mysteries of body language — how people communicate their thoughts and feelings without saying a word — is a decisive first step toward mastering any business and social situation. Top executives know that detecting split-second signals from your team and leadership then taking immediate action is crucial to being a persuasive communicator and problem-solver especially during tricky internal matters or high-level negotiations.
During this session you will learn how to:
- Move beyond the vacuum of artificial body language to a behavioral approach based on YOU
- Strengthen interpersonal relationships, be a more decisive leader and manage your nerves better
- Uncover the less obvious needs of others and improve your team’s confidence and competence
9:15am - 9:40am Networking Break
9:40am - 10:25am Breakout Session
The Imperatives of PAM
Hosted by AppOmni

Emily O'Carroll
Sr. Director, Global Information Security & IT Compliance
Topgolf Callaway Brands Corp.

Jonathan Chow
Chief Information Security Officer
Genesys

Arthur Lessard
SVP & CISO
Universal Music Group
Organizations have suffered relentlessly from cyberattacks, each week it seems there are new headlines highlighting ransomware attacks or data breaches. With the sensitivity of privileged accounts, unpatched vulnerabilities, and an extensive remote workforce, privileged access management (PAM) is essential to securing your most critical systems and data. Implementing this is not a quick fix it’s a journey.
Join this panel session to:
- Discuss the difference between PAM solution and password management
- Address different approaches to solving the Privilege Access Management problem
- Gain executive buy in from legal, HR and IT on effective solutions
9:40am - 10:25am Breakout Session
AI Vs AI - How Adversaries and Security Teams Use AI
Hosted by SentinelOne

Mani Keerthi Nagothu
Americas Field CISO Associate Director
SentinelOne
With the explosion of Generative AI into widespread use over the past year, there are rising indications that threat actors are exploiting AI to launch cyberattacks. Tackling the evolving threat landscape means getting ahead of the threat - cyber defenders need to be prepared, using the power of AI to defend their organizations.
Join this session to discuss:
- Analyzing how threat actors use AI offensively in their attack methods
- Turning the tables on attackers by leveraging emerging technologies to bolster cybersecurity defense
- Deploying AI for maximum impact to build capabilities and improve incident response
9:40am - 10:25am Executive Boardroom
Risk to the Nth-Party Degree
Hosted by RiskRecon, a Mastercard Company

John Chisum
VP, Solutions Consulting
RiskRecon - A MasterCard Company

Scott Niebuhr
Director of Cybersecurity
Aerospace Corporation

Joel Simangan
Chief Information Security Officer
Los Angeles Unified School District
Third party relationships are closest and may prove to be the most tangible risks to your business, yet the whole supply chain of your business partners still pose a substantial threat. Most organizations’ vendor relationship extend to the 8th party. CISOs need to understand this web of connectedness in order to better manage and communicate enterprise risk.
Join this session to discuss:
- Gaining visibility into risk across the whole supply chain
- Strategies for effective risk management and monitoring business partners
- Overcoming resource challenges to prioritize third-party and extended supply chain risk
9:40am - 10:25am Executive Boardroom
Organizational Risk Mitigation — Protecting Humans from Themselves
Hosted by Proofpoint

Ryan Kalember
Chief Strategy Officer
Proofpoint

Anthony Chogyoji
CISO
Riverside County

Mike Cushing
Head of Global Information Security
Patagonia
Sometimes it's hard to see a future beyond ransomware, BEC and data loss. But how do we not only ensure our cyber defense teams and the workforce they protect stay afloat in the current risk landscape, while simultaneously building toward future consolidation and risk mitigation scenarios?
Join this session to discuss:
- Developing a human risk framework
- Moving human-centric security controls from reactive and manual to proactive and automated
- Leveraging AI to protect humans from themselves
10:25am - 11:05am Networking Break
10:30am - 10:55am Peer-to-Peer Meetings
Peer-to-Peer Meetings
Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.
11:05am - 11:50am Breakout Session
The CISO as a Savvy Board Communicator
Hosted by Red Canary

Todd Friedman
CISO
ResMed

Sunil Agarwal
CISO, VP Information Security and Risk Management
OSI Systems

Trina Ford
SVP, CISO
iHeartMedia
Translating the organization's cybersecurity posture to the board can be a catalyst in improving organizational resilience and building strong rapport. How do you communicate security initiatives clearly when the stakes are high?
Join this session to discuss:
- Leveraging your expertise to build trust
- Demystifying cybersecurity spending
- Translating cybersecurity into actionable language
11:05am - 11:50am Executive Boardroom
The Business of Security — Bridging the Gap Between Cyber Initiatives and Business Impact
Hosted by Expel

Justin Bajko
Co-Founder, VP, Strategy & Business Development
Expel

Alex Hall
Global CISO
Gensler

Steve Schwartz
Vice President and CISO
Lionsgate Entertainment

Jessica Sica
Head of Security
Weave Communications
Economic trends have tightened purse strings everywhere, leaving CISOs and security leaders to demonstrate ROI and defend their budgets. But ROI is notoriously tough to quantify when the primary return for security investment is reduction in risk. As a result, bridging the gap between security investments and actual business impact can be easier said than done, particularly if your cybersecurity spend doesn’t clearly map to organizational goals.
Join this session to discuss:
- Identifying the right metrics for quantifying security ROI and business impact
- Positioning security as a business enabler, rather than a cost center
- Aligning security investments to organizational goals
11:05am - 11:50am Executive Boardroom
Navigating the New AppSec Terrain — A CISO’s Guide
Hosted by Checkmarx

James Brotsos
Head of Product Management
Checkmarx

Brett Cumming
Sr. Director, Information Security Officer
Skechers

Tony Velleca
CISO
UST Global
We know that a comprehensive AppSec program is critical for a successful business. With cloud-based applications expanding and AI-generated code offering both opportunities and risks, CISOs must navigate a drastically changed threat landscape. So, how can CISOs effectively manage their AppSec initiatives to ensure comprehensive security across the SDLC, despite the expanding complexities?
In this session, we’ll discuss the value of:
- Streamlining developer workflows with integrated security tools to boost developer experience
- Consolidating tools to simplify operations and tackle tool sprawl
- Utilizing AI to enhance security and increase productivity across teams
11:50am - 12:35pm Lunch Service
Apply to Participate
Apply to participate in the Southern California CISO Community Executive Summit.
Gartner facilitates exclusive, C-level communities by personally qualifying and understanding the priorities, challenges and interests of each member.
Our selective approach maintains the high quality of the network and ensures top-level discussions with peers from the world’s leading organizations.
Each application will be reviewed, and once your participation is confirmed, you will have access to year-round community programs.
Location
Venue & Accommodation
Marriott Long Beach DowntownImportant Details: The hotel has changed their name from Renaissance Long Beach to Marriott Long Beach Downtown. The address is 111 E Ocean Boulevard, Long Beach, CA. 90802.
Parking:
Parking Garage Onsite : Overnight: $30, Day Rate: $25
A block of rooms has been reserved at the Marriott Long Beach Downtown at a reduced conference rate. Reservations should be made online or by calling 562-437-5900. Please mention Renaissance Long Beach Hotel to ensure the appropriate room rate.
Deadline to book using the discounted room rate of $269 USD (plus tax) is April 29, 2024.
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.