IN-PERSON

San Francisco CISO Executive Summit

June 25, 2024 | Grand Hyatt at SFO

June 25, 2024
Grand Hyatt at SFO

APPLY TO PARTICIPATE

Collaborate with your peers

Get together with San Francisco's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Building risk-ready relationships outside security as a proactive mitigation practice

Overseeing a secure integration of AI and using it to develop business-enabling tools

Managing and protecting key data in a world of variable user access and protections

San Francisco CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Yassir Abousselham

UiPath
SVP, CISO

Selim Aissi

HealthEquity
EVP and CSO

Sujeet Bambawale

7-Eleven
VP, CISO

Krishnan Chellakarai

Gilead Sciences
CISO, Head of Information Security & Data Privacy

Devin Ertel

Menlo Security
Chief Information Security Officer

Al Ghous

Snapdocs
CISO

Leda Muller

Stanford University, Residential and Dining Enterprises
Chief Information Security and Privacy Officer

Kannan Perumal

Applied Materials
Vice President, Chief Information Security Officer

Jeff Trudeau

Chime
VP, CIO & CSO

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your San Francisco CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


Executive Boardroom Sessions

Yesterday’s Shadow IT and Today’s Shadow AI

Shadow AI introduced a new layer of risk in a time when security leaders are already grappling with the formidable challenges of managing hidden technical debt and uncovering shadow IT. Today’s digital landscape requires a new approach to risk and governance – one that identifies the shadows already existing in your organization and stops future shadows emerging as you harness the power of emerging technologies.

Join this session to discuss:

  • Uncovering existing hidden technical debts and shadow IT that inhibit agility, innovation and security
  • Establishing centralized risk frameworks and governance that are enforceable and scalable
  • Involving the C-suite and end users in establishing and understanding protections to deter rogue IT and AI

Doubling Down on Critical Third-Party Risk Vulnerabilities

The complete entanglement of cyber risk with business risk is becoming increasingly more visible. CISOs now have an opportunity to better pinpoint third parties that present a threat to the organization. Yet the increasing complexities of third party, and even fourth party, risk management, prompted by a wide range of evolving threats, demands heightened attention. How can CISOs ensure they have a clear understanding of their vulnerabilities across ecosystems and supply chains?

Join this session to discuss:

  • Identification of vulnerabilities across your vendor landscape to prioritize response efforts
  • Third-party risk management strategies to safeguard your digital ecosystem
  • Overcoming resource challenges to prioritize extended supply chain risk


Breakout Sessions

Fraternize and Maximize — Sharing Knowledge, Power, and Victory Over Common Risks

When it’s harder to attack anyone, it’s harder to attack everyone. It might feel like a brain teaser but, simply put, intra-industry CISO collaboration and collective intelligence partnerships don’t just benefit your business’s lagging competitors. Yes, sharing information with your fellow industry CISOs could give them a leg up on the next big risk but, in a world of exponential connectedness, squashing risk early is never selfless.

Join Kannan Perumal as he discusses:

  • The unique benefits of consorting with CISOs in your own industry
  • Why some industries are more apt to support these competitor collabs
  • The paradoxical support of a business’s ambition and opposition

Developing and Upholding Your Supply Chain Standards

Vendor selection, pre-partner due diligence and trusted implementation are merely the beginning of a healthy third-party management culture. With those pieces in place, the real work (like battling for constant visibility and enforcing your requirements) begins. You’ll need to prepare.  

Gather and discuss how CISOs have successfully:

  • Vetted new and prospective third-parties
  • Monitored their network of existing third-parties
  • Upleveled and asserted their security requirements and expectations


Keynote Sessions

Time 2.0 — Applying Design Thinking to the Human Experience of Time

Time, as we experience it, is not linear, yet why do we pretend that it is? How do we measure the true value of our time? In this mind-bending session, John K. Coyle will apply creative deconstruction to what we think we know about time, and you will learn how to slow, stop and reverse the perceived acceleration of time most adults feel and experience the endless summers of youth again.

Grab a seat and learn how to:

  • Understand the forces that govern experiential time
  • Discover actions you can take to manipulate your perception of time
  • Design your life to create intense and memorable experiences that expand time

AI/ML and Zero Trust — Driving Business Success

As cyber threats become more sophisticated and pervasive, enterprises need to adopt an agile approach to network and security that promotes innovation and mitigates risk. AI/ML and zero trust are the key enablers of this transformation, offering visibility, control, and automation across users, workloads, IoT/OT devices, and business partners.

In this session, you will learn:

  • How AI will be used to fight AI and how generative AI will contribute to increased numbers of ransomware attacks
  • How the growth of zero trust segmentation will happen in parallel with the rise of firewall-free enterprises, and Zero Trust SD-WAN will begin to replace traditional SD-WAN
  • How AI/ML add defensive and analytics capabilities that drive IT and business success


We look forward to seeing you at an upcoming in-person gathering


Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

Grand Hyatt at SFO
MORE INFORMATION

Your Community Partners


Global Thought Leader
CISO Thought Leaders
Key Partners
Program Partners

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Samantha Flaherty

Senior Community Program Manager

208-871-6409

samantha.flaherty@evanta.com