June 9, 2026

* JOIN US FOR THE PRE-EVENT HAPPY HOUR on JUNE 8 2026 FROM 6:00 PM – 7:00 PM

7:00 am – 8:00 am PST

Delegate Registration and Networking Breakfast

8:00 am – 8:10 am PST

Chair's Welcome and Opening Remarks

CyberSecurity

Artificial Intelligence & Machine Learning

Digital Transformation & Data Management

8:10 am – 8:40 am PST

Opening Keynote

Securing the Enterprise 2026: From Reactive Defense to Cyber Resilience

  • Shift from castle-and-moat defense to “assume-breach” + zero-trust verification
  • Embed security by design into DevOps, data pipelines, and multi-cloud workloads
  • Align cyber-resilience metrics with board-level risk tolerance and business KPIs
8:40 am – 9:10 am PST

Plenary

Douglas Kulka

EVP, Global Chief Information Officer, Chief Technology Officer
Tyson Foods

Feeding Innovation: Scaling AI Across Tyson Foods’ Global Value Chain

  • Leverage a “demo-day to deployment” pipeline to onboard startup AI solutions—computer vision, predictive demand, and generative product-design tools—into 100 + production sites in under 12 months.
  • Use real-time customer and consumption data to co-create products, personalize engagement, and boost brand loyalty while reducing excess inventory and waste.
  • Integrate edge AI for food-safety monitoring, yield optimization, and energy management, delivering double-digit improvements in throughput and sustainability metrics.
  • Stand up enterprise governance that balances rapid experimentation with rigorous data-ethics, security, and compliance requirements across global operations.
9:10 am – 9:40 am PST

Plenary

Travis Garriss

Chief Information and Digital Officer
Northrop Grumman

Narrow Models to Agentic AI: Charting Northrop Grumman’s Maturity Curve

  • Map the evolution from single-purpose algorithms to autonomous, goal-seeking agents across design, test, and sustainment.
  • Establish milestone gates—security, transparency, certification—before advancing to each maturity tier.
  • Pair domain experts with AI copilots to accelerate requirements capture, simulation, and anomaly resolution.
  • Measure ROI with “mission-hours saved” and identify the inflection point where agentic systems deliver exponential value.
9:45 am – 11:25 am PST

Refreshments, Networking, and Pre-Arranged 1-2-1 Meetings

11:30 am – 12:00 pm PST

Stream Sessions

cybersecurity

Lee Parrish

CISO
Newell Brands

Making Cyber Risk a Business Metric the Board Understands

  • Translate technical threats into financial exposure that resonates with the board and audit committees
  • Build an annual cybersecurity plan that links each dollar to specific risk reduction outcomes
  • Prioritize controls with a heat‑map that shows likelihood, impact, and insurance offsets
  • Present breach‑likelihood curves rather than red‑amber‑green dashboards to sharpen budget debate

Artificial Intelligence & Machine Learning

Kian Beyzavi, PhD

VP, AI Strategy Operations and Molecular Design
Danaher Corporation

Generative Biology at Scale: Re-Engineering Discovery Pipelines with Foundation Models

  • Building multimodal data fabrics that fuse omics, imaging, and real-world evidence for generative AI training
  • Deploying foundation models to accelerate target identification, lead optimization, and in-silico protein design
  • Governing large-language/large-molecule models: bias monitoring, IP protection, and regulatory readiness
  • Integrating wet-lab automation and digital twins to create self-optimizing discovery loops
  • Measuring ROI: cycle-time compression, hit-rate uplift, and portfolio-wide cost efficiency

Digital Transformation & Data Management

Carol Dann

VP, Information Technology
National Hockey League

Transforming the Game: Digital Innovation for a Safer, Smarter NHL

  • Implementing secure, efficient team selection software for the draft, ensuring that data integrity, privacy, and fairness are maintained through advanced cybersecurity protocols.
  • Launching NHL Watch communications, with real-time updates and safety features via Apple Watches worn by referees, ensuring instant notifications when periods are ending, reducing human error, and enhancing in-game decision-making.
  • How the NHL is combining cybersecurity with digital innovation to safeguard player, team, and game data while enhancing operational efficiency and game-day experiences.
12:05 pm – 12:35 pm PST

Workshops

Room 1

Ransomware Table-Top: 30-Minute Cyber Crisis Simulation

  • Walk through a live breach scenario: attackers encrypt ERP, demand crypto.
  • Assign roles—CISO, legal, PR—and practice real-time decision making under the clock.
  • Leave with a tabletop checklist and post-incident communication plan.

Room 2

Building AI-Native Platforms on Cloud-First Architectures

  • Compare reference stacks for Gen-AI model hosting, GPU scheduling, and cost controls.
  • Design data-centric security—tokenization, vaults, and access tiers—to keep training sets safe.
  • Show how FinOps dashboards flag runaway compute before the monthly bill arrives.

Room 3

KPI-Driven Program Management for Large-Scale Digital Initiatives

  • Translate big-picture transformation goals into measurable OKRs and sprint metrics.
  • Blend agile squads with a classic PMO to maintain executive visibility.
  • Use real-time dashboards to celebrate wins and course-correct lagging workstreams.
12:40 pm – 1:40 pm PST

Lunch & Learn Roundtable Discussions

Benefit from additional learning by joining a moderated roundtable discussion on pressing issues in the industry. Registration is required, and attendance for moderated roundtables on Day 1 is limited to attendees and speakers. Choose from:

Securing the API Economy: From Discovery to Runtime Shielding

Talent Upskilling for Gen-AI & Cyber: Bootcamps, Badges, and Beyond

Cloud FinOps Masterclass: Turning Cost Data into Actionable Insights

Global Data-Privacy Roadmaps: Navigating GDPR, CPRA, and Beyond

Vendor-Risk Scoring 2.0: Continuous Monitoring for Supply-Chain Trust

AI Ethics & Responsible Innovation: Policy, Practice, and Culture

1:45 pm – 2:15 pm PST

Stream Sessions

Cybersecurity

Alexis Senaud

Regional Chief Information Officer EMEA
Groupe Clarins

Sovereign‑by‑Design: Leveraging U.S. Cloud Providers While Safeguarding EU Data

  • Evaluate Schrems II fallout and the EU‑U.S. Data Privacy Framework when choosing AWS, Azure, or GCP regions
  • Build a “hybrid sovereignty” architecture—localize PII and sensitive IP while leveraging transatlantic scale
  • Use encryption, pseudonymization, and key management to keep regulators and auditors satisfied
  • Negotiate contracts and SLAs that embed data‑residency and lawful‑access guarantees up front

Artificial Intelligence & Machine Learning

Nishit Sahay

Chief Information Officer
Marvell Technology

AI-Secured Data Fabrics: Unifying Silicon, Systems, and Supply-Chain Intelligence

  • Building a zero-ETL, real-time data mesh that spans foundry telemetry, board-level tests, and field-return analytics
  • Applying graph AI and anomaly detection to pre-empt yield dips, component shortages, and firmware threats
  • Integrating confidential computing and homomorphic encryption to safeguard multi-party design collaboration
  • Automating compliance with NIST 800-171, SBOM mandates, and emerging chip-export regulations
  • Translating insights into action: predictive RMA, dynamic inventory allocation, and customer-centric product road-mapping

Digital Transformation & Data Management

Charles Harris, Jr.

VP, Technology
Tampa Bay Buccaneers

Building High-Performance Tech Teams That Stay Aligned on Purpose

  • Proven hiring playbook: A clear “culture-fit” criteria that produce cohesive teams rather than lone experts.
  • Keeping every project tied to purpose: a “Why-Statement” required before funding any new platform or tool.
  • Shared operating cadence—common OKRs, open backlog reviews, and outcome-based metrics—that keeps business and technology moving in step.
  • Structured career paths, micro-mentoring, and rotation programs that reduce attrition and create a resilient internal talent pipeline.
2:20 pm – 2:50 pm PST

Workshops

Room 1

Responsible AI: Governing Models Before Regulators Force Your Hand

  • Rank every AI system by business impact and risk.
  • Keep detailed audit trails of data, training, and testing for future proof.
  • Form an internal AI ethics council that includes legal, security, and product teams.

Room 2

Cloud Security 2.0: Protecting Data Across Every Cloud and App

  • Combine cloud-security tools into one clear health score.
  • Embed security checks directly into development pipelines so mistakes are caught early.
  • Discover and lock down “shadow” cloud apps you never knew you had.

Room 3

Cloud Security 2.0: Protecting Data Across Every Cloud and App

  • Combine cloud-security tools into one clear health score.
  • Embed security checks directly into development pipelines so mistakes are caught early.
  • Discover and lock down “shadow” cloud apps you never knew you had.
2:55 pm – 4:15 pm PST

HAPPY HOUR, NETWORKING, AND PRE-ARRANGED 1-2-1 MEETINGS

4:20 pm – 4:50 pm PST

Stream Sessions

Cybersecurity

Manfred Boudreaux-Dehmer

Chief Information Officer
NATO

Securing the Future: Cyber Defense in a Rapidly Evolving Geopolitical Landscape

  • Strengthening NATO’s cybersecurity posture in the face of rising cyber threats from state and non-state actors
  • Integrating advanced technologies such as AI and machine learning to enhance cyber defense capabilities
  • Building a unified cyber defense strategy across multinational entities to ensure resilience and interoperability
  • Navigating legal, political, and operational challenges when responding to cyberattacks on critical infrastructure

Artificial Intelligence & Machine Learning

Lewis Choi

SVP, Chief Information Officer
Neurocrine Biosciences

Ending the “Democratization” of AI: Driving Secure, High-Impact AI Initiatives Across the Enterprise

  • Shifting from broad AI access to targeted, high-value initiatives that deliver measurable impact.
  • Designing 1–2 multi-year AI programs that start at the top but scale organization-wide.
  • Enabling AI adoption safely and securely while building literacy across teams.
  • Balancing organizational empowerment with governance, risk management, and ethical considerations.
  • Demonstrating value from AI initiatives today while preparing for sustained transformation.

Digital Transformation & Data Management

Driving Digital Transformation: How CIOs Are Leading the Charge in the Age of Connectivity and Automation

  • Aligning technology investments with business goals to drive long-term value and efficiency.
  • How data management, analytics, and AI are shaping business decisions and operational strategies.
  • Fostering a culture of innovation through collaboration across departments and with external partners.
  • Addressing security challenges in an increasingly interconnected world while ensuring data privacy and integrity
4:55 pm – 5:25 pm PST

Plenary

  • Janet George

    EVP, Chief AI Digital Officer
    Mastercard

Crafting Long-Term AI Strategies for Sustainable Growth and Innovation

  • Developing AI strategies that align with immediate goals and long-term business innovation
  • Implementing scalable AI frameworks to ensure adaptability and sustainable growth
  • Balancing short-term AI wins with long-term innovation and competitive advantage
  • Investing in AI infrastructure that supports evolving business needs and future scalability
  • Leading AI transformations with a focus on long-term impact, efficiency, and innovation
5:25 pm – 6:10 pm PST

Panel discussion

  • Sameer Patwardhan

    SVP, Technology
    Forbes

Scaling ‘Responsible AI’ from Pilot to Profit: Strategy,Security & ROI

  • How do you choose the 10% of AI use-cases worth funding through to deployment—and kill the rest early?
  • Frameworks that embed security, privacy, and ethics into data pipelines and model life-cycles without slowing delivery.
  • Strategies for protecting proprietary data, source code, and model weights from prompt injection or supply-chain attacks.
  • Upskilling programs and cross-functional “AI councils” that align data scientists, engineers, security, and legal teams.
6:10 pm – 6:20 pm PST

Chair's closing remarks

CyberSecurity

Artificial Intelligence & Machine Learning

Digital Transformation & Data Management

6:25 pm – 7:25 pm PST

Networking drinks reception

Unlock Exclusive Summit Details

Exclusive summit content is reserved for qualified participants—request access today or enter your password.

Dont have a password?

If you do not have a password, click below to submit a request for access.

Request Access