
San Francisco CISO Community
Executive Summit
November 20, 2024 | Grand Hyatt at SFO
November 20, 2024
Grand Hyatt at SFO
Collaborate with your peers
Get together with San Francisco's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.
Join your peers to discuss the most critical issues impacting CISOs today:
Balancing the dangers and benefits of AI innovation in an ethical way
Rethinking the relationship between cybersecurity teams, third parties, and the people they protect
Providing clear, actionable insights to stakeholders to ensure informed, secure decision-making
San Francisco CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.
Governing Body Co-Chairs

Yassir Abousselham
UiPath
SVP, CISO

Krishnan Chellakarai
Gilead Sciences
CISO, Head of Information Security, Risk & Compliance

Devin Ertel
Menlo Security
Chief Information Security Officer

Al Ghous
CISO

Leda Muller
Stanford University, Residential and Dining Enterprises
Chief Information Security and Privacy Officer

Kannan Perumal
Applied Materials
Vice President, Chief Information Security Officer

Jeff Trudeau
Chime
VP, CIO & CSO
What to Expect
Agenda
7:45am - 8:30am Registration & Breakfast
8:30am - 9:15am Keynote
This is Resiliency — Navigating the New Era of Cybersecurity and Beyond
Hosted by CyberArk

Eddie Borrero
VP, Chief Information Security Officer
Blue Shield of California
Becoming a truly resilient organization requires strategic planning around how security and risk challenges are addressed at all levels of the organization today, while continuing to look to the future. How are next-gen CISOs ensuring their organization stays resilient and adaptable when technology and third parties fail?
Join this session to hear how Eddie Borrero, VP & CISO at Blue Shield of California is:
- Articulating cyber risk posture, controls, and mitigation strategies across the org
- Leveraging security’s role as a business leader and enabler before, during and after disruptions
- Building third party relationships to ensure future growth and success, together
9:15am - 9:40am Networking Break
9:40am - 10:25am Breakout Session
Breaking the Breach Cycle — Continuous Identity Security for Tomorrow's Threats
Hosted by Opal Security

Umaimah Khan
CEO & Co-founder
Opal Security
Managing identity risk is critical, but the challenge is building identity security that is both continuous and scalable. As companies grow, securing identities becomes more complex. While concepts like continuous identity security are familiar, implementing them to reduce risk and scale effectively is difficult.
In this session, we’ll explore:
- How to design a scalable IAM framework that integrates continuous security principles
- Leveraging AI to enhance your identity access, enabling real-time and scalable solutions
- How businesses are building identity for trust and maturity while minimizing risk
9:40am - 10:25am Executive Boardroom
Rethinking the Relationship Between Cybersecurity Teams and the People They Protect
Hosted by Proofpoint

Ryan Kalember
Chief Strategy Officer
Proofpoint

Sekhar Nagasundaram
Global Head of Cyber Defense and Threat Management and SVP Technology - Cybersecurity
Elevance Health

David Tugwell
Senior Director, Information Security/CISO
Agilent Technologies
You’ve heard it all before: the DBIR tells you people are your biggest risk, phishing simulations tell you your users fall for social engineering, and simple security measures you deploy are sometimes met with howls of protest. But what if it didn’t have to be that way?
Join this session for a fresh perspective on:
- Moving security alerts from the SOC to where users work
- Protecting end users perception of security controls
- Transforming security teams’ interactions with end users
9:40am - 10:25am Executive Boardroom
How to Assess Security Maturity and Why It Matters
Hosted by Expel

David Johnson
Principal Solutions Architect
Expel

Kevin Song
Interim Chief Information Security Officer and Sr. Director of Enterprise Security
WeWork

Ajay Wadhwa
CISO
State of California - State Compensation Insurance Fund
Maturing your security posture requires knowing how to objectively assess your organization, use industry best practices and frameworks, and select the right tools to advance your business. This complex, time-intensive process often takes a backseat to defending yourself against ever-evolving threats. Getting started can be overwhelming, so finding time to assess and improve your security maturity is a tall task.
Join this session to discuss:
- Benchmarking SOC performance using common assessment frameworks and tools
- Determining your security maturity level, and how to fill gaps you’ve identified
- Analyzing the impact of data and AI on your security posture
10:25am - 11:05am Networking Break
10:30am - 10:55am Peer-to-Peer Meetings
Peer-to-Peer Meetings
Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.
11:05am - 11:50am Breakout Session
Speaking the Board's Language -- A CISO's Guide to Effective Presentations
Hosted by Wiz

Prakash Kalaiah
Head of Security
Enphase Energy

Ody Lupescu
CISO
GoodLeap

Pavi Ramamurthy
Global CISO & CIO
Blackhawk Network
CISOs need to know how to present complex security issues to the board in a way that resonates with non-technical stakeholders, aligning cybersecurity initiatives with business goals. By focusing on risk, compliance, and measurable outcomes, CISOs can ensure their board presentations drive informed decision-making and secure necessary investments in cybersecurity.
Join this session to discuss:
- Framing cybersecurity issues in a business context, focusing on risk, cost, and ROI
- Aligning cybersecurity strategies with broader business goals to secure board buy-in
- Using metrics and KPIs to demonstrate the impact of security initiatives and investments on business operations
11:05am - 11:50am Executive Boardroom
Solving Supply Chain Risk with Intelligence, Analytics, and Action
Hosted by RiskRecon, a Mastercard Company

Kelly White
Co-Founder & CEO
RiskRecon - A MasterCard Company

Kannan Perumal
Vice President, Chief Information Security Officer
Applied Materials
Intelligence-driven decisions and actions are often deeply embedded into the enterprise security fabric, with defenses against malware, malicious sites, and application attacks dynamically updated based on rapid deployment of intelligence-based rules. In contrast, most third-party risk management programs are deeply rooted in episodic, questionnaire-based assessments which, according to RiskRecon surveys, are trusted by less than 20% of third-party risk teams.
Join this session to discuss:
- Gaining full visibility into risks across the entire supply chain using advanced analytics and AI
- Effective strategies for utilizing intelligence to manage and monitor business partners
- Actionable steps to overcome resource challenges and scale your risk management efforts
11:05am - 11:50am Executive Boardroom
Innovating at Full Speed
Hosted by Snyk

Matt Bartley
GTM Lead, AppRisk
Snyk

Jonathan Chan
Head of Global IT & Security
EpiSource

Leda Muller
Chief Information Security and Privacy Officer
Stanford University, Residential and Dining Enterprises
Establishing trust between security and developers is crucial for successful outcomes, especially as modern development quickly embraces AI. How does the future of innovation hinge on achieving this open trust and communication?
Join this boardroom conversation with Snyk to delve into:
- How to build a culture of security ownership across teams
- What strategies and approaches to building trust are working
- Where AI can speed up and secure application security
11:50am - 12:30pm Networking
Breaking Barriers in Cybersecurity

Tammy Hawkins
VP of Cybersecurity and Fraud Prevention
Intuit
Female, non-binary and allied cyber leaders are invited to eat lunch in our reserved networking space. Hosted by a member of the San Francisco CISO community, those in attendance can freely discuss best practices, key challenges, and mission-critical priorities before heading over to the midday keynote.
11:50am - 12:35pm Lunch Service
Apply to Participate
Apply to participate in the San Francisco CISO Community Executive Summit.
Gartner facilitates exclusive, C-level communities by personally qualifying and understanding the priorities, challenges and interests of each member.
Our selective approach maintains the high quality of the network and ensures top-level discussions with peers from the world’s leading organizations.
Each application will be reviewed, and once your participation is confirmed, you will have access to year-round community programs.
Location
Venue & Accommodation
Grand Hyatt at SFOVALET PARKING:
$25 - up to 2 hours
$35 - up to 6 hours
$48 - 6+ hours and overnight
Hotel does not offer self-parking. However, there is the Garage A airport parking lot, 1.5 blocks away from the hotel that has similar pricing.
A block of rooms has been reserved at the Grand Hyatt at SFO at a reduced conference rate. Reservations should be made online or by calling 1-402-501-9860.
Deadline to book using the discounted room rate of $309 USD (plus tax) is October 28, 2024.
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.