Dallas CISO Executive Summit

November 15, 2022 | Renaissance at Legacy West

November 15, 2022
Renaissance at Legacy West

Collaborate with your peers

Get together with Dallas's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Elevating the security practice and CISO role into strategic partners who manage cyber risk

Evolving traditional approaches and technologies in response to the expanding attack surface

Maturing IAM roadmaps and infrastructure to become more resilient against evolving demands

Dallas CISO Governing Body

The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Sara Andrews

Global CISO

David Bell

American Airlines
Managing Director, Information Security & Technology Risk Management & Chief Information Security Officer

Sonja Hammond

National Veterinary Associates

Mustapha Kebbeh

Chief Security Officer

Scot Miller

Mr. Cooper

Scott Moser

Sabre Corporation
SVP, Chief Information Security Officer

Mike Priest

Globe Life

Shamoun Siddiqui

Neiman Marcus

Gary Toretti

SVP, Chief Information Security Officer

Harold Rivas


What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Dallas CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.


November 14, 2022

November 15, 2022

6:00pm - 8:30pm  Governing Body Welcome Reception

Governing Body Welcome Reception

Governing Body members host this reception for attendees to open the event with an evening of peer networking and and an opportunity to fill backpacks with supplies for foster children in the Dallas area.

7:45am - 8:45am  Registration & Breakfast

8:45am - 9:30am  Keynote

Resonating with the Board — Translating Insight Into Action

Sara Andrews headshot

Sara Andrews

Global CISO


James Beeson headshot

James Beeson

VP, Chief Information Security Officer


Sujeet Bambawale headshot

Sujeet Bambawale



Sonja Hammond headshot

Sonja Hammond


National Veterinary Associates

Unlike the CISO role of just a few years ago – where many could still focus heavily on the bits and bytes – today’s security leader is also expected to be a business leader. Uncover strategies with your peers to help you become fluent in the languages of risk, finance and strategy and to effectively convey your message, including:

  • How to educate your board on cybersecurity so they become champions for security in your company
  • What the board really wants to hear from CISOs
  • Which metrics will help you craft a compelling story that inspires action

9:30am - 10:00am  Networking Break

10:00am - 10:45am  Breakout Session

Accounting for Third-Party Risk in Strategic Planning

John Chisum headshot

John Chisum

Vice President, Solutions Consulting


Third parties expose businesses to strategic, operational, financial and compliance risks. Moreover, leaders have less visibility into third parties than into their own businesses. For many organizations, the pandemic exposed the fragility of the organization’s third-party network and impressed the need to flex quickly to new third and fourth parties in the extended enterprise to meet demand without increasing risk exposure.

Join this session sponsored by RiskRecon to discuss:

  • Standardizing third-party risk management assessments to be used by business units
  • Maintaining visibility of all ongoing third-party relationships
  • Identifying and mitigating the risks of the third-party network

10:00am - 10:45am  Breakout Session

Career Chess — Thinking Strategically about Your Next Move

Scot Miller headshot

Scot Miller


Mr. Cooper

Gary Toretti headshot

Gary Toretti

SVP, Chief Information Security Officer


In a world of evolving roles and responsibilities, it can be a challenge to decide where to make your next career move. Do you switch to a larger organization with more growth opportunity or move to a smaller company where you can have a larger impact? Peers who have made big moves will share their insight on how they view the chessboard of job progression.

Join this session to learn:

  • When to say 'yes' or 'no' to that next job
  • How to prioritize the right fit
  • Ways to proactively find new opportunities 

10:00am - 10:45am  Executive Boardroom

From Workloads to Identities — Unifying Cloud Management

Matthew Carle headshot

Matthew Carle

Product Lead

Sonrai Security

Mustapha Kebbeh headshot

Mustapha Kebbeh

Chief Security Officer


Becky Palmer headshot

Becky Palmer

Chief Information Security Officer

National Life Group

When security and functionality fight, functionality always wins. The pace of innovation and growth in the cloud, combined with increasingly complex business and user needs, demands that security leaders adopt better tools and a new mindset — one that empowers their teams to manage risk at scale.

Join this session hosted by Sonrai Security to discuss:

  • Why gaining visibility is a growing challenge in multi-cloud
  • How to help teams more effectively prioritize risks
  • How to align security solutions to achieve a more unified cloud strategy

10:00am - 10:45am  Executive Boardroom

Build and Protect for Tomorrow

Vivek Menon headshot

Vivek Menon

VP and Head of Cybersecurity & Compliance

Digital Turbine

Marty Ray headshot

Marty Ray



The pandemic not only accelerated the pace of digital transformation— it heightened customer expectations as they now require personalized, intuitive, and in our increasingly digital world. However, this demand also creates a need for secure, performant, and resilient technology. That increase pushes businesses to expand their technological ecosystems and grow the way they think about interfacing with customers and employees. With this expansion and change, come inherent risks.

Join this session sponsored by Fastly as your peers discuss:

  • Creating unique opportunities for business transformation
  • Balancing innovation, while managing and protecting new technologies
  • Implementing strategies for future-proofing a framework that allows for faster modernization

10:45am - 11:20am  Networking Break

10:50am - 11:15am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:20am - 12:05pm  Breakout Session

Developing the Leaders of Tomorrow

Joey Rachid headshot

Joey Rachid

VP, Information Security and CISO


Scott Moser headshot

Scott Moser

SVP, Chief Information Security Officer

Sabre Corporation

As the role of the CISO becomes increasingly business-oriented, the skill set of today’s IT leader must become business-technology centric. CISOs are now challenged to identify and mentor those on their teams who possess both the technology skills and business leadership necessary to drive their organization into the future. Leaders have a responsibility to prepare their teams as they face an increasingly complex business and threat landscape.

Join this session to learn:

  • How to elevate the team you have
  • Tactics to upskill and mentor the next generation of talent
  • Sourcing and developing a robust and diverse leadership bench

11:20am - 12:05pm  Breakout Session

Security is a Team Sport

Mike Anderson headshot

Mike Anderson

Chief Digital & Information Officer


Cecil Pineda headshot

Cecil Pineda



Building trust and resilience across infrastructure and security teams is key to defending the enterprise. As companies execute zero trust strategies, the partnership between CIOs, CISOs, and their teams is more important than ever.

Join this session to learn about:

  • The critical components of a modern zero trust strategy
  • Proven practices for infrastructure and security collaboration
  • Improving internal stakeholder relationships to make the right investments and fuel business outcomes

11:20am - 12:05pm  Executive Boardroom

Data Practices for the Resilient Enterprise

John Murphy headshot

John Murphy

Global Field Chief Security Officer/CISO


Sonya Wickel headshot

Sonya Wickel

CISO & Sr. Director, Compliance

Triumph Group

In an effort to establish agility and flexibility, the modern CISO must prioritize cloud maturity while securing traditional resources in the datacenter. Yet, resiliency opportunities continue to evolve in protecting, observing, and remediating your organization's most precious data resources, regardless of where data may reside.

Join a room of your executive peers and discuss how today's CISOs:

  • Manage critical data and plan to recover it in times of cyber distress
  • Capitalize on cloud benefits, while avoiding cloud pitfalls
  • Protect and secure on-prem and cloud apps without ignoring cost

11:20am - 12:05pm  Executive Boardroom

Harnessing the Power of Cloud Security Innovation

Rich Hughes headshot

Rich Hughes

Vice President, Americas

XM Cyber

Shamoun Siddiqui headshot

Shamoun Siddiqui


Neiman Marcus

Sujeet Bambawale headshot

Sujeet Bambawale



Whether you are just moving into the cloud, researching more options within the public cloud, or building your own private cloud, most leaders agree that this is the future of infrastructure as a service. But can CISOs have it all – both increased productivity and cost benefits within a secure cloud?

During this peer-discussion you will explore:

  • Prioritizing attack path remediation
  • Controlling risks impacting digital transformation
  • Ways to incorporate the cloud into a fully articulated security strategy

12:05pm - 12:35pm  Lunch Service

12:15pm - 12:25pm  Break

12:35pm - 1:10pm  Keynote

Digital Transformation – Survive and Thrive

Jay Chaudhry headshot

Jay Chaudhry

CEO, Chairman & Founder


Paul Reyes headshot

Paul Reyes

CISO, VP of Cyber Security, Risk, & Compliance

Vistra Corp

Shamoun Siddiqui headshot

Shamoun Siddiqui


Neiman Marcus

Digital transformation is a powerful business enabler that is compelling leaders to fundamentally change their technology ecosystems. The potential of technology to unlock value and drive progress has never been greater and the imperative to transform your business, securely, has never been more urgent. With data, users, and devices everywhere, how can CISOs reimagine cybersecurity in a world without boundaries?

Join this keynote sponsored by Zscaler to hear strategies on:

  • Accelerating transformation with innovative security services, and communicating their value to the business
  • Scaling and simplifying security across the organization, minimizing risk and gaining agility
  • Protecting today's cloud-first, hybrid workforce with a proactive, intelligent, and radically simple security architecture

1:10pm - 1:25pm  Break

1:25pm - 2:10pm  Breakout Session

Zero Trust — Implementing a Strategy for Success

George Finney headshot

George Finney

Chief Security Officer

Southern Methodist University

The most effective means we have available to protect ourselves when it comes to cybersecurity is prevention. And the most effective strategy for prevention is Zero Trust. In this session, George Finney, Chief Security Officer at Southern Methodist University, will give concrete steps on how to implement Zero Trust based on SMU’s Zero Trust journey and strategies for preventing breaches that encourage efficiency and cost reduction.

Join this session to hear insights from George's book "Project Zero Trust: A Story About a Strategy for Aligning Security and the Business" as he:

  • Breaks down misconceptions about what Zero Trust is and why it's important
  • Shares who Zero Trust is for. (Hint: everyone in IT)
  • Builds a strategy for success in cybersecurity that appeals to the board

1:25pm - 2:10pm  Breakout Session

Leveraging Automation to Keep Pace with Threat Detection and Response

Stephen O'Brien headshot

Stephen O'Brien

Head of Product


Understaffed teams, inefficient processes, alert overload — this is a typical day for a SOC team. The result? Analysts so consumed with tedious, repetitive tasks leading not only to higher risk of burnout, but also human error that could cost millions.

Join this data-driven session, hosted by Tines, to:

  • Learn the tasks consuming the most time, plus the top 3 tasks analysts enjoy least
  • Understand what prevents security teams from doing their best work
  • Break down causes of burnout and how to improve retention

1:25pm - 2:10pm  Executive Boardroom

Staying Ahead of MSSP

Royce Holden headshot

Royce Holden

AVP - Technology Security and Compliance (CISO)

Dallas/Fort Worth International Airport

A Security Operations Center is at the heart of a security function and plays a vital part in keeping an organization secure. You can outsource the tactical effort for security, but not the responsibility, liability and accountability. For those reasons, it is critical that your MSSP provider continues to align with your business goals, risks and risk tolerances.

Join this session as your peers discuss:

  • Improving governance of an MSSP provider
  • Defining expected outcomes and required deliverables to the supplier
  • Measuring the success of a program

1:25pm - 2:10pm  Executive Boardroom

Moving to a State of Continuous Compliance

Everett Bates headshot

Everett Bates

Chief Information Security Officer


Eric Fisch headshot

Eric Fisch

Head of Information Security Governance, Risk, and Controls


Information security leaders navigate an increasingly complex matrix of national and foreign data privacy regulations. The SEC have even proposed new rules to force public companies to add skilled cybersecurity members to their boards, a tactic that worked 20 years ago for financial expertise. But can it work again? It’s not going to be an easy shift, corporate governance requires specialized expertise, deep operational competency, an understanding of business value and how to manage exposure to risk.

Join your peers as they discuss:

  • Creating a cloud infrastructure that meets security and compliance requirements
  • Building compliance into development
  • Automating compliance documentation

2:10pm - 2:45pm  Networking Break

2:15pm - 2:40pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

2:45pm - 3:30pm  Breakout Session

#EpicFail – A Ransomware Choose Your Own Adventure

David Bell headshot

David Bell

Managing Director, Information Security & Technology Risk Management & Chief Information Security Officer

American Airlines

Whether it comes from across the globe or down the street, the ever-looming threat of a ransomware attack is always in the back of the IT and security executive’s mind. Get your collaborative and creative juices flowing in this gamified choose your own adventure.

In this interactive session attendees will:

  • Collaborate to identify threat responses
  • Respond to choices and forces out of their control
  • Discuss pitfalls and best practices

2:45pm - 3:30pm  Breakout Session

The Constant Evolution of Cloud Security — 5 Trends and How to Respond to Them

Keith Mokris headshot

Keith Mokris

VP, Product Marketing

Orca Security

Building applications in the cloud and running your business on cloud native architectures is a constant evolution that requires a new approach to security. How does a security organization partner with cloud engineering, DevOps teams, and developers to secure their applications?

Join this session to learn:

  • How to maintain visibility across a dynamic, potentially multi-cloud attack surface
  • Achieving and maintaining compliance at scale
  • Responses to critical risks and constant cloud evolution

2:45pm - 3:30pm  Executive Boardroom

What It Takes to Tackle Your SaaS Security

Maor Bin headshot

Maor Bin

CEO & Co-Founder

Adaptive Shield

Brian Mork headshot

Brian Mork

Chief Information Security Officer

Trinity Industries

Aaron Munoz headshot

Aaron Munoz

Chief Information Security Officer

Texas Christian University

There’s no question that SaaS apps have become the default system of record and an inseparable piece of enterprises. As more organizations increase their dependency on business-critical SaaS apps to run their operations, new security challenges emerge.

Join this boardroom to:

  • Gain insights into the challenges of SaaS app security
  • Hear how risks can be addressed through Misconfiguration management, SaaS-to-SaaS access monitoring, Identity and Access Management Governance and Device-to-SaaS risk management
  • Understand how technology is adapting to new trends

2:45pm - 3:30pm  Executive Boardroom

Metrics for Success — How to Define Company Protection Needs

Harold Rivas headshot

Harold Rivas



Dewakar Garg headshot

Dewakar Garg

Sr. Director of Information Security & Compliance


CISOs can turn metrics into actionable, communicable data that protects the organization. Whether the metrics are used on the operational or executive sides of the organization, they can serve as important benchmarks. Metrics must also be packaged correctly and be consumable to effectively bridge communication gaps.

Join this roundtable discussion to:

  • Determine which metrics to prioritize
  • Share progress or roadblocks with peers
  • Gain a better understanding of the relevant numbers and data

3:30pm - 3:45pm  Networking Break

3:45pm - 4:20pm  Keynote

Diversity in Thinking — Catalyst for Change

Mary N. Chaney, Esq., CISSP, CIPP/US headshot

Mary N. Chaney, Esq., CISSP, CIPP/US

Chairwoman, CEO & President

Minorities in Cybersecurity

As organizations strive to drive DEI initiatives, CISOs have an opportunity to lead the way in creating employment and advancement opportunities for underrepresented groups within security. In this session, Mary N. Chaney, a former senior security executive and founder of the nonprofit Minorities in Cybersecurity, will discuss how CISOs can play a critical role in diversifying talent in the cybersecurity space.

Join this session to learn:

  • How having more diverse teams helps throughout the organization and brings fresh perspectives
  • Strategies for communicating and demonstrating commitment to your workforce
  • How having accountability partners can improve the success of your team

4:20pm - 4:50pm  Closing Reception & Prize Drawing

November 14, 2022

November 15, 2022

We look forward to seeing you at an upcoming in-person gathering


Venue & Accommodation

Renaissance at Legacy West

A block of rooms has been reserved at the Renaissance at Legacy West at a reduced conference rate. Reservations should be made online or by calling 888-236-2427. Please mention Evanta Executive Summit to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $249 USD (plus tax) is October 24, 2022.

Your Community Partners

CISO Thought Leader
Key Partners
Program Partners

Community Program Manager

For inquiries related to this community, please reach out to your dedicated contact.

Fernanda Casillas

Senior Program Manager