IN-PERSON

New York CISO Executive Summit

June 25, 2025 | Pier Sixty

June 25, 2025
Pier Sixty

APPLY TO PARTICIPATE

Collaborate with your peers

Get together with New York's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Strengthening cybersecurity's influence as a key factor in business decisions

Driving innovative ideas into a leadership vision that fosters cyber resilience and personal growth

Establishing trust and understanding amid complex compliance changes and data ecosystems

New York CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.

Governing Body Co-Chairs

Reshma Budhwani

New York Life
VP, Chief Technology Security Officer

Tomas Maldonado

National Football League
Chief Information Security Officer

Tod Mitchinson

New York Life
VP, Chief Information Security Officer

Lauren Rosenblatt

Public Service Enterprise Group Inc
VP, Chief Information Security Officer

Kylie Watson

Sumitomo Mitsui Banking Corporation
CISO

Teresa Zielinski

GE Vernova
VP, Global CISO

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your New York CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


June 25, 2025

8:00am - 8:30am  Registration & Breakfast

8:00am - 8:30am  Networking

Leadership Book Swap

You are invited to bring your favorite leadership books for a Book Swap at the Executive Summit throughout the day. Which books have influenced you as a leader? Bring a book with your notes in the margins or a fresh copy to leave, and then swap for a book one of your fellow executives has brought. This idea was inspired by a Governing Body Member!

This will start at 8:00am, but will take place throughout the whole day as attendees come and go.

8:30am - 9:15am  Keynote

The Performance Paradox — Mental Health and High Productivity

Kara Hardin headshot

Kara Hardin

Registered Psychotherapist & LEO of The Practice Lab

Guest Speaker

Today's relentless pursuit of success can lead to profound dissatisfaction and dramatically affect mental health. Accomplishments lack satisfaction, work is ceaseless, sleep and self-care are sacrificed. Recognizing this, leaders can play a pivotal role in breaking this cycle and nurturing a healthier and more fulfilled life for themselves and their teams.

Join this keynote from a mental health educator and former lawyer to learn:

  • How time, efficiency, and productivity challenges individual and community health
  • Why mental health of individuals and teams drives performance (and not vice versa)
  • What specific steps leaders can take, for themselves and others, to shift away from the paradox and towards a healthier relationship with work

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Leveraging AI to Better Prevent Data Loss

Kelly Ahuja headshot

Kelly Ahuja

President & CEO

Versa Networks

By analyzing and identifying patterns indicative of a potential data breach, artificial intelligence within a unified framework can dramatically improve your efforts to protect your organization's most precious data.

In this session, you and your peers will gather:

  • Practical steps for better protecting data integrity
  • How intelligent frameworks can augment and refine existing DLP efforts
  • Ways of using these AI-supported frameworks to strengthen overall resilience

9:40am - 10:25am  Breakout Session

The Convergence of Physical and Cyber Securities – A Modern Playbook

Adam Fletcher headshot

Adam Fletcher

Sr. Director, CSO

Blackstone Group

Tomas Maldonado headshot

Tomas Maldonado

Chief Information Security Officer

National Football League

No matter the industry, CISOs are paying closer attention at the connections between cyber and physical securities. Threat detection in the cyber space is one thing but using that information to enhance security or even stop crimes in the physical world — is next level. Being able to quickly mobilize after finding risks could prevent damages or loss to an organization — or maybe even save lives.

Join this session to explore:

  • Expanding your risk lens to see the connection between cyber and physical threat detection
  • Communicating the scale and gravity of information uncovered across the organization
  • Reporting structures of cyber and physical security teams

9:40am - 10:25am  Executive Boardroom

Taming Third Party Risk with Advanced Technologies

Jonathan Ehret headshot

Jonathan Ehret

VP, Global Cybersecurity

Mastercard Cybersecurity

Ronen Halevy headshot

Ronen Halevy

Vice President, Information Security

Sony Corporation of America

Cyber threats are increasingly sophisticated and pervasive, making conventional TPRM approaches like questionnaires inadequate. AI/ML and threat intelligence have the potential to transform TPRM, as well as extending into 4th, 5th parties and beyond. Leveraging key insights can help CISOs stay ahead of evolving risks and enhance security programs, even with limited resources.

Join this session to discuss:

  • Practical strategies for leveraging threat intelligence in TPRM
  • Critical alignment of people and process elements with advanced technologies
  • Acting on useful insights and data to manage supply chain risk

9:40am - 10:25am  Executive Boardroom

Identity Security in the Agentic AI Era

Mike Towers headshot

Mike Towers

Chief Security & Trust Officer

Veza

David Sheidlower headshot

David Sheidlower

Chief Information Security Officer and Privacy Officer

Turner Construction

Tim Kropp headshot

Tim Kropp

Global CISO

SS&C Technologies

The rise of Agentic AI is increasing risks and complexities for Non-Human Identities (NHIs) in cloud environments. AI agents need extensive NHI access, posing new challenges in identity governance and security.

Join this roundtable to discuss:

  • Exponential NHI growth impacting security
  • Management of AI access models and permissions
  • Complex AI interactions affecting identity management

9:40am - 10:25am  Executive Boardroom

True Defense Against API & Application Incidents

Larry Maccherone headshot

Larry Maccherone

Evangelist

Contrast Security

Chris Holden headshot

Chris Holden

SVP, Chief Information Security Officer

Crum & Forster

Alexandria San Miguel headshot

Alexandria San Miguel

Head of Information Security

Chanel

Cybersecurity measures are adept at detecting and responding to incidents across various layers, but the application layer often remains vulnerable. Many organizations have a massive vulnerability backlog that demands timely and effective defense.

Join us to explore:

  • Understanding the scale of the backlog and strategies to prevent exploitation
  • The intricacies of application and API protection within the security operations ecosystem
  • Benefits of having a comprehensive blueprint that reveals attack surfaces, defenses, dangers, and connections 

10:25am - 11:10am  Networking Break

10:35am - 11:00am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:10am - 11:55am  Breakout Session

Featured Session

Details coming soon!

11:10am - 11:55am  Breakout Session

Hackers’ Dead End — How to Block Lateral Movement

Nicholas DiCola headshot

Nicholas DiCola

VP, Customers

Zero Networks

Modern networks have warped into complex webs of layers, workloads, and identities. This session explores how automated, holistic microsegmentation – applied across three axes – creates a defense-in-depth strategy for modern complexity:

  • North-South: Block zero-day exploits at the perimeter
  • East-West: Isolate and protect every asset and workload – and auto-quarantine hackers
  • Up-Down: Deploy dynamic identity controls that leverage user behavior and device posture

11:10am - 11:55am  Executive Boardroom

Reducing Application Delivery Tech Debt from the Inside Out

Uy Huynh headshot

Uy Huynh

VP Solution Engineering

Island

Olu Opeyemi-Ajayi headshot

Olu Opeyemi-Ajayi

CISO

NYC Dept. of Transportation

With high volumes of sensitive data now flowing through web browsers, three in five organizations say data leakage is likely given current IT and security infrastructures. Stop playing catch-up. Discover new approaches to enterprise operations to reduce risk while simplifying operations.

Join this roundtable to discover:

  • How disparate IT and security solutions create technical debt
  • What challenges impact internal and end user stakeholders
  • How simplifying IT can strengthen security, and boost productivity

11:10am - 11:55am  Executive Boardroom

Streamlining Compliance for Operational Excellence

Patrick Sullivan headshot

Patrick Sullivan

VP, CTO, Security Strategy

Akamai Technologies

Navigating today’s complex regulatory environment is a challenge for even the most resourceful enterprises. From PCI DSS to DORA and HIPAA, businesses must adopt smarter strategies to meet evolving compliance requirements while maintaining operational efficiency.

Join this session to:

  • Discover how to narrow compliance scope with micro segmentation
  • Learn strategies to reduce the cost and complexity of audits
  • Build a compliance program that supports operational excellence and trust

11:10am - 11:55am  Executive Boardroom

Beyond Visibility — Proactive SaaS Security in a Shifting Landscape

Lior Yaari headshot

Lior Yaari

CEO and Co-Founder

Grip Security

Steve Cobb headshot

Steve Cobb

CISO

SecurityScorecard

SaaS adoption has skyrocketed but so have the risks — from shadow SaaS to evolving identity threats. Static security measures won’t cut it. Organizations need a flexible, real-time approach to securing SaaS environments while maintaining agility.

Join this discussion to dive into:

  • Dynamically managing SaaS security through vendor and identity controls
  • Detecting and mitigating shadow SaaS risks before they escalate
  • Making proactive, data-driven security decisions in an unpredictable landscape

11:55am - 12:30pm  Lunch Service

12:30pm - 1:05pm  Keynote

Securing Data Flow in the AI-Quantum Era

Mike Anderson headshot

Mike Anderson

Chief Digital & Information Officer

Netskope

Sensitive data movement can be risky but restricting it outright can create operational and security challenges. In an era of agentic AI, generative AI, and emerging quantum computing, organizations need security frameworks that protect data while ensuring agility. This session explores how modern security platforms enable secure data flow, adapt to diverse use cases and prepare for the post-quantum encryption (PQE) shift.

Join this keynote to learn:

  • How to choose the right secure access method for each use case
  • Why security must be adaptive to risk, user behavior and AI-driven interactions
  • How to prepare for post-quantum encryption and its enterprise security impact

1:05pm - 1:30pm  Break

1:30pm - 2:15pm  Breakout Session

Understanding Deepfake-Driven Threats and the Rise of Supercharged AI Attacks

Brian Long headshot

Brian Long

CEO

Adaptive Security

AI has revolutionized the scalability of phishing and social engineering, putting organizations at more risk than ever before. Cybercriminals are using LLMs, automated OSINT collection and deepfake technology to craft highly convincing campaigns that leave any company vulnerable by their weakest link. What should CISOs be looking for as they strategize staying ahead of the game?

Join this session to hear about:

  • The latest real-world examples of deep fakes, GenAI phishing and more
  • Strategies CISOs can use to combat next gen-threats of cybercrime
  • The role people play in the organization and how to elevate them in the fight

1:30pm - 2:15pm  Breakout Session

A CISO’s Next Move

Kylie Watson headshot

Kylie Watson

CISO

Sumitomo Mitsui Banking Corporation

Yonesy Núñez headshot

Yonesy Núñez

CISO

Depository Trust & Clearing Corporation

Don Welch headshot

Don Welch

VP, IT & Global University CIO

New York University

For many tenured CISOs, their careers started at a time when many companies didn’t even have a CISO. While the world has changed, now might be the time for you to also make a change. Is your next career move becoming a CISO at a larger (or start-up) organization, a board member, a CIO, a professor or maybe something totally unexpected? Let’s explore career options with panelists who have done it themselves.

Join this session to ask panelists:

  • How did you explore career options that aligned with life goals
  • When did you know the time was right for a new move
  • What skills and experiences did you need to prepare

1:30pm - 2:15pm  Executive Boardroom

Executive Boardroom

Details Coming Soon!

1:30pm - 2:15pm  Executive Boardroom

Protecting Innovation — Rethinking Data Security Strategies

Chris Bates headshot

Chris Bates

Chief Security Officer

Cyberhaven

Tariq Habib headshot

Tariq Habib

Chief Information Security Officer

MTA

Tod Mitchinson headshot

Tod Mitchinson

VP, Chief Information Security Officer

New York Life

AI makes creating and consuming data easier than ever, with shadow AI and dark data presenting new challenges to security teams. As the tactics for protecting data evolve, security leaders must adopt a risk-based strategy to protect mission-critical data and safeguard innovation.

Join this session to discover:

  • Effective practices for ongoing monitoring to identify risks
  • Rapid investigation and response techniques for insider threats
  • Strategies for evolving your data protection approach

1:30pm - 2:15pm  Executive Boardroom

Escaping Security Dogma – Redefining Human Risk Management

Oz Alashe headshot

Oz Alashe

CEO & Founder

CybSafe

Joe Post headshot

Joe Post

Global Head of Cybersecurity

BIC

Security awareness programs have long been driven by dogma rather than data, often leading to ineffective and misaligned outcomes. With industry shifts and emerging trends, the modern CISO must adopt a smarter, data-driven approach to managing human cyber risk. Security leaders are moving beyond traditional training and using metrics that matter to prove the real impact of their efforts.

Join your peers to discuss:

  • Identifying, targeting, and influencing long-term security behaviors
  • Quantifying your human cyber risk
  • Orchestrating an impactful plan of action with measurable outcomes

2:15pm - 3:00pm  Networking Break

2:25pm - 2:50pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

3:00pm - 3:45pm  Breakout Session

Breakout Session

Details Coming Soon.

3:00pm - 3:45pm  Breakout Session

Security Hot Topics Workshop— Pulse Check Your Priorities

Security continues to find its way into the boardroom and even into headlines.  CISOs are feeling the heat to foster and explain strategic value, opportunities, and implications of key priorities and new innovations. In this workshop, you'll have the chance to pick topics that most interest you and have a dynamic dialogue about them with your peers.

Join this interactive session to:

  • Engage with like-minded CISO peers on top-of-mind priorities
  • Validate strategies and look at topics from new perspectives
  • Share key lessons learned and proven best practices

Table Themes Include: Quantum Computing; AI vs. Talent; Personal Liability; Leading Through M&A; Next-Gen Technology; Passwordless Authentication; Building Your Brand; Life After CISO/Board Membership; Succession Planning

3:00pm - 3:45pm  Executive Boardroom

Be Ready! Preparing Your People for a Cyber Crisis

Daniel Potter headshot

Daniel Potter

Senior Director, Cyber Drills & Resilience

Immersive

Arun Abraham headshot

Arun Abraham

Chief Information Security Officer

Bose Corp

Security leaders face unprecedented challenges as evolving threats, including those posed by generative AI, rapidly increase enterprise risk. While new technologies offer defenses, they also introduce vulnerabilities. A cyber-ready workforce is crucial for organizational resilience, but how do you equip your organization to face the future of threats with confidence?

Join this interactive boardroom to discuss:

  • Acting decisively under pressure to manage and mitigate threats
  • Maintaining stakeholder confidence and protecting reputation during disruptions
  • Sharing threat intelligence and preparing for long-term attack consequences

3:00pm - 3:45pm  Executive Boardroom

Executive Boardroom

Details Coming Soon!

3:00pm - 3:45pm  Executive Boardroom

Executive Boardroom

Amish Amin headshot

Amish Amin

VP, Security Development and Analytics

Comcast

Details Coming Soon!

3:45pm - 4:00pm  Networking Break

4:00pm - 4:35pm  Keynote

Beyond the Headlines – Stories of Cyber Resiliency

Pat Ford headshot

Pat Ford

Chief Information Security Officer, Americas

Schneider Electric North America

Raj Sargule headshot

Raj Sargule

Global Head of Information Security

Christie's

Fostering true cyber resiliency requires balancing preparation across the organization with what actually unfolds during a major event. Hear the behind-the-scenes stories of events highlighted in the news from the CISOs who led their teams through them. Because we all know, it’s not if it’s going to happen… but when.

Come with your questions to join this dynamic session focused on:

  • Stories of detection and recovery – what went right and what fell short
  • Best practices for organizational communication – before, during and after an incident
  • Mutual threat defense – the critical role of collaboration in the cybersecurity community

4:35pm - 4:45pm  Closing Comments and Prize Drawing

4:45pm - 6:00pm  Governing Body Reception

Governing Body Reception

Scoop, sip and socialize at the closing reception hosted by the Governing Body! Enjoy some tasty food and drinks followed by an Ice Cream Social to celebrate all the connections, sharing and learning done throughout the day. Can't wait to see you there!

June 25, 2025

We look forward to seeing you at an upcoming in-person gathering


Gartner cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

Pier Sixty
MORE INFORMATION

Your Community Sponsors


CISO Thought Leaders
Key Sponsors

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Krista Robbins

Senior Community Program Manager

krista.robbins@gartner.com