In-Person

Boston CISO Community

Executive Summit

June 10, 2026 | Boston Marriott Burlington

June 10, 2026
Boston Marriott Burlington

Collaborate with your peers

Get together with Boston's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Steering GenAI Advancements Through Practical Governance

Enhancing Access Management Across Conventional & Automated Identities

Continuously Evaluating & Enhancing Security Solutions to Address Evolving Risks

Boston CISO Governing Body

The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.

Governing Body Co-Chairs

Julie Fitton

Analog Devices
CISO

Javed Ikbal

Bright Horizons
VP/CISO

Jasvinder Khera

John Hancock
AVP & CISO

Brian McGowan

SharkNinja
CISO

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Boston CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda

Executive Boardroom Sessions

Ransomware Recovery — Beyond Backup Basics

Ransomware attacks are escalating in frequency and impact, exposing gaps in traditional backup and recovery strategies. CISOs must move beyond conventional approaches to ensure rapid, reliable restoration and minimize business disruption. Proactive ransomware recovery planning is critical for safeguarding operations and reputation.

Join this session to explore:

  • Designing ransomware-resilient backup architectures
  • Accelerating recovery to reduce downtime
  • Testing and validating recovery processes regularly

Proving ROI — AI Risk Reduction Strategies

CISOs have moved beyond AI experimentation. Now, executives ask: Are 2025’s investments actually reducing risk? The challenge is how to operationalize AI against evolving threats — and prove its value.

Join this session to discuss:

  • Strategies for reducing high-risk incidents and fraud
  • Embedding AI into core security operations to reduce risk
  • Demonstrating risk reduction with actionable metrics

Exposed! How AI-Powered Exposure Management Is Revolutionizing Cyber Defense

AI-Powered Exposure Management is revolutionizing cyber defense as the future of cyber risk reduction. As attack surfaces expand across cloud, identity, OT, AI, and emerging technologies, traditional approaches leave CISOs struggling with fragmented visibility and reactive decision-making. 

This session will examine why security leaders are pivoting toward exposure management and how to address common challenges when:

  • Shifting strategy from reactive vulnerability patching to proactive exposure management
  • Unifying risk data with business context, prioritizing the most critical exposures, and translating technical findings
  • Addressing unique security and risk challenges presented by generative AI and autonomous systems

From Noise to Knowledge — Using AI to Strengthen Cyber Risk and Compliance

Security and compliance leaders are under mounting pressure to deliver defensible, audit-ready decisions in real time—across expanding attack surfaces, tightening regulatory mandates, and increasingly complex control environments. With AI on the scene, it is now more critical for boards to understand not just the threats, but their potential business impact. Using context-aware AI to strengthen AI governance, improve threat detection, and generate defensible documentation for regulatory compliance helps teams stay compliant and measure security posture accurately.

In this session, you will learn: 

  • Practical steps for implementing better data strategies for continuous risk
  • What it means to strengthen AI governance with explainable, traceable decision logic & accelerate root cause analysis
  • Ways to improve risk management by translating technical terms into simple KPIs and dashboards the board can understand



Keynote Sessions

Resilient by Design — Strengthening Security as AI Transforms the Enterprise

CISOs face a dual AI mandate: enabling the business to scale AI capabilities while securing the organization against new AI‑driven risks. Externally, they must support massive data demands and embed intelligence to help teams operationalize AI effectively. Internally, rapid generative AI adoption requires strong governance, secure tooling, and focus on high‑value use cases. As attackers increasingly weaponize AI, CISOs must leverage AI strategically to keep pace, drive ROI, and strengthen resilience.

Join this keynote to learn how to:

  • Balance rapid AI adoption with the governance needed to manage organizational risk
  • Build secure, high‑performance foundations for large‑scale AI data demands
  • Strengthen security by applying AI to match the speed of evolving threats


Empowering Innovation While Strengthening Security and Control

As browser-based and unapproved applications reshape the future of work, CISOs face growing security and compliance risks, including data leakage and policy gaps. Proactively addressing these threats with effective safeguards protects enterprise data, supports innovation, and ensures resilience in an evolving workplace.

Join this session to discuss:

  • Risks from unmanaged and shadow tools
  • Policies to safeguard sensitive data
  • Maintaining compliance and robust security controls


Breakout Sessions

Competitive Edge – United by Security & Data

Business performance improves when the CISO and CDAO work closely together. Their collaboration ensures that data is both protected and fully leveraged, enabling faster insights, more responsible AI adoption, and stronger governance across the enterprise. By combining innovation with disciplined security, this partnership empowers the organization to move quickly, confidently, and competitively.

Join this session to discuss

  • How security and data leadership boosts business performance
  • Ways to protect data while accelerating insights and responsible AI use
  • Strategies to combine innovation and security to move faster and stay competitive

Rethinking Security for Agentic AI — From Control to Orchestration

As AI agents start acting across business environments, data becomes the true control surface. These agents require broad access to data, identities, and business processes, creating new risk patterns as sensitive data and outbound actions converge at machine speed. This is a control shift. CISOs must modernize their data approach to adopt agentic AI confidently while maintaining oversight.

Join this session to explore how to:

  • Detect emerging risk behaviors in autonomous AI
  • Build a data-centric and intent-aware security model
  • Establish the CISO as the orchestrator of scalable AI and business growth enabler

Securing the Agentic Workforce

As AI agents move from passive tools to active workforce members, CISOs face new governance and security challenges. The risks of rapid, autonomous action are real—but so are the opportunities for transformation. This session offers a practical, forward-looking approach to securely unlocking the value of agents.

Join this session to explore:

  • Reining in shadow agents
  • Protecting agents from malicious context
  • Protecting your business from rogue agents

Leadership Playbook for Identity Governance

Modern IAM strategies demand navigating a growing web of vendors, access lifecycles, and role structures—all while maintaining security and efficiency. Zero Trust further raises the bar, requiring organizations to adopt end‑to‑end identity governance that spans the workplace, workforce, and application workloads.

Join this session to:

  • Break down practical methods for deploying IAM aligned to Zero Trust principles
  • Improve role architecture, entitlement controls, and automated lifecycle workflows
  • Tackle entitlement quality and drift in constantly shifting operational environments



We look forward to seeing you at an upcoming in-person gathering

Gartner cares about the health and safety of our community. If you are feeling unwell, please refrain from attending the conference. At this time, Gartner does not have any health-related requirements in place for attendance. Should this change, we will follow up with updated guidance.

Location

Venue & Accommodation

Boston Marriott Burlington
More Information

Your Community Sponsors

Global Thought Leaders

CISO Thought Leaders

Key Sponsors

Program Sponsors

Community Program Manager

For inquiries related to this community, please reach out to your dedicated contact.

Christopher Cresci

Senior Community Program Manager

2816369329

christopher.cresci@gartner.com