CISO Dallas Summit | Nov. 2, 2023 | Dallas, TX, USA


Registration & Networking Breakfast

8:30 AM - 9:00 AM

Welcome Address & Orientation for Attendees and Sponsors

8:50 AM - 8:55 AM

Opening Remarks

8:55 AM - 9:05 AM

Panel: CISO Priorities 2024 & Beyond: Nurturing Talent, Sustainability & Protecting The Enterprise

9:05 AM - 9:40 AM

In this thought-provoking discussion, we delve into the crucial concerns of today's technology leaders. Discover how CIOs and CISOs navigate the evolving landscape by prioritizing talent development, fostering a sustainable approach, and fortifying enterprise security. Gain valuable insights into innovative strategies that empower organizations to attract and retain top talent, embrace environmentally conscious practices, and implement robust cybersecurity measures. Join us to stay ahead in the digital age while safeguarding your organization's success.

Key Takeaways:

  • Strategic Talent Development and Retention
  • Embracing Sustainability for Organizational Resilience
  • Robust Cybersecurity as a Priority

James Binford

Director and Business Information Security Officer


Jeff Kirby


Interstate Batteries

Michael Anderson


Dallas Independent School District

Keynote: Put AI to Work in your Business

9:40 AM - 10:05 AM

The current AI landscape presents an opportunity for businesses to achieve a significant breakthrough in productivity and competitiveness amidst a challenging economic environment and talent shortages. Consumers around the world have been awakened to the possibility of AI to augment their abilities and improve work. But AI for business has unique needs: governance, a modern data foundation, and intelligent automation across tools and teams that allows organizations to seize new opportunities for growth. Learn from business leaders how they are taking advantage of this convergence of new technologies, unleashing creativity, and up-leveling skills with AI and automation at scale.

Glenn Dally

Leadership Advisor & Architect

IBM Security

Panel: The Cyber Threat Landscape: Exploring the Unknown & Looking at Security as a Business Enabler

10:05 AM - 10:40 AM

This panel discussion underscores the dynamic nature of the cyber threat landscape, highlighting the importance of constant vigilance and adaptability. By embracing a proactive approach to cybersecurity, organizations can better anticipate emerging threats and effectively safeguard their digital assets.

Key Takeaways:

  • Security as a Strategic Enabler: The panel emphasizes the paradigm shift of viewing security not just as a defensive measure, but as a strategic enabler for business growth. By integrating robust security practices, organizations can inspire trust among stakeholders, facilitate digital transformation, and seize new opportunities with confidence.
  • Interdisciplinary Collaboration: The discussion underscores the significance of collaboration between cybersecurity professionals and business leaders. A cross-functional approach aligns security initiatives with broader business objectives, fostering innovation, and ensuring that cybersecurity becomes an integral part of the organization's overall strategy.

Marty Ray


Fossil Group

Robert Pace


Invitation Homes

Wei Dong



Raghu Gatamaneni


Triumph Finacial

Networking Break & Executive Meetings

10:40 AM - 11:10 AM

Executive Boardroom: Embedding the Attacker's Perspective

11:10 AM - 11:35 AM
Evan Anderson, Chief Offensive Strategist at Randori, an IBM Company, dives into the fast-paced world of offensive security. It’s clear from talking with hundreds of organizations that attackers and defenders often come to dramatically different conclusions around risk - even when looking at the same information. In this session, switch teams for a day as we pull back the curtain behind the system that keeps one of the world’s most advanced attack platforms on target 24/7/365. Through examples, Evan will show how Randori, IBM X-Force, and real attackers are leveraging AI and decades of experience to discover, classify and prioritize millions of targets daily across some of the world’s largest organizations. He’ll break down the 6 “tempting” factors every vulnerability team should be using to prioritize risk.

Evan Anderson

Chief Offensive Strategist


Presentation: Cyber Risk Governance – Achieve Multi-Level Visibility with Business Risk Context

11:40 AM - 12:05 PM

Cyber Risk Governance has been a topic of discussion amongst CISOs, C-Level executives and Board members for more than a decade, yet remains one of the most elusive and sought after outcomes by each of those stakeholders as well as the lines of business in every industry sector. This session will outline and dive into a strategic approach for establishing effective and efficient cyber risk governance and outline the outcomes and value that can be achieved at multiple levels within an organization in a language that is consumable by the stakeholders with business risk context.

Key Takeaways:

  • How to Define Cyber Governance
  • Best Practices and Frameworks for Establishing a Foundation
  • Strategic Approach for Effective, Efficient (people, process, technology) Cyber Risk Management

John Sapp

VP, Information Security & CISO

Texas Mutual Insurance Co.

Innovation Session 1:Assess your OT Risk” is the “Eat your Veggies” of Enterprise Risk Management

12:10 PM - 12:20 PM

OT Risk is on everyone’s radar now but that doesn’t make it easier to quantify or manage. While the increasing scrutiny by various stakeholders including the Government (Guidelines, CPGs, SEC regulations etc.), critical infrastructure organizations have to not only assess the impact due to potential operational disruptions but also have to deal with funding challenges or lack of appropriate insurance coverage. This talk highlights a couple of quick ways to get started on the basics of an OT Risk Management program.

Jeff Blake

Global Head of Sales Engineering

Nozomi Networks

Innovation Session 2: Dimensions of Infrastructure: Balancing Velocity, Risk, and Cost

12:25 PM - 12:35 PM
Join this session to hear how Terraform reduces your time to market while controlling risk and cost.

Dave Randolph

Sr Solutions Engineer


Networking Lunch

12:40 PM - 1:35 PM

Fireside Chat: Cloud-based Threats are Multiplying at an Alarming Rate

1:40 PM - 2:05 PM

As the cloud migration continues, securing data and critical infrastructure is going to require new approaches. Organizations have struggled to maintain control of critical data and ensure real-time threat intelligence, giving cloud-based threats the ability to multiply. Data buckets being misconfigured, or inadequately secured increases the risk of a breach. Being able to manually manage security for large web application infrastructures has become a thing of the past. As such, organizations are being pushed to reevaluate their approach to web application  security.  Key Takeaways: The drumbeat to implement critical infrastructure just keeps getting louder. What are the top 3 CISO tips to avoid certain failure?  Versioning explained..and does it protect your data?

Key Takeaways:

  • Urgency of Enhanced Data Security in Cloud Migration
  • Reevaluation of Web Application Security
  • Critical Focus on Infrastructure and Versioning for Data Protection

James Binford

Director and Business Information Security Officer


Roundtable Topic A: Building Cyber Resilience: Navigating Incident Response in a Digital World

2:00 PM - 2:30 PM

Roundtable Topic B:Navigating the Storm: CISO Strategies for the Emerging Threat Landscape

2:00 PM - 2:30 PM

Fireside Chat: Empowering Cybersecurity: The Significance of Cyber Threat Intelligence

2:30 PM - 2:55 PM

Cyber Threat Intelligence involves collecting, analyzing, and interpreting data to understand and mitigate potential cybersecurity threats. It provides actionable insights into the tactics, techniques, and procedures used by threat actors, enabling organizations to anticipate and respond effectively to cyber threats. By utilizing Cyber Threat Intelligence, organizations can bolster their cybersecurity posture, proactively protect their digital assets, and stay ahead of evolving threat landscapes. 

Key Takeaways:

  • Data-Driven Understanding of Cyber Threats
  • Actionable Insights for Effective Cybersecurity Response
  • Proactive Protection and Adaptability

Jay Wiley

Deputy CISO

M&T Bank

Executive Networking Break

2:55 PM - 3:10 PM

Fireside Chat: Getting More Value and Scale From Technology Investments

3:10 PM - 3:35 PM

Can we change the way we consume technology to reduce risk and improve effectiveness of our investments? Measuring the effectiveness of IT and Cybersecurity investments continues to challenge all organizations. By adjusting how we consume, we have an opportunity to improve our time to value for technology investments and increase confidence for maintaining rigorous effectiveness of technology portfolios.

Key Takeaways:

  • Consider a capabilities-based consumption approach to reduce IT and Cybersecurity organizational silos
  • Document expected capabilities and consumption measures of effectiveness in purchase orders
  • Use measures of effectiveness for confidence in operational risk management

Tim Treat

Head of Information and Technology Risk Management,

Texas Capital Bancshares

Roundtable Topic A: Securing the Digital Realm: Application Security, Risk, & Vulnerability Managmnt

3:40 PM - 4:05 PM

This session will delve into the critical components of securing digital applications and managing associated risks and vulnerabilities. This discussion emphasizes the need to proactively identify, assess, and mitigate security risks within applications to protect against potential cyber threats. By implementing robust vulnerability management processes and integrating security measures into the development lifecycle, organizations can fortify their applications, ensuring a more resilient and secure digital landscape.

Key Takeaways:

  • Proactive Approach to Application Security
  • Comprehensive Vulnerability Management
  • Integration of Security Measures in Development Lifecycle

Stuart Rodgers

Head of Application Security and Assurance

BMO Harris Bank

Roundtable Topic B: Zero Trust and Adaptive Access

3:40 PM - 4:05 PM

In this discussion, we will talk about our journey from traditional enterprise remote access model, journey towards Zero Trust and lessons learned with real-world use-cases and challenges. We will dive deeper into the definition of Zero Trust, Adaptive Access models and talk about its impact on end-users. We will frame this conversation through the lens of risk to an enterprise and balancing with the need for agility and user experience.

Session Takeways:

  • Transitioning to Zero Trust from Traditional Remote Access Models
  • Understanding Zero Trust and Adaptive Access Models
  • Balancing Security, Agility, and User Experience

Ahmed Siddiqui

Director of Platform Security


Closing Panel Discussion: DEI in CISO Offices

4:10 PM - 4:40 PM

Promoting diversity, equity, and inclusion (DEI) within the Chief Information Officer (CIO) and Chief Information Security Officer (CISO) offices is paramount for organizational success. Embracing diverse perspectives at leadership levels enhances decision-making, fosters innovation, and allows for a more holistic approach to technology and security strategies. 

This fireside chat will explore:

  • Holistic Approach to Cybersecurity: Integrating DEI principles into the CIO and CISO offices helps to address the evolving cybersecurity landscape comprehensively. Diverse teams are better equipped to identify and mitigate a wider range of risks, safeguarding sensitive data and systems more effectively.
  • Talent Attraction and Retention: Prioritizing DEI initiatives within these offices can attract and retain top talent. Organizations that champion inclusivity create an environment where individuals from various backgrounds feel valued, leading to increased employee satisfaction, better performance, and a stronger reputation within the industry.

Pratibha Aphale


Goldman Sachs

Robert Pace


Invitation Homes

Ahmed Siddiqui

Director of Platform Security


Closing Remarks

4:40 PM - 4:45 PM

Summit Happy Hour

4:45 PM - 6:00 PM