Southern California CISO Executive Summit

December 5, 2023 | Renaissance Long Beach Hotel

December 5, 2023
Renaissance Long Beach Hotel

Collaborate with your peers

Get together with Southern California's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

The AI Paradox — Balancing the Benefits and Dangers of Innovation

Remarkable Resilience — Tools for Combating Toxic Stress and Burnout

Data Governance — Landmines, Pitfalls and Solutions

Southern California CISO Governing Body

The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Matt Crouse

Solar Turbines

Lara Divi

Dine Brands Global, Inc.

Todd Friedman


Arthur Lessard

Universal Music Group

Dan Meacham

VP, Global Security and Corporate Operations, CISO

Emily O'Carroll

Topgolf Callaway Brands Corp.
Sr. Director, Global Information Security & IT Compliance

David Tyburski

Wynn Resorts
Vice President, Chief Information Security Officer

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Southern California CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.


December 4, 2023

December 5, 2023

6:00pm - 8:30pm  Governing Body Welcome Reception

Governing Body Welcome Reception

Governing Body members host this dinner for attendees to launch the event with an evening of peer networking.

7:45am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

Remarkable Resilience - Tools for Combating Toxic Stress & Burnout

Sheila Hamilton headshot

Sheila Hamilton

Mental Health Thought Leader and Author of "All the Things We Never Knew"

Guest Speaker

Today’s CISOs face daunting challenges. As the business leader in charge of adding value to the company, finding the right talent and inspiring technology innovation, there’s an incredible amount of pressure. It’s no surprise that CIOs & CISOs are experiencing burnout at unprecedented rates. While taking care of employees is important, how can CIOs & CISOs make sure they are taking care of themselves to help make their careers sustainable while maintaining a sense of well-being?

Join this keynote to explore:

  • Evidence-based strategies that can help alleviate burnout
  • How to recognize the signs and symptoms of toxic stress and burnout
  • How to remain engaged, energized, and focused during turbulent times

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Securing the Future of Ethical AI

Matt Costello headshot

Matt Costello

Vice President

Booz Allen Hamilton

AI is having a transformative effect across a multitude of industries, and the responsible and ethical use of this technology is of huge importance. CISOs are looking for practical, tangible and useful tools in order to leverage AI responsibly and ethically, while also uncovering its potential benefits for the organization. How can CISOs be responsible AI practitioners?

Join this session to learn:

  • Practical, not theoretical, actions CISOs can take today
  • New perspectives on ethical AI algorithms
  • How to build your own Responsible AI (RAI) capacity

9:40am - 10:25am  Breakout Session

Modernizing Data Governance is a Team Endeavor

Eddie Galang headshot

Eddie Galang

Chief Information Security Officer

Port of Long Beach

Sasha Pereira headshot

Sasha Pereira

CISO / Director of IT Security

Wash Multifamily Laundry Systems

Rushton James headshot

Rushton James


Liberty Dental Plan

Having a secure data governance program that successfully aligns with business priorities is unparalleled. As data becomes increasingly available across multiple cloud environments, it's critically important to preserve the confidentiality, integrity, and availability of information. s data becomes increasingly available across multiple cloud environments, it's critically important to preserve the confidentiality, integrity, and availability of information

Join this session to discuss:

  • How data governance is evolving though it's policies, players and rules
  • Where the challenges and roadblocks lie, including privacy concerns & quality issues
  • How CISOs experiences both positives and negatives can help the whole team

9:40am - 10:25am  Executive Boardroom

Countdown to Compliance – Preparing for Changing SEC Requirements

Mike Longenecker headshot

Mike Longenecker

Principal Solutions Architect


Billy Norwood headshot

Billy Norwood

Chief Information Security Officer

FFF Enterprises

John Rojas headshot

John Rojas

VP, Head of IT (CIO/CISO)

Air Lease Corporation

As we approach December 15th, a significant regulatory shift looms on the horizon for publicly traded companies, mandated to disclose security breaches with substantial impact within a stringent four-business-day window. Moreover, these entities are entrusted with the continuous task of sharing details on their risk management apparatus and practices, bringing an unprecedented level of transparency and urgency to the cybersecurity landscape.

Join this session to discuss:

  • Unraveling the intricate web of considerations surrounding the SEC's revised mandate
  • Approaching regulatory milestones with informed strategy and foresight
  • Looking ahead to future regulatory shifts that affect your security strategy

9:40am - 10:25am  Executive Boardroom

Managing Risk from Critical Vulnerabilities

Jason Mical headshot

Jason Mical

Field Chief Technology Officer - Americas


Konrad Fellmann headshot

Konrad Fellmann


Cubic Corporation

Dan Meacham headshot

Dan Meacham

VP, Global Security and Corporate Operations, CISO


In today’s threat landscape, security teams are frequently forced into reactive positions, lowering security program efficacy and sustainability. Strong foundational security program components, including vulnerability and asset management processes, are essential to building resilience in a persistently elevated threat climate.

Join this interactive boardroom to discuss:

  • Defining what your emergency procedures and “playbooks” look like.
  • How you prioritize CVEs, VPNs and firewalls
  • Combatting the challenge of zero-day exploitation

10:25am - 11:00am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:00am - 11:45am  Breakout Session

Generative AI — A New Take

Jeremy Smith headshot

Jeremy Smith


Avery Dennison

Rudy Ramirez headshot

Rudy Ramirez


Citizens Business Bank

The realm of Generative AI is here and there is no sector will be unaffected. CISOs and their teams are tasked with securing utilization and consumption. On the dark side, GenAI opens the door to imperilment just as much as innovation. CISOs across Southern California are coming together to share their thoughts and plans on this elusive technology.

Join this interactive session to discuss and debate:

  • Hot topics across industries
  • Impacts on the businesses and enterprise solutions
  • Strategies for communicating opportunities and obstacles

11:00am - 11:45am  Executive Boardroom

Strategic Pitfalls in Third-Party Risk Management

Dave Holden headshot

Dave Holden

Regional Sales Director

RiskRecon - A MasterCard Company

Brian Barrios headshot

Brian Barrios


Southern California Edison Company

Ernie Liu headshot

Ernie Liu


United Talent Agency

Chris Stoneley headshot

Chris Stoneley


Cathay Bank

Managing cyber risk across an enterprise IT infrastructure has never been harder. Remote workers, advancing attack methods, and an ever-expanding vendor network are challenging every firm, as total visibility into threats has become nearly impossible. As digital business strategy matures, more organizations are becoming dependent on the cyber posture and protection of third parties. Third-party risks present a unique challenge because you are depending on vendors and partners to operate securely to keep your data and information safe. How are you mitigating the associated risks and demonstrating this to the business to ensure effective security programs?

Join our session to hear about:

  • Common failings across TPRM programs that led to breach events
  • How executives can provide strategic direction for third-party risk teams
  • Key practices being implemented by leading vendor risk firms to maintain strong supply chain risk management

11:00am - 11:45am  Executive Boardroom

Unifying the Analyst Experience to Improve Threat Detection and Response

John Velisaris headshot

John Velisaris

Director of Threat Management Services

IBM Security

Arlene Yetnikoff headshot

Arlene Yetnikoff


California Institute of Technology

Jeffrey Aguilar headshot

Jeffrey Aguilar


Los Angeles County, CA

Yev Avidon headshot

Yev Avidon

Director, Data Protection

The Kroger Co.

Given today’s dynamic threat landscape, involving constantly changing malicious TTPs, CISOs must have a proactive threat management strategy to handle complex attacks. However, with widely distributed infrastructures and the number of tools with different levels of control and responsibility, maintaining true visibility is difficult. Staffing shortages and the high volume of alerts that come in from fragmented tools adds to this challenge. The solution? Unifying the analyst experience to connect existing tools and workflows across your hybrid cloud environment.

Join this session to discuss:

  • Detecting and responding to advanced attacks like ransomware
  • Unifying the analyst experience with AI and machine learning - starting with understanding your attack surface and through EDR/XDR, SIEM, SOAR
  • Identifying blind spots in your cloud security strategy due to information fragmentation

11:00am - 11:45am  Executive Boardroom

Managing the Chaos – Mitigating Risk Through Consolidation

Trey Guinn headshot

Trey Guinn

Field Chief Technologist


Kevin Kealy headshot

Kevin Kealy


Light & Wonder

Wael Younan headshot

Wael Younan

Chief Information Officer/Chief Information Security Officer


Richard Yun headshot

Richard Yun



In today’s cyber environment, operational inefficiencies and poor integration can be the downfall of an otherwise strong security stack. Being fully transparent about your weaknesses, strengths and investments as it relates to cyber risk can be an uncomfortable conversation to have, but it is essential to the overall health of the business.

Join this session to discuss:

  • Reducing complexity and improving risk posture through security consolidation
  • Using data to explain the risks of security and IT sprawl and champion practical solutions
  • Fostering trust and driving cost optimization in cybersecurity investments

11:45am - 12:30pm  Lunch Service

12:30pm - 1:05pm  Keynote

Adaptable Cybersecurity Strategies for AI and Emerging Technologies

Brad Moldenhauer headshot

Brad Moldenhauer



Leaders in every age must decide whether new trends are worth pursuing or distracting hype. In recent years, business success has become increasingly reliant on its IT infrastructure, making advances in this field especially consequential for innovation and accelerated business outcomes. AI and zero trust architecture are two such trends, and their ability to reduce risk, eliminate cost and complexity, and increase agility are well-documented.

Join this session and learn:

  • How zero trust architecture secures users, workloads, IoT/OT devices, and business partners by addressing critical security shortcomings of legacy network architecture
  • How to reduce network complexity without exposing your organization to new risks
  • How AI/ML adds defensive and business analytics capabilities that have the power to turn IT into the engine propelling business success forward

1:05pm - 1:30pm  Break

1:30pm - 2:15pm  Breakout Session

The Right Approach to Change – A Transformation Conversation

John Spiegel headshot

John Spiegel

Field CTO, Network Transformation

Hewlett Packard Enterprise

Ray Austad headshot

Ray Austad

Director, Information Security and Risk Management

Farmers Insurance

With an ever-changing security landscape, the role of the security leader is evolving fast.  Cyber threats, an increasing regulatory environment, budget limitations, organizational changes, all balanced with the need to retire technical debt.  This session is about finding the right approach to modern challenges facing companies who look to transform their technology investments and security posture while undergoing organizational change.  

Join this session to gain insight into: 

  • Matching technology investments to reduce risk and cost while retiring technical debt
  • Pathways to leverage regulations to accelerate the transformation
  • How to think about your organization during this process

1:30pm - 2:15pm  Breakout Session

Future Role of the CISO – To the C-Suite & the Board

Jeff Farinich headshot

Jeff Farinich

SVP Technology and Chief Information Security Officer

New American Funding

John Underwood headshot

John Underwood

VP, Information Security

Big 5 Sporting Goods

 When individual politics in an organization conflict with your goals, it can put a halt to the growth and health of a CISOs role.  The influence of other C-level leaders can either strengthen or weaken your position. CISOs should be asking: Am I a true officer of this position? Is my reporting structure effective? Am I seen as a true leader in this organization? If you want a seat at the table, make one.

Join this discussion to learn:

  • How to build your visibility and responsibility with top leadership
  • Why the health of your relationship with the C-Suite is key
  • How CISOs can equip each other to sharpen their position

1:30pm - 2:15pm  Executive Boardroom

Navigating the Cyber Risks & Opportunities of Cloud — Evaluating Options

Mani Keerthi Nagothu headshot

Mani Keerthi Nagothu

Americas Field CISO Associate Director


Tony Velleca headshot

Tony Velleca



Mike Cushing headshot

Mike Cushing

Head of Global Information Security


Kendrick Tse headshot

Kendrick Tse

Director of Information Security

Hot Topic

The use of cloud technology has become a popular choice for businesses, providing them with numerous advantages but also introducing new threats. Cyber security risks can cause financial and reputational damage if left unmanaged, which is why it is essential to understand all the ways to protect the enterprise.  

In this boardroom we will discuss:      

  • New insights to cloud-based attacks and the impacts
  • Defenses to financial and reputational damage
  • Securing cloud and cloud governance

1:30pm - 2:15pm  Executive Boardroom

Modernizing your Security SecOps Program in the Cloud

Tim Prowitt headshot

Tim Prowitt

Manager, Enterprise Sales


Sasha Pereira headshot

Sasha Pereira

CISO / Director of IT Security

Wash Multifamily Laundry Systems

Billy Norwood headshot

Billy Norwood

Chief Information Security Officer

FFF Enterprises

In today’s rapidly evolving security landscape, security programs must possess three indispensable capabilities to be truly effective: speed, scale, and flexibility. But to get to that ideal state, CISOs must overcome a bevy of obstacles, like legacy tools that are continuously breaking and homegrown systems that are challenging to maintain.

In this session we will discuss how to:

  • Build a scalable infrastructure by exploring tools, processes and skills
  • Share challenges with current SecOps frameworks and ideas for more modern approaches
  • Explore solutions for high volume cloud log sources while keeping budget in check

2:15pm - 2:50pm  Networking Break

2:20pm - 2:45pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

2:50pm - 3:35pm  Breakout Session

Molding Modern Leaders & Diversity

Shoaib Qazi headshot

Shoaib Qazi

Chief Information Security and Technology Officer


Holly Selent headshot

Holly Selent

Senior Manager, VMO & Information Security


Companies with greater diversity are more profitable, more socially responsible, and provide more well-rounded perspectives. No organization can drive results without highly adept leadership and a strong bench of successors. So why is it that there are so few women in the C-Suite?  Today, CISOs have a great opportunity to change the narrative by becoming an advocate for the advancement of women in leadership roles. Join Shoaib Qazi, CISO at RXO as he draws from his experience of growing and sponsoring female leadership at his organization.

Join this session to discuss:

  • Why having women & diversity in the workplace is so impactful
  • How CISOs play a critical role in advocating for women leaders
  • Why supporting and growing diverse leaders is paramount for the health of the organization

2:50pm - 3:35pm  Executive Boardroom

Data IS Your Business – How Do You Secure it in the Cloud-Era

Jason Cook headshot

Jason Cook

Field CTO Americas


Chris Stoneley headshot

Chris Stoneley


Cathay Bank

Tim Lee headshot

Tim Lee


City of Los Angeles, CA

Alex Bermudez headshot

Alex Bermudez


Fisker Group, Inc.

In these times of rapid technological advancement, data stands as the cornerstone of innovation. As we navigate through the information age, it's evident that data residing in the cloud represents the fastest area of growth. To maintain pace with the agility of cloud operations, it is imperative to discover and adopt strategic approaches and robust architectures.

Gather with your C-level peers to:

  • Start solving the challenge of data visibility in the cloud
  • Determine who in your organization should own data security (CISO? CDO? CPO?)
  • Discuss how automation and agility can be accomplished through tooling or processes

2:50pm - 3:35pm  Executive Boardroom

A New Vision for Identity Security

Barak Feldman headshot

Barak Feldman

SVP, PAM and Identity Security


Dan Meacham headshot

Dan Meacham

VP, Global Security and Corporate Operations, CISO


Stephen Alford headshot

Stephen Alford


Worldwide Environmental

Webb Deneys headshot

Webb Deneys

SVP, Information Technology, CISO

Cardinal Financial Company

The number of human and machine identities seeking access to data and critical business systems has grown exponentially, in turn increasing the threat landscape and challenging traditional IAM paradigms. How do security leaders keep a pulse on tools and capabilities to assess their organization’s cybersecurity posture?

 Join this boardroom to discuss:

  • Managing and securing all identities
  • Mitigating risks in multi-cloud and hybrid environments
  • Balancing high expectations and avoiding burnout

2:50pm - 3:35pm  Executive Boardroom

Expanding Your Application Security — Integrating CNAPP and API Security for Improved Risk Analysis

Erik Watson headshot

Erik Watson

Leader Customer Success Strategy

Outshift by Cisco

Rudy Ramirez headshot

Rudy Ramirez


Citizens Business Bank

Jeremy Smith headshot

Jeremy Smith


Avery Dennison

Steve Schwartz headshot

Steve Schwartz

Vice President and CISO

LionsGate Entertainment

There comes a time when organizations realize they need to enhance their application security beyond the conventional CNAPP workload and supply chain. To do this they’ll need to look forward and combine their current model with the next phase of application security; API security.

Join this session to discuss:

  • Roadblocks faced in their current application security journey
  • How to combine CNAPP and API security
  • Benefits API security applications bring to your security posture

3:35pm - 4:00pm  Break

4:00pm - 4:45pm  Keynote

Shadow in the Darkness – Cyber Defense in a Changing Threat Landscape

Brian Barrios headshot

Brian Barrios


Southern California Edison Company

Wes Gavins headshot

Wes Gavins



Bernie Riedel headshot

Bernie Riedel

Supervisory Special Agent


Matt Crouse headshot

Matt Crouse


Solar Turbines

The last few years of global instability and conflict have defined a new threat paradigm for CISOs and their teams. Ransomware groups and bad actors are changing their initial access vectors as the digital attack surface and vulnerabilities shift. Sophisticated toolkits easily purchased on the dark web and “living off the land” techniques are allowing threat actors to penetrate even the toughest of perimeters. Additionally, the changing geopolitical and economic environment have provided state-sponsored attackers with unlimited resources to target NGOs and critical resources.

In this Keynote session we will discuss:

  • The foundational measures required to build a strong, multi-layered cyber defense.
  • The importance of public-private partnerships for intelligence sharing and shared investment in national security.
  • Supply chain risks and mitigations to protect against backdoor attacks

4:35pm - 5:00pm  Closing Reception & Prize Drawing

December 4, 2023

December 5, 2023

We look forward to seeing you at an upcoming in-person gathering

Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.


Venue & Accommodation

Renaissance Long Beach Hotel

A block of rooms has been reserved at the Renaissance Long Beach Hotel at a reduced conference rate. Reservations should be made online or by calling 1-800-468-3571. Please mention Evanta SoCal Executive Summit to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $231 USD (plus tax) is November 13, 2023.

Your Community Partners

Global Thought Leaders
CISO Thought Leaders
Key Partners
Program Partners

Community Program Manager

For inquiries related to this community, please reach out to your dedicated contact.

Zack Hellmann

Senior Community Program Manager