New York CISO Community
Executive Summit
June 24, 2026 | Pier Sixty
June 24, 2026
Pier Sixty
Collaborate with your peers
Get together with New York's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.
Join your peers to discuss the most critical issues impacting CISOs today:
Enabling GenAI innovation while reducing human-element risk
Reframing risk reduction as minimizing business impact and strengthening resilience
Positioning cybersecurity as a creator and driver of business value
New York CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.
Governing Body Co-Chairs

Arun Abraham
Bose Corp
CISO

Reshma Budhwani
New York Life
Chief Technology Security Officer

Tomás Maldonado
National Football League
CISO

Lauren Dana Rosenblatt
Public Service Enterprise Group Inc
VP & CISO
What to Expect
Agenda
8:00am - 8:30am Registration & Breakfast
8:30am - 9:15am Keynote
Leadership that Shapes the Future
Alan Rosa
CISO & SVP, Infrastructure and Operations
CVS Health
In an era defined by speed, complexity, and constant disruption, today’s CISOs are no longer just defending the enterprise — they are shaping its future. The most impactful security leaders don’t simply respond to change; they harness it, embedding resilience, enabling growth, and keeping people at the center as technology accelerates at unprecedented scale.
Join Alan Rosa, CISO & SVP, Infrastructure and Operations at CVS Health, as he challenges you to:
- Redefine the mandate of the modern CISO
- Articulate a grounded, human‑centered “CISO’s Ethos” in an AI‑driven world
- Step back from the noise of the day‑to‑day to reconnect with purpose and lead with greater impact
9:15am - 9:40am Networking Break
9:40am - 10:25am Breakout Session
Building Verified Trust—Defending Against Deepfake Threats
Hosted by Ping Identity
Darryl Jones
VP Consumer Segment Strategy
Ping Identity
Deepfakes are a growing challenge, making it harder to protect identities and maintain trust. Learn practical strategies for digital identity, advanced verification, and risk-aware authentication to defend your organization against AI-driven threats. Establishing verified trust through rigorous controls is essential for restoring confidence and resilience in digital interactions.
Join this session as CISOs discuss:
- Recognition of deepfake-driven identity risks
- Implementation of digital identity and authentication controls to establish verified trust
- Restoration of trust through identity-first security
9:40am - 10:25am Breakout Session
From Risk Manager to Growth Catalyst — The CISO as a Business Enabler
Eric Boateng
Global CISO & Head of Enterprise Cyber Security
MassMutual
Sherif Khalifa
CISO
CPP Investments
Today’s security leaders are expected to influence the board, guide AI‑driven innovation, and help the business make informed risk‑based decisions that fuel growth. CISOs are stepping into a more strategic, business‑centric role—translating technical risk into executive‑level trade‑offs, shaping enterprise priorities, and mobilizing security as a competitive advantage.
Join this session to hear about:
- Redefining the CISO role from technical authority to enterprise business leader
- Elevating board‑level storytelling so cyber risk is understood—and acted on—as business risk
- Building trusted, outcome‑driven partnerships by aligning security priorities with business strategy and growth objectives
9:40am - 10:25am Executive Boardroom
AI Security – Turning Agents into Security Allies
Hosted by Microsoft Corporation
Nicole Darden Ford
Vice President, Customer Security Officer
Microsoft Corporation
The dual nature of AI is here - extraordinary innovation paired with complex risks. According to recent reports, more than 29% of employees have turned to unsanctioned AI agents for work tasks and these unsecured agents lack clear visibility into what they can do, what they access, or the blast radius they introduce. CISOs must secure AI agents with the same rigor as human users, ensuring visibility, governance, and robust controls amid rapid change and resource constraints.
Join this boardroom to discuss:
- Enforcing Zero Trust principles for both human and AI identities
- Establishing continuous observability and monitoring of AI agent activity
- Implementing governance frameworks to manage access, actions, and compliance
9:40am - 10:25am Executive Boardroom
Unifying Data Visibility — The AI Advantage for CISOs
Hosted by Veeam
Simon Le Comte
VP, Systems Engineering
Veeam
Chris Holden
SVP & CISO
Crum & Forster
CISOs are challenged by fragmented data landscapes, shadow IT, and the need for real-time visibility into sensitive information across different data estates including SaaS, cloud, and modern virtualization platforms. Manual discovery and governance processes can’t keep pace with today’s data sprawl, increasing risk and compliance exposure. Leveraging AI-driven data intelligence empowers CISOs to unify visibility, automate governance, and strengthen security posture.
Join this session to explore:
- Automating sensitive data discovery across environments
- Enabling continuous governance with AI insights
- Reducing risk through unified data intelligence
9:40am - 10:25am Executive Boardroom
Securing the Rise of AI Identities
Hosted by Saviynt
Vibhuti Sinha
Chief Product Officer — Workforce Identity and Intelligence
Saviynt
Dan Finkle
CISO
Alnylam Pharmaceuticals
According to the International Data Corporation, the number of AI identities is expected to reach 1.3 billion in just two years. Yet many organizations don’t secure AI identities effectively, granting excessive access and relying on outdated, slow processes.
Join this session to learn how to:
- Identify gaps in agent access visibility, ownership, and governance
- Address the unique challenges of identity security in AI environments
- Build scalable identity foundations to enable innovation and efficiency
10:25am - 11:10am Networking Break
10:35am - 11:00am Peer-to-Peer Meetings
Peer-to-Peer Meetings
Connect with like-minded peers in a one-on-one setting through Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.
11:10am - 11:55am Breakout Session
Rethinking Security for Agentic AI — From Control to Orchestration
Hosted by Cyera
As AI agents start acting across business environments, data becomes the true control surface. These agents require broad access to data, identities, and business processes, creating new risk patterns as sensitive data and outbound actions converge at machine speed. This is a control shift. CISOs must modernize their data approach to adopt agentic AI confidently while maintaining oversight.
Join this session to explore how to:
- Detect emerging risk behaviors in autonomous AI
- Build a data-centric and intent-aware security model
- Establish the CISO as the orchestrator of scalable AI and business growth enabler
11:10am - 11:55am Breakout Session
Empowering Innovation While Strengthening Security and Control
Hosted by Island
As browser-based and unapproved applications reshape the future of work, CISOs face growing security and compliance risks, including data leakage and policy gaps. Proactively addressing these threats with effective safeguards protects enterprise data, supports innovation, and ensures resilience in an evolving workplace.
Join this session to discuss:
- Risks from unmanaged and shadow tools
- Policies to safeguard sensitive data
- Maintaining compliance and robust security controls
11:10am - 11:55am Executive Boardroom
Identity-Aware Resilience — Control, Recovery and Trust
Hosted by Rubrik
Identity is the fastest path to disruption as attackers misuse valid access, expanding impact before traditional controls catch up. Prevention won't hold on its own. Organizations must contain the impact of compromise, limit the blast radius, and recover to a clean, trusted state across identities, data, and critical systems.
Join this session to discuss how to:
- Protect the identities that matter most to reduce business impact
- Contain identity-driven incidents quickly before they spread across systems
- Recover to a trusted state without reintroducing risk
11:10am - 11:55am Executive Boardroom
Agentic SOC — Amplifying Human Potential with AI
Hosted by Google Cloud Security
Greg Kushmerek
Global Security Architect
Google Cloud Security
Security Operations Centers face mounting pressure from talent shortages and escalating threats, but agentic AI offers a transformative solution by amplifying human capabilities and automating critical tasks. By embedding intelligent agents into SOC workflows, organizations can rapidly upskill teams, accelerate response, and bridge the talent gap. Join this session to explore actionable strategies for leveraging AI-driven agents to future-proof your SOC.
Join this boardroom to explore:
- How agentic AI fills the talent gap in SOCs
- Strategies for upskilling teams alongside agent-driven automation
- Preparing your SOC for the coming AI transformation
11:10am - 11:55am Executive Boardroom
Combating AI with AI — Defending at the Speed of the Attacker
Hosted by Fastly
Fernando Medrano
Deputy CISO
Fastly
Patty Voight
CISO & Tech Risk Manager
Webster Bank
Adversaries aren't just faster; they are more cunning and utilize AI to craft evasive payloads and automate discovery, bypassing traditional signature-based defenses. The challenge is operationalizing AI more effectively by utilizing the latest advances in defensive automation to remain competitive.
Join this session to explore:
- Where today’s risks truly live and how attack techniques are rapidly evolving
- How AI is being operationalized on the defensive side, from AI-assisted detection to response
- What is working, where the gaps are, and how organizations stay competitive in an AI-driven threat environment
11:55am - 12:30pm Lunch Service
Apply to Participate
Apply to participate in the New York CISO Community Executive Summit.
Gartner facilitates exclusive, C-level communities by personally qualifying and understanding the priorities, challenges and interests of each member.
Our selective approach maintains the high quality of the network and ensures top-level discussions with peers from the world’s leading organizations.
Each application will be reviewed, and once your participation is confirmed, you will have access to year-round community programs.
Location
Venue & Accommodation
Pier SixtyCommunity Program Manager
For inquiries related to this community, please reach out to your dedicated contact.
