Cyber Resilience Summit Dallas
June 9, 2026 | 8:50 AM CT - 5:30 PM CT
Hosted by BankInfoSecurity
Event Overview
With the increasing tendency towards a proactive stance on safeguarding systems from cyber attack, the need for cyber resilience has never been clearer. From geopolitical volatility to third-party and supply chain risk, the attack surface has expanded—raising both the likelihood and consequence of disruption to the businesses and services that keep the economy running.
Addressing these issues and more, the Cyber Resilience Summit Dallas 2026 will take place on June 9th, 2026, bringing senior security and risk leaders together under the theme “Deep Defenses: Fortifying the Digital Frontier.” The Summit will convene 100+ senior-level attendees—including CISOs, CIOs, heads of security, risk leaders, and resilience stakeholders—from across industries to exchange practical lessons and proven approaches.
Join this one-day forum as it serves as a focused platform to strengthen cyber resilience through strategy, architecture, and operational readiness—covering topics such as incident response maturity, recovery planning, security modernization, and strengthening defenses across complex supplier ecosystems.



Venue
Conrad New York Downtown
102 N End Avenue, New York, NY 10282
NOTE: All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.
Steering Committee
Guiding Our Summit With Industry Expertise
Our Summit Advisory Committee comprises industry visionaries whose guidance ensures the conference programs remain relevant, cutting-edge, and aligned with the most pressing cybersecurity challenges and opportunities – enabling attendees to apply the insights and learnings to their daily work.
Heather Phelps,
Mohamed Elbashir,
Fred Clayton,
Travis Villanueva,
Juli Cunningham,
Sailaja Kotra-Turner,
Michael Kingsley,
Mignona Coté,
Renaldo McKenzie,
Topic Highlights
2026 Theme: Deep Defenses: Fortifying the Digital Frontier
- Ahead of the Curve: Harnessing AI to Anticipate and Preempt Adversarial Tactics
- Adversary Intelligence: Converting Threat Data into Proactive Defense
- Architecting Trust: Governance as the Foundation of Cyber Resilience
- Frontier Defense: Shifting from Reactive Response to Proactive Cyber Operations
- Internal Vulnerability: Quantifying and Reducing Human-Based Risk
Jayaprakash Cheenepalli,
Jody Cantello,
Elvis Moreland,
Cecil Pineda,
Leslie Saravia,
Bryan Chou,
Bhavesh Advani,
Catherine Wiles,
Mitcheal Veenstra,
Mignona Coté,
Shawn Mayeux,
Kenneth Townsend
Speakers
What to Expect From Speakers
- Strategic Insights: CISOs, risk leaders and AI program owners share current challenges and priorities.
- Practical Use Cases: How organizations apply AI to identity, SOC operations and critical infrastructure – what works, what doesn’t.
- Governance and Risk Models: Approaches for oversight, access control, unauthorized AI use and accountability.
- Technical Deep Dives: How AI changes detection, telemetry and response, with measurable outcomes.
- Networking and Solutions: Connect with peers and explore providers focused on AI risk, identity and infrastructure security.
Keynote Speaker
Dr. Suzanne Schwartz, MD.
MBA, Director, Office of Strategic Partnerships & Technology Innovation, Center for Devices & Radiological Health, FDA
Dr. Suzanne Schwartz, MD, MBA, is the director of the U.S. Food and Drug Administration’s Office of Strategic Partnerships and Innovation within the agency’s Center for Devices and Radiological Health, which among other responsibilities, is tasked with formulating the FDA’s medical device cybersecurity policy. She also has served as co-chair of the Government Coordinating Council for the healthcare and public health critical infrastructure sector.
Keynote Speaker
Moriah Hara
AI Risk & Security Expert, 3x CISO, Board Advisor, Author, CISSP, CISM, AWS Security, PCI QSA
Moriah is a 3x Fortune 500 Award Winning CISO at Wells Fargo Capital Markets,...
Interpublic Group and Bank of Montreal. She is a Board Advisor to several startups and a Cybersecurity Co-Author for the book, “The Perfect Scorecard: Getting An ‘A’ in Cybersecurity From Your Board Of Directors.”
She was named by Cybercrime Magazine as one of top 100 Fascinating Women Fighting Cyber, and has multiple, industry recognized security certifications such as the CISSP, CISM, CSSLP, PCI QSA and AWS Security and graduated from Harvard’s inaugural executive cybersecurity program.
Keynote Speaker
Hardik Mehta
Global Head of Risk and Regulatory Compliance, JPMorganChase
Security, Risk, and Compliance leader with 20+ years of global experience across Uber, Microsoft, and more. ..
Expert in building high-performing risk teams, aligning engineering and regulatory goals, and embedding risk into product development. Pioneered the world’s first cloud-native self-service compliance platform on Azure, automating 450+ controls with AI/ML. Skilled in FAIR, SOX, NIST, GDPR, and large-scale program delivery. Known for translating complex risk into actionable frameworks and driving cultural change across global teams.
Agenda
Given the ever-evolving nature of cybersecurity, the agenda will be continually updated to feature the most timely and relevant sessions.
8:50 AM - 9:00 AM CT
Opening Comments
8:30 am - 8:35 am Ct
Opening Comments
9:00 AM - 9:40 AM CT
Governance in Action: Translating Frameworks into Cyber Resilience
Modern cybersecurity has shifted from a "prevent at all costs" mindset to one of resilience.
While frameworks like NIST 2.0 and ISO 27001 provide the blueprint, the real challenge lies in operationalizing these standards within complex business environments. In our expert panel discussion, we explore how security leaders build a culture of “Governance in Action.” Our experts will discuss aligning risk appetite with board-level strategy, integrating security into daily workflows, and ensuring that governance serves as an accelerator for business agility rather than a barrier. Learn how to transform theoretical frameworks into a hardened, adaptable defense.
- How can organizations translate technical framework metrics into a “business value” language that resonates with the Board of Directors?
- In a landscape of overlapping global regulations, what strategies can teams use to harmonize multiple frameworks without creating “compliance fatigue”?
- What are the most effective ways to move from static yearly audits to a model of continuous governance and real-time resilience?

Elvis Moreland,
BISO, ILIAS Federal Solutions

Bryan Chou,
Director of Infrastructure and Information Security, Atlantic Aviation

Shawn Mayeux,
Director, Cyber Risk, Citi
9:40 AM - 10:20 AM CT
Precision at Scale: Leveraging AI and Automation in the Modern SOC
When cyber threats evolve at machine speed, the traditional, manual SOC is no longer a viable defense.
In this presentation session, we explore how to break the cycle of “alert fatigue” by integrating AI and Hyper-automation into the heart of security operations. We will move beyond the hype to discuss practical strategies for achieving Precision at Scale—the ability to identify and neutralize sophisticated threats instantly without increasing headcount.
- Move beyond signature-based detection to AI-driven behavioral analysis
- Build robust SOAR workflows that handle Tier-1 triage autonomously
- Redefine KPIs—shifting focus from “Number of Alerts Handled” to MTTR and True Positive Precision

Vlad Brodsky,
Chief Information Officer & Chief Information Security Officer, OTC Markets Group Inc.

Steve Lenderman,
Head of Fraud Prevention, iSolved, CyberEdBoard Member

Josh Cigna,
Solutions Architect, Yubico
10:20 AM - 11:00 AM CT
Networking Break
11:00 AM - 11:30 AM CT
Flipping the Script What if Your Threat Data Could Neutralize an Attack Before it Began?
Most organizations are drowning in data but starving for actionable insights.
We collect billions of indicators, yet we often remain one step behind the adversary, reacting to breaches that have already occurred. To truly secure the enterprise, we must stop treating threat intelligence as a historical record and start using it as a predictive weapon. In this session, we explore the transition from “consuming” threat data to “operationalizing” adversary intelligence. We will dive into how organizations can deconstruct the TTPs of specific Advanced Persistent Threats to preemptively harden infrastructure and disrupt the attack lifecycle at the earliest possible stage.
- Discover why “high-fidelity” data so often fails to stop successful intrusions?
- Move beyond simple Indicators of Compromise to understand the underlying “why” and “how” of an APT
- Dynamically reconfigure defenses based on real-time intelligence

Chris Wysopal,
Chief Security Evangelist, Veracode
11:30 AM - 12:00 PM CT
The Human Equation: How Do We Turn a Workforce into a Firewall?
For years, the industry has labeled the human element as the "weakest link" in the security chain.
But in a world where social engineering and identity-based attacks dominate the threat landscape, simply “patching” people with annual compliance training isn’t enough. It’s time to move beyond awareness and toward true behavioral change. In this expert fireside chat, we bring together security leaders to discuss the shift from passive training to active risk reduction. We will explore the psychology of human error, the data required to measure it, and the cultural shifts necessary to turn every employee into a proactive line of defense.
- Which behavioral metrics actually correlate to a reduction in risk?
- How do we move away from “shame-based” security to an environment where reporting an error is incentivized?
- How is generative AI lowering the barrier for social engineering, and can we use that same tech to defend the human layer?

Mitcheal Veenstra,
Director of Technology and ISO, ACH Child & Family Services

Cecil Pineda,
CISO and Senior VP, R1 RCM
12:00 PM - 12:30 PM CT
Unseen Dangers: Navigating the Cyber Security Risks of Dark Data
In today’s cyber landscape, dark data has emerged as an intricate challenge, accentuated by the untapped potential of threat intelligence.
While copious amounts of threat intelligence are at organizations’ disposal, many find themselves ill-equipped with the security tools needed to harness this vital information, relegating essential insights to the realm of dark data. In this session, we delve into vital technological advancements that empower organizations to embark on threat hunting within the vast expanses of dark data.
- Understand the intricacies of dark data in the cybersecurity landscape
- Dive into the latest advancements, such as AI and EDR systems, for effective threat hunting
- Learn about practical applications, challenges, and strategies for navigating the complexities of dark data and threat intelligence

Chris Young,
Cybersecurity Enterprise Account Executive, OpenText
12:30 PM - 1:30 PM CT
Lunch
01:30 PM - 02:00 PM CT
Seizing the Initiative: What Does it Take to Neutralize a Threat Before It Becomes an Incident?
In the current threat landscape, the "Detection-to-Response" gap is where organizations lose the most ground.
Waiting for an alert to fire gives the initiative to the adversary. True cyber resilience means moving away from reactive firefighting and toward a model of Proactive Cyber Operations. In this fireside chat session, our expert, together with our moderator, outlines the roadmap for evolving your security posture from a passive recipient of alerts to an active hunter of threats. We will examine how to leverage advanced operational capabilities—such as continuous threat exposure management and automated deception—to identify and neutralize malicious activity before it reaches your critical assets.
- The Response Paradox: Why is “fast response” no longer enough to stop modern, automated attack chains?
- Defining Preemption: What specific technical indicators allow us to identify an attack in the “pre-incident” phase?
- The Proactive Toolkit: How do we integrate threat hunting and vulnerability prioritization into a seamless, daily operational loop?
- Operationalizing Intelligence: How can we turn raw threat data into “preventative maneuvers” rather than just static blocklists?
- Measuring Proactivity: How do we shift our success metrics from “Time to Respond” to “Number of Potential Incidents Averted”?

Mignona Coté,
SVP CISO, Infor

Leslie Saravia,
Director, IT Security & Compliance, Overhead Door Corporation
02:00 PM - 02:30 PM CT
SASE and Zero Trust Done Right: How to Protect and Accelerate Everything to Everywhere
Digital transformation has empowered the hybrid workforce to access information and applications from anywhere.
However, doing so across traditional network security architectures has revealed security gaps, performance limitations, and excessive complexity. Secure Access Service Edge (SASE) can address these challenges with a simplified platform that delivers advanced security and optimized connectivity, but it’s important to choose the right platform to do it all.
- Hear the challenges holding back digital transformation and the effectiveness of the modern enterprise
- See how SASE can enable organizations to address some of their most important security and networking projects
- Find a comprehensive, converged SASE platform that delivers zero trust security

Tim Hill
VP, Software Engineering, Rocket Software
02:30 PM - 03:00 PM CT
From Perimeter to Policy: A Zero Trust Implementation Case Study
In an increasingly complex threat landscape, traditional perimeter-based security models are no longer sufficient.
In this session, we look into a real-world journey of adopting a Zero Trust security framework. Join us to explore the challenges, strategies, and successes encountered during a comprehensive transition from a legacy security posture to a robust, policy-driven Zero Trust architecture.
- Understanding the compelling reasons and business drivers that necessitate a shift to Zero Trust.
- See how network segmentation, IAM, and device trust can be re-imagined.
- Navigate common pitfalls, integrate new technologies, and manage organizational change

Jayaprakash Cheenepalli,
Global Director, Cyber Defense, Threat and Vulnerability Management, Cencora
1:25 PM - 2:10 PM CT
Lunch
03:10 PM - 03:30 PM CT
The Velocity Shift: Outpacing Adversaries via AI-Driven Operations
To survive today’s modern cyber attacks, organizations must move beyond human-scale processing and embrace the Velocity Shift.
In this session, we examine the transition from human-led, tool-assisted security to AI-driven operations. We will explore how to integrate ML and GenAI into the fabric of the SOC to automate high-volume triage, predict adversary movement, and execute defensive maneuvers at a speed that traditional workflows simply cannot match.
- Allow AI to handle the “cognitive load” of Tier-1 analysis, allowing humans to focus on high-value hunting
- Achieve greater efficiency in identifying the “signals in the noise” before a full-scale breach occurs
- See what autonomous response looks like, and how much “human-in-the-loop” is actually required for safety

Scott Tenenbaum
Head of Claims, North America, Resilience

David Anderson
CIPP/US, Vice President, Cyber, Woodruff Sawyer - A Gallagher Company

Kimberly Pack
Counsel, Thompson Hine LLP
03:30 PM - 04:00 PM CT
Networking Break
04:00 pm - 04:40 pm ct
Roundtables
Join a roundtable breakout discussion on one of the topics below.
T1. How Do We Get Ready for Quantum?
T2. Can We Rely on Defense-in-Depth for the Cloud?
T3. How Should We Govern Data in the Age of AI?
T4. How Do We Manage Stress and Burnout in Cybersecurity?

Vincent Stoffer,
Field CTO, Corelight, Inc
04:40 pm - 05:20 pm ct
Security vs Resilience: Are We Focusing Too Much on 'If' and Not Enough on 'When' We Will Get Breached?
For a long time, we have been focused on preventative measures to keep attackers out.
In this expert panel discussion, we bring together industry leaders to debate the balance between Cybersecurity (the art of prevention) and Cyber Resilience (the art of survival).
- Has our obsession with being “unhackable” actually made us more vulnerable to a total system collapse?
- How do we architect systems that allow for localized failures without compromising the entire enterprise?
- How do we train executives and boards to view a breach not as a binary failure of IT, but as a manageable business risk?

Jody Cantello,
Director of Information Technology and Security, Trajus

Bhavesh Advani,
Head of CIRT, Cenlar FSB

Catherine Wiles,
Director of Infrastructure and Security, Farmer Brothers Coffee
4:35 PM - 5:05 PM CT
Uncovering Insider Threats with Behavioral Analytics
Insider threats are becoming increasingly challenging to detect, as employees and contractors may misuse their legitimate access to bypass security measures.
- Machine Learning for Behavioral Insights: How to train models that pinpoint deviations in user activity across diverse systems.
- Real-Time Detection: Implementing anomaly detection techniques to identify irregularities as they occur.
- Integration with SIEM and SOAR: Using behavioral data to enhance automation and incident response workflows.
- Case Studies: Technical analysis of successful behavioral analytics implementations, emphasizing reduced false positives and operational gains.

Aaron Jensen,
Director of Solutions Engineering, Delphix
05:20 PM CT
Closing Comments
Register
CPE Credits
ISMG Summits offer Continuing Professional Education Credits. Learn informative and engaging content created specifically for security professionals.