
Annual CISO Summit in New York City
Discussing key topics such as the Cloud, Digital Transformation, Data & Analytics and the use of AI and IoT, the CISO Summit gives you the opportunity to meet leading decision-makers under one roof at one time, to be part of the discussions that are shaping the future of security and to network and develop contacts that will strengthen your business.
The program is driven by our senior-level Advisory Board including representatives from TNT, Henley Business School, Fox Networks Group, US Department of Defense and Wyndham Group.
The CISO Summit brings together leaders from across the public, large enterprises & mid-market sectors to provide you with a strategic and practical toolkit to help drive transformation including:
- A full day of leading CISO’s discussing the latest industry trends
- Workshops, panel discussions & round table sessions led by visionaries within technology
- First-hand case studies on the challenges facing IT
- Fantastic networking opportunities with peers throughout the day
- Over 150 Senior Level IT Directors
- Keynotes, Interactive Round-tables, and Lively Panel Discussions
- Industry-leading topics around IoT, AI, Cloud, etc.
- Dedicated space and time for peer-to-peer networking with fellow industry leaders
What to Expect
Networking
Meet and interact with verified solution providers and local IT leaders in an exclusive environment. Get to know your local community and share knowledge.
Trusted Meetings
Connect with trusted solutions and learn about avenues to overcome obstacles. You will hear from a variety of solution providers in a casual setting with dedicated time frames.
Peer to Peer Exclusivity
Network and problem solve over a private three course dinner. Debrief after the meetings, learn from your local peers, and share priorities.
Event Schedule
8:00 AM
Registration Opens / Breakfast
09:00 AM
Welcome Remarks

Panel Discussion
Shift from Problems to Value with Leadership and Technology
In today's dynamic cybersecurity landscape, ransomware and other cyber threats have become significant challenges for organizations. This session will focus on how businesses can move beyond reactive problem-solving to proactively creating value through effective leadership and innovative technology. By leveraging advanced cybersecurity strategies, fostering a culture of resilience, and aligning technology investments with organizational goals, leaders can transform the challenge of cyber threats into an opportunity to strengthen their security posture. Attendees will gain actionable insights to transition from addressing problems to driving value, ensuring their organizations remain secure and future.

10:05 AM
Keynote
Session highlights include:
-What business transformations are driving this change?
-Scaling data security and compliance initiatives with responsible AI
-Delivering better outcomes by aligning technologies, processes, and teams
-Practicing what we preach - Cyera securing Cyera

10:35 AM
Keynote
Rethinking the Relationship Between Cybersecurity Teams and the People They Protect
You’ve heard it all before: the DBIR tells you people are your biggest risk, phishing simulations tell you your users fall for social engineering, and simple security measures you deploy are sometimes met with howls of protest. But what if it didn’t have to be that way?
Join this session for a fresh perspective on: -Moving security alerts from the SOC to where users work -Protecting end users perception of security controls -Transforming security teams’ interactions with end users

11:05 AM
Mingle Break

11:30 AM
Panel Discussion
Is the future of the SOC autonomous? Examining practical applications of AI workflows within security operations
But is the hype real? And, perhaps more importantly, what does the ideal end result look like for security leaders aiming to future-proof operations in a way that best balances autonomous systems with human oversight? This panel, led by Tines Field CISO Matt Muller,will examine practical ways rapid innovations in AI and workflows are being implemented within security operations. Panel participants will also provide insights into what the future holds as both AI and overall enterprise security operations continue to evolve and modernize.
This session will be filled with expert insights and actionable takeaways to help inform future AI investments within security operations.
What Will You Learn?
- Insights on practical applications of AI within security operations
- How security operations will continue to evolve with increased investments in workflows and AI
- Best practices on how to effectively identify areas within your security operations that can be handled autonomously and what requires human involvement

12:20 PM
Lunch

1:30 PM
Keynote
From Adversaries to Allies: Developers and AppSec, a Love-Hate-Love Relationship
For nearly two decades, observations across hundreds of AppSec programs have revealed striking similarities. The effectiveness of these programs is often hindered by common misconceptions about the true goals of AppSec and the outcomes that should be prioritized. In general, we find too much, fix too little, and do almost nothing to prevent new vulnerabilities. We have built a world where we attempt to report and goal our way to victory. How's that working for us? We need to rebalance our efforts across these three pillars and put the emphasis where it belongs. The accumulation of security debt is burying us all under a mountain of exception processing and annual recertification. Stop the madness! Whether leading security or development, there are practical strategies to drive real change. This presentation will outline a shift in focus that can significantly improve the effectiveness of AppSec efforts.
Key takeaways include:
1. Turn developers from adversaries to allies.
2. Modify your controls to reflect reality and make compliance feel better
3. Put the effort of your finite resources to places that will have the greatest impact
4. Elevate your AppSec program to a level of excellence through effective developer engagement By rebalancing efforts across these pillars, organizations can move beyond traditional challenges and create a more sustainable, impactful AppSec strategy.

2:00 PM
Panel Discussion
The Next Era: Key Considerations for Securely Productizing AI in the Enterprise
As artificial intelligence rapidly transitions from theoretical concept to practical enterprise solution, organizations face a critical juncture: how to effectively and securely integrate AI capabilities into their product offerings and operational frameworks. This session will move beyond the general impact of AI on the IT landscape to focus on the tangible, immediate considerations for CISOs and their teams. We will explore the essential security, governance, and ethical frameworks required to successfully productize AI, addressing challenges such as data privacy, model integrity, intellectual property, and the evolving threat landscape. Attendees will gain actionable insights into building resilient AI strategies that prioritize security from design to deployment, ensuring that innovation is coupled with robust protection.
Community Program Manager
for inquiries related to this community, please reach out to your dedicated contact.
