Event Description

Annual CISO Summit in New York City

Discussing key topics such as the Cloud, Digital Transformation, Data & Analytics and the use of AI and IoT, the CISO Summit gives you the opportunity to meet leading decision-makers under one roof at one time, to be part of the discussions that are shaping the future of security and to network and develop contacts that will strengthen your business.

The program is driven by our senior-level Advisory Board including representatives from TNT, Henley Business School, Fox Networks Group, US Department of Defense and Wyndham Group.

The CISO Summit brings together leaders from across the public, large enterprises & mid-market sectors to provide you with a strategic and practical toolkit to help drive transformation including:

  • A full day of leading CISO’s discussing the latest industry trends
  • Workshops, panel discussions & round table sessions led by visionaries within technology
  • First-hand case studies on the challenges facing IT
  • Fantastic networking opportunities with peers throughout the day
  • Over 150 Senior Level IT Directors
  • Keynotes, Interactive Round-tables, and Lively Panel Discussions
  • Industry-leading topics around IoT, AI, Cloud, etc.
  • Dedicated space and time for peer-to-peer networking with fellow industry leaders
Where

New York City

When

June 18 2025

Event Schedule

clock icon

8:00 AM

Registration Opens / Breakfast

clock icon

09:00 AM

Welcome Remarks

clock icon

09:15 AM

Panel Discussion

Shift from Problems to Value with Leadership and Technology

In today's dynamic cybersecurity landscape, ransomware and other cyber threats have become significant challenges for organizations. This session will focus on how businesses can move beyond reactive problem-solving to proactively creating value through effective leadership and innovative technology. By leveraging advanced cybersecurity strategies, fostering a culture of resilience, and aligning technology investments with organizational goals, leaders can transform the challenge of cyber threats into an opportunity to strengthen their security posture. Attendees will gain actionable insights to transition from addressing problems to driving value, ensuring their organizations remain secure and future.

clock icon

10:05 AM

Keynote

Continuous and Compliant: Building the Future of Third Party Trust
 
In today’s world, CISOs shoulder the responsibility of managing an expanding roster of third-party vendors amidst heightened scrutiny of external risks. How can security leaders reliably assess and remediate vendor risk, against a backdrop of limited resources?

In this keynote, Matt Cooper, Director, GRC at Vanta, will share his view on the future of third party risk; one that prioritizes inside-out assessment of vendor risk, and is based on continuous monitoring rather than point-in-time checks. Join this session for a discussion on:

 - Challenges in assessing vendor risk

 - The future trajectory of third party risk management

 - Strategies to integrate these insights into your daily operations

clock icon

10:35 AM

Keynote

Rethinking the Relationship Between Cybersecurity Teams and the People They Protect

You’ve heard it all before: the DBIR tells you people are your biggest risk, phishing simulations tell you your users fall for social engineering, and simple security measures you deploy are sometimes met with howls of protest. But what if it didn’t have to be that way?

Join this session for a fresh perspective on: -Moving security alerts from the SOC to where users work -Protecting end users perception of security controls -Transforming security teams’ interactions with end users

clock icon

11:05 AM

Mingle Break

clock icon

11:30 AM

Panel Discussion

Is the future of the SOC autonomous? Examining practical applications of AI workflows within security operations

Autonomous SOC” has become one of the preeminent buzzwords in the post-GPT era. Many vendors, influencers, and consultancies now purport to offer AI-enabled solutions and frameworks aimed at removing most, if not all, human actions from security operations.


But is the hype real? And, perhaps more importantly, what does the ideal end result look like for security leaders aiming to future-proof operations in a way that best balances autonomous systems with human oversight? This panel, led by Tines Field CISO Matt Muller,will examine practical ways rapid innovations in AI and workflows are being implemented within security operations. Panel participants will also provide insights into what the future holds as both AI and overall enterprise security operations continue to evolve and modernize.

This session will be filled with expert insights and actionable takeaways to help inform future AI investments within security operations.

What Will You Learn?
- Insights on practical applications of AI within security operations
- How security operations will continue to evolve with increased investments in workflows and AI
- Best practices on how to effectively identify areas within your security operations that can be handled autonomously and what requires human involvement

clock icon

12:20 PM

Lunch

clock icon

1:30 PM

Keynote

From Adversaries to Allies: Developers and AppSec, a Love-Hate-Love Relationship

For nearly two decades, observations across hundreds of AppSec programs have revealed striking similarities. The effectiveness of these programs is often hindered by common misconceptions about the true goals of AppSec and the outcomes that should be prioritized. In general, we find too much, fix too little, and do almost nothing to prevent new vulnerabilities. We have built a world where we attempt to report and goal our way to victory. How's that working for us? We need to rebalance our efforts across these three pillars and put the emphasis where it belongs. The accumulation of security debt is burying us all under a mountain of exception processing and annual recertification. Stop the madness! Whether leading security or development, there are practical strategies to drive real change. This presentation will outline a shift in focus that can significantly improve the effectiveness of AppSec efforts.

Key takeaways include:

1. Turn developers from adversaries to allies.

2. Modify your controls to reflect reality and make compliance feel better

3. Put the effort of your finite resources to places that will have the greatest impact

4. Elevate your AppSec program to a level of excellence through effective developer engagement By rebalancing efforts across these pillars, organizations can move beyond traditional challenges and create a more sustainable, impactful AppSec strategy.

clock icon

2:00 PM

Panel Discussion

Embracing Fear and Overcoming Mistakes

clock icon

2:50 PM

Mingle Break

clock icon

3:20 PM

Mingle Break

clock icon

3:45 PM

Round Tables

1. Endpoint Controls - Join for a discussion on the challenges and the successes possible with adding endpoint controls as part of a cybersecurity posture

2. Secure your Non-Human Identities (NHIs) at the NY Summit with Silverfort

3. Architecting the AI-Enabled Enterprise

4. From Dr. No to Captain Yes: How CISOs Are Enabling Safe Employee AI Use 

5. How Exposed Personal Data Creates Risk for Executives and Employees. 

6. Dark Side of Digital Trust: The Case for Crypto-Agility

clock icon

4:45 PM

Closing Remarks

clock icon

5:00 PM - 6:00 PM

Networking Cocktail Hour

Words from our attendees

Join top decision makers from the leading Organizations in the Country

 

Are you interested in this event?

Participate in this Summit on our unique platform, learn from industry leaders, and network with peers. The benefits of attending are unmatched. Complimentary to qualified professionals and their team.