
Dallas CISO Community
Executive Summit
May 8, 2025 | Renaissance Dallas Richardson Hotel
May 8, 2025
Renaissance Dallas Richardson Hotel
Collaborate with your peers
Get together with Dallas's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.
Join your peers to discuss the most critical issues impacting CISOs today:
Establishing asset visibility while working to create a strong Cloud Governance
Building cyber resilience to withstand & quickly recover from attacks
Creating Robust DLP Strategies to Up Your Risk Management Game
Dallas CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.
Governing Body Co-Chairs

Sara Andrews
Experian
Global CISO

David Bell
CBRE
SVP, CISO

Mustapha Kebbeh
Ultimate Kronos Group
Chief Security Officer

Scot Miller
Mr. Cooper
SVP, CISO

Scott Moser
Sabre Corporation
SVP, Chief Information Security Officer

Becky Palmer
National Life Group
Chief Information Security Officer

Shamoun Siddiqui
The Upbound Group
VP, CISO

Sonya Wickel
Triumph Group
VP, Information Technology & CISO
What to Expect
Agenda
8:00am - 8:30am Registration & Breakfast
8:30am - 9:15am Keynote
Disruption Proof — High Performing Teams that Conquer Change
Hosted by Rapid7

Vijay Pendakur, Ph.D.
Team Effectiveness Coach
Guest Speaker
In today’s fast-moving tech and security landscapes, disruption is inevitable—but it doesn’t have to derail your team’s performance. In this high-energy, 30-minute keynote, Dr. Vijay Pendakur will explore why disruption often leads teams to get stuck and how this stagnation threatens business success. Vijay will share his Alchemy of Talent model and explain how leaders can increase productivity and efficiency on their teams, even when it feels like we’re working in an endless earthquake!
Join this keynote to learn:
- Why disruption can lead to stuck teams and how to avoid it
- The critical impact of stuck teams on business performance and results
- How to make your teams more resilient, adaptable, and willing to learn from failure
9:15am - 9:40am Networking Break
9:40am - 10:25am Breakout Session
Intelligent Identity Governance — The Key to Robust Identity Security
Hosted by Saviynt

Vibhuti Sinha
Chief Product Officer
Saviynt
Identity governance is crucial for protecting digital assets and ensuring resilience. Intelligent identity security can fortify cybersecurity frameworks and seamlessly integrate with corporate decision-making. CISOs can revolutionize their cybersecurity strategy, ensuring robust protection against threats and fostering a proactive security culture.
Join this session to learn:
- How to strategically define an effective and efficient identity security program
- Discover what an effective identity security architecture looks like from an executive point-of-view
- How to calculate the business value you can derive from a converged identity security architecture
9:40am - 10:25am Executive Boardroom
CISO Role Evolution — How Are You Adapting?

Everett Bates
Head of Information Security
Crunchyroll

Eric Puleo
CISO
Commercial Metals
Being a well-rounded CISO can’t be hacked. It takes consistent reflection and re-invention as the role evolves from a solely technology-focused position to a business-enabling one.
Join this peer-led boardroom to discuss:
- Embracing the evolving demands of the CISO role
- Building trust and influence amongst C-Suite peers and key stakeholders
- Demonstrating your value as a proven leader and business-enabler
9:40am - 10:25am Executive Boardroom
Protecting Innovation — Rethinking Data Security Strategies
Hosted by Cyberhaven

Howard Ting
CEO
Cyberhaven

Dewakar Garg
CISO
Mavenir

Eric Fisch
Head of Information Security Governance, Risk, and Controls
USAA
AI makes creating and consuming data easier than ever, with shadow AI and dark data presenting new challenges to security teams. As the tactics for protecting data evolve, security leaders must adopt a risk-based strategy to protect mission-critical data and safeguard innovation.
Join this session to discover:
- Effective practices for ongoing monitoring to identify risks
- Rapid investigation and response techniques for insider threats
- Strategies for evolving your data protection approach
9:40am - 10:25am Executive Boardroom
True Defense Against API & Application Incidents
Hosted by Contrast Security

Larry Maccherone
Evangelist
Contrast Security

Wei Dong
CISO
Michaels Stores
Cybersecurity measures are adept at detecting and responding to incidents across various layers, but the application layer often remains vulnerable. Many organizations have a massive vulnerability backlog that demands timely and effective defense.
Join us to explore:
- Understanding the scale of the backlog and strategies to prevent exploitation
- The intricacies of application and API protection within the security operations ecosystem
- Benefits of having a comprehensive blueprint that reveals attack surfaces, defenses, dangers, and connections
10:25am - 11:10am Networking Break
10:35am - 11:00am Peer-to-Peer Meetings
Peer-to-Peer Meetings
Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.
11:10am - 11:55am Breakout Session
Strengthening Cyber Resilience in Uncertain Times
Hosted by Illumio

Jeff Kirby
CISO
Interstate Batteries

Ian Schneller
CISO
Health Care Service Corporation
In today's world of heightened global tensions, organizations face an ever-increasing risk of sophisticated cyber-attacks targeting their operations and data integrity both domestically and internationally. These large-scale attacks target weaknesses in digital infrastructure, causing severe disruptions and financial setbacks. This session delves into the pressing cybersecurity challenges organizations encounter and outlines strategic measures to bolster defenses against such threats.
Join this peer-led conversation to discuss:
- Equipping CISOs with insights into the current geopolitical climate
- Engaging leadership for informed cybersecurity risk decisions abroad
- Modifying cyber resilience components to counteract new vulnerabilities
11:10am - 11:55am Executive Boardroom
Taming Third Party Risk with Advanced Technologies
Hosted by RiskRecon, a Mastercard Company

Jonathan Ehret
VP, Global Cybersecurity
Mastercard Cybersecurity

Manish Chokshi
Cyber Leader for Digital Transformation
Enhabit Home Health & Hospice

Trent Gibbs
VP, CISO
Concentra
Cyber threats are increasingly sophisticated and pervasive, making conventional TPRM approaches like questionnaires inadequate. AI/ML and threat intelligence have the potential to transform TPRM, as well as extending into 4th, 5th parties and beyond. Leveraging key insights can help CISOs stay ahead of evolving risks and enhance security programs, even with limited resources.
Join this session to discuss:
- Practical strategies for leveraging threat intelligence in TPRM
- Critical alignment of people and process elements with advanced technologies
- Acting on useful insights and data to manage supply chain risk
11:10am - 11:55am Executive Boardroom
Securing Data Flow in the AI-Quantum Era
Hosted by Netskope

Mike Anderson
Chief Digital & Information Officer
Netskope

Matt Bunch
CISO
Tyson Foods

Steven Dodson
CISO
Permian Resources
Sensitive data movement poses risks, but outright restriction can hinder operations. Organizations need agile security frameworks to protect data in the AI and quantum era. This session explores modern security platforms that enable secure data flow and prepare for post-quantum encryption (PQE).
Join this session to learn:
- Choosing secure access methods for diverse use cases
- Adapting security to risk, user behavior and AI interactions
- Preparing for post-quantum encryption's enterprise impact
11:10am - 11:55am Executive Boardroom
Navigating the Noise — A CISO's Guide to Prioritizing Critical Emerging Threats
Hosted by Akamai

Tony Lauro
Director of Security Strategy
Akamai Technologies

Jayme Bynum
CISO
Vital Energy

Jimi Mills
VP, CISO
Texas Instruments
As organizations accelerate their digital transformations, the threat landscape becomes increasingly crowded with risks—some urgent and others overhyped. How can CISOs differentiate between emerging threats that demand action and those that are mere distractions?
This session will provide clarity by:
- Analyzing emerging threat vectors and assessing their relevance and urgency
- Contextualizing new threats within detection and response protocols
- Strengthening resilience through layered defenses and a prioritized security posture
11:55am - 12:30pm Lunch Service
Apply to Participate
Apply to participate in the Dallas CISO Community Executive Summit.
Gartner facilitates exclusive, C-level communities by personally qualifying and understanding the priorities, challenges and interests of each member.
Our selective approach maintains the high quality of the network and ensures top-level discussions with peers from the world’s leading organizations.
Each application will be reviewed, and once your participation is confirmed, you will have access to year-round community programs.
Location
Venue & Accommodation
Renaissance Dallas Richardson HotelParking:
Day Valet: $20
On-Site Self-Parking: $15
A block of rooms has been reserved at the Renaissance Dallas Richardson Hotel at a reduced conference rate. Reservations should be made online or by calling 800-264-0359 . Please mention GE1GE1A to ensure the appropriate room rate.
Deadline to book using the discounted room rate of $179 USD (plus tax) is April 14, 2025.
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.