IN-PERSON

New York CISO Executive Summit

June 25, 2025 | Pier Sixty

June 25, 2025
Pier Sixty

APPLY TO PARTICIPATE

Collaborate with your peers

Get together with New York's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Strengthening cybersecurity's influence as a key factor in business decisions

Driving innovative ideas into a leadership vision that fosters cyber resilience and personal growth

Establishing trust and understanding amid complex compliance changes and data ecosystems

New York CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.

Governing Body Co-Chairs

Reshma Budhwani

New York Life
VP, Chief Technology Security Officer

Tomas Maldonado

National Football League
Chief Information Security Officer

Tod Mitchinson

New York Life
VP, Chief Information Security Officer

Lauren Rosenblatt

Public Service Enterprise Group Inc
VP, Chief Information Security Officer

Kylie Watson

Sumitomo Mitsui Banking Corporation
CISO

Teresa Zielinski

GE Vernova
VP, Global CISO

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your New York CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


Breakout Sessions

Special Session by Versa Networks

Details coming soon!

The Convergence of Physical and Cyber Securities – A Modern Playbook

No matter the industry, CISOs are paying closer attention at the connections between cyber and physical securities. Threat detection in the cyber space is one thing but using that information to enhance security or even stop crimes in the physical world — is next level. Being able to quickly mobilize after finding risks could prevent damages or loss to an organization — or maybe even save lives.

Join this session to explore:

  • Expanding your risk lens to see the connection between cyber and physical threat detection
  • Communicating the scale and gravity of information uncovered across the organization
  • Reporting structures of cyber and physical security teams

Special Session by Palo Alto Networks

Details coming soon!

Special Session by Zero Networks

Details coming soon!

Special Session by Adaptive Security

Details coming soon!

A CISO’s Next Move

For many tenured CISOs, their careers started at a time when many companies didn’t even have a CISO. While the world has changed, now might be the time for you to also make a change. Is your next career move becoming a CISO at a larger (or start-up) organization, a board member, a CIO, a professor or maybe something totally unexpected? Let’s explore career options with panelists who have done it themselves.

Join this session to ask panelists:

  • How did you explore career options that aligned with life goals
  • When did you know the time was right for a new move
  • What skills and experiences did you need to prepare


Executive Boardroom Sessions

Taming Third Party Risk with Advanced Technologies

Cyber threats are increasingly sophisticated and pervasive, making conventional TPRM approaches like questionnaires inadequate. AI/ML and threat intelligence have the potential to transform TPRM, as well as extending into 4th, 5th parties and beyond. Leveraging key insights can help CISOs stay ahead of evolving risks and enhance security programs, even with limited resources.

Join this session to discuss:

  • Practical strategies for leveraging threat intelligence in TPRM
  • Critical alignment of people and process elements with advanced technologies
  • Acting on useful insights and data to manage supply chain risk

Identity Security in the Agentic AI Era

The rise of Agentic AI is increasing risks and complexities for Non-Human Identities (NHIs) in cloud environments. AI agents need extensive NHI access, posing new challenges in identity governance and security.

Join this roundtable to discuss:

  • Exponential NHI growth impacting security
  • Management of AI access models and permissions
  • Complex AI interactions affecting identity management

True Defense Against API & Application Incidents

Cybersecurity measures are adept at detecting and responding to incidents across various layers, but the application layer often remains vulnerable. Many organizations have a massive vulnerability backlog that demands timely and effective defense.

Join us to explore:

  • Understanding the scale of the backlog and strategies to prevent exploitation
  • The intricacies of application and API protection within the security operations ecosystem
  • Benefits of having a comprehensive blueprint that reveals attack surfaces, defenses, dangers, and connections 

Reducing Application Delivery Tech Debt from the Inside Out

With high volumes of sensitive data now flowing through web browsers, three in five organizations say data leakage is likely given current IT and security infrastructures. Stop playing catch-up. Discover new approaches to enterprise operations to reduce risk while simplifying operations.

Join this roundtable to discover:

  • How disparate IT and security solutions create technical debt
  • What challenges impact internal and end user stakeholders
  • How simplifying IT can strengthen security, and boost productivity

Streamlining Compliance for Operational Excellence

Navigating today’s complex regulatory environment is a challenge for even the most resourceful enterprises. From PCI DSS to DORA and HIPAA, businesses must adopt smarter strategies to meet evolving compliance requirements while maintaining operational efficiency.

Join this session to:

  • Discover how to narrow compliance scope with micro segmentation
  • Learn strategies to reduce the cost and complexity of audits
  • Build a compliance program that supports operational excellence and trust

Protecting Innovation — Rethinking Data Security Strategies

AI makes creating and consuming data easier than ever, with shadow AI and dark data presenting new challenges to security teams. As the tactics for protecting data evolve, security leaders must adopt a risk-based strategy to protect mission-critical data and safeguard innovation.

Join this session to discover:

  • Effective practices for ongoing monitoring to identify risks
  • Rapid investigation and response techniques for insider threats
  • Strategies for evolving your data protection approach

Escaping Security Dogma – Redefining Human Risk Management

Security awareness programs have long been driven by dogma rather than data, often leading to ineffective and misaligned outcomes. With industry shifts and emerging trends, the modern CISO must adopt a smarter, data-driven approach to managing human cyber risk. Security leaders are moving beyond traditional training and using metrics that matter to prove the real impact of their efforts.

Join your peers to discuss:

  • Identifying, targeting, and influencing long-term security behaviors
  • Quantifying your human cyber risk
  • Orchestrating an impactful plan of action with measurable outcomes


Governing Body Reception Session

Governing Body Reception

Finish the day sharing lessons learned with your peers over light fare and drinks at this closing reception hosted by your Governing Body members.


Keynote Sessions

The Performance Paradox — Mental Health and High Productivity

Today's relentless pursuit of success can lead to profound dissatisfaction and dramatically affect mental health. Accomplishments lack satisfaction, work is ceaseless, sleep and self-care are sacrificed. Recognizing this, leaders can play a pivotal role in breaking this cycle and nurturing a healthier and more fulfilled life for themselves and their teams.

Join this keynote from a mental health educator and former lawyer to learn:

  • How time, efficiency, and productivity challenges individual and community health
  • Why mental health of individuals and teams drives performance (and not vice versa)
  • What specific steps leaders can take, for themselves and others, to shift away from the paradox and towards a healthier relationship with work

Lunch Keynote by Netskope

Details coming soon!


Peer-to-Peer Meetings Session

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.


We look forward to seeing you at an upcoming in-person gathering


Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

Pier Sixty

Your Community Partners


CISO Thought Leaders
Key Sponsors

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Krista Robbins

Senior Community Program Manager

krista.robbins@gartner.com