
Dallas CISO Community
Executive Summit
November 7, 2024 | Renaissance Dallas Richardson Hotel
November 7, 2024
Renaissance Dallas Richardson Hotel
Collaborate with your peers
Get together with Dallas's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.
Join your peers to discuss the most critical issues impacting CISOs today:
Facilitating Secure Decision-Making with Outcome-Driven Metrics
Equipping users with safely-integrated AI tools and practices per the demand of advancing businesses
Strengthening influence and partnerships across organization
Dallas CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.
Governing Body Co-Chairs

Sara Andrews
Experian
Global CISO

Sujeet Bambawale
7-Eleven
VP, CISO

David Bell
CBRE
Senior Vice President & Chief Information Security Officer

Mustapha Kebbeh
Ultimate Kronos Group
Chief Security Officer

Scot Miller
Mr. Cooper
SVP, CISO

Scott Moser
Sabre Corporation
SVP, Chief Information Security Officer

Becky Palmer
National Life Group
Chief Information Security Officer

Harold Rivas
Trellix
SVP & CISO

Shamoun Siddiqui
Upbound
VP, CISO

Sonya Wickel
Triumph Group
CISO & Sr. Director, Compliance
What to Expect
Agenda
7:45am - 8:30am Registration & Breakfast
8:00am - 8:30am Networking
Rising Together - Women in Security Networking
Female, non-binary, and allied cyber leaders are invited to start the day off right - with coffee, networking, and inspiration. Forge new connections and empower your fellow executives through open, informal discussions on the future of cybersecurity.
This session is aimed at, but not limited to, women who are leading the cybersecurity function at their organizations (CISO or equivalent) and those reporting directly to the CISO/equivalent. Priority access will be reserved to these groups.
8:30am - 9:15am Keynote
Words That Work — Using Impactful Language to Deliver Results
Hosted by Wiz

Val Wright
Global Leadership & Innovation Expert, Author
Guest Speaker
Effective communication is a critical component of success for CISOs. The most successful executives realize this and prepare what to say and when to say it with precision using "words that matter". In this keynote conversation, author Val Wright offers fresh perspective and techniques to help you elevate the conversation to deliver results.
In this session Val shares how to:
- Create communication that resonates and simplifies complex information
- Foster productive relationships with internal and external stakeholders
- Develop powerful responses to navigate resistance and achieve results
9:15am - 9:40am Networking Break
9:40am - 10:25am Breakout Session
A New Paradigm for Managing Third-Party Risk
Hosted by Dataminr

Shimon Modi
VP, Product Management, Cyber
Dataminr
In the past 12 months, 87% of F1000 businesses were affected by significant cyber incidents as a result of a third-party. And yet, most rely on ‘snapshot in time’ questionnaires. While necessary, snapshots are insufficient by themselves, and must be augmented with continuous monitoring in support of ongoing security operations. This requires a different approach, that includes external threat detection capabilities by using AI across Public Data.
Join this session to learn about:
- The Public Data opportunity: collect, process, alert across multiple languages / modalities
- Real-time external threat detection on a rapidly evolving threat landscape
- The most advanced AI techniques for automating the collection, processing, delivery, and initial analysis of millions of public data sources
9:40am - 10:25am Executive Boardroom
Fulfill the Promise of Zero Trust — Navigating Access, Risk, and Common Obstacles
Hosted by Citrix

Stan Choflet
VP, Security GTM
Citrix Systems, Inc.

Eric Fisch
Head of Information Security Governance, Risk, and Controls
USAA

Eric Bowerman
CISO
Dallas/Fort Worth International Airport

Joey Rachid
VP, Information Security and CISO
UST Global
Everyone understands the promise and potential of zero trust. However, with the expense and effort involved in implementing new security policies, solidifying Identity Access Management (IAM), and supporting on-prem or legacy systems (just to name a few), it's no wonder that the journey to zero trust is moving slower than expected. What have CISOs learned in dealing with these obstacles and building institutional support to start or continue driving towards the north star of zero trust?
Join this session to discuss:
- Overcoming common obstacles to implementing zero trust by leveraging innovative solutions and building institutional support
- Solidifying IAM frameworks to ensure secure access while maintaining business agility
- Communicating the balancing act of scaling access and managing cyber risk to the C-suite and board within broader business risk discussions
9:40am - 10:25am Executive Boardroom
Unpacking the Vital Role of the CISO in Data Security

Blayne Henke
Director Information Security
Omni Hotels & Resorts

Marc Johnson
Chief Information Security Officer
Atos North America

Jeff Kirby
CISO
Interstate Batteries
The CISO plays a key role in safeguarding digital assets, emphasizing robust Data Governance in strategic IT plans. This is becoming especially key as companies embrace AI and open their data sets to LLMs. Having the CISO play an active role in data governance fortifies security, enables data-driven decisions, and enhances resilience against cyberattacks. Cultivating a security culture, supported by Data Governance, transforms data protection into a strategic asset driving organizational success.
Join this session to discover:
- CISO Leadership: Implementing robust Data Governance, led by the CISO, safeguards digital assets amidst AI adoption
- Enhanced Security: Active CISO involvement strengthens security measures, enabling data-driven decisions and proactive defense
- Security Culture: Embedding Data Governance cultivates a security-centric culture
10:25am - 11:05am Networking Break
10:30am - 10:55am Peer-to-Peer Meetings
Peer-to-Peer Meetings
Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.
11:05am - 11:50am Breakout Session
Metrics that Matter
Hosted by Axonius

Mustapha Kebbeh
Chief Security Officer
Ultimate Kronos Group
CISOs spend a considerable amount of time and energy quantifying and qualifying security posture for boards of directors/executive leadership. But what if the way risk is being reported to the board just isn’t resonating?
In this session, Mustapha Kebbeh the Chief Security Officer at Ultimate Kronos Group will share highlights, examples and lessons learned and discuss:
- Discovering where and why disconnects are happening
- Reviewing, redefining and repositioning risk and security metrics
- Linking risk measurement with technical metrics to demonstrate cyber risk’s role in company decision making
11:05am - 11:50am Executive Boardroom
Risk to the Nth-Party Degree
Hosted by RiskRecon, a Mastercard Company

John Chisum
VP, Solutions Consulting
RiskRecon - A MasterCard Company

Boulton Fernando
CISO
Rithm Capital

Joseph Moore
CISO
Haynes International
Third party relationships are closest and may prove to be the most tangible risks to your business, yet the whole supply chain of your business partners still pose a substantial threat. Most organizations’ vendor relationships extend to the 8th party. CISOs need to understand this web of connectedness in order to better manage and communicate enterprise risk.
Join this session to discuss:
- Gaining visibility into risk across the whole supply chain
- Strategies for effective risk management and monitoring business partners
- Overcoming resource challenges to prioritize third-party and extended supply chain risk
11:05am - 11:50am Executive Boardroom
How to Assess Security Maturity and Why It Matters
Hosted by Expel

Tyler Zito
Senior Solutions Architect
Expel

Bryce Carter
Chief Information Security Officer
City of Arlington

KC Condit
CISO
G6 Hospitality

Sailaja Kotra-Turner
CISO and VP Infrastructure and Operations
Brown-Forman
Maturing your security posture requires knowing how to objectively assess your organization, use industry best practices and frameworks, and select the right tools to advance your business. This complex, time-intensive process often takes a backseat to defending yourself against ever-evolving threats. Getting started can be overwhelming, so finding time to assess and improve your security maturity is a tall task.
Join this session to discuss:
- Benchmarking SOC performance using common assessment frameworks and tools
- Determining your security maturity level, and how to fill gaps you’ve identified
- Analyzing the impact of data and AI on your security posture
11:50am - 12:35pm Lunch Service
Apply to Participate
Apply to participate in the Dallas CISO Community Executive Summit.
Gartner facilitates exclusive, C-level communities by personally qualifying and understanding the priorities, challenges and interests of each member.
Our selective approach maintains the high quality of the network and ensures top-level discussions with peers from the world’s leading organizations.
Each application will be reviewed, and once your participation is confirmed, you will have access to year-round community programs.
Location
Venue & Accommodation
Renaissance Dallas Richardson HotelParking:
Day Valet - $10
Overnight Valet - $20
Overnight Self Park - $15
A block of rooms has been reserved at the Renaissance Dallas Richardson Hotel at a reduced conference rate. Reservations should be made online or by calling 800-264-0359. Please mention Evanta CISO Executive Summit to ensure the appropriate room rate.
Deadline to book using the discounted room rate of $179 USD (plus tax) is October 14, 2024.
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.