
Global CISO Community
Executive Summit
September 8-10, 2025 | Four Seasons Hotel New Orleans
September 8-10, 2025
Four Seasons Hotel New Orleans
Collaborate with your global peers
Get together with other CISOs who lead global operations at this exclusive, three-day summit to exchange ideas and validate strategies unique to large, complex organizations. Engage in candid discussions, dive deep into critical issues and validate strategies with other enterprise heads of (IT/security) on the challenges unique to large, complex organizations. Executives are assured a level of information exchange and interaction with true, global peers beyond a regional community on discussion topics driven by Global CISOs, for Global CISOs.
Connect with true peers who lead their function globally and have similar opportunities and challenges, gain new perspectives and share experiences unique to the global nature of your role, and participate in discussions and sessions geared specifically toward global (IT/security) leaders.
Meeting the demands of cross-border compliance requirements
Recalculating risk appetites across the C-suite and strengthening relationships accordingly
Establishing trust with the global public as the arbiter of all emerging cyber threats
Global CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.
Governing Body Co-Chairs

Sara Andrews
Experian
Global CISO

Derek Benz
The Coca-Cola Company
CISO

Tim Callahan
Aflac
SVP & Global CISO

Allan Cockriel
ASML
Group CIO

Meredith Harper
Synchrony Financial
SVP & CISO

Marc Varner
Lowe's Companies
Global CISO

Juan Gomez-Sanchez
McLane Company
VP, Cyber Resilience

Marcos Marrero
H.I.G. Capital
CISO
What to Expect
Featured Session
Preparing to Takeoff
Succession and Supporting Future CISOs
Your succession plan probably seems fine from your position on the org chart, but could be obscured. One plan certain to reveal first-class talent and benefit the business - Talk to your team and build to their needs.
Featured Session
The Power of Transparency
Business-Value-Driven Security
Though they're regularly cast as the C-Suite's resident reactionary, CISOs are capable of rising to the level of enterprise contributor.
Featured Session
Defining Your Executive Brand
Insights & Networking with Daymond John
Along his entrepreneurial journey, F.U.B.U. Founder & CEO Daymond John has learned a few things about getting the best out of business and life. His keys to success include learning how to establish the right mindset and following a few fundamentals.
Agenda
6:00am - 3:00pm Social Experience
Golf at English Turn
Hosted by Cyera
Though he's primarily known as one of the greatest golfers of all time, Jack Nicklaus is also a world-class course designer. It's a reputation upheld, in part, by his course at English Turn Golf and Country Club in New Orleans. Along with your C-level peers, you can start your trip off with a round at this par-72 course and former PGA Tour venue.
8:30am - 2:15pm Social Experience
Cruisin' the Bayou
Hosted by Google Cloud Security
Alligators, cypress trees, and a 45-mph ride through the swamps of Louisiana — all of it awaits those adventurous enough to hop aboard one of these guided, high-speed airboats. After your up-close encounter with the bayou's native plant and animal species, you and your peers will enjoy lunch at Copper Vine.
3:00pm - 6:00pm Break
6:00pm - 8:30pm Governing Body Reception
Welcome Reception | NOLA Nights — Celebrating the Soul of the French Quarter
Join us as we pay tribute to the New Orleans French Quarter with lively brass band music and local classics like hurricanes, gumbo and beignets. Enjoy a taste of the historic city with an evening of music, flavor and tradition.
7:45am - 8:30am Breakfast Service
8:30am - 9:15am Keynote
The Power of Transparency and Business-Value-Driven Security

Andrew Kirkland
Global CISO
The Walt Disney Company
Though they're regularly cast as the C-Suite's resident reactionary, CISOs are capable of rising to the level of enterprise contributor. The journey starts with becoming familiar with the business's top objectives and intentionally communicating the relationship between those goals and security.
Join Andy Kirkland, CISO at The Walt Disney Company and learn:
- The long-term benefits of identifying and simplifying your business's offerings
- To openly and regularly demonstrate security's importance to other business functions
- How security can inform and influence business priorities through clarity and context
9:15am - 9:40am Networking Break
9:40am - 10:25am Breakout Session
Preparing for Takeoff — Succession and Supporting Future CISOs

Deborah Wheeler
CISO
Delta Air Lines

Deneen DeFiore McGarvey
VP & CISO
United Airlines

Mike Scobee
Managing Director, Cyber Security
Delta Air Lines

Hank Wynsma
Managing Director, Secure Products and Aircraft Cyber
United Airlines
From 30,000 feet up, your succession plan probably looks fine. Perspectives from that high on the org chart, however, are sometimes obscured. One plan certain to reveal first-class talent and benefit the business - Talk to your team and build to their needs.
Join your Global CISO peers and their invited team members to candidly tackle:
- Why today's cyber leaders so often miss the connection between succession and success
- How investing in the next generation upgrades culture, engagement and retention
- What those in their ascent to the role still need from leadership
9:40am - 10:25am Breakout Session
The Cyber Paradox — Scaling Innovation and Resilience in the Age of AI
Hosted by Cloudflare

Khalid Kark
Field CIO
Cloudflare
CISOs navigate a high-stakes paradox - driving innovation at speed while defending against AI-powered threats. From deepfakes to synthetic fraud, adversaries are faster and more adaptive than ever and expose the limits of fragmented, reactive security strategies. Resilience at scale isn’t a security issue alone, it’s a C-suite imperative. Building the capability to adapt, recover, and grow in the face of disruption requires coordinated leadership across technology, risk, compliance, and business functions.
Join this session to learn:
- Using AI, Zero Trust, and compliance automation to secure innovation without slowing growth
- Detecting insider misuse and AI-enabled fraud using behavioral analytics
- Coordinating resilience as a C-suite strategy with shared accountability and unified metrics
9:40am - 10:25am Executive Boardroom
Building Global Trust Through Adaptive Security and AI Control
Hosted by Akamai

Roger Barranco
Vice President of Managed Global Security and Cloud Operations
Akamai

Jeff Johnson
Director, IT Security
Digikey
Larry Woods
CISO & Privacy Officer
Post Holdings
As organizations worldwide grow more interconnected and digital threats become more advanced, traditional defenses fall short. Security leaders must act now to address the rapid growth of AI—embedding adaptive, intelligence-driven protections while building trust across borders. In an era of rising AI risks, people remain essential; AI cannot replace the need for human response to handle exceptions, especially against zero-day threats.
Explore what you can do now to mitigate evolving threats and reinforce trust globally:
- AI-aware defenses for LLMs, APIs, and data to counter emerging risks
- Adaptive security that evolves with rapid AI growth and changing priorities
- Integrated controls with human assurance for fast, effective response
9:40am - 10:25am Executive Boardroom
Fortifying Third-Party Links with Identity Security
Hosted by Veza

Mike Towers
Chief Security & Trust Officer
Veza

Anatoly Bodner
CISO / Head of Cyber Security
Treehouse Foods

Ben Murphy
SVP & Global CISO
Unum
Third-party access has become the leading attack vector, with most breaches ironically stemming from those very third parties and business partners we rely on for solutions. How can identity security strategies be leveraged to reduce supply chain risks while still enabling secure collaboration?
Discover how to:
- Apply least-privilege access for third parties to ensure productivity
- Detect real-time anomalous access in hybrid environments
- Quantify risk reduction to engage business leaders
10:25am - 10:45am Networking Break
10:45am - 11:45am Innovation Spotlight
Innovation Spotlight
Hosted by Ten Eleven Ventures

Giles Ashton-Roberts
CISO
Swissport

Ricardo Lafosse
Chief Information Security Officer
The Kraft Heinz Company

Param Vig
SVP, CISO
Solventum

Henry Comfort
CoFounder and CEO
Geordie

Mike McNeil
CEO
Fleet Device Management

Justin Woody
co-Founder
Twine
Be among the first to see what’s new and next in the security solutions landscape. Three early-stage providers will get the chance to showcase their innovative solutions to the most pressing cybersecurity challenges.
Spotlight Presenters from:
- Geordie
- Fleet
- Twine
11:45am - 12:20pm Networking Break
12:20pm - 1:05pm Lunch Service
1:05pm - 1:40pm Keynote
Zero Trust & AI — Enhancing Security, Simplifying Operations, Fueling Innovation
Hosted by Zscaler

Jay Chaudhry
CEO, Chairman & Founder
Zscaler

Derek Anthony
CISO & SVP, Digital Security
bp
AI offers transformative potential for businesses—but reaping its benefits requires that IT and security leaders navigate complex transformation challenges. This means adopting a robust zero trust architecture to protect users and data, embracing AI while managing its risks, and handling the technical and financial implications of ever-expanding environments. A risk-based security strategy empowers CISOs to lead a secure, scalable transformation.
Join this session to:
- Explore how combining zero trust with AI creates a more resilient defense posture, which–unlike firewalls–blocks lateral movement
- Learn strategies for protecting AI applications developed in data centers and the cloud, while preventing data leaks from public AI applications
- Discover how zero trust significantly simplifies environments while cutting network and security expenditure by eliminating costly legacy hardware
1:40pm - 2:00pm Networking Break
2:00pm - 2:45pm Breakout Session
Securing More Than Cyber and Stopping Greater Threats
Hosted by Illumio

Mary Rose Martinez
VP & CISO
Marathon Petroleum

Adam Fletcher
Sr. Director, CSO
Blackstone Group

Jesse Magenheimer
Vice President & CISO
State Farm
Especially at the global level, the scope of a modern cyber leader's role requires at least some awareness of broader threats – be they physical, political, or otherwise. They can be difficult to address but ignoring these issues could hinder the organization's development of comprehensive security.
Join your peers for a discussion on:
- How business-wide threat identification is being handled across multiple industries
- The CISO's role in eliminating non-cyber security issues
- Common difficulties and remedies among those tasked with protecting the organization
2:00pm - 2:45pm Breakout Session
From Data Sprawl to Data Control — The AI Advantage for CISOs
Hosted by Cyera

Lamont Orange
Chief Trust Officer
Cyera

Todd Friedman
Global CISO
ResMed

Brett Perry
CISO
Dot Foods

Bill Podborny
CISO
Constellation Brands
In today’s enterprise, data lives everywhere — across clouds, applications, and teams. Innovation demands speed, but security demands control. To lead securely, CISOs need more than policies and firewalls. They need real-time visibility, actionable intelligence, and AI that powers business growth. Join seasoned CISOs as they share how AI is transforming the way they protect, govern, and leverage data to drive growth, including how to:
- Unify governance across fragmented, multi-cloud environments
- Anticipate and adapt to shifting regulations with scalable, AI-supported compliance
- Foster shared accountability across teams with smarter, proactive security
2:00pm - 2:45pm Executive Boardroom
AppSec Revolution — Driving Efficiency with Context and Culture
Hosted by Contrast Security

Jeff Williams
Founder & CTO
Contrast Security

Dan Bowden
Global CISO
Marsh

Martin Mazor
CISO
ON Semiconductor
Traditional security practices are struggling worldwide against modern threats and the rapid pace of software development. The solution lies in leveraging production data, which enables effective Application Detection and Response (ADR) by integrating real-time insights into code behavior, vulnerabilities, and attacks. This approach empowers development and operations teams across borders to collaboratively enhance security.
Join this roundtable discuss:
- Enhancing vulnerability scanning with real production insights
- Improving risk management through dynamic telemetry
- Strengthening attack protection with contextual awareness
2:00pm - 2:45pm Executive Boardroom
Guardians of Data — Navigating Insider Risks and AI Challenges
Hosted by Cyberhaven

Aman Sirohi
SVP - CISO
Cyberhaven

Marcus Setina
CISO
Ingenico Group

Ken Townsend
Global CISO
Ingredion
Organizations must proactively secure their data, especially as AI tools reshape the landscape of data risk. With CISOs prioritizing data protection amid tightening regulations, strategies must evolve to effectively address insider threats and inadvertent exposures.
Join this session to explore:
- Leveraging AI to strengthen data loss prevention strategies
- Effective insider risk management through shadow data identification and exposure mitigation
- Building a culture of security awareness to prevent insider threats
2:45pm - 3:15pm Networking Break
2:50pm - 3:10pm Peer-to-Peer Meetings
Peer-to-Peer Meeting 2
Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.
3:15pm - 4:00pm Breakout Session
Tough Love – A New Approach to Security Awareness

Ricardo Lafosse
Chief Information Security Officer
The Kraft Heinz Company
In response to a sudden rise in click rates, Ricardo Lafosse (CISO, Kraft Heinz) overhauled his security awareness policies. New practices and consequences challenged both the security function and the enterprise at large - earning Lafosse the title of "most hated executive leader of 2024"…and undeniable results.
Gather with your Global CISO peers and hear:
- How discipline led to a dramatic reduction in phishing fails
- Where you can expect organizational challenges while playing offense
- The story of a leadership-launched campaign for cultural security and organizational resilience
3:15pm - 4:00pm Breakout Session
Tomorrow's Identity Challenges Are Here — Are You Ready?
Hosted by Saviynt

Sachin Nayyar
CEO
Saviynt

Ken Athanasiou
Global CISO
VF Corp
AI has forever changed the way enterprises operate, including how they must approach cybersecurity. For every opportunity AI brings, there lies a risk that must be properly secured. Saviynt CEO Sachin Nayyar will be joined by a customer to unlock intelligent identity security and what it means for your business.
Join this session to:
- Understand how identity security can secure organizations' new ways of working for humans, non-humans, and AI agents
- Explore how AI-native identity security helps organizations address today’s cybersecurity challenges
- Gain a blueprint for tackling future identity threats and opportunities
3:15pm - 4:00pm Executive Boardroom
Playing Offense with Proactive, Preventative, Global Cloud Security
Hosted by Orca Security

Tim Chase
Field CISO
Orca Security

Moses Bulus
Global CISO
Bunzl

Ronen Halevy
Vice President, Information Security
Sony Corporation of America
Navigating the demands of a diverse regulatory landscape, expert threat actors, and complex technology environments requires not only a thorough understanding of global tech stacks but also the ability to build resilient security processes that can adapt to regional differences.
Join this exclusive, closed-door discussion with your C-level peers to:
- Examine the strengths and vulnerabilities of your current cloud security posture in the context of operating across different regions
- Evaluate the legitimacy and impact of emerging, newsworthy, or trending threats in various global markets
- Collaborate to address what is and isn’t working for modern application security, and share strategies tailored to the complexities of international business
3:15pm - 4:00pm Executive Boardroom
The Unified Powers of Artificial Intelligence and Human Experience in AppSec
Hosted by Veracode

Sohail Iqbal
CISO
Veracode

Vaughn Hazen
CISO
CN

Angela Williams
SVP, Global Chief Information Security Officer
UL Solutions
Vulnerabilities remediation doesn't need to take months. Equipped with advanced AI tools and the right developer's time-tested security expertise, it could only take minutes.
Join your C-level peers in discussing:
- Realistic and ideal remediation timelines (and why they're different)
- Where artificial intelligence succeeds and fails in subbing out human wisdom
- What kind of AI-focused training or upskilling developers might need in 2025
4:00pm - 4:15pm Networking Break
4:15pm - 4:50pm Keynote
Universal Solutions for Tech Debt Reduction
Hosted by Island

Michael Leland
VP, Field CTO
Island
Across the globe, organizations are grappling with the challenge of securing sensitive data as it traverses web browsers. Many acknowledge that their current IT and security frameworks increase the likelihood of data breaches. This highlights the intricate task of protecting data while managing outdated systems, inefficient application delivery, and obsolete security measures. What innovative strategies can streamline enterprise operations, enhance security, and adapt to a global landscape?
Attendees will discover:
- Identifying and addressing technical debt caused by fragmented IT and security solutions
- Communicating the broader business impacts of technology and security challenges
- Adopting new methods for enterprise application delivery to improve productivity worldwide
7:45am - 8:30am Breakfast Service
8:30am - 9:15am Keynote
Cyber Groundhog Day
Hosted by Proofpoint

Ryan Kalember
Chief Strategy Officer
Proofpoint
We’re told to do the “basics” right to mitigate the majority of our risks and are harshly criticized when they prove impossible to implement at enterprise scale. But some of those orthodoxies no longer make sense, or perhaps never did.
Join this session as we question some of the assumptions that we’ve lived with for decades:
- Patching/alerting - hamster wheels or key controls?
- Data - why classify when no one has succeeded at scale?
- People - are humans destined to remain the weakest link or will AI replace us there too?
9:15am - 9:40am Networking Break
9:40am - 10:25am Breakout Session
Cybersecurity at the Crossroads – Leading Through Global Fragmentation

John Ellis
Global Head of Security Trust & Influence
QBE Insurance Group Ltd
As cyberspace becomes the new arena for geopolitical and economic rivalry, security leaders are no longer just defending data, they’re navigating a fractured digital world where national interests, regulatory divergence, and tech bifurcation collide. Whether your organization operates globally or is U.S.-centric, shifting alliances are already reshaping your threat landscape and the environment in which your business operates.
Join John Ellis, Global Head of Security Trust & Influence, QBE Insurance Group Ltd., as he explores:
- How CISOs can lead through these new, ever-complex global environments
- The ripple effects of digital sovereignty and cross-border data tensions
- What it means to protect business value in a world where cyberspace is no longer neutral ground
9:40am - 10:25am Breakout Session
Is Your Enterprise Security Ready for the AI Revolution?
Hosted by Oasis Security

Danny Brickman
CEO
Oasis Security
AI is reshaping enterprise security, exposing organizations to a surge in Non-Human Identities from tokens and API keys to autonomous AI agents. Most remain unmanaged. With regulators and threat actors moving fast, executives face mounting risks and compliance gaps.
Join Danny Brickman, CEO & Co-Founder, Oasis Security to uncover:
- Where your environment is most exposed to AI-related identity risk
- How to continuously discover and govern NHIs at scale
- How leading enterprises unify human and non-human identity security
9:40am - 10:25am Executive Boardroom
The Evolving Adversary
Hosted by Google Cloud Security

John Hultquist
Chief Analyst, Google Threat Intelligence Group
Google Cloud Security

John Opala
VP & Global CISO
Hanesbrands
The global threat landscape is ever-changing, especially in light of AI advancements and an unprecedented geopolitical climate. CISOs must keep pace with threats and understand how these factors directly affect their equities, or their security programs will simply become obsolete.
Join this boardroom with moderator John Hultquist, Chief Analyst at Google Threat Intelligence Group, to discuss:
- The latest state and criminal threats
- The technical, geopolitical and other forces driving these threats
- Forecasting future risks using this insight
9:40am - 10:25am Executive Boardroom
Power Your Business and AI with APIs
Hosted by Salt Security

Michael Callahan
Chief Marketing Officer
Salt Security

Tony Velleca
CISO
UST
Details Coming Soon...
10:25am - 10:45am Networking Break
10:45am - 11:45am Innovation Spotlight
Innovation Spotlight
Hosted by SYN Ventures

Devon Bryan
Global CSO
Booking Holdings

Juan Gomez-Sanchez
VP, Cyber Resilience
McLane Company

Alicia Lynch
CISO
TD SYNNEX

Vivek Ramachandran
CEO and Co-founder
SquareX

Piyush Sharma
CEO
Tuskira

Charlie Thomas
CEO
Mitiga
Be among the first to see what’s new and next in the security solutions landscape. Three early-stage providers will get the chance to showcase their innovative solutions to the most pressing cybersecurity challenges.
Spotlight Presenters from:
- Mitiga
- SquareX
- Tuskira
11:45am - 12:10pm Networking Break
12:10pm - 1:00pm Lunch Service
1:00pm - 1:35pm Keynote
Prioritize, Analyze and Minimize - The Path to Simplified Resilience

Chris Lugo
VP, CISO
Blue Cross Blue Shield Association

Mike Zachman
VP & Chief Security Officer
Zebra Technologies
While it's rarely easy, reaching a certain level of legitimate organizational resilience doesn't have to be complicated. In fact, the entire resilience journey could be summarized in just a few steps. Those steps might be difficult to take, but at least they're straightforward.
Join Chris Lugo, VP, CISO at Blue Cross Blue Shield Association for:
- A guided walk through the stages of cyber resilience development
- Practical advice for overcoming the common obstacles of each step
- A look at process-altering industry demands and organizational needs
1:35pm - 2:00pm Networking Break
2:00pm - 2:45pm Executive Boardroom
Audit Me If You Can – Stay One Step Ahead with Risk and Compliance
Hosted by DataBee, a Comcast Company

Erin Hamm
Field Chief Data Officer
DataBee, a Comcast Company

Andy De Petter
CISO
Exclusive Networks

Jeremy Bauer
Sr. Director Information Security (CISO)
Molson Coors Beverage Company
With the risk landscape changing at an ever-increasing rate, it is more critical than ever for boards to understand not just the threats, but their potential business impact. Staying compliant and accurately measuring your security posture in a consistent, continuous, and flexible manner requires more than just implementing traditional security controls and standards.
In this session, you and your peers will gather:
- Practical steps for implementing better data pipelining strategies for continuous risk measurement and compliance that are adaptable enough to evolving risks
- Best practices on translating technical terms into simple KPIs and dashboards the board can understand
- How to make compliance a team sport to ensure enterprise risk is showing tangible results and not just transferred within the enterprise
2:00pm - 2:45pm Executive Boardroom
Regaining Control with Cloud-Native Security
Hosted by Aviatrix

Doug Merritt
Chairman, CEO, and President
Aviatrix

Trina Ford
SVP, CISO
iHeartMedia

Amit Chaudhary
VP & Head of Cyber Security North America & Defense
Rolls-Royce
CISOs face growing blind spots in cloud environments—especially in east-west traffic, egress paths, and within Kubernetes environments. Many enterprises rely on CSP or legacy firewalls that provide important but limited security. Research shows only 8% of U.S. organizations secure inter-cloud traffic with zero trust—a foundational requirement of CISA's Zero Trust Maturity Framework 2.0.
Join this boardroom to discuss:
- Unseen cloud network exposures
- Changes in the "shared responsibility model"
- Communicating risk and securing budget support
2:00pm - 2:45pm Executive Boardroom
Safely Enabling Agentic AI at Scale
Hosted by Ping Identity

Advait Deodhar
VP Solutions Engineering
Ping Identity

David Tyburski
VP, CISO
Wynn Resorts

Jonathan May
CISO
Mortenson
Agentic AI—autonomous agents that can plan, reason, and act on behalf of humans—are quickly becoming vital to business operations. As their use and numbers increase, so do the risks. These non-human identities need to be treated as first-class-citizens—meaning that they are verified, authenticated, authorized, and governed with the same rigor as human users. Attempting to manage AI agents without a modern identity foundation can result in over-permissioning, undetected hijackings, and other security blind spots.
Join this roundtable discussion and tackle questions like:
- Are common IAM systems prepared to govern thousands of non-human identities operating autonomously or on behalf of users?
- How can we accurately privilege AI agents without creating excessive operational friction?
- What specific capabilities do we need to implement or enhance within our digital identity infrastructure to detect, monitor, and audit AI agent activity effectively?
2:00pm - 2:45pm Executive Boardroom
IAM Hyperautomation — Your Shortcut Around Skill and Tech Gaps
Hosted by Torq

Patrick Orzechowski
Field CISO
Torq

Mike Villis
CISO
World Kinect
The time-sucking grind of allowing as-needed user access, onboarding and offboarding users, auditing for inactive accounts, and responding to every suspicious activity has CISOs under immense pressure to modernize IAM. But two major progress bottlenecks leave teams barely keeping up — talent gaps and disconnected security stacks. What if you could overcome both and transform your IAM posture all at once?
This moderated discussion will hone in on how IAM hyperautomation can enable CISOs to:
- Mitigate identity-related risk by automating access provisioning, deprovisioning, and response
- Offset skill gaps and legacy limitations with no-code/low-code and AI-driven workflows
- Reduce friction and administrative burden for users and analysts while meeting the strictest compliance standards
2:00pm - 2:45pm Executive Boardroom
Securing AI for Resilience and Risk Management
Hosted by Cisco
As AI adoption accelerates across every industry, CISOs face a critical inflection point: evolve from gatekeepers to game-changers. Security can't be bolted on later—it must be architected into the DNA of AI systems from day one to avoid missteps in ethics, compliance, risk, and resilience.
Join this boardroom with your peers and come ready to discuss:
- AI impacts on zero trust, network security, the SOC of the future, audit, and governance
- Practical strategies you’re implementing today (or plan to)
- How the security community moves forward in an AI-driven world
2:45pm - 4:45pm Break
5:15pm - 6:30pm Keynote
Defining Your Executive Brand — Insights & Networking with Daymond John
Hosted by LogicGate

Daymond John
CEO
FUBU & The Shark Group; Star of ABC's Shark Tank
Daymond John, Founder/CEO of FUBU and star of ABC’s Shark Tank, has been a phenomenally successful business person for over 25 years. Along his entrepreneurial journey, through his many successes as well as failures, he has learned a few things about getting the best out of business and life. The keys to success include learning how to establish the right mindset and following a few fundamental principles Daymond calls his "S.H.A.R.K Points”.
Members of the Global CIO and CISO communities will receive exclusive access to:
- Live and unrecorded insights on developing your unique brand of executive leadership
- Guidance on identifying, cultivating and managing powerful business partnerships
- Post-keynote meet and greet opportunities
6:30pm - 7:30pm Gala Dinner
7:30pm - 8:30pm Gala Reception
6:00am - 3:00pm Social Experience
Golf at English Turn
Hosted by Cyera
Though he's primarily known as one of the greatest golfers of all time, Jack Nicklaus is also a world-class course designer. It's a reputation upheld, in part, by his course at English Turn Golf and Country Club in New Orleans. Along with your C-level peers, you can start your trip off with a round at this par-72 course and former PGA Tour venue.
8:30am - 2:15pm Social Experience
Cruisin' the Bayou
Hosted by Google Cloud Security
Alligators, cypress trees, and a 45-mph ride through the swamps of Louisiana — all of it awaits those adventurous enough to hop aboard one of these guided, high-speed airboats. After your up-close encounter with the bayou's native plant and animal species, you and your peers will enjoy lunch at Copper Vine.
3:00pm - 6:00pm Break
6:00pm - 8:30pm Governing Body Reception
Welcome Reception | NOLA Nights — Celebrating the Soul of the French Quarter
Join us as we pay tribute to the New Orleans French Quarter with lively brass band music and local classics like hurricanes, gumbo and beignets. Enjoy a taste of the historic city with an evening of music, flavor and tradition.
7:45am - 8:30am Breakfast Service
8:30am - 9:15am Keynote
The Power of Transparency and Business-Value-Driven Security

Andrew Kirkland
Global CISO
The Walt Disney Company
Though they're regularly cast as the C-Suite's resident reactionary, CISOs are capable of rising to the level of enterprise contributor. The journey starts with becoming familiar with the business's top objectives and intentionally communicating the relationship between those goals and security.
Join Andy Kirkland, CISO at The Walt Disney Company and learn:
- The long-term benefits of identifying and simplifying your business's offerings
- To openly and regularly demonstrate security's importance to other business functions
- How security can inform and influence business priorities through clarity and context
9:15am - 9:40am Networking Break
9:40am - 10:25am Breakout Session
Preparing for Takeoff — Succession and Supporting Future CISOs

Deborah Wheeler
CISO
Delta Air Lines

Deneen DeFiore McGarvey
VP & CISO
United Airlines

Mike Scobee
Managing Director, Cyber Security
Delta Air Lines

Hank Wynsma
Managing Director, Secure Products and Aircraft Cyber
United Airlines
From 30,000 feet up, your succession plan probably looks fine. Perspectives from that high on the org chart, however, are sometimes obscured. One plan certain to reveal first-class talent and benefit the business - Talk to your team and build to their needs.
Join your Global CISO peers and their invited team members to candidly tackle:
- Why today's cyber leaders so often miss the connection between succession and success
- How investing in the next generation upgrades culture, engagement and retention
- What those in their ascent to the role still need from leadership
9:40am - 10:25am Breakout Session
The Cyber Paradox — Scaling Innovation and Resilience in the Age of AI
Hosted by Cloudflare

Khalid Kark
Field CIO
Cloudflare
CISOs navigate a high-stakes paradox - driving innovation at speed while defending against AI-powered threats. From deepfakes to synthetic fraud, adversaries are faster and more adaptive than ever and expose the limits of fragmented, reactive security strategies. Resilience at scale isn’t a security issue alone, it’s a C-suite imperative. Building the capability to adapt, recover, and grow in the face of disruption requires coordinated leadership across technology, risk, compliance, and business functions.
Join this session to learn:
- Using AI, Zero Trust, and compliance automation to secure innovation without slowing growth
- Detecting insider misuse and AI-enabled fraud using behavioral analytics
- Coordinating resilience as a C-suite strategy with shared accountability and unified metrics
9:40am - 10:25am Executive Boardroom
Building Global Trust Through Adaptive Security and AI Control
Hosted by Akamai

Roger Barranco
Vice President of Managed Global Security and Cloud Operations
Akamai

Jeff Johnson
Director, IT Security
Digikey
Larry Woods
CISO & Privacy Officer
Post Holdings
As organizations worldwide grow more interconnected and digital threats become more advanced, traditional defenses fall short. Security leaders must act now to address the rapid growth of AI—embedding adaptive, intelligence-driven protections while building trust across borders. In an era of rising AI risks, people remain essential; AI cannot replace the need for human response to handle exceptions, especially against zero-day threats.
Explore what you can do now to mitigate evolving threats and reinforce trust globally:
- AI-aware defenses for LLMs, APIs, and data to counter emerging risks
- Adaptive security that evolves with rapid AI growth and changing priorities
- Integrated controls with human assurance for fast, effective response
9:40am - 10:25am Executive Boardroom
Fortifying Third-Party Links with Identity Security
Hosted by Veza

Mike Towers
Chief Security & Trust Officer
Veza

Anatoly Bodner
CISO / Head of Cyber Security
Treehouse Foods

Ben Murphy
SVP & Global CISO
Unum
Third-party access has become the leading attack vector, with most breaches ironically stemming from those very third parties and business partners we rely on for solutions. How can identity security strategies be leveraged to reduce supply chain risks while still enabling secure collaboration?
Discover how to:
- Apply least-privilege access for third parties to ensure productivity
- Detect real-time anomalous access in hybrid environments
- Quantify risk reduction to engage business leaders
10:25am - 10:45am Networking Break
10:45am - 11:45am Innovation Spotlight
Innovation Spotlight
Hosted by Ten Eleven Ventures

Giles Ashton-Roberts
CISO
Swissport

Ricardo Lafosse
Chief Information Security Officer
The Kraft Heinz Company

Param Vig
SVP, CISO
Solventum

Henry Comfort
CoFounder and CEO
Geordie

Mike McNeil
CEO
Fleet Device Management

Justin Woody
co-Founder
Twine
Be among the first to see what’s new and next in the security solutions landscape. Three early-stage providers will get the chance to showcase their innovative solutions to the most pressing cybersecurity challenges.
Spotlight Presenters from:
- Geordie
- Fleet
- Twine
12:20pm - 1:05pm Lunch Service
1:05pm - 1:40pm Keynote
Zero Trust & AI — Enhancing Security, Simplifying Operations, Fueling Innovation
Hosted by Zscaler

Jay Chaudhry
CEO, Chairman & Founder
Zscaler

Derek Anthony
CISO & SVP, Digital Security
bp
AI offers transformative potential for businesses—but reaping its benefits requires that IT and security leaders navigate complex transformation challenges. This means adopting a robust zero trust architecture to protect users and data, embracing AI while managing its risks, and handling the technical and financial implications of ever-expanding environments. A risk-based security strategy empowers CISOs to lead a secure, scalable transformation.
Join this session to:
- Explore how combining zero trust with AI creates a more resilient defense posture, which–unlike firewalls–blocks lateral movement
- Learn strategies for protecting AI applications developed in data centers and the cloud, while preventing data leaks from public AI applications
- Discover how zero trust significantly simplifies environments while cutting network and security expenditure by eliminating costly legacy hardware
1:40pm - 2:00pm Networking Break
2:00pm - 2:45pm Breakout Session
Securing More Than Cyber and Stopping Greater Threats
Hosted by Illumio

Mary Rose Martinez
VP & CISO
Marathon Petroleum

Adam Fletcher
Sr. Director, CSO
Blackstone Group

Jesse Magenheimer
Vice President & CISO
State Farm
Especially at the global level, the scope of a modern cyber leader's role requires at least some awareness of broader threats – be they physical, political, or otherwise. They can be difficult to address but ignoring these issues could hinder the organization's development of comprehensive security.
Join your peers for a discussion on:
- How business-wide threat identification is being handled across multiple industries
- The CISO's role in eliminating non-cyber security issues
- Common difficulties and remedies among those tasked with protecting the organization
2:00pm - 2:45pm Breakout Session
From Data Sprawl to Data Control — The AI Advantage for CISOs
Hosted by Cyera

Lamont Orange
Chief Trust Officer
Cyera

Todd Friedman
Global CISO
ResMed

Brett Perry
CISO
Dot Foods

Bill Podborny
CISO
Constellation Brands
In today’s enterprise, data lives everywhere — across clouds, applications, and teams. Innovation demands speed, but security demands control. To lead securely, CISOs need more than policies and firewalls. They need real-time visibility, actionable intelligence, and AI that powers business growth. Join seasoned CISOs as they share how AI is transforming the way they protect, govern, and leverage data to drive growth, including how to:
- Unify governance across fragmented, multi-cloud environments
- Anticipate and adapt to shifting regulations with scalable, AI-supported compliance
- Foster shared accountability across teams with smarter, proactive security
2:00pm - 2:45pm Executive Boardroom
AppSec Revolution — Driving Efficiency with Context and Culture
Hosted by Contrast Security

Jeff Williams
Founder & CTO
Contrast Security

Dan Bowden
Global CISO
Marsh

Martin Mazor
CISO
ON Semiconductor
Traditional security practices are struggling worldwide against modern threats and the rapid pace of software development. The solution lies in leveraging production data, which enables effective Application Detection and Response (ADR) by integrating real-time insights into code behavior, vulnerabilities, and attacks. This approach empowers development and operations teams across borders to collaboratively enhance security.
Join this roundtable discuss:
- Enhancing vulnerability scanning with real production insights
- Improving risk management through dynamic telemetry
- Strengthening attack protection with contextual awareness
2:00pm - 2:45pm Executive Boardroom
Guardians of Data — Navigating Insider Risks and AI Challenges
Hosted by Cyberhaven

Aman Sirohi
SVP - CISO
Cyberhaven

Marcus Setina
CISO
Ingenico Group

Ken Townsend
Global CISO
Ingredion
Organizations must proactively secure their data, especially as AI tools reshape the landscape of data risk. With CISOs prioritizing data protection amid tightening regulations, strategies must evolve to effectively address insider threats and inadvertent exposures.
Join this session to explore:
- Leveraging AI to strengthen data loss prevention strategies
- Effective insider risk management through shadow data identification and exposure mitigation
- Building a culture of security awareness to prevent insider threats
2:45pm - 3:15pm Networking Break
2:50pm - 3:10pm Peer-to-Peer Meetings
Peer-to-Peer Meeting 2
Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.
3:15pm - 4:00pm Breakout Session
Tough Love – A New Approach to Security Awareness

Ricardo Lafosse
Chief Information Security Officer
The Kraft Heinz Company
In response to a sudden rise in click rates, Ricardo Lafosse (CISO, Kraft Heinz) overhauled his security awareness policies. New practices and consequences challenged both the security function and the enterprise at large - earning Lafosse the title of "most hated executive leader of 2024"…and undeniable results.
Gather with your Global CISO peers and hear:
- How discipline led to a dramatic reduction in phishing fails
- Where you can expect organizational challenges while playing offense
- The story of a leadership-launched campaign for cultural security and organizational resilience
3:15pm - 4:00pm Breakout Session
Tomorrow's Identity Challenges Are Here — Are You Ready?
Hosted by Saviynt

Sachin Nayyar
CEO
Saviynt

Ken Athanasiou
Global CISO
VF Corp
AI has forever changed the way enterprises operate, including how they must approach cybersecurity. For every opportunity AI brings, there lies a risk that must be properly secured. Saviynt CEO Sachin Nayyar will be joined by a customer to unlock intelligent identity security and what it means for your business.
Join this session to:
- Understand how identity security can secure organizations' new ways of working for humans, non-humans, and AI agents
- Explore how AI-native identity security helps organizations address today’s cybersecurity challenges
- Gain a blueprint for tackling future identity threats and opportunities
3:15pm - 4:00pm Executive Boardroom
Playing Offense with Proactive, Preventative, Global Cloud Security
Hosted by Orca Security

Tim Chase
Field CISO
Orca Security

Moses Bulus
Global CISO
Bunzl

Ronen Halevy
Vice President, Information Security
Sony Corporation of America
Navigating the demands of a diverse regulatory landscape, expert threat actors, and complex technology environments requires not only a thorough understanding of global tech stacks but also the ability to build resilient security processes that can adapt to regional differences.
Join this exclusive, closed-door discussion with your C-level peers to:
- Examine the strengths and vulnerabilities of your current cloud security posture in the context of operating across different regions
- Evaluate the legitimacy and impact of emerging, newsworthy, or trending threats in various global markets
- Collaborate to address what is and isn’t working for modern application security, and share strategies tailored to the complexities of international business
3:15pm - 4:00pm Executive Boardroom
The Unified Powers of Artificial Intelligence and Human Experience in AppSec
Hosted by Veracode

Sohail Iqbal
CISO
Veracode

Vaughn Hazen
CISO
CN

Angela Williams
SVP, Global Chief Information Security Officer
UL Solutions
Vulnerabilities remediation doesn't need to take months. Equipped with advanced AI tools and the right developer's time-tested security expertise, it could only take minutes.
Join your C-level peers in discussing:
- Realistic and ideal remediation timelines (and why they're different)
- Where artificial intelligence succeeds and fails in subbing out human wisdom
- What kind of AI-focused training or upskilling developers might need in 2025
4:00pm - 4:15pm Networking Break
4:15pm - 4:50pm Keynote
Universal Solutions for Tech Debt Reduction
Hosted by Island

Michael Leland
VP, Field CTO
Island
Across the globe, organizations are grappling with the challenge of securing sensitive data as it traverses web browsers. Many acknowledge that their current IT and security frameworks increase the likelihood of data breaches. This highlights the intricate task of protecting data while managing outdated systems, inefficient application delivery, and obsolete security measures. What innovative strategies can streamline enterprise operations, enhance security, and adapt to a global landscape?
Attendees will discover:
- Identifying and addressing technical debt caused by fragmented IT and security solutions
- Communicating the broader business impacts of technology and security challenges
- Adopting new methods for enterprise application delivery to improve productivity worldwide
7:45am - 8:30am Breakfast Service
8:30am - 9:15am Keynote
Cyber Groundhog Day
Hosted by Proofpoint

Ryan Kalember
Chief Strategy Officer
Proofpoint
We’re told to do the “basics” right to mitigate the majority of our risks and are harshly criticized when they prove impossible to implement at enterprise scale. But some of those orthodoxies no longer make sense, or perhaps never did.
Join this session as we question some of the assumptions that we’ve lived with for decades:
- Patching/alerting - hamster wheels or key controls?
- Data - why classify when no one has succeeded at scale?
- People - are humans destined to remain the weakest link or will AI replace us there too?
9:15am - 9:40am Networking Break
9:40am - 10:25am Breakout Session
Cybersecurity at the Crossroads – Leading Through Global Fragmentation

John Ellis
Global Head of Security Trust & Influence
QBE Insurance Group Ltd
As cyberspace becomes the new arena for geopolitical and economic rivalry, security leaders are no longer just defending data, they’re navigating a fractured digital world where national interests, regulatory divergence, and tech bifurcation collide. Whether your organization operates globally or is U.S.-centric, shifting alliances are already reshaping your threat landscape and the environment in which your business operates.
Join John Ellis, Global Head of Security Trust & Influence, QBE Insurance Group Ltd., as he explores:
- How CISOs can lead through these new, ever-complex global environments
- The ripple effects of digital sovereignty and cross-border data tensions
- What it means to protect business value in a world where cyberspace is no longer neutral ground
9:40am - 10:25am Breakout Session
Is Your Enterprise Security Ready for the AI Revolution?
Hosted by Oasis Security

Danny Brickman
CEO
Oasis Security
AI is reshaping enterprise security, exposing organizations to a surge in Non-Human Identities from tokens and API keys to autonomous AI agents. Most remain unmanaged. With regulators and threat actors moving fast, executives face mounting risks and compliance gaps.
Join Danny Brickman, CEO & Co-Founder, Oasis Security to uncover:
- Where your environment is most exposed to AI-related identity risk
- How to continuously discover and govern NHIs at scale
- How leading enterprises unify human and non-human identity security
9:40am - 10:25am Executive Boardroom
The Evolving Adversary
Hosted by Google Cloud Security

John Hultquist
Chief Analyst, Google Threat Intelligence Group
Google Cloud Security

John Opala
VP & Global CISO
Hanesbrands
The global threat landscape is ever-changing, especially in light of AI advancements and an unprecedented geopolitical climate. CISOs must keep pace with threats and understand how these factors directly affect their equities, or their security programs will simply become obsolete.
Join this boardroom with moderator John Hultquist, Chief Analyst at Google Threat Intelligence Group, to discuss:
- The latest state and criminal threats
- The technical, geopolitical and other forces driving these threats
- Forecasting future risks using this insight
9:40am - 10:25am Executive Boardroom
Power Your Business and AI with APIs
Hosted by Salt Security

Michael Callahan
Chief Marketing Officer
Salt Security

Tony Velleca
CISO
UST
Details Coming Soon...
10:25am - 10:45am Networking Break
10:45am - 11:45am Innovation Spotlight
Innovation Spotlight
Hosted by SYN Ventures

Devon Bryan
Global CSO
Booking Holdings

Juan Gomez-Sanchez
VP, Cyber Resilience
McLane Company

Alicia Lynch
CISO
TD SYNNEX

Vivek Ramachandran
CEO and Co-founder
SquareX

Piyush Sharma
CEO
Tuskira

Charlie Thomas
CEO
Mitiga
Be among the first to see what’s new and next in the security solutions landscape. Three early-stage providers will get the chance to showcase their innovative solutions to the most pressing cybersecurity challenges.
Spotlight Presenters from:
- Mitiga
- SquareX
- Tuskira
11:45am - 12:10pm Networking Break
12:10pm - 1:00pm Lunch Service
1:00pm - 1:35pm Keynote
Prioritize, Analyze and Minimize - The Path to Simplified Resilience

Chris Lugo
VP, CISO
Blue Cross Blue Shield Association

Mike Zachman
VP & Chief Security Officer
Zebra Technologies
While it's rarely easy, reaching a certain level of legitimate organizational resilience doesn't have to be complicated. In fact, the entire resilience journey could be summarized in just a few steps. Those steps might be difficult to take, but at least they're straightforward.
Join Chris Lugo, VP, CISO at Blue Cross Blue Shield Association for:
- A guided walk through the stages of cyber resilience development
- Practical advice for overcoming the common obstacles of each step
- A look at process-altering industry demands and organizational needs
1:35pm - 2:00pm Networking Break
2:00pm - 2:45pm Executive Boardroom
Audit Me If You Can – Stay One Step Ahead with Risk and Compliance
Hosted by DataBee, a Comcast Company

Erin Hamm
Field Chief Data Officer
DataBee, a Comcast Company

Andy De Petter
CISO
Exclusive Networks

Jeremy Bauer
Sr. Director Information Security (CISO)
Molson Coors Beverage Company
With the risk landscape changing at an ever-increasing rate, it is more critical than ever for boards to understand not just the threats, but their potential business impact. Staying compliant and accurately measuring your security posture in a consistent, continuous, and flexible manner requires more than just implementing traditional security controls and standards.
In this session, you and your peers will gather:
- Practical steps for implementing better data pipelining strategies for continuous risk measurement and compliance that are adaptable enough to evolving risks
- Best practices on translating technical terms into simple KPIs and dashboards the board can understand
- How to make compliance a team sport to ensure enterprise risk is showing tangible results and not just transferred within the enterprise
2:00pm - 2:45pm Executive Boardroom
Regaining Control with Cloud-Native Security
Hosted by Aviatrix

Doug Merritt
Chairman, CEO, and President
Aviatrix

Trina Ford
SVP, CISO
iHeartMedia

Amit Chaudhary
VP & Head of Cyber Security North America & Defense
Rolls-Royce
CISOs face growing blind spots in cloud environments—especially in east-west traffic, egress paths, and within Kubernetes environments. Many enterprises rely on CSP or legacy firewalls that provide important but limited security. Research shows only 8% of U.S. organizations secure inter-cloud traffic with zero trust—a foundational requirement of CISA's Zero Trust Maturity Framework 2.0.
Join this boardroom to discuss:
- Unseen cloud network exposures
- Changes in the "shared responsibility model"
- Communicating risk and securing budget support
2:00pm - 2:45pm Executive Boardroom
Safely Enabling Agentic AI at Scale
Hosted by Ping Identity

Advait Deodhar
VP Solutions Engineering
Ping Identity

David Tyburski
VP, CISO
Wynn Resorts

Jonathan May
CISO
Mortenson
Agentic AI—autonomous agents that can plan, reason, and act on behalf of humans—are quickly becoming vital to business operations. As their use and numbers increase, so do the risks. These non-human identities need to be treated as first-class-citizens—meaning that they are verified, authenticated, authorized, and governed with the same rigor as human users. Attempting to manage AI agents without a modern identity foundation can result in over-permissioning, undetected hijackings, and other security blind spots.
Join this roundtable discussion and tackle questions like:
- Are common IAM systems prepared to govern thousands of non-human identities operating autonomously or on behalf of users?
- How can we accurately privilege AI agents without creating excessive operational friction?
- What specific capabilities do we need to implement or enhance within our digital identity infrastructure to detect, monitor, and audit AI agent activity effectively?
2:00pm - 2:45pm Executive Boardroom
IAM Hyperautomation — Your Shortcut Around Skill and Tech Gaps
Hosted by Torq

Patrick Orzechowski
Field CISO
Torq

Mike Villis
CISO
World Kinect
The time-sucking grind of allowing as-needed user access, onboarding and offboarding users, auditing for inactive accounts, and responding to every suspicious activity has CISOs under immense pressure to modernize IAM. But two major progress bottlenecks leave teams barely keeping up — talent gaps and disconnected security stacks. What if you could overcome both and transform your IAM posture all at once?
This moderated discussion will hone in on how IAM hyperautomation can enable CISOs to:
- Mitigate identity-related risk by automating access provisioning, deprovisioning, and response
- Offset skill gaps and legacy limitations with no-code/low-code and AI-driven workflows
- Reduce friction and administrative burden for users and analysts while meeting the strictest compliance standards
2:00pm - 2:45pm Executive Boardroom
Securing AI for Resilience and Risk Management
Hosted by Cisco
As AI adoption accelerates across every industry, CISOs face a critical inflection point: evolve from gatekeepers to game-changers. Security can't be bolted on later—it must be architected into the DNA of AI systems from day one to avoid missteps in ethics, compliance, risk, and resilience.
Join this boardroom with your peers and come ready to discuss:
- AI impacts on zero trust, network security, the SOC of the future, audit, and governance
- Practical strategies you’re implementing today (or plan to)
- How the security community moves forward in an AI-driven world
2:45pm - 4:45pm Break
5:15pm - 6:30pm Keynote
Defining Your Executive Brand — Insights & Networking with Daymond John
Hosted by LogicGate

Daymond John
CEO
FUBU & The Shark Group; Star of ABC's Shark Tank
Daymond John, Founder/CEO of FUBU and star of ABC’s Shark Tank, has been a phenomenally successful business person for over 25 years. Along his entrepreneurial journey, through his many successes as well as failures, he has learned a few things about getting the best out of business and life. The keys to success include learning how to establish the right mindset and following a few fundamental principles Daymond calls his "S.H.A.R.K Points”.
Members of the Global CIO and CISO communities will receive exclusive access to:
- Live and unrecorded insights on developing your unique brand of executive leadership
- Guidance on identifying, cultivating and managing powerful business partnerships
- Post-keynote meet and greet opportunities
6:30pm - 7:30pm Gala Dinner
7:30pm - 8:30pm Gala Reception
Apply to Participate
Apply to participate in the Global CISO Community Executive Summit.
Gartner facilitates exclusive, C-level communities by personally qualifying and understanding the priorities, challenges and interests of each member.
Our selective approach maintains the high quality of the network and ensures top-level discussions with peers from the world’s leading organizations.
Each application will be reviewed, and once your participation is confirmed, you will have access to year-round community programs.
We look forward to seeing you at an upcoming in-person gathering
Gartner cares about the health and safety of our community. If you are feeling unwell, please refrain from attending the conference. At this time, Gartner does not have any health-related requirements in place for attendance. Should this change, we will follow up with updated guidance.
Location
Venue & Accommodation
Four Seasons Hotel New OrleansFour Seasons New Orleans Hotel - Room Block Cancellation Policy:
- Any cancellations made after the cutoff (August 9, 2025) are subject to a cancellation fee of (2) nights room charge + tax.
Parking & Transportation
$50 Uber Code for attendees to use for transportation to/from the resort.*
*Limit one per person
A block of rooms has been reserved at the Four Seasons Hotel New Orleans at a reduced conference rate. Reservations should be made online or by calling 504-434-5100.
Deadline to book using the discounted room rate of $385 USD (plus tax) is August 12, 2025.
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.