Southern California CISO Community
Executive Summit
June 24, 2026 | The Waterfront Beach Resort
June 24, 2026
The Waterfront Beach Resort
Collaborate with your peers
Get together with Southern California's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.
Join your peers to discuss the most critical issues impacting CISOs today:
Strengthening cybersecurity's position as a creator and driver of business value
Fortifying cyber resilience to ensure rapid recovery from attacks and safeguard business continuity
Streamlining access management and controls across both traditional and non-human identities
Southern California CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.
Governing Body Co-Chairs

Matt Crouse
Solar Turbines
CISO

Trina Ford
iHeartMedia
SVP, CISO

Nemi George
Pacific Dental Services
VP, Information Security Officer

Arthur Lessard
Universal Music Group
SVP & CISO

David Tyburski
Wynn Resorts
VP, CISO
What to Expect
Agenda
Keynote Sessions
The Heart of Resilience — Leadership in a Dynamic World
Today’s cyber landscape demands a new rhythm for leadership. More than just tactical expertise, CISOs must elevate into true business partners who prepare their organizations not just for the threats of today but for the threats of tomorrow. Effective security leaders influence change, foster resilient teams, and, at the heart of it all, put people first even as technology evolves like never before.
Join Elliott Jones, CISO of Kaiser Permanente, as he shares his perspectives and stories on:
- Navigating the evolution to the modern day CISO
- Championing resilience with insights on the changing threat landscape and a focus on business continuity
- Cultivating adaptable teams and future‑ready talent to advance the security mission
Zero Trust & AI — Move from Reactive Response to Continuous AI Assurance
AI adoption is advancing faster than traditional security and governance models can absorb. Unmanaged AI usage, opaque model behavior, and emerging attack techniques—such as prompt injection and jailbreaks—can rapidly translate into data exposure, compliance concerns, and board-level scrutiny. Security leaders need an approach that enables AI while reducing operational volatility and producing governance that is defensible to risk stakeholders. A Zero Trust foundation across internet access, AI applications, SaaS, and private applications supports automated AI Red Teaming and secure access plus runtime guardrails to enforce policy in production.
Join this session to discuss:
- Implementing continuous AI Red Teaming to identify vulnerabilities and misuse paths across build, deploy, and runtime
- Operationalizing findings through policy-driven guardrails that help prevent data leakage, prompt injection, and unsafe content outcomes
- Delivering board-consumable governance with clear visibility into AI usage, risk posture, and remediation progress
What Makes an Effective CISO?
Details coming soon.
Breakout Sessions
Stop Hurting Yourself — Third-Party Risk in the Real World
Legacy third-party risk programs lean on exhaustive questionnaires that slow the business, obscure real risk, and collapse under the weight of emerging Generative AI governance demands. This talk walks through a scrappy, pragmatic approach to third-party risk and AI oversight that works with business partners instead of against them, enabling security and compliance without a formal TPRM program. It is imperfect by design, but it is readable, actionable, and aligned to how the business actually operates.
Expect key takeaways from this session to include:
- How third-party risk, Generative AI governance, and GRC can be woven together without heavyweight processes
- What a “good enough” TPRM model looks like when speed, clarity, and business enablement matter
- Practical techniques for partnering with the business to stay security- and compliance-aligned without becoming the department of no
Rethinking Security for Agentic AI — From Control to Orchestration
As AI agents start acting across business environments, data becomes the true control surface. These agents require broad access to data, identities, and business processes, creating new risk patterns as sensitive data and outbound actions converge at machine speed. This is a control shift. CISOs must modernize their data approach to adopt agentic AI confidently while maintaining oversight.
Join this session to explore how to:
- Detect emerging risk behaviors in autonomous AI
- Build a data-centric and intent-aware security model
- Establish the CISO as the orchestrator of scalable AI and business growth enabler
Peer-to-Peer Meetings Session
Peer-to-Peer Meetings
Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.
Executive Boardroom Sessions
Unifying Data Visibility — The AI Advantage for CISOs
CISOs are challenged by fragmented data landscapes, shadow IT, and the need for real-time visibility into sensitive information across different data estates including SaaS, cloud, and modern virtualization platforms. Manual discovery and governance processes can’t keep pace with today’s data sprawl, increasing risk and compliance exposure. Leveraging AI-driven data intelligence empowers CISOs to unify visibility, automate governance, and strengthen security posture.
Join this session to explore:
- Automating sensitive data discovery across environments
- Enabling continuous governance with AI insights
- Reducing risk through unified data intelligence
Agentic SOC — Amplifying Human Potential with AI
Security Operations Centers face mounting pressure from talent shortages and escalating threats, but agentic AI offers a transformative solution by amplifying human capabilities and automating critical tasks. By embedding intelligent agents into SOC workflows, organizations can rapidly upskill teams, accelerate response, and bridge the talent gap. Join this session to explore actionable strategies for leveraging AI-driven agents to future-proof your SOC.
Join this boardroom to explore:
- How agentic AI fills the talent gap in SOCs
- Strategies for upskilling teams alongside agent-driven automation
- Preparing your SOC for the coming AI transformation
Securing the Rise of AI Identities
According to the International Data Corporation, the number of AI identities is expected to reach 1.3 billion in just two years. Yet many organizations don’t secure AI identities effectively, granting excessive access and relying on outdated, slow processes.
Join this session to learn how to:
- Identify gaps in agent access visibility, ownership, and governance
- Address the unique challenges of identity security in AI environments
- Build scalable identity foundations to enable innovation and efficiency
It's Time to Add Personal Cyber Risk to the CISO Job Description
As threat actors target executives’ personal lives, CISOs must expand their leadership to include personal cyber risk, bridging identity management and board-level communication. This evolution is critical to influencing culture and driving comprehensive protection strategies.
Join this session to discuss:
- Optimizing identity and access management for executives
- Communicating personal risk and value to boards
- Expanding CISO influence beyond traditional boundaries
Proving ROI — AI Risk Reduction Strategies
CISOs have moved beyond AI experimentation. Now, executives ask: Are 2025’s investments actually reducing risk? The challenge is how to operationalize AI against evolving threats — and prove its value.
Join this session to discuss:
• Strategies for reducing high-risk incidents and fraud
• Embedding AI into core security operations to reduce risk
• Demonstrating risk reduction with actionable metrics
Governing Body Reception Session
Governing Body Reception
Finish the day sharing lessons learned with your peers over light fare and drinks at this closing reception hosted by your governing body members.
Apply to Participate
Apply to participate in the Southern California CISO Community Executive Summit.
Gartner facilitates exclusive, C-level communities by personally qualifying and understanding the priorities, challenges and interests of each member.
Our selective approach maintains the high quality of the network and ensures top-level discussions with peers from the world’s leading organizations.
Each application will be reviewed, and once your participation is confirmed, you will have access to year-round community programs.
Location
Venue & Accommodation
The Waterfront Beach ResortA block of rooms has been reserved at the The Waterfront Beach Resort at a reduced conference rate. Reservations should be made online or by calling 714-845-8000. Please mention SCES26 to ensure the appropriate room rate.
Deadline to book using the discounted room rate of $429 USD (plus tax) is June 1, 2026.
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.
