
New York CISO Community
Executive Summit
June 21, 2023 | Pier Sixty
June 21, 2023
Pier Sixty
Collaborate with your peers
Get together with New York's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.
Join your peers to discuss the most critical issues impacting CISOs today:
Evolving Sourcing & Development Tactics to Build a Sustainable Talent Pipeline
Enhancing visibility, reducing response time, and understanding insights to protect against threats
Strengthening traditional IAM approaches to keep up with the pace of digital acceleration
New York CISO Governing Body
The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven By CISOs, For CISOs®.
Governing Body Co-Chairs

Jeff Brown
State of Connecticut
Chief Information Security Officer

Michael Cena
A+E Networks
Vice President, Head of Cyber Security

Zouhair Guelzim
L'Oreal Americas
VP, Chief Information Security Officer

Brian Lozada
Amazon Prime Video & Studios
Chief Information Security Officer

Tomas Maldonado
National Football League
Chief Information Security Officer

Tod Mitchinson
New York Life
VP, Chief Information Security Officer

Michael Palmer
Hearst
Chief Information Security Officer

Kylie Watson
Sumitomo Mitsui Banking Corporation
CISO
What to Expect
Agenda
June 20, 2023
June 21, 2023
7:45am - 8:30am Registration & Breakfast
8:30am - 9:15am Keynote
Strengths 2.0 — Applying Design Thinking to Your Strengths and Weaknesses
Hosted by Illumio

John Coyle
CEO and Founder of "Speaking Design Thinking"
Guest Speaker
John K. Coyle is the founder and CEO of "Art of Really Living" and one of the world's leading experts in innovation and design thinking. Through the metaphor of sport, learn how individuals and teams can use innovation approaches to identify and leverage their unique strengths (and design around weaknesses). Become empowered to solve old problems in new ways and achieve breakthrough results. Understand how to apply the “Design Thinking” process to business and personal challenges.
This will empower you to:
- Achieve breakthrough performance by focusing on what you do best
- Decide what to delegate, quit or outsource, and plan to maximize team resources
- Create higher engagement and more effective collaboration with customers and colleagues
9:15am - 9:40am Networking Break
9:40am - 10:25am Breakout Session
Achieving Transformational Security Improvements with the Enterprise Browser
Hosted by Island

Scott Montgomery
VP, Strategic Accounts
Island.Io
One of the most widely deployed applications in the Enterprise has also become one of the most strategic – yet it was an application that was never built or designed for the Enterprise? The browser has changed the way we work in the modern era, however it is unapologetically based on consumer needs and preferences. What if the browser was designed for the enterprise? What could that do for security, productivity and work itself? Join us to see how this technology is transforming the way companies do business.
In this session, we will share details on:
- Innovative features and possibilities for critical application protection
- Creating an employee experience centered on productivity and flexibility
- Reimagining how IT leaders can enable users while creating unique business value
9:40am - 10:25am Breakout Session
Hit Refresh - A Relevant Practice in Ransomware Response
Hosted by Red Canary

Harry Halikias
Director, Cyber Security
New York Public Library
For some, responding to a ransomware scenario should be easy. "Just restore the backups." Still, boardrooms, executive suites, business owners, security professionals and policymakers continue struggling to understand the nuances and complexities of this persisting issue. Don't get too comfortable.
Join this interactive, practical, and fresh discussion to:
- Learn when to activate your incident response plan
- Consider post-event responsibility delegation
- Actively address the age-old question - "To pay or not to pay"
9:40am - 10:25am Executive Boardroom
IaC, Malware, Ransomware, Oh My!
Hosted by Qualys

Reshma Budhwani
VP, Chief Technology Security Officer
New York Life

Tony Chryseliou
Global Information Security Executive
Sony Corporation of America

Corey Smith
Senior Director of Solution Architecture
Qualys
Shift Left? Shift Right? CSPM/CWPP/CNAPP, CDR… the list of cloud security acronyms and slogans can be terrifyingly long. Terms are often used interchangeably depending upon the prism of the vendor you speak with. At the end of the day, it’s crucial as a security leader to have a clear thought-process on what tools your organization uses, so you aren’t fighting with one arm tied behind your back.
Join this executive boardroom to discuss:
- What makes up a good set of cloud tools to choose from at your disposal
- Best practices for a modern organization to defend and monitor cloud infrastructure
- Potential differences in the approach for single vs. multi-cloud
9:40am - 10:25am Executive Boardroom
Managing Risk from Critical Vulnerabilities
Hosted by Rapid7

Jason Mical
Field Chief Technology Officer - Americas
Rapid7

Bob Brown
CISO
Federal Home Loan Bank of New York

Doug Greene
VP, Chief Information Security Officer
Guardian Life Insurance

Tod Mitchinson
VP, Chief Information Security Officer
New York Life
In today’s threat landscape, security teams are frequently forced into reactive positions, lowering security program efficacy and sustainability. Strong foundational security program components, including vulnerability and asset management processes, are essential to building resilience in a persistently elevated threat climate.
Join this interactive boardroom to discuss:
- Defining what your emergency procedures and “playbooks” look like.
- How you prioritize CVEs, VPNs and firewalls
- Combatting the challenge of zero-day exploitation
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to a small number of attendees (seating priority is given to CISOs).
To reserve your seat, please contact:
NAME at PHONE or EMAIL
9:40am - 10:25am Executive Boardroom
A New Vision for Identity Security
Hosted by CyberArk

Clarence Hinton
Chief Strategy Officer
CYBERARK

Michael Cena
Vice President, Head of Cyber Security
A+E Networks

Naresh Podila
Chief Information Security Officer
Danaher UK
The number of human and machine identities seeking access to data and critical business systems has grown exponentially, in turn increasing the threat landscape and challenging traditional IAM paradigms. How do security leaders keep a pulse on tools and capabilities to assess their organization’s cybersecurity posture?
Join this boardroom to discuss:
- Managing and securing all identities
- Mitigating risks in multi-cloud and hybrid environments
- Balancing high expectations and avoiding burnout
9:40am - 10:25am Executive Boardroom
Performing in an Era of “Do More with Less”
Hosted by Cisco Secure

Wolfgang Goerlich
Advisory CISO
Cisco Secure

Aaron Katz
CISO, Genesis
Digital Currency Group

Ian Rathie
Managing Director, Chief Information Security Officer
Fitch Ratings
Cybersecurity and technology leaders are being constantly challenged to up-level their own technology and strategies to keep the business safe and these days they're doing it all while working with tighter budgets or fewer resources. These restrictions may find security leaders asking what to prioritize, how much time and energy can be spent on each project and where to start. But what actually works in cybersecurity?
Join this boardroom to discuss:
- How to continually show progress on security initiatives despite staff and budget cuts
- How your team can prepare for whatever is next on the threat horizon while dealing with belt tightening
- Strategies for building resilient cybersecurity programs
10:25am - 11:00am Networking Break
10:30am - 10:55am Peer-to-Peer Meetings
Peer-to-Peer Meetings
Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.
June 20, 2023
June 21, 2023
Apply to Participate
Apply to participate in the New York CISO Community Executive Summit.
Gartner facilitates exclusive, C-level communities by personally qualifying and understanding the priorities, challenges and interests of each member.
Our selective approach maintains the high quality of the network and ensures top-level discussions with peers from the world’s leading organizations.
Each application will be reviewed, and once your participation is confirmed, you will have access to year-round community programs.
Location
Venue & Accommodation
Pier SixtyParking Information
Self-parking is located right inside the Chelsea Piers complex as you enter the venue. Self-parking is based on availability and posted hourly parking rates apply. Drivers pay as they exit the complex. Chelsea Piers Parking Rates can be found here.
Community Program Manager
For inquiries related to this community, please reach out to your dedicated contact.