New York CISO Executive Summit
June 21, 2022 | Pier Sixty
June 21, 2022
Pier Sixty
Collaborate with your peers
Get together with New York's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.
Join your peers to discuss the most critical issues impacting CISOs today:
Implementing the right security controls that protect the integrity of information in the cloud
Managing user identities, govern access to resources, enforce security & ensure compliance
Proactively identifying and reducing risks relating to the use of third parties
New York CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.
Governing Body Co-Chairs
Michael Cena
A+E Networks
Vice President, Head of Cyber Security
Zouhair Guelzim
L'Oreal Americas
VP, Chief Information Security Officer
Brian Lozada
HBO Max
Chief Information Security Officer
Tomas Maldonado
National Football League
Chief Information Security Officer
Tod Mitchinson
New York Life
VP, Chief Information Security Officer
Michael Palmer
Hearst
Chief Information Security Officer
Eric Staffin
IHS Markit
Former Partner and Senior Vice President, Chief Information Security Officer
Kylie Watson
Sumitomo Mitsui Banking Corporation
CISO
Teresa Zielinski
GE
Chief Information & Product Security Officer
What to Expect
Agenda
June 21, 2022
7:30am - 8:15am Registration & Breakfast
8:15am - 9:00am Keynote
Your Future Is Safe With Change
Hosted by Salt Security
Ryan Berman
Co-Founder of Courageous, Author of "Return On Courage"
Guest Speaker
The landscape of business today is cloudy as many of us find ourselves living in a static loop that’s causing a clarity epidemic of epic proportions. Our work forces remain handcuffed – starved for time and unable to do what needs to be done to advance our careers and corporations forward. What if we could flip the script from preservation mode to liberation mode? What if instead of being time-starved you could gain the necessary clarity to warp forward.
Join this session with author and courage expert Ryan Berman as he discusses:
- Why we desperately need to be courageous
- How each of us can learn to be more courageous
- How we can unleash courage in our organizations now, while unveiling ‘the how”
9:00am - 9:30am Networking Break
9:30am - 10:15am Breakout Session
The State of the SOC – Ideas for Running an Effective Threat Detection and Response Programs
Hosted by Hunters
Rob Geurtsen
Retired Deputy CISO, Nike
Guest Speaker
Patrick Vandenberg
Head of Product Marketing
Hunters
Between skills shortages and the escalating sophistication of threats, too often security teams are overwhelmed with increasing data volume, complexity, and false positives. CISOs need new approaches for managing technology, talent, and processes in the SOC to build a modern threat detection and response program.
In an open discussion with Rob Geurtsen, the former Deputy CISO at NIKE, we will discuss common SOC issues, including:
- Hiring vs. Outsourcing vs. Hybrid approach for talent management - what is the right approach for organizations
- How SOCs are leveraging technology and automation to improve their threat detection and incident response
- What approaches should change in light of the remote work reality
9:30am - 10:15am Breakout Session
Key Initiatives to Implement During a Cyber War
Hosted by Tufin
Jeff Brown
Chief Information Security Officer
State of Connecticut
Tariq Habib
Chief Information Security Officer
MTA
Ankur Ahuja
VP, Global Chief Information Security Officer
Fareportal
Given the current geopolitical landscape and international affairs, organizations around the world are bracing for retaliatory cyberattacks causing them to assess supply chain risks and other critical infrastructures. With events changing by the minute, government and corporate executives around the world have focused on mounting a vigorous defense against nation-state cyberattacks.
Join this session to discuss:
- The importance of revisiting basics related to available utilities and controls
- Retesting your incident response and cyber defense plan and focusing on high resiliency for supply chain planning
- How to collaborate with the government to protect against nation-state attacks
9:30am - 10:15am Executive Boardroom
Deter Breaches and Build Resilience Within the Cloud
Hosted by ExtraHop
Raja Mukerji
Co-Founder & Chief Customer Officer
ExtraHop
Arvin Bansal
Senior Director, Data Protection and Cloud Security
AmerisourceBergen
Andres Andreu
Chief Information Security Officer
2U
While cloud providers will protect the security of the cloud itself, CISOs are often responsible for securing their infrastructure within the cloud. Attackers are aware of the visibility gaps in multi-cloud and hybrid environments. After they slip past perimeter defenses, they will work their way toward carrying out a costly breach or extortion, undetected until it’s too late.
Join this session to discuss:
- Key ways to reduce cyber risk and dwell time while building resilience
- The advanced attack techniques that bad actors rely on and how to spot them
- Strategies to increase the speed of detection and mitigation within cloud environments
9:30am - 10:15am Executive Boardroom
Zero Trust – Hype or Hope?
Hosted by IBM
Steve Savard
Director of Information Technologies
ICC Industries Inc
Corey Hamilton
Partner, FSS, Global Security Services
IBM
An organization's ability to achieve successful digital transformation is in large part enabled by the security team. Distributed, loosely connected infrastructure and tools, coupled with the demand for almost any-to-any connectivity, complicates the mission. Regularly defined as being delivered by a single "silver bullet" point solution, the term zero trust is now often held in poor regard. It is however, a highly effective conceptual framework, and perhaps even a cultural shift, that many organizations have been working with for several years.
Join this interactive boardroom to discuss:
- The broader definition of what a zero trust framework is
- The foundational control required to build a zero trust program
- Strategies for improving the user experience and proving value to get organization-wide acceptance
10:15am - 10:45am Networking Break
10:20am - 10:45am Peer-to-Peer Meetings
Peer-to-Peer Meetings
Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.
10:45am - 11:30am Breakout Session
Security is a Team Sport
Hosted by Netskope
Michael Cena
Vice President, Head of Cyber Security
A+E Networks
Court Graham
Chief Information Security Officer
Sirius XM
Tod Mitchinson
VP, Chief Information Security Officer
New York Life
Nathan Smolenski
CISO, Head of Cloud Strategy
Netskope
Building trust and reliance across technology and security teams is key to defending the enterprise. As security stacks incorporate Security Service Edge (SSE) to sustain the SASE journey, the partnership between CIOs, CISOs, and their teams is more important than ever.
Join this session to learn about:
- Best practices for IT and security collaboration
- Communicating the importance of SSE to your CEO and Board
- Improving internal stakeholder relationships to fuel business outcomes
10:45am - 11:30am Breakout Session
Unleashing the Power of Data Science
Hosted by HackEDU
Ariel Weintraub
Chief Information Security Officer
Massachusetts Mutual Life Insurance Co
Cybersecurity is undergoing massive shifts in technology and operations, and data science is driving the change. Data science offers leverage, allowing organizations to be able to understand how to anticipate and respond to cybersecurity issues, threats, and attacks.
Join MassMutual's CISO, Ariel Weintraub, as she discusses:
- The application of data science in the SOC
- The data-fueled evolution of IAM
- Current use cases and lessons learned
10:45am - 11:30am Executive Boardroom
Beating Attackers At Their Own Game
Hosted by CrowdStrike
Gustavo Diaz
Chief Information Security Officer
Brown & Brown Insurance
Lauren Dana Rosenblatt
VP, Chief Information Security Officer
International Flavors & Fragrances
Joe Graham
Strategic Threat Advisor
CrowdStrike
Cybersecurity is no longer a nice to have, it’s a front line defense that protects organizations from targeted attacks and sophisticated threat actors. Security leaders must always be one step ahead and deliver effective cybersecurity through active prevention and defense. How can CISOs mitigate threats against the attack surface, whilst providing the business and technical outcomes to both stay secure and advance business objectives?
Join this boardroom to discuss:
- Leveraging proprietary data, analytics and technology to prevent attacks
- Implementing proactive defense for businesses of all sizes to mitigate today’s threats
- Pressure-testing your incident response plan and playbooks
10:45am - 11:30am Executive Boardroom
A Fresh Look at API Security
Hosted by Cequence Security
Tim Rohrbaugh
Chief Information Security Officer
JetBlue Airways
Ameya Talwalkar
Co-Founder and Chief Executive Officer
Cequence Security
Reshma Budhwani
VP, Chief Technology Security Officer
New York Life
Zouhair Guelzim
VP, Chief Information Security Officer
L'Oreal Americas
APIs fuel digital transformation and are core to every SaaS, web, and mobile application. As API use attacks are becoming more frequent and complex, how can CISOs ensure protection for sensitive data, applications, and customers?
Join this interactive discussion to learn:
- How to gain visibility to understand exposure and risk
- Ways to answer the “so what” for API security, including OWASP API Top 10 impacts
- How security and development teams can find balance
10:45am - 11:30am Executive Boardroom
Effectively Managing Third-Party Risk with a Data-Centered Approach
Hosted by CyberGRX
Caitlin Gruenberg
Director, Risk Solutions Engineer
CyberGRX
Shehzad Asim
AVP IT Security Risk Management
L'Oreal Americas
Ankur Ahuja
VP, Global Chief Information Security Officer
Fareportal
Security assessment questionnaires are no longer the centerpiece of third-party risk management programs. As our third-party ecosystems become more diverse and dynamic, so too should our way of monitoring and collaborating with these critical business partners. Structured data, analytics, and automation have the potential to revolutionize traditional third-party risk management approaches.
Join this roundtable to discuss:
- What data is most important to your organization
- Where you can find your organization’s most powerful and precious data
- How you can harness it to reduce your dependence on static, inefficient questionnaires
11:30am - 11:40am Break
June 21, 2022
Location
Venue & Accommodation
Pier SixtyMore Information
Host Hotel Information
The host hotel will be:
Hilton New York Fashion District
152 West 26th Street, New York , NY 10001
*ROOM BLOCK IS FULL*
Parking Information
Self-parking is located right inside the Chelsea Piers complex as you enter the venue. Self-parking is based on availability and posted hourly parking rates apply. Drivers pay as they exit the complex. Chelsea Piers Parking Rates can be found here.
Health & Safety Guidelines
To ensure the well-being of participants, partners, and associates, we will continue to monitor and adhere to government, venue, and health agency guidelines.
As a part of our commitment to create the safest possible environment, we are requiring all participants, partners, and associates to be fully vaccinated to participate in in-person programs, in addition to confirming adherence to our program attendance requirements before their arrival. Please refer to our COVID-19 Health and Safety Policy for up-to-date local guidelines.
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.