Annual CISO Summit in New York City

Discussing key topics such as the Cloud, Digital Transformation, Data & Analytics and the use of AI and IoT, the CISO Summit gives you the opportunity to meet leading decision-makers under one roof at one time, to be part of the discussions that are shaping the future of security and to network and develop contacts that will strengthen your business.

The program is driven by our senior-level Advisory Board including representatives from TNT, Henley Business School, Fox Networks Group, US Department of Defense and Wyndham Group.

The CISO Summit brings together leaders from across the public, large enterprises & mid-market sectors to provide you with a strategic and practical toolkit to help drive transformation including:

  • A full day of leading CISO’s discussing the latest industry trends
  • Workshops, panel discussions & round table sessions led by visionaries within technology
  • First-hand case studies on the challenges facing IT
  • Fantastic networking opportunities with peers throughout the day
  • Over 150 Senior Level IT Directors
  • Keynotes, Interactive Round-tables, and Lively Panel Discussions
  • Industry-leading topics around IoT, AI, Cloud, etc.
  • Dedicated space and time for peer-to-peer networking with fellow industry leaders

What to Expect

Networking

Meet and interact with verified solution providers and local IT leaders in an exclusive environment. Get to know your local community and share knowledge.

Trusted Meetings

Connect with trusted solutions and learn about avenues to overcome obstacles. You will hear from a variety of solution providers in a casual setting with dedicated time frames.

Peer to Peer Exclusivity

Network and problem solve over a private three course dinner. Debrief after the meetings, learn from your local peers, and share priorities.

Event Schedule

clock icon

7:30 AM

Registration Opens / Breakfast / Welcome Remarks

clock icon

8:30 AM

Keynote

How to get away with Cybercrime

We often talk about threats in terms of dollars lost, data stolen, or headlines made. But the real threat lives deeper—in the structure, the strategy, and the growing ambition of the actors behind the screen. Today’s cybercriminals don’t just encrypt files; they build economies, launder, influence, and forge alliances that stretch across borders and industries. In this talk, we’ll peel back the layers of modern cybercrime and explore how loosely affiliated hackers have evolved into organized syndicates. These groups operate more like multinational corporations than rogue disruptors—complete with HR departments, recruitment pipelines, insider relationships, and state protections.

clock icon

09:00 AM

Keynote

Know Thy Data: Data Security Posture Management (DSPM) in the Age of AI

Artificial intelligence is rapidly becoming embedded across the enterprise—yet most organizations still lack a clear understanding of where their sensitive data resides, who can access it, and how it is being used. While Data Security Posture Management (DSPM) has emerged as a critical capability, many DSPM programs introduce dangerous blind spots by operating independently from identity governance. The result is sensitive data exposed through over-privileged accounts, orphaned access rights, and misaligned entitlements. As AI systems consume massive volumes of structured and unstructured data, these gaps significantly amplify security, privacy, and compliance risks. Although organizations are making progress in data discovery and classification, they often fail to correlate data sensitivity with identity access—undermining both data protection and responsible AI adoption. In the age of AI, knowing where your data lives is no longer enough—you must understand who can access it, why, and how AI will use it. This session examines how AI:    -  Amplifies data risk and enhances DSPM, from intelligent classification and contextual risk scoring to automated remediation. - Must leverage concepts such as data access governance through identity management, privileged access, behavior analytics, and threat intelligence. - Requires a robust defense-in-depth to ensure regulatory compliance, mitigate insider threats, defend against sophisticated cyberattacks, and enhance incident response.

clock icon

9:30 AM

Panel Discussion

SDLC's Immortality Bias

Decommissioning is the most overlooked phase of the software development lifecycle. This panel reframes it as a critical governance responsibility. Security leaders will examine how organizations manage end-of-life systems securely, build cross-functional accountability, and reduce compliance and audit risks without requiring deep technical expertise. Risk is not an event; it is an echo, the continued reverberation of decisions taken long ago.

clock icon

10:20 AM

Keynote

Security - The Third Pillar of Mobile App Experience

As we know, mobile apps have become a key tool to engaging customers and driving loyalty. Everyone wants to stay ahead of the competition with a great mobile experience. Ideally you want to make an app with a great UX, an app that is responsive and performs fast with all the features that users need. In reality, mobile app developers are juggling between speed, user experience and security. Security is a challenge… you hire your mobile app developers to create the mobile app, but mobile app developers are not necessarily security engineers. The functionality and user experience are a priority for them, but not always the security. So by adding more and more to the app, the app becomes more vulnerable and a bigger source of weakness. Let’s discuss this situation, the security risks that exist for mobile apps and practical steps to help your mobile engineering teams achieve the right balance.

clock icon

10:50 AM

Keynote

Securely Embrace the Agentic Channel

AI agents are rapidly becoming the next digital actors - researching, deciding, and transacting on behalf of customers. In fact, your next multi-million-dollar customer could be an AI agent. In this forward-looking session, Ping Identity explores how the rise of the Agentic Channel is reshaping commerce and customer experience—and what organizations must do to stay ahead. Learn how to securely enable AI agents with modern identity, governance, and authorization controls while protecting against emerging risks. Discover how to: Embrace AI agents as a new digital channel for growth, Deliver seamless, trusted agent-driven experiences, Prevent disintermediation and maintain customer relationships, Secure agentic identities with strong authentication, authorization, and governance, Join us to understand how identity is the foundation of trust in the age of AI - and how your organization can confidently engage the agentic future.

clock icon

11:20 AM

Mingle Break

clock icon

11:45 AM

Panel Discussion

Securing Enterprise AI: Governing Data Exposure Without Slowing Innovation

Governing Data Exposure Without Slowing Innovation As AI adoption accelerates across copilots, custom LLMs, and SaaS platforms, CISOs must strike a balance between enabling innovation and preventing unintended data exposure. This discussion explores how leading security teams are implementing AI governance frameworks that provide visibility, risk-based controls, and runtime protection without becoming the bottleneck to transformation. 

clock icon

12:35 PM

Lunch

clock icon

1:45 PM

Keynote

Breaking the Black Box: How Modern CISOs Are Turning Email Security Into a Strategic Advantage

Discover how forward-thinking CISOs are breaking free from opaque, vendor-dependent email security and building transparent, automated systems that reduce risk, eliminate manual triage, and create a compelling board-level AI story.

Community Program Manager

for inquiries related to this community, please reach out to your dedicated contact.

Stacie Cagney
Community Program Manager (214) 326-9110 stacie.cagney@evanta.com

What Our Clients Say

Words From Our Attendees

I just wanted to say congratulations on a great event and thank you all for your help, especially Kate and Tiffany who have spent time in advance and at the event with me to help me get the most out of the days here.I have really enjoyed the event, and made some good new contacts as well as insights into common challenges we are all facing in the CIO community. It’s been run superbly so thank you, and I look forward to the future events.
Eric Poon - IT Director - Peloton

Words From Our Attendees

I thought the quality and mix of contributions and the engagement from the audience was excellent. It felt more like an interactive team exercise in some respects, than a sit back and listen conference, and for me was more enjoyable and genuinely helpful for that. Similar folks, passionate about their brands and their work, but with different best practice to share – very collaborative, which I personally like. So all good and thanks for the chance to take part. It’s always a drain on time, which none of us have, but it was worth it.
Scott Strickland - CIO - Wyndham

Are you interested in this event?

Participate in this Summit on our unique platform, learn from industry leaders, and network with peers. The benefits of attending are unmatched. Complimentary to qualified professionals and their team.

Sign up to make an impact and hear about our upcoming events