Dallas CISO Virtual Executive Summit

November 18, 2020 | 8:00am - 3:00pm CST

November 18, 2020 | 8:00am - 3:00pm CST


Collaborate with your peers

Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the Dallas CISO Virtual Executive Summit.

Join your peers to discuss the most critical issues impacting CISOs today:

Strategies for a risk-aligned, resilient organization

Developing and investing in the security workforce of tomorrow

Creating business value and supporting agile business operations


Sara Andrews

PepsiCo Inc
SVP, Global CISO

Sonja Hammond

National Veterinary Associates

Jairo Orea

Kimberly-Clark Corporation
Global Chief Information Security Officer

Shamoun Siddiqui

Neiman Marcus

Duaine Styles

Globe Life Inc.

Gary Toretti

SVP, Chief Information Security Officer


November 18, 2020

8:00am - 8:45am CST Virtual Summit Keynote

The Convergence of Zero Trust and SASE

Jason Clark headshot

Jason Clark



Dustin Wilcox headshot

Dustin Wilcox



Organizations are feeling a shift in the world of networking and security as they rapidly adopt and embrace the cloud. On-premises private data centers are no longer the place for data and workloads to exist. With this shift, security and networking are brought closer than ever. Enterprises need speed, visibility, security and reliability without compromise. Enter, the secure access service edge, better known as SASE. Its’ inevitable that SASE implementations and zero trust implementations need to collide to provide a more comprehensive security capability to truly support digital transformation. How can your organization best position itself for the transition?

In this session, you will discuss:

  • Problems SASE can address in the modern enterprise
  • Benefits of planning both SASE and zero trust implementations
  • Insights from organizations adopting SASE and zero trust today

8:45am - 9:00am CST Break

9:00am - 10:00am CST Virtual Summit Boardroom

Leveraging Automation to Keep Pace with Threats

Kevin Hanes headshot

Kevin Hanes

Senior Vice President Chief Operating Officer


Scott Moser headshot

Scott Moser

Chief Information Security Officer

Sabre Holdings

Sonja Hammond headshot

Sonja Hammond


National Veterinary Associates

Automation in the world of information security allows teams to move swiftly in the face of persistent threats. Efficiently employing actionable threat intelligence is key to staying ahead of the next wave of threats.

Join SecureWorks in this interactive boardroom and discuss:

  • The future of security automation
  • How automation and orchestration are playing a role in today’s security stack
  • Strategies to reduce response time and incident impact

9:00am - 10:00am CST Virtual Summit Boardroom

Metrics that Matter: Confidence and Resilience in Your Security Program

Jeff Kirby headshot

Jeff Kirby


Interstate Batteries

Mike Priest headshot

Mike Priest


Globe Life Inc.

John Burger headshot

John Burger



CISOs say that what they need most in their security program is confidence that people, processes and technology are working and effective, and that controls are in place to ensure resiliency in the case of a major event. But how do you measure that, and how do you effectively communicate across your organization’s leadership and the board?

In this discussion, you will learn:

  • Why traditional metrics fall short of communicating security risk and value
  • Which metrics have meaning for both boards and security teams
  • How the right metrics will benefit the business and win investment for security

9:00am - 10:00am CST Virtual Summit Boardroom

What Makes a Next-Gen SOC?

Bruce Hembree headshot

Bruce Hembree

Field Chief Technology Officer

Palo Alto Networks

Patrick Benoit headshot

Patrick Benoit

Global BISO


George Finney headshot

George Finney

Chief Security Officer

Southern Methodist University

Security Operations Centers are often characterized by chaos. The volume and sophistication of security attacks is increasing at a rate that makes it tough for SOCs to have people, processes, and technologies in their right places.

Join this conversation to discuss:

  • Contextualizing the bleakness of today's SOCs before casting an optimistic eye towards the future
  • Current pitfalls including log-based detection, siloed tools, and manual processes
  • Visualizing the ideal next-gen SOC

9:00am - 10:00am CST Virtual Summit Boardroom

Data Governance as a Business Enabler

Mustapha Kebbeh headshot

Mustapha Kebbeh

Global CISO


Sailaja Kotra-Turner headshot

Sailaja Kotra-Turner



Stéphane Charbonneau headshot

Stéphane Charbonneau

CTO, Co-Founder

Titus, A HelpSystems Company

Some organizations lack resources to help them track and govern their data at scale. With large segments of the workforce now remote, data protection is more critical than ever. How can organizations work to combat this problem and ensure the data is properly managed and secured without impacting productivity or the customer experience?

Join this boardroom for a discussion on:

  • Advances in automated processes that will improve efficiency
  • Strategies to map and govern data
  • How to ensure data compliance in a remote or hybrid workforce

9:00am - 10:00am CST Virtual Summit Boardroom

Bringing Cloud Back Down to Earth

Elia Zaitsev headshot

Elia Zaitsev

CTO of the Americas


Jessica Nemmers headshot

Jessica Nemmers



David Bell headshot

David Bell

Managing Director, Information Security & Technology Risk Management & Chief Information Security Officer

American Airlines

CISOs face a constant tension between enterprise agility and enterprise security, and in today’s world, this dynamic often plays out in the context of cloud services. How can CISOs gain a centralized view over cloud security posture and workloads?

Join this session to discuss:

  • Methodical approaches to securing cloud-based technologies, workloads and products
  • Ways to standardize cloud environments
  • Strategies to ensure compliance

10:00am - 10:45am CST Virtual Summit Keynote

Tomorrow’s Cyberthreats – Staying One Step Ahead

Israel Barak headshot

Israel Barak



Shamoun Siddiqui headshot

Shamoun Siddiqui


Neiman Marcus

Michael Simmons headshot

Michael Simmons


Southwest Airlines

At a time when customer trust is paramount and private data is precious, a major breach can be catastrophic for any organization. Effective security is an essential part of effective business strategy, yet security leaders face an ever-growing challenge to guide their enterprise through the evolving threat landscape.

Join this virtual keynote to explore:

  • Strategies for addressing the emerging threat landscape
  • The role today’s CISO plays in guiding business strategy to mitigate risk
  • Communication strategies for educating users about security – and holding them accountable

10:45am - 11:00am CST Break

11:00am - 12:00pm CST Virtual Summit Boardroom

Navigating the Application and Network Threat Landscape

Vivek Patel headshot

Vivek Patel

VP of Technical Services


Royce Holden headshot

Royce Holden

AVP - Technology Security and Compliance (CISO)

Dallas/Fort Worth International Airport

Organizations are increasingly operating in an agile digital model where data flows seamlessly between on-premise networks, applications and cloud services. Yet that coherent user experience masks a complex attack surface, where security leaders must tackle a spectrum of vulnerabilities while preserving agile business operations.

 Join this session to discuss:

  • The latest threat landscape for networks and applications
  • How CISOs are navigating the balance of business agility and security controls
  • Best practices for monitoring threats across complex networks

11:00am - 12:00pm CST Virtual Summit Boardroom

Emerging Technologies – Embracing Change

Robert Pace headshot

Robert Pace


Invitation Homes

Christopher Sicard headshot

Christopher Sicard

Consulting & Systems Integration Leader - Canada


Innovative technologies can open the door to new solutions that can transform your business. However, they can also create clouds of confusion and new security risks. How do you determine what is practical, scalable and secure?

In this session discover how:

  • You can introduce security earlier in the AI implementation process
  • To identify potential areas of risk regarding AI
  • Common challenges CISOs face in their AI journey

By registering for this session, this serves as your authorization to Evanta or its vendor to provide your contact information to IBM to follow up on your interaction and participation. IBM’s use of your contact information is governed by the IBM Privacy Policy. If you need more information on how IBM is using your personal data you may refer to the IBM Privacy Statement. To withdraw your marketing consent and unsubscribe to receiving emails click on the unsubscribe button at this address: ibm.biz/marketingoptout.

11:00am - 12:00pm CST Virtual Summit Boardroom

Cloud IAM – Enlightenment or Inferno

Peter Scott headshot

Peter Scott

VP of Products, Cloud Security


KC Condit headshot

KC Condit


G6 Hospitality

Aaron Munoz headshot

Aaron Munoz

Chief Information Security Officer

Texas Christian University

A strong IAM is one key to preventing data breaches and limiting the blast radius, should a security incident occur. But cloud IAM presents a new set of constructs for organizations to build and manage. Is this the most comprehensive identity and access control out there, or yet another layer of complexity added to your program?

In this session, you will discuss:

  • Why managing cloud IAM is so complex
  • The challenges cloud IAM creates for IT and cybersecurity professionals
  • How leading organizations are governing cloud IAM to reduce risk and the chance of a data breach

11:00am - 12:00pm CST Virtual Summit Boardroom

The Changing Face of Insider Threat

Stephen Moore headshot

Stephen Moore

Chief Security Strategist


Michael Anderson headshot

Michael Anderson

Chief Information Security Officer

Dallas County, TX

As an organizational capability, insider threat management is changing - again. Firstly, the idea of context has changed the categories of insider threat, and secondly insider threat programs now maturing – evolving into a more justifiable and friendly trusted insider program.

Join this virtual boardroom to discuss:

  • The evolving landscape of insider threats and its challenges
  • The impact of changing behaviors, employee culture and workplace environment on insider risk
  • Practical strategies for improving an insider risk management program

12:00pm - 12:45pm CST Virtual Summit Keynote

Protecting People, the New Perimeter

Sujeet Bambawale headshot

Sujeet Bambawale



Lucia Milica headshot

Lucia Milica

Global Resident CISO


Gary Toretti headshot

Gary Toretti

SVP, Chief Information Security Officer


As 2020 changes the way we live and work, cyber criminals are adapting as well. Join us as we examine the biggest challenges security leaders face, and why a people-centric approach to security is everyone’s biggest opportunity to stop attackers and protect their organization.

Join Lucia Milica as she and a panel of CISOs discuss:

  • Why social engineering dominates among today’s cyber threat actors
  • How remote work and the move to the cloud has changed the nature of threats
  • The ways their organizations are building controls to better understand and protect people

12:45pm - 1:15pm CST Networking

The Art of Giving Back

Jeff Kirby headshot

Jeff Kirby


Interstate Batteries

An informal and interactive opportunity for you to network with peers in small groups and discuss the importance of giving back. 

1:30pm - 3:00pm CST Virtual Peer-to-Peer Meetings

Peer-to-Peer Meetings

Meet virtually for 1-to-1 in-depth conversations with your colleagues

Conducting business virtually makes it more challenging to meet and network with like-minded peers, and now it’s become even more critical to collaborate with CISOs who are facing the same challenges.

This is an opportunity to meet 1-to-1 in a private, virtual setting with community peers directly after the Virtual Executive Summit.

  • Peer-to-Peer meetings are 25 minutes in length, giving you the chance for more personal interaction and in-depth conversation with your fellow CISO peers.

  • All conversations are private and will not be recorded

  • Meet up to 3 peers based on your shared interests or priorities

How to Participate 

Available if you sign up and select peer meetings prior to the summit. To join your meetings or download meeting calendar invites, please reference the instructions that were emailed to you from evanta@delegateselect.com.


Your Community Partners

CISO Thought Leaders
Key Partners
Program Partners

Dallas CISO Program Manager

For inquiries related to this event, please reach out to your dedicated program manager.

Lawrence Figueroa