In-Person

Southern California CISO Community

Executive Summit

June 24, 2026 | The Waterfront Beach Resort

June 24, 2026
The Waterfront Beach Resort

Collaborate with your peers

Get together with Southern California's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Strengthening cybersecurity's position as a creator and driver of business value

Fortifying cyber resilience to ensure rapid recovery from attacks and safeguard business continuity

Streamlining access management and controls across both traditional and non-human identities

Southern California CISO Governing Body

The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.

Governing Body Co-Chairs

Matt Crouse

Solar Turbines
CISO

Trina Ford

iHeartMedia
SVP, CISO

Nemi George

Pacific Dental Services
VP, Information Security Officer

Arthur Lessard

Universal Music Group
SVP & CISO

Diana Lovati

AEG
CISO

David Tyburski

Wynn Resorts
VP, CISO

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Southern California CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda

June 24, 2026

8:00am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

What Makes an Effective CISO?

Jeremy Smith headshot

Jeremy Smith

VP, CISO

Avery Dennison

Ash Ahuja headshot

Ash Ahuja

VP, Global Role Lead & Executive Partner, Security & Risk Management

Gartner

A CISO is always busy and always alert but being busy and alert doesn’t equate to truly being effective. A cybersecurity leader must blend technical expertise, strategic vision, and strong communication skills to protect and propel an organization forward.

 Join this keynote to explore measurable practices and a clear roadmap to improving your impact by:

  • Benchmarking your effectiveness not just as a cybersecurity leader, but a strategic business partner
  • Embedding cyber resilience into innovation and future-proofing your organization
  • Communicating a strategic vision that fuels growth and stakeholder confidence

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Rethinking Security for Agentic AI — From Control to Orchestration

Eddie Borrero headshot

Eddie Borrero

Executive Advisor, AI & Data Strategy

Cyera

As AI agents start acting across business environments, data becomes the true control surface. These agents require broad access to data, identities, and business processes, creating new risk patterns as sensitive data and outbound actions converge at machine speed. This is a control shift. CISOs must modernize their data approach to adopt agentic AI confidently while maintaining oversight.

Join this session to explore how to:

  • Detect emerging risk behaviors in autonomous AI
  • Build a data-centric and intent-aware security model
  • Establish the CISO as the orchestrator of scalable AI and business growth enabler

9:40am - 10:25am  Breakout Session

Stop Hurting Yourself — Third-Party Risk in the Real World

Michael Brewer headshot

Michael Brewer

CISO

Neurocrine Biosciences

Legacy third-party risk programs lean on exhaustive questionnaires that slow the business, obscure real risk, and collapse under the weight of emerging Generative AI governance demands. This talk walks through a scrappy, pragmatic approach to third-party risk and AI oversight that works with business partners instead of against them, enabling security and compliance without a formal TPRM program. It is imperfect by design, but it is readable, actionable, and aligned to how the business actually operates.

Expect key takeaways from this session to include:

  • How third-party risk, Generative AI governance, and GRC can be woven together without heavyweight processes
  • What a “good enough” TPRM model looks like when speed, clarity, and business enablement matter
  • Practical techniques for partnering with the business to stay security- and compliance-aligned without becoming the department of no

9:40am - 10:25am  Executive Boardroom

Unifying Data Visibility — The AI Advantage for CISOs

Emilee Tellez headshot

Emilee Tellez

Field CTO

Veeam

CISOs are challenged by fragmented data landscapes, shadow IT, and the need for real-time visibility into sensitive information across different data estates including SaaS, cloud, and modern virtualization platforms. Manual discovery and governance processes can’t keep pace with today’s data sprawl, increasing risk and compliance exposure. Leveraging AI-driven data intelligence empowers CISOs to unify visibility, automate governance, and strengthen security posture.

Join this session to explore:

  • Automating sensitive data discovery across environments
  • Enabling continuous governance with AI insights
  • Reducing risk through unified data intelligence

9:40am - 10:25am  Executive Boardroom

AI Security – Turning Agents into Security Allies

Saira Mohammed headshot

Saira Mohammed

Chief Security Advisor

Microsoft Corporation

 The dual nature of AI is here - extraordinary innovation paired with complex risks. According to recent reports, more than 29% of employees have turned to unsanctioned AI agents for work tasks and these unsecured agents lack clear visibility into what they can do, what they access, or the blast radius they introduce. CISOs must secure AI agents with the same rigor as human users, ensuring visibility, governance, and robust controls amid rapid change and resource constraints.

Join this boardroom to discuss:

  • Enforcing Zero Trust principles for both human and AI identities
  • Establishing continuous observability and monitoring of AI agent activity
  • Implementing governance frameworks to manage access, actions, and compliance

10:25am - 11:10am  Networking Break

10:35am - 11:00am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:10am - 11:55am  Breakout Session

Identity-Aware Resilience — Control, Recovery and Trust

Identity is the fastest path to disruption as attackers misuse valid access, expanding impact before traditional controls catch up. Prevention won't hold on its own. Organizations must contain the impact of compromise, limit the blast radius, and recover to a clean, trusted state across identities, data, and critical systems.

Join this session to explore how to:

  • Protect the identities that matter most to reduce business impact
  • Contain identity-driven incidents quickly before they spread across systems
  • Recover to a trusted state without reintroducing risk

11:10am - 11:55am  Breakout Session

Breakout Session

Ramy Houssaini headshot

Ramy Houssaini

Chief Cyber Solutions Officer

Cloudflare

Details coming soon.

11:10am - 11:55am  Executive Boardroom

Agentic SOC — Amplifying Human Potential with AI

Vinod D'Souza headshot

Vinod D'Souza

Office of the CISO, Head of Manufacturing and Industry

Google

Shoaib Qazi headshot

Shoaib Qazi

Chief Information Security & Technology Officer

XPO Logistics

Security Operations Centers face mounting pressure from talent shortages and escalating threats, but agentic AI offers a transformative solution by amplifying human capabilities and automating critical tasks. By embedding intelligent agents into SOC workflows, organizations can rapidly upskill teams, accelerate response, and bridge the talent gap. Join this session to explore actionable strategies for leveraging AI-driven agents to future-proof your SOC.

Join this boardroom to explore:

  • How agentic AI fills the talent gap in SOCs
  • Strategies for upskilling teams alongside agent-driven automation
  • Preparing your SOC for the coming AI transformation

11:10am - 11:55am  Executive Boardroom

Securing the Rise of AI Identities

According to the International Data Corporation, the number of AI identities is expected to reach 1.3 billion in just two years. Yet many organizations don’t secure AI identities effectively, granting excessive access and relying on outdated, slow processes.

Join this session to learn how to:

  • Identify gaps in agent access visibility, ownership, and governance
  • Address the unique challenges of identity security in AI environments
  • Build scalable identity foundations to enable innovation and efficiency

11:55am - 12:30pm  Lunch Service

12:30pm - 1:05pm  Keynote

Zero Trust & AI — Move from Reactive Response to Continuous AI Assurance

Jay Chaudhry headshot

Jay Chaudhry

CEO, Chairman & Founder

Zscaler

AI adoption is advancing faster than traditional security and governance models can absorb. Unmanaged AI usage, opaque model behavior, and emerging attack techniques—such as prompt injection and jailbreaks—can rapidly translate into data exposure, compliance concerns, and board-level scrutiny. Security leaders need an approach that enables AI while reducing operational volatility and producing governance that is defensible to risk stakeholders. A Zero Trust foundation across internet access, AI applications, SaaS, and private applications supports automated AI Red Teaming and secure access plus runtime guardrails to enforce policy in production.

Join this session to discuss:

  • Implementing continuous AI Red Teaming to identify vulnerabilities and misuse paths across build, deploy, and runtime
  • Operationalizing findings through policy-driven guardrails that help prevent data leakage, prompt injection, and unsafe content outcomes
  • Delivering board-consumable governance with clear visibility into AI usage, risk posture, and remediation progress

1:05pm - 1:30pm  Networking Break

1:30pm - 2:15pm  Breakout Session

From CISO to True Business Leader

In today’s dynamic world, CISOs must elevate beyond tactical experts to strategic business partners who influence true change. The time has come to redefine security leadership into business leadership by championing a responsible culture of innovation and driving organizational growth.

Join this session to hear about:

  • Reducing risk especially around AI by developing relationships within the organization
  • Navigating complex regulations and pushing for governance on all levels of security
  • Improving resiliency to maintain the company’s brand and customer’s trust

1:30pm - 2:15pm  Executive Boardroom

It's Time to Add Personal Cyber Risk to the CISO Job Description

Brian Hill headshot

Brian Hill

Field CISO, Client Advisory

BlackCloak

As threat actors target executives’ personal lives, CISOs must expand their leadership to include personal cyber risk, bridging identity management and board-level communication. This evolution is critical to influencing culture and driving comprehensive protection strategies.

Join this session to discuss:

  • Optimizing identity and access management for executives
  • Communicating personal risk and value to boards
  • Expanding CISO influence beyond traditional boundaries

1:30pm - 2:15pm  Executive Boardroom

Proving ROI — AI Risk Reduction Strategies

Patricia Titus headshot

Patricia Titus

Field CISO

Abnormal AI

TJ Lingenfelter headshot

TJ Lingenfelter

Head of Information Security & Compliance

TaylorMade Golf

CISOs have moved beyond AI experimentation. Now, executives ask: Are 2025’s investments actually reducing risk? The challenge is how to operationalize AI against evolving threats — and prove its value.

Join this session to discuss:

  • Strategies for reducing high-risk incidents and fraud
  • Embedding AI into core security operations to reduce risk
  • Demonstrating risk reduction with actionable metrics

1:30pm - 2:15pm  Executive Boardroom

CISOs as Business Accelerators for AI Innovation

Every enterprise is racing to adopt AI— from code assistants to fully autonomous agents. But velocity without governance creates blind spots that traditional AppSec wasn't built to catch. How are CISOs evolving their security programs to enable AI-driven innovation and development while maintaining control?

Join this session to discuss:

  • The biggest security blind spots that emerging with AI agents
  • Frameworks that are working to turn AI governance from a blocker into a business accelerator
  • Ways to match the speed of AI-driven development (i.e. tooling, culture, operating models)

2:15pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

CISOs, It's Time to Make Yourselves Redundant

Adrian Giboi headshot

Adrian Giboi

CISO & VP, Infrastructure, Ops and Security

Solenis

The CISOs who will thrive in the next era aren't the ones who accumulate more authority and larger teams. They're the ones who measure success by how little the organization depends on them for day-to-day security decisions. Is it time to rethink — or even sunset — the CISO role as we know it? Let's debate.

Join this session to be challenged and to discuss:

  • Why most CISOs are the biggest bottleneck in their own organization — and how to fix it
  • How security can become a revenue enabler, not just a cost center
  • What the CISO role evolves into when you succeed in distributing security ownership across the org

3:00pm - 3:45pm  Breakout Session

Adapting Security Governance for Business Alignment

Paul Miller headshot

Paul Miller

CISO, VP of IT

Public Storage

Strong security governance lets CISOs align cyber-risk decisions with business goals. In this interactive session, you’ll explore adaptive governance frameworks and cross-organizational communication techniques to tackle shifting regulations, rapid AI adoption, and clear accountability.

Join this interactive session to:

  • Collaborate with peers about scaling your AI and data governance strategies
  • Walk through real scenarios that CISOs face today
  • Discuss how to build better trust across the business from your legal team to the board

3:00pm - 3:45pm  Executive Boardroom

Defending Against Next-Generation Ransomware

Ransomware has transformed from simple digital extortion into a sophisticated, AI-powered threat that’s faster, smarter, and more destructive. CISOs must move beyond prevention, focusing on preparedness and rapid recovery in today’s evolving landscape.

In this session, join your peers to discuss:

  • How threat actors are weaponizing AI to supercharge their operations
  • How AI-driven ransomware is targeting supply chain vulnerabilities to cause cascading disruptions
  • Practical strategies for fighting back while building true organizational resilience

3:00pm - 3:45pm  Executive Boardroom

Executive Boardroom

Details coming soon.

3:45pm - 4:00pm  Networking Break

4:00pm - 4:35pm  Keynote

Closing Keynote

Details coming soon.

4:35pm - 4:45pm  Closing Comments and Prize Drawing

4:45pm - 6:00pm  Governing Body Reception

Governing Body Reception

Finish the day sharing lessons learned with your peers over light fare and drinks at this closing reception hosted by your governing body members.

June 24, 2026

We look forward to seeing you at an upcoming in-person gathering

Gartner cares about the health and safety of our community. If you are feeling unwell, please refrain from attending the conference. At this time, Gartner does not have any health-related requirements in place for attendance. Should this change, we will follow up with updated guidance.

Location

Venue & Accommodation

The Waterfront Beach Resort
More Information

A block of rooms has been reserved at the The Waterfront Beach Resort at a reduced conference rate. Reservations should be made online or by calling 714-845-8000. Please mention SCES26 to ensure the appropriate room rate.

Deadline to book using the discounted room rate of $429 USD (plus tax) is June 1, 2026.

Your Community Sponsors

Global Thought Leaders

CISO Thought Leaders

Key Sponsors

Program Sponsors

Community Program Manager

For inquiries related to this community, please reach out to your dedicated contact.

Zack Hellmann

Senior Community Program Manager

971-717-6691

zack.hellmann@gartner.com