IN-PERSON

Southern California CISO Executive Summit

June 15, 2022 | Sofitel Los Angeles at Beverly Hills

June 15, 2022
Sofitel Los Angeles at Beverly Hills

Collaborate with your peers

Get together with Southern California's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Supporting business agility with risk-based programs

Combating stress and burnout among CISOs and the security teams they lead

Evaluating, communicating and responding to evolving threats

Southern California CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Matt Crouse

Taco Bell
CISO

Lara Divi

Dine Brands Global, Inc.
VP, CISO

Todd Friedman

ResMed
CISO

Gary Hayslip

SoftBank Corporation
CISO

Arthur Lessard

Universal Music Group
SVP & CISO

Dan Meacham

Legendary
VP, Global Security and Corporate Operations, CISO

Jessica Sica

PETCO Animal Supplies
CISO

David Tyburski

Wynn Resorts
Vice President, Chief Information Security Officer

Steven Young

Advantage Solutions
VP Information Security & Compliance, CISO

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Southern California CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


June 14, 2022

6:00pm - 8:30pm  Governing Body Welcome Reception

Governing Body Private Dinner

Governing Body members host this dinner for attendees to launch the event with an evening of peer networking.

7:30am - 8:15am  Registration & Breakfast

8:15am - 9:00am  Keynote

Strengths 2.0 — Applying Design Thinking to Your Strengths and Weaknesses

John K. Coyle headshot

John K. Coyle

CEO and Founder of "Speaking Design Thinking"

Guest Speaker

John K. Coyle is the founder and CEO of "Art of Really Living" and one of the world's leading experts in innovation and design thinking. Through the metaphor of sport, learn how individuals and teams can use innovation approaches to identify and leverage their unique strengths (and design around weaknesses). Become empowered to solve old problems in new ways and achieve breakthrough results. Understand how to apply the “Design Thinking” process to business and personal challenges. 

This will empower you to:

  • Achieve breakthrough performance by focusing on what you do best
  • Decide what to delegate, quit or outsource, and plan to maximize team resources
  • Create higher engagement and more effective collaboration with customers and colleagues



9:00am - 9:30am  Networking Break

9:30am - 10:15am  Breakout Session

Combating Stress and Burnout Starts with You

Cyrus Tibbs headshot

Cyrus Tibbs

CISO

PennyMac

Greg Nelson headshot

Greg Nelson

Director, Compliance and Cybersecurity

Smart & Final Stores

A CISO’s world is complex, challenging and at times exhausting. Between managing vulnerabilities, implementing new solutions, and navigating governance and company-wide risk assessments, it’s no wonder CISOs see the highest numbers of stress and burnout across the C-Suite. Taking care of yourself and modelling healthy behavior to your staff is key in supporting your team, retaining great talent, and building a more resilient organization.

Join this session to discuss:

  • How to model the work/life balance you want to see on your team
  • Ways to build your employee wellbeing strategy
  • Why trust and openness with your team is key to their mental health


9:30am - 10:15am  Breakout Session

Adapt and Persevere — Preparing for Next-Level Threats

Robert Sheldon headshot

Robert Sheldon

Director, Public Policy and Strategy

CrowdStrike

 The cyber threat landscape is unpredictable and features security concerns that must be shared across all levels of the organization. Understanding the significance of recent events gives visibility into the shifting dynamics of adversary tactics, which is critical for staying ahead of and ultimately defeating today’s threats. As security teams assess the evolving threat landscape, what changes are actually required, and what can be done about it?
 
Join this session to discuss:

  • What security teams need to know - and do - in an increasingly ominous threat landscape
  • How to implement the right combination of security tools to stop an adversary with speed
  • Effective security strategies and practical recommendations to stay ahead of next-level threats

9:30am - 10:15am  Executive Boardroom

Zero Trust – Hype or Hope?

Jeff Crume headshot

Jeff Crume

Distinguished Engineer, CTO Security, North America

IBM

John Rojas headshot

John Rojas

VP, Head of IT (CIO/CISO)

Air Lease Corporation

David Tyburski headshot

David Tyburski

Vice President, Chief Information Security Officer

Wynn Resorts

An organization's ability to achieve successful digital transformation is in large part enabled by the security team. Distributed, loosely connected infrastructure and tools, coupled with the demand for almost any-to-any connectivity, complicates the mission. Regularly defined as being delivered by a single "silver bullet" point solution, the term zero trust is now often held in poor regard. It is however, a highly effective conceptual framework, and perhaps even a cultural shift, that many organizations have been working with for several years.

Join this interactive boardroom to discuss:

  • The broader definition of what a zero trust framework is
  • The foundational control required to build a zero trust program
  • Strategies for improving the user experience and proving value to get organization-wide acceptance

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).

To reserve your seat, please contact Zack Hellmann at zach.hellmann@evanta.com

9:30am - 10:15am  Executive Boardroom

Data Doesn’t Lose Itself

Ryan Witt headshot

Ryan Witt

Resident CISO, Healthcare

Proofpoint

Marty Simmons headshot

Marty Simmons

Executive Director, IT Security

Iovance Biotherapeutics

Jean-Philippe Berreitter headshot

Jean-Philippe Berreitter

Head of Information Security Business Integration

Farmers Insurance

Your people are your most valuable asset, your greatest weakness, and your best defense. CISOs seeking to prevent data loss from malicious, negligent or compromised users can correlate content, behavior and threats for better insight and streamlined investigations.

Join this session to discuss:

  • Augmenting your data protection program with the right people and processes
  • Transforming your employees into effective data defenders
  • Managing insider threats and preventing data loss at the endpoint

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).

To reserve your seat, please contact Zack Hellmann at zach.hellmann@evanta.com

9:30am - 10:15am  Executive Boardroom

How Autonomous Action Augments Human Teams

Nicole Eagan headshot

Nicole Eagan

Chief Strategy Officer, AI Officer

Darktrace

Lara Divi headshot

Lara Divi

VP, CISO

Dine Brands Global, Inc.

A.J. Soria headshot

A.J. Soria

Director of Information Security

Age of Learning

Jonathan Chow headshot

Jonathan Chow

Chief Information Security Officer

Genesys

The sheer scale and complexity of cyber-threats has meant the challenge of securing your business has gone beyond a human-scalable problem. Security teams are inundated with alerts, while simultaneously trying to monitor data and activity spread across disparate environments and respond to attacks in real time. To rise to this challenge, the next phase of security must be automated.

During this peer-discussion you will explore:

•        Why mounting incidents across organizations is leading to alert fatigue 

•        How to trust the efficacy of autonomous response capabilities to stop in-progress attacks

 •        How automation can help to build cyber resilience and more effectively allocate resources


Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).

To reserve your seat, please contact:  Zack.Hellmann@evanta.com


10:15am - 10:45am  Networking Break

10:20am - 10:45am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

10:45am - 11:30am  Breakout Session

Cybersecurity Insurance - What Price Will You Pay?

Lara Divi headshot

Lara Divi

VP, CISO

Dine Brands Global, Inc.

Julia Zhu-Thompson headshot

Julia Zhu-Thompson

Managing Director / Client Executive

Marsh & McLennan Agency

Annice Ma headshot

Annice Ma

Vice President, Cyber Practice

Marsh

In the last year, cyber-attack sophistication blindsided some of the world’s biggest companies. The severity of financial loss was profound. Because of this, Cybersecurity insurance is continuously evolving. Part of your ransomware tool kit should include cybersecurity insurance. Many CISO’s think they know their cyber security policy, but do they really?  Bad actors are upping the ante and so must you.

Join this session to discuss:

  • The current state of the cyber insurance market given increased frequency/severity of cyber events 
  • Level of engagement needed from CISO’s to drive strong renewal results
  • What value is really afforded to organizations who carry cyber insurance

10:45am - 11:30am  Breakout Session

Security Service Edge (SSE) — Security is a Team Sport

James Christiansen headshot

James Christiansen

VP, CSO Cloud Security Transformation

Netskope

David Tyburski headshot

David Tyburski

Vice President, Chief Information Security Officer

Wynn Resorts

Todd Friedman headshot

Todd Friedman

CISO

ResMed

Jerry Sto. Tomas headshot

Jerry Sto. Tomas

CISO

HealthEdge

Building trust and reliance across technology and security teams is key to defending the enterprise.  As security stacks incorporate Security Service Edge (SSE) to sustain the SASE journey, the partnership between CIOs, CISOs, and their teams is more important than ever.
Join this session to learn about:

  • Best practices for IT and security collaboration
  • Communicating the importance of SSE to your CEO and Board
  • Improving internal stakeholder relationships to fuel business outcomes

10:45am - 11:30am  Executive Boardroom

The Ongoing Fight to Secure Business Email

Arun Singh headshot

Arun Singh

Vice President of Product Marketing

Abnormal Security

John Underwood headshot

John Underwood

VP, Information Security

Big 5 Sporting Goods

Alex Hall headshot

Alex Hall

Senior Director, Information Security (CISO)

International Vitamin Corporation

Despite their efforts, from phishing simulations to security awareness campaigns, CISOs from organizations big and small keep falling short when it comes to stopping Business Email Compromise (BEC) attacks. But, if everyone has an email security program, why are the losses associated with BEC still climbing?

Join this session to discuss:
•What is working, or not working, with existing processes and technology?
•How do we solve the “human factor” in the equation?
•Best practices for preventing loss related to a BEC attack?


Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).

To reserve your seat, please contact:  Zack.Hellmann@evanta.com


10:45am - 11:30am  Executive Boardroom

The State of Threat Detection —Actionable Insights and Adversary Techniques

Chris Rothe headshot

Chris Rothe

Chief Product Officer and Co-Founder

Red Canary

Brett Cumming headshot

Brett Cumming

Sr. Director, Information Security Officer

Skechers

Wael Younan headshot

Wael Younan

CIO

CalOptima

Staying ahead of the countless, persistent and often well-funded threat actors is a daunting task. A fast-moving security program can mean the difference between preventing a breach or becoming the next headline, but knowing where and how to prioritize efforts and resources can be just as challenging. What are CISOs doing to ensure their threat intelligence programs are on the right track for 2022 and beyond?

Join this peer roundtable to discuss:

•The latest threat landscape, including emerging threats and the most prevalent techniques

•Best practices for detecting, mitigating and simulating attacks

•How to test and validate defenses against common adversary behaviors


11:30am - 11:40am  Break

11:30am - 12:30pm  Lunch Service

12:30pm - 1:05pm  Keynote

Third-Party Cyber Risk — Zero-Day Findings and Mitigation

Chris White headshot

Chris White

Vice Chairman, Strategic Development Group

BlueVoyant

 Managing distributed risk is today’s defining cybersecurity challenge. Mitigation of zero-day vulnerabilities is critical as adversaries exploit supply chain entities. This session explores how to identify all third parties impacted by zero-day vulnerabilities and guide their mitigation efforts. Your vendor, supplier, and partner ecosystem is now your enterprise attack surface.

Join this session to learn:

  • How to manage distributed risk associated with hundreds and even thousands of vendors, suppliers, and partners
  • Approaches to identify, prioritize, and mitigate active threats and critical/zero-day vulnerabilities
  • Strategies to reduce supply chain/external ecosystem risk associated with zero-day


1:05pm - 1:20pm  Break

1:20pm - 2:05pm  Breakout Session

The New Threat Landscape - Are you Prepared?

Arthur Lessard headshot

Arthur Lessard

SVP & CISO

Universal Music Group

Steve Schwartz headshot

Steve Schwartz

Vice President and CISO

LionsGate Entertainment

Efficiently employing actionable threat intelligence is key to staying ahead of the next wave of threats. A fast-moving threat intelligence program that highlights the latest risks can spell the difference between preventing a breach or becoming the next headline. How can CISOs sift through the deluge of information?

Join this session to hear security leaders discuss:

  • Pinpointing and using actionable threat intelligence
  • Better leveraging their peer communities to share threat intel
  • Keeping up with the evolving nature of today’s threat landscape


1:20pm - 2:05pm  Executive Boardroom

Continuous Education for Your Cybersecurity Team

Chris Stoneley headshot

Chris Stoneley

CISO

Cathay Bank

Todd Friedman headshot

Todd Friedman

CISO

ResMed

The shortage of security talent is causing a crippling effect on many companies, and it's never been more important to invest in continuous cybersecurity education and training. This is a vital step in helping security teams respond faster, improve its defense posture, and increase retention. But building an effective education program can be time-consuming and divert focus from the TOP priority - keeping the organization safe.

In this discussion we will share:

  • How to right-size mentorship, training and education opportunities for your team
  • Ways to keep teams current on new threats, attack vectors, and technology trends
  • Strategies to balance training and learning opportunities against mission-critical work that demands focus

1:20pm - 2:05pm  Executive Boardroom

The Indispensable Human Element of Cybersecurity

Jon Anderson headshot

Jon Anderson

Director of Systems Engineering

SentinelOne

Cyrus Tibbs headshot

Cyrus Tibbs

CISO

PennyMac

Stephen Alford headshot

Stephen Alford

CIO & CISO

Worldwide Environmental

Artificial Intelligence is a pervasive part of our lives today and cybersecurity teams and adversaries alike have learned to harness the speed and power of machines to strengthen their capabilities. With machine learning becoming one of the most important tools of defense, leaders must balance the overwhelming speed and accuracy advantage of AI with the need for measured and intuitive interactions with a real-world human element.
 
Join this session to discuss:
•        What these trends mean for the hands-on practitioner
•        When velocity of innovation outpaces the capabilities of human intellect
•        The role of automation in the effective practice of securing our digital world

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).

To reserve your seat, please contact:  zack.hellmann@evanta.com

1:20pm - 2:05pm  Executive Boardroom

Merging Zero Trust and SASE

Ugochukwu Enyioha headshot

Ugochukwu Enyioha

VP of Security Engineering

Cloudflare

Billy Norwood headshot

Billy Norwood

Chief Information Security Officer

FFF Enterprises

Alex Hall headshot

Alex Hall

Senior Director, Information Security (CISO)

International Vitamin Corporation

Organizations are feeling a shift in the world of networking and security as they rapidly adopt and embrace the cloud. Enterprises need efficiency, visibility and security without compromise. The secure access service edge, better known as SASE, and zero trust implementations can provide a more comprehensive security capability to truly support digital transformation.
 
In this session, you will discuss:

  • Problems SASE can address in the modern enterprise
  • Benefits of planning both SASE and zero trust implementations
  • How to best position your organization for this transition

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).

To reserve your seat, please contact Zack Hellmann at zach.hellmann@evanta.com

2:05pm - 2:35pm  Networking Break

2:10pm - 2:35pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

2:35pm - 3:20pm  Breakout Session

From Asset Management to Asset Intelligence – Crossing the CAASM

Sean Blenkhorn headshot

Sean Blenkhorn

Vice President, Worldwide Sales Engineering

Axonius

As IT and security teams struggle to manage a complex sprawl of devices, users, cloud services, and software, there is one certainty we can rely on: complexity will only increase. But there's good news.

Join this session to learn about:

  • Deploying a new strategy of asset intelligence
  • The emerging Cyber Asset Attack Surface Management capabilities
  • Automation for improving security hygiene and remediation


2:35pm - 3:20pm  Executive Boardroom

Build and Protect for Tomorrow

Robert Gibson headshot

Robert Gibson

Senior Manager, Security Product Management

Fastly

Mike Cushing headshot

Mike Cushing

Head of Global Information Security

Patagonia

Abe Cohen headshot

Abe Cohen

AVP, Security and Compliance

Cornerstone

The pandemic not only accelerated the pace of digital transformation— it heightened customer expectations as they now require personalized, intuitive, and immediate experiences in our increasingly digital world. However, this demand also creates a need for secure, performant, and resilient technology. That increase pushes businesses to expand their technological ecosystems and grow the way they think about interfacing with customers and employees. With this expansion and change, come inherent risks.
 
Join this session as your peers discuss:
•Creating unique opportunities for business transformation
•Balancing innovation, while managing and protecting new technologies
•Implementing strategies for future-proofing a framework that allows for faster modernization


Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CICO's).

To reserve your seat, please contact: Zack Hellmann  (503) 445-6600   zack.hellmann@gartner.com


2:35pm - 3:20pm  Executive Boardroom

Cover Your SaaS: Addressing SaaS Security Risk

Ben Johnson headshot

Ben Johnson

Co-Founder and CTO

Obsidian

Ralph Johnson headshot

Ralph Johnson

Chief Information Security Officer

LA Times

Scott Niebuhr headshot

Scott Niebuhr

Director, Cyber Engineering

Aerospace Corporation

Nemi George headshot

Nemi George

Vice President, Information Security Officer

Pacific Dental Services

With an unprecedented amount of sensitive business data being entrusted to cloud applications, protecting your SaaS environment has never been more important. We will break down key considerations and major risks to address when building a comprehensive SaaS security strategy.

In this session Ben Johnson will discuss:

  • How recent cloud security advisories by CISA, NSA, and the White House apply to SaaS
  • Exploration of token theft attacks
  • Identifying and mitigating the risks of OAuth abuse

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees (seating priority is given to CISOs).

To reserve your seat, please contact:  zack.hellmann@evanta.com

3:20pm - 3:35pm  Networking Break

3:35pm - 4:10pm  Keynote

The Evolution of SOC

Jeff Johnson headshot

Jeff Johnson

VP, Head of Security North America

Siemens Healthineers

Whether your SOC is 24/7/365 or not, cyber threats don't take time off. With varying budgets, staffing and technologies, CISOs must adapt accordingly to ensure their SOC is able to identify, classify and action ongoing and evolving threats.

In this session we’ll discuss:

  •  Hybrid or In House, what’s the best SOC
  • Strategies to advocate for the resources your organization needs
  • The benefits and drawbacks of outsourcing versus in-house operation

4:10pm - 4:40pm  Closing Reception & Prize Drawing

June 14, 2022

We look forward to seeing you at an upcoming in-person gathering


Location


Venue & Accommodation

Sofitel Los Angeles at Beverly Hills

A block of rooms has been reserved at the Sofitel Los Angeles at Beverly Hills at a reduced conference rate. Reservations should be made online or by calling 844-382-3367. Please mention EVANTA to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $199 USD (plus tax) is May 16, 2022.

Your Community Partners


Global Thought Leader
CISO Thought Leader
Key Partners
Program Partners

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Zack Hellmann

Sr Program Manager

971-717-6691

zack.hellmann@evanta.com