
New York CISO Community
Executive Summit
June 25, 2025 | Pier Sixty
June 25, 2025
Pier Sixty
Collaborate with your peers
Get together with New York's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.
Join your peers to discuss the most critical issues impacting CISOs today:
Strengthening cybersecurity's influence as a key factor in business decisions
Driving innovative ideas into a leadership vision that fosters cyber resilience and personal growth
Establishing trust and understanding amid complex compliance changes and data ecosystems
New York CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.
Governing Body Co-Chairs

Reshma Budhwani
New York Life
VP, Chief Technology Security Officer

Tomas Maldonado
National Football League
Chief Information Security Officer

Tod Mitchinson
New York Life
VP, Chief Information Security Officer

Lauren Dana Rosenblatt
Public Service Enterprise Group Inc
VP, Chief Information Security Officer

Read More
David Sheidlower
Turner Construction
Chief Information Security Officer and Privacy Officer

Kylie Watson
Sumitomo Mitsui Banking Corporation
CISO
What to Expect
Agenda
8:00am - 8:30am Registration & Breakfast
8:00am - 8:30am Networking
Leadership Book Swap
You are invited to bring your favorite leadership books for a Book Swap at the Executive Summit throughout the day. Which books have influenced you as a leader? Bring a book with your notes in the margins or a fresh copy to leave, and then swap for a book one of your fellow executives has brought. This idea was inspired by a Governing Body Member!
This will start at 8:00am, but will take place throughout the whole day as attendees come and go.
8:30am - 9:15am Keynote
The Performance Paradox — Navigating Peak Performance with Mental Health in Mind
Hosted by Rapid7

Kara Hardin
Registered Psychotherapist & Founder of The Practice Lab
Guest Speaker
In high-achieving environments, the drive to succeed often comes at a quiet cost: exhaustion, disconnection, and a sense that no matter how much we accomplish, it’s never quite enough. When productivity becomes the only measure of worth, rest feels impossible—and burnout starts to look like the norm. But it doesn’t have to be.
In this keynote Kara Hardin, former lawyer, and mental health educator explores why our current approach to performance is backfiring—and what we can do instead. Through research, relatable stories, and practical tools, we’ll unpack:
- How common ideas about time, efficiency, and productivity are quietly harming individual and collective well-being
- Why mental health isn’t the reward for high performance—it’s the foundation
- What leaders can do (for themselves and their teams) to build a healthier, more sustainable relationship with work
9:15am - 9:40am Networking Break
9:40am - 10:25am Breakout Session
Leveraging AI to Better Prevent Data Loss
Hosted by Versa Networks

Kelly Ahuja
President & CEO
Versa Networks
By analyzing and identifying patterns indicative of a potential data breach, artificial intelligence within a unified framework can dramatically improve your efforts to protect your organization's most precious data.
In this session, you and your peers will gather:
- Practical steps for better protecting data integrity
- How intelligent frameworks can augment and refine existing DLP efforts
- Ways of using these AI-supported frameworks to strengthen overall resilience
9:40am - 10:25am Breakout Session
The Convergence of Physical and Cyber Securities – A Modern Playbook
Hosted by Wiz

Devon Bryan
Global CSO
Booking Holdings

Adam Fletcher
Sr. Director, CSO
Blackstone Group

Tomas Maldonado
Chief Information Security Officer
National Football League
No matter the industry, CISOs are paying closer attention to the connections between cyber and physical securities. Threat detection in the cyber space is one thing but using that information to enhance security or even stop crimes in the physical world — is next level. Being able to quickly mobilize after finding risks could prevent damages or loss to an organization — or maybe even save lives.
Join this session to explore:
- Expanding your risk lens to see the connection between cyber and physical threat detection
- Communicating the scale and gravity of information uncovered across the organization
- Reporting structures of cyber and physical security teams
9:40am - 10:25am Executive Boardroom
Taming Third Party Risk with Advanced Technologies
Hosted by Mastercard Cybersecurity

Jonathan Ehret
VP, Global Cybersecurity
Mastercard Cybersecurity

Ely Pinto
Global CISO
Simpson Thacher

Ben Smith
SVP, Chief Information Security Officer
Altice USA
Cyber threats are increasingly sophisticated and pervasive, making conventional TPRM approaches like questionnaires inadequate. AI/ML and threat intelligence have the potential to transform TPRM, as well as extending into 4th, 5th parties and beyond. Leveraging key insights can help CISOs stay ahead of evolving risks and enhance security programs, even with limited resources.
Join this session to discuss:
- Practical strategies for leveraging threat intelligence in TPRM
- Critical alignment of people and process elements with advanced technologies
- Acting on useful insights and data to manage supply chain risk
9:40am - 10:25am Executive Boardroom
Identity Security in the Agentic AI Era
Hosted by Veza

Mike Towers
Chief Security & Trust Officer
Veza

Tim Kropp
Global CISO
SS&C Technologies

David Sheidlower
Chief Information Security Officer and Privacy Officer
Turner Construction
The rise of Agentic AI is increasing risks and complexities for Non-Human Identities (NHIs) in cloud environments. AI agents need extensive NHI access, posing new challenges in identity governance and security.
Join this roundtable to discuss:
- Exponential NHI growth impacting security
- Management of AI access models and permissions
- Complex AI interactions affecting identity management
9:40am - 10:25am Executive Boardroom
True Defense Against API & Application Incidents
Hosted by Contrast Security

Larry Maccherone
Evangelist
Contrast Security

Chris Holden
SVP, Chief Information Security Officer
Crum & Forster

Alexandria San Miguel
Head of Information Security
Chanel
Cybersecurity measures are adept at detecting and responding to incidents across various layers, but the application layer often remains vulnerable. Many organizations have a massive vulnerability backlog that demands timely and effective defense.
Join us to explore:
- Understanding the scale of the backlog and strategies to prevent exploitation
- The intricacies of application and API protection within the security operations ecosystem
- Benefits of having a comprehensive blueprint that reveals attack surfaces, defenses, dangers, and connections
10:25am - 11:10am Networking Break
10:35am - 11:00am Peer-to-Peer Meetings
Peer-to-Peer Meetings
Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.
11:10am - 11:55am Breakout Session
Hackers’ Dead End — How to Block Lateral Movement
Hosted by Zero Networks

Nicholas DiCola
VP, Customers
Zero Networks
Modern networks have warped into complex webs of layers, workloads, and identities. This session explores how automated, holistic microsegmentation – applied across three axes – creates a defense-in-depth strategy for modern complexity:
- North-South: Block zero-day exploits at the perimeter
- East-West: Isolate and protect every asset and workload – and auto-quarantine hackers
- Up-Down: Deploy dynamic identity controls that leverage user behavior and device posture
11:10am - 11:55am Breakout Session
A CISO’s Guide to Security Enterprise AI Apps, Models and Agents
Hosted by Palo Alto Networks

Spencer Thellmann
Principal Product Manager
Palo Alto Networks
As enterprises race to deploy artificial intelligence, CISOs are confronted with a rapidly expanding and unfamiliar attack surface that spans AI applications, models, and a new generation of autonomous agents. This new frontier introduces complex threats, from sophisticated prompt injection and model poisoning attacks to agent memory manipulation and tool misuse. Unfortunately, traditional security controls are ill-equipped to handle these evolving threats.
This session cuts through the hype to provide:
- Practical CISO-focused lens to navigating the landscape
- Comprehensive visibility and robust security across the entire AI lifecycle
- Actionable framework to secure their organization’s AI ecosystem
11:10am - 11:55am Executive Boardroom
Reducing Application Delivery Tech Debt from the Inside Out
Hosted by Island

Michael Leland
VP, Field CTO
Island

Olu Opeyemi-Ajayi
CISO
NYC Dept. of Transportation

Nashira Spencer
CISO & Head of Enterprise IT
Stitch Fix
With high volumes of sensitive data now flowing through web browsers, three in five organizations say data leakage is likely given current IT and security infrastructures. Stop playing catch-up. Discover new approaches to enterprise operations to reduce risk while simplifying operations.
Join this roundtable to discover:
- How disparate IT and security solutions create technical debt
- What challenges impact internal and end user stakeholders
- How simplifying IT can strengthen security, and boost productivity
11:10am - 11:55am Executive Boardroom
Streamlining Compliance for Operational Excellence
Hosted by Akamai

Patrick Sullivan
VP, CTO, Security Strategy
Akamai Technologies

Jae Sohn
CISO, Managing Director
Intesa Sanpaolo

Seth Webster
Global CISO
CooperVision
Navigating today’s complex regulatory environment is a challenge for even the most resourceful enterprises. From PCI DSS to DORA and HIPAA, businesses must adopt smarter strategies to meet evolving compliance requirements while maintaining operational efficiency.
Join this session to:
- Discover how to narrow compliance scope with micro segmentation
- Learn strategies to reduce the cost and complexity of audits
- Build a compliance program that supports operational excellence and trust
11:10am - 11:55am Executive Boardroom
Beyond Visibility — Proactive SaaS Security in a Shifting Landscape
Hosted by Grip Security and SecurityScorecard

Lior Yaari
CEO and Co-Founder
Grip Security

Steve Cobb
CISO
SecurityScorecard

Steve Grossman
Chief Information Security Officer
National Basketball Association

Jesse Sloman
CISO
SUNY - The State University of New York
SaaS adoption has skyrocketed but so have the risks — from shadow SaaS to evolving identity threats. Static security measures won’t cut it. Organizations need a flexible, real-time approach to securing SaaS environments while maintaining agility.
Join this discussion to dive into:
- Dynamically managing SaaS security through vendor and identity controls
- Detecting and mitigating shadow SaaS risks before they escalate
- Making proactive, data-driven security decisions in an unpredictable landscape
11:55am - 12:30pm Lunch Service
Apply to Participate
Apply to participate in the New York CISO Community Executive Summit.
Gartner facilitates exclusive, C-level communities by personally qualifying and understanding the priorities, challenges and interests of each member.
Our selective approach maintains the high quality of the network and ensures top-level discussions with peers from the world’s leading organizations.
Each application will be reviewed, and once your participation is confirmed, you will have access to year-round community programs.
Location
Venue & Accommodation
Pier Sixty180 10th Avenue
New York, New York, 10011
0.2 miles from venue
363 W 16th Street
New York, New York, 10011
0.5 miles from venue
355 W 16th Street
New York, New York, 10011
0.5 miles from venue
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.