
New York CISO Community
Executive Summit
June 26, 2024 | Pier Sixty
June 26, 2024
Pier Sixty
Collaborate with your peers
Get together with New York's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.
Join your peers to discuss the most critical issues impacting CISOs today:
Charting the CISO role's trajectory amid increasing regulatory scrutiny and organizational shifts
Strengthening cybersecurity's influence as a key facilitator of enterprise risk decisions
Securing the adoption and implementation of AI across the business
New York CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.
Governing Body Co-Chairs

Reshma Budhwani
New York Life
VP, Chief Technology Security Officer

Brian Lozada
Amazon
CISO, Prime Video and Studios

Tomas Maldonado
National Football League
Chief Information Security Officer

Tod Mitchinson
New York Life
VP, Chief Information Security Officer

Michael Palmer
Hearst
Chief Information Security Officer

Lauren Dana Rosenblatt
International Flavors & Fragrances
VP, Chief Information Security Officer

Kylie Watson
Sumitomo Mitsui Banking Corporation
CISO
What to Expect
Agenda
7:45am - 8:30am Registration & Breakfast
8:30am - 9:15am Keynote
You Speak, They Swarm — The Power of Story in Reaching Your Audience
Hosted by AppOmni

Arthur Zards
Storytelling Expert | TED/TEDx Speaker, Coach & Producer
"Those who tell the stories rule society." (Plato) But busy executives don’t have time to learn complex communication models or esoteric storytelling processes — you need a simple, effective framework that can help you not only connect with any audience, but also elicit real change. Enter the Swarm Effect.
Join this session with Arthur Zards — an expert on storytelling, TEDster and provocateur — to:
- Hone your skills in executive influence
- Adopt a more authentic and engaging approach to speaking
- Take your next presentation from “understandable” to “compelling”
9:15am - 9:40am Networking Break
9:40am - 10:25am Breakout Session
After SolarWinds: Litigation and Regulatory Risks for CISOs
Hosted by Red Canary

David Anderson
Vice President, Cyber Liability
Woodruff-Sawyer

Walker Newell
Vice President, Management Liability, Woodruff-Sawyer | Former Senior Counsel, SEC Division of Enforcement

Harry Halikias
Senior Director, Global Information Security
Sony Music Publishing
The SEC historically has not been top of mind for CISOs – but no longer. While past SEC leadership messaged that they would not “second guess good faith disclosure decisions," the criminal sentence imposed on Uber’s former CISO, the SolarWinds case, and the cyber disclosure rules last year all underscore the new heightened risk environment for CISOs trying to protect their companies – and themselves.
In this discussion, our expert panel will provide an inside perspective on the increased regulatory scrutiny on cybersecurity breaches and the role of the CISO, including:
- How the government thinks about cyber cases against companies and individuals
- How CISOs should think about navigating an enhanced role in the disclosure process
- Key indemnification and insurance considerations
9:40am - 10:25am Breakout Session
CCM — The Visibility You Crave, The Remediation You Need
Hosted by Comcast

Yasmine Abdillahi
BISO and Executive Director Cyber, GRC
Comcast
Many organizations lack the capability to continuously monitor and measure the effectiveness of their security controls. Continuous control monitoring (CCM) automates the monitoring of cybersecurity controls’ effectiveness and relevant information gathering in near real time.
Join this session to explore how CISOs can:
- Improve their organization’s security posture and their own productivity
- Gain visibility on asset management, endpoint protection, secure configuration and vulnerability management
- Act as a business enabler, ensuring audit readiness and proactive risk management
9:40am - 10:25am Executive Boardroom
Securing the Everywhere World — Building Cyber Resilience through a “Connectivity Cloud”
Hosted by Cloudflare

John Engates
Field CTO
Cloudflare

Daniel Nunez
Chief Information Security Officer
New York City Employees’ Retirement System

David Sheidlower
Chief Information Security Officer
Turner Construction
When users are everywhere and digital operations span cloud, SaaS, and on-premises environments, achieving cyber resilience becomes paramount. The challenge lies in navigating this complexity and maintaining visibility and control to ensure continuous operation despite cyber threats.
Join this interactive roundtable to discuss:
- Optimizing costs and improving security across diverse cloud environments
- Adopting Zero Trust philosophies to protect users, data, and applications
- Innovating with AI while addressing global regulatory and data privacy requirements
9:40am - 10:25am Executive Boardroom
Navigating the New AppSec Terrain — A CISO’s Guide
Hosted by Checkmarx

Sandeep Johri
CEO
Checkmarx

Tony Chryseliou
Global Information Security Executive
Sony Corporation of America

Arthur Graham
Global Director of IT Vulnerability Management
Bloomberg
We know that a comprehensive AppSec program is critical for a successful business. With cloud-based applications expanding and AI-generated code offering both opportunities and risks, CISOs must navigate a drastically changed threat landscape. So, how can CISOs effectively manage their AppSec initiatives to ensure comprehensive security across the SDLC, despite the expanding complexities?
In this session, we’ll discuss the value of:
- Streamlining developer workflows with integrated security tools to boost developer experience
- Consolidating tools to simplify operations and tackle tool sprawl
- Utilizing AI to enhance security and increase productivity across teams
9:40am - 10:25am Executive Boardroom
Architecting and Optimizing IAM Transformation
Hosted by Saviynt

Jim Routh
Chief Trust Officer
Saviynt

Rob Reiser
Senior Director, Information Security and Data Privacy
Tory Burch

JR Riding
CISO
MultiPlan
IAM today is not your grandpa’s Oldsmobile, having shed its reputation as a mundane administrative task and become an integral component in shaping how cybersecurity controls are implemented across the enterprise. Yet, making the business case for IAM transformation projects -- and then, of course, guiding the team through the transformation successfully -- remains a challenge for many CISOs.
Join this session to discuss and share insights your struggles, successes and concerns related to IAM transformation, including:
- Creating a compelling business case for IAM transformation as a strategic investment
- Redesigning workflows to reduce dependence on people for IAM transactions
- Upgrading both capacity and capabilities without increasing operating costs
9:45am - 10:00am Workshop
Office Hours with Arthur Zards, Storytelling Expert

Arthur Zards
Storytelling Expert | TED/TEDx Speaker, Coach & Producer
Meet one-on-one with storytelling expert Arthur Zards for expert insights and candid feedback on honing your skills in executive influence, adopting a more authentic and engaging approach to speaking, and taking your next presentation from “understandable” to “compelling.” Feel free to come prepared with specific questions or even a presentation you'd like to discuss.
10:05am - 10:20am Workshop
Office Hours with Arthur Zards, Storytelling Expert

Arthur Zards
Storytelling Expert | TED/TEDx Speaker, Coach & Producer
Meet one-on-one with storytelling expert Arthur Zards for expert insights and candid feedback on honing your skills in executive influence, adopting a more authentic and engaging approach to speaking, and taking your next presentation from “understandable” to “compelling.” Feel free to come prepared with specific questions or even a presentation you'd like to discuss.
10:25am - 11:05am Networking Break
10:30am - 10:55am Peer-to-Peer Meetings
Peer-to-Peer Meetings
Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.
11:05am - 11:50am Breakout Session
Unlocking Full Cloud Potential – Security Enhancements for Today’s Enterprise
Hosted by Island

Eric Appel
Global GTM Strategy Officer
Island
While the vast majority of infrastructure has been upgraded and modernized to secure the shift to the cloud, enterprise IT teams are still missing an equally seamless access method to safely deliver those now cloud-native apps and data. While traditional browsers have become the de facto access point for the majority of business critical applications, they lack the deep inspection capabilities and hyper-granular security controls enterprises need. This results in security teams surrounding their browsers with layers of tech to meet those needs.
Join this breakout session to discover:
- Why traditional cloud security methods undermine your modernization efforts and end-user experience
- Embracing technological momentum to adapt to a "more-with-less" security landscape
- How enterprise CISOs are using this solution to bolster cloud security
11:05am - 11:50am Breakout Session
Workshop — Evolving with the Expanding Role of Information Security
Hosted by Illumio

Mitch Haviv
VP of Infrastructure / CISO
Brown Harris Stevens
As the cybersecurity landscape continues to shift, CISOs are stepping up to the challenge by taking on new responsibilities. By embracing the expansion of the role and working collaboratively with other business units, CISOs are not only dedicated to securing their organization's information systems but also evolving to become better leaders for the business.
Join this interactive session to:
- Explore the shifting responsibilities of your CISO peers
- Validate strategies and uncover new ways of thinking
- Share key lessons learned and proven best practices
11:05am - 11:50am Executive Boardroom
Threat Intelligence and Third-Party Risk ― Doubling Down on Critical Vulnerabilities
Hosted by RiskRecon, a Mastercard Company

Austin Starowicz
Director, Solutions Consulting
RiskRecon - A MasterCard Company

Davinder Rodey
Chief Information Security Officer
Mizuho Americas

Steven Wallstedt
Chief Information Security Officer
Industrial and Commercial Bank of China
The complete entanglement of cyber risk with business risk is becoming increasingly more visible. CISOs now have an opportunity to better pinpoint third parties that present a threat to the organization. Yet the increasing complexities of third party, and even fourth party, risk management, prompted by a wide range of evolving threats, demands heightened attention. How can CISOs ensure they have a clear overview of the threat landscape and vulnerabilities across ecosystems and supply chains?
Join this session to discuss:
- Identification of vulnerabilities across your vendor landscape to prioritize response efforts
- Best practices for mitigating a new wave of sophisticated attacks to keep assets safe
- The role threat intelligence plays in risk management strategies to safeguard your digital ecosystem
11:05am - 11:50am Executive Boardroom
Endpoint, Cloud and the Board — Identifying Risk that Matters
Hosted by Qualys

Carlton Jones
Regional Vice President - Northeast
Qualys

Davin Darnt
CISO Americas
Louis Vuitton

Kevin Li
SVP, Chief Information Security Officer
Cohen & Steers
Prioritizing and eliminating the cyber risks that matter most is the ultimate goal of security leaders. But how do you validate that your efforts are hitting the mark? It all comes down to well-crafted measurements: metrics that are reliable and easily understood by all stakeholders across the business.
In this session, we will discuss:
- Cybersecurity risk assessment essentials and which risks truly carry weight
- Concrete approaches to determine effectiveness of security capabilities
- Creating simple "metric cards" to communicate across stakeholders
11:05am - 11:50am Executive Boardroom
From Z to A - Extending Zero Trust to APIs
Hosted by Akamai

Steve Winterfeld
Advisory CISO
Akamai Technologies

Doug Greene
CISO
Guardian Life Insurance

Jason Rothhaupt
Vice President & Head of Information Security
Broadridge
As more and more organizations adopt a Zero Trust architecture (ZTA), many initiatives overlook the increased prevalence of API-based access to sensitive application functionality and data. As CISOs move forward in their ZTA journey, how can they extend these principles to their API strategy to ensure security from the network layer to the application layer?
Join this session to discuss:
- Breaking the kill chain by stopping infection vectors and protecting against lateral movement
- Shielding sensitive data and limiting how APIs interact with data
- Increasing real-time visibility across the business to mitigate threats
11:10am - 11:25am Workshop
Office Hours with Arthur Zards, Storytelling Expert

Arthur Zards
Storytelling Expert | TED/TEDx Speaker, Coach & Producer
Meet one-on-one with storytelling expert Arthur Zards for expert insights and candid feedback on honing your skills in executive influence, adopting a more authentic and engaging approach to speaking, and taking your next presentation from “understandable” to “compelling.” Feel free to come prepared with specific questions or even a presentation you'd like to discuss.
11:30am - 11:45am Workshop
Office Hours with Arthur Zards, Storytelling Expert

Arthur Zards
Storytelling Expert | TED/TEDx Speaker, Coach & Producer
Meet one-on-one with storytelling expert Arthur Zards for expert insights and candid feedback on honing your skills in executive influence, adopting a more authentic and engaging approach to speaking, and taking your next presentation from “understandable” to “compelling.” Feel free to come prepared with specific questions or even a presentation you'd like to discuss.
11:50am - 12:35pm Lunch Service
Apply to Participate
Apply to participate in the New York CISO Community Executive Summit.
Gartner facilitates exclusive, C-level communities by personally qualifying and understanding the priorities, challenges and interests of each member.
Our selective approach maintains the high quality of the network and ensures top-level discussions with peers from the world’s leading organizations.
Each application will be reviewed, and once your participation is confirmed, you will have access to year-round community programs.
Location
Venue & Accommodation
Pier SixtyParking Information
Self-parking is located right inside the Chelsea Piers complex as you enter the venue. Self-parking is based on availability and posted hourly parking rates apply. Drivers pay as they exit the complex. Chelsea Piers Parking Rates can be found here.
Hotels Nearby
The Maritime Hotel
363 W 16th Street
New York, New York, 10011
0.5 miles from venue
The Highline Hotel
180 10th Avenue
New York, New York, 10011
0.2 miles from venue
Dream Downtown, by Hyatt
355 W 16th Street
New York, New York, 10011
0.5 miles from venue
Evanta does not have any affiliation with the suggested hotels listed. The list above is solely for informational purposes.
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.