Dallas CISO Virtual Executive Summit

May 26, 2021 | 8:00am - 3:00pm CDT

May 26, 2021 | 8:00am - 3:00pm CDT


Collaborate with your peers

Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the Dallas CISO Virtual Executive Summit.

Join your peers to discuss the most critical issues impacting CISOs today:

Accelerating security to match the pace of digital business initiatives

Managing the risk created from a landscape of new core technologies

Achieving sustainability for the CISO role without compromising outcomes


Sara Andrews

PepsiCo Inc
SVP, Global CISO

Sonja Hammond

National Veterinary Associates

Shamoun Siddiqui

Neiman Marcus

Gary Toretti

SVP, Chief Information Security Officer

Mustapha Kebbeh

Global CISO

Mike Priest

Globe Life Inc.

What to Expect

Connect with your CISO community through a variety of different session formats at the upcoming Virtual Executive Summit. You'll have the opportunity to listen, engage and create lasting relationships with like-minded peers.


Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join intimate, interactive discussions with peers in Boardroom sessions.

Meet the Speakers

Don't miss this opportunity to meet with CISO practitioners and industry thought leaders who shared their insights on the agenda. Come with questions and get ready to meet new friends in this casual session designed to foster peer connections and collaboration in the Dallas community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. Be sure to opt in when you register and get matched based on your key priorities.


May 26, 2021

8:00am - 9:00am CDT Virtual Summit Keynote

Innovation Spotlight

Yaniv Bar-Dayan headshot

Yaniv Bar-Dayan

CEO & Founder


John Brennan headshot

John Brennan


YL Ventures

Lior Levy headshot

Lior Levy

CEO & Co-Founder


Avi Shua headshot

Avi Shua

CEO & Co-Founder at Orca Security

Orca Security

Be among the first to see what’s new and next in the security solutions landscape. Three early-stage providers will get the chance to showcase their innovative solutions to the most pressing cybersecurity challenges.

Join this session to learn and explore:

  • Vulcan’s risk analytics and remediation orchestration
    • If there was one thing you could change about the way you prioritize and remediate security vulnerabilities in your environment, what would it be?
    • How well does your team work with IT stakeholders (application, cloud, network, infra, etc.) to drive remediation outcomes, and reduce risk for the business?
  • Cycode’s DevOps Pipeline Security, Governance & Integrity
    • Does your security team have the visibility and control that it needs to secure development tools and infrastructures like source control management, build systems, and the cloud environment? If not, what are your unmet needs?
    • Where does reducing code tampering risk sit on your priority list? What are your key initiatives to reduce code tampering risk and what are the biggest gaps that you're trying to solve for?
  • Orca Security’s cloud security risk detection in your cloud environment
    • What is your first impression of an agentless cloud native security platform?
    • If you could change one thing about how you track asset inventory, what would it be?

9:00am - 10:00am CDT Virtual Summit Boardroom

Managing and Responding to Insider Risk

Sujeet Bambawale headshot

Sujeet Bambawale



Vijay Ramanathan headshot

Vijay Ramanathan

Senior VP of Product Innovation


Organizations are moving faster than ever before. With employees creating, modifying, deleting, and transporting data every second, how can CISOs keep up as job hopping and turnover rates continue to rise?

Join this boardroom to discuss:

  • Ways to cut through the false noise and final real risk within your organization
  • How to determine the right approach to insider risk response
  • Strategies to continuously monitor file activity without being invasive

9:00am - 10:00am CDT Virtual Summit Boardroom

Securing the Sprawling Endpoint

Scott Moser headshot

Scott Moser

Chief Information Security Officer

Sabre Holdings

Robert Boudreaux headshot

Robert Boudreaux

Field CTO

Deep Instinct

As enterprises increasingly make access to data more fluid and move assets to the cloud endpoint protection has become vital. These shifting perimeters lack clear definition and require new layers of security through endpoint protection.

Join this session to discuss:

  • Tactics for monitoring a sprawling attack surface of connective devices
  • Strategies to identify your most vulnerable endpoints
  • How deep learning can offer a multi-layer approach to endpoint security

9:00am - 10:00am CDT Virtual Summit Boardroom

Is Identity and Access Enlightenment Possible in the Cloud?

Jason Cowlishaw headshot

Jason Cowlishaw

VP, Global Information Security

Match Group

Mustapha Kebbeh headshot

Mustapha Kebbeh

Global CISO


Michael Coates headshot

Michael Coates

CEO & Co-Founder

Altitude Networks

What would it mean for the world of business if an organization could fully and effortlessly manage the access of its users? Every enterprise requires safeguards to ensure that the right people are accessing the right systems and information, and finding that balance between agility and security is a unique challenge for any CISO. With the new opportunities that come from hybrid or multi-cloud environments, has a new way forward revealed itself?

Join this session to discuss:

  • Prudent approaches to right-size the balance of security controls and agile access
  • The biggest challenges with onboarding and offboarding employees
  • Strategies to implement decentralized access control

10:00am - 10:45am CDT Virtual Summit Keynote

Taking Control in the Cloud

Gary Toretti headshot

Gary Toretti

SVP, Chief Information Security Officer


Mike Spisak headshot

Mike Spisak

Distinguished Engineer, Master Inventor, CTO IBM Security Garage


Are you challenged with uncontrolled costs and unknown risks from your adoption of cloud services? Concerned with whether your IaaS investments are endangering your security or compliance? Or perhaps you’re just watching your budget disappear seemingly on its own. You are not alone.

Join this session for a discussion around:

  • Optimizing the cost of the cloud
  • Improving security, compliance and governance in cloud architectures
  • Leveraging the resources and controls you already have

By registering for this session, this serves as your authorization to Evanta or its vendor to provide your contact information to IBM to follow up on your interaction and participation. IBM’s use of your contact information is governed by the IBM Privacy Policy. If you need more information on how IBM is using your personal data you may refer to the IBM Privacy Statement. To withdraw your marketing consent and unsubscribe to receiving emails click on the unsubscribe button at this address: ibm.biz/marketingoptout

10:45am - 11:00am CDT Break

11:00am - 12:00pm CDT Virtual Summit Boardroom

Actionable Intelligence — Keeping Pace with Relentless Threats

Mike Priest headshot

Mike Priest


Globe Life Inc.

John McClurg headshot

John McClurg



Efficiently employing actionable threat intelligence is key to staying ahead of the next wave of threats. A fast-moving threat intelligence program that highlights the latest risks can spell the difference between preventing a breach or becoming the next headline. How can CISOs sift through the deluge of information?

Join this session to discuss:

  • How CISOs can pinpoint and leverage actionable threat intelligence
  • How security leaders can use AI and ML to protect their environment
  • The evolving nature of today’s threat landscape

11:00am - 12:00pm CDT Virtual Summit Boardroom

Security Technology Sprawl Tipping Point – How More Tools Can Increase Overall Risk

Jessica Nemmers headshot

Jessica Nemmers



Shamoun Siddiqui headshot

Shamoun Siddiqui


Neiman Marcus

Gaurav Kulkarni headshot

Gaurav Kulkarni

VP of Solutions Architecture


As organizations rush to cover gaps in an expanding attack surface, thanks to digital transformation and remote work, they are realizing that this strategy is creating an uncontrolled technology sprawl. Yet many organizations continue purchasing more tools than they can manage, actually increasing their overall risk while wasting limited program budget. How is your technology investment strategy helping you meet your security outcomes?

In this discussion, you will learn:

  • The state of “tools sprawl” and data showing its impact on security organizations
  • Insights and best practices to reduce complexity and increase tool efficacies
  • Maturing your security posture to drive desired outcomes

11:00am - 12:00pm CDT Virtual Summit Boardroom

Mitigating New Third Party Risks

KC Condit headshot

KC Condit


G6 Hospitality

Sonja Hammond headshot

Sonja Hammond


National Veterinary Associates

Many third-party risks are identified after initial onboarding and due diligence, suggesting traditional methods in risk management policy fail to capture new and evolving risks. As these external partnerships become increasingly complex, the need for a new vendor risk management approach is clear.

Join this conversation to discuss:

  • Establish business-driven methods for ongoing risk management analysis
  • Partner across the C-Suite to establish organizational buy-in
  • Strategies to employ an iterative approach to ongoing relationship management

12:00pm - 12:45pm CDT Virtual Summit Keynote

Security Doesn’t Live on Paper — An Interactive Crisis Simulation

David Bell headshot

David Bell

Managing Director, Information Security & Technology Risk Management & Chief Information Security Officer

American Airlines

James Hadley headshot

James Hadley


Immersive Labs

When the worst happens not even the best incident response plans can account for the human element. You might know how your tech will work under pressure but what about you and your people? In this interactive keynote session, you’ll use your decision-making skills to find the threat and manage the growing crisis.

Join this session to:

  • See the real time impact of the human element in crisis management and response
  • Gain a greater understanding of how decisions in a threat scenario have a business-wide impact
  • Discover how to strengthen your organization on both sides of “the boom”, so it’s as ready before the impact as it is after it

12:45pm - 1:15pm CDT Networking

Meet the Speakers

Don't miss this opportunity to meet with CISO practitioners and industry thought leaders who shared their insights on the agenda. Come with questions and get ready to meet new friends in this casual session designed to foster peer connections and collaboration in the Dallas community. 

1:15pm - 1:30pm CDT Break

1:30pm - 3:00pm CDT Virtual Peer-to-Peer Meetings

Peer-to-Peer Meetings

Meet virtually for in-depth conversations with your colleagues


Your Community Partners

Key Partner
Program Partners

Dallas CISO Program Manager

For inquiries related to this event, please reach out to your dedicated program contact.

Lawrence Figueroa

Senior Program Manager