Boston CISO Community
Executive Summit
November 13, 2025 | Hyatt Regency Boston- Cambridge
November 13, 2025
Hyatt Regency Boston- Cambridge
Collaborate with your peers
Get together with Boston's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.
Join your peers to discuss the most critical issues impacting CISOs today:
Maintaining Operations Through Cyber Resilience Strategies
Enhancing User Access with Smart Solutions
Maximizing AI for Strategic Advantage
Boston CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.
Governing Body Co-Chairs

Julie Fitton
Analog Devices
CISO

Javed Ikbal
Bright Horizons
VP/CISO

Brian McGowan
SharkNinja
CISO

Ravi Thatavarthy
EmpriRX Health
CISO and Head of Infrastructure
What to Expect
Agenda
8:00am - 8:30am Registration & Breakfast
8:30am - 9:15am Keynote
CISOs on the Hot Seat — A New Era of Liability
Hosted by Wiz
Aravind Swaminathan
Global Co-Chair Cybersecurity & Data Privacy
Orrick, Herrington & Sutcliffe
Jasvinder Khera
AVP & CISO
John Hancock
As cybersecurity attacks increase in sophistication, the financial and reputational impact for companies has never been more pronounced. CISOs responsible for navigating a company through a data breach, the stakes are even higher. CISOs confront significant personal civil and criminal liability in connection with their handling of breaches and associated disclosures. This raises serious concerns not only for CISOs, but also for companies’ abilities to secure expert personnel to safeguard their data and systems.
Join this keynote to discuss:
- Protecting executives on the front lines of cybersecurity incidents
- Implementing best practices aimed at reducing the potential liability of key stakeholders
- Managing liability risks which includes how to work with the Board and the broader executive team
9:15am - 9:40am Networking Break
9:40am - 10:25am Breakout Session
Identity as a Business Enabler — Driving Innovation
Hosted by Veza
Puneet Bhatnagar
Senior Vice President, Head of IAM - Cybersecurity
Blackstone Group
Paul Steen
Vice President - Solution Engineering
Veza
With rising threats and increasingly complex ecosystems, organizations must evolve beyond traditional IAM. Intelligence-driven identity programs are essential for unifying security and identity, leveraging insights for competitive advantage, automating governance to reduce friction, and quantifying business value through modern controls.
Join Puneet Bhatnagar, Blackstone and Paul Steen, Veza as they discuss:
- Unification of security and identity
- Automation of governance for reduced friction
- Quantification of business value through modern controls
9:40am - 10:25am Breakout Session
From Awareness to Action — Building a Resilient Security Culture
Hosted by Mimecast
Neil Clauson
Regional CISO
Mimecast
As email, collaboration tools and AI threats intensify, organizations must move beyond traditional security awareness to proactive human risk management to truly foster a security-conscious culture.
Join this session to discuss:
- Tips to transform your security culture and communicate human risk across the organization
- Strategies to balance innovation, productivity, and prevention
- How to balance secure AI use with compensating controls by assessing and quantifying human risk
9:40am - 10:25am Executive Boardroom
Cyber Resilience Showdown — CISOs Unite to Tackle Geopolitical Challenges
Julie Fitton
CISO
Analog Devices
Robert Sullivan
CISO, VP Technology Shared Services
Agero
As global tensions rise, coordinated cyber-attacks are impacting organizations globally. Cyber-conflict isn’t just a security problem, it’s a business problem that requires a strategic partnership between CISOs and leaders across the enterprise.
Join this peer-led conversation to discuss:
- How to keep your cybersecurity priorities in sync with business goals while riding the risk appetite rollercoaster
- Learn the steps to engage your leadership in a dance of informed decision-making that keeps your digital assets safe and sound
- Arm yourself with the latest strategies against politically charged TTPs to bop those threats on the head and turn vulnerabilities into victories
9:40am - 10:25am Executive Boardroom
The Future of Cyber Defense is Autonomous
Hosted by Recorded Future
Allan Liska
Principal Security Strategist
Recorded Future
As cyber threats become faster, more sophisticated, and AI-enabled, human-only security teams are struggling to keep pace. Autonomous systems are emerging as the next phase of security, offering real-time, adaptive, and scalable protection. How are CISOs leveraging technology to allow their team to focus on stopping threats before they impact the organization?
Join this session to discuss:
- Keeping pace with rapid attacks
- Efficiently manage big data and risks
- Supporting the team to tackle complex issues
10:25am - 11:10am Networking Break
10:35am - 11:00am Peer-to-Peer Meetings
Peer-to-Peer Meetings
Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.
11:10am - 11:55am Breakout Session
Over the Horizon — CISOs to Chief Cyber Resilience Officers
Hosted by Rubrik
John Murphy
CISO-in-Residence
Rubrik
The CISO remit increasingly includes GenAI governance, securing cyber-physical systems, and a range of value-driving services — yet its core charge remains safeguarding operations. As breaches become inevitable and board risk appetites shift, cyber resilience will demand even greater focus. CISOs must define recovery goals, guarantee reliable backups, and restore critical services with speed — focusing on measurable resilience to earn their future role as Chief Cyber Resilience Officers.
Join this session to learn about:
- Defining and measuring resilience for real business outcomes
- Orchestrating reliable backup and rapid recovery strategies
- Embedding resilience across teams as a cultural and leadership priority
11:10am - 11:55am Breakout Session
Cloud Network Security Meets Zero Trust Architecture
Hosted by Aviatrix
Willie Tejada
GM & SVP, Cloud Native Security Fabric
Aviatrix
As enterprises expand cloud use, CISOs must reduce risk, ensure resilience, and maintain compliance. Zero Trust in the cloud goes beyond identity — it hinges on segmentation, continuous visibility, and policy enforcement across multi-cloud networks. Closing gaps in east-west traffic, containerization, and egress controls is vital for protecting operations and reporting risk effectively.
Join this session to learn how to:
- Embed zero trust principles into cloud network architecture
- Eliminate blind spots across multicloud and containerized environments
- Demonstrate risk reduction and regulatory compliance with confidence
11:10am - 11:55am Executive Boardroom
Taming Cyber Risk with Advanced Technologies
Hosted by Mastercard Cybersecurity
Ashish Gupta
VP, Solutions Consulting Services
Mastercard Cybersecurity
Brian Cayer
CISO
Keck Medicine of USC
Cyber threats are increasingly sophisticated and pervasive, making conventional risk management approaches inadequate. AI/ML and threat intelligence have the potential to transform how organizations handle cyber threats, as well as extending into areas such as TPRM, security analytics, and more. Leveraging key insights can help CISOs stay ahead of evolving risks and enhance security programs, even with limited resources.
Join this session to discuss:
- Practical strategies for leveraging threat intelligence in cyber risk management
- Critical alignment of people and process elements with advanced technologies
- Acting on useful insights and data to manage cyber risk
11:55am - 12:30pm Lunch Service
11:55am - 12:30pm Lunch Service
Rising Together — CISO Empowerment
Lorna Koppel
Director of Information Security/CISO
Tufts University
This will be an intimate luncheon for those in cybersecurity leadership roles and their allies to freely discuss best practices, key challenges, and mission-critical priorities. Come prepared to share ideas and forge new connections that can help empower each other to make an impact in your organizations and the Greater Boston community.
**This session is aimed at, but not limited to, women who are leading the cybersecurity function at their organizations, CISO or those reporting directly to the CISO/equivalent.
Apply to Participate
Apply to participate in the Boston CISO Community Executive Summit.
Gartner facilitates exclusive, C-level communities by personally qualifying and understanding the priorities, challenges and interests of each member.
Our selective approach maintains the high quality of the network and ensures top-level discussions with peers from the world’s leading organizations.
Each application will be reviewed, and once your participation is confirmed, you will have access to year-round community programs.
Location
Venue & Accommodation
Hyatt Regency Boston- CambridgeA block of rooms has been reserved at the Hyatt Regency Boston- Cambridge at a reduced conference rate. Reservations should be made online or by calling 617-492-1234. Please mention G-EV12 to ensure the appropriate room rate.
Deadline to book using the discounted room rate of $279 USD (plus tax) is October 20, 2025.
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.
