Southern California CISO Executive Summit

May 21, 2024 | Renaissance Long Beach Hotel

May 21, 2024
Renaissance Long Beach Hotel


Collaborate with your peers

Get together with Southern California's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Advancing business growth and modernization through solid budgeting and prioritization

Establishing security's critical role in protecting and advancing the business through AI adoption

Improve and Achieve Operational Resilience

Southern California CISO Governing Body

The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Matt Crouse

Solar Turbines

Lara Divi

Dine Brands Global, Inc.

Todd Friedman


Arthur Lessard

Universal Music Group

Dan Meacham

VP, Global Security and Corporate Operations, CISO

Emily O'Carroll

Topgolf Callaway Brands Corp.
Sr. Director, Global Information Security & IT Compliance

Jeremy Smith

Avery Dennison

David Tyburski

Wynn Resorts
Vice President, Chief Information Security Officer

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Southern California CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.


May 20, 2024

May 21, 2024

6:00pm - 8:30pm  Governing Body Welcome Reception

Governing Body Welcome Reception

Join us for food, drinks and networking the evening before the summit. This will be held in the brand new patio space at the Renaissance Long Beach with fun patio games like giant jenga and connect 4. 

7:45am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

Body Language — Secrets for Enhanced Executive Presence

Chris Ulrich headshot

Chris Ulrich

Body Language Expert

Guest Speaker

Uncovering the mysteries of body language — how people communicate their thoughts and feelings without saying a word — is a decisive first step toward mastering any business and social situation.  Top executives know that detecting split-second signals from your team and  leadership then taking immediate action is crucial to being a persuasive communicator and problem-solver especially during tricky internal matters or high-level negotiations.

During this session you will learn how to:

  • Move beyond the vacuum of artificial body language to a behavioral approach based on YOU
  • Strengthen interpersonal relationships, be a more decisive leader and manage your nerves better
  • Uncover the less obvious needs of others and improve your team’s confidence and competence

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

The Imperatives of PAM

Emily O'Carroll headshot

Emily O'Carroll

Sr. Director, Global Information Security & IT Compliance

Topgolf Callaway Brands Corp.

Jonathan Chow headshot

Jonathan Chow

Chief Information Security Officer


Arthur Lessard headshot

Arthur Lessard


Universal Music Group

Organizations have suffered relentlessly from cyberattacks, each week it seems there are new headlines highlighting ransomware attacks or data breaches. With the sensitivity of privileged accounts, unpatched vulnerabilities, and an extensive remote workforce, privileged access management (PAM) is essential to securing your most critical systems and data.

Join this panel session to discuss:

  • Why PAM plays a crucial role in mitigating cyberattacks
  • Gaining executive buy-in on effective solutions
  • Having a proactive approach to implementation and configuration

9:40am - 10:25am  Breakout Session

AI Vs AI - How Adversaries and Security Teams Use AI

Mani Keerthi Nagothu headshot

Mani Keerthi Nagothu

Americas Field CISO Associate Director


With the explosion of Generative AI into widespread use over the past year, there are rising indications that threat actors are exploiting AI to launch cyberattacks. Tackling the evolving threat landscape means getting ahead of the threat - cyber defenders need to be prepared, using the power of AI to defend their organizations.

Join this session to discuss:

  • Analyzing how threat actors use AI offensively in their attack methods
  • Turning the tables on attackers by leveraging emerging technologies to bolster cybersecurity defense
  • Deploying AI for maximum impact to build capabilities and improve incident response

9:40am - 10:25am  Executive Boardroom

Risk to the Nth-Party Degree

John Chisum headshot

John Chisum

VP, Solutions Consulting

RiskRecon - A MasterCard Company

Michael Mongold headshot

Michael Mongold

Vice President, Information Security and Chief Information Security Officer

Deckers Brands

Scott Niebuhr headshot

Scott Niebuhr

Director of Cybersecurity

Aerospace Corporation

Joel Simangan headshot

Joel Simangan

Chief Information Security Officer

Los Angeles Unified School District

Third party relationships are closest and may prove to be the most tangible risks to your business, yet the whole supply chain of your business partners still pose a substantial threat. Most organizations’ vendor relationship extend to the 8th party. CISOs need to understand this web of connectedness in order to better manage and communicate enterprise risk.

Join this session to discuss:

  • Gaining visibility into risk across the whole supply chain
  • Strategies for effective risk management and monitoring business partners
  • Overcoming resource challenges to prioritize third-party and extended supply chain risk

9:40am - 10:25am  Executive Boardroom

Organizational Risk Mitigation — Protecting Humans from Themselves

Ryan Kalember headshot

Ryan Kalember

EVP, Cybersecurity Strategy


Mike Cushing headshot

Mike Cushing

Head of Global Information Security


Doug Murray headshot

Doug Murray

Global Head of Information Security

Centerfield Media

Sometimes it's hard to see a future beyond ransomware, BEC and data loss. But how do we not only ensure our cyber defense teams and the workforce they protect stay afloat in the current risk landscape, while simultaneously building toward future consolidation and risk mitigation scenarios?

Join this session to discuss:

  • Developing a human risk framework
  • Moving human-centric security controls from reactive and manual to proactive and automated
  •  Leveraging AI to protect humans from themselves

10:25am - 11:05am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:05am - 11:50am  Breakout Session

The CISO as a Savvy Board Communicator

Todd Friedman headshot

Todd Friedman



Sunil Agarwal headshot

Sunil Agarwal

CISO, VP Information Security and Risk Management

OSI Systems

Trina Ford headshot

Trina Ford



Translating the organization's cybersecurity posture to the board can be a catalyst in improving organizational resilience and building strong rapport. How do you communicate security initiatives clearly when the stakes are high?

Join this session to discuss:

  • Leveraging your expertise to build trust
  • Demystifying cybersecurity spending
  • Translating cybersecurity into actionable language

11:05am - 11:50am  Executive Boardroom

Achieving AppSec Maturity

Peter Chestna headshot

Peter Chestna

CISO of North America


Rosalia Hajek headshot

Rosalia Hajek

Global Business Information Security Officer

MGM Resorts International

Tony Velleca headshot

Tony Velleca


UST Global

A comprehensive AppSec program is vital to a successful business. But building cross-functional support and trust between developers and application security teams is a difficult task. How can CISOs take control of their AppSec programs and comprehensively secure against vulnerabilities – no matter the stage of development?

Join this session to discuss:

  • Mapping out crucial AppSec gaps
  • Analyzing what is needed to quickly remediate
  • Ensuring a positive developer experience  

11:05am - 11:50am  Executive Boardroom

The Business of Security — Bridging the Gap Between Cyber Initiatives and Business Impact

Mike Longenecker headshot

Mike Longenecker

Principal Solutions Architect


Alex Hall headshot

Alex Hall

Global CISO


Steve Schwartz headshot

Steve Schwartz

Vice President and CISO

Lionsgate Entertainment

John Underwood headshot

John Underwood

VP, Information Security

Big 5 Sporting Goods

Economic trends have tightened purse strings everywhere, leaving CISOs and security leaders to demonstrate ROI and defend their budgets. But ROI is notoriously tough to quantify when the primary return for security investment is reduction in risk. As a result, bridging the gap between security investments and actual business impact can be easier said than done, particularly if your cybersecurity spend doesn’t clearly map to organizational goals.

Join this session to discuss:

  • Identifying the right metrics for quantifying security ROI and business impact        
  • Positioning security as a business enabler, rather than a cost center
  • Aligning security investments to organizational goals

11:50am - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

Keynote Hosted by Palo Alto Networks

 Session details coming soon 

1:10pm - 1:35pm  Break

1:35pm - 2:20pm  Breakout Session

Convergence of Digital, Physical, and Beyond

Dan Meacham headshot

Dan Meacham

VP, Global Security and Corporate Operations, CISO


 There is no shortage of data available to the security function but leveraging that data to enhance physical security — is a different story. CISOs have the opportunity to derive meaningful findings from their environments (both digital and physical) and incorporate security into every aspect of the enterprise — cyber, physical and personnel security.

Join Dan Meacham, Global CISO at Legendary Entertainment as he explores:

  • The past, present and future of expanding your strategy to include physical security
  • Understanding additional data points and why they are important to your program
  • Expanding your risk lens beyond securing information and planning for the future

1:35pm - 2:20pm  Breakout Session

Modern Workforce, Modern Security Strategy

Vinod D'Souza headshot

Vinod D'Souza

Office of the CISO, Head of Manufacturing and Industry


In the age of remote and hybrid work, employees now spend the majority of their time in the browser or in virtual meetings. The workforce is more mobile and distributed than ever before. At the same time, we are seeing an increase in cyber attacks and a higher average cost of data breaches. We must think more about protecting users right where they interface with web threats, the browser, without disrupting productivity. 

Join this session to hear about: 

  • The browser's role in a business's security strategy 
  • Zero trust architecture 
  • Managing resources for cybersecurity in a time of economic uncertainty

1:35pm - 2:20pm  Executive Boardroom

Securing the Everywhere World — Building Cyber Resilience through a “Connectivity Cloud”

Trey Guinn headshot

Trey Guinn

Field Chief Technologist


Wes Gavins headshot

Wes Gavins

VP, Head of Cybersecurity


John Rojas headshot

John Rojas

VP, Head of IT (CIO/CISO)

Air Lease Corporation

David Suh headshot

David Suh

Director of Security

Sorenson Communications

When users are everywhere and digital operations span cloud, SaaS, and on-premises environments, achieving cyber resilience becomes paramount. The challenge lies in navigating this complexity and maintaining visibility and control to ensure continuous operation despite cyber threats.

Join this interactive roundtable to discuss:

  • Optimizing costs and improving security across diverse cloud environments
  • Adopting Zero Trust philosophies to protect users, data, and applications
  • Innovating with AI while addressing global regulatory and data privacy requirements

2:20pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

The Future of IAM

Matt Crouse headshot

Matt Crouse


Solar Turbines

Lara Divi headshot

Lara Divi


Dine Brands Global, Inc.

The path to a stronger IAM starts with the customer, whether you’re in the public sector, or selling coffee. CISOs are often challenged with trying to create the best user experience and keeping the company secure. But It’s not just about security it is also about the business. Gaining buy in and building better relationships is key.

Join this session to learn:

  • Why passwordless implementation is a game-changer
  • How to strengthen relationships with business and tech teams
  • Where to find solutions for credential stuffing

3:00pm - 3:45pm  Breakout Session

Governance & Guardrails to Responsibly Accelerate AI Innovation

Businesses are leveraging AI to create competitive advantage, but leadership teams are conflicted between speed to value and managing uncertain risks. CISOs play a critical role in identifying risks and supporting protections, but guardrails and controls can mistakenly be viewed as an impediment to innovation. But the right controls can enable you to hit the gas even harder.

Join this session to discuss:

  • Identifying & protecting critical AI systems
  • Driving speed with risk management to generate value from investments
  • Educating the Board & leadership on the value of risk management for responsible AI

3:00pm - 3:45pm  Executive Boardroom

What Grade Would You Give Your IGA Deployment?

Rich Dandliker headshot

Rich Dandliker

Chief Strategist


Chris Stoneley headshot

Chris Stoneley


Cathay Bank

Vimal Subramanian headshot

Vimal Subramanian


Cue Health

Identity Governance and Administration (IGA) has been a cornerstone of compliance programs for decades. Despite this history, the reality of IGA rarely matches the customers’ initial expectations and the needs of the business. Increasingly, customers are demanding that IGA tools not only “check the box” for auditors, but also drive forward Least Privilege to secure their organization in today’s landscape of cyber threats.

Join this interactive roundtable session to discuss:

  • Explore current practices, tools, and effectiveness of IGA programs
  • Evaluate the extent to which IGA goes beyond compliance to bolster security posture
  • Identify the critical gaps that may limit the effectiveness of an IGA program.

3:00pm - 3:45pm  Executive Boardroom

Communicating Effectively Utilizing Outcome Driven Tactics

Tim Crothers headshot

Tim Crothers

Director, Office of the CISO

Google Cloud Security

Nemi George headshot

Nemi George

Vice President, Information Security Officer

Pacific Dental Services

Michael Mongold headshot

Michael Mongold

Vice President, Information Security and Chief Information Security Officer

Deckers Brands

As security leaders gain more face time with the board and key stakeholders, communicating in a way that is understood and out of the weeds is getting more necessary. To keep communication effective as CISOs, implementing some of the process improvement tactics to your own style is helpful. 

Join this boardroom to get insight into:

  • Developing unique KPIs for your security team and yourself
  • Setting clear goals that allow your team to exceed them
  • Outcome driven security and how to implement it into your communication style

3:45pm - 4:10pm  Break

4:10pm - 4:55pm  Keynote

Fact vs. Fiction — FBI Cybersecurity Unit

Michael Sohn headshot

Michael Sohn

Supervisory Special Agent

Federal Bureau of Investigation

 The FBI employs a global network of cyber threat experts to investigate cybercriminals, disrupt malicious activity, seek justice, and prevent crime. Come with your questions as a panel of the FBI’s cybersecurity experts discuss what trends they are seeing and monitoring.

Join this keynote to explore:

  • Best practices of working with law enforcement before, during and after a breach
  • The latest cyber threats on the horizon and consequences on cyber adversaries
  • Case studies and lessons learned

4:45pm - 5:00pm  Closing Reception & Prize Drawing

May 20, 2024

May 21, 2024

We look forward to seeing you at an upcoming in-person gathering

Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.


Venue & Accommodation

Renaissance Long Beach Hotel

A block of rooms has been reserved at the Renaissance Long Beach Hotel at a reduced conference rate. Reservations should be made online or by calling 562-437-5900. Please mention Renaissance Long Beach Hotel to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $269 USD (plus tax) is April 29, 2024.

Your Community Partners

Global Thought Leader
CISO Thought Leaders
Key Partners
Program Partners

Community Program Manager

For inquiries related to this community, please reach out to your dedicated contact.

Zack Hellmann

Senior Community Program Manager