New York City
Discussing key topics such as the Cloud, Digital Transformation, Data & Analytics and the use of AI and IoT, the CISO Summit gives you the opportunity to meet leading decision-makers under one roof at one time, to be part of the discussions that are shaping the future of security and to network and develop contacts that will strengthen your business.
The program is driven by our senior-level Advisory Board including representatives from TNT, Henley Business School, Fox Networks Group, US Department of Defense and Wyndham Group.
The CISO Summit brings together leaders from across the public, large enterprises & mid-market sectors to provide you with a strategic and practical toolkit to help drive transformation including:
New York City
May 4 2023
360 View on Cybersecurity
Managing Cloud Risk without Slowing Application Delivery
Taming the API Threat Landscape
- Why API Security is on every CISO’s mind
- Typical API Security Challenges
- Best Practices for Tackling API Security
Building a Strong Hybrid Multicloud Foundation
The Next Frontier: Bridging the Gap Between Security information and Risk Insight
Traditional security models identify security events for investigation, and traditional governance, risk and compliance solutions help identify regulatory risk. They do not clearly identify how the events and changes in your configuration translate to a change in your risk posture.
This session will explore the migration of GRC industry to integrated risk management, the maturity lifecycle of integrated risk management capabilities, and how risk in real-time changes risk management from an academic activity to an active participant in providing confidence of firm protection.
Automating the Complexity Out of the Cloud
Finding the Leaky Data Links In Your Supply Chains - Data Security Beyond Perimeters
Ask yourself, where is the risk in sharing data with third parties? Is the risk the third party, or is the risk having your data leaked? The real danger is the exposure of your critical data by a Third Party. The leak being at a third party just makes it more challenging to locate. Instead of making third parties jump through long and sometimes unproductive audits, a new perspective is needed - a data risk first approach.
A data risk first approach focuses on locating whatever data matches your organization’s regardless of where it appears. By focusing on which data matches, you gain visibility and protection far beyond a company’s perimeter into third, fourth, and fifth parties. This increase in visibility frees cybersecurity teams from choosing which partners get monitoring.
You will learn:
- Why your risk is with the data, not third parties
- What is a data risk first approach
- How DRPS tools can assist in a data risk first approach
- How this approach will help you identify bad vendors and be a solution in the Trust but Verify Model
I just wanted to say congratulations on a great event and thank you all for your help, especially Kate and Tiffany who have spent time in advance and at the event with me to help me get the most out of the days here.I have really enjoyed the event, and made some good new contacts as well as insights into common challenges we are all facing in the CIO community. It’s been run superbly so thank you, and I look forward to the future events.
I thought the quality and mix of contributions and the engagement from the audience was excellent. It felt more like an interactive team exercise in some respects, than a sit back and listen conference, and for me was more enjoyable and genuinely helpful for that. Similar folks, passionate about their brands and their work, but with different best practice to share – very collaborative, which I personally like. So all good and thanks for the chance to take part. It’s always a drain on time, which none of us have, but it was worth it.
Participate in this Summit on our unique platform, learn from industry leaders, and network with peers. The benefits of attending are unmatched. Complimentary to qualified professionals and their team.