Highlight Topics
- Data Science’s Role in Cyber Threat Forecasting
- Proactive Security Posture
- Adapting to Enhanced SEC Scrutiny
- Third-Party Risk Management
And much more!
The ISMG Fraud, Security & Risk Management Summit dedicates a full day to advancing cybersecurity education among leaders and delivering enlightening sessions that encompass a diverse range of essential subjects.
Among the highlights will be a comprehensive exploration of incident response strategies during the hands-on and engaging “solution room” exercise. This activity tests the abilities of CISOs and cybersecurity leaders as they devise response strategies for a worldwide cybersecurity incident.
Join us for an in-depth look at pressing topics such as the technical landscape of AI, budget management, the shifting culture in cybersecurity, and more. As cybersecurity leaders strive to maintain equilibrium in a rapidly evolving landscape, the summit offers guidance on finding balance in times of change, reinforcing the notion that a steady hand at the helm is vital in safeguarding digital landscapes.
View our ISMG Event Experience video to see what your peers are saying about their participation.
360 Madison Ave, New York, NY 10017
And much more!
ISMG Summits bring the foremost thought leaders and educators in the security space on stage, at interactive workshops and networking events. Learn from the who’s who in the cybersecurity industry, passionate about the latest tools and technology to defend against threats.
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in cybersecurity passionate about the latest tools and technology to defend against threats
To effectively mitigate and respond to attacks, organizations must understand the latest capabilities and threats being deployed by their adversaries.
This session will equip CISOs with the latest analysis on the global threat landscape, the ways in which bad actors are leveraging emerging technologies to exploit traditional weaknesses, and bold strategies for combatting new and evolving threats.
Key takeaways will include:
La Monte Yarborough, CISO, Acting Deputy CIO, HHS
Laura Deaner, CISO, Northwestern Mutual
Preston Miller, Director, Unit 42 by Palo Alto Networks
Although, as with any new technology, it brings its own risks, including incorrect code suggestions and more intelligent malware attacks. Join this session to explore how to harness AI tools to work for you while ensuring your organization stays secure.
Chris Wysopal, CTO & Co-Founder, Veracode
Peter Tse, Information Security Officer, CTBC Bank
Boris Klyuchnikov, Special Agent, FBI
Dave Johnson, Principal Solutions Architect, Expel
So, what is the right approach?
The answer is both. But which approach should be the focus today depends on the enterprise’s security maturity.
In this session, we will discuss:
Shashank Golla, Product Marketing Manager, Wiz
R&D teams create and scatter secrets across vaults, code, collaboration solutions and more without any oversight or control by security teams. Secret-based breaches are among the top three attack vectors, and they are the most destructive.
What solution is needed to enable organizations to securely utilize non-human identities and secrets? How can you detect, safeguard, and provide context for secrets stored across vaults, source code, collaboration tools, cloud environments, and SaaS platforms?
Introducing Entro – the complete platform for non-human identity & Secrets management. With Entro, Security teams can finally efficiently oversee and protect non-human identities with automated lifecycle processes and seamless integration, ensuring comprehensive security and compliance through a unified interface.
Stephen Johnson, VP of Solutions Engineering, Entro Security
Paul Kurtz, Chief Cybersecurity Advisor & Field CTO, Splunk
Walker Newell, Vice President, Securities Litigation and Enforcement, Woodruff Sawyer
David Anderson, Vice President of Cyber, Woodruff Sawyer
Sean Mack, Former CISO, Wiley; ISMG Contributor
Learn the latest methodologies, tools and best practices that SOC analysts and incident responders use to detect and neutralize emerging cyberthreats. Through real-world examples, you will learn how to leverage threat intelligence, conduct network and endpoint analysis, apply machine learning algorithms, and foster a collaborative security culture.
Robert O’Leary, CFCE, Senior Solutions Architect, Binalyze
Theresa Lanowitz, Head Evangelism and Research, AT&T Cybersecurity
CISOs must recognize that third-party risk management is not just an add-on to the cybersecurity agenda but a central piece of the overall strategy to safeguard their organizations in the digital landscape.
This discussion delves into:
Fred Harris, Global Head of Risk & Compliance for Enterprise Technology &
Operations, Citi
David Anderson, Vice President of Cyber, Woodruff Sawyer
Chris Holden, VP, CISO, Crum & Forster
Jason Pope, VP, Sales Engineering, Rubrik
The discussion will touch upon key issues such as third-party vendor access, privilege elevation, vulnerability awareness, and how an identity-first security approach leads to zero trust and lower cyber insurance premiums.
Attendees will learn about market trends, emerging threats and risk mitigation strategies related to identity privilege. Join us for valuable insight into the future of identity security.
Christopher Hills, Chief Security Strategist, BeyondTrust
This interactive session is meticulously crafted to mimic a sophisticated cyberattack. It aims to bolster strategic response capabilities and enhance operational readiness against the backdrop of advanced cyberthreats. The focal point of this exercise is a strategically crafted deepfake incident targeting a corporate executive, weaving together elements of social engineering, financial fraud, and the challenges posed by emerging technological threats.
What you will gain from this experience:
Kevin Cooke, Senior Special Agent, United States Secret Service
Boris Klyuchnikov, Special Agent, FBI
Chris Holden, CISO, Crum & Forster
Fred Harris, Global Head of Risk & Compliance for Enterprise Technology & Operations,
Citi
Peter Tse, Information Security Officer, CTBC Bank
David Anderson, Vice President of Cyber, Woodruff Sawyer
Walker Newell, Vice President, Securities Litigation and Enforcement, Woodruff Sawyer
Sean Mack, Former CISO, Wiley; ISMG Contributor
The panel will focus on the importance of establishing a common language across different risk domains and explore how fostering interdisciplinary communication and understanding is crucial for timely and effective response to threats, aligning different departments under a unified risk management objective.
In this discussion, our esteemed panel will:
Fred Harris, Global Head of Risk & Compliance for Enterprise Technology &
Operations, Citi
David Sheidlower, Vice President, Chief Information Security & Privacy Officer, Turner
Construction Company
Jagathi Gade, Global Head of Risk Engineering, Square
Brennan Lodge, Professor, Information Technology & Data Analytics, New York University
Umesh Yerram, Global CISO, Cboe Global Markets
Andres Andreu, Deputy CISO, Hearst
#ISMGSummit
@ISMG_News
Our summits offer Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.
RSVP here to attend our events. You can select for multiple or individual tickets.
NOTE: All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.
Upcoming ISMG Events