June 9, 2026

* JOIN US FOR THE PRE-EVENT HAPPY HOUR on JUNE 8 2026 FROM 6:00 PM – 7:00 PM

7:00 am – 8:00 am PST

Delegate Registration and Networking Breakfast

8:00 am – 8:10 am PST

Chair's Welcome and Opening Remarks

CyberSecurity

Artificial Intelligence & Machine Learning

Digital Transformation & Data Management

8:10 am – 8:40 am PST

Opening Keynote

Securing the Enterprise 2026: From Reactive Defense to Cyber Resilience

  • Shift from castle-and-moat defense to “assume-breach” + zero-trust verification
  • Embed security by design into DevOps, data pipelines, and multi-cloud workloads
  • Align cyber-resilience metrics with board-level risk tolerance and business KPIs
8:40 am – 9:10 am PST

Plenary

Douglas Kulka

EVP, Global Chief Information Officer, Chief Technology Officer
Tyson Foods

Feeding Innovation: Scaling AI Across Tyson Foods’ Global Value Chain

  • Leverage a “demo-day to deployment” pipeline to onboard startup AI solutions—computer vision, predictive demand, and generative product-design tools—into 100 + production sites in under 12 months.
  • Use real-time customer and consumption data to co-create products, personalize engagement, and boost brand loyalty while reducing excess inventory and waste.
  • Integrate edge AI for food-safety monitoring, yield optimization, and energy management, delivering double-digit improvements in throughput and sustainability metrics.
  • Stand up enterprise governance that balances rapid experimentation with rigorous data-ethics, security, and compliance requirements across global operations.
9:10 am – 9:40 am PST

Plenary

Cloud, Data, and the Modern Zero-Trust Fabric

  • Build an identity-centric fabric that segments traffic by user, device posture, and workload sensitivity—across on-prem, multi-cloud, and SaaS.
  • Integrate continuous posture checks (MFA, patch level, device health) so policy decisions adapt in real time to changing risk signals.
  • Demonstrate ROI in terms of faster M&A integration, reduced lateral-movement attacks, and lower cloud compliance costs.
9:45 am – 11:25 am PST

Refreshments, Networking, and Pre-Arranged 1-2-1 Meetings

11:30 am – 12:00 pm PST

Stream Sessions

cybersecurity

Lee Parrish

CISO
Newell Brands

Making Cyber Risk a Business Metric the Board Understands

  • Translate technical threats into financial exposure that resonates with the board and audit committees
  • Build an annual cybersecurity plan that links each dollar to specific risk reduction outcomes
  • Prioritize controls with a heat‑map that shows likelihood, impact, and insurance offsets
  • Present breach‑likelihood curves rather than red‑amber‑green dashboards to sharpen budget debate

Artificial Intelligence & Machine Learning

Kian Beyzavi, PhD

VP, AI Strategy Operations and Molecular Design
Danaher Corporation

Generative Biology at Scale: Re-Engineering Discovery Pipelines with Foundation Models

  • Building multimodal data fabrics that fuse omics, imaging, and real-world evidence for generative AI training
  • Deploying foundation models to accelerate target identification, lead optimization, and in-silico protein design
  • Governing large-language/large-molecule models: bias monitoring, IP protection, and regulatory readiness
  • Integrating wet-lab automation and digital twins to create self-optimizing discovery loops
  • Measuring ROI: cycle-time compression, hit-rate uplift, and portfolio-wide cost efficiency

Digital Transformation & Data Management

Jeff Roseman

Global VP, Information Technology
Marmon Foodservice Technology

Driving Business Success with IT Strategy & Digital Transformation

  • Build a clear IT roadmap that supports this year’s business goals and KPIs
  • Use cloud and strong cybersecurity to keep operations reliable and secure
  • Connect and simplify enterprise systems across regions—especially after M&A activity
  • Roll out ERP and data tools to speed decisions and improve day‑to‑day efficiency
  • Lead the change: align teams, communicate priorities, and measure progress visibly
12:05 pm – 12:35 pm PST

Workshops

Room 1

Ransomware Table-Top: 30-Minute Cyber Crisis Simulation

  • Walk through a live breach scenario: attackers encrypt ERP, demand crypto.
  • Assign roles—CISO, legal, PR—and practice real-time decision making under the clock.
  • Leave with a tabletop checklist and post-incident communication plan.

Room 2

Building AI-Native Platforms on Cloud-First Architectures

  • Compare reference stacks for Gen-AI model hosting, GPU scheduling, and cost controls.
  • Design data-centric security—tokenization, vaults, and access tiers—to keep training sets safe.
  • Show how FinOps dashboards flag runaway compute before the monthly bill arrives.

Room 3

KPI-Driven Program Management for Large-Scale Digital Initiatives

  • Translate big-picture transformation goals into measurable OKRs and sprint metrics.
  • Blend agile squads with a classic PMO to maintain executive visibility.
  • Use real-time dashboards to celebrate wins and course-correct lagging workstreams.
12:40 pm – 1:40 pm PST

Lunch & Learn Roundtable Discussions

Benefit from additional learning by joining a moderated roundtable discussion on pressing issues in the industry. Registration is required, and attendance for moderated roundtables on Day 1 is limited to attendees and speakers. Choose from:

Securing the API Economy: From Discovery to Runtime Shielding

Talent Upskilling for Gen-AI & Cyber: Bootcamps, Badges, and Beyond

Cloud FinOps Masterclass: Turning Cost Data into Actionable Insights

Global Data-Privacy Roadmaps: Navigating GDPR, CPRA, and Beyond

Vendor-Risk Scoring 2.0: Continuous Monitoring for Supply-Chain Trust

AI Ethics & Responsible Innovation: Policy, Practice, and Culture

1:45 pm – 2:15 pm PST

Stream Sessions

Cybersecurity

Alexis Senaud

Regional Chief Information Officer EMEA
Groupe Clarins

Sovereign‑by‑Design: Leveraging U.S. Cloud Providers While Safeguarding EU Data

  • Evaluate Schrems II fallout and the EU‑U.S. Data Privacy Framework when choosing AWS, Azure, or GCP regions
  • Build a “hybrid sovereignty” architecture—localize PII and sensitive IP while leveraging transatlantic scale
  • Use encryption, pseudonymization, and key management to keep regulators and auditors satisfied
  • Negotiate contracts and SLAs that embed data‑residency and lawful‑access guarantees up front

Artificial Intelligence & Machine Learning

Nishit Sahay

Chief Information Officer
Marvell Technology

AI-Secured Data Fabrics: Unifying Silicon, Systems, and Supply-Chain Intelligence

  • Building a zero-ETL, real-time data mesh that spans foundry telemetry, board-level tests, and field-return analytics
  • Applying graph AI and anomaly detection to pre-empt yield dips, component shortages, and firmware threats
  • Integrating confidential computing and homomorphic encryption to safeguard multi-party design collaboration
  • Automating compliance with NIST 800-171, SBOM mandates, and emerging chip-export regulations
  • Translating insights into action: predictive RMA, dynamic inventory allocation, and customer-centric product road-mapping

Digital Transformation & Data Management

Rohit Jain

Chief Information Officer
Harvard Business School Alumni Association

Driving Digital Transformation: Enhancing Data Management for Long-Term IT Success

  • Implementing advanced techniques to improve data quality, governance, and integration across enterprises
  • Building scalable frameworks that support growth and increase operational efficiency
  • Embedding a culture of digital transformation from leadership to execution across all departments
  • Emphasizing data ethics and compliance in a fast-evolving digital landscape
  • Aligning data management strategies with business goals to drive informed decision-making
2:20 pm – 2:50 pm PST

Workshops

Room 1

Responsible AI: Governing Models Before Regulators Force Your Hand

  • Rank every AI system by business impact and risk.
  • Keep detailed audit trails of data, training, and testing for future proof.
  • Form an internal AI ethics council that includes legal, security, and product teams.

Room 2

Cloud Security 2.0: Protecting Data Across Every Cloud and App

  • Combine cloud-security tools into one clear health score.
  • Embed security checks directly into development pipelines so mistakes are caught early.
  • Discover and lock down “shadow” cloud apps you never knew you had.

Room 3

Cloud Security 2.0: Protecting Data Across Every Cloud and App

  • Combine cloud-security tools into one clear health score.
  • Embed security checks directly into development pipelines so mistakes are caught early.
  • Discover and lock down “shadow” cloud apps you never knew you had.
2:55 pm – 4:15 pm PST

HAPPY HOUR, NETWORKING, AND PRE-ARRANGED 1-2-1 MEETINGS

4:20 pm – 4:50 pm PST

Stream Sessions

Cybersecurity

Zero-Trust in 90 Days: A Practical Roadmap

  • Identify the first network segments to protect for quick wins.
  • Use continuous checks on user identity, device health, and location instead of one-time log-ins.
  • Measure success by shorter attacker dwell time and faster breach isolation.

Artificial Intelligence & Machine Learning

Conversational AI That Earns Customer Trust

  • Feed chatbots only with approved company data to avoid wrong answers
  • Add filters so the bot never shares private or harmful content
  • Track user satisfaction, completion rate, and cost per conversation

Digital Transformation & Data Management

Cloud Security 2.0: Are Shadow Apps Draining Your Budget?

  • Pipeline gates that stop risky code before it hits prod.
  • Discovery demos that surface hidden SaaS in minutes.
4:55 pm – 5:25 pm PST

Plenary

  • Janet George

    EVP, Chief AI Digital Officer
    Mastercard

Crafting Long-Term AI Strategies for Sustainable Growth and Innovation

  • Developing AI strategies that align with immediate goals and long-term business innovation
  • Implementing scalable AI frameworks to ensure adaptability and sustainable growth
  • Balancing short-term AI wins with long-term innovation and competitive advantage
  • Investing in AI infrastructure that supports evolving business needs and future scalability
  • Leading AI transformations with a focus on long-term impact, efficiency, and innovation
5:25 pm – 6:10 pm PST

Panel discussion

  • Grant Ecker

    Founder, Chief Architect Network, VP, Enterprise Architecture
    Ecolab

  • Brian Chambers

    Chief Architect
    Chick-fil-A

  • Anthony Sneed

    Chief Technology Architect
    Hilti

  • Yaron Yaniv

    SVP, Global Chief Architect
    GM Financial

  • Geeta Pyne

    Senior Managing Director and Chief Architect
    TIAA

Architecture as a Business Multiplier: From Strategic Roadmaps to AI-Native Platforms

  • Translating EA into measurable P&L impact
  • Aligning Gen-AI pilots with enterprise reference architectures
  • Balancing innovation velocity with governance and risk
  • Building the foundation for AI-native, continuously learning systems
6:10 pm – 6:20 pm PST

Chair's closing remarks

CyberSecurity

Artificial Intelligence & Machine Learning

Digital Transformation & Data Management

6:25 pm – 7:25 pm PST

Networking drinks reception

Unlock Exclusive Summit Details

Exclusive summit content is reserved for qualified participants—request access today or enter your password.

Dont have a password?

If you do not have a password, click below to submit a request for access.

Request Access