
Annual CISO Summit in New York City
Discussing key topics such as the Cloud, Digital Transformation, Data & Analytics and the use of AI and IoT, the CISO Summit gives you the opportunity to meet leading decision-makers under one roof at one time, to be part of the discussions that are shaping the future of security and to network and develop contacts that will strengthen your business.
The program is driven by our senior-level Advisory Board including representatives from TNT, Henley Business School, Fox Networks Group, US Department of Defense and Wyndham Group.
The CISO Summit brings together leaders from across the public, large enterprises & mid-market sectors to provide you with a strategic and practical toolkit to help drive transformation including:
- A full day of leading CISO’s discussing the latest industry trends
- Workshops, panel discussions & round table sessions led by visionaries within technology
- First-hand case studies on the challenges facing IT
- Fantastic networking opportunities with peers throughout the day
- Over 150 Senior Level IT Directors
- Keynotes, Interactive Round-tables, and Lively Panel Discussions
- Industry-leading topics around IoT, AI, Cloud, etc.
- Dedicated space and time for peer-to-peer networking with fellow industry leaders
What to Expect
Networking
Meet and interact with verified solution providers and local IT leaders in an exclusive environment. Get to know your local community and share knowledge.
Trusted Meetings
Connect with trusted solutions and learn about avenues to overcome obstacles. You will hear from a variety of solution providers in a casual setting with dedicated time frames.
Peer to Peer Exclusivity
Network and problem solve over a private three course dinner. Debrief after the meetings, learn from your local peers, and share priorities.
Event Schedule
7:30 AM
Registration Opens / Breakfast / Welcome Remarks
8:30 AM
Keynote
How to get away with Cybercrime
We often talk about threats in terms of dollars lost, data stolen, or headlines made. But the real threat lives deeper—in the structure, the strategy, and the growing ambition of the actors behind the screen. Today’s cybercriminals don’t just encrypt files; they build economies, launder, influence, and forge alliances that stretch across borders and industries. In this talk, we’ll peel back the layers of modern cybercrime and explore how loosely affiliated hackers have evolved into organized syndicates. These groups operate more like multinational corporations than rogue disruptors—complete with HR departments, recruitment pipelines, insider relationships, and state protections.

Keynote
Know Thy Data: Data Security Posture Management (DSPM) in the Age of AI
Artificial intelligence is rapidly becoming embedded across the enterprise—yet most organizations still lack a clear understanding of where their sensitive data resides, who can access it, and how it is being used. While Data Security Posture Management (DSPM) has emerged as a critical capability, many DSPM programs introduce dangerous blind spots by operating independently from identity governance. The result is sensitive data exposed through over-privileged accounts, orphaned access rights, and misaligned entitlements. As AI systems consume massive volumes of structured and unstructured data, these gaps significantly amplify security, privacy, and compliance risks. Although organizations are making progress in data discovery and classification, they often fail to correlate data sensitivity with identity access—undermining both data protection and responsible AI adoption. In the age of AI, knowing where your data lives is no longer enough—you must understand who can access it, why, and how AI will use it. This session examines how AI: - Amplifies data risk and enhances DSPM, from intelligent classification and contextual risk scoring to automated remediation. - Must leverage concepts such as data access governance through identity management, privileged access, behavior analytics, and threat intelligence. - Requires a robust defense-in-depth to ensure regulatory compliance, mitigate insider threats, defend against sophisticated cyberattacks, and enhance incident response.

9:30 AM
Panel Discussion
SDLC's Immortality Bias
Decommissioning is the most overlooked phase of the software development lifecycle. This panel reframes it as a critical governance responsibility. Security leaders will examine how organizations manage end-of-life systems securely, build cross-functional accountability, and reduce compliance and audit risks without requiring deep technical expertise. Risk is not an event; it is an echo, the continued reverberation of decisions taken long ago.

10:20 AM
Keynote
Security - The Third Pillar of Mobile App Experience
As we know, mobile apps have become a key tool to engaging customers and driving loyalty. Everyone wants to stay ahead of the competition with a great mobile experience. Ideally you want to make an app with a great UX, an app that is responsive and performs fast with all the features that users need. In reality, mobile app developers are juggling between speed, user experience and security. Security is a challenge… you hire your mobile app developers to create the mobile app, but mobile app developers are not necessarily security engineers. The functionality and user experience are a priority for them, but not always the security. So by adding more and more to the app, the app becomes more vulnerable and a bigger source of weakness. Let’s discuss this situation, the security risks that exist for mobile apps and practical steps to help your mobile engineering teams achieve the right balance.

10:50 AM
Keynote
Securely Embrace the Agentic Channel
AI agents are rapidly becoming the next digital actors - researching, deciding, and transacting on behalf of customers. In fact, your next multi-million-dollar customer could be an AI agent. In this forward-looking session, Ping Identity explores how the rise of the Agentic Channel is reshaping commerce and customer experience—and what organizations must do to stay ahead. Learn how to securely enable AI agents with modern identity, governance, and authorization controls while protecting against emerging risks. Discover how to: Embrace AI agents as a new digital channel for growth, Deliver seamless, trusted agent-driven experiences, Prevent disintermediation and maintain customer relationships, Secure agentic identities with strong authentication, authorization, and governance, Join us to understand how identity is the foundation of trust in the age of AI - and how your organization can confidently engage the agentic future.

11:20 AM
Mingle Break

11:45 AM
Panel Discussion
Securing Enterprise AI: Governing Data Exposure Without Slowing Innovation
Governing Data Exposure Without Slowing Innovation As AI adoption accelerates across copilots, custom LLMs, and SaaS platforms, CISOs must strike a balance between enabling innovation and preventing unintended data exposure. This discussion explores how leading security teams are implementing AI governance frameworks that provide visibility, risk-based controls, and runtime protection without becoming the bottleneck to transformation.

12:35 PM
Lunch

1:45 PM
Keynote
Breaking the Black Box: How Modern CISOs Are Turning Email Security Into a Strategic Advantage
Discover how forward-thinking CISOs are breaking free from opaque, vendor-dependent email security and building transparent, automated systems that reduce risk, eliminate manual triage, and create a compelling board-level AI story.
Community Program Manager
for inquiries related to this community, please reach out to your dedicated contact.
