Where
New York City
Discussing key topics such as the Cloud, Digital Transformation, Data & Analytics and the use of AI and IoT, the CISO Summit gives you the opportunity to meet leading decision-makers under one roof at one time, to be part of the discussions that are shaping the future of security and to network and develop contacts that will strengthen your business.
The program is driven by our senior-level Advisory Board including representatives from TNT, Henley Business School, Fox Networks Group, US Department of Defense and Wyndham Group.
The CISO Summit brings together leaders from across the public, large enterprises & mid-market sectors to provide you with a strategic and practical toolkit to help drive transformation including:
Identity-first approach to cybersecurity
With the shift to distributed working models, SaaS application sprawl, and a rapidly evolving IT environment, it’s no surprise that organizations are now more susceptible to cyber attacks and threat actors. In the last year, 90% of organizations experienced an identity-related breach. Identity security has emerged as the new perimeter in the constantly changing world of cybersecurity. But barriers to strong identity security practices are often outdated tools, limited access to technical talent, a lack of executive sponsorship, or a constrained budget.
In this panel, we will discuss:
- How to develop a compelling strategy and get executive board buy-in
- How breaking down enterprise silos and aligning to the overall business strategy create a more resilient identity security program
- How AI/ML can improve your identity security posture to adapt to changing environments, boost IT productivity, and stay ahead of security issues across the enterprise
- Key considerations needed to make well-informed, risk-based decisions about provisioning, verifying, and deprovisioning access to non-employees and managing access to unstructured data
In this keynote, Matt Cooper, Director, GRC at Vanta, will share his view on the future of third party risk; one that prioritizes inside-out assessment of vendor risk, and is based on continuous monitoring rather than point-in-time checks. Join this session for a discussion on:
- Challenges in assessing vendor risk
- The future trajectory of third party risk management
- Strategies to integrate these insights into your daily operations
Your Most Important Asset: Data - Is It Really Secure?
It is projected that by 2025 our global data volume will reach 181 zetabytes. Securing this
explosion of data is a top priority for enterprise leaders. In a recent Forrester Research study
commissioned by Cyera, security leaders said they expect the most transformational business
benefits to come from automating data security, specifically risk assessments, data discovery,
and classification. Additionally, 71% of security leaders said legacy technologies and manual
processes inhibit business success. Join Yotam Segev, Co-founder & CEO of Cyera, as he
leads a discussion on the importance of embracing automation and rapid time as critical tactics
for securing your organization’s most important asset.
Discussion topics will include:
- The struggle to understand the data attack surface
- How cloud, automation, and GenAI apps like Microsoft Copilot are changing the way
businesses interact with and share data - opening the door to data leakage
- New approaches to data security that ensure data compliance and improve the security
team’s ability to protect PII
Technology and Leadership: Delivering Future Security Threat Prevention
Security Validation as the Heart of Exposure Management
To increase security readiness given today’s dynamic attack surfaces and diverse cyberthreats, security professionals need to move away from traditional vulnerability-centric methods to a new approach that identifies exploitable security exposures in their live IT environments. Gartner describes Exposure Management (EM) as a new framework that incorporates the adversary's view to continuously uncover exploitable security gaps, and prioritize remediation accordingly. One of the pillars of EM is security validation, which provides evidence of attackers’ possible achievements in the context of an organization’s deployed assets, configurations, and security controls. During this session, we will present a pragmatic approach to implementing an Exposure Management strategy, focusing on automated security
validation.
Embracing Fear and Overcoming Mistakes
1. Generative AI - 18 Months Under the Influence of Robots
2. You created or received an SBOM. Now what?
3. Navigating Emerging Threats: Strengthening Incident Response Capabilities
4. Why Your AI Strategy Is Only As Good As The Data Behind It
5. Securing Your Data in a Modern Enterprise
6. Elevating AppSec to a Board Level Discussion
7. Achieving Cyber Resilience with Commvault Cleanroom Recovery
I just wanted to say congratulations on a great event and thank you all for your help, especially Kate and Tiffany who have spent time in advance and at the event with me to help me get the most out of the days here.I have really enjoyed the event, and made some good new contacts as well as insights into common challenges we are all facing in the CIO community. It’s been run superbly so thank you, and I look forward to the future events.
I thought the quality and mix of contributions and the engagement from the audience was excellent. It felt more like an interactive team exercise in some respects, than a sit back and listen conference, and for me was more enjoyable and genuinely helpful for that. Similar folks, passionate about their brands and their work, but with different best practice to share – very collaborative, which I personally like. So all good and thanks for the chance to take part. It’s always a drain on time, which none of us have, but it was worth it.
Participate in this Summit on our unique platform, learn from industry leaders, and network with peers. The benefits of attending are unmatched. Complimentary to qualified professionals and their team.
Copyright © 2021 GB intelligence inc
- all rights reserved