
New York CISO Virtual Executive Summit
June 1, 2021 | 7:45am - 3:00pm EDT
June 1, 2021 | 7:45am - 3:00pm EDT
Collaborate with your peers
Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the New York CISO Virtual Executive Summit.
Join your peers to discuss the most critical issues impacting CISOs today:
Accelerating security to match the pace of digital business initiatives
Managing the risk created from a landscape of new core technologies
Achieving sustainability for the CISO role without compromising outcomes
Governing Body Co-Chairs

Zouhair Guelzim
L'Oreal USA
VP & CISO

Tomas Maldonado
National Football League
CISO

Tod Mitchinson
New York Life
VP & CISO

Michael Palmer
Hearst
Chief Information Security Officer

Eric Staffin
IHS Markit
Partner and Senior Vice President, Chief Information Security Officer

Kylie Watson
Sumitomo Mitsui Banking Corporation
CISO

Teresa Zielinski
GE Power
Senior VP, Chief Information Security Officer & Product Security
What to Expect
Connect with your CISO community through a variety of different session formats at the upcoming Virtual Executive Summit. You'll have the opportunity to listen, engage and create lasting relationships with like-minded peers.
Meet the Speakers
Don't miss this opportunity to meet with CISO practitioners and industry thought leaders who shared their insights on the agenda. Come with questions and get ready to meet new friends in this casual session designed to foster peer connections and collaboration in the New York community.
Agenda
June 1, 2021
11:00am - 12:00pm EDT Virtual Summit Boardroom
Managing and Responding to Insider Risk
Hosted by Code42

Dave Capuano
SVP Product
Code42

Ankur Ahuja
Vice President and Global CISO
Fareportal

James Beeson
Vice President & Chief Information Security Officer
Cigna

Lauren Dana Rosenblatt
VP, CISO
International Flavors & Fragrances
Organizations are moving faster than ever before. With employees creating, modifying, deleting, and transporting data every second, how can CISOs keep up as job hopping and turnover rates continue to rise?
Join this boardroom to discuss:
- Ways to cut through the false noise and final real risk within your organization
- How to determine the right approach to insider risk response
- Strategies to continuously monitor file activity without being invasive
11:00am - 12:00pm EDT Virtual Summit Boardroom
Reducing Security Debt with the Right Tools and Strategies
Hosted by Duo Security

Dave Lewis
Global Advisory CISO
Duo Security

Michael Cena
Vice President, Head of Cyber Security
A+E Networks

Kylie Watson
CISO
Sumitomo Mitsui Banking Corporation
Security debt, defined by Dave Lewis, Global Advisory CISO, Duo Security at Cisco, as “the accumulation of the patches missed, the risks accepted, and the configurations misapplied,” is another serious and common problem for many organizations, especially with the move to cloud computing and rise of IoT. CISOs need solutions that will successfully protect their systems and information. Selecting the right tools and strategies is the key to success with these issues.
Join this session to discuss:
- Prudent approaches to right-size the balance of security controls and agile access
- Ways your peers discuss strategy for trust and access with other senior leaders
- How to create defined and repeatable processes with plans for action to eliminate security debt
11:00am - 12:00pm EDT Virtual Summit Boardroom
Rethink Vulnerability Management via Exposure Risk
Hosted by Skybox Security

Haggai Polak
Chief Product Officer
Skybox Security

Rod Aday
Director, Information Risk Management
Verizon

Leon Flaksin
Head of Information Risk Management
BlackRock Inc
With 18,341 new vulnerabilities discovered in 2020, every year there are more and more vectors of potential cyberattacks into your organization. Vulnerabilities are ‘gateways’ for cyber threat actors to exploit and leverage to break into your networks, move around laterally, exfiltrate sensitive data and even launch a ransomware attack.
Join your peers and Skybox Security where we will explore:
- What is needed to establish more effective vulnerability management programs
- Eye-opening realities and trends regarding the expansion of vulnerabilities
- Ways for you to eliminate exposure risk in the most effective and efficient way possible
11:00am - 12:00pm EDT Virtual Summit Boardroom
Auto-Takedowns — The Essential Tool for Security Automation
Hosted by Bolster.ai

Shashi Prakash
CTO and Chief Scientist
Bolster.ai

Doug Greene
Vice President, Chief Information Security Officer
Guardian Life Insurance

Brian Lozada
CISO
HBO Max
Security teams continue to wrestle with a range of external threats affecting customers, employees and supply chains. New AI and automation capabilities can shorten detection times to milliseconds, and takedown times to minutes. Does this sound like magic?
Join us in this roundtable peer discussion to explore:
- Key challenges and pain points from the real world examples
- The current role of AI and automation technology for detection
- Auto-takedown processes and how they can benefit your organization
11:00am - 12:00pm EDT Virtual Summit Boardroom
The Evolving Threat Landscape – Protect Your Privileges
Hosted by BeyondTrust

Robert Dalrymple
AVP & Chief Information Security Officer
Montefiore

Raj Sargule
Global Head of Information Security
Christie's

Morey Haber
Chief Technology Officer, Chief Information Security Officer
BeyondTrust
Agencies and organizations have suffered a record-breaking number of cyberattacks over the past year. It seems that every week we see new headlines highlighting large-scale ransomware attacks or data breaches. With the explosion of privileged accounts, unpatched vulnerabilities, and a growing remote workforce, Privileged Access Management (PAM) must be an important cornerstone when developing a strategy to secure IT, IoT or OT systems.
Join this interactive peer-discussion and explore:
- The evolving threat landscape and ways to improve remote workforce security
- Why privilege management plays an increasingly crucial role in mitigating cyberattacks and protecting critical infrastructure
- The principal of least privilege
12:00pm - 12:45pm EDT Virtual Summit Keynote
Security Doesn’t Live on Paper — An Interactive Crisis Simulation
Hosted by Immersive Labs

Tony Chryseliou
Senior Manager Global Information Security
Sony

James Hadley
CEO
Immersive Labs
When the worst happens not even the best incident response plans can account for the human element. You might know how your tech will work under pressure but what about you and your people? In this interactive keynote session, you’ll use your decision-making skills to find the threat and manage the growing crisis.
Join this session to:
- See the real time impact of the human element in crisis management and response
- Gain a greater understanding of how decisions in a threat scenario have a business-wide impact
- Discover how to strengthen your organization on both sides of “the boom”, so it’s as ready before the impact as it is after it
12:45pm - 1:15pm EDT Networking
Meet the Speakers

Jeff Brown
CISO
State of Connecticut
Don't miss this opportunity to meet with New York practitioners and industry thought leaders who shared their insights on the agenda. Come with questions and get ready to meet new friends in this casual session designed to foster peer connections and collaboration in the CISO community.
1:15pm - 1:30pm EDT Break
7:45am - 8:45am EDT Virtual Summit Keynote
Interactive Innovation Spotlight
Hosted by YL Ventures

John Brennan
Partner
YL Ventures

Yaniv Bar-Dayan
CEO & Founder
Vulcan

Avi Shua
CEO & Co-Founder at Orca Security
Orca Security

Ronen Slavin
CTO & Co-Founder
Cycode
Be among the first to see what’s new and next in the security solutions landscape. Three early-stage providers will get the chance to showcase their innovative solutions to the most pressing cybersecurity challenges.
Join this boardroom-style keynote session to ask questions, learn and explore:
- Vulcan’s risk analytics and remediation orchestration
- If there was one thing you could change about the way you prioritize and remediate security vulnerabilities in your environment, what would it be?
- How well does your team work with IT stakeholders (application, cloud, network, infra, etc.) to drive remediation outcomes, and reduce risk for the business?
- Cycode’s access control and configuration management
- Does your security team have the visibility and control that it needs to secure development tools and infrastructures like source control management, build systems, and the cloud environment? If not, what are your unmet needs?
- Where does reducing code tampering risk sit on your priority list? What are your key initiatives to reduce code tampering risk and what are the biggest gaps that you're trying to solve for?
- Orca Security’s cloud security risk detection in your cloud environment
- What is your first impression of an agentless cloud native security platform?
- If you could change one thing about how you track asset inventory, what would it be?
8:45am - 9:00am EDT Break
9:00am - 10:00am EDT Virtual Summit Boardroom
Merging Zero Trust And SASE
Hosted by Cloudflare

Joe Sullivan
SVP, Chief Security Officer
Cloudflare

Robert Brown
CISO
Federal Home Loan Bank of New York

Teresa Zielinski
Senior VP, Chief Information Security Officer & Product Security
GE Power
Organizations are feeling a shift in the world of networking and security as they rapidly adopt and embrace the cloud. Enterprises need efficiency, visibility and security without compromise. The secure access service edge, better known as SASE, and zero trust implementations can provide a more comprehensive security capability to truly support digital transformation.
In this session, you will discuss:
- Problems SASE can address in the modern enterprise
- Benefits of planning both SASE and zero trust implementations
- How to best position your organization for this transition
9:00am - 10:00am EDT Virtual Summit Boardroom
Fostering Innovation in the World of Risk Aversion
Hosted by Devo

Steve Magny
Director Cybersecurity Solutions
Devo

Orrie Dinstein
Global Chief Privacy Officer
Marsh & McLennan

Stephen Garcia
VP of Cybersecurity
FanDuel
In cybersecurity, the goal is to minimize risk. However, adversaries are agile in their efforts to subvert security measures and innovation is required to keep pace with the evolving threat landscape. What must CISOs do to run an efficient SOC while still mitigating risk?
Join this this session to discuss:
- The biggest risks in cyber today
- Attacks that have resulted in reactive or proactive changes
- Strategies to drive innovation in your program
9:00am - 10:00am EDT Virtual Summit Boardroom
Securing the Sprawling Endpoint
Hosted by VMware Carbon Black

David Balcar
Security Strategist
VMware Carbon Black

Patricia Hinerman
Chief Information Security Officer
Interpublic Group of Companies

Stephen Savard
Director of Information Technologies
ICC Industries Inc
The global health pandemic has forced CISOs into a new era of evolving challenges. With fully remote workforces and assets continuously moving to the cloud, securing endpoint protection has never been more critical. So how are CISOs deploying next-generation endpoint protection to solve these obstacles?
Join this interactive session to discuss:
- Securing critical applications even in a state of compromise
- Tactics for monitoring a sprawling attack surface
- Leveraging new technologies to quantify threats
9:00am - 10:00am EDT Virtual Summit Boardroom
Strengthening Your Security Operations Center
Hosted by Micro Focus

Robert Aragao
Chief Security Strategist, Security Risk & Governance
Micro Focus

Tod Mitchinson
VP & CISO
New York Life

Tim Rohrbaugh
CISO
JetBlue Airways
When it comes to taking your data from you, cyber criminals never rest. If they can’t get in one way, they will try another. Therefore, when managing incidents for your enterprise, it is critical to ensure that threats and attacks are properly identified, analyzed, communicated, defended, investigated and reported.
During this boardroom discussion on cyber operations, discover:
- How to develop effective principles and procedures for security operations centers
- The best way to identify events and incidents in the environment
- How to create effective communication and reporting strategies for the entire organization
9:00am - 10:00am EDT Virtual Summit Boardroom
Optimizing Cloud Data Security
Hosted by Altitude Networks

Michael Coates
CEO & Co-Founder
Altitude Networks

Arvin Bansal
Sr. Director Data & Cloud Security
AmerisourceBergen

Bobby Edamala
Chief Information Security Officer
Cornell University
Protecting your valuable data assets is the foundation of any security strategy. But in today's rapidly evolving digital business world, there are an increasing number of entry points that may allow unauthorized access to your critical data in the cloud. How is your organization prioritizing high-risk activity and automating policies to protect data in real-time without interrupting workforce productivity?
Join this discussion to explore:
- Building a comprehensive data management strategy that encompasses the unique elements of cloud SaaS
- How to avoid potential pitfalls while safely enabling innovative solutions
- Accelerating cloud data protection capabilities while maximizing potential to achieve governance, security and productivity goals
10:00am - 10:45am EDT Virtual Summit Keynote
Taking Control in the Cloud
Hosted by IBM

Jeff Crume
Distinguished Engineer, CTO IBM Security - Americas IBM Master Inventor, Academy of Technology Member
IBM

Mikhail Falkovich
Director of IT, Information Security
Consolidated Edison Company
Are you challenged with uncontrolled costs and unknown risks from your adoption of cloud services? Concerned with whether your IaaS investments are endangering your security or compliance? Or perhaps you’re just watching your budget disappear seemingly on its own. You are not alone.
Join your peers for a discussion around:
- Optimizing the cost of the cloud
- Improving security, compliance and governance in cloud architectures
- Leveraging the resources and controls you already have
By registering for this session, this serves as your authorization to Evanta or its vendor to provide your contact information to IBM to follow up on your interaction and participation. IBM’s use of your contact information is governed by the IBM Privacy Policy. If you need more information on how IBM is using your personal data you may refer to the IBM Privacy Statement. To withdraw your marketing consent and unsubscribe to receiving emails click on the unsubscribe button at this address: ibm.biz/marketingoptout.
10:45am - 11:00am EDT Break
1:30pm - 3:00pm EDT Virtual Peer-to-Peer Meetings
Peer-to-Peer Meetings
Meet virtually for in-depth conversations with your colleagues
June 1, 2021
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.