Southern California CISO Virtual Executive Summit

December 3, 2020 | 8:00am - 4:00pm PST

December 3, 2020 | 8:00am - 4:00pm PST

Collaborate with your peers

Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the Southern California CISO Virtual Executive Summit.

Join your peers to discuss the most critical issues impacting CISOs today:

Strategies for a risk-aligned, resilient organization

Developing and investing in the security workforce of tomorrow

Creating business value and supporting agile business operations


Bently Au

AEG Worldwide

Matt Crouse

Taco Bell

Lara Divi

Dine Brands Global

Arthur Lessard

Universal Music Group

Dan Meacham

VP, Global Security and Corporate Operations, CISO

Nick Reva

Security Engineering

Marty Simmons

Kite Pharma
Director, IT Security & Compliance

Billy Spears


Terrence Weekes

Jack in the Box


December 3, 2020

8:00am - 8:45am PST Virtual Summit Keynote

Protecting People, the New Perimeter

Aaron DeSpain headshot

Aaron DeSpain

Chief Information Security Officer

Hoag Hospital

Lucia Milica headshot

Lucia Milica

Global Resident CISO


David Tyburski headshot

David Tyburski

Chief Information Security Officer

Wynn Resorts

As 2020 changes the way we live and work, cyber criminals are adapting as well. Join us as we examine the biggest challenges security leaders face, and why a people-centric approach to security is everyone’s biggest opportunity to stop attackers and protect their organization.

Join Lucia Milica as she and a panel of CISOs discuss:

  • Why social engineering dominates among today’s cyber threat actors
  • How remote work and the move to the cloud has changed the nature of threats
  • The ways their organizations are building controls to better understand and protect people

8:45am - 9:00am PST Break

9:00am - 10:00am PST Virtual Summit Boardroom

Security Tool Tipping Point: How More Tools Can Increase Overall Risk

Quincey Collins headshot

Quincey Collins

Chief Security Officer

Sheppard Mullin Richter & Hampton

Lara Divi headshot

Lara Divi


Dine Brands Global

Gaurav Kulkarni headshot

Gaurav Kulkarni

VP of Solutions Architecture


A rapidly growing number of security tools have arisen to help organizations better secure their environments and actively protect important data, from SIEM to EDR to SOAR and more. In response, many organizations are purchasing more tools than they can effectively manage or find, train and retain staff for as they struggle to stay protected against the latest security threats. However, a recent study of hundreds of security leaders finds a majority fear they have increased organizational risk levels and decreased ability to respond effectively to threats. In this session, we will detail these findings, then explore how your organization can better measure visibility, efficacy and performance to optimize investments and reduce risk. In this discussion, you’ll learn:

  • The state of “tools sprawl” and data showing its impact on security organizations
  • Tips to implement immediately to get a handle on tool efficacy
  • Apply a new approach to maturing your security posture

9:00am - 10:00am PST Virtual Summit Boardroom

What Makes a Next-Gen SOC?

Brett Cumming headshot

Brett Cumming

Director Information Security Officer


Dylan Hack headshot

Dylan Hack

Director of Information Security

Fitness International, LLC

Bruce Hembree headshot

Bruce Hembree

Field Chief Technology Officer

Palo Alto Networks

Security Operations Centers are often characterized by chaos. The volume and sophistication of security attacks is increasing at a rate that makes it tough for SOCs to have people, processes, and technologies in their right places.

Join this conversation to discuss:

  • Contextualizing the bleakness of today's SOCs before casting an optimistic eye towards the future
  • Current pitfalls including log-based detection, siloed tools, and manual processes
  • Visualizing the ideal next-gen SOC

9:00am - 10:00am PST Virtual Summit Boardroom

Business and Technology Compliance in a Digital World

Kevin Kealy headshot

Kevin Kealy


Scientific Games Corporation

Arthur Lessard headshot

Arthur Lessard


Universal Music Group

Joe Sullivan headshot

Joe Sullivan

SVP, Chief Security Officer


CISOs are not only working to thwart potential cyberattacks — they're walking a regulation tightrope, carefully balancing the ever-developing data privacy legislation. Whether considering GDPR, CCPA, or the new CPRA, CISOs are struggling to meet often conflicting regulations.

Join this session to discuss:

  • The rising amount of geo-specific compliance and regulatory requirements
  • Current methodologies to address compliance challenges from the infosec lens
  • Understanding future compliance regulations

9:00am - 10:00am PST Virtual Summit Boardroom

Leveraging Automation to Keep Pace with Threats

Michael Mongold headshot

Michael Mongold

Sr. Director, Information Security and Chief Information Security Officer

Deckers Brands

Jeremy Smith headshot

Jeremy Smith

Global Head of IT Risk & Security

Avery Dennison

Kevin Hanes headshot

Kevin Hanes

Senior Vice President Chief Operating Officer


Automation in the world of information security allows teams to move swiftly in the face of persistent threats. Efficiently employing actionable threat intelligence is key to staying ahead of the next wave of threats.

Join SecureWorks in this interactive boardroom and discuss:

  • The future of security automation
  • How automation and orchestration are playing a role in today’s security stack
  • Strategies to reduce response time and incident impact

10:00am - 10:45am PST Virtual Summit Keynote

Tomorrow’s Cyberthreats – Staying One Step Ahead

Sam Curry headshot

Sam Curry

Chief Security Officer


Jessica Sica headshot

Jessica Sica

Director Of Information Security and Compliance

PETCO Animal Supplies

Brett Cumming headshot

Brett Cumming

Director Information Security Officer


At a time when customer trust is paramount and private data is precious, a major breach can be catastrophic for any organization. Effective security is an essential part of effective business strategy, yet security leaders face an ever-growing challenge to guide their enterprise through the evolving threat landscape.

Join this virtual keynote to explore:

  • Strategies for addressing the emerging threat landscape
  • The role today’s CISO plays in guiding business strategy to mitigate risk
  • Communication strategies for educating users about security – and holding them accountable

10:45am - 11:00am PST Break

11:00am - 12:00pm PST Virtual Summit Boardroom

Security Operations – Empowering Teams

Jeff Blair headshot

Jeff Blair


Creative Artists Agency

Gary Martino headshot

Gary Martino

Director of Information Security Classified Systems


Sam McLane headshot

Sam McLane

Chief Technology Services Officer

Arctic Wolf Networks

Automation in the world of information security allows teams to move more swiftly in the face of persistent threats while stitching together best-in-class tools that get the job done. For smaller companies, the challenge may be having to do more, with less. Rather than eliminating the need for security talent, the use of a security operations team is freeing up bandwidth for analysts and others to engage in the meaningful work that requires a human touch.

 Join this session to learn:

  • The role of automation and orchestration in today’s security stack 
  • How the dispersion of the workforce has caused an increase in compromises
  • How to stay vigilant in the face of Account Takeover Attacks (ATO)

11:00am - 12:00pm PST Virtual Summit Boardroom

Partner & Employee Supply Chain Risk

Dave Estlick headshot

Dave Estlick

Chief Information Security Officer

Chipotle Mexican Grill

Todd Friedman headshot

Todd Friedman



Shalabh Mohan headshot

Shalabh Mohan

VP of Products

Area 1

Digital supply chain attacks exploit an organization’s reliance on suppliers, partners, and vendors to find and prey on the weakest links in the chain. Your partners’ IT infrastructure is often less secure and can provide surreptitious opportunities to hackers to launch successful phishing campaigns targeting your organization.

Join to discuss:

  • How threat actors are leveraging your partners to target your organization
  • Your digital supply chain risk
  • Early prevention of all categories of business email compromise

11:00am - 12:00pm PST Virtual Summit Boardroom

Cloud IAM – Enlightenment or Inferno

Awwab Arif headshot

Awwab Arif


East West Bank

Nemi George headshot

Nemi George

Vice President, Information Security Officer

Pacific Dental Services

Peter Scott headshot

Peter Scott

VP of Products, Cloud Security


A strong IAM is one key to preventing data breaches and limiting the blast radius, should a security incident occur. But cloud IAM presents a new set of constructs for organizations to build and manage. Is this the most comprehensive identity and access control out there, or yet another layer of complexity added to your program?

In this session, you will discuss:

  • Why managing cloud IAM is so complex
  • The challenges cloud IAM creates for IT and cybersecurity professionals
  • How leading organizations are governing cloud IAM to reduce risk and the chance of a data breach

11:00am - 12:00pm PST Virtual Summit Boardroom

Measuring and Communicating Risk – What Really Counts?

Adrian Giboi headshot

Adrian Giboi


Solenis LLC

Ralph Johnson headshot

Ralph Johnson

Chief Information Security Officer

Los Angeles County, CA

Leading information security executives know that the language of technology doesn’t always resonate outside of IT. “Risk” is the vocabulary of the business, yet measuring and discussing this all-important concept in an actionable way remains a unique challenge.

Join this session to learn:

  • Actionable risk metrics, both for use inside the security function and with outside stakeholders
  • How the language and awareness of information security risk has evolved
  • Techniques to automate collection of meaningful security metrics

12:00pm - 12:45pm PST Virtual Summit Keynote

The Convergence of Zero Trust and SASE

James Christiansen headshot

James Christiansen

VP, CSO Cloud Security Transformation


Jerry Sto. Tomas headshot

Jerry Sto. Tomas


Apria Healthcare

Organizations are feeling a shift in the world of networking and security as they rapidly adopt and embrace the cloud. On-premises private data centers are no longer the place for data and workloads to exist. With this shift, security and networking are brought closer than ever. Enterprises need speed, visibility, security and reliability without compromise. Enter, the secure access service edge, better known as SASE. Its’ inevitable that SASE implementations and zero trust implementations need to collide to provide a more comprehensive security capability to truly support digital transformation. How can your organization best position itself for the transition?

In this session, you will discuss:

  • Problems SASE can address in the modern enterprise
  • Benefits of planning both SASE and zero trust implementations
  • Insights from organizations adopting SASE and zero trust today

12:45pm - 1:15pm PST Networking

Interactive Discussion - Best Practices

Billy Spears headshot

Billy Spears



Join Billy Spears, EVP and CISO at Alteryx, as he leads an interactive discussion on the free-form Shindig virtual platform. Attendees will be able to report out best practices learned during the summit in an organic format ranging from one-on-one discussions to small groups to full-room conversations.

2:30pm - 4:00pm PST Virtual Peer-to-Peer Meetings

Peer-to-Peer Meetings

Meet virtually for in-depth conversations with your colleagues

Conducting business virtually makes it more challenging to meet and network with like-minded peers. During this time of disruption and uncertainty, it’s become even more critical to collaborate with peers who are facing the same challenges.

Now, we are bringing you the opportunity to set up 1-to-1 meetings in a private, virtual setting with community peers directly after the Virtual Executive Summit.

  • Peer-to-Peer meetings are 25 minutes in length, giving you the chance for more personal interaction and in-depth conversation with your fellow Southern California CISO Virtual Executive Summit peers.
  • All conversations are private and will not be recorded
  • Meet up to 3 peers based on your shared interests or priorities

Participant Testimonials

  • ‘If I came just for the peer to peer meetings, my time was well spent. This is truly your USP.’ Stuart Hughes, CDIO at Rolls Royce
  • ’The peer to peer mtgs were maybe the BEST part of this mtg’ Edward Wagoner, Executive Director, Digital, JLL
  • ‘Best idea ever; I had such productive sessions with all three of my peers’ Dd Budiharto Sr. Director of Cybersecurity, Baker Hughes

How to participate

Available if you sign up and select peer meetings prior to the summit. To join your meetings or download meeting calendar invites, please reference the instructions that were emailed to you from

Your Community Partners

CISO Thought Leaders
Key Partners
Program Partners

Southern California CISO Program Manager

For inquiries related to this event, please reach out to your dedicated program contact.

Kody Paine

Senior Program Manager