
New York CISO Community
Executive Summit
December 3, 2025 | Convene at 30 Hudson Yards
December 3, 2025
Convene at 30 Hudson Yards
Collaborate with your peers
Get together with New York's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.
Join your peers to discuss the most critical issues impacting CISOs today:
Amplifying cybersecurity as a critical influence in business decisions
Fortifying cyber resilience to ensure rapid recovery from attacks and safeguard business continuity
Optimizing opportunities and understanding threats presented by new technologies
New York CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.
Governing Body Co-Chairs

Reshma Budhwani
New York Life
VP, Chief Technology Security Officer

Tomas Maldonado
National Football League
Chief Information Security Officer

Tod Mitchinson
New York Life
VP, Chief Information Security Officer

Lauren Dana Rosenblatt
Public Service Enterprise Group Inc
VP, Chief Information Security Officer

Read More
David Sheidlower
Turner Construction
Chief Information Security Officer and Privacy Officer

Kylie Watson
Sumitomo Mitsui Banking Corporation
CISO
What to Expect
Agenda
8:00am - 8:30am Registration & Breakfast
8:30am - 9:15am Keynote
A CIA Toolkit for Leveraging Ambiguity, Driving Excellence, and Leading with Agility

Rupal Patel
Corporate Strategist & Executive Advisor
Guest Speaker
In this dynamic session, Rupal Patel will share thought-provoking insights from her CIA to CEO journey on leveraging ambiguity and uncertainty in pursuit of organizational excellence. Through case studies and stories from the field, Rupal will demystify how to put “agility” into action, and transform the concept from an overused buzzword to an actionable toolkit.
This keynote will explore:
- Concrete methods for embedding agility into their organizational structure
- Tools for developing personal resilience and becoming more agile decision makers
- An adaptable framework for becoming change-agents and driving organizational excellence
9:15am - 9:40am Networking Break
9:40am - 10:25am Breakout Session
Autonomy or Fallout: Lessons From Recent Third-Party Breaches
Hosted by Safe Security

Saket Modi
Co-Founder and CEO
Safe Security
You’ve seen the headlines — a vendor gets hit, the attacker walks in, and the enterprise takes the loss. Most TPRM programs are still running on outdated playbooks: slow questionnaires and one-off audits that miss fast-moving risk. In this session, we’ll break down what these breaches actually exposed, why CISOs can’t keep managing vendors this way, and how autonomous, AI-driven TPRM flips the model to real-time discovery and control.
Join this session to hear:
- What recent third-party breaches really revealed about supply chain weak points
- Why questionnaires and audits fail when risk evolves daily
- How autonomous TPRM uses AI agents for continuous discovery, assessment, and monitoring
9:40am - 10:25am Breakout Session
Protecting Critical Data Through Cyber Resilience
Hosted by BMC Software

Audley Dean
CISO
BMC Software
Evolving cyber threats like ransomware can cause organizations severe financial, operational, and reputational damage. Businesses are facing mounting pressure to protect mission-critical data. To ensure cyber resiliency, CISOs must focus on a strong security strategy, seamless innovation integration, and advanced recovery capabilities.
Join this session to discuss:
- Using data-driven insights to identify evolving security threats in real-time
- Integrating automation to resolve issues quickly, especially within mainframe environments
- Ensuring rapid restoration and uninterrupted data access to maintain operations and compliance
9:40am - 10:25am Executive Boardroom
Winning the AI vs. AI Cybersecurity Battle
Hosted by Abnormal AI

Mick Leach
Field CISO
Abnormal AI

David Sheidlower
Chief Information Security Officer and Privacy Officer
Turner Construction
AI is transforming the cybersecurity landscape for both attackers and defenders. Security leaders now face AI-powered threats that evolve faster and operate more intelligently than ever before. Using AI to defend your organization is no longer optional — it’s essential.
Join this session to discuss:
- The growing impact of AI-powered threats and how organizations are adapting
- Why behavioral analysis and context are critical to detecting modern attacks
- Strategies to stay ahead in the AI arms race
9:40am - 10:25am Executive Boardroom
Executive Boardroom
Hosted by Horizon3.ai
Details coming soon!
9:40am - 10:25am Executive Boardroom
Executive Boardroom
Hosted by Ping Identity

Darryl Jones
VP Consumer Segment Strategy
Ping Identity

Rich Kellen
Vice President & Chief Information Security Officer
IFF
Details coming soon!
10:25am - 11:10am Networking Break
10:35am - 11:00am Peer-to-Peer Meetings
Peer-to-Peer Meetings
Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.
11:10am - 11:55am Breakout Session
Securing the Network for the Agentic Era
Hosted by Cisco

Chad Skipper
Global Security Technologist
Cisco Secure
AI is enhancing the capabilities of adversaries, enabling large-scale social engineering and instant vulnerability exploitation. At the same time, organizations are integrating agentic AI—autonomous helpers operating within their networks. As CISOs, you must understand the expanding threat landscape of the agentic era. Implementing practical defenses allows you to embrace innovation, even when attackers—and your own applications—leverage AI.
This session will cover:
- As AI capabilities grow, so does AI risk: Practical defenses such as identity-first access, distributed enforcement, and AI-aware guardrails are critical for enterprise security
- Agentic AI requires specialized protection: Emerging approaches include managing agent identity and trust, as well as utilizing closed-loop detection and response
- Collaboration without compromise: Integrate security throughout the network to strengthen human+AI teamwork without slowing innovation
11:10am - 11:55am Breakout Session
The Business Has Complex Questions – Do Your Data and AI Have Trusted Answers?
Hosted by Twilio

Ivy Grant
Senior Vice President, Corporate Strategy and Operations
Twilio
AI-powered data and analytics are transforming how CISOs answer complex, business-critical questions with precision and speed. What are some of the best practices of security leaders who effectively leverage AI for continuous learning, deeper insights, and actionable decision-making?
Join this session to examine:
- Unlocking comprehensive answers to evolving business questions
- Enabling continuous learning for impactful AI usage
- Harnessing new opportunities with agentic AI and preparing for the next AI leap
11:10am - 11:55am Executive Boardroom
Driving Resilience Through AI-Powered Identity Security
Hosted by Delinea

Phil D'Angio
VP of World Wide Sales Engineering
Delinea

Ronen Halevy
Vice President, Information Security
Sony Corporation of America

Gustavo Diaz
CISO, Americas
A&O Shearman
As organizations rapidly adopt AI, identity is both a key control point and a top attack target. How can CISOs use AI to strengthen security and resilience without adding complexity?
Join this boardroom to discuss:
- Applying AI in threat detection and access governance
- Managing risks and building trust in identity programs
- Balancing automation and human oversight
11:10am - 11:55am Executive Boardroom
Generative to Agentic — Is The Risk Worth The Evolution?
Hosted by Elastic

Anthony Scarfe
Deputy CISO
Elastic

Dave Bostrom
CISO, Americas
Boehringer Ingelheim

Steve Grossman
Chief Information Security Officer
National Basketball Association
GenAI is changing rapidly, and the next major step is agentic AI — systems that are capable of taking actions without human oversight. This brings a new level of complexity, but there are benefits for security teams as well. Security leaders are now exploring the value and risk of agentic AI to determine how to advance safely.
Join Elastic’s security leadership to explore:
- The use of GenAI in security and how it's advanced to meet different team needs
- How AI adoption changes your attack surface
- The different ways AI augments security teams and workflows
11:10am - 11:55am Executive Boardroom
From Recovery to Resilience — Delivering on the Board Imperative
Hosted by Rubrik

Keith Duemling
VP, CISO
Catholic Health Services of Long Island

John Murphy
CISO-in-Residence
Rubrik
Cyber resilience is a board-level mandate — demanding more than compliance or generic technical controls. Yet, legacy technology, technical debt, and competing priorities remain persistent challenges. Leading CISOs are cutting through the ambiguity, offering practical frameworks and real-world strategies to define, measure, and translate resilience into effective business continuity and tangible value.
Join this session to discuss:
- Actionable frameworks and metrics for defining resilience in your context
- Automating recovery across complex, legacy environments to overcome technical debt
- Embedding resilience with shared accountability for continuous improvement
11:55am - 12:30pm Lunch Service
Apply to Participate
Apply to participate in the New York CISO Community Executive Summit.
Gartner facilitates exclusive, C-level communities by personally qualifying and understanding the priorities, challenges and interests of each member.
Our selective approach maintains the high quality of the network and ensures top-level discussions with peers from the world’s leading organizations.
Each application will be reviewed, and once your participation is confirmed, you will have access to year-round community programs.
Location
Venue & Accommodation
Convene at 30 Hudson YardsParking & Transportations
Details to come.
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.