Highlight Topics
- Critical Infrastructure
- Incidence Response
- Supply Chain Threats and Response
- Cyber Attacks
- Zero Trust
Across a full day of engaging sessions, our esteemed speakers will offer deep insights into advanced threat intelligence, payment fraud prevention, the transformative impact of AI for threat actors and defenders alike, and how to leverage cyber insurance as a critical component of risk management. Attendees will gain practical, actionable knowledge to strengthen their defenses against emerging cyber threats.
The event will culminate in our highly interactive Solution Room workshop, an interactive incident response session where participants will be thrust into a high-stakes deep fake incident scenario, allowing them to apply key strategies and tools in real-time to enhance their organizations’ crisis planning and incident response frameworks.
View our ISMG Event Experience video to see what your peers are saying about their participation.
85 West Street at Albany Street New York, NY 10006
NOTE: All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats
Although all employees share the responsibility for cybersecurity, Chief Information Security Officers, Chief Risk Officers, and other senior security leaders are at the forefront, confronting cyber threats directly. Simply put, these essential responsibilities can no longer be regarded as back-office functions; these roles have gained strategic importance due to the growing sophistication of cybercriminals, their advanced tools, and the significant financial implications at stake.
Key Discussion Points:
Erika Dean, CSO, Robinhood Markets
Eric Boateng, CISO, MassMutual
Joanna Huisman, SVP Strategic Insights & Research, KnowBe4
Charlie Leonard, Principal SecOps Transformation Advisor, Palo Alto Networks
Chris Holden, CISO, Crum & Forster
Erika Dean, CSO, Robinhood Markets
The FIDO authentication open standard offers the most modern defense tactic that organizations can leverage to create digital barriers against evolving threats. Learn how to raise the bar for security and innovation by driving phishing-resistant and passwordless authentication and cultivate phishing-resistant users across the enterprise.
Perraju Nadakuduty, Director & Distinguished
Engineer, Capital One
Track A
Panelists will provide a roadmap for CISOs to fully leverage cyber insurance, safeguarding their security while clarifying its scope and debunking common misconceptions about its effectiveness and sustainability.
The discussion will explore key factors that insurers consider during the underwriting process, illustrating how companies can align their cyber insurance strategy with broader risk management objectives. Special attention will be paid to the strategic benefits of pre-breach services such as risk assessments and vulnerability scans, and post-breach services like incident response and claims support, which are pivotal in minimizing the impact of security incidents.
Key Takeaways:
David Anderson, Vice President, Cyber,
Woodruff Sawyer
Track B
Aaron Simpson, Partner, Hunton & Williams
Seth Rose, Supervisory Special Agent Group 06, U.S. Department of the Treasury Cyber Investigations Unit
Michael Woodson, Information Security and Privacy Director, Sonesta Hotels
R&D teams create and scatter non-Human identities and secrets across vaults, codes, collaboration solutions, and more without any oversight or control by security teams. Non- Human Identity breaches are among the top two attack vectors, and they are the most destructive.
What solution is needed to enable organizations to securely utilize non-human identities and secrets? How can you detect, safeguard, and provide context for NHI’s & secrets stored across vaults, source code, collaboration tools, cloud environments, and SaaS platforms?
Introducing Entro – the complete platform for non-human identity & Secrets management. With Entro, Security teams can finally efficiently oversee and protect non-human identities with automated lifecycle processes and seamless integration, ensuring comprehensive security and compliance through a unified interface.
Steve Johnson, VP Sales East, Entro Security
Ed Thomas, SVP, ProcessUnity
This, “What’s Next in Customer Identity: Reducing Fraud While Improving Experiences,” explores innovative strategies and technologies aimed at enhancing security without compromising user experience. We will delve into the latest advancements in identity verification, such as biometrics and AI-driven analytics, and discuss the balance between rigorous fraud prevention measures and seamless customer journeys. By understanding emerging trends and best practices, businesses can transform their approach to customer identity, fostering trust, enhancing loyalty, and ultimately driving growth in a competitive landscape. Join us as we envision the future of customer identity management where safety and satisfaction go hand in hand.
Darryl Jones, VP of Product and Strategy, Ping
Identity
For many businesses – investment banks, consulting firms, and countless fintech companies – ethical walls are needed to form a barrier between departments to block the exchange of this information.
While this can be done for privacy reasons, it’s also imperative to prevent conflicts of interest and to comply with regulatory mechanisms. While new technologies like Data Security Posture Management (DSPM) can be helpful for providing visibility into where sensitive data resides, relying on a robust suite of solutions designed to safeguard data can ensure it isn’t shared between different lines of business, like retail companies and commercial banking.
In this chat, learn how Fortra’s Digital Guardian, Data Classification, and Terranova Security can work in tandem to help organizations avoid data breaches and secure sensitive data while complying with any information barriers that may be in place.
Bill Sovak, VP of Data Protection Sales, Fortra
Hear some anecdotes about how passively collected network data was harnessed to alert security and fraud teams to anomalous behavior seen on application traffic. See how Corelight’s data driven approach to NDR goes beyond the SOC and into the most critical troves of data in the industry.
Vincent Stoffer, Field CTO, Corelight, Inc
Curtis Reynolds, Senior Systems Engineer,
NetWitness
In this talk, we’ll explore the challenges of Shadow AI , the balance between speed and security, and the remotion responses individuals and organization face when navigating technological change. Join us to discover strategies for combatting Shadow Ai while driving innovation and learn how industry standards and future AI advancements will shape the next phase of adoption.
Erik Gaston, Vice President, Global Executive
Engagement, Tanium
Unaddressed misalignments mean inconsistent processes, ineffective teams, and underutilized tools, leading to widespread inefficiencies, governance gaps, and increased risks of security breaches. Without clear and unified control over these elements, organizations incur these hidden costs every day. Introducing Ovalix: a unified platform for complete visibility and control over your security landscape. Ovalix bridges the gap between your teams, tools, and processes and ensures every aspect of your security strategy is optimized, helping you reduce risks, close governance gaps, and improve overall efficiency.
Oriel Vaturi, CEO, Ovalix Security
Ronald Arden, Executive Vice President, CTO &
COO, Fasoo, Inc.
However, this convenience brings significant risks. Account takeovers have become a prevalent threat, targeting online banking, alternative payment platforms, and messaging apps with payment components. Each new account introduces potential vulnerabilities, allowing attackers access to extensive personal and financial information.
This session will delve into the mechanics of account takeovers, highlighting how attackers pose as legitimate users to gain prolonged, undetected access to accounts. It will explore:
The panel will focus on the importance of establishing a common language across different risk domains and explore how fostering interdisciplinary communication and understanding is crucial for timely and effective threat response, aligning different departments under a unified risk management objective.
Discussion Highlights:
Vlad Brodsky, SVP, Chief Information Security
Officer, OTC Markets Group
Ali Khan, CISO, Better.com
ISMG Summits offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.
Upcoming ISMG Events