New York CISO Executive Summit

June 21, 2023 | Pier Sixty

June 21, 2023
Pier Sixty

Collaborate with your peers

Get together with New York's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Evolving Sourcing & Development Tactics to Build a Sustainable Talent Pipeline

Enhancing visibility, reducing response time, and understanding insights to protect against threats

Strengthening traditional IAM approaches to keep up with the pace of digital acceleration

New York CISO Governing Body

The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Michael Cena

A+E Networks
Vice President, Head of Cyber Security

Zouhair Guelzim

L'Oreal Americas
VP, Chief Information Security Officer

Brian Lozada

Amazon Prime Video & Studios
Chief Information Security Officer

Tomas Maldonado

National Football League
Chief Information Security Officer

Tod Mitchinson

New York Life
VP, Chief Information Security Officer

Michael Palmer

Chief Information Security Officer

Kylie Watson

Sumitomo Mitsui Banking Corporation

Teresa Zielinski

General Electric
Chief Information and Product Security Officer

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your New York CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.


June 20, 2023

6:00pm - 8:30pm  Governing Body Welcome Reception

CISO Royale — Casino Night and Governing Body Welcome Reception

Compete in games of chance and skill at the New York CISO community's first Governing Body Welcome Reception of 2023!

7:45am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

Strengths 2.0 — Applying Design Thinking to Your Strengths and Weaknesses

John Coyle headshot

John Coyle

CEO and Founder of "Speaking Design Thinking"

Guest Speaker

John K. Coyle is the founder and CEO of "Art of Really Living" and one of the world's leading experts in innovation and design thinking. Through the metaphor of sport, learn how individuals and teams can use innovation approaches to identify and leverage their unique strengths (and design around weaknesses). Become empowered to solve old problems in new ways and achieve breakthrough results. Understand how to apply the “Design Thinking” process to business and personal challenges. 

This will empower you to:

  • Achieve breakthrough performance by focusing on what you do best
  • Decide what to delegate, quit or outsource, and plan to maximize team resources
  • Create higher engagement and more effective collaboration with customers and colleagues

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

Achieving Transformational Security Improvements with the Enterprise Browser

Scott Montgomery headshot

Scott Montgomery

VP, Strategic Accounts


One of the most widely deployed applications in the Enterprise has also become one of the most strategic – yet it was an application that was never built or designed for the Enterprise? The browser has changed the way we work in the modern era, however it is unapologetically based on consumer needs and preferences.  What if the browser was designed for the enterprise? What could that do for security, productivity and work itself? Join us to see how this technology is transforming the way companies do business.  

 In this session, we will share details on:

  • Innovative features and possibilities for critical application protection
  • Creating an employee experience centered on productivity and flexibility
  • Reimagining how IT leaders can enable users while creating unique business value

9:40am - 10:25am  Breakout Session

Hit Refresh - A Relevant Practice in Ransomware Response

Harry Halikias headshot

Harry Halikias

Director, Cyber Security

New York Public Library

For some, responding to a ransomware scenario should be easy. "Just restore the backups." Still, boardrooms, executive suites, business owners, security professionals and policymakers continue struggling to understand the nuances and complexities of this persisting issue. Don't get too comfortable.

Join this interactive, practical, and fresh discussion to: 

  • Learn when to activate your incident response plan
  • Consider post-event responsibility delegation 
  • Actively address the age-old question - "To pay or not to pay"

9:40am - 10:25am  Executive Boardroom

IaC, Malware, Ransomware, Oh My!

Reshma Budhwani headshot

Reshma Budhwani

VP, Chief Technology Security Officer

New York Life

Tony Chryseliou headshot

Tony Chryseliou

Global Information Security Executive

Sony Corporation of America

Corey Smith headshot

Corey Smith

Senior Director of Solution Architecture


Shift Left? Shift Right? CSPM/CWPP/CNAPP, CDR…  the list of cloud security acronyms and slogans can be terrifyingly long. Terms are often used interchangeably depending upon the prism of the vendor you speak with. At the end of the day, it’s crucial as a security leader to have a clear thought-process on what tools your organization uses, so you aren’t fighting with one arm tied behind your back.   

Join this executive boardroom to discuss:

  • What makes up a good set of cloud tools to choose from at your disposal
  • Best practices for a modern organization to defend and monitor cloud infrastructure
  • Potential differences in the approach for single vs. multi-cloud

9:40am - 10:25am  Executive Boardroom

Managing Risk from Critical Vulnerabilities

Jason Mical headshot

Jason Mical

Field Chief Technology Officer - Americas


Bob Brown headshot

Bob Brown


Federal Home Loan Bank of New York

Doug Greene headshot

Doug Greene

VP, Chief Information Security Officer

Guardian Life Insurance

Tod Mitchinson headshot

Tod Mitchinson

VP, Chief Information Security Officer

New York Life

In today’s threat landscape, security teams are frequently forced into reactive positions, lowering security program efficacy and sustainability. Strong foundational security program components, including vulnerability and asset management processes, are essential to building resilience in a persistently elevated threat climate.

Join this interactive boardroom to discuss:

  • Defining what your emergency procedures and “playbooks” look like.
  • How you prioritize CVEs, VPNs and firewalls
  • Combatting the challenge of zero-day exploitation

Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to a small number of attendees (seating priority is given to CISOs).

To reserve your seat, please contact: 


9:40am - 10:25am  Executive Boardroom

A New Vision for Identity Security

Clarence Hinton headshot

Clarence Hinton

Chief Strategy Officer


Michael Cena headshot

Michael Cena

Vice President, Head of Cyber Security

A+E Networks

Naresh Podila headshot

Naresh Podila

Chief Information Security Officer

Danaher UK

The number of human and machine identities seeking access to data and critical business systems has grown exponentially, in turn increasing the threat landscape and challenging traditional IAM paradigms. How do security leaders keep a pulse on tools and capabilities to assess their organization’s cybersecurity posture?

 Join this boardroom to discuss: 

  •  Managing and securing all identities
  •  Mitigating risks in multi-cloud and hybrid environments 
  •  Balancing high expectations and avoiding burnout

9:40am - 10:25am  Executive Boardroom

Performing in an Era of “Do More with Less”

Wolfgang Goerlich headshot

Wolfgang Goerlich

Advisory CISO

Cisco Secure

Aaron Katz headshot

Aaron Katz

CISO, Genesis

Digital Currency Group

Ian Rathie headshot

Ian Rathie

Managing Director, Chief Information Security Officer

Fitch Ratings

Cybersecurity and technology leaders are being constantly challenged to up-level their own technology and strategies to keep the business safe and these days they're doing it all while working with tighter budgets or fewer resources. These restrictions may find security leaders asking what to prioritize, how much time and energy can be spent on each project and where to start. But what actually works in cybersecurity?

Join this boardroom to discuss:

  • How to continually show progress on security initiatives despite staff and budget cuts
  • How your team can prepare for whatever is next on the threat horizon while dealing with belt tightening
  • Strategies for building resilient cybersecurity programs

10:25am - 11:00am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:00am - 11:45am  Breakout Session

Operationalizing Zero Trust Security

Brad Moldenhauer headshot

Brad Moldenhauer



There are many paths leading to zero trust, but careful planning in the initial stages is key to ensuring a smooth journey. Successful digital transformation relies upon cultivating organizational buy-in as well as understanding the best ways to apply zero trust in your environment. Starting off on the right foot can save your business considerable hardship down the road.

Join the session to learn:

  • How to win support from peers and the board by framing zero trust in terms of business risk, not security
  • Where to first introduce zero trust into your organization; access control, third party management, attack surface reduction, app-level segmentation, etc.
  • Identifying and prioritizing risks to avoid scope creep and costly mistakes

11:00am - 11:45am  Breakout Session

Challenges and Opportunities for Securing the OT Environment

Naresh Podila headshot

Naresh Podila

Chief Information Security Officer

Danaher UK

Patrick Ford headshot

Patrick Ford

Chief Information Security Officer, Americas

Schneider Electric

Mikhail Falkovich headshot

Mikhail Falkovich

Chief Information Security Officer

Con Edison

Scott Patronik headshot

Scott Patronik

Cybersecurity Advisor, IOD Region 2

Cybersecurity and Infrastructure Security Agency

Timely and secure information sharing serves to bridge the gap between vulnerability and security. This effort is facilitated through cyber supply chain risk management. CISOs must establish a live view into their organization’s overall security posture inclusive of their external perimeter, while placing focus on OT assets.

Join this session to learn:

  • How to understand the risk posed by OT environments
  • What considerations need to be made for OT that are different than IT environments
  • What’s being done to identify at risk OT products

11:00am - 11:45am  Executive Boardroom

Security Strategies for a Robust Threat Management Program

Mike Spisak headshot

Mike Spisak

Distinguished Engineer, Master Inventor, Zero Trust Technology Leader

IBM Security

Aditya Malhotra headshot

Aditya Malhotra

Chief Information Security Officer

Ness Digital Engineering

Davinder Rodey headshot

Davinder Rodey

Chief Information Security Officer

Mizuho Americas

Despite a dynamic threat landscape and constantly changing malicious TTPs, CISOs must prepare their organizations to thrive in growing complexity. From widely distributed infrastructures to high volumes of tools with different levels of control and responsibility, it can be difficult to maintain true visibility across environments. How can shifting from reactive to proactive threat management be incorporated into your security strategy to help achieve this?

Join this session to discuss:

  • Identifying blind spots due to information fragmentation
  • Understanding your full attack surface and the challenges of lowering risks
  • Reducing the noise and stress being fed into threat management systems and pressure on teams

11:00am - 11:45am  Executive Boardroom

Crisis Planning - Flipping the Asymmetry with Attackers

Oren Wortman headshot

Oren Wortman

VP Cyber Security Services, NA


David Sheidlower headshot

David Sheidlower

Chief Information Security Officer

Turner Construction

Tim Somrah headshot

Tim Somrah

Director of Information Security

Major League Soccer

Preparing for a cyber crisis is imperative and can determine whether it becomes a major catastrophe or a manageable incident. Whether you have experience navigating a crisis or are preparing for the inevitable attack to come, come together with your peers to leverage the wisdom in the room to tackle complex challenges and get ahead of the attackers.

Join this session to discuss:

  • Evaluating common options, dilemmas, and pitfalls in crisis planning
  • Understanding the impact of technical and stakeholder management decisions on the business
  • Identifying key gaps and vulnerabilities often overlooked by security teams

11:00am - 11:45am  Executive Boardroom

Defend the Endpoint and Accelerate Recovery

Jeff Worthington headshot

Jeff Worthington

Executive Strategist and Cyber Advisor


JT Jacoby headshot

JT Jacoby

Chief Information Security Officer

International Rescue Committee

Almon Tse headshot

Almon Tse

Chief Information Security Officer

Saks Fifth Avenue

Adversaries are increasingly fast and stealthy, don’t respect time zones or holidays, and often execute damaging intrusions in hours.  Every second matters when under attack and the first steps taken in the wake of a threat can determine success or downtime and disruption. How are you ensuring you have the tools and processes to protect your endpoints and the organization from today’s threats?

Join this interactive discussion for strategies to:

  • Deploy the right endpoint security tools and extended capabilities to stop an adversary with speed
  • Identify resources to appropriately implement, operate and maintain an effective security program
  • Secure critical applications even in a state of compromise

11:00am - 11:45am  Executive Boardroom

Efficient TPRM – The Secret Sauce to Business Growth

Shane Hasert headshot

Shane Hasert

Director, Threat Research and Cybersecurity Standards


Michael Andreano headshot

Michael Andreano

Senior Director, Group Head of Information Security

Hikma Pharmaceuticals

Keith Donnelly headshot

Keith Donnelly

VP, Global Head of Risk & Compliance


Steve Woods headshot

Steve Woods

Head of IT Security, Americas

Nomura Holdings, Inc.

Security leaders often seek opportunities to counter the outdated notion that security programs are merely a cost center. Effective third party risk management (TPRM) enables business growth while providing much-needed security, whether you are responding to due diligence requests or providing security approval for new vendors.

Join this session to discuss:

  • Implementing security domains and safeguards that accelerate business outcomes
  • Increasing visibility of your new and current vendors to drive efficiency and identify risks
  • Assessing and communicating third-party risk within your broader security strategy

11:45am - 12:30pm  Lunch Service

12:30pm - 1:05pm  Keynote

Simplifying Security Through Consolidation

Anand Oswal headshot

Anand Oswal

SVP and GM, Network Security

Palo Alto Networks

With an average of 75 security products utilized by organizations, the need for consolidation is evident. Having multiple security products translate to higher costs, operational complexity, and intraorganizational friction. CISOs today must strive to maximize value with ubiquitous and powerful security that is centralized and simple to use.

Anand Oswal, SVP, GM of Products and Network Security at Palo Alto Networks, will share valuable insights and best practices for enabling cyber-transformation. The discussion will cover key strategies, including:

  • Streamlining your security portfolio through a unified SASE (Secure Access Service Edge) approach from a single vendor
  • Embracing a threat-informed approach to security that ensures your defenses align with evolving threats 
  • Enhancing efficiencies, reducing complexity, and addressing critical vulnerabilities

Register now and secure your spot to learn from an industry expert and gain valuable knowledge to elevate your organization's security posture.

1:05pm - 1:30pm  Break

1:30pm - 2:15pm  Breakout Session

Optimizing the Workforce for Cyber Crisis Resilience

James Hadley headshot

James Hadley


Immersive Labs

Steve Grossman headshot

Steve Grossman

Chief Information Security Officer

National Basketball Association

As we continue to evolve our corporate defenses, even the best crisis response plans struggle to account for the human element. The performance of your technology might be a known quantity, but what about your human capabilities? This session will test organization-wide decision-making skills using a realistic cyber crisis.

Join this session to:

  • Understand the business impact of technical choices, stakeholder management actions, and more
  • See real-time data on the effects of decisions on crisis management and response
  • Strengthen your organization's resilience at both the executive and technical levels

1:30pm - 2:15pm  Breakout Session

Thinking Differently About Security Talent

Joel Caminer headshot

Joel Caminer

Senior Director, Center for Cybersecurity (CCS)

New York University

Kylie Watson headshot

Kylie Watson


Sumitomo Mitsui Banking Corporation

Angela Snow headshot

Angela Snow

Head of the Office of Cybersecurity

Massachusetts Mutual Life Insurance Co

Mishu Rahman headshot

Mishu Rahman

Head of Technology & Cybersecurity


We've been hearing about — and living through the reality of — the security talent and skills dilemma for a decade now. It is time for a reset in how security leaders solve for the talent dearth at their organizations. How can CISOs collaborate better as a community to bypass the skills shortage, become changemakers and create a talent pipeline that works for them?

Join this session to discuss:

  • Rethinking the requirements for a role to expand the applicant pool

  • Building partnerships with cybersecurity education and training providers 

  • Reevaluating team and company culture to identify what makes your organization more appealing to top performers

1:30pm - 2:15pm  Executive Boardroom

The Three Types of Third Party Risk and How to Manage Them

Menachem Shafran headshot

Menachem Shafran

SVP of Product and Innovation

XM Cyber

Arun Abraham headshot

Arun Abraham

Chief Information Security Officer

Bose Corp

Tony Chryseliou headshot

Tony Chryseliou

Global Information Security Executive

Sony Corporation of America

Third party risk comes in a few different forms, each with their own set of concerns and solutions. There are risks to third party/open source code libraries, like the infamous Log4j; risks to third party tools, like the one that led to the 2020 SolarWinds breach; and risks to networks as a result of granting access to third parties, like vendors and contractors. All of these present unique challenges and must be addressed with unique approaches.

In this session, we’ll cover:

  1. The risks that pose the greatest potential negative impact to your organization
  2. Which approaches are the most optimal for your team
  3. Why adopting an "assume breach" stance can help

1:30pm - 2:15pm  Executive Boardroom

DLP Isn’t The Answer

Joe Payne headshot

Joe Payne

President and CEO


Peter Rosario headshot

Peter Rosario

Chief Information Security Officer


Raj Sargule headshot

Raj Sargule

Global Head of Information Security


Data Loss Prevention software is often the default answer for preventing data loss, but as company data lives increasingly in the cloud, a robust approach to data management is critical. Security leaders should consider a risk-based approach when determining how to reduce data loss through their data protection strategy.

Join this session to learn:

  • Best practices to continuously monitor file activity to detect risk
  • How to quickly investigate and respond to insider threats
  • Ways to transform your data loss protection strategy

1:30pm - 2:15pm  Executive Boardroom

Taking Action with Threat Intelligence

Patrick Sullivan headshot

Patrick Sullivan

VP, CTO, Security Strategy

Akamai Technologies

Daniel Nunez headshot

Daniel Nunez

Chief Information Security Officer

New York City Employees’ Retirement System

Ernie Rozado headshot

Ernie Rozado

Director, Head of Cybersecurity and Compliance


Cyber threats don't take time off. Today’s CISOs are navigating budget, staffing and technologies challenges, while building out effective, efficient and proactive network security strategies. Dealing with advanced threats takes up valuable time and manpower, but a well-crafted threat hunting and threat intelligence program is a key tool of multi-layered defense models.

Join this session to discuss:

  • Providing internal visibility as it relates to threat intel and ransomware attacks
  • Protecting the modern enterprise from vulnerabilities introduced by the cloud and a distributed workforce
  • Building a threat-hunting road map that can find the most evasive threats

1:30pm - 2:15pm  Executive Boardroom

Risk Mitigation Through Increased Visibility

Tony Velleca headshot

Tony Velleca



Michael Cena headshot

Michael Cena

Vice President, Head of Cyber Security

A+E Networks

Mike Livni headshot

Mike Livni


Valley National Bancorp

Right now, there's an expectation for real-time posture management in the cloud. Meanwhile, custom application development is creating its own vulnerabilities. With an expanding attack surface and complexity, what are others doing to get a clear picture of their vulnerabilities according to risk? Rather than blindly swinging at that list of vulnerabilities and hoping it eventually goes away, consider starting with your largest hurdles. Of course, if minimizing your attack surface is the ultimate goal, identifying these riskier weak points is simply the beginning.

In this peer-led, private session, CISOs can discuss: 

  • What can we do to mitigate all these vulnerabilities, configuration errors and security defects according to their business risk
  • What are best practices for visualizing the risk using attack paths
  • Which vulnerabilities pose the greatest risk in the context of your environment

2:15pm - 2:50pm  Networking Break

2:20pm - 2:45pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

2:50pm - 3:35pm  Breakout Session

Breaking Down Silos with SASE - How C-Suite Leaders are Driving Digital Transformation

Chris Hines headshot

Chris Hines

Chief Strategy Officer

Axis Security

JT Jacoby headshot

JT Jacoby

Chief Information Security Officer

International Rescue Committee

Despite the challenges posed by organizational and technological silos, the modern CISO is stepping up to the plate. Impactful digital transformation through intentional technology decisions can minimize organizational obstacles.
Join this fireside chat to discover:

  • Embracing digital transformation to stay competitive and secure in today's business world
  • Leveraging SASE to simplify your security architecture, level-up compliance monitoring and improve visibility
  • Driving meaningful change with a holistic approach that considers not just security, but also organizational culture, processes, and people

2:50pm - 3:35pm  Breakout Session

The AI Paradox — Balancing the Benefits and Dangers of Innovation

Jeff Brown headshot

Jeff Brown

Chief Information Security Officer

State of Connecticut

Tomas Maldonado headshot

Tomas Maldonado

Chief Information Security Officer

National Football League

Like all major technological advancements, generative AI has entered the mainstream; bringing with it inspiration, excitement, entertainment, and fear. And like all intelligent (or seemingly-intelligent) life, you'll need to take it to your leaders. How are they responding? Now's the time to develop your own stance on the impacts of this here-to-stay tool of the future. 

Join this session for: 

  • An interactive, real-time, pulse check on the community's general notions toward AI
  • Your chance to workshop and collaborate on a helpful approach to accepting or monitoring this tool
  • A data-driven look at the realities of doing business in the era of generative AI

2:50pm - 3:35pm  Executive Boardroom

Best Practices for Securing SaaS Data

Allan Kristensen headshot

Allan Kristensen

Chief Customer Officer


Vik Arora headshot

Vik Arora


Hospital For Special Surgery

High-profile SaaS data breaches are on the rise, and organizations show no signs of slowing their adoption of enterprise SaaS applications. This trend means Security teams must now manage. SaaS solutions’ many types of internal and external users, large third party app ecosystems, and frequent vendor updates — making SaaS a unique security challenge. In this session, you’ll learn best practices for securing cloud and SaaS data, and for building a scalable SaaS security program within your organization.

Join this boardroom to discuss:

  • The most common misconfigurations we see in SaaS ecosystems
  • How to achieve visibility into data access levels throughout your SaaS environments
  • The critical components of a comprehensive SaaS security program

2:50pm - 3:35pm  Executive Boardroom

Tackling the Risks of Change

Ray Ploski headshot

Ray Ploski

Field CTO


Rod Aday headshot

Rod Aday

Director, Information Risk Management


Leon Flaksin headshot

Leon Flaksin

Managing Director & Head of Technology and Cybersecurity Risk Management

BlackRock Inc

Many conversations around trust include the ever-elusive 'zero-trust,' identity management and networking controls. Some even suggest we abdicate responsibility for trust to a third-party service. However, with so many systems capable of manufacturing credentials, shouldn’t trust be earned based on risk? Whether it’s human actors or rapidly evolving systems, CISOs need to properly assess their environmental conditions.

Join this discussion and consider:

  • How to assess risk in a rapidly changing environment
  • What are the optimal environmental conditions for trust
  • Where does third party services fit in to having a secure framework

2:50pm - 3:35pm  Executive Boardroom

Maximizing Cybersecurity ROI in a Down Economy

Marten Mickos headshot

Marten Mickos



Lena Licata headshot

Lena Licata

Global Head of Blackstone Technology Governance, Risk and Compliance

Blackstone Group

Ben Smith headshot

Ben Smith


Nuvance Health

The pressing question in the current economy is how can organizations overcome shrinking budgets and dwindling headcount to stay ahead of cybercrime? CISOs must adjust their security strategy to meet resource constraints.

Join this session to discuss:

  • Where to consolidate and where to invest for the best security outcomes
  • Preemptive protection of digital assets to avoid security breaches
  • Ways to scale security efforts and minimize risk without additional budget

3:35pm - 4:00pm  Break

4:00pm - 4:35pm  Keynote

Fostering a Culture of Resiliency

Teresa Zielinski headshot

Teresa Zielinski

Chief Information and Product Security Officer

General Electric

Pretty frequently, the successes of a security program are chalked up to processes or tooling. Some would argue, however, the key to an exponential growth in resiliency is sitting right there on your back burner. All it takes is the right culture development practices and the will to inspire collaboration.

Led by Teresa Zielinski, Chief Information and Product Security Officer at General Electric, this keynote offers: 

  • Real, practical steps for bolstering culture, team satisfaction and, ultimately, resiliency
  • A glimpse into the risks of neglecting this increasingly important security factor
  • Success stories and lessons learned by members of your New York CISO community

4:35pm - 5:00pm  Closing Reception & Prize Drawing

June 20, 2023

We look forward to seeing you at an upcoming in-person gathering

Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.


Venue & Accommodation

Pier Sixty

Your Community Partners

Global Thought Leaders
CISO Thought Leader
Key Partners

Community Program Manager

For inquiries related to this community, please reach out to your dedicated contact.

Krista Robbins

Senior Community Program Manager