CIO Southern California Summit | March 17, 2022 | Sofitel Beverly Hills - Los Angeles, CA, USA


Registration & Networking Breakfast

8:30 AM - 9:30 AM

American Breakfast

Fresh Seasonal Fruit and Berries

Scrambled Eggs with Fresh Chives

Roasted Red Potatoes with Braised Bell Peppers

Applewood Smoked Bacon and Chicken Sausage

Mini Croissant & Chocolate Croissants, Fresh Baguette, Assorted Mini Muffins

Butter, Marmalade and Fruit Preserves

Lavazza Coffee, Decaffeinated Coffee, Assorted Teas with Half and Half, 2% milk, Soy Milk and Almond Milk

Orange Juice and Apple Juice 

Welcome Address

9:30 AM - 9:40 AM

Keynote: Digital Transformation – Innovating through the dynamic business and staffing environment

9:40 AM - 10:10 AM

Digital transformation during the volatile COVID19 and the Great Resignation era has been some of the most challenging period for most seasoned and new leaders.  The presentation will provide overview of the journey in accelerating innovation through advanced analytics, applying Machine Learning / NLP to key processes to further scale, meeting the ever-demanding cybersecurity and compliance requirements while handling challenges of COVID19 hybrid work-environment and the Great Resignation era.  The role of a visionary and humble CIO / CISO has never been more important to help navigate organizations with agility through these challenging yet competitively differentiating times.

Nader Nemati

Chief Information Officer

QTC Management

Sponsor Keynote: Let’s Create in the new era of digital transformation

10:15 AM - 10:45 AM
Technology and transformation have always gone hand-in-hand, but the pace of transformational change accelerated over the last 2 years in every organization. IBM Americas CMO Chris Bontempo will get our creative juices flowing as he shares stories and best practices sourced from thousands of IBM digital transformation engagements with the “new creators” - the change agents and forward thinkers in every organization - including yours. He’ll cover a wide-range of areas, from cybersecurity to AI and data-driven transformations, how to use hyper-automation to make your business supersonic, and give you the tools to get creative to solve your organization’s biggest challenges. Welcome to the new IBM.

Chris Bontempo

Chief Marketing Officer for IBM Americas



10:45 AM - 10:55 AM

French Corner

- Mini Croissants

- Chocolate Croissants

- French Baguette

- Assorted Mini Muffins

Assorted teas, coffee, sodas, and water available all day!

CISOs Getting Board Level Support

11:00 AM - 11:25 AM
Despite today’s frequent headlines regarding companies falling victim to cyberattacks or suffering data breaches, cyber risk is still a relatively new threat - or is it? While companies may have an idea about the potential effects on reputation and impact on the overall business, many are yet to experience one first-hand, or at least not on a high-profile scale. That means there’s still an unfamiliarity around how exactly to manage the risk. Many companies are changing their approach, in some cases, cybersecurity is still departmentalized and seen as the remit of the IT team. Clearly, it needs to be elevated to the boardroom level and incorporated into the company’s overall governance, risk, and compliance structure - easier said than done - what’s the best approach? Chris Stoneley, Cathay Bank’s CISO will explore the topic of getting board level support – in a relatively painless fashion.

Chris Stoneley

Chief Information Security Officer

Cathay Bank

Executive Boardroom: Milliseconds Matter in the World of Cyber Defense

11:30 AM - 11:55 AM
In the world of ransomware, supply chain poisoning, zero-day attacks, and unknown vulnerabilities, milliseconds matter. Attackers can get access and manipulate workloads within minutes or even seconds. Our current tools allow attackers to dwell for hours, days, weeks, and months. There must be a better way. Powerful tools are needed to help organizations stop being reactive and start being proactive. Adoption of new security tools and frameworks can make a big difference. Enterprises should not have to settle for response if protection can be achieved. Join this session to learn how you can proactively protect your workloads from ransomware or other zero-day attacks in milliseconds and stop reacting to them after the fact. Patch your vulnerabilities at your own tempo without opening yourself up to costly breaches.

Jason Stutt

SVP Americas

Virsec Systems


12:00 PM - 12:25 PM
Aligned closely, but often adversaries - the relationship between the CIO and CISO is an interesting one for many organizations In this session, we will find out how the tech and security departments and their leaders can better work together as the technology and cybersecurity worlds continue to get more and more complex.

Michael Panico

VP of Information Security


Executive Boardroom: Future-Proof Your Customer Support IT Strategy.

12:30 PM - 12:55 PM

The pandemic has led to a growing dependence on technology for customer support. Consumers are increasing their digital purchases by 160 percent and are expecting businesses to support them across their channels of choice like WhatsApp, Facebook Messenger, and more.


To stay competitive, businesses have responded by rapidly purchasing new point solutions to support customers on their channels of choice. Now the pressure is on the IT teams to ensure these siloed solutions work together smoothly. They need to deliver consistent cross-channel experiences for their customers’ journeys, an easy to use tech stack for their employees, and a future-proof IT strategy for their business leaders.


Join this session to learn:

  • How to unify and simplify support experiences
  • Why modern, consumer-grade experiences accelerate time to value
  • How to future-proof your support desk investment
  • Art of the possible for customer support with AI and customer 360 view

Colin Crowley

CX Advisor


Innovation Partner: Digital Transformation is Built on a Foundation of APIs - But are your APIs Secu

1:00 PM - 1:25 PM

APIs are the core building block of every enterprise’s digital strategy, yet they are also the number one attack surface for hackers. Traditional security and management approaches are failing everyday as the scale and reach of API attacks increases. The time is now right for enterprises to consider a new end-to-end continuous approach to protecting their APIs. In this talk you will learn how Global 2500 enterprises are embracing a positive security model combining shift-left and shield-right methodologies to protect their APIs throughout the API lifecycle.

1. APIs are Growing BUT so are the Attacks

2. Traditional security solutions and approaches are proving insufficient

3. There is another way - 42Crunch

4. Examples of high profile clients

5. Be sure to talk to us during the day here

Mike Fawcett

Regional Sales Manager


Networking Lunch

1:30 PM - 2:30 PM

Hot Lunch Buffet


- Vegan Tomato Basil 


- Tuscan Kale Caesar Salad, Parmesan

- Spring Green Mix Salad, Spring Mix, Oven Dried Tomato, Pickled Red Onion, Goat Cheese, Banyuls Vinaigrette

Main Course

- Tilapia, Ginger and Scallion Sauce

- Braised Short Ribs

- Veggie Paella, Saffron Rice, Fennel, Patty Pan, Squash


- French Green Beans

- Roasted Potatoes


- Assorted Cookies: chocolate chip, oatmeal, coconut macaroon, dark valrhona chocolate madelines

- Brownies: espresso brownies 

Audience Discussion: The Future of Technology

2:35 PM - 3:00 PM
CDM Media's, SVP Marketing and Communities, J.D Miller leads a discussion in the room around key findings from running over 350 events in the last two years. From the future of Zero Trust, to effectively evaluating your tech stack, to enhancing the customer experience - be ready for a great discussion with your peers.

Cyberpsychology and it’s impact on cyber crime’

3:05 PM - 3:30 PM

Protecting organizations' information assets in cyberspace and achieving cyber resiliency requires adopting and implementing information security and privacy programs through embracing cutting-edge solutions, workforce education, awareness, and high-performing skilled, competent, and trained technical teams.


The enterprise workforce are trusted authorized insiders that access and operate on information technology assets, systems, and data. They are considered the weakest link in cybersecurity. Cybercriminals target the workforce by manipulating human traits using psychology and deception to circumvent defense measures and obtain sensitive or confidential information or halt business operations.


The upsurge dependency and interaction in virtual space and emerging technologies changed human behavior and psychology in cyberspace. The workforce behavioral changes increased cybersecurity risk to organizations. Understating the psychological implications and effects of human interactions and technologies, including social, environmental, biases, perceptions, deterrence, motive, and attitude, can help better understand the psychology of cybercrime and build a cyber-resilient virtual workforce and minimize risk.

Allen Ohanian

Chief Information Security Officer

Dept. of Children and Family Services

Innovation Partner: The Authority in Managed Detection and Response

3:35 PM - 3:45 PM

eSentire MDR means high fidelity detection and unparalleled response. You shouldn’t settle for partial security, so we ingest multiple signals, correlating data across your network, endpoint, log, and cloud sources. Our MDR provides improved detection, 24/7 threat hunting, deeper investigation, end-to-end coverage and most of all, complete Response.


The result? We stop threats before they become business disrupting events.


Steve Wilson, Senior Solutions Architect at eSentire guides attendees through what MDR is and why more and more organizations are relying on experts to defend the value of their business.


  • Introduction to eSentire
  • eSentire's Industry Leading Services
  • How eSentire MDR Works
  • How eSentire Differentiates from other Vendors

PM Break

3:45 PM - 3:55 PM

Mediterranean Market

- Seasonal Crudites, Herb Yogurt and Carrot Harissa Dipping Sauce

- Hummus, Tabbouleh, Babaganoush & Tzatziki with Homemade Lavash & Pita Bread

- Cucumber Mint Water

Assorted teas, coffee, and sodas available all day!

Executive Boardroom: Cyber resilience, moving target defense, and a return to meaningful operational

3:55 PM - 4:20 PM
Through over 20 publications in 25 months, cyber resilience standards in the United States were overhauled to formalize the use of capabilities commercialized over the past decade. The result for early movers has been a welcome return to ever faster connections, falling costs, tighter lines of communication, and simpler network architectures. We’ll cover what changed, and the operational impacts being observed in the field.

Ian Schmertzler



Closing Remarks

4:20 PM - 4:30 PM

Summit Happy Hour

4:30 PM - 6:00 PM

Passed Hors D'Oeuvres

- Carmelized Onion & Pear Pizzetta

- Ahi Tuna Mini Tostadas, Herb Salad

- Lamb Kefta, Pomegranate Molasses and Tzatziki

- Mini Crispy Crab Cakes

Premium Bar

Grey Goose, Bombay Sapphire, Bacardi Light, Barcardi Ocho, Parton Silver, Don Julio Blanco, Johnnie Walker Black Label, Makers Mark, Crown Royal, Hennessy VS, Disaronno, Baileys, Grand Marnier

Sauvignon Blanc Napa Cellars

Cabernet Sauvignon Terrazas Alto De Plata

Montemarte Sparkling Wine 

Heineken, Corona, Stella Artois, Budweiser, Budweiser Light

Assorted Sodas, Still and Sparkling Water

St. Patty's Theme Drink