Southern California CISO Executive Summit

May 21, 2024 | Marriott Long Beach Downtown

May 21, 2024
Marriott Long Beach Downtown

Collaborate with your peers

Get together with Southern California's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Advancing business growth and modernization through solid budgeting and prioritization

Establishing security's critical role in protecting and advancing the business through AI adoption

Improve and Achieve Operational Resilience

Southern California CISO Governing Body

The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Matt Crouse

Solar Turbines

Lara Divi

Dine Brands Global, Inc.

Todd Friedman


Arthur Lessard

Universal Music Group

Dan Meacham

VP, Global Security and Corporate Operations, CISO

Emily O'Carroll

Topgolf Callaway Brands Corp.
Sr. Director, Global Information Security & IT Compliance

Jeremy Smith

Avery Dennison

David Tyburski

Wynn Resorts
Vice President, Chief Information Security Officer

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Southern California CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.


May 20, 2024

May 21, 2024

6:00pm - 8:30pm  Governing Body Welcome Reception

Governing Body Welcome Reception

Join us for food, drinks and networking the evening before the summit. This will be held in the atrium with fun patio games like, ladder golf, giant Jenga and Connect 4. 

7:45am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

Body Language — Secrets for Enhanced Executive Presence

Chris Ulrich headshot

Chris Ulrich

Body Language Expert

Guest Speaker

Uncovering the mysteries of body language — how people communicate their thoughts and feelings without saying a word — is a decisive first step toward mastering any business and social situation.  Top executives know that detecting split-second signals from your team and  leadership then taking immediate action is crucial to being a persuasive communicator and problem-solver especially during tricky internal matters or high-level negotiations.

During this session you will learn how to:

  • Move beyond the vacuum of artificial body language to a behavioral approach based on YOU
  • Strengthen interpersonal relationships, be a more decisive leader and manage your nerves better
  • Uncover the less obvious needs of others and improve your team’s confidence and competence

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

The Imperatives of PAM

Emily O'Carroll headshot

Emily O'Carroll

Sr. Director, Global Information Security & IT Compliance

Topgolf Callaway Brands Corp.

Jonathan Chow headshot

Jonathan Chow

Chief Information Security Officer


Arthur Lessard headshot

Arthur Lessard


Universal Music Group

Organizations have suffered relentlessly from cyberattacks, each week it seems there are new headlines highlighting ransomware attacks or data breaches. With the sensitivity of privileged accounts, unpatched vulnerabilities, and an extensive remote workforce, privileged access management (PAM) is essential to securing your most critical systems and data. Implementing this is not a quick fix it’s a journey.

Join this panel session to:

  • Discuss the difference between PAM solution and password management
  • Address different approaches to solving the Privilege Access Management problem
  • Gain executive buy in from legal, HR and IT on effective solutions

9:40am - 10:25am  Breakout Session

AI Vs AI - How Adversaries and Security Teams Use AI

Mani Keerthi Nagothu headshot

Mani Keerthi Nagothu

Americas Field CISO Associate Director


With the explosion of Generative AI into widespread use over the past year, there are rising indications that threat actors are exploiting AI to launch cyberattacks. Tackling the evolving threat landscape means getting ahead of the threat - cyber defenders need to be prepared, using the power of AI to defend their organizations.

Join this session to discuss:

  • Analyzing how threat actors use AI offensively in their attack methods
  • Turning the tables on attackers by leveraging emerging technologies to bolster cybersecurity defense
  • Deploying AI for maximum impact to build capabilities and improve incident response

9:40am - 10:25am  Executive Boardroom

Risk to the Nth-Party Degree

John Chisum headshot

John Chisum

VP, Solutions Consulting

RiskRecon - A MasterCard Company

Scott Niebuhr headshot

Scott Niebuhr

Director of Cybersecurity

Aerospace Corporation

Joel Simangan headshot

Joel Simangan

Chief Information Security Officer

Los Angeles Unified School District

Third party relationships are closest and may prove to be the most tangible risks to your business, yet the whole supply chain of your business partners still pose a substantial threat. Most organizations’ vendor relationship extend to the 8th party. CISOs need to understand this web of connectedness in order to better manage and communicate enterprise risk.

Join this session to discuss:

  • Gaining visibility into risk across the whole supply chain
  • Strategies for effective risk management and monitoring business partners
  • Overcoming resource challenges to prioritize third-party and extended supply chain risk

9:40am - 10:25am  Executive Boardroom

Organizational Risk Mitigation — Protecting Humans from Themselves

Ryan Kalember headshot

Ryan Kalember

Chief Strategy Officer


Anthony Chogyoji headshot

Anthony Chogyoji


Riverside County

Mike Cushing headshot

Mike Cushing

Head of Global Information Security


Sometimes it's hard to see a future beyond ransomware, BEC and data loss. But how do we not only ensure our cyber defense teams and the workforce they protect stay afloat in the current risk landscape, while simultaneously building toward future consolidation and risk mitigation scenarios?

Join this session to discuss:

  • Developing a human risk framework
  • Moving human-centric security controls from reactive and manual to proactive and automated
  •  Leveraging AI to protect humans from themselves

10:25am - 11:05am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:05am - 11:50am  Breakout Session

The CISO as a Savvy Board Communicator

Todd Friedman headshot

Todd Friedman



Sunil Agarwal headshot

Sunil Agarwal

CISO, VP Information Security and Risk Management

OSI Systems

Trina Ford headshot

Trina Ford



Translating the organization's cybersecurity posture to the board can be a catalyst in improving organizational resilience and building strong rapport. How do you communicate security initiatives clearly when the stakes are high?

Join this session to discuss:

  • Leveraging your expertise to build trust
  • Demystifying cybersecurity spending
  • Translating cybersecurity into actionable language

11:05am - 11:50am  Executive Boardroom

The Business of Security — Bridging the Gap Between Cyber Initiatives and Business Impact

Justin Bajko headshot

Justin Bajko

Co-Founder, VP, Strategy & Business Development


Alex Hall headshot

Alex Hall

Global CISO


Steve Schwartz headshot

Steve Schwartz

Vice President and CISO

Lionsgate Entertainment

Jessica Sica headshot

Jessica Sica

Head of Security

Weave Communications

Economic trends have tightened purse strings everywhere, leaving CISOs and security leaders to demonstrate ROI and defend their budgets. But ROI is notoriously tough to quantify when the primary return for security investment is reduction in risk. As a result, bridging the gap between security investments and actual business impact can be easier said than done, particularly if your cybersecurity spend doesn’t clearly map to organizational goals.

Join this session to discuss:

  • Identifying the right metrics for quantifying security ROI and business impact        
  • Positioning security as a business enabler, rather than a cost center
  • Aligning security investments to organizational goals

11:05am - 11:50am  Executive Boardroom

Navigating the New AppSec Terrain — A CISO’s Guide

James Brotsos headshot

James Brotsos

Head of Product Management


Brett Cumming headshot

Brett Cumming

Sr. Director, Information Security Officer


Tony Velleca headshot

Tony Velleca


UST Global

We know that a comprehensive AppSec program is critical for a successful business. With cloud-based applications expanding and AI-generated code offering both opportunities and risks, CISOs must navigate a drastically changed threat landscape. So, how can CISOs effectively manage their AppSec initiatives to ensure comprehensive security across the SDLC, despite the expanding complexities?

In this session, we’ll discuss the value of:

  • Streamlining developer workflows with integrated security tools to boost developer experience
  • Consolidating tools to simplify operations and tackle tool sprawl
  • Utilizing AI to enhance security and increase productivity across teams

11:50am - 12:35pm  Lunch Service

12:35pm - 1:10pm  Keynote

Securing the Future of Work — Challenges and Strategies for the Hybrid Landscape

Jason Georgi headshot

Jason Georgi

Field Chief Technology Officer for Prisma Access

Palo Alto Networks

The rise of unmanaged devices, dispersed teams, and sophisticated AI-powered attacks demands a comprehensive rethinking of security architectures. Organizations must examine the critical challenges facing the modern workplace and explore emerging strategies to future-proof security.

Join this keynote discussion to learn: 

  • How organizations can maintain control and visibility in a BYOD and contractor-driven environment
  • How AI and LLMs are reshaping data protection, minimizing false positives, and proactively identifying risks
  • Today's emerging technologies that can deliver seamless application experiences, even across distributed workforces

1:10pm - 1:35pm  Break

1:35pm - 2:20pm  Breakout Session

Convergence of Digital, Physical and Beyond

Dan Meacham headshot

Dan Meacham

VP, Global Security and Corporate Operations, CISO


 There is no shortage of data available to the security function but leveraging that data to enhance physical security — is a different story. CISOs have the opportunity to derive meaningful findings from their environments (both digital and physical) and incorporate security into every aspect of the enterprise — cyber, physical and personnel security.

Join Dan Meacham, Global CISO at Legendary Entertainment as he explores:

  • The past, present and future of expanding your strategy to include physical security
  • Understanding additional data points and why they are important to your program
  • Expanding your risk lens beyond securing information and planning for the future

1:35pm - 2:20pm  Breakout Session

Modern Workforce, Modern Security Strategy

Vinod D'Souza headshot

Vinod D'Souza

Office of the CISO, Head of Manufacturing and Industry


In the age of remote and hybrid work, employees now spend the majority of their time in the browser or in virtual meetings. The workforce is more mobile and distributed than ever before. At the same time, we are seeing an increase in cyber attacks and a higher average cost of data breaches. We must think more about protecting users right where they interface with web threats, the browser, without disrupting productivity. 

Join this session to hear about: 

  • The browser's role in a business's security strategy 
  • Zero trust architecture 
  • Managing resources for cybersecurity in a time of economic uncertainty

1:35pm - 2:20pm  Executive Boardroom

Securing the Everywhere World — Building Cyber Resilience through a “Connectivity Cloud”

Trey Guinn headshot

Trey Guinn

Field Chief Technologist


John Rojas headshot

John Rojas

VP, Head of IT (CIO/CISO)

Air Lease Corporation

David Suh headshot

David Suh

Director of Security

Sorenson Communications

Vimal Subramanian headshot

Vimal Subramanian


Cue Health

When users are everywhere and digital operations span cloud, SaaS, and on-premises environments, achieving cyber resilience becomes paramount. The challenge lies in navigating this complexity and maintaining visibility and control to ensure continuous operation despite cyber threats.

Join this interactive roundtable to discuss:

  • Optimizing costs and improving security across diverse cloud environments
  • Adopting Zero Trust philosophies to protect users, data, and applications
  • Innovating with AI while addressing global regulatory and data privacy requirements

1:35pm - 2:20pm  Executive Boardroom

Rethinking Email Data Protection Strategies

Rajan Kapoor headshot

Rajan Kapoor

Field CISO

Material Security

Awwab Arif headshot

Awwab Arif


Bank of Hope

Kevin Kealy headshot

Kevin Kealy


Light & Wonder

While Data Loss Prevention (DLP) software is commonly relied upon to prevent data loss, the shift towards cloud-based data storage necessitates a more comprehensive approach to data management. Security leaders must adopt a risk-based strategy to mitigate data loss effectively.

Join this session to discover:

  • Effective practices for ongoing email activity monitoring to identify risks
  • Rapid investigation and response techniques for insider threats
  • Strategies to protect data at rest

2:20pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

The Future of IAM

Lara Divi headshot

Lara Divi


Dine Brands Global, Inc.

Matt Crouse headshot

Matt Crouse


Solar Turbines

The path to a stronger IAM starts with the customer, whether you’re in the public sector or selling coffee. CISOs are often challenged with trying to create the best user experience and keeping the company secure. But it’s not just about security it is also about the business. Gaining buy in and building better relationships is key.

Join this session to learn:

  • Why passwordless implementation is a game-changer
  • How to strengthen relationships with business and tech teams
  • Where to find solutions for credential stuffing

3:00pm - 3:45pm  Breakout Session

Governance & Guardrails to Responsibly Accelerate AI Innovation

Ken Frantz headshot

Ken Frantz

Managing Director, AI Evangelist


Businesses are leveraging AI to create competitive advantage, but leadership teams are conflicted between speed to value and managing uncertain risks. CISOs play a critical role in identifying risks and supporting protections, but guardrails and controls can mistakenly be viewed as an impediment to innovation. But the right controls can enable you to hit the gas even harder.

Join this session to discuss:

  • Identifying & protecting critical AI systems
  • Driving speed with risk management to generate value from investments
  • Educating the Board & leadership on the value of risk management for responsible AI

3:00pm - 3:45pm  Executive Boardroom

Communicating Effectively Utilizing Outcome Driven Tactics

Tim Crothers headshot

Tim Crothers

Director, Office of the CISO

Google Cloud Security

Alex Hall headshot

Alex Hall

Global CISO


Ernie Liu headshot

Ernie Liu


United Talent Agency

Jason Borinski headshot

Jason Borinski

Sr. Director of Infrastructure and Information Security


As security leaders gain more face time with the board and key stakeholders, communicating in a way that is understood and out of the weeds is getting more necessary. To keep communication effective as CISOs, implementing some of the process improvement tactics to your own style is helpful. 

Join this boardroom to get insight into:

  • Developing unique KPIs for your security team and yourself
  • Setting clear goals that allow your team to exceed them
  • Outcome driven security and how to implement it into your communication style

3:00pm - 3:45pm  Executive Boardroom

What Grade Would You Give Your IGA Deployment?

Rich Dandliker headshot

Rich Dandliker

Chief Strategist


Mike Brown headshot

Mike Brown



Webb Deneys headshot

Webb Deneys

SVP, Information Technology, CISO

Cardinal Financial Company

Chris Stoneley headshot

Chris Stoneley


Cathay Bank

Identity Governance and Administration (IGA) has been a cornerstone of compliance programs for decades. Despite this history, the reality of IGA rarely matches the customers’ initial expectations and the needs of the business. Increasingly, customers are demanding that IGA tools not only “check the box” for auditors, but also drive forward Least Privilege to secure their organization in today’s landscape of cyber threats.

Join this interactive roundtable session to discuss:

  • Explore current practices, tools, and effectiveness of IGA programs
  • Evaluate the extent to which IGA goes beyond compliance to bolster security posture
  • Identify the critical gaps that may limit the effectiveness of an IGA program.

3:45pm - 4:10pm  Break

4:10pm - 4:55pm  Keynote

Fact vs. Fiction — FBI Cybersecurity Unit

Michael Sohn headshot

Michael Sohn

Supervisory Special Agent

Federal Bureau of Investigation

Angelica Lee headshot

Angelica Lee

Agent, Cyberhood Watch

Federal Bureau of Investigation- California

 The FBI employs a global network of cyber threat experts to investigate cybercriminals, disrupt malicious activity, seek justice, and prevent crime. Come with your questions as a panel of the FBI’s cybersecurity experts discuss what trends they are seeing and monitoring.

Join this keynote to explore:

  • Best practices of working with law enforcement before, during and after a breach
  • The latest cyber threats on the horizon and consequences on cyber adversaries
  • Case studies and lessons learned

4:55pm - 5:10pm  Closing Comments and Prize Drawing

May 20, 2024

May 21, 2024

We look forward to seeing you at an upcoming in-person gathering

Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.


Venue & Accommodation

Marriott Long Beach Downtown

A block of rooms has been reserved at the Marriott Long Beach Downtown at a reduced conference rate. Reservations should be made online or by calling 562-437-5900. Please mention Renaissance Long Beach Hotel to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $269 USD (plus tax) is April 29, 2024.

Your Community Partners

Global Thought Leader
CISO Thought Leaders
Key Partners
Program Partners

Community Program Manager

For inquiries related to this community, please reach out to your dedicated contact.

Zack Hellmann

Senior Community Program Manager