Don’t miss out

CISOXSan Francisco

04 Dec 2025

Convene, San Francisco, CA, USA

Welcome to CISOXSan Francisco, the premier event exclusively designed for accomplished CISOs across California, USA. Step into the forefront of strategic technology leadership as we navigate the evolving post-pandemic landscape and unlock unparalleled opportunities for enterprise success. Join us at CISOXSan Francisco, where visionary CISOs converge to engage in transformative discussions, gain strategic insights, and address the pressing challenges shaping the world of enterprise technology.

intro

Speakers

Accelerate your network growth

Secure up to twelve exclusive meetings with relevant leads at CISOXSan Francisco, maximising your opportunity to forge valuable connections and drive business growth.

Become a sponsor

Learn from industry titans

Immerse yourself in thought-provoking discussions, as top leaders share their expertise and provide you with invaluable insights to propel your strategic initiatives forward.

Forge meaningful Connections

Engage with industry peers, thought-leaders, and solution providers to foster meaningful connections and explore collaborative opportunities that drive innovation and growth.

Agenda

Discover what awaits you at CISOXSan Francisco.

Registration & Networking Breakfast

Welcome & Opening Remarks From EDS

2025 in Review: What CIOs, CISOs and Tech Leaders Must Carry Into 2026

  • Auston Davis
    CISO City Of San Jose
  • Nish Malik
    CIO, Head of Information Technology San Francisco Bay Region Network
  • Raj Singh
    North America - CISO Sagility Health

As 2025 winds down, CIOs and CISOs find themselves at the intersection of unprecedented technological opportunity and escalating enterprise risk. This year has brought rapid advances in AI, heightened regulatory scrutiny, persistent cyber threats, and unrelenting pressure to demonstrate ROI. At the same time, leaders have had to balance innovation with resilience, talent shortages with transformation, and shareholder expectations with shared risk across the C-Suite. In this opening keynote panel, senior technology executives will reflect on the defining challenges and lessons of 2025, while charting the path forward into 2026. They’ll share how collective intelligence, stronger collaboration, and new leadership models are shaping the enterprise of tomorrow, and offer actionable insights for leading with confidence in a year that promises both turbulence and transformation.

Key Takeaways:
• Practical approaches to balancing innovation, AI adoption, and enterprise resilience.
• Building cross-functional collaboration to manage shared risk and accelerate transformation.
• Redefining IT leadership for an era where clarity, ROI, and trust are non-negotiable.

Modern Identity Management: Balancing Security, User Experience, and Compliance in the Cloud Era

  • Brian Yoon
    SVP Cloud Solutions & Success Ping Identity

Agentic AI—autonomous agents that can plan, reason, and act on behalf of humans—is quickly becoming vital to business operations. As their use and numbers scales, so do the risks. These non-human identities need to be treated as first-class-citizens—meaning that they are verified, authenticated, authorized, and governed with the same rigor as human users. Attempting to manage AI agents without a modern identity foundation can result in over-permissioning, undetected hijacking, and other security blind spots. This session will explore common pitfalls in agentic AI adoption and provide guidance on how organizations can safely and strategically enable AI agents through identity-first security

How Security and Infrastructure is Impacted by AI In the Business

  • David Bridgman
    AVP Information Security National University
  • David Bachechi
    AVP, Infrastructure, Information Technology National University

As AI adoption accelerates, organizations face a new layer of complexity: every AI tool or model integrated into the business represents another piece of software, and one that traditional security and infrastructure teams often aren’t fully prepared to protect. The challenge is clear: AI is powerful, but its novelty creates blind spots in governance, oversight, and resilience. In this session, leaders from National University will share how they are tackling the intersection of AI, infrastructure, and security. Bridgman and Bachechi will highlight the realities of securing AI-driven systems, how to balance innovation with operational stability, and what it takes to align infrastructure and security strategies in this rapidly evolving landscape.

Key highlights:
• The hidden risks of embedding AI into existing infrastructure, and why traditional security playbooks fall short.
• Building cross-team collaboration between infrastructure and security to anticipate and close AI-driven gaps.
• Practical approaches to governing AI use while supporting speed, agility, and innovation.
• Lessons learned and outcomes from National University’s journey toward safe, scalable AI adoption.

Beyond the Checkbox: A Blueprint for Proving Cyber Readiness

  • Jamie Knobles
    Director, Cyber Resilience and Readiness, Immersive

Today’s most dangerous cyber risk is not just a sophisticated adversary—it’s the illusion of security created by our own programs. Check-the-box training satisfies compliance but fails to answer the board’s critical question: Are we truly ready? This gap between perceived readiness and actual capability is a major strategic blind spot, making it difficult to justify investments or prove value.
This session unveils a powerful methodology for transforming readiness from a compliance exercise into a continuous program that proves capability. It provides a blueprint for building a culture of resilience backed by evidence, moving beyond base metrics to deliver strategic value, measurable risk reduction, and a competitive advantage. Leave with a clear framework to eliminate doubt and confidently lead your organization toward true cyber resilience.

• Prove Capabilities, Not Completion: Learn to move beyond participation metrics with realistic exercises that generate hard evidence of your team’s ability to counter real-world threats.
• Improve with Precision: Discover how to use performance data from simulations to identify specific skill gaps and build crucial muscle memory where it’s needed most.
• Benchmark What Matters: Understand how to measure your team’s performance against industry peers and your own historical data to demonstrate meaningful improvement over time.
• Report with Confidence: Master the art of translating readiness data into a compelling, evidence-based narrative that articulates risk reduction to the board and proves the strategic value of your program.

Operationalizing the Attacker’s Perspective: Verifone’s Journey to Continuous Resilience

  • Snehal Antani
    CEO and Co-Founder Horizon3.ai

Most security programs measure effort — not outcomes. Teams patch thousands of vulnerabilities, deploy dozens of tools, and run annual tabletop exercises… but when an attacker shows up, none of that matters.

What matters is whether you can prove your defenses actually work.

In this talk, Snehal Antani, CEO of Horizon3.ai, shares how Verifone evolved from basic pentesting to continuous security validation across 52 global networks. By scaling autonomous pentesting, Verifone’s cybersecurity team now runs safe, automated tests that integrate seamlessly into their daily operations—validating controls, reducing false confidence, and helping regional teams focus on what truly matters.

By seeing their environment through the eyes of an attacker, Verifone learned to:
• Prioritize what’s exploitable. Move beyond scanner noise to identify and fix weaknesses that real attackers could exploit across their global footprint.
• Automate at scale. Build and continuously run over 50 custom testing templates, embedding validation directly into their operations.
• Prove resilience. Use pentest insights to deploy precision tripwires, validate detection pipelines, and continuously strengthen their defenses over time.

Cyber resilience isn’t about being perfect—it’s about getting better with every test. Verifone is proving that the best way to defend is to think like the one trying to break you.

AM BREAK & 1:1 Xchange

ROUNDTABLE XCHANGE: Discussions on Shared Challenges

  • Jason Aloia
    VP, Product Management, EX Portfolio Freshworks
  • Brian Yoon
    SVP Cloud Solutions & Success Ping Identity
  • IT Service Management and the Role of AI: Preparing Your Business The emergence of AI is changing the IT Service Management (ITSM) landscape and is giving us new ways to analyze information and generate content. But, most IT organizations are still in the earliest stages of adoption for using AI agents to transform service delivery and accelerate business value. Join us for an exclusive, interactive roundtable discussion where you'll collaborate with fellow senior IT executives and decision-makers moving from experimentation to production with ITSM AI powered use cases. Jason will share insights, best practices, and strategies to maximize your success in using AI in your ITSM function. Key Takeaways: • Organizations’ overall approaches to ITSM today, and state of AI adoption • Role of virtual AI agents, and how organizations are planning to use them for ITSM service delivery • ROI and benefits delivered to service agents and employees, both planned and actualized • Value realization and business case drivers, including streamlined service delivery and improved user productivity • Risks and challenges around data governance and usage
  • Safely Enabling Agentic AI at Scale Agentic AI—autonomous agents that can plan, reason, and act on behalf of humans—are quickly becoming vital to business operations. As their use and numbers scales, so do the risks. These non-human identities need to be treated as first-class-citizens—meaning that they are verified, authenticated, authorized, and governed with the same rigor as human users. Attempting to manage AI agents without a modern identity foundation can result in over-permissioning, undetected hijacking, and other security blind spots. This roundtable will explore how organizations can safely and strategically enable AI agents through identity-first security. Discussion Questions: 1. Given the anticipated proliferation of AI agents within organizations, how prepared are your current IAM systems and processes to provision, manage the lifecycle, and govern thousands of non-human identities operating autonomously or on behalf of users? 2. How can we ensure that AI agents are granted only the minimum privileges necessary and that sensitive actions require explicit human oversight and approval, validated through secure, out-of-band methods, without creating excessive operational friction? 3. What specific capabilities do we need to implement or enhance within our digital identity infrastructure to detect, monitor, and audit AI agent activity effectively, and how will this help us differentiate between legitimate agent behavior and malicious use or security incidents? 4. Considering that AI agents blur the lines between automation and human-driven interactions, how does prioritizing a robust, agent-aware digital identity strategy become foundational not just for security, but for enabling scalable, compliant, and trustworthy AI adoption across the business?

In this interactive session, our event partners will take the lead in initiating and facilitating conversations centered on challenges and solutions within the industry. Attendees can expect dynamic discussions where diverse perspectives are shared, fostering collaborative problem-solving and the exploration of innovative solutions to common industry hurdles.

The Inverse Conway Maneuver: Architecting Organizations That Build Optimal Systems

  • Shivakumar Gopalakrishnan
    Principal Staff SRE Engineer BD

Technology leaders often face the Conway’s Law dilemma: systems mirror the structure of the teams that build them, leading to fragmented architectures and misalignment with business goals. The solution? Flip Conway’s Law on its head. In this session, Shivakumar Gopalakrishnan reveals a proven methodology for designing organizational structures that naturally produce the technical architectures you need. Drawing from real-world transformations at BD, he will share how intentional org design enables tighter integration, accelerated delivery, and sustainable digital transformation. Attendees will learn how to identify structural barriers, apply the Inverse Conway Maneuver, and build organizations that deliver both technical excellence and business value.

Key Takeaways:
• How to recognize when organizational structures are hindering system performance and agility.
• Practical steps to apply the Inverse Conway Maneuver and realign teams with product and business outcomes.
• The measurable benefits of intentional org design, from faster delivery to scalable, resilient architectures.

Winning the AI Arms Race in Cyber: New Methods of AI-driven Cyber Defense

  • Kevin Kirkwood
    CISO Exabeam

AI is rapidly transforming the cyberthreat landscape, with adversaries — from script kiddies to nation-state actors —leveraging AI to scale and automate attacks.
Security operations leaders must adapt, using AI-driven defense strategies to stay ahead. This session explores how organizations can harness AI to enhance detection, response, and resilience. Learn key techniques for integrating AI into security operations, mitigating emerging risks, and ensuring AI works for you – not against you.

LUNCH & 1:1 Xchange

QUICK TECH TALE: Cybersecurity as a Growth Driver - Moving Beyond Defense to Value Creation

  • Sathish Kuppuswamy
    Cybersecurity Leader, Director of Cybersecurity Architecture Engineering and Operations Pacific Gas and Electric Company

Traditionally viewed as a defensive function, cybersecurity can also serve as a strategic enabler of business growth. In this session, Sathish Kuppuswamy will share insights from his experience leading cybersecurity architecture and operations at Pacific Gas and Electric Company, highlighting how organizations can leverage security initiatives to drive innovation, operational efficiency, and competitive advantage.

Key Takeaways:
• Understanding how cybersecurity investments can unlock business value beyond risk mitigation.
• Strategies for aligning security initiatives with organizational growth objectives.
• Lessons from real-world implementation of security-driven innovation and resilience.
• Practical approaches to measuring and communicating the impact of cybersecurity on business outcomes.

SPOTLIGHT FORUM: Tech Leadership in a World of Regulation - California's AI, Policy & Compliance Laws

  • Christiana State
    Director Cybersecurity Counsel (Technology, AI, Cybersecurity Attorney) Thermo Fisher Scientific
  • Navin Prakash
    Director Cybersecurity, & Compliance - AI, Product Security, GRC Uber
  • Monisha Coelho
    Partner, Business, AI & Privacy Frost Brown Todd

As AI adoption accelerates, tech leaders are navigating an increasingly complex regulatory landscape shaped by privacy laws, cybersecurity mandates, and emerging governance frameworks. California is moving to mirror the EU’s GDPR and AI Act, signaling a new wave of rules that will influence global enterprises. Join us for a conversation that will unpack what these developments mean for IT and security leaders, exploring the intersection of governance, risk, and compliance in an era of political and regulatory uncertainty. Attendees will gain practical insights on how to align innovation with compliance, mitigate risks across jurisdictions, and build resilient strategies that protect both enterprise value and public trust.

Key Takeaways:
• Understand how California’s new AI and privacy laws will impact enterprise compliance.
• Learn how to navigate overlapping global governance frameworks.
• Explore ways to balance innovation with regulation in AI deployment.
• Discover how to turn policy into practical, scalable processes.

QUCIK TECH TALE: Unlocking Resilience: Navigating Risk with AI-Driven Data Protection

  • Emilee Tellez
    Field CTO Veeam

Discover how forward-thinking organizations are transforming risk into readiness by embracing the continuous cycle of understanding, protecting, and unlocking the value of their data. Learn how AI-driven visibility and modern backup strategies not only defend against threats but also turn dormant data into a competitive advantage. Explore how the new era of AI is reshaping our approach to data resilience and opportunity—and see how industry leaders are already making it a reality. Join Emilee Tellez, Field CTO from Veeam Software, for this impactful session.
Key Takeaways:
• How AI is revolutionizing data discovery, classification, and governance
• The importance of intelligent backups for both protection and innovation
• Turning backup data into actionable insights for a strategic edge
• Ways to build a resilient, future-ready data strategy
• Real-world examples of organizations leading the way in AI-driven data protection

QUICK TECH TALE: Fail Safe, Scale Confidently: Feasibility Studies as a Control for Enterprise AI

  • Kyle Johnson
    Director of AI Morgan Lewis & Bockius

Enterprises don’t fear AI – they fear uncontrolled AI. This talk presents a risk-first R\&D method where short, instrumented feasibility studies – run with the knowledge workers who judge value—act as a formal control. Because statistical and generative AI are probabilistic, we operationalize human judgment with expert-defined rubrics, acceptance thresholds, and audit-ready artifacts, all inside governance wrappers (limited blast radius, security guardrails, staged go/no-go gates). The outcome: infeasible ideas are stopped early and safely, while viable ones advance with evidence they can scale at manageable risk.

PM BREAK & 1:1 Xchange, Community Conversations

Community Conversations

  • Herman Brown
    CIO SF District Attorney's Office
  • Sagar Jain
    Director of Digital Strategy & Enablement Roche
  • Navin Prakash
    Director Cybersecurity, & Compliance - AI, Product Security, GRC Uber
  • 1. Thriving Under Pressure: Leading Teams and Supporting Wellbeing in High-Stress Environments - Join this discussion to explore how to keep teams engaged and effective under pressure while prioritizing mental health and wellbeing. This roundtable will focus on strategies for balancing performance with support, fostering a culture of trust, and equipping leaders to guide their teams through demanding periods without burnout.
  • 3. Solving the Skills Gap: Hiring, Retraining, and Strategic Use of MSSPs - This roundtable will explore practical approaches to hiring and retraining talent, optimizing the mix of in-house and external resources, and strategically leveraging Managed Service Providers (MSPs) to maximize efficiency and ROI. Participants will gain actionable insights into bridging the skills gap while ensuring operations remain resilient, agile, and effective.
  • 4. Navigating Third-Party Risk: Building Resilience Through Smarter Partnerships - Explore strategies for assessing, managing, and mitigating third-party risk while fostering strong, productive partnerships. Participants will gain practical insights into building resilience, ensuring compliance, and maximizing the value of external collaborations without compromising operational integrity.s -

Take a break, engage in meetings or join a discussion roundtable! During this PM Power Break, fellow enterprise leaders will guide discussions on their favorite topic, fostering an environment of open exchange, exploration of diverse perspectives and experiences. Attendees can grab a coffee and anticipate engaging conversations through 1-2-1 meetings and roundtables. Conversations will be driven by shared challenges and interests, offering valuable insights and opportunities for collaborative learning and networking.

QUICK TECH TALE: How AI and Data Accelerates Product Development

  • Aman Grover
    Director of Engineering and Machine Learning LinkedIn

In today’s competitive landscape, speed to market is everything — and AI is reshaping how products are designed, built, and scaled. Drawing on his experience at LinkedIn, Aman Grover will share how combining AI with data-driven insights accelerates the product development lifecycle, from ideation to deployment. He’ll explore how machine learning models uncover hidden opportunities, streamline workflows, and deliver more personalized experiences for users, while also addressing the infrastructure and cultural shifts required to make AI adoption successful.

CLOSING PANEL: The Resilient Enterprise - Building a Culture of Awareness and Safety

  • Tony Batalla
    CIO City of Oakland
  • Umesh Jagannatha
    Director IT Security Engineering Gilead Sciences

In an era of escalating cyber threats and rapid technological change, building a truly cyber-resilient enterprise is no longer optional, it’s essential. This closing panel brings together CIOs, CISOs, and industry experts to share how they are creating organizational cultures that embrace both speed and safety. Through real-world examples and strategic insights, the discussion will focus on balancing innovation with robust security practices, fostering cross-functional collaboration, and embedding resilience into the DNA of the enterprise. Attendees will gain a clear understanding of how to lead their organizations through complexity, respond dynamically to emerging threats, and cultivate trust across business units and the boardroom, positioning their companies for long-term success in 2026 and beyond.

Key Takeaways:
• Balancing Agility with Security: Strategies to accelerate innovation without compromising safety or compliance.
• Moving beyond tick-box training to real behavioural change and communicating risk in language the business understands
• Cross-Functional Collaboration: Building bridges between IT, security, risk, and business teams to drive unified resilience.
• Embedding a Resilient Culture: Practical approaches to make cyber resilience a shared responsibility and competitive advantage.

Closing Remarks

Drinks Reception

Apply to Attend

Location

Convene 100 Stockton, O'Farrell Street, San Francisco, CA, USA

Convene 100 Stockton, O'Farrell Street, San Francisco, CA, USA

Past Events

Testimonials

See what attendees, speakers and sponsors say about our events.

FAQs

Who attends?

Attendance is reserved for C-Suite executives and Senior Executives within Cybersecurity, including Chief Information Security Officers, and other senior security decision-makers from a wide array of industries. Joined by our select sponsor partners, enriching networking opportunities and offering cutting-edge solutions.

What does my delegate pass include?

Thanks to our sponsors, your access is entirely complimentary, providing you with full-day access to all presentations, exclusive networking sessions, personalised one-to-one meetings, delectable catering, and an open bar for added networking.

What are the one-on-one meetings?

These 25-minute meetings provide invaluable opportunities to discover new solutions and expand your network with leading innovative providers that can help solve your current or future complex challenges.

What is the dress code?

Professional business attire is appropriate.

Do I need to prepare anything?

No preparation is needed on your part. We take care of all the final details. Simply arrive at the specified time, date, and location, and we’ll handle the rest to ensure you have a seamless and enjoyable experience.

Why attend?

Our events offer unparalleled experiences where interactive sessions spark innovation, keynotes unveil insights from industry luminaries, and exclusive one-on-one meetings with best-in-breed solution providers unfold in some of the world’s most prestigious venues. This unique format ensures that your challenges are addressed directly, providing invaluable insights, connections, and maximising value for your time. With a compact schedule featuring a variety of presentations, you’ll gain a comprehensive view of the latest innovations and have ample opportunity to network with like-minded peers—all under one roof, and in just one day. This fosters collaboration and forges invaluable connections among executives with a genuine influence, setting the standard for elite gatherings in the industry.

Have any more questions?

Get in touch here

Have any more questions?

Get in touch