Event Description

Annual CISO Summit in New York City

Discussing key topics such as the Cloud, Digital Transformation, Data & Analytics and the use of AI and IoT, the CISO Summit gives you the opportunity to meet leading decision-makers under one roof at one time, to be part of the discussions that are shaping the future of security and to network and develop contacts that will strengthen your business.

The program is driven by our senior-level Advisory Board including representatives from TNT, Henley Business School, Fox Networks Group, US Department of Defense and Wyndham Group.

The CISO Summit brings together leaders from across the public, large enterprises & mid-market sectors to provide you with a strategic and practical toolkit to help drive transformation including:

  • A full day of leading CISO’s discussing the latest industry trends
  • Workshops, panel discussions & round table sessions led by visionaries within technology
  • First-hand case studies on the challenges facing IT
  • Fantastic networking opportunities with peers throughout the day
  • Over 150 Senior Level IT Directors
  • Keynotes, Interactive Round-tables, and Lively Panel Discussions
  • Industry-leading topics around IoT, AI, Cloud, etc.
  • Dedicated space and time for peer-to-peer networking with fellow industry leaders

New York City


June 20 2024

Event Schedule

clock icon

8:00 AM

Registration Opens / Breakfast

clock icon

09:00 AM

Welcome Remarks

clock icon

09:15 AM

Panel Discussion

Identity-first approach to cybersecurity

With the shift to distributed working models, SaaS application sprawl, and a rapidly evolving IT environment, it’s no surprise that organizations are now more susceptible to cyber attacks and threat actors. In the last year, 90% of organizations experienced an identity-related breach. Identity security has emerged as the new perimeter in the constantly changing world of cybersecurity. But barriers to strong identity security practices are often outdated tools, limited access to technical talent, a lack of executive sponsorship, or a constrained budget.

In this panel, we will discuss:

 - How to develop a compelling strategy and get executive board buy-in
 - How breaking down enterprise silos and aligning to the overall business strategy create a more resilient identity security program
 - How AI/ML can improve your identity security posture to adapt to changing environments, boost IT productivity, and stay ahead of security issues across the enterprise  
 - Key considerations needed to make well-informed, risk-based decisions about provisioning, verifying, and deprovisioning access to non-employees and managing access to unstructured data

clock icon

10:05 AM


Continuous and Compliant: Building the Future of Third Party Trust
In today’s world, CISOs shoulder the responsibility of managing an expanding roster of third-party vendors amidst heightened scrutiny of external risks. How can security leaders reliably assess and remediate vendor risk, against a backdrop of limited resources?

In this keynote, Matt Cooper, Director, GRC at Vanta, will share his view on the future of third party risk; one that prioritizes inside-out assessment of vendor risk, and is based on continuous monitoring rather than point-in-time checks. Join this session for a discussion on:

 - Challenges in assessing vendor risk

 - The future trajectory of third party risk management

 - Strategies to integrate these insights into your daily operations

clock icon

10:35 AM


Your Most Important Asset: Data - Is It Really Secure?

It is projected that by 2025 our global data volume will reach 181 zetabytes. Securing this
explosion of data is a top priority for enterprise leaders. In a recent Forrester Research study
commissioned by Cyera, security leaders said they expect the most transformational business
benefits to come from automating data security, specifically risk assessments, data discovery,
and classification. Additionally, 71% of security leaders said legacy technologies and manual
processes inhibit business success. Join Yotam Segev, Co-founder & CEO of Cyera, as he
leads a discussion on the importance of embracing automation and rapid time as critical tactics
for securing your organization’s most important asset.
Discussion topics will include:

 - The struggle to understand the data attack surface
 - How cloud, automation, and GenAI apps like Microsoft Copilot are changing the way
businesses interact with and share data - opening the door to data leakage
- New approaches to data security that ensure data compliance and improve the security
team’s ability to protect PII

clock icon

11:05 AM

Mingle Break

clock icon

11:30 AM

Panel Discussion

Technology and Leadership: Delivering Future Security Threat Prevention

clock icon

12:20 PM


clock icon

1:30 PM


Security Validation as the Heart of Exposure Management

To increase security readiness given today’s dynamic attack surfaces and diverse cyberthreats, security professionals need to move away from traditional vulnerability-centric methods to a new approach that identifies exploitable security exposures in their live IT environments. Gartner describes Exposure Management (EM) as a new framework that incorporates the adversary's view to continuously uncover exploitable security gaps, and prioritize remediation accordingly. One of the pillars of EM is security validation, which provides evidence of attackers’ possible achievements in the context of an organization’s deployed assets, configurations, and security controls. During this session, we will present a pragmatic approach to implementing an Exposure Management strategy, focusing on automated security

clock icon

2:00 PM

Panel Discussion

Embracing Fear and Overcoming Mistakes

clock icon

2:50 PM

Mingle Break

clock icon

3:20 PM

Mingle Break

clock icon

3:45 PM

Round Tables

1. Generative AI - 18 Months Under the Influence of Robots
2. You created or received an SBOM. Now what?
3. Navigating Emerging Threats: Strengthening Incident Response Capabilities
4. Why Your AI Strategy Is Only As Good As The Data Behind It
5. Securing Your Data in a Modern Enterprise
6. Elevating AppSec to a Board Level Discussion
7. Achieving Cyber Resilience with Commvault Cleanroom Recovery

clock icon

4:45 PM

Closing Remarks

clock icon

5:00 PM - 6:00 PM

Networking Cocktail Hour

Words from our attendees

I just wanted to say congratulations on a great event and thank you all for your help, especially Kate and Tiffany who have spent time in advance and at the event with me to help me get the most out of the days here.I have really enjoyed the event, and made some good new contacts as well as insights into common challenges we are all facing in the CIO community. It’s been run superbly so thank you, and I look forward to the future events.

Eric Poon - IT Director - Peloton

I thought the quality and mix of contributions and the engagement from the audience was excellent. It felt more like an interactive team exercise in some respects, than a sit back and listen conference, and for me was more enjoyable and genuinely helpful for that. Similar folks, passionate about their brands and their work, but with different best practice to share – very collaborative, which I personally like. So all good and thanks for the chance to take part. It’s always a drain on time, which none of us have, but it was worth it.

Scott Strickland - CIO - Wyndham

Join top decision makers from the leading Organizations in the Country


Are you interested in this event?

Participate in this Summit on our unique platform, learn from industry leaders, and network with peers. The benefits of attending are unmatched. Complimentary to qualified professionals and their team.