In-Person

San Francisco CISO Community

Executive Summit

November 5, 2025 | Grand Hyatt at SFO

November 5, 2025
Grand Hyatt at SFO

Collaborate with your peers

Get together with San Francisco's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Maximizing Emerging Technologies for Strategic Advantage

Building Cyber Resilience to Withstand and Quickly Recover from Attacks

Recalculating Risk Appetites Across the C-Suite and Strengthening Relationships Accordingly

San Francisco CISO Governing Body

The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.

Governing Body Co-Chairs

Krishnan Chellakarai

Gilead Sciences
CISO, Head of Information Security & Data Privacy

Bryan Green

Andreessen Horowitz
CISO

Mandy Huth

Ultra Clean Technology
SVP, CISO

Jeremiah Kung

AppLovin
CISO

Leda Muller

Stanford University
Chief Information Security and Privacy Officer

Kannan Perumal

Applied Materials
Vice President, Chief Information Security Officer

Jeff Trudeau

Chime
VP, CIO & CSO

David Tugwell

Agilent Technologies
AVP/CISO

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your San Francisco CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda

November 5, 2025

8:00am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

Brain-Driven Resilience — Neuro-Optimizing for Executive Edge

Megs Gelfgot headshot

Megs Gelfgot

Two-time founder, TEDx, International and Fortune 500 speaker on neuroscience & resilience

Guest Speaker

In the high-stakes arena of billion-dollar enterprises, resilience isn't just an asset; it's a necessity. Learn how elite athletes, Navy SEALs, and top executives leverage cutting-edge neuroscience and cognitive training to elevate their relationship with adversity to yield more resilient outcomes. Cognitive training can help boost executive function and enhance decision making under pressure.

Join Megs Gelfgot, Tedx speaker and two-time founder, as she shares:

  • Hacks for gaining a competitive edge
  • Tactical resilience leadership strategies
  • Ways to mitigate symptoms of cognitive decline

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Gartner Breakout Session

Leveling Up from Security Leader to Business Influencer

Ash Ahuja headshot

Ash Ahuja

VP, Global Role Lead & Executive Partner, Security & Risk Management

Gartner

With constant innovation in AI and other technologies, CISOs face questions from the C-Suite and the board that are more high stakes than ever. But high-pressure moments can also be opportunities to shine—transforming a technical security leader into a persuasive, savvy CISO who can win over even the toughest executives.

Join this session to learn about:

  • Mastering communication by speaking the language of business & improving storytelling
  • Championing cybersecurity business cases—even when the budget stakes are high
  • Delivering presentations that pack a punch, leaving everyone in the room feeling invested in your vision

9:40am - 10:25am  Executive Boardroom

Outsmarting Insider Threats — Evolving Tactics in Workforce Infiltration

Jackson Muhirwe headshot

Jackson Muhirwe

CISO

University of California - Santa Barbara

As foreign operatives infiltrate organizations under false identities, traditional hiring and security processes are being tested like never before. This session will dissect real-world attack chains, highlight subtle red flags and technical indicators, and offer actionable strategies for cross-functional response and risk mitigation. Walk away with practical tools to detect, disrupt and prevent these sophisticated insider threats.

Join this talk to learn:

  • Proven methods to identify behavioral and technical warning signs during hiring and employment
  • Effective cross-functional controls and incident response strategies for rapid mitigation
  • Best practices for strengthening organizational resilience through training, ID verification and stakeholder alignment

9:40am - 10:25am  Executive Boardroom

Authenticating Domains to Prevent Brand Impersonation

Patricia Titus headshot

Patricia Titus

Field CISO

Abnormal AI

Allison Henry headshot

Allison Henry

CISO

University of California - Berkeley

Kevin Dunne headshot

Kevin Dunne

COO

Valimail

Cybercriminals now use advanced tools to launch convincing, large-scale phishing attacks. Enterprises must adopt modern defenses that detect subtle anomalies in communication and authenticate domain identities to block brand impersonation. Combining behavioral analysis with robust authentication keeps organizations resilient, protects employees, and secures brand reputation.

Join this roundtable to discuss:

  • Deploying behavioral analysis to detect phishing
  • Authenticating domains to prevent impersonation
  • Strengthening organizational resilience against threats

10:25am - 11:10am  Networking Break

10:35am - 11:00am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:10am - 11:55am  Breakout Session

Generative to Agentic — Is The Risk Worth The Evolution?

Mandy Andress headshot

Mandy Andress

CISO

Elastic

GenAI is changing rapidly, and the next major step is agentic AI — systems that are capable of taking actions without human oversight. This brings a new level of complexity, but there are benefits for security teams as well. Security leaders are now exploring the value and risk of agentic AI to determine how to advance safely.

Join Elastic’s security leadership to explore:

  • The use of GenAI in security and how it's advanced to meet different team needs
  • How AI adoption changes your attack surface
  • The different ways AI augments security teams and workflows

11:10am - 11:55am  Executive Boardroom

Interactive Insights — CISOs Tackling AI and Data Challenges

CISOs face unprecedented challenges and opportunities brought by agentic AI and robust data governance. Discuss pressing issues, share actionable strategies, and learn from the collective experience of their peers. Through facilitated dialogue, CISOs can explore best practices for responsible AI deployment, data stewardship, and organizational resilience.

Join this dynamic, interactive activity for:

  • Practical solutions and real-world perspectives on agentic AI and data governance
  • Opportunities to connect for continued support and shared learning
  • A collaborative community focused on advancing security leadership

11:10am - 11:55am  Executive Boardroom

Looking to the FUTURE — What's Next and Where Will We Get Left Behind?

Sekhar Nagasundaram headshot

Sekhar Nagasundaram

Global Head of Cyber Defense and Threat Management and SVP Technology - Cybersecurity

Elevance Health

As we look toward 2026 and 2027, the futurist landscape extends beyond AI, with breakthroughs in areas like synthetic biology, quantum computing, and climate adaptation reshaping business possibilities. However, we’ve given less thought to challenges such as ethical governance, psychological impacts of technology, and the resilience of global supply chains. To stay ahead, organizations must expand their foresight, anticipate overlooked trends, and foster adaptability. By thinking broadly and planning proactively, businesses can better navigate uncertainty and seize emerging opportunities.

Join this discussion to:

  • Identify underexplored trends and technologies that could disrupt your industry in the next 2-3 years
  • Learn strategies for building organizational resilience and adaptability amid rapid changes
  • Explore actionable foresight tools of resilience for your business across operations, talent, and innovation

11:55am - 12:30pm  Lunch Service

12:00pm - 12:25pm  Networking Break

Empowerment Exchange – Building Inclusive Connections

Mandy Huth headshot

Mandy Huth

SVP, CISO

Ultra Clean Technology

Women, non-binary, and allied cyber leaders are invited to eat lunch in our reserved Networking space. Hosted by members of the Atlanta CISO community, this session will feature an interactive discussion on empowerment in the workplace and navigating different scenarios as women and allies. Attendees will have the opportunity to share best practices, explore key challenges, and collaboratively develop strategies for fostering inclusive and empowered environments before heading over to the midday keynote.

12:30pm - 1:05pm  Keynote

Over the Horizon — CISOs to Chief Cyber Resilience Officers

Kavitha Mariappan headshot

Kavitha Mariappan

Chief Transformation Officer

Rubrik

The CISO remit increasingly includes GenAI governance, securing cyber-physical systems, and a range of value-driving services — yet its core charge remains safeguarding operations. As breaches become inevitable and board risk appetites shift, cyber resilience will demand even greater focus. CISOs must define recovery goals, guarantee reliable backups, and restore critical services with speed — focusing on measurable resilience to earn their future role as Chief Cyber Resilience Officers.

Join this session to learn about:

  • Defining and measuring resilience for real business outcomes
  • Orchestrating reliable backup and rapid recovery strategies
  • Embedding resilience across teams as a cultural and leadership priority

1:05pm - 1:30pm  Break

1:30pm - 2:15pm  Breakout Session

AI on the Fly — CISO Wins in Real Time

Subra Kumaraswamy headshot

Subra Kumaraswamy

SVP & CISO

Visa

Jeff McDonald headshot

Jeff McDonald

SVP, Head of InfoSec

Vituity

AI is transforming cybersecurity, and CISOs are leading the charge with fast, impactful wins. This session highlights how top security leaders are leveraging AI to outpace threats, streamline operations, and deliver measurable results—without the hype. Discover real-world success stories and practical tactics to drive immediate value with AI in your security program.

Join this session to:

  • Hear case studies of AI-driven security wins from CISO peers
  • Learn how to quickly deploy AI for threat detection and response
  • Get tips for measuring and communicating AI’s impact to your board

1:30pm - 2:15pm  Gartner Boardroom

Ransomware Reality Check — From Panic to Preparedness

Ash Ahuja headshot

Ash Ahuja

VP, Global Role Lead & Executive Partner, Security & Risk Management

Gartner

Jonathan Chan headshot

Jonathan Chan

Head of Global IT & Security

EpiSource, a UnitedHealth Company

Ransomware attacks continue to threaten business continuity, reputation, and compliance. As tactics evolve, organizations must focus not only on prevention and detection, but also on effective response and recovery—through robust incident plans, reliable backups, clear communication, and coordination with partners. Building resilience requires strong leadership and ongoing business continuity planning to minimize impact.

Join this session to:

  • Understand the latest ransomware attack vectors and real-world incident case studies
  • Learn actionable strategies for prevention, response, and recovery, including effective incident response planning and data restoration
  • Gain insights into building organizational resilience, from business continuity planning to executive leadership and external collaboration

1:30pm - 2:15pm  Executive Boardroom

Wired & Inspired — Securing IT/OT in a Connected World

As IT and OT systems converge, CISOs must address new security risks and complexities. For CISOs, ensuring the security of both IT and OT is essential to safeguarding organizational resilience, maintaining regulatory compliance, and protecting sensitive data and physical assets. Addressing the unique challenges of IT/OT integration requires practical strategies to protect critical infrastructure in an interconnected world, empowering CISOs to proactively manage risks and enable secure digital transformation.

Join this session to:

  • Review key IT/OT cyber threats and real-world incidents
  • Learn governance and collaboration best practices
  • Get actionable steps to improve visibility and response

2:15pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

Building a Culture of Cyber Resilience

David Tugwell headshot

David Tugwell

AVP/CISO

Agilent Technologies

Preetham Nayak headshot

Preetham Nayak

Chief Information Security Officer

OmniVision Technologies

Srini Tanikella headshot

Srini Tanikella

VP, IT & CIO

Penguin Solutions

Cybersecurity is not just an IT concern, but a business imperative that demands organization-wide engagement. CISOs should explore how to promote security as a shared responsibility, integrate risk discussions into strategic planning, and empower all departments to contribute to resilience efforts. As we look toward 2026 and beyond, board-level engagement and cross-functional collaboration are essential for success.

Join your peers to discuss:

  • The interconnected challenges facing today’s organizations, including AI-generated deception, social engineering attacks, and supply chain vulnerabilities

  • The importance of a multi-layered, proactive security posture and the need to adapt to rapidly evolving threats

  • Real-world concerns and crowdsource actionable solutions, focusing on building awareness, preparedness, and continuous adaptation

3:00pm - 3:45pm  Executive Boardroom

The AI Tightrope — Security Leadership When the Rules Keep Changing

Krishnan Chellakarai headshot

Krishnan Chellakarai

CISO, Head of Information Security & Data Privacy

Gilead Sciences

As artificial intelligence becomes deeply embedded in business operations, the White House’s AI Action Plan is testing traditional governance and risk management processes like never before. How will CISOs recognize and respond to subtle warning signs and governance gaps in AI adoption? What strategies can help navigate the evolving landscape of regulatory expectations and cross-functional oversight? How can organizations ensure their security frameworks keep pace with the speed and complexity of AI-driven threats? How can CISOs detect, disrupt, and prevent emerging AI-driven threats while aligning their organizations with evolving regulatory expectations?

Join this session to learn:

  • Proven methods to identify governance, ethical, and technical warning signs in AI adoption and deployment
  • Effective cross-functional controls and incident response strategies for rapid mitigation of AI-related risks
  • Best practices for strengthening organizational resilience through board engagement, AI risk training, and robust oversight frameworks

3:00pm - 3:45pm  Executive Boardroom

From Gatekeeper to Strategist — Navigating Change in Security Leadership

Often referred to as the “thankless job,” CISOs are at the forefront of managing complex threats and safeguarding organizational assets. The relentless pressures and demands of the role can lead to burnout, causing many to question their future beyond the CISO position. However, by focusing on well-being and exploring new opportunities, CISOs can sustain their resilience, envision fulfilling career paths, and continue making meaningful contributions. How can CISOs begin to gain insights into maintaining well-being and charting a rewarding path after their tenure?

Join this session to:

  • Identify the symptoms and causes of burnout specific to CISOs and learn strategies for resilience and self-care
  • Explore proactive measures for anticipating and managing unexpected cybersecurity crises
  • Discuss potential career pathways and opportunities for leveraging CISO experience in diverse roles beyond cybersecurity leadership

3:45pm - 4:00pm  Networking Break

4:00pm - 4:35pm  Keynote

Cyber is a Community Sport

Upendra Mardikar headshot

Upendra Mardikar

CISO

TIAA

Jonathan Chan headshot

Jonathan Chan

Head of Global IT & Security

EpiSource, a UnitedHealth Company

CISOs face the formidable challenge of safeguarding their organizations' assets against increasingly sophisticated cyber threats. The Cyber 2.0 strategy emerges as a pivotal framework that empowers CISOs to enhance their security posture while steering their teams towards strategic resilience and innovation. Embracing cyber as a community sport is essential, as collective defense and information sharing across organizations strengthen the entire ecosystem against evolving threats.

Join your peers to:

  • Equip yourself with knowledge of Cyber 2.0 principles to enhance organizational security strategies
  • Align cybersecurity with business goals to integrate security into strategic organizational direction
  • Leverage AI, ML, and automation to proactively detect and mitigate cyber threats

4:35pm - 4:45pm  Closing Comments and Prize Drawing

4:45pm - 6:00pm  Governing Body Reception

Governing Body Reception

Finish the day sharing lessons learned with your peers over light fare and drinks at this closing reception hosted by your governing body members.

November 5, 2025

We look forward to seeing you at an upcoming in-person gathering

Gartner cares about the health and safety of our community. If you are feeling unwell, please refrain from attending the conference. At this time, Gartner does not have any health-related requirements in place for attendance. Should this change, we will follow up with updated guidance.

Location

Venue & Accommodation

Grand Hyatt at SFO
More Information

A block of rooms has been reserved at the Grand Hyatt at SFO at a reduced conference rate. Reservations should be made online or by calling 650-502-6303.

Deadline to book using the discounted room rate of $299 USD (plus tax) is October 13, 2025.

Your Community Sponsors

CISO Thought Leader

Key Sponsor

Program Sponsors

Community Program Manager

For inquiries related to this community, please reach out to your dedicated contact.

Chanelle Lawrence

Senior Community Program Manager

971-282-2228

chanelle.lawrence@gartner.com