In-Person

Southern California CISO Community

Executive Summit

December 10, 2025 | Marriott Long Beach Downtown

December 10, 2025
Marriott Long Beach Downtown

Collaborate with your peers

Get together with Southern California's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Amplifying cybersecurity as a critical influence in business decisions

Fortifying cyber resilience to ensure rapid recovery from attacks and safeguard business continuity

Optimizing opportunities and understanding threats presented by new technologies

Southern California CISO Governing Body

The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.

Governing Body Co-Chairs

Matt Crouse

Solar Turbines
CISO

Trina Ford

iHeartMedia
SVP, CISO

Nemi George

Pacific Dental Services
Vice President, Information Security Officer

Arthur Lessard

Universal Music Group
SVP & CISO

Dan Meacham

Legendary Entertainment
VP & Global CISO

David Tyburski

Wynn Resorts
VP, CISO

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Southern California CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda

December 10, 2025

8:00am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

The Performance Paradox — Navigating Peak Performance with Mental Health in Mind

Kara Hardin headshot

Kara Hardin

Registered Psychotherapist & Founder of The Practice Lab

Guest Speaker

In high-achieving environments, the drive to succeed often comes at a quiet cost: exhaustion, disconnection, and a sense that no matter how much we accomplish, it’s never quite enough. When productivity becomes the only measure of worth, rest feels impossible—and burnout starts to look like the norm. But it doesn’t have to be.

In this keynote Kara Hardin, former lawyer, and mental health educator explores why our current approach to performance is backfiring—and what we can do instead. Through research, relatable stories, and practical tools, we’ll unpack:

  • How common ideas about time, efficiency, and productivity are quietly harming individual and collective well-being
  • Why mental health isn’t the reward for high performance—it’s the foundation
  • What leaders can do (for themselves and their teams) to build a healthier, more sustainable relationship with work

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

The Convergence of Physical and Cyber Securities

Brian Barrios headshot

Brian Barrios

Vice President & Chief Security Officer

Southern California Edison Company

Attackers don’t care about traditional organizational lines and roles. No matter the industry, CISOs are paying closer attention to the connections between cyber and physical securities. Threat detection in the cyber space is one thing but using that information to enhance security or even stop crimes in the physical world — is next level. Being able to quickly mobilize after finding risks could prevent damages or loss to an organization — or maybe even save lives. 

Join this session to explore:

  • Expanding your risk lens to see the connection between cyber and physical threat detection
  • Communicating the scale and gravity of information uncovered to your business and related organizations
  • Reporting structures of cyber and physical security teams

9:40am - 10:25am  Breakout Session

Turning the Tables — Winning Against Identity Impersonation

Jeff Farinich headshot

Jeff Farinich

SVP Technology and CISO

New American Funding

From Scatter Spider to the DPRK, attackers are walking through the front door of organizations by exploiting one blind spot: the lack of Identity Verification (IDV). Despite heavy investments in MFA, IGA, PAM, and even emerging controls like JIT and NHI, identity impersonation remains wide open—and it’s fueling some of today’s most high-profile breaches.

In this session, hear the inside story of New American Funding’s IDV journey. Learn how to:

  • Build executive support and overcome adoption hurdles
  • Deploy protections against liveness bypass and deepfake fraud
  • Close one of the most dangerous gaps in identity security before your organization becomes the next headline

9:40am - 10:25am  Executive Boardroom

The Future of Third-Party Risk Management

Stephen Roberts headshot

Stephen Roberts

Global CISO

Honda Motor

CISOs are ready for a fresh approach to third-party risk management that's proactive, automated, and scalable. Real-time, continuous visibility into cyber risks across the entire attack surface is essential in today's complex environment. Also essential is the need to communicate those immediate risks to the business.

In this session, go beyond just compliance to discuss:

  • Practical strategies achieving comprehensive 3rd, 4th, 5th, etc. party risk visibility
  • Automation for faster onboarding and continuous monitoring of vendors
  • Actionable insights about financial impacts that support board-level reporting

10:25am - 11:10am  Networking Break

10:35am - 11:00am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:10am - 11:55am  Breakout Session

Over the Horizon — CISOs to Chief Cyber Resilience Officers

The CISO remit increasingly includes GenAI governance, securing cyber-physical systems, and a range of value-driving services — yet its core charge remains safeguarding operations. As breaches become inevitable and board risk appetites shift, cyber resilience will demand even greater focus. CISOs must define recovery goals, guarantee reliable backups, and restore critical services with speed — focusing on measurable resilience to earn their future role as Chief Cyber Resilience Officers.

Join this session to learn about:

  • Defining and measuring resilience for real business outcomes
  • Orchestrating reliable backup and rapid recovery strategies
  • Embedding resilience across teams as a cultural and leadership priority

11:10am - 11:55am  Executive Boardroom

Advancing Cyber Resilience and Recovery Strategies

Josh Iroko headshot

Josh Iroko

Senior Cybersecurity Advisor

Google Cloud Security

CISOs must proactively address evolving threats by strengthening organizational resilience and disaster recovery capabilities. Protecting critical assets and maintaining robust, regularly tested recovery processes are key to reducing risk and business disruption. Effective collaboration between security leadership and business stakeholders drives strategic success.

Join this boardroom to discuss with your peers:

  • Methods for identifying and safeguarding critical assets within the security framework
  • Implementing best practices for ongoing testing, certification and hardening of recovery environments
  • Enhancing collaboration between security teams and executive leadership to align resilience strategies with business objectives

11:10am - 11:55am  Executive Boardroom

Law & Order – The Essential Relationship Between Cyber & Legal

With cyber threats escalating and the increase of legal and financial risks, CISOs must collaborate with their legal teams. Between new regulations, vendor risk management, incident response, AI innovations, M&A and more – building a collaborative partnership is essential.  Plus – how do CISOs make sure they themselves are protected legally?

Join this session to discuss:

  • Strategies to foster collaboration with your legal team
  • Real scenarios and timelines on when to loop in legal
  • Essential questions to ask legal counsel about your own personal liability

11:55am - 12:30pm  Lunch Service

12:30pm - 1:05pm  Keynote

Security and Data Collide — Navigating AI Risk and Innovation

Sol Rashidi headshot

Sol Rashidi

Chief Strategy Officer, Data & AI

Cyera

AI won’t fix broken data. Governance is the key to transforming fragmented, unreliable information into trusted, strategic insight. As AI becomes embedded across the enterprise, the divide between information security and the data and analytics function is collapsing. Security leaders focused on protecting data now intersect with data leaders tasked with leveraging it. AI governance sits at the center of this convergence—where innovation meets accountability. CISOs have a unique opportunity to move from backend defenders to strategic enablers, shaping how AI scales safely across the business.

Join this session to learn how to:

  • Build governance models that bridge security and data strategy
  • Mitigate AI risk through cross-functional collaboration
  • Enable trust through unified governance practices

1:05pm - 1:30pm  Networking Break

1:30pm - 2:15pm  Breakout Session

Security Leadership in the Age of Agentic AI

Rosalia Hajek headshot

Rosalia Hajek

VP & CISO

Topgolf Callaway Brands Corp.

Phil Malatras headshot

Phil Malatras

CISO & VP

Western Digital Corporation

Agentic AI is not just the latest tool, but an autonomous collaborator that must be managed through the balance of people, technology, and governance.  How is CISO role impacted by this technology? And how can the CISO impact the business through implementation?

Join this session to hear about:

  • Real-world Agentic AI use cases from the CISO lens
  • Communication needed with stakeholders and security teams
  • The role governance plays in accountability, including IAM

1:30pm - 2:15pm  Executive Boardroom

Cyber Meets Cents — Talking Cost Optimization

Trina Ford headshot

Trina Ford

SVP, CISO

iHeartMedia

As technologies evolve, organizations are pushed into a new era of efficiency and competitiveness. CISOs are creating comprehensive strategies to prioritize data governance and privacy, but those strategies must also align with business goals. How are CISOs balancing the budget so they can deliver on security and also bring value back to the business?

Join your CISO community to discuss:

  • Zeroing in on the right investments that will deliver value back to the business
  • Assessing security and privacy needs with what the budget allows
  • Tackling tech debt and considering the simplification of tools

1:30pm - 2:15pm  Executive Boardroom

Lessons Only a Breach Can Teach

Despite investing in the appropriate solutions and conducting numerous tabletop exercises to prepare for a possible attack, the questions often linger: How helpful will your IR playbook actually be? How quickly will you be able to mobilize leadership? How will you handle the stress?

Join this session to discuss:

  • Factors that really make a difference in preparing for a breach
  • Fundamental priorities while actively responding and recovering
  • Post-incident hindsight and reflections

2:15pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

A 360° View of Emerging Insider Threats – An Interactive Workshop

Ravi Nori headshot

Ravi Nori

Head of Cybersecurity

goPuff

From sophisticated adversaries to well-meaning employees –insider threats are top of mind for the sharp CISO. What are your fellow security leaders doing to keep a pulse on emerging threats and outsmarting the threats within?

Join this interactive session to:

  • Get a 360° view of the emerging insider threats that CISOs are watching
  • Analyze real-world attacks, both malicious and accidental
  • Collaborate with peers about strategies and tools used to improve resilience

3:00pm - 3:45pm  Executive Boardroom

CISO Leadership Strategy – A Focus on Fundamentals or Emerging Tech?

Jeff Farinich headshot

Jeff Farinich

SVP Technology and CISO

New American Funding

John Leitgeb headshot

John Leitgeb

CISO

Kingston Technology

CISOs are often caught between maintaining strong cybersecurity fundamentals and the pressure to adopt cutting-edge technologies. Are you focused on cybersecurity basics to get the day-to-day job done? Or are you eyeing the newest innovative technologies to tackle potential emerging threats that aren’t even fully understood yet? Is there a balance?

Join this session to talk through:

  • How to balance the focus between cybersecurity basics 101 & cutting-edge technologies
  • Which emerging threat trends to watch or ignore
  • How to better align your cybersecurity strategies with the organization’s goals

3:00pm - 3:45pm  Executive Boardroom

Leveraging AI and Automation for Data Protection

Data is the life blood of organizations. To stop breaches, CISOs must have a clear understanding of what data their organization has, where it resides, its risk, who can access it, and how it's used.  But instead of being in “classification hell” as one CISO called it, how can AI and automation be leveraged to protect your most precious data?

Join this session to discuss:

  • Gaining data visibility as a foundation for governance including data loss prevention strategies
  • Leveraging AI to proactively identify and mitigate threats
  • Navigating evolving data security regulations and standards across complex environments

3:45pm - 4:00pm  Networking Break

4:00pm - 4:50pm  Gartner Keynote

Leveling Up from Security Leader to Business Influencer

Ash Ahuja headshot

Ash Ahuja

VP, Global Role Lead & Executive Partner, Security & Risk Management

Gartner

Scot Hutton headshot

Scot Hutton

SVP, Information Security & IT Risk

Alexandria Real Estate

With constant innovation in AI and other technologies, CISOs face questions from the C-Suite and the board that are more high stakes than ever. But high-pressure moments can also be opportunities to shine—transforming a technical security leader into a persuasive, savvy CISO who can win over even the toughest executives.

Join this session to learn about:

  • Mastering communication by speaking the language of business & improving storytelling
  • Championing cybersecurity business cases—even when the budget stakes are high
  • Delivering presentations that pack a punch, leaving everyone in the room feeling invested in your vision

4:50pm - 5:00pm  Closing Comments and Prize Drawing

December 10, 2025

We look forward to seeing you at an upcoming in-person gathering

Gartner cares about the health and safety of our community. If you are feeling unwell, please refrain from attending the conference. At this time, Gartner does not have any health-related requirements in place for attendance. Should this change, we will follow up with updated guidance.

Location

Venue & Accommodation

Marriott Long Beach Downtown
More Information

A block of rooms has been reserved at the Marriott Long Beach Downtown at a reduced conference rate. Reservations should be made online or by calling 1-888-236-2427.

Deadline to book using the discounted room rate of $250 USD (plus tax) is November 10, 2025.

Your Community Sponsors

CISO Thought Leaders

Key Sponsors

Program Sponsor

Community Program Manager

For inquiries related to this community, please reach out to your dedicated contact.

Zack Hellmann

Senior Community Program Manager

971-717-6691

zack.hellmann@gartner.com