We look forward to seeing you at an upcoming in-person gathering
Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.
December 4, 2024 | Pier Sixty
December 4, 2024
Pier Sixty
Get together with New York's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.
Join your peers to discuss the most critical issues impacting CISOs today:
Aligning cybersecurity and business objectives to provide tangible value
Managing and protecting key data in a world of variable user access and protections
Thoughtfully leveraging AI to develop needed, business-enabling tools and processes
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.
Reshma Budhwani
New York Life
VP, Chief Technology Security Officer
Tomas Maldonado
National Football League
Chief Information Security Officer
Tod Mitchinson
New York Life
VP, CISO
Michael Palmer
Hearst
Chief Information Security Officer
Lauren Dana Rosenblatt
Public Service Enterprise Group Inc
VP, Chief Information Security Officer
Kylie Watson
Sumitomo Mitsui Banking Corporation
CISO
Teresa Zielinski
GE Vernova
VP, Global CISO
7:45am - 8:30am Registration & Breakfast
8:30am - 9:15am Keynote
Hosted by Nagomi Security
Keith Ferrazzi
#1 New York Times Bestselling Author; Global Thought Leader in the Relational and Collaborative Sciences
Join Keith Ferrazzi, renowned team coach and bestselling author, as he unveils the groundbreaking concepts from his latest book, "Never Lead Alone: 10 Shifts from Leadership to Teamship." In this dynamic keynote, Ferrazzi challenges traditional notions of leadership and introduces a revolutionary approach to team dynamics in today's volatile business landscape.
Drawing from two decades of proprietary research Ferrazzi will share:
Discover how to transform into a co-elevating team that drives bolder innovation, breaks down silos, and delivers exceptional results. Whether you're a C-suite executive or a team member looking to contribute more effectively, this keynote will provide you with actionable insights to revolutionize your approach to collaboration and team performance.
Keith isn't just an author -- he's someone who knows and works with CISOs and security leaders regularly. Check out some of his articles for Forbes specifically addressing how CISOs can action on some of the key principles of his work:
9:15am - 9:40am Networking Break
9:40am - 10:25am Breakout Session
Hosted by Obsidian
Hardik Mehta
Head of Cyber Risk Management
Uber
Imagine a world where security engineers weren't inundated with thousands of issues/bugs across dozens of categories every day. Hardik Mehta, Head of Cyber Risk Management at Uber, and his team no longer have to just imagine that world -- they've made it their reality with Project Matterhorn — a Generative AI-powered program that is taking the number of issues from 200k+ across 21 types to just 20k across only 2 types.
In this session, Hardik will share how Project Matterhorn is leveraging GenAI to:
9:40am - 10:25am Breakout Session
Hosted by Qualys
Richard Seiersen
Chief Risk Technology Officer
Qualys
Cybersecurity is more than just technology; it’s about managing risks in a business context. Today’s interconnected landscape broadens the risk surface, encompassing cyber threats, operational disruptions, and financial losses across all enterprise levels. CISOs are challenged with fragmented security solutions and siloed strategies, which hinder effective risk management programs.
Join this session to discuss:
9:40am - 10:25am Executive Boardroom
Hosted by IBM
Ray Harishankar
Fellow, Quantum Safe
IBM
Bob Brown
CISO
Federal Home Loan Bank of New York
Rod Aday
CISO
Bank of China
Tim Somrah
Vice President, Information Security
Major League Soccer
Cryptography touches every corner of the digital world, and it is at risk of decryption from cybercriminals launching “harvest now, decrypt later” attacks. NIST announced three encryption algorithm standards in August 2024, which the U.S. government is pressed to adopt by 2035. Businesses must start evaluating their systems now, as a system-wide transition to quantum-safe protocols will be complex and time-consuming.
Join this session to discuss:
Want to attend this session but it's already full? Email Krista Robbins (Sr. Community Program Manager) at krista.robbins@evanta.com to inquire about joining the waitlist in case a seat opens up. (Seating priority for executive boardroom sessions is limited to C-level/head-of-function security executives and NY CISO Governing Body members.)
9:40am - 10:25am Executive Boardroom
Hosted by Elastic
Anthony Scarfe
Deputy CISO
Elastic
Almon Tse
CISO
Saks Group
JR Riding
CISO
Multiplan
Steve Savard
Director of Information Technologies
ICC Industries Inc
Generative AI is being utilized by companies and employees alike–sometimes without permission. The normalization of this emerging technology has expanded the attack surface and left many security leaders feeling anxious and uncertain. Is generative AI worth the risk, and how should it be governed in an organization?
Join this interactive roundtable to explore:
Want to attend this session but it's already full? Email Krista Robbins (Sr. Community Program Manager) at krista.robbins@evanta.com to inquire about joining the waitlist in case a seat opens up. (Seating priority for executive boardroom sessions is limited to C-level/head-of-function security executives and NY CISO Governing Body members.)
9:40am - 10:25am Executive Boardroom
Hosted by BforeAI
Luigi Lenguito
CEO
BforeAI
Pronay Mukherjee
Global Business Information Security Officer
Levi Strauss & Co.
Dan Marra
Director, Information Security
Ropes & Gray
Puneet Bhatnagar
Senior Vice President, Head of IAM - BXTI Cybersecurity
Blackstone Group
Cybersecurity has always been a never-ending race, with threat actors often setting the pace. So how do we actually get ahead of such sophisticated adversaries? By changing the paradigm of security from detection and response to prediction and preemption.
Join this interactive roundtable to explore:
Want to attend this session but it's already full? Email Krista Robbins (Sr. Community Program Manager) at krista.robbins@evanta.com to inquire about joining the waitlist in case a seat opens up. (Seating priority for executive boardroom sessions is limited to C-level/head-of-function security executives and NY CISO Governing Body members.)
Recommended Gartner Resources:
10:25am - 11:05am Networking Break
10:30am - 10:55am Peer-to-Peer Meetings
Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.
11:05am - 11:50am Breakout Session
Hosted by AvePoint
Catherine Tomasi
Director, Chief Privacy Officer
Con Edison
Kurt John
CISO
Con Edison
Security and privacy are intersecting, yet distinct, disciplines that ultimately share a lot of the same goals. But true collaboration between these critical functions isn't just about policies and protocols -- it's about leveraging both perspectives to think more holistically about safeguarding data and establishing trust.
Join this session for a candid, fireside chat-style session between two local security and privacy leaders about how they approach collaborating with their respective privacy/security counterpart within their organization, each sharing how they:
11:05am - 11:50am Breakout Session
Hosted by Google Chrome
In the age of remote and hybrid work, employees now spend the majority of their time in the browser or in virtual meetings. The workforce is more mobile and distributed than ever before. At the same time, we are seeing an increase in cyber attacks and a higher average cost of data breaches. We must think more about protecting users right where they interface with web threats, the browser, without disrupting productivity.
Join this conversation with your peers to discuss:
11:05am - 11:50am Executive Boardroom
Hosted by RiskRecon, a Mastercard Company
Peter Ling
VP, Global Cybersecurity Partnerships & Cyber Resilience Programs
RiskRecon - A MasterCard Company
Pat Ford
CISO, Americas
Schneider Electric North America
Matthew Saeed
CISO
Warby Parker
Steven Wallstedt
CISO
Industrial and Commercial Bank of China
Third party relationships are closest and may prove to be the most tangible risks to your business, yet the whole supply chain of your business partners still pose a substantial threat. Most organizations’ vendor relationships extend to the 8th party. CISOs need to understand this web of connectedness in order to better manage and communicate enterprise risk.
Join this session to discuss:
Want to attend this session but it's already full? Email Krista Robbins (Sr. Community Program Manager) at krista.robbins@evanta.com to inquire about joining the waitlist in case a seat opens up. (Seating priority for executive boardroom sessions is limited to C-level/head-of-function security executives and NY CISO Governing Body members.)
11:05am - 11:50am Executive Boardroom
Hosted by Proofpoint
Patrick Joyce
Global Resident CISO
Proofpoint
Christina Morillo
Head of Information Security
New York Giants
Matt Cerny
Director of Cyber Security
Integra Life Sciences
You’ve heard it all before: the DBIR tells you people are your biggest risk, phishing simulations tell you your users fall for social engineering, and simple security measures you deploy are sometimes met with howls of protest. But what if it didn’t have to be that way?
Join this session for a fresh perspective on:
Want to attend this session but it's already full? Email Krista Robbins (Sr. Community Program Manager) at krista.robbins@evanta.com to inquire about joining the waitlist in case a seat opens up. (Seating priority for executive boardroom sessions is limited to C-level/head-of-function security executives and NY CISO Governing Body members.)
11:05am - 11:50am Executive Boardroom
Hosted by Twilio
Mauro Failli
Director of Technical Advisor & Operations, Executive Engagement Programs
Twilio
Arun Abraham
Chief Information Security Officer
Bose Corp
Matt Mudry
CISO
HomeServe USA
Jason Rothhaupt
Deputy CISO
Broadridge
In today's complex regulatory environment, CISOs must navigate various categories of global trust, such as demographic and ethnographic factors, which influence compliance and governance decisions. Establishing and maintaining trust requires not only defining a clear position but also providing consistent evidence to support compliance claims. How can leaders connect the dots of governance across different countries and organizations effectively to enhance compliance and operational efficiency?
Join this boardroom to discuss:
Want to attend this session but it's already full? Email Krista Robbins (Sr. Community Program Manager) at krista.robbins@evanta.com to inquire about joining the waitlist in case a seat opens up. (Seating priority for executive boardroom sessions is limited to C-level/head-of-function security executives and NY CISO Governing Body members.)
11:50am - 12:35pm Lunch Service
Evanta facilitates exclusive, C-level communities by personally qualifying and understanding the priorities, challenges and interests of each member.
Our selective approach maintains the high quality of the network and ensures top-level discussions with peers from the world’s leading organizations.
NYC CIO/CISO Executive Summit
December 3rd & 4th at PierSixty
60 Chelsea Piers New York, NY 10011
Nearby Hotels
4 star hotel
6 minute walk to venue
Approx $300 per night
3 star hotel
15 minute walk to venue
Approx $500 per night
3 star hotel
11 minute walk to venue
Approx $400 per night
For inquiries related to this community, please reach out to your dedicated contacts.