Dallas CISO Community
Executive Summit
May 14, 2026 | Renaissance Dallas Richardson Hotel
May 14, 2026
Renaissance Dallas Richardson Hotel
Collaborate with your peers
Get together with Dallas's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.
Join your peers to discuss the most critical issues impacting CISOs today:
Steering GenAI Advancements Through Practical Governance
Securing Applications & Data to Protect Against Evolving Threats
Continuously Monitor & Manage Cyber Risk to Ensure Resilience
Dallas CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.
Governing Body Co-Chairs

David Bell
CBRE
SVP, CISO

Mustapha Kebbeh
Ultimate Kronos Group
VP & Chief Security Officer

Scot Miller
Mr. Cooper
SVP & CISO

Scott Moser
Sabre Corporation
SVP & CISO

Becky Palmer
National Life Group
VP & CISO

Shamoun Siddiqui
Upbound Group
VP & Global CISO
What to Expect
Agenda
8:00am - 8:30am Registration & Breakfast
8:30am - 9:15am Keynote
Opening Comments & Keynote
Cynthia Phillips
Sr. Director Analyst
Gartner
Session details coming soon.
9:15am - 9:40am Networking Break
9:40am - 10:25am Breakout Session
Rethinking Security for Agentic AI — From Control to Orchestration
Hosted by Cyera
Rick Holland
Data & AI Security Officer
Cyera
As AI agents start acting across business environments, data becomes the true control surface. These agents require broad access to data, identities, and business processes, creating new risk patterns as sensitive data and outbound actions converge at machine speed. This is a control shift. CISOs must modernize their data approach to adopt agentic AI confidently while maintaining oversight.
Join this session to explore how to:
- Detect emerging risk behaviors in autonomous AI
- Build a data-centric and intent-aware security model
- Establish the CISO as the orchestrator of scalable AI and business growth enabler
9:40am - 10:25am Breakout Session
Next Gen Identity — Advancing IAM for a Safer Enterprise
Jimi Mills
VP & CISO
Texas Instruments
As organizations mature their IAM strategies, CISOs must navigate increasingly complex processes involving third‑party vendors, lifecycle management, and role definition. The move toward Zero Trust calls for a holistic identity governance model—spanning workplace, workforce, and workload segmentation—to ensure secure, efficient access across the enterprise.
Join this session to:
- Examine strategies for implementing and governing IAM within a Zero Trust model
- Explore best practices for role design, entitlement control, and lifecycle management
- Discuss entitlement accuracy in constantly shifting environments
9:40am - 10:25am Executive Boardroom
Empowering Innovation While Strengthening Security and Control
Hosted by Island
Jason Trunk
VP & Field CTO
Island
Joe Paul
Director, Cybersecurity Compliance & Deputy CISO
Choreograph
Eric Puleo
CISO
Commercial Metals
As browser-based and unapproved applications reshape the future of work, CISOs face growing security and compliance risks, including data leakage and policy gaps. Proactively addressing these threats with effective safeguards protects enterprise data, supports innovation, and ensures resilience in an evolving workplace.
Join this session to discuss:
- Risks from unmanaged and shadow tools
- Policies to safeguard sensitive data
- Maintaining compliance and robust security controls
9:40am - 10:25am Executive Boardroom
Executive Personal Risk – The Newest Addition to the CISO's Domain?
Hosted by BlackCloak
Leslie Saravia
Director, Security & Compliance
Overhead Door Corporation
Aaron Munoz
CISO
Texas Christian University
Brian Hill
Field CISO, Client Advisory
BlackCloak
As threat actors target executives’ personal lives, CISOs must expand their leadership to include personal cyber risk, bridging identity management and board-level communication. This evolution is critical to influencing culture and driving comprehensive protection strategies.
Join this session to discuss:
- Optimizing identity and access management for executives
- Communicating personal risk and value to boards
- Expanding CISO influence beyond traditional boundaries
10:25am - 11:10am Networking Break
10:35am - 11:00am Peer-to-Peer Meetings
Peer-to-Peer Meetings
Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.
11:10am - 11:55am Breakout Session
Identity-Aware Resilience for Business Continuity
Hosted by Rubrik
Hema Mohan
GM and VP, Product Management
Rubrik
As identity compromise becomes the fastest path to operational disruption, CISOs must shift from blocking every attack to limiting its impact. Compromised users, machines, and services now dictate incident severity. Building identity aware resilience requires coordinated action across security, identity, IT operations, and recovery teams to contain incident spread, restore trusted state, and maintain continuity.
In this session to explore how to:
- Detect and contain identity driven incidents
- Prioritize accounts, systems, and data for rapid recovery
- Strengthen cross functional collaboration with continuity metrics
11:10am - 11:55am Breakout Session
Decoding Tomorrow’s Threats — Trends & Insights Unveiled
Hosted by Google Cloud Security
Tarah Lewis
Global Security Architect
Google Cloud Security
CISOs today are pulled in multiple directions, facing a relentless onslaught of evolving threats while balancing competing priorities and limited resources. As adversaries leverage new technologies—especially AI—organizations must rethink how they utilize threat intelligence and set security priorities. Yet, with historical knowledge and ongoing engagement in adversary tracking, there is hope: we can anticipate and outmaneuver tomorrow’s threats.
Join this session to explore:
- Key findings and use cases from 2025
- Predictions for 2026’s threat landscape and adversary tactics
- Actionable strategies for prioritizing and mitigating emerging threats
11:10am - 11:55am Executive Boardroom
AI Security – Turning Agents into Security Allies
Hosted by Microsoft Corporation
Dewakar Garg
CISO
FleetPride
Russ Murrell
CISO
Texas Capital
Saira Mohammed
Chief Security Advisor
Microsoft Corporation
The dual nature of AI is here - extraordinary innovation paired with complex risks. According to recent reports, more than 29% of employees have turned to unsanctioned AI agents for work tasks and these unsecured agents lack clear visibility into what they can do, what they access, or the blast radius they introduce. CISOs must secure AI agents with the same rigor as human users, ensuring visibility, governance, and robust controls amid rapid change and resource constraints.
Join this boardroom to discuss:
- Enforcing Zero Trust principles for both human and AI identities
- Establishing continuous observability and monitoring of AI agent activity
- Implementing governance frameworks to manage access, actions, and compliance
11:10am - 11:55am Executive Boardroom
Securing Tomorrow — Rethinking Data Recovery Strategies
Hosted by Veeam
Brian Higginbotham
VP & CISO
SRS Distribution
Shamoun Siddiqui
VP & Global CISO
Upbound Group
Simon Le Comte
VP, Systems Engineering
Veeam
CISOs are challenged by the growing sophistication of cyberattacks and the increasing complexity of IT environments, making traditional recovery approaches insufficient. Ensuring rapid, reliable recovery is now central to organizational resilience and trust, yet many security leaders struggle to integrate recovery into overall security strategy. Exploring new paradigms in cyber recovery can empower CISOs to proactively safeguard business continuity.
Join this session to explore:
- Integrating recovery into incident response plans
- Assessing cyber resilience beyond prevention
- Bridging gaps between security and IT operations
11:55am - 12:30pm Lunch Service
Apply to Participate
Apply to participate in the Dallas CISO Community Executive Summit.
Gartner facilitates exclusive, C-level communities by personally qualifying and understanding the priorities, challenges and interests of each member.
Our selective approach maintains the high quality of the network and ensures top-level discussions with peers from the world’s leading organizations.
Each application will be reviewed, and once your participation is confirmed, you will have access to year-round community programs.
Location
Venue & Accommodation
Renaissance Dallas Richardson HotelParking
- Parking garage is located across from the Hotel
- $15 Overnight self-parking
- $10 Day self-parking (must get validation from Hotel)
- Valet Parking
- $20 Overnight valet parking
- $15 Day valet parking
A block of rooms has been reserved at the Renaissance Dallas Richardson Hotel at a reduced conference rate. Reservations should be made online or by calling 800-264-0359. Please mention Gartner Dallas Executive Summit to ensure the appropriate room rate.
Deadline to book using the discounted room rate of $184 USD (plus tax) is April 20, 2026.
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.
