IN-PERSON

Southern California CISO Executive Summit

May 21, 2025 | Marriott Long Beach Downtown

May 21, 2025
Marriott Long Beach Downtown

APPLY TO PARTICIPATE

Collaborate with your peers

Get together with Southern California's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Strengthening cybersecurity's influence as a key factor in business decisions

Driving innovative ideas into a leadership vision that fosters cyber resilience and personal growth

Establishing trust and understanding amid complex compliance changes and data ecosystems

Southern California CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.

Governing Body Co-Chairs

Matt Crouse

Solar Turbines
CISO

Trina Ford

iHeartMedia
SVP, CISO

Todd Friedman

ResMed
CISO

Nemi George

Pacific Dental Services
Vice President, Information Security Officer

Arthur Lessard

Universal Music Group
SVP & CISO

Dan Meacham

Legendary Entertainment
VP & Global CISO

Jeremy Smith

Avery Dennison
VP, CISO

David Tyburski

Wynn Resorts
VP, CISO

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Southern California CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


May 21, 2025

8:00am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

Disruption Proof — High-Performing Teams that Conquer Change

Dr. Vijay Pendakur, Ph.D. headshot

Dr. Vijay Pendakur, Ph.D.

Leadership & Team Culture Strategy Advisor

Guest Speaker

In today’s fast-moving tech and security landscapes, disruption is inevitable—but it doesn’t have to derail your team’s performance. In this high-energy keynote, Dr. Vijay Pendakur will explore why disruption often leads teams to getting stuck and how this stagnation threatens business success. Using his Alchemy of Talent model, Dr. Pendakur will show how team complexity can become your superpower to conquer change. He’ll also share his three powerful catalysts that turn complexity into jet fuel for resilient, adaptable teams - and double-click on the first catalyst: trust.

Join this keynote to discover:

  • The critical impact that stuck teams have on business performances
  • How trust can unlock team potential and turn complexity into a competitive advantage
  • Actionable strategies to navigate change & help teams perform at their best when it matters most

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Executive Boardroom

Protecting Innovation — Rethinking Data Security Strategies

Howard Ting headshot

Howard Ting

CEO

Cyberhaven

AI makes creating and consuming data easier than ever, with shadow AI and dark data presenting new challenges to security teams. As the tactics for protecting data evolve, security leaders must adopt a risk-based strategy to protect mission-critical data and safeguard innovation.

Join this session to discover:

  • Effective practices for ongoing monitoring to identify risks
  • Rapid investigation and response techniques for insider threats
  • Strategies for evolving your data protection approach

9:40am - 10:25am  Executive Boardroom

True Defense Against API & Application Incidents

Larry Maccherone headshot

Larry Maccherone

Dev[Sec]Ops Transformation Architect

Contrast Security

Cybersecurity measures are adept at detecting and responding to incidents across various layers, but the application layer often remains vulnerable. Many organizations have a massive vulnerability backlog that demands timely and effective defense.

Join us to explore:

  • Understanding the scale of the backlog and strategies to prevent exploitation
  • The intricacies of application and API protection within the security operations ecosystem
  • Benefits of having a comprehensive blueprint that reveals attack surfaces, defenses, dangers, and connections

10:25am - 11:10am  Networking Break

10:35am - 11:00am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:10am - 11:55am  Breakout Session

Special Session by Cloudflare

Details coming soon!

11:10am - 11:55am  Breakout Session

Mastering Communication – Presenting with Impact

Diana Lovati headshot

Diana Lovati

CISO

AEG

Bashar Shaba headshot

Bashar Shaba

CISO

Hankey Group

Presenting to a boardroom, advisory committee or even just key stakeholders in your organization can be intimidating for any CISO. A truly impactful cyber leader who achieves consistent, desired outcomes has mastered speaking the language of the business. The next time you are in a high-pressured interaction to show alignment between cybersecurity objectives and organizational goals, you'll be able to stay confident using some tools from this session to drive successful results.

Join this interactive session to:

  • Talk through best approaches for clear, impactful presentations
  • Practice with peers on using fewer words that pack a punch
  • Learn how to help everyone leave the room feeling like they've won

11:10am - 11:55am  Executive Boardroom

Executive Boardroom Hosted by Google Cloud Security

 Details coming soon!

11:10am - 11:55am  Executive Boardroom

Taming Third Party Risk with Advanced Technologies

John Chisum headshot

John Chisum

VP, Solutions Consulting

RiskRecon - A MasterCard Company

Cyber threats are increasingly sophisticated and pervasive, making conventional TPRM approaches like questionnaires inadequate. AI/ML and threat intelligence have the potential to transform TPRM, as well as extending into 4th, 5th parties and beyond. Leveraging key insights can help CISOs stay ahead of evolving risks and enhance security programs, even with limited resources.

Join this session to discuss:

  • Practical strategies for leveraging threat intelligence in TPRM
  • Critical alignment of people and process elements with advanced technologies
  • Acting on useful insights and data to manage supply chain risk

11:55am - 12:30pm  Lunch Service

12:30pm - 1:05pm  Keynote

Lunch Keynote by Zscaler

Jay Chaudhry headshot

Jay Chaudhry

CEO, Chairman & Founder

Zscaler

Details coming soon!

1:05pm - 1:30pm  Break

1:30pm - 2:15pm  Breakout Session

Career Chess — Strategically Planning Your Next Move

Jeffrey Aguilar headshot

Jeffrey Aguilar

CISO

Hoag Health System

James Thurmond headshot

James Thurmond

CISO (Acting)

Los Angeles County, CA

Many tenured CISOs started their careers before "CISO" was even a position at most organizations. Now, if you ask 50 CISOs about their reporting structure and responsibilities, you'll likely get 50 different answers.  How do you decide what you want your CISO role to look like? And once that is done, do you play the long game and push for changes within your current position - refining your role?  Or do you opt for a bold move, declare checkmate and find a new organization that matches your vision for your future?

Join this session to learn:

  • When to say 'yes' or 'no' to that next job offer
  • How to prioritize the right fit
  • What the choice between public and private sector could mean

1:30pm - 2:15pm  Executive Boardroom

Employing Cyber Intelligence to Improve Resiliency

As cyber threats escalate, organizations must build resilience to effectively withstand and recover from attacks. Real-time threat intelligence provides CISOs with crucial insights to understand the company's risk landscape and respond swiftly. Cyber Threat Intelligence (CTI) is essential for fortifying resilience and enhancing communication with the C-suite and Board.

Join this session to discuss:

  • Leveraging CTI to align cybersecurity strategies with organizational goals
  • Using evidence-based threat intelligence to boost proactive defense and recovery
  • Improving communication with executive leadership on risk management strategies

1:30pm - 2:15pm  Executive Boardroom

Executive Boardroom Hosted by Abnormal Security

 Details coming soon!

2:15pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

Cyber Resiliency – Beyond the Headlines

Stephen Roberts headshot

Stephen Roberts

CISO

American Honda Motor Company

CISOs must protect their organizations from increasingly sophisticated cyber-attacks by preparing now to limit the impact and allow for as quick a recovery as possible. This requires a great defensive strategy that is practiced, communicated and understood throughout the organization well before any incident occurs. Balancing that preparation with what actually unfolds during an event is what fosters true resilience.

Join this interactive session to explore with peers:

  • Stories of detection and recovery – what strategies worked and which fell short
  • Mutual threat defense – the critical role of collaboration in the cybersecurity community
  • Best practices for organizational communication – before, during and after an incident

3:00pm - 3:45pm  Executive Boardroom

Executive Boardroom Hosted by Orca Security

Details coming soon!

3:45pm - 4:00pm  Networking Break

4:00pm - 4:35pm  Keynote

Closing Keynote

 Details coming soon!

4:35pm - 4:45pm  Closing Comments and Prize Drawing

4:45pm - 6:00pm  Governing Body Reception

Governing Body Reception

Finish the day sharing lessons learned with your peers over light fare and drinks at this closing reception hosted by your governing body members.

May 21, 2025

We look forward to seeing you at an upcoming in-person gathering


Gartner cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

Marriott Long Beach Downtown

A block of rooms has been reserved at the Marriott Long Beach Downtown at a reduced conference rate. Reservations should be made online or by calling (562) 437-5900. Please mention Southern California Exeuctive Summit to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $207 USD (plus tax) is April 28, 2025.

Your Community Sponsors


Global Thought Leader
CISO Thought Leader
Key Sponsors

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Zack Hellmann

Senior Community Program Manager

971-717-6691

zack.hellmann@gartner.com