In-Person

San Francisco CISO Community

Executive Summit

June 11, 2026 | Grand Hyatt at SFO

June 11, 2026
Grand Hyatt at SFO

Collaborate with your peers

Get together with San Francisco's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Maximizing AI for strategic growth while empowering safe integration for users

Streamlining access management and controls across both traditional and non-human identities

Reframing risk reduction as minimizing business impact and improving resilience

San Francisco CISO Governing Body

The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.

Governing Body Co-Chairs

Krishnan Chellakarai

Gilead Sciences
CISO, Head of Information Security, Risk & Compliance

Bryan Green

MGM Resorts International
CISO

Mandy Huth

Ultra Clean Technology
SVP, CISO

Jeremiah Kung

AppLovin
CISO

Leda Muller

Stanford University
Chief Information Security & Privacy Officer

David Tugwell

Agilent Technologies
AVP & CISO

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your San Francisco CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda

June 11, 2026

8:30am - 9:15am  Registration & Breakfast

8:30am - 9:15am  Networking

Executive Networking Hour

CISO Coffee Kickoff — Brewed Awakenings

Join CISO peers for casual networking to kick start the day, brew new connections and exchange goals for the Executive Summit ahead.

9:15am - 10:15am  Keynote

Security Culture — Built, Not Bolted On

Fritz Wetschnig headshot

Fritz Wetschnig

Chief Information Security & Data Privacy Officer

Flex

What would it look like if security wasn’t just a function—but a shared cultural instinct across your entire organization? As CISOs face mounting pressure to drive resilience, the mandate is shifting from enforcing compliance to inspiring security‑first thinking at every level. Organizations can embed security into daily behaviors, decision‑making, and business operations, so protection becomes a natural extension of how the company works, innovates, and grows.

Join Fritz Wetschnig, Chief Information Security & Data Privacy Officer of Flex, to discuss how:

  • Security culture starts with leadership modeling and reinforcement
  • Embedding security into workflows boosts adoption and reduces risk
  • Shared ownership drives stronger, more sustainable security outcomes

10:15am - 10:40am  Networking Break

10:40am - 11:25am  Breakout Session

Ownership and Oversight for Nonhuman Identities

Clarence Foster headshot

Clarence Foster

BISO

T-Mobile for Business

AI agents are rapidly expanding the nonhuman identity landscape, operating at machine speed with delegated authority that outpaces today’s governance models. As boards begin asking who owns these agents, what they’re allowed to do, and how they can be stopped, CISOs must move beyond monitoring and establish identity‑centric guardrails that ensure control before action. How can CISOs enable AI innovation without losing command of their environment?

Join Clarence Foster, BISO of T-Mobile for Business and your peers to:

  • Understand why nonhuman identity sprawl makes AI agents a new risk frontier
  • Learn how proactive, identity‑first controls must precede autonomous agent actions
  • Explore governance guardrails that clearly define ownership, permissions, and safe shutdown paths for AI agents

10:40am - 11:25am  Executive Boardroom

AI Security – Turning Agents into Security Allies

Vasu Jakkal headshot

Vasu Jakkal

Corporate VP Security, Compliance, Identity, Management & Privacy

Microsoft Corporation

 The dual nature of AI is here - extraordinary innovation paired with complex risks. According to recent reports, more than 29% of employees have turned to unsanctioned AI agents for work tasks and these unsecured agents lack clear visibility into what they can do, what they access, or the blast radius they introduce. CISOs must secure AI agents with the same rigor as human users, ensuring visibility, governance, and robust controls amid rapid change and resource constraints.

Join this boardroom to discuss:

  • Enforcing Zero Trust principles for both human and AI identities
  • Establishing continuous observability and monitoring of AI agent activity
  • Implementing governance frameworks to manage access, actions, and compliance

10:40am - 11:25am  Executive Boardroom

The AI Mandate — Secure Innovation. Optimize Defense.

Patricia Grant headshot

Patricia Grant

Chief Information Officer

Tenable

AI is driving rapid business innovation while equally empowering threat actors, creating a dual mandate for today’s CISOs: securely enabling AI adoption and leveraging AI to enhance their own defensive capabilities. Securing this expanding AI attack surface requires strong visibility, holistic governance, and continuous policy enforcement. At the same time, effective defense at AI speed relies on GenAI for sharper insights and agentic AI to automate operations and outpace adversaries.

Join your peers to tackle critical questions on how:

  • AI adoption must be both empowered and governed to prevent new business and security risks
  • Visibility, governance, and continuous policy enforcement form the foundation of AI risk management
  • Combining GenAI insights with agentic AI automation is essential to operate—and defend—at machine speed

11:25am - 12:10pm  Networking Break

11:35am - 12:00pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

12:10pm - 12:55pm  Breakout Session

Identity-Aware Resilience for Business Continuity

Gowri Rao Krishnamurthy headshot

Gowri Rao Krishnamurthy

Sr. Director, Product Management Platform

Rubrik

As identity compromise becomes the fastest path to operational disruption, CISOs must shift from blocking every attack to limiting its impact. Compromised users, machines, and services now dictate incident severity. Building identity aware resilience requires coordinated action across security, identity, IT operations, and recovery teams to contain incident spread, restore trusted state, and maintain continuity.

In this session to explore how to:

  • Detect and contain identity driven incidents
  • Prioritize accounts, systems, and data for rapid recovery
  • Strengthen cross functional collaboration with continuity metrics

12:10pm - 12:55pm  Executive Boardroom

Rethinking Security for Agentic AI — From Control to Orchestration

As AI agents start acting across business environments, data becomes the true control surface. These agents require broad access to data, identities, and business processes, creating new risk patterns as sensitive data and outbound actions converge at machine speed. This is a control shift. CISOs must modernize their data approach to adopt agentic AI confidently while maintaining oversight.

Join this session to discuss how to:  

  • Detect emerging risk behaviors in autonomous AI
  • Build a data-centric and intent-aware security model
  • Establish the CISO as the orchestrator of scalable AI and business growth enabler

12:10pm - 12:55pm  Executive Boardroom

Securing Tomorrow — Rethinking Data Recovery Strategies

CISOs are challenged by the growing sophistication of cyberattacks and the increasing complexity of IT environments, making traditional recovery approaches insufficient. Ensuring rapid, reliable recovery is now central to organizational resilience and trust, yet many security leaders struggle to integrate recovery into overall security strategy. Exploring new paradigms in cyber recovery can empower CISOs to proactively safeguard business continuity.

Join this session to explore:

  • Integrating recovery into incident response plans
  • Assessing cyber resilience beyond prevention
  • Bridging gaps between security and IT operations

12:55pm - 1:30pm  Lunch Service

1:30pm - 2:05pm  Keynote

Lunch Comments & Keynote

  Session details coming soon.

2:05pm - 2:30pm  Break

2:30pm - 3:15pm  Breakout Session

Securing the Agentic Workforce

As AI agents move from passive tools to active workforce members, CISOs face new governance and security challenges. The risks of rapid, autonomous action are real—but so are the opportunities for transformation. This session offers a practical, forward-looking approach to securely unlocking the value of agents.

Join this session to explore:

  • Reining in shadow agents
  • Protecting agents from malicious context
  • Protecting your business from rogue agents

2:30pm - 3:15pm  Executive Boardroom

Executive Boardroom

  Session details coming soon.

2:30pm - 3:15pm  Executive Boardroom

Getting IAM Under Control — Identity Risk Hidden in Plain Sight

Ash Ahuja headshot

Ash Ahuja

VP, Global Role Lead & Executive Partner, Security & Risk Management

Gartner

Most organizations grow and change faster than their identity systems can keep up. Years of cloud adoption, SaaS sprawl, workforce change, and shifting ownership have left many IAM environments fragmented, over‑privileged, and poorly governed. CISOs are increasingly accountable for identity‑driven risk without clear visibility, consistent controls, or a single owner. Is your IAM posture reducing enterprise risk—or quietly amplifying it?

Join your peers to discuss:

  • How CISOs assess IAM maturity and identify high‑risk gaps
  • How teams restore least privilege and control across employees and third parties
  • Who owns IAM today and how CISOs mobilize resources to rebuild identity control

3:15pm - 4:00pm  Networking Break

3:25pm - 3:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

4:00pm - 4:45pm  Executive Boardroom

From Bottleneck to Boost — The AppSec Glow‑Up

George Lewis headshot

George Lewis

Head of Global Information Security & GRC

Topcon Positioning Systems

Marty Ray headshot

Marty Ray

VP & CISO

Williams-Sonoma

How can CISOs transform application security from a perceived bottleneck into a scalable enabler of modern engineering? Leading organizations are embedding security into design, automating controls across CI/CD, and aligning remediation to real business risk—reducing late-stage vulnerabilities while accelerating delivery and strengthening engineering partnerships.

Join your peers to discuss how:

  • Embedding security into design and CI/CD reduces late-stage vulnerabilities at scale
  • Risk-based prioritization increases developer adoption and accelerates remediation
  • Defining the right metrics improves executive and board-level visibility into application risk

4:00pm - 4:45pm  Executive Boardroom

The New Power Seat — Redefining what CISO Means

Alok Malik headshot

Alok Malik

SVP, Global CIO & CISO

GlobalLogic

Pavi Ramamurthy headshot

Pavi Ramamurthy

Global CIO & CISO

Blackhawk Network

What does it mean for CISOs to occupy a new power seat—one where you are no longer just managing risk, but actively co‑architecting the enterprise’s technology strategy? As security and IT converge, CISOs must assess how they will influence modernization, reshape governance, and redefine responsibility for risk in a rapidly evolving environment.

Join this session to discuss:

  • How dual CISO–CIO responsibilities are reshaping governance models and accelerating security‑aligned modernization
  • Strategies for influencing technology architecture earlier in the lifecycle while maintaining business alignment
  • What “owning risk” now means as security and IT increasingly operate as a unified strategic function

4:45pm - 5:00pm  Networking Break

5:00pm - 5:35pm  Keynote

Rising Digital Risks, Rising Defenses

Aanchal Gupta headshot

Aanchal Gupta

SVP & Chief Security Officer

Adobe

How prepared are you to respond toa surge in digital threats driven by AI, deepfakes, and an ever‑expanding attack surface? As cyberattacks become intertwined, CISOs face mounting pressure to rethink their security program. It's time for organizations to adapt their strategy, strengthen resilience, and proactively defend against anew generation of digital risks.

Join Aanchal Gupta, SVP & CSO at Adobe, to discuss why:

  • AI‑enabled threats require modernized detection and response
  • Heightened cyber threats demand closer executive alignment
  • Expanding attack surfaces make proactive risk reduction essential

5:35pm - 5:45pm  Closing Comments and Prize Drawing

5:45pm - 6:30pm  Governing Body Reception

Governing Body Reception

Finish the day sharing lessons learned with your peers over light fare and drinks at this closing reception hosted by your governing body members.

June 11, 2026

We look forward to seeing you at an upcoming in-person gathering

Gartner cares about the health and safety of our community. If you are feeling unwell, please refrain from attending the conference. At this time, Gartner does not have any health-related requirements in place for attendance. Should this change, we will follow up with updated guidance.

Location

Venue & Accommodation

Grand Hyatt at SFO

A block of rooms has been reserved at the Grand Hyatt at SFO at a reduced conference rate. Reservations should be made online or by calling 650-452-1234 . Please mention San Francisco Executive Summit to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $309 USD (plus tax) is May 18, 2026.

Your Community Sponsors

Global Thought Leaders

CISO Thought Leaders

Key Sponsors

Program Sponsors

Community Program Manager

For inquiries related to this community, please reach out to your dedicated contact.

Chanelle Lawrence

Senior Community Program Manager

971-282-2228

chanelle.lawrence@gartner.com