June 9, 2026

* JOIN US FOR THE PRE-EVENT HAPPY HOUR on JUNE 8 2026 FROM 6:00 PM – 7:00 PM

7:00 am – 8:00 am PST

Delegate Registration and Networking Breakfast

8:00 am – 8:10 am PST

Chair's Welcome and Opening Remarks

CyberSecurity

Lee Bailey

Chief Information Security Officer, Prestige Group,
Unilever Prestige

Artificial Intelligence & Machine Learning

Tommy Gardner

Chief Technology Officer
HP Federal

Digital Transformation & Data Management

Linda Conrad

SVP, Operational and Technology Risk
First Citizens Bank

8:10 am – 8:40 am PST

Opening Keynote

Gene Sun

Corporate VP, Chief Information Security Officer
FedEx

Fireside Chat: Architecting Zero Trust Security for the One FedEx Transformation

  • Developing a unified security framework that scales across merged global business units
  • Transitioning legacy network silos into a modern identity-centric model to reduce technical debt
  • Maintaining operational uptime while rolling out rigorous access controls for half a million employees
  • Leveraging predictive analytics to identify and mitigate risks during the Network 2.0 evolution
  • Enhancing network agility without compromising security during the enterprise consolidation
8:40 am – 9:10 am PST

Plenary

Trina Ford

SVP, Chief Information Security Officer
iHeartMedia

Building a Resilient Enterprise Security Strategy That Aligns Cyber Risk Management With Business Priorities and Growth Goals

  • Balancing cybersecurity investment with business strategy to deliver measurable value and operational resilience
  • Translating cyber and operational risk into executive-level insights that drive informed decision making
  • Reducing enterprise exposure through stronger governance frameworks and streamlined control environments
  • Embedding security into IT and business processes to support transformation without slowing innovation
  • Creating unified accountability by aligning security, compliance, and business stakeholders under a shared risk model
9:10 am – 9:40 am PST

Plenary

Danny Jenkins

CEO and Co-Founder
ThreatLocker

Securing the Enterprise: Proactive Defense with Zero Trust Application Control

  • Implementing zero trust principles to protect endpoints and servers from evolving cyber threats
  • Leveraging application control and ringfencing to stop ransomware before execution
  • Simplifying least-privilege access management without slowing down business operations
  • Enhancing visibility across applications, networks, and devices to detect anomalies in real time
  • Building a scalable cybersecurity framework that reduces risk and supports regulatory compliance
9:45 am – 11:25 am PST

Refreshments, Networking, and Pre-Arranged 1-2-1 Meetings

11:30 am – 12:00 pm PST

Stream Sessions

cybersecurity

Lee Parrish

CISO
Newell Brands

Translating Cyber Risk to Something the Board Understands

  • Navigating the drivers of variability in CISO board engagements
  • Recognize the core attributes of board presentations for maximum effectiveness
  • Customize your communications to fit the unique needs of your board
  • Replace out of context metrics with a risk-based storytelling strategy
  • Moving board interactions outside of the boardroom to create value

Artificial Intelligence & Machine Learning

Kian Beyzavi, PhD

VP, AI Molecular Design
Danaher Corporation

Generative Biology at Scale: Re-Engineering Discovery Pipelines with Foundation Models

  • Building multimodal data fabrics that fuse omics, imaging, and real-world evidence for generative AI training
  • Deploying foundation models to accelerate target identification, lead optimization, and in-silico protein design
  • Governing large-language/large-molecule models: bias monitoring, IP protection, and regulatory readiness
  • Integrating wet-lab automation and digital twins to create self-optimizing discovery loops
  • Measuring ROI: cycle-time compression, hit-rate uplift, and portfolio-wide cost efficiency

Digital Transformation & Data Management

Jason Brady

VP, IT
BAE Systems

Neural Interfaces and BCI - Preparing the Enterprise Data Foundation

  • Assessing the role in managing the ethical, legal, and security implications of biodigital and Brain-Computer Interface (BCI) data
  • Developing specialized data pipelines capable of processing and securing high-frequency neural signals at the edge
  • Identifying the initial enterprise use cases for BCI to reduce cognitive load in mission-critical command and control environments
  • Addressing the long-term "Post-Quantum" cryptographic needs for protecting sensitive human-machine interface (HMI) data
12:05 pm – 12:35 pm PST

Workshops

Room 1

Mike Austin

CEO
MetrixData 360

Why Vendors Win Renewals and How CIOs Are Finally Changing the Outcome

  • Why renewal pricing and discount ceilings are often set before negotiations
    formally begin.
  • The quiet data gaps vendors rely on — and how they shape your “starting
    position.”
  • The 90-day leverage window most enterprises miss every cycle.
  • What changes when CIOs control the entitlement narrative instead of
    defending it.

Room 2

Christopher Belford

Senior Executive
EPI-USE Cloud

Beyond the Pilot: What Agentic AI Is Starting to Look Like in Production

  • Escaping "Pilot Purgatory": why only 11% of organizations cross from experimentation into production, and how legacy infrastructure, not the AI itself, is the real blocker
  • Why the competitive moat isn't model selection but orchestration: wiring agents together across systems, permissions, and constraints in ways that won't commoditize
  • From human-in-the-loop to human-on-the-loop: the governance frameworks and FinOps disciplines that make autonomous, multi-agent action responsible and cost-controlled
  • Why most agentic AI failures are context failures rather than intelligence failures, and what that means for how architects, engineers, and operators build for production

Room 3

Hugues Foltz

EVP, Partner
Vooban

From Pilot to Production: Deploying an Agentic AI Ecosystem at Enterprise Scale

  • Move beyond isolated experimentation to bridge the gap between boardroom strategy and frontline execution by automating high-impact end-to-end workflows
  • Transition from standalone tools to a centralized agent execution layer that treats data as a product and leverages standardized interfaces for cross-system interoperability
  • Implement a multi-tiered guardrail system that treats every agent as a distinct identity with least-privilege access and real-time auditability
  • Evolve from manual oversight to an orchestration-first culture by defining clear decision boundaries and escalation paths for autonomous actions
  • Mitigate the chaos of technical debt and shadow AI by establishing a unified data foundation and predictive observability for long-term ecosystem health
12:40 pm – 1:40 pm PST

Lunch & Learn Roundtable Discussions

Benefit from additional learning by joining a moderated roundtable discussion on pressing issues in the industry. Registration is required, and attendance for moderated roundtables on Day 1 is limited to attendees and speakers. Choose from:

Danny Jenkins

CEO and Co-Founder
ThreatLocker

Defending Against Hidden Risks of AI Tools in the Workplace

John Fitzgerald

Partner
Pomerol Partners

Everyone Wants Agentic AI. Few Are Ready. Let's Talk About What It Really Takes

Camilo Herrera

Chief Sales Officer
BOZ USA

Beyond Hard Skills: How Top Companies Hire IT Talent for Long-Term Fit

Alexandre Gervais

Chief Revenue Officer
Vooban

Agentic AI for CIOs: Executive Roundtable on the Next Operating Model

Lee Briggs

Director, Solutions Engineering
Tailscale

Building With AI Safely on Tailscale as a Platform

Bhavin Shah

VP, Product AI
Drata

From Manual Compliance to Autonomous Trust: How AI is Shifting the Future of GRC

1:45 pm – 2:15 pm PST

Stream Sessions

Cybersecurity

Brian Gardner

Chief Information Security Officer
City of Austin, TX

Securing the Digital Municipality: Building Public Trust through Cyber Resilience

  • Strategies for hardening high-value municipal targets, including election systems, payment portals, and critical utilities.
  • Implementing scalable zero-trust architectures across diverse city departments with varying levels of digital maturity.
  • Moving from reactive incident response to proactive threat hunting and automated recovery to minimize downtime for citizen services
  • Maximizing ROI on security investments while navigating public sector budget constraints and procurement processes

Artificial Intelligence & Machine Learning

Nishit Sahay

Chief Information Officer
Marvell Technology

AI-Secured Data Fabrics: Unifying Silicon, Systems, and Supply-Chain Intelligence

  • Building a zero-ETL, real-time data mesh that spans foundry telemetry, board-level tests, and field-return analytics
  • Applying graph AI and anomaly detection to pre-empt yield dips, component shortages, and firmware threats
  • Integrating confidential computing and homomorphic encryption to safeguard multi-party design collaboration
  • Automating compliance with NIST 800-171, SBOM mandates, and emerging chip-export regulations
  • Translating insights into action: predictive RMA, dynamic inventory allocation, and customer-centric product road-mapping

Digital Transformation & Data Management

Carol Dann

VP, Information Technology
National Hockey League

Transforming the Game: Digital Innovation for a Safer, Smarter NHL

  • Implementing secure, efficient team selection software for the draft, ensuring that data integrity, privacy, and fairness are maintained through advanced cybersecurity protocols
  • Launching NHL Watch Comms, with real-time updates and safety features via Apple Watches worn by referees, ensuring instant notifications when periods are ending,  and enhancing in-game decision-making and safety.
  • Combining cybersecurity with digital innovation to safeguard player, team, and game data while enhancing operational efficiency and game-day experiences
  • Integrating digital tools for enhanced efficiency with a focus on logistics  to ensure minimal disruption
2:20 pm – 2:50 pm PST

Workshops

Room 1

Billy Boozer

Chief Technology Officer
Dualboot Partners

The Anatomy of an Enterprise AI Experiment: How to Move From Proof of Concept to Production Value

  • Learn why most AI proof of concepts succeed in the room but fail in the business, and how to tell the difference between a compelling demo and a scalable enterprise capability.
  • Understand how to select AI use cases tied to real business friction, measurable outcomes, available data, and clear operational ownership.
  • Explore how to design the full experiment before the first prompt is written, including success metrics, workflow impact, data readiness, human review, integration points, and production ownership.
  • Learn how to move beyond “AI as a tool” and toward “AI as a system” — a repeatable delivery capability embedded into existing business processes, software systems, and operating models.
  • Understand how to build a repeatable AI delivery and governance model that moves the organization from hype and pilots into production value, measurable return, responsible scale, and long-term operating advantage.

Room 2

  • Josh Santiago

    Chief Strategy Officer
    Dynamic Consultants Group

Is My Organization Actually Ready for Automation?

  • Evaluate operational readiness across data accuracy, KPIs, and digital excellence
  • Determine why strategic sequencing matters more than specific software choices
  • Complete a guided digital transformation health check to benchmark your current tech stack
  • Develop an organizational score and gap analysis to pinpoint infrastructure vulnerabilities
  • Create a prioritized action plan to ensure automation strengthens performance rather than accelerating chaos

Room 3

Integrating Zero Trust Systems to Future-Proof Enterprise Security and Growth

  • Implementing Zero-Trust principles for scalable protection across networks, cloud, and edge environments
  • Leveraging automation and AI to accelerate detection, containment, and incident response capabilities
  • Aligning security architecture with agile digital platforms to support innovation and business expansion
2:55 pm – 4:15 pm PST

HAPPY HOUR, NETWORKING, AND PRE-ARRANGED 1-2-1 MEETINGS

4:20 pm – 4:50 pm PST

Stream Sessions

Cybersecurity

Robert Chin

Group Chief Information Security Officer
ASUS

Architecting a Unified Front Through Public-Private Cybersecurity Synergy

  • Ways to share threat data between businesses and the public sector in real time
  • Methods for setting high security standards for hardware across global supply chains
  • How to align business disaster recovery with national emergency plans
  • Turning government security policies into useful daily tasks for IT teams
  • Building trust between rival companies to create a stronger defense for everyone

Artificial Intelligence & Machine Learning

Yaron Yaniv

SVP, Global Chief Architect
GM Financial

Beyond the Promise of AI The Hidden Risks and Costs of Enterprise Transformation

  • Analyzing overlooked challenges like data fragmentation and governance blind spots that emerge as initiatives scale
  • Identifying human and operational factors that can quietly undermine transformation efforts during the transition from pilot to production
  • Bridging talent gaps and organizational readiness issues to ensure the successful deployment of intelligent systems
  • Establishing the technological and workforce foundations required to sustain long term AI driven value
  • Evaluating the less visible costs and risks associated with moving AI from experimentation to enterprise wide scale

Digital Transformation & Data Management

AJ Debole

Field CISO
Oracle

Lucy Avetisyan

CIO
UCLA

Fireside Chat: Harnessing AI, Data, and Human-Centered Design for Secure Transformation

  • Integrating AI and automation to modernize IT ecosystems while ensuring ethical and secure implementation across academic and industry environments
  • Building a unified data governance framework to balance accessibility, compliance, and institutional trust
  • Embedding cybersecurity at the foundation of digital transformation initiatives to safeguard business and administrative operations
  • Transforming decentralized systems into cohesive infrastructures through agile delivery models and shared governance principles
  • Empowering people through adaptive leadership that cultivates innovation, resilience, and digital fluency across organizations
4:55 pm – 5:25 pm PST

Plenary

  • Patrick Phillips

    Chief Information Officer
    Vasion

Securing the Agentic AI Journey: How to Move Fast Without Losing Control

  • Why the pilot-to-production leap for agentic AI is a governance problem, not a technology problem and what that means for your security architecture
  • How autonomous systems fundamentally break traditional compliance models, and what to build instead
  • The difference between bolting governance onto AI and building it into the automation layer and why that distinction will define who scales and who stalls
  • A practical framework for making speed and control stop being a trade-off — drawn from real deployments in regulated industries
  • The hard trade-offs nobody puts in the vendor pitch: where agentic AI governance actually gets messy, and how to navigate it
5:25 pm – 6:10 pm PST

Panel discussion

  • Sameer Patwardhan

    SVP, Technology
    Forbes

  • Awinash Sinha

    Chief Digital Information Officer
    Zoom

  • AJ Debole

    Field CISO
    Oracle

  • Jalen Byford

    CIO, Humana Healthy Horizons
    Humana

  • Ramy Houssaini

    Chief Cyber Solutions Officer
    Cloudflare

  • Praveen Moturu

    Global VP, Enterprise Digital Platforms
    Mars

Building Cybersecurity Resilience, Trust, and Scalable Defenses in Today’s Evolving Landscape

  • Countering sophisticated cyberattacks with resilient, layered, and continuously adaptive defense strategies
  • Embedding zero-trust architecture across enterprise systems to ensure scalable, end-to-end protection
  • Strengthening security by uncovering hidden vulnerabilities and mitigating third-party risks
  • Leveraging AI and automation to accelerate threat detection, response, and recovery processes
  • Navigating global compliance challenges while balancing security, agility, and business continuity
  • Empowering employees as active defenders, minimizing risks from human error and insider threats
6:10 pm – 6:20 pm PST

Chair's closing remarks

CyberSecurity

Lee Bailey

Chief Information Security Officer, Prestige Group,
Unilever Prestige

Artificial Intelligence & Machine Learning

Tommy Gardner

Chief Technology Officer
HP Federal

Digital Transformation & Data Management

Linda Conrad

SVP, Operational and Technology Risk
First Citizens Bank

6:25 pm – 7:25 pm PST

Networking drinks reception

Unlock Exclusive Summit Details

Exclusive summit content is reserved for qualified participants—request access today or enter your password.