New York CISO Virtual Executive Summit

June 1, 2021 | 7:45am - 3:00pm EDT

June 1, 2021 | 7:45am - 3:00pm EDT


Collaborate with your peers

Come together with your peers virtually to tackle top business challenges through peer-driven content and discussions at the New York CISO Virtual Executive Summit.

Join your peers to discuss the most critical issues impacting CISOs today:

Accelerating security to match the pace of digital business initiatives

Managing the risk created from a landscape of new core technologies

Achieving sustainability for the CISO role without compromising outcomes


Zouhair Guelzim

L'Oreal USA

Tomas Maldonado

National Football League

Tod Mitchinson

New York Life

Michael Palmer

Chief Information Security Officer

Eric Staffin

IHS Markit
Partner and Senior Vice President, Chief Information Security Officer

Kylie Watson

Sumitomo Mitsui Banking Corporation

Teresa Zielinski

GE Power
Senior VP, Chief Information Security Officer & Product Security

What to Expect

Connect with your CISO community through a variety of different session formats at the upcoming Virtual Executive Summit. You'll have the opportunity to listen, engage and create lasting relationships with like-minded peers.


Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join intimate, interactive discussions with peers in Boardroom sessions.

Meet the Speakers

Don't miss this opportunity to meet with CISO practitioners and industry thought leaders who shared their insights on the agenda. Come with questions and get ready to meet new friends in this casual session designed to foster peer connections and collaboration in the New York community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. Be sure to opt in when you register and get matched based on your key priorities.


June 1, 2021

7:45am - 8:45am  EDT Virtual Summit Keynote

Interactive Innovation Spotlight

John Brennan headshot

John Brennan


YL Ventures

Yaniv Bar-Dayan headshot

Yaniv Bar-Dayan

CEO & Founder


Avi Shua headshot

Avi Shua

CEO & Co-Founder at Orca Security

Orca Security

Ronen Slavin headshot

Ronen Slavin

CTO & Co-Founder


Be among the first to see what’s new and next in the security solutions landscape. Three early-stage providers will get the chance to showcase their innovative solutions to the most pressing cybersecurity challenges.

Join this boardroom-style keynote session to ask questions, learn and explore:

  • Vulcan’s risk analytics and remediation orchestration
    • If there was one thing you could change about the way you prioritize and remediate security vulnerabilities in your environment, what would it be?
    • How well does your team work with IT stakeholders (application, cloud, network, infra, etc.) to drive remediation outcomes, and reduce risk for the business?
  • Cycode’s access control and configuration management 
    • Does your security team have the visibility and control that it needs to secure development tools and infrastructures like source control management, build systems, and the cloud environment? If not, what are your unmet needs?
    • Where does reducing code tampering risk sit on your priority list? What are your key initiatives to reduce code tampering risk and what are the biggest gaps that you're trying to solve for?
  • Orca Security’s cloud security risk detection in your cloud environment
    • What is your first impression of an agentless cloud native security platform?
    • If you could change one thing about how you track asset inventory, what would it be?

8:45am - 9:00am  EDT Break

9:00am - 10:00am  EDT Virtual Summit Boardroom

Merging Zero Trust And SASE

Joe Sullivan headshot

Joe Sullivan

SVP, Chief Security Officer


Robert Brown headshot

Robert Brown


Federal Home Loan Bank of New York

Teresa Zielinski headshot

Teresa Zielinski

Senior VP, Chief Information Security Officer & Product Security

GE Power

Organizations are feeling a shift in the world of networking and security as they rapidly adopt and embrace the cloud. Enterprises need efficiency, visibility and security without compromise. The secure access service edge, better known as SASE, and zero trust implementations can provide a more comprehensive security capability to truly support digital transformation.

In this session, you will discuss:

  • Problems SASE can address in the modern enterprise
  • Benefits of planning both SASE and zero trust implementations
  • How to best position your organization for this transition

9:00am - 10:00am  EDT Virtual Summit Boardroom

Fostering Innovation in the World of Risk Aversion

Steve Magny headshot

Steve Magny

Director Cybersecurity Solutions


Orrie Dinstein headshot

Orrie Dinstein

Global Chief Privacy Officer

Marsh & McLennan

Stephen Garcia headshot

Stephen Garcia

VP of Cybersecurity


In cybersecurity, the goal is to minimize risk. However, adversaries are agile in their efforts to subvert security measures and innovation is required to keep pace with the evolving threat landscape. What must CISOs do to run an efficient SOC while still mitigating risk?

Join this this session to discuss:

  • The biggest risks in cyber today
  • Attacks that have resulted in reactive or proactive changes
  • Strategies to drive innovation in your program

9:00am - 10:00am  EDT Virtual Summit Boardroom

Securing the Sprawling Endpoint

David Balcar headshot

David Balcar

Security Strategist

VMware Carbon Black

Patricia Hinerman headshot

Patricia Hinerman

Chief Information Security Officer

Interpublic Group of Companies

Stephen Savard headshot

Stephen Savard

Director of Information Technologies

ICC Industries Inc

The global health pandemic has forced CISOs into a new era of evolving challenges. With fully remote workforces and assets continuously moving to the cloud, securing endpoint protection has never been more critical. So how are CISOs deploying next-generation endpoint protection to solve these obstacles?

Join this interactive session to discuss:

  • Securing critical applications even in a state of compromise
  • Tactics for monitoring a sprawling attack surface
  • Leveraging new technologies to quantify threats

9:00am - 10:00am  EDT Virtual Summit Boardroom

Strengthening Your Security Operations Center

Robert Aragao headshot

Robert Aragao

Chief Security Strategist, Security Risk & Governance

Micro Focus

Tod Mitchinson headshot

Tod Mitchinson


New York Life

Tim Rohrbaugh headshot

Tim Rohrbaugh


JetBlue Airways

When it comes to taking your data from you, cyber criminals never rest. If they can’t get in one way, they will try another. Therefore, when managing incidents for your enterprise, it is critical to ensure that threats and attacks are properly identified, analyzed, communicated, defended, investigated and reported.

During this boardroom discussion on cyber operations, discover:

  • How to develop effective principles and procedures for security operations centers
  • The best way to identify events and incidents in the environment
  • How to create effective communication and reporting strategies for the entire organization

9:00am - 10:00am  EDT Virtual Summit Boardroom

Optimizing Cloud Data Security

Michael Coates headshot

Michael Coates

CEO & Co-Founder

Altitude Networks

Arvin Bansal headshot

Arvin Bansal

Sr. Director Data & Cloud Security


Bobby Edamala headshot

Bobby Edamala

Chief Information Security Officer

Cornell University

Protecting your valuable data assets is the foundation of any security strategy. But in today's rapidly evolving digital business world, there are an increasing number of entry points that may allow unauthorized access to your critical data in the cloud. How is your organization prioritizing high-risk activity and automating policies to protect data in real-time without interrupting workforce productivity?

Join this discussion to explore:

  • Building a comprehensive data management strategy that encompasses the unique elements of cloud SaaS
  • How to avoid potential pitfalls while safely enabling innovative solutions
  • Accelerating cloud data protection capabilities while maximizing potential to achieve governance, security and productivity goals

10:00am - 10:45am  EDT Virtual Summit Keynote

Taking Control in the Cloud

Jeff Crume headshot

Jeff Crume

Distinguished Engineer, CTO IBM Security - Americas IBM Master Inventor, Academy of Technology Member


Mikhail Falkovich headshot

Mikhail Falkovich

Director of IT, Information Security

Consolidated Edison Company

Are you challenged with uncontrolled costs and unknown risks from your adoption of cloud services? Concerned with whether your IaaS investments are endangering your security or compliance? Or perhaps you’re just watching your budget disappear seemingly on its own. You are not alone.

Join your peers for a discussion around:

  • Optimizing the cost of the cloud
  • Improving security, compliance and governance in cloud architectures
  • Leveraging the resources and controls you already have

By registering for this session, this serves as your authorization to Evanta or its vendor to provide your contact information to IBM to follow up on your interaction and participation. IBM’s use of your contact information is governed by the IBM Privacy Policy. If you need more information on how IBM is using your personal data you may refer to the IBM Privacy Statement. To withdraw your marketing consent and unsubscribe to receiving emails click on the unsubscribe button at this address:

10:45am - 11:00am  EDT Break

11:00am - 12:00pm  EDT Virtual Summit Boardroom

Managing and Responding to Insider Risk

Dave Capuano headshot

Dave Capuano

SVP Product


Ankur Ahuja headshot

Ankur Ahuja

Vice President and Global CISO


James Beeson headshot

James Beeson

Vice President & Chief Information Security Officer


Lauren Dana Rosenblatt headshot

Lauren Dana Rosenblatt


International Flavors & Fragrances

Organizations are moving faster than ever before. With employees creating, modifying, deleting, and transporting data every second, how can CISOs keep up as job hopping and turnover rates continue to rise?

Join this boardroom to discuss:

  • Ways to cut through the false noise and final real risk within your organization
  • How to determine the right approach to insider risk response
  • Strategies to continuously monitor file activity without being invasive

11:00am - 12:00pm  EDT Virtual Summit Boardroom

Reducing Security Debt with the Right Tools and Strategies

Dave Lewis headshot

Dave Lewis

Global Advisory CISO

Duo Security

Michael Cena headshot

Michael Cena

Vice President, Head of Cyber Security

A+E Networks

Kylie Watson headshot

Kylie Watson


Sumitomo Mitsui Banking Corporation

Security debt, defined by Dave Lewis, Global Advisory CISO, Duo Security at Cisco, as “the accumulation of the patches missed, the risks accepted, and the configurations misapplied,” is another serious and common problem for many organizations, especially with the move to cloud computing and rise of IoT. CISOs need solutions that will successfully protect their systems and information. Selecting the right tools and strategies is the key to success with these issues.

Join this session to discuss:

  • Prudent approaches to right-size the balance of security controls and agile access
  • Ways your peers discuss strategy for trust and access with other senior leaders
  • How to create defined and repeatable processes with plans for action to eliminate security debt

11:00am - 12:00pm  EDT Virtual Summit Boardroom

Rethink Vulnerability Management via Exposure Risk

Haggai Polak headshot

Haggai Polak

Chief Product Officer

Skybox Security

Rod Aday headshot

Rod Aday

Director, Information Risk Management


Leon Flaksin headshot

Leon Flaksin

Head of Information Risk Management

BlackRock Inc

With 18,341 new vulnerabilities discovered in 2020, every year there are more and more vectors of potential cyberattacks into your organization. Vulnerabilities are ‘gateways’ for cyber threat actors to exploit and leverage to break into your networks, move around laterally, exfiltrate sensitive data and even launch a ransomware attack.

Join your peers and Skybox Security where we will explore:

  • What is needed to establish more effective vulnerability management programs
  • Eye-opening realities and trends regarding the expansion of vulnerabilities
  • Ways for you to eliminate exposure risk in the most effective and efficient way possible

11:00am - 12:00pm  EDT Virtual Summit Boardroom

Auto-Takedowns — The Essential Tool for Security Automation

Shashi Prakash headshot

Shashi Prakash

CTO and Chief Scientist

Doug Greene headshot

Doug Greene

Vice President, Chief Information Security Officer

Guardian Life Insurance

Brian Lozada headshot

Brian Lozada



Security teams continue to wrestle with a range of external threats affecting customers, employees and supply chains. New AI and automation capabilities can shorten detection times to milliseconds, and takedown times to minutes. Does this sound like magic?

Join us in this roundtable peer discussion to explore:

  • Key challenges and pain points from the real world examples
  • The current role of AI and automation technology for detection
  • Auto-takedown processes and how they can benefit your organization

11:00am - 12:00pm  EDT Virtual Summit Boardroom

The Evolving Threat Landscape – Protect Your Privileges

Robert Dalrymple headshot

Robert Dalrymple

AVP & Chief Information Security Officer


Raj Sargule headshot

Raj Sargule

Global Head of Information Security


Morey Haber headshot

Morey Haber

Chief Technology Officer, Chief Information Security Officer


Agencies and organizations have suffered a record-breaking number of cyberattacks over the past year. It seems that every week we see new headlines highlighting large-scale ransomware attacks or data breaches. With the explosion of privileged accounts, unpatched vulnerabilities, and a growing remote workforce, Privileged Access Management (PAM) must be an important cornerstone when developing a strategy to secure IT, IoT or OT systems.

Join this interactive peer-discussion and explore:

  • The evolving threat landscape and ways to improve remote workforce security
  • Why privilege management plays an increasingly crucial role in mitigating cyberattacks and protecting critical infrastructure
  • The principal of least privilege

12:00pm - 12:45pm  EDT Virtual Summit Keynote

Security Doesn’t Live on Paper — An Interactive Crisis Simulation

Tony Chryseliou headshot

Tony Chryseliou

Senior Manager Global Information Security


James Hadley headshot

James Hadley


Immersive Labs

When the worst happens not even the best incident response plans can account for the human element. You might know how your tech will work under pressure but what about you and your people? In this interactive keynote session, you’ll use your decision-making skills to find the threat and manage the growing crisis.

Join this session to:

  • See the real time impact of the human element in crisis management and response
  • Gain a greater understanding of how decisions in a threat scenario have a business-wide impact
  • Discover how to strengthen your organization on both sides of “the boom”, so it’s as ready before the impact as it is after it

12:45pm - 1:15pm  EDT Networking

Meet the Speakers

Jeff Brown headshot

Jeff Brown


State of Connecticut

Don't miss this opportunity to meet with New York practitioners and industry thought leaders who shared their insights on the agenda. Come with questions and get ready to meet new friends in this casual session designed to foster peer connections and collaboration in the CISO community. 

1:15pm - 1:30pm  EDT Break

1:30pm - 3:00pm  EDT Virtual Peer-to-Peer Meetings

Peer-to-Peer Meetings

Meet virtually for in-depth conversations with your colleagues


Your Community Partners

Key Partners
Program Partners

New York CISO Program Manager

For inquiries related to this event, please reach out to your dedicated program contact.

Krista Robbins

Sr Program Manager