Where
New York City
Discussing key topics such as the Cloud, Digital Transformation, Data & Analytics and the use of AI and IoT, the CISO Summit gives you the opportunity to meet leading decision-makers under one roof at one time, to be part of the discussions that are shaping the future of security and to network and develop contacts that will strengthen your business.
The program is driven by our senior-level Advisory Board including representatives from TNT, Henley Business School, Fox Networks Group, US Department of Defense and Wyndham Group.
The CISO Summit brings together leaders from across the public, large enterprises & mid-market sectors to provide you with a strategic and practical toolkit to help drive transformation including:
Shift from Problems to Value with Leadership and Technology
In today's dynamic cybersecurity landscape, ransomware and other cyber threats have become significant challenges for organizations. This session will focus on how businesses can move beyond reactive problem-solving to proactively creating value through effective leadership and innovative technology. By leveraging advanced cybersecurity strategies, fostering a culture of resilience, and aligning technology investments with organizational goals, leaders can transform the challenge of cyber threats into an opportunity to strengthen their security posture. Attendees will gain actionable insights to transition from addressing problems to driving value, ensuring their organizations remain secure and future.
In this keynote, Matt Cooper, Director, GRC at Vanta, will share his view on the future of third party risk; one that prioritizes inside-out assessment of vendor risk, and is based on continuous monitoring rather than point-in-time checks. Join this session for a discussion on:
- Challenges in assessing vendor risk
- The future trajectory of third party risk management
- Strategies to integrate these insights into your daily operations
Rethinking the Relationship Between Cybersecurity Teams and the People They Protect
You’ve heard it all before: the DBIR tells you people are your biggest risk, phishing simulations tell you your users fall for social engineering, and simple security measures you deploy are sometimes met with howls of protest. But what if it didn’t have to be that way?
Join this session for a fresh perspective on: -Moving security alerts from the SOC to where users work -Protecting end users perception of security controls -Transforming security teams’ interactions with end users
Is the future of the SOC autonomous? Examining practical applications of AI workflows within security operations
But is the hype real? And, perhaps more importantly, what does the ideal end result look like for security leaders aiming to future-proof operations in a way that best balances autonomous systems with human oversight? This panel, led by Tines Field CISO Matt Muller,will examine practical ways rapid innovations in AI and workflows are being implemented within security operations. Panel participants will also provide insights into what the future holds as both AI and overall enterprise security operations continue to evolve and modernize.
This session will be filled with expert insights and actionable takeaways to help inform future AI investments within security operations.
What Will You Learn?
- Insights on practical applications of AI within security operations
- How security operations will continue to evolve with increased investments in workflows and AI
- Best practices on how to effectively identify areas within your security operations that can be handled autonomously and what requires human involvement
From Adversaries to Allies: Developers and AppSec, a Love-Hate-Love Relationship
For nearly two decades, observations across hundreds of AppSec programs have revealed striking similarities. The effectiveness of these programs is often hindered by common misconceptions about the true goals of AppSec and the outcomes that should be prioritized. In general, we find too much, fix too little, and do almost nothing to prevent new vulnerabilities. We have built a world where we attempt to report and goal our way to victory. How's that working for us? We need to rebalance our efforts across these three pillars and put the emphasis where it belongs. The accumulation of security debt is burying us all under a mountain of exception processing and annual recertification. Stop the madness! Whether leading security or development, there are practical strategies to drive real change. This presentation will outline a shift in focus that can significantly improve the effectiveness of AppSec efforts.
Key takeaways include:
1. Turn developers from adversaries to allies.
2. Modify your controls to reflect reality and make compliance feel better
3. Put the effort of your finite resources to places that will have the greatest impact
4. Elevate your AppSec program to a level of excellence through effective developer engagement By rebalancing efforts across these pillars, organizations can move beyond traditional challenges and create a more sustainable, impactful AppSec strategy.
Embracing Fear and Overcoming Mistakes
1. Endpoint Controls - Join for a discussion on the challenges and the successes possible with adding endpoint controls as part of a cybersecurity posture
2. Secure your Non-Human Identities (NHIs) at the NY Summit with Silverfort
3. Architecting the AI-Enabled Enterprise
4. From Dr. No to Captain Yes: How CISOs Are Enabling Safe Employee AI Use
5. How Exposed Personal Data Creates Risk for Executives and Employees.
6. Dark Side of Digital Trust: The Case for Crypto-Agility
I thought the quality and mix of contributions and the engagement from the audience was excellent. It felt more like an interactive team exercise in some respects, than a sit back and listen conference, and for me was more enjoyable and genuinely helpful for that. Similar folks, passionate about their brands and their work, but with different best practice to share – very collaborative, which I personally like. So all good and thanks for the chance to take part. It’s always a drain on time, which none of us have, but it was worth it.
I just wanted to say congratulations on a great event and thank you all for your help, especially Kate and Tiffany who have spent time in advance and at the event with me to help me get the most out of the days here.I have really enjoyed the event, and made some good new contacts as well as insights into common challenges we are all facing in the CIO community. It’s been run superbly so thank you, and I look forward to the future events.
I thought the quality and mix of contributions and the engagement from the audience was excellent. It felt more like an interactive team exercise in some respects, than a sit back and listen conference, and for me was more enjoyable and genuinely helpful for that. Similar folks, passionate about their brands and their work, but with different best practice to share – very collaborative, which I personally like. So all good and thanks for the chance to take part. It’s always a drain on time, which none of us have, but it was worth it.
I just wanted to say congratulations on a great event and thank you all for your help, especially Kate and Tiffany who have spent time in advance and at the event with me to help me get the most out of the days here.I have really enjoyed the event, and made some good new contacts as well as insights into common challenges we are all facing in the CIO community. It’s been run superbly so thank you, and I look forward to the future events.
Participate in this Summit on our unique platform, learn from industry leaders, and network with peers. The benefits of attending are unmatched. Complimentary to qualified professionals and their team.
Copyright © 2021 GB intelligence inc
- all rights reserved