IN-PERSON

Southern California CIO Inner Circle

October 26, 2023 | The Colony House

October 26, 2023
The Colony House

Collaborate with your peers

Join Southern California's top CIOs for an intimate networking dinner and facilitated discussion on key business challenges. Enjoy a relaxed evening of dinner and drinks with your peers to share best practices, make new connections and build professional relationships.

Join your peers to discuss the most critical issues impacting CIOs today:

Taking a Proactive Cloud-First Approach to Cybersecurity

Staying Ahead of Cybercriminals in the Changing AI Landscape

Balancing the Need for Security with Need for Data Accessibility

Southern California CIO Governing Body


The Governing Body Co-Chairs shape the discussion topics and agenda, ensuring that all content is driven by CIOs, for CIOs.

Governing Body Co-Chairs

Ginny Davis

Technicolor
SVP, CIO & CSO

Allen Fazio

Houlihan Lokey
Chief Information Officer

Kelly Hamilton

Sony Pictures Entertainment
CIO

Chad Hamilton

Fremantle
VP, Technology

Michael Keithley

United Talent Agency
CIO

Theresa Miller

LionsGate Entertainment
CIO & EVP, IT

Greg Moore

KB Home
VP & CIO

Anthony Moses

Yamaha Motor Finance Corporation
Global Chief Strategy and Innovation Officer

Bryan Muehlberger

Vuori Clothing
Chief Information Officer

Thomas Phelps

Innovate UCLA
Executive Chair and Laserfiche CIO

Agenda


October 26, 2023

4:30pm - 5:30pm  Executive Networking Reception

5:30pm - 6:45pm  Discussion Topics

Challenging the Course – A Proactive Approach to Cybersecurity

Wil Rivera headshot

Wil Rivera

Sr Customer Engineering Manager

Google Chrome Enterprise

Wael Younan headshot

Wael Younan

Chief Information Officer/Chief Information Security Officer

CalOptima Health

Suzie Bonner headshot

Suzie Bonner

SVP & CIO

Reliance Steel & Aluminum

Thomas Phelps headshot

Thomas Phelps

Executive Chair and Laserfiche CIO

Innovate UCLA

Mark Hagan headshot

Mark Hagan

CIO

AMN Healthcare Services

Steve McMillan headshot

Steve McMillan

Head of IT Infrastructure Operations and Services

Mercury General Insurance

Today’s cybersecurity environment often feels like a race, and the enterprise’s position on the track is constantly shifting from first to last depending on the course they plot for themselves and the cybercriminals’ ability to stay ahead. Historically, the odds have been stacked against IT – the constantly changing landscape, a lack of dedicated resources, and the need for emerging skills are daily battles for the CIO and CISO. AI is rapidly changing the cybersecurity landscape. On the one hand, AI can be used to create powerful new security tools that can help organizations detect and respond to threats more effectively. On the other hand, AI can also be used by malicious actors to create more sophisticated attacks. Though it might feel like a zero-sum game, what if IT proactively took control by implementing cloud-first security approaches? Could these strategies keep the enterprise at the front of the pack?

Join this conversation with your peers to explore how IT could position themselves for success:

Keeping Pace with the Evolving Threat Landscape

  • What are the biggest threats that your organization is facing today, and how are you monitoring the threat landscape?
  • What are your top priorities for cybersecurity? What are your top challenges? How have you seen these goals and challenges shift over the last year?
  • As the enterprise is building complex cloud environments to help the organization be more agile and make decisions faster, how do you balance the need for security with the need for data accessibility and employee productivity?

Taking a Proactive Approach to Cybersecurity

  • How does your organization define proactive security control, and how has this approach helped your organization reduce the risk of cyberattacks?
  • What sort of challenges have you faced internally with securing funding for cybersecurity before an attack occurs? And the challenges when implementing cloud-based security features?
  • When securing funding, how have you justified the costs of proactive security control? What objections have you had to overcome in discussion with the board and leadership?

6:45pm - 7:15pm  Networking Break

7:15pm - 8:30pm  Summary Discussion & Dinner

8:30pm - 9:30pm  Social Hour

We look forward to seeing you at an upcoming in-person gathering


Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


MORE INFORMATION

Complimentary parking onsite.

Your Community Partners


Global Thought Leader

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Lauren Hursley

Senior Community Program Manager

503-575-8524

lauren.hursley@evanta.com