Cyber Resilience Summit: Dallas
May 14, 2026 | 8:30 AM ET - 5:00 PM ET
Hosted by BankInfoSecurity
Event Overview
ISMG Summits bring together global leaders in cybersecurity, risk management, information technology and digital trust for immersive, knowledge-sharing experiences. These events feature carefully curated agendas with thought-provoking keynotes, expert panel discussions and interactive workshops that address the most pressing challenges facing today’s security landscape – from threat intelligence and zero trust to AI governance, data protection and regulatory compliance.
Designed for senior executives and decision-makers across industries such as finance, healthcare, government and critical infrastructure, ISMG Summits provide valuable insights, practical strategies and opportunities for collaboration. Attendees gain actionable takeaways, forge meaningful connections and stay ahead in an ever-evolving digital threat environment.



Venue
Conrad New York Downtown
102 N End Avenue, New York, NY 10282
NOTE: All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.
2025 Speakers
Thought Leaders on Stage Leading Deep-Dive Discussions
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats
Dr. Meghan Hollis-Peel
Greg Tatum
Jessica Bolton
Danielle Jablanski
Shuchi Agrawal
Todd Pauley
Bryce Carter
Everett Bates
Zechariah Akinpelu
Ravikumar Mukkamala
David Ginn
Joseph Berglund
Keynote Speaker
Dr. Suzanne Schwartz, MD.
MBA, Director, Office of Strategic Partnerships & Technology Innovation, Center for Devices & Radiological Health, FDA
Dr. Suzanne Schwartz, MD, MBA, is the director of the U.S. Food and Drug Administration’s Office of Strategic Partnerships and Innovation within the agency’s Center for Devices and Radiological Health, which among other responsibilities, is tasked with formulating the FDA’s medical device cybersecurity policy. She also has served as co-chair of the Government Coordinating Council for the healthcare and public health critical infrastructure sector.
Keynote Speaker
Moriah Hara
AI Risk & Security Expert, 3x CISO, Board Advisor, Author, CISSP, CISM, AWS Security, PCI QSA
Moriah is a 3x Fortune 500 Award Winning CISO at Wells Fargo Capital Markets,...
Interpublic Group and Bank of Montreal. She is a Board Advisor to several startups and a Cybersecurity Co-Author for the book, “The Perfect Scorecard: Getting An ‘A’ in Cybersecurity From Your Board Of Directors.”
She was named by Cybercrime Magazine as one of top 100 Fascinating Women Fighting Cyber, and has multiple, industry recognized security certifications such as the CISSP, CISM, CSSLP, PCI QSA and AWS Security and graduated from Harvard’s inaugural executive cybersecurity program.
Keynote Speaker
Hardik Mehta
Global Head of Risk and Regulatory Compliance, JPMorganChase
Security, Risk, and Compliance leader with 20+ years of global experience across Uber, Microsoft, and more. ..
Expert in building high-performing risk teams, aligning engineering and regulatory goals, and embedding risk into product development. Pioneered the world’s first cloud-native self-service compliance platform on Azure, automating 450+ controls with AI/ML. Skilled in FAIR, SOX, NIST, GDPR, and large-scale program delivery. Known for translating complex risk into actionable frameworks and driving cultural change across global teams.
2025 Agenda
Given the ever-evolving nature of cybersecurity, the agenda will be continually updated to feature the most timely and relevant sessions.
7:30 AM - 8:30 AM ET
Registration & Breakfast
8:30 am - 8:35 am et
Opening Comments
9:00 AM - 9:30 AM CST
The CISO's Critical Role in Nurturing Data Security
Chief Information Security Officers are at the forefront of protecting sensitive information as organizations face increasingly sophisticated cyber threats and evolving regulatory requirements.
This session provides practical insights into the strategies, frameworks, and technologies essential for building resilient data security programs.
In today’s environment, CISOs must address emerging challenges, such as securing vast amounts of data generated by IoT devices and ensuring compliance with regional data sovereignty laws. For example, the rise in ransomware attacks targeting healthcare and financial sectors highlights the urgent need for real-time threat detection and robust incident response strategies. This session equips CISOs with actionable approaches to tackle these pressing issues while safeguarding organizational assets.
Key Points:
- Orchestrating Comprehensive Data Protection Measures: Implement robust approaches like end-to-end encryption and role-based access control to maintain the confidentiality and integrity of critical information assets.
- Crafting and Implementing Incident Response and Data Loss Prevention (DLP) Strategies: Utilize advanced threat intelligence and behavior analytics to proactively thwart data breaches and unauthorized disclosures.
- Evaluating and Integrating Emerging Technologies: Leverage innovations such as AI-powered security analytics and blockchain-based data protection to enhance defenses and stay at the forefront of data security advancements.

Sanjit Ganguli,
VP, CTO in Residence, Zscaler
9:30 AM - 10:00 AM CST
Managing the Expanding Attack Surface in a Hyper-Connected World
As organizations increase their digital presence across cloud platforms, third-party vendors, and remote workforces, the attack surface continues to grow, exposing new vulnerabilities.

Vlad Brodsky,
Chief Information Officer & Chief Information Security Officer, OTC Markets Group Inc.

Steve Lenderman,
Head of Fraud Prevention, iSolved, CyberEdBoard Member

Josh Cigna,
Solutions Architect, Yubico
10:00 AM - 10:30 AM CST
Building a Resilient Data Security Strategy
Protecting sensitive data has never been more critical, as cyberattacks grow more sophisticated and target increasingly interconnected systems.
- Layered Defenses for Complex Systems: Designing multi-faceted protection strategies that secure the data lifecycle across distributed infrastructures.
- AI-Powered Anomaly Detection: Applying advanced algorithms to identify unusual activity, prevent breaches, and mitigate evolving threats.
- Next-Generation Access Controls: Enforcing least-privilege policies with dynamic authentication tailored to hybrid and cloud-native environments.
- Proactive Compliance Strategies: Meeting evolving mandates like GDPR and HIPAA while building trust with stakeholders and customers.

Chris Wysopal,
Chief Security Evangelist, Veracode
10:30 AM - 11:00 AM CST
Data Privacy and Decoupling: Ensuring Compliance and Data Integrity
As global data privacy regulations become stricter, organizations must rethink their data management strategies to ensure compliance and reduce risks.
- Decoupling Data for Privacy: Strategies to separate sensitive data for improved security and regulatory compliance.
- Adapting to New Privacy Regulations: How businesses can adjust data architecture to stay compliant with global data privacy laws.
- Minimizing Data Breach Risks: Best practices for protecting sensitive information and reducing data breach impacts.
- Case Studies on Data Decoupling: Real-world examples of how companies have implemented data decoupling to protect data privacy.

Vincent Stoffer,
Field CTO, Corelight, Inc
11:00 AM - 11:30 AM CST
Mobility Without Vulnerability: Removing the Attack Vector
What if we could eliminate the mobile attack surface entirely?
With BYOD adoption rising, this session explores how to protect sensitive data without compromising user privacy. Learn how virtualized mobile access and zero-trust architectures help eliminate risks – turning today’s most targeted vector into a fortress.

Chris Young,
Cybersecurity Enterprise Account Executive, OpenText
10:40 AM - 11:05 AM ET
Networking Break
11:55 AM - 12:25 PM CST
Agentic AI and the Future of Autonomy in Security
The third wave of artificial intelligence is here, and it’s transforming the way organizations operate and secure their environments.
- Understand how agentic AI differs from previous waves of AI and its implications for business operations and security.
- Explore strategies for securely integrating autonomous agents into critical workflows.
- Identify emerging vulnerabilities posed by agentic AI and how to mitigate them effectively.
- Discuss ethical and regulatory considerations essential for the responsible deployment of agentic AI.

Kristopher Schroeder,
Founder & CEO, Replica Cyber
12:25 PM - 12:55 PM CST
A New Era of Data Privacy Compliance in Texas
With the Texas Data Privacy and Security Act (TDPSA) now in full effect since July 2024, Texas has transformed data privacy expectations for companies across the U.S.
- Texans can now access, correct, delete, and opt out of personal data use. Cybersecurity must implement secure, user-friendly systems that make it easy to fulfil these rights, ensuring smooth compliance.
- “Reasonable” security measures under TDPSA are now a must. This means implementing solid auditing, rapid breach responses, and comprehensive access controls to keep data secure.
- Businesses must provide clear, accessible disclosures about data use. Cybersecurity needs to work hand-in-hand with legal and data teams to ensure transparency in privacy policies and consent practices, keeping them compliant and understandable.

Tim Hill
VP, Software Engineering, Rocket Software
12:55 PM - 1:25 PM CST
Navigating the AI Frontier: Security, Privacy, and Governance in the Age of LLMs
The rapid proliferation of Large Language Models (LLMs) and Generative AI has ushered in a new era of innovation, but also presents unprecedented challenges for organizations across all sectors.
Protecting sensitive data, intellectual property, and ensuring compliance with increasingly stringent privacy laws and regulations has become a critical imperative. This session addresses the daunting endeavor of securing data in a landscape where both internal and external threats, whether malicious or unintentional, are amplified. We will explore the critical need for a comprehensive data governance strategy, emphasizing the importance of securing high-quality data throughout its lifecycle. Participants will gain insights into how data lineage plays a pivotal role in building robust governance frameworks and learn actionable strategies for CISOs to establish secure, modern governance architectures.
Key takeaways include:
- Strategies for safeguarding sensitive data and intellectual property in the age of AI.
- Understanding the role of data lineage in effective data governance.
- Developing a modern, secure governance framework to mitigate risks and ensure compliance.
- Addressing the unique challenges posed by LLMs and Generative AI across diverse industries.

Sandeep Bhide
VP Product Management, ProcessUnity
1:25 PM - 2:10 PM CST
Lunch
2:10 PM - 2:40 PM CST
Safeguarding Data Across the Oil and Gas Value Chain - From Wellhead to Wallet
The oil and gas industry is a cornerstone of critical infrastructure and a prime target for increasingly complex cyber threats.
From exploration and production to transportation and refining, the sector handles massive amounts of sensitive data, ranging from seismic surveys to pipeline monitoring systems. Cybercriminals and state-sponsored actors continue to exploit vulnerabilities at every stage of the value chain, often targeting operational technology (OT) systems that were not originally designed with cybersecurity in mind. As incidents like ransomware attacks on pipelines demonstrate, breaches in this sector can have devastating operational, environmental, and economic consequences.
This session will provide a comprehensive exploration of the cybersecurity challenges facing the oil and gas industry. Attendees will learn about vulnerabilities specific to upstream, midstream, and downstream operations, with real-world examples of recent attacks and lessons learned. The panel will discuss strategies for integrating IT and OT security, leveraging advanced threat detection technologies, and protecting the proprietary and operational data that fuels the energy sector.
Discussion Points:
- Key vulnerabilities across upstream, midstream, and downstream oil and gas operations.
- Real-world case studies of cyberattacks on the energy sector and lessons learned.
- Strategies for securing operational technology (OT) systems and bridging IT/OT gaps.
- Best practices for enhancing resilience against nation-state and criminal cyber threats.

Scott Tenenbaum
Head of Claims, North America, Resilience

David Anderson
CIPP/US, Vice President, Cyber, Woodruff Sawyer - A Gallagher Company

Kimberly Pack
Counsel, Thompson Hine LLP
2:40 pm - 3:10 pm cst
Building Intelligent Data Infrastructure: Unlocking Cross-Industry Potential
As organizations across industries face increasing data demands, building an intelligent data infrastructure is no longer optional - it's essential for staying ahead.
From healthcare to financial services, companies must rethink their data management strategies to drive efficiency, security, and innovation. A modern data infrastructure can transform raw data into a powerful resource, optimizing performance and enabling smarter decision-making while safeguarding sensitive information. Whether you’re looking to modernize your data strategy or protect critical assets, this session offers practical insights to help you build a data infrastructure designed to meet the challenges and opportunities ahead.
This session will explore the components of a resilient, secure, and scalable data infrastructure, highlighting how intelligent systems can deliver actionable insights, automate workflows, and meet the growing needs of diverse sectors.
Key topics include:
- Leveraging AI for Efficiency: How intelligent systems can streamline operations and generate insights that lead to better business outcomes.
- Enhancing Security: Approaches for embedding strong security measures directly into your data infrastructure to protect against emerging threats.
- Scalability for the Future: Developing a flexible and adaptable infrastructure capable of evolving with your business needs and handling increasingly complex workloads.

Vincent Stoffer,
Field CTO, Corelight, Inc
3:10 pm - 4:10 pm cst
Trust Undermined: An Immersive Simulation of AI-Augmented Insider Threats
Join CyberEdBoard for this interactive tabletop exercise that places you at the center of a sophisticated insider threat scenario, driven by generative AI and psychological manipulation
- Precision Threat Response: Master techniques for isolating compromised systems, analyzing hybrid network activity, and mitigating cascading disruptions caused by insider-enabled AI attacks.
- Real-World Scenario Insights: Understand how AI-driven insider threats exploit IT-OT vulnerabilities, with lessons applicable to sectors reliant on interconnected systems.
- Actionable Defense Playbook: Design advanced countermeasures, including micro-segmentation, AI-based anomaly detection, and evidence preservation for incident response and regulatory requirements.

Seth Rose,
Supervisory Special Agent Group 06, U.S. Department of the Treasury/Cyber Investigations Unit

Imran Khan
VP Cyber Security Transformation Lead, BNP Paribas
4:35 PM - 5:05 PM CST
Uncovering Insider Threats with Behavioral Analytics
Insider threats are becoming increasingly challenging to detect, as employees and contractors may misuse their legitimate access to bypass security measures.
- Machine Learning for Behavioral Insights: How to train models that pinpoint deviations in user activity across diverse systems.
- Real-Time Detection: Implementing anomaly detection techniques to identify irregularities as they occur.
- Integration with SIEM and SOAR: Using behavioral data to enhance automation and incident response workflows.
- Case Studies: Technical analysis of successful behavioral analytics implementations, emphasizing reduced false positives and operational gains.

Aaron Jensen,
Director of Solutions Engineering, Delphix
5:05 PM ET
Closing Comments
Register
CPE Credits
ISMG Summits offer Continuing Professional Education Credits. Learn informative and engaging content created specifically for security professionals.