
New York CISO Community
Executive Summit
November 29, 2023 | Pier Sixty
November 29, 2023
Pier Sixty
Collaborate with your peers
Get together with New York's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.
Join your peers to discuss the most critical issues impacting CISOs today:
Anticipating the trajectory of tech advancements and adopting a protocol on behalf of the business
Improving the agility of security operating models to keep pace with organizational priorities
Collectively conquering the challenges of the steadily-competitive talent hunt
New York CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.
Governing Body Co-Chairs

Jeff Brown
State of Connecticut
Chief Information Security Officer

Michael Cena
A+E Networks
Vice President, Head of Cyber Security

Brian Lozada
Amazon Prime Video & Studios
Chief Information Security Officer

Tomas Maldonado
National Football League
Chief Information Security Officer

Tod Mitchinson
New York Life
VP, Chief Information Security Officer

Michael Palmer
Hearst
Chief Information Security Officer

Kylie Watson
Sumitomo Mitsui Banking Corporation
CISO
What to Expect
Agenda
7:45am - 8:30am Registration & Breakfast
8:30am - 9:15am Keynote
Executive Presence for Lasting Leadership

Chris Ulrich
Body Language Expert
Guest Speaker
Any given gesture -a nod, a point of the finger - unconsciously communicates powerful ideas and feelings that have tangible consequences. Top executives are generally proficient in their ability to interact with others, but the stakes are raised during high-level negotiations, reporting to the board, inspiring and empowering senior managers or dealing with tricky internal matters.
Join body language expert Chris Ulrich as he shares:
- Why every movement and action is magnified in high-level situations
- Tools and techniques to build rapport quickly
- How executives can communicate more effectively
9:15am - 9:40am Networking Break
9:40am - 10:25am Breakout Session
Building Cyber Resilience — Why Does it Matter and How Can You Get Started?
Hosted by Fortinet

Jim Richberg
Field CISO and VP of Information Security
Fortinet

Peter Rosario
Chief Information Security Officer
USI
Building cyber resilience is gaining prominence as a priority for many organizations. The classic ingredients of people, process, technology can be applied creatively and in multiple ways to address this challenge. But how do you go about implementing this change?
Join this interactive discussion to learn:
- Simplifying the framework for success
- Multiplying approaches of implementation
- Building resilience through best practices and common pitfalls
9:40am - 10:25am Breakout Session
Imminent M&A – Making a Plan for Major Shifts

Almon Tse
Chief Information Security Officer
Saks Fifth Avenue
Mergers and acquisitions can be challenging transformations for an organization. The rapid change that accompanies M&A can leave the business vulnerable and pose a significant hurdle to CISOs. How do you protect the business from sophisticated threat actors throughout the M&A lifecycle without sacrificing culture or security posture? Help your fellow security leaders navigate a collection of nuanced and challenging M&A hurdles in this interactive, scenario-solving exercise.
Together, you and your team will grapple with:
- Why CISOs need to be an active and strategic partner in M&A
- What factors should be considered in merging security functions
- How to protect the business over its lifecycle
9:40am - 10:25am Executive Boardroom
Data IS Your Business – How Do You Secure it in the Cloud-Era
Hosted by Rubrik

John Murphy, PhD
Global Field Chief Security Officer/CISO
Rubrik

Bob Brown
CISO
Federal Home Loan Bank of New York

JT Jacoby
Chief Information Security Officer
International Rescue Committee

Mike Lamberg
VP, CISO
ION
In these times of rapid technological advancement, data stands as the cornerstone of innovation. As we navigate through the information age, it's evident that data residing in the cloud represents the fastest area of growth. To maintain pace with the agility of cloud operations, it is imperative to discover and adopt strategic approaches and robust architectures.
Gather with your C-level peers to:
- Start solving the challenge of data visibility in the cloud
- Determine who in your organization should own data security (CISO? CDO? CPO?)
- Discuss how automation and agility can be accomplished through tooling or processes
9:40am - 10:25am Executive Boardroom
Meeting the SEC’s New Disclosure Requirements
Hosted by BitSight

Jacob Olcott
VP of Business Development
BitSight

Tony Chryseliou
Global Information Security Executive
Sony Corporation of America

Patrick Ford
Chief Information Security Officer, Americas
Schneider Electric
The U.S. Securities and Exchange Commission (SEC) recently voted to adopt new cybersecurity requirements for publicly traded companies, creating new obligations for companies to report material cybersecurity incidents and disclose critical information about their cybersecurity programs.
Join this Town Hall to discuss:
- How technology leaders can effectively tell their company’s cybersecurity story
- What investors want — and need — to know about cybersecurity
- Real-world examples of effective cybersecurity disclosures under the new requirements
9:40am - 10:25am Executive Boardroom
Secure From the Jump - CISOs as Software Development Leaders
Hosted by JFrog

Gal Marder
EVP, Strategy
JFrog

JR Riding
Chief Information Security Officer
Multiplan

Steven Wallstedt
Chief Information Security Officer
Abn Amro Bank
Today’s CISOs play a pivotal role in driving secure software implementation. By communicating the importance of security, establishing robust governance frameworks, and driving a culture of security awareness throughout the organization, CISOs can inspire and guide development teams to prioritize security, identify vulnerabilities and implement best practices to safeguard critical assets.
Join this session to:
- Explore proven strategies for assessing and mitigating risks in the SSC
- Integrating security into the development process
- Align security practices with business objectives
10:25am - 11:00am Networking Break
10:30am - 10:55am Peer-to-Peer Meetings
Peer-to-Peer Meetings
Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.
11:00am - 11:45am Breakout Session
Making Security a Core Company Value – And a Shared Responsibility
Hosted by Zscaler

Danny Connelly
Field CISO - Americas
Zscaler
In an age where cyber risk is business risk, CISOs are ultimately responsible for instilling a security mindset in every employee within an organization. Rather than a siloed concern, managing this risk must risk to the highest levels of leadership. As we know, cyberattacks can be as devastating as lawsuits, legislative non-compliance, and fraud. This session offers board members, executives, and technology leaders ideas for cultivating a strong security mindset throughout their organization.
Join this session to learn:
- How to foster inclusive conversations on cybersecurity by framing issues in terms of business risk
- Methods for protecting your organization at every level by integrating security and automation into the CI/CD pipeline
- How to identify, understand, and prepare for social engineering and AI-enabled attacks
11:00am - 11:45am Breakout Session
A Cloud Chat For All Phases
Hosted by Wiz

James Chiappetta
SVP, Cloud & Application Security
Blackstone Group

Oritse Uku
VP, Business Information Security Officer & Information Risk Management
Northwestern Mutual

Rani Baki
Executive Director of Information Security Risk
Sumitomo Mitsui Banking Corporation
The risks and rewards of cloud migration can differ greatly depending on where you are in your journey. Whether you're just getting started, establishing your work flow or optimizing in a multi-cloud environment - There are challenges you'll need to keep in mind at every level.
Join in as this panel of three discusses:
- Adapting to the changes that come before and after the deployment of new tooling and AI
- The realities that follow your cloud adoption and an upskilled workforce
- The high-stakes risks of advancing your cloud proficiency and working with well-known providers
11:00am - 11:45am Executive Boardroom
Unifying the Analyst Experience to Improve Threat Detection and Response
Hosted by IBM Security

Andy Piazza
Global Head of Threat Management
IBM Security

Harry Halikias
Senior Director, Global Information Security
Sony Music Publishing

Bala Rajagopalan
Chief Information Security Officer
TradeWeb Markets

David Sheidlower
Chief Information Security Officer
Turner Construction
Given today’s dynamic threat landscape, involving constantly changing malicious TTPs, CISOs must have a proactive threat management strategy to handle complex attacks. However, with widely distributed infrastructures and the number of tools with different levels of control and responsibility, maintaining true visibility is difficult. Staffing shortages and the high volume of alerts that come in from fragmented tools adds to this challenge. The solution? Unifying the analyst experience to connect existing tools and workflows across your hybrid cloud environment.
Join this session to discuss:
- Detecting and responding to advanced attacks like ransomware
- Unifying the analyst experience with AI and machine learning - starting with understanding your attack surface and through EDR/XDR, SIEM, SOAR
- Identifying blind spots in your cloud security strategy due to information fragmentation
11:00am - 11:45am Executive Boardroom
Strategic Pitfalls in Third-Party Risk Management
Hosted by RiskRecon, a Mastercard Company

Steven Hasson
Solutions Advisor
RiskRecon - A MasterCard Company

Prashanth Mekala
Deputy Enterprise CISO
American Family Insurance

Daniel Nunez
Chief Information Security Officer
New York City Employees’ Retirement System
Managing cyber risk across an enterprise IT infrastructure has never been harder. Remote workers, advancing attack methods, and an ever-expanding vendor network are challenging every firm, as total visibility into threats has become nearly impossible. As digital business strategy matures, more organizations are becoming dependent on the cyber posture and protection of third parties. Third-party risks present a unique challenge because you are depending on vendors and partners to operate securely to keep your data and information safe. How are you mitigating the associated risks and demonstrating this to the business to ensure effective security programs?
Join our session to hear about:
- Common failings across TPRM programs that led to breach events
- How executives can provide strategic direction for third-party risk teams
- Key practices being implemented by leading vendor risk firms to maintain strong supply chain risk management
11:00am - 11:45am Executive Boardroom
Trends in AppSec — AI, Developer Experience and Consolidation
Hosted by Checkmarx

Chris Merritt
VP of Solutions and Service Engineering
Checkmarx

Jeff Brown
Chief Information Security Officer
State of Connecticut

Ernie Rozado
Director, Head of Cybersecurity and Compliance
G-III
As your company’s chief security decision maker, having a full plate comes with the territory. Beyond the complex web of priorities, certain challenges come up repeatedly.
Join your peers in a closed-door, roundtable discussion on:
- How AI tools could disrupt application development
- How to actually build trust with your developers
- What you can get out of consolidation, beyond reduced TCO
11:45am - 12:30pm Lunch Service
Apply to Participate
Apply to participate in the New York CISO Community Executive Summit.
Gartner facilitates exclusive, C-level communities by personally qualifying and understanding the priorities, challenges and interests of each member.
Our selective approach maintains the high quality of the network and ensures top-level discussions with peers from the world’s leading organizations.
Each application will be reviewed, and once your participation is confirmed, you will have access to year-round community programs.
Location
Venue & Accommodation
Pier SixtyCommunity Program Manager
For inquiries related to this community, please reach out to your dedicated contact.