
San Francisco CISO Community
Executive Summit
June 25, 2024 | Grand Hyatt at SFO
June 25, 2024
Grand Hyatt at SFO
Collaborate with your peers
Get together with San Francisco's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.
Join your peers to discuss the most critical issues impacting CISOs today:
Building risk-ready relationships outside security as a proactive mitigation practice
Overseeing a secure integration of AI and using it to develop business-enabling tools
Managing and protecting key data in a world of variable user access and protections
San Francisco CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.
Governing Body Co-Chairs

Yassir Abousselham
UiPath
SVP, CISO

Selim Aissi
HealthEquity
EVP and CSO

Sujeet Bambawale
7-Eleven
VP, CISO

Krishnan Chellakarai
Gilead Sciences
CISO, Head of Information Security & Data Privacy

Devin Ertel
Menlo Security
Chief Information Security Officer

Al Ghous
Snapdocs
CISO

Leda Muller
Stanford University, Residential and Dining Enterprises
Chief Information Security and Privacy Officer

Kannan Perumal
Applied Materials
Vice President, Chief Information Security Officer

Jeff Trudeau
Chime
VP, CIO & CSO
What to Expect
Agenda
7:45am - 8:30am Registration & Breakfast
8:30am - 9:15am Keynote
Time 2.0 — Applying Design Thinking to the Human Experience of Time
Hosted by Netskope

John Coyle
CEO and Founder of "Speaking Design Thinking"
Guest Speaker
Time, as we experience it, is not linear, yet why do we pretend that it is? How do we measure the true value of our time? In this mind-bending session, John K. Coyle will apply creative deconstruction to what we think we know about time, and you will learn how to slow, stop and reverse the perceived acceleration of time most adults feel and experience the endless summers of youth again.
Grab a seat and learn how to:
- Understand the forces that govern experiential time
- Discover actions you can take to manipulate your perception of time
- Design your life to create intense and memorable experiences that expand time
9:15am - 9:40am Networking Break
9:40am - 10:25am Breakout Session
Turning Security Data in Action
Hosted by SentinelOne

Mani Keerthi Nagothu
Americas Field CISO Associate Director
SentinelOne
Security teams have an incredible amount of data but struggle to manage and generate value from this vast data repository. With the right approach to managing security data, CISOs will extract actionable insights that improve their security posture.
Join this session to learn:
- Benefits of security data lakes and best practices for implementation
- Effective data management strategies that enable and amplify AI use and improve productivity
- Leveraging data lakes to strengthen your cyber resilience and security posture
9:40am - 10:25am Breakout Session
Fraternize and Maximize — Sharing Knowledge, Power, and Victory Over Common Risks
Hosted by AppOmni

Kannan Perumal
Vice President, Chief Information Security Officer
Applied Materials
When it’s harder to attack anyone, it’s harder to attack everyone. It might feel like a brain teaser but, simply put, intra-industry CISO collaboration and collective intelligence partnerships don’t just benefit your business’s lagging competitors. Yes, sharing information with your fellow industry CISOs could give them a leg up on the next big risk but, in a world of exponential connectedness, squashing risk early is never selfless.
Join Kannan Perumal as he discusses:
- The unique benefits of consorting with CISOs in your own industry
- Why some industries are more apt to support these competitor collabs
- The paradoxical support of a business’s ambition and opposition
9:40am - 10:25am Executive Boardroom
Communicating Effectively, Utilizing Outcome Driven Tactics
Hosted by Google Cloud Security

Tim Crothers
Director, Office of the CISO
Google Cloud Security

Andrew Schofield
SVP, Head of Information Security & IT Operations
Forge Global

Fernando Enrile
Head of Trust - Office of Cybersecurity
Marqeta

Anurana Saluja
Vice President - Global Head of Information Security, Privacy & Business Continuity
Sutherland
As security leaders gain more face time with the board and key stakeholders, communicating in a way that is understood and out of the weeds is getting more necessary. To keep communication effective as CISOs, implementing some of the process improvement tactics to your own style is helpful. Join this boardroom to get insight into:
- Developing unique KPIs for your security team and yourself
- Setting clear goals that allow your team to exceed them
- Outcome driven security and how to implement it into your communication style
9:40am - 10:25am Executive Boardroom
Yesterday’s Shadow IT and Today’s Shadow AI
Hosted by Grip Security and ArmorCode

Young-Sae Song
CMO
Grip Security

Mark Lambert
Chief Product Officer
ArmorCode

Leda Muller
Chief Information Security and Privacy Officer
Stanford University, Residential and Dining Enterprises
Shadow AI introduced a new layer of risk in a time when security leaders are already grappling with the formidable challenges of managing hidden technical debt and uncovering shadow IT. Today’s digital landscape requires a new approach to risk and governance – one that identifies the shadows already existing in your organization and stops future shadows emerging as you harness the power of emerging technologies.
Join this session to discuss:
- Uncovering existing hidden technical debts and shadow IT that inhibit agility, innovation and security
- Establishing centralized risk frameworks and governance that are enforceable and scalable
- Involving the C-suite and end users in establishing and understanding protections to deter rogue IT and AI
10:25am - 11:05am Networking Break
10:30am - 10:55am Peer-to-Peer Meetings
Peer-to-Peer Meetings
Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.
11:05am - 11:50am Breakout Session
Endpoint, Cloud and the Board — Identifying Risk that Matters
Hosted by Qualys

Richard Seiersen
Chief Risk Technology Officer
Qualys
Prioritizing and eliminating the cyber risks that matter most is the ultimate goal of security leaders. But how do you validate that your efforts are hitting the mark? It all comes down to well-crafted measurements: metrics that are reliable and easily understood by all stakeholders across the business.
In this session, we will discuss:
- Cybersecurity risk assessment essentials and which risks truly carry weight
- Concrete approaches to determine effectiveness of security capabilities
- Creating simple "metric cards" to communicate across stakeholders
11:05am - 11:50am Breakout Session
Security Hot Topics — Pulse Check Your Priority
Hosted by Wiz

Leda Muller
Chief Information Security and Privacy Officer
Stanford University, Residential and Dining Enterprises
Security continues to find its way into the boardroom and even into headlines. As the spotlight grows, so does the pressure CISOs face to foster constructive conversations around the value, opportunity and impact of key priorities.
Join this interactive session to:
- Engage with like-minded CISO peers on shared priorities
- Validate strategies and uncover new ways of thinking
- Share key lessons learned and proven best practices
Table Themes Include: AI vs. Talent; Life After CISO/Board Membership; Leading Through M&A; Cloud Misconfigurations; OT Security; Quantum Computing / Next-Gen Technology
11:05am - 11:50am Executive Boardroom
Securing the Everywhere World — Building Cyber Resilience through a “Connectivity Cloud”
Hosted by Cloudflare

James Dolph
CISO
Guidewire Software

Kevin Song
Interim Chief Information Security Officer and Sr. Director of Enterprise Security
WeWork

Ling Wu
Senior Director, Information Security GRC
Cloudflare
When users are everywhere and digital operations span cloud, SaaS, and on-premises environments, achieving cyber resilience becomes paramount. The challenge lies in navigating this complexity and maintaining visibility and control to ensure continuous operation despite cyber threats.
Join this interactive roundtable to discuss:
- Optimizing costs and improving security across diverse cloud environments
- Adopting Zero Trust philosophies to protect users, data and applications
- Innovating with AI while addressing global regulatory and data privacy requirements
11:05am - 11:50am Executive Boardroom
Doubling Down on Critical Third-Party Risk Vulnerabilities
Hosted by RiskRecon, a Mastercard Company

Kelly White
Co-Founder & CEO
RiskRecon - A MasterCard Company

Ed Machado
ISO & Chief Privacy Officer/ Sr Manager, Information Security
Star One Credit Union

James O'Brien
Deputy Chief Information Security Officer
First Republic Bank
The complete entanglement of cyber risk with business risk is becoming increasingly more visible. CISOs now have an opportunity to better pinpoint third parties that present a threat to the organization. Yet the increasing complexities of third party, and even fourth party, risk management, prompted by a wide range of evolving threats, demands heightened attention. How can CISOs ensure they have a clear understanding of their vulnerabilities across ecosystems and supply chains?
Join this session to discuss:
- Identification of vulnerabilities across your vendor landscape to prioritize response efforts
- Third-party risk management strategies to safeguard your digital ecosystem
- Overcoming resource challenges to prioritize extended supply chain risk
11:50am - 12:20pm Networking & Meal Service
Rising Together — Gender-Inclusive Networking Lunch

Leda Muller
Chief Information Security and Privacy Officer
Stanford University, Residential and Dining Enterprises
Female, non-binary, and allied cyber leaders are invited to eat lunch and connect in our reserved networking space. Hosted by a member of the San Francisco CISO community, those in attendance can freely discuss best practices, key challenges and mission-critical priorities before heading over to the midday keynote.
11:50am - 12:35pm Lunch Service
Apply to Participate
Apply to participate in the San Francisco CISO Community Executive Summit.
Gartner facilitates exclusive, C-level communities by personally qualifying and understanding the priorities, challenges and interests of each member.
Our selective approach maintains the high quality of the network and ensures top-level discussions with peers from the world’s leading organizations.
Each application will be reviewed, and once your participation is confirmed, you will have access to year-round community programs.
Location
Venue & Accommodation
Grand Hyatt at SFOParking Information:
Valet parking at the hotel is $48 for 6+ hours and overnight parking.
Accommodation Information:
A block of rooms has been reserved at the Grand Hyatt at SFO at a reduced conference rate. Please email the Conference Manager to make a reservation at hannah.mcdougall@gartner.com.
Deadline to book using the discounted room rate of $309 (plus taxes) is Monday, June 3, 2024.
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.