Event Description

Annual CISO Summit in New York City

Discussing key topics such as the Cloud, Digital Transformation, Data & Analytics and the use of AI and IoT, the CISO Summit gives you the opportunity to meet leading decision-makers under one roof at one time, to be part of the discussions that are shaping the future of security and to network and develop contacts that will strengthen your business.

The program is driven by our senior-level Advisory Board including representatives from TNT, Henley Business School, Fox Networks Group, US Department of Defense and Wyndham Group.

The CISO Summit brings together leaders from across the public, large enterprises & mid-market sectors to provide you with a strategic and practical toolkit to help drive transformation including:

  • A full day of leading CISO’s discussing the latest industry trends
  • Workshops, panel discussions & round table sessions led by visionaries within technology
  • First-hand case studies on the challenges facing IT
  • Fantastic networking opportunities with peers throughout the day
  • Over 150 Senior Level IT Directors
  • Keynotes, Interactive Round-tables, and Lively Panel Discussions
  • Industry-leading topics around IoT, AI, Cloud, etc.
  • Dedicated space and time for peer-to-peer networking with fellow industry leaders
Where

New York City

When

June 20 2024

Event Schedule

clock icon

8:00 AM

Registration Opens / Breakfast

clock icon

09:00 AM

Welcome Remarks

clock icon

09:15 AM

Panel Discussion

Managing Identity in a Modern World

Security leaders need simplified, standardized processes and improved visibility to establish an environment of collaboration, streamlined access management and a dynamic, accurate understanding of how their identity programs are securing their organizations against cybersecurity threats. The goal? To get insights into potential security risks occurring today as well as those on the horizon, and to make better access decisions that keep their organizations safe and productive.

In this panel, we will discuss:

 - Why a strong authentication and authorization strategy is essential
 - Why organizations must extend identity security to cloud infrastructure to govern enterprise cloud entitlements
 - Key considerations needed to make well-informed, risk-based decisions about provisioning, verifying, and deprovisioning access to non-employees
 - How AI/ML can improve your identity security posture to adapt to changing environments, boost IT productivity, and stay ahead of security issues across the enterprise
 - Assessing the maturity of your own identity program

clock icon

10:05 AM

Keynote

How AI can accelerate compliance and security in enterprise cloud environments

While generative AI has introduced new challenges and risks, it also presents transformational opportunities for enterprises to security and compliance.

IT and business leaders globally recognize the potential. According to Vanta’s State of Trust Report, 77% already or plan to use AI and machine learning to detect high-risk actions, unsecured cloud storage, unassigned compliance responsibilities, or unrevoked access privileges.

In this keynote, Chase Lee, Enterprise GM at Vanta, will cover the current landscape of enterprise cloud security and compliance, how AI is making the problem worse, and what leaders can do about it with the help of AI. He’ll dive into how AI can improve security and streamline compliance processes as well as practical considerations for effectively integrating AI.

Join this session to learn:
 - Common challenges in enterprise cloud security & compliance
 - Ways to use AI to enhance cloud security & manage compliance
 - Best practices for integrating AI safely and responsibly

clock icon

10:35 AM

Keynote

Security Validation as the Heart of Exposure Management

To increase security readiness given today’s dynamic attack surfaces and diverse
cyberthreats, security professionals need to move away from traditional vulnerability-centric
methods to a new approach that identifies exploitable security exposures in their live IT
environments. Gartner describes Exposure Management (EM) as a new framework that
incorporates the adversary view to continuously uncover exploitable security gaps, and
prioritize remediation accordingly. One of the pillars of EM is security validation, which provides
evidence of attackers’ possible achievements in the context of an organization’s deployed
assets, configurations, and security controls. During this session, we will present a pragmatic
approach to implementing an Exposure Management strategy, focusing on automated security
validation.

clock icon

11:05 AM

Mingle Break

clock icon

11:30 AM

Panel Discussion

Technology and Leadership: Delivering Future Security Threat Prevention

clock icon

12:20 PM

Lunch

clock icon

1:30 PM

Keynote

Enhancing Ransomware Resilience and Data Recovery with Cohesity and AWS

Today, organizations face escalating challenges with ransomware attacks and the critical need for robust data protection and recovery solutions. Cohesity, in partnership with AWS, offers advanced data protection services like DataProtect, FortKnox, and DataHawk, all while leveraging AWS's secure storage options and Cohesity's expertise in ransomware protection and recovery. Organizations stand to benefit from integrating Cohesity's data management capabilities with AWS's scalable and secure cloud infrastructure to provide a comprehensive, resilient, and cost-effective solution for modern data protection needs. This synergy ensures businesses can rapidly recover from ransomware attacks while maintaining data integrity and compliance.

clock icon

2:00 PM

Panel Discussion

Embracing Fear and Overcoming Mistakes

clock icon

2:50 PM

Mingle Break

clock icon

3:20 PM

Mingle Break

clock icon

3:45 PM

Round Tables

1. Generative AI - 18 Months Under the Influence of Robots
2. You created or received an SBOM. Now what?
3. Navigating Emerging Threats: Strengthening Incident Response Capabilities
4. Why Your AI Strategy Is Only As Good As The Data Behind It
5. Securing Your Data in a Modern Enterprise
6. Elevating AppSec to a Board Level Discussion
7. Achieving Cyber Resilience with Commvault Cleanroom Recovery

clock icon

4:45 PM

Closing Remarks

clock icon

5:00 PM - 6:00 PM

Networking Cocktail Hour

Words from our attendees

I just wanted to say congratulations on a great event and thank you all for your help, especially Kate and Tiffany who have spent time in advance and at the event with me to help me get the most out of the days here.I have really enjoyed the event, and made some good new contacts as well as insights into common challenges we are all facing in the CIO community. It’s been run superbly so thank you, and I look forward to the future events.

Eric Poon - IT Director - Peloton

I thought the quality and mix of contributions and the engagement from the audience was excellent. It felt more like an interactive team exercise in some respects, than a sit back and listen conference, and for me was more enjoyable and genuinely helpful for that. Similar folks, passionate about their brands and their work, but with different best practice to share – very collaborative, which I personally like. So all good and thanks for the chance to take part. It’s always a drain on time, which none of us have, but it was worth it.

Scott Strickland - CIO - Wyndham

Join top decision makers from the leading Organizations in the Country

 

Are you interested in this event?

Participate in this Summit on our unique platform, learn from industry leaders, and network with peers. The benefits of attending are unmatched. Complimentary to qualified professionals and their team.