Dallas,2026,Cyber Resilience

Cyber Resilience Summit Dallas

June 9, 2026 | 8:50 AM CT - 5:30 PM CT

Hosted by BankInfoSecurity

Dallas,2026,Cyber Resilience

Event Overview

With the increasing tendency towards a proactive stance on safeguarding systems from cyber attack, the need for cyber resilience has never been clearer. From geopolitical volatility to third-party and supply chain risk, the attack surface has expanded—raising both the likelihood and consequence of disruption to the businesses and services that keep the economy running.

Addressing these issues and more, the Cyber Resilience Summit Dallas 2026 will take place on June 9th, 2026, bringing senior security and risk leaders together under the theme “Deep Defenses: Fortifying the Digital Frontier.” The Summit will convene 100+ senior-level attendees—including CISOs, CIOs, heads of security, risk leaders, and resilience stakeholders—from across industries to exchange practical lessons and proven approaches.

Join this one-day forum as it serves as a focused platform to strengthen cyber resilience through strategy, architecture, and operational readiness—covering topics such as incident response maturity, recovery planning, security modernization, and strengthening defenses across complex supplier ecosystems.

Venue

Conrad New York Downtown

102 N End Avenue, New York, NY 10282

NOTE:  All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.

Steering Committee

Guiding Our Summit With Industry Expertise

Our Summit Advisory Committee comprises industry visionaries whose guidance ensures the conference programs remain relevant, cutting-edge, and aligned with the most pressing cybersecurity challenges and opportunities – enabling attendees to apply the insights and learnings to their daily work.

Heather Phelps,

Director, IT and Information Security, Ribbon Communications

Mohamed Elbashir,

Director Information Technology Security, Oracle

Fred Clayton,

CISO, Akumin

Travis Villanueva,

Director-Expert Cybersecurity, AT&T

Juli Cunningham,

CISO, Vizient, Inc

Sailaja Kotra-Turner,

VP CISO and Director Global Infrastructure and Operations, Brown-Forman

Michael Kingsley,

Cybersecurity Advisor, North Texas (Dallas/Ft. Worth), Cybersecurity and Infrastructure Security Agency (CISA)

Mignona Coté,

SVP Chief Information Security Officer, Infor

Renaldo McKenzie,

President, North Texas, Cyversity

Topic Highlights

2026 Theme: Deep Defenses: Fortifying the Digital Frontier

  • Ahead of the Curve: Harnessing AI to Anticipate and Preempt Adversarial Tactics 
  • Adversary Intelligence: Converting Threat Data into Proactive Defense
  • Architecting Trust: Governance as the Foundation of Cyber Resilience
  • Frontier Defense: Shifting from Reactive Response to Proactive Cyber Operations 
  • Internal Vulnerability: Quantifying and Reducing Human-Based Risk

Jayaprakash Cheenepalli,

Global Director, Cyber Defense, Threat and Vulnerability Management, Cencora

Jody Cantello,

Director of Information Technology and Security, Trajus

Elvis Moreland,

BISO, ILIAS Federal Solutions

Cecil Pineda,

CISO and Senior VP, R1 RCM

Leslie Saravia,

Director, IT Security & Compliance, Overhead Door Corporation

Bryan Chou,

Director of Infrastructure and Information Security, Atlantic Aviation

Bhavesh Advani,

Head of CIRT, Cenlar FSB

Catherine Wiles,

Director of Infrastructure and Security, Farmer Brothers Coffee

Mitcheal Veenstra,

Director of Technology and ISO, ACH Child & Family Services

Mignona Coté,

SVP CISO, Infor

Shawn Mayeux,

Director, Cyber Risk, Citi

Kenneth Townsend

CISO, Ingredion

Speakers

What to Expect From Speakers

  • Strategic Insights: CISOs, risk leaders and AI program owners share current challenges and priorities.
  • Practical Use Cases: How organizations apply AI to identity, SOC operations and critical infrastructure – what works, what doesn’t.
  • Governance and Risk Models: Approaches for oversight, access control, unauthorized AI use and accountability.
  • Technical Deep Dives: How AI changes detection, telemetry and response, with measurable outcomes.
  • Networking and Solutions: Connect with peers and explore providers focused on AI risk, identity and infrastructure security.

Keynote Speaker

Dr. Suzanne Schwartz, MD.

MBA, Director, Office of Strategic Partnerships & Technology Innovation, Center for Devices & Radiological Health, FDA

Dr. Suzanne Schwartz, MD, MBA, is the director of the U.S. Food and Drug Administration’s Office of Strategic Partnerships and Innovation within the agency’s Center for Devices and Radiological Health, which among other responsibilities, is tasked with formulating the FDA’s medical device cybersecurity policy. She also has served as co-chair of the Government Coordinating Council for the healthcare and public health critical infrastructure sector. 

Dallas,2026,Cyber Resilience

Keynote Speaker

Dallas,2026,Cyber Resilience

Moriah Hara

AI Risk & Security Expert, 3x CISO, Board Advisor, Author, CISSP, CISM, AWS Security, PCI QSA

Interpublic Group and Bank of Montreal. She is a Board Advisor to several startups and a Cybersecurity Co-Author for the book, “The Perfect Scorecard: Getting An ‘A’ in Cybersecurity From Your Board Of Directors.”

She was named by Cybercrime Magazine as one of top 100 Fascinating Women Fighting Cyber, and has multiple, industry recognized security certifications such as the CISSP, CISM, CSSLP, PCI QSA and AWS Security and graduated from Harvard’s inaugural executive cybersecurity program.

Keynote Speaker

Dallas,2026,Cyber Resilience

Hardik Mehta

Global Head of Risk and Regulatory Compliance, JPMorganChase

Expert in building high-performing risk teams, aligning engineering and regulatory goals, and embedding risk into product development. Pioneered the world’s first cloud-native self-service compliance platform on Azure, automating 450+ controls with AI/ML. Skilled in FAIR, SOX, NIST, GDPR, and large-scale program delivery. Known for translating complex risk into actionable frameworks and driving cultural change across global teams.

Agenda

Given the ever-evolving nature of cybersecurity, the agenda will be continually updated to feature the most timely and relevant sessions.

8:50 AM - 9:00 AM CT

Opening Comments

8:30 am - 8:35 am Ct

Opening Comments

9:00 AM - 9:40 AM CT

Governance in Action: Translating Frameworks into Cyber Resilience

While frameworks like NIST 2.0 and ISO 27001 provide the blueprint, the real challenge lies in operationalizing these standards within complex business environments. In our expert panel discussion, we explore how security leaders build a culture of “Governance in Action.” Our experts will discuss aligning risk appetite with board-level strategy, integrating security into daily workflows, and ensuring that governance serves as an accelerator for business agility rather than a barrier. Learn how to transform theoretical frameworks into a hardened, adaptable defense.

  • How can organizations translate technical framework metrics into a “business value” language that resonates with the Board of Directors?
  • In a landscape of overlapping global regulations, what strategies can teams use to harmonize multiple frameworks without creating “compliance fatigue”?
  • What are the most effective ways to move from static yearly audits to a model of continuous governance and real-time resilience?
elvis moreland

Elvis Moreland,

BISO, ILIAS Federal Solutions

bryan chou

Bryan Chou,

Director of Infrastructure and Information Security, Atlantic Aviation

citi logo

Shawn Mayeux,

Director, Cyber Risk, Citi

9:40 AM - 10:20 AM CT

Precision at Scale: Leveraging AI and Automation in the Modern SOC

In this presentation session, we explore how to break the cycle of “alert fatigue” by integrating AI and Hyper-automation into the heart of security operations. We will move beyond the hype to discuss practical strategies for achieving Precision at Scale—the ability to identify and neutralize sophisticated threats instantly without increasing headcount.

  • Move beyond signature-based detection to AI-driven behavioral analysis
  • Build robust SOAR workflows that handle Tier-1 triage autonomously
  • Redefine KPIs—shifting focus from “Number of Alerts Handled” to MTTR and True Positive Precision
Dallas,2026,Cyber Resilience

Vlad Brodsky,

Chief Information Officer & Chief Information Security Officer, OTC Markets Group Inc.

Dallas,2026,Cyber Resilience

Steve Lenderman,

Head of Fraud Prevention, iSolved, CyberEdBoard Member

Dallas,2026,Cyber Resilience

Josh Cigna,

Solutions Architect, Yubico

10:20 AM - 11:00 AM CT

Networking Break

11:00 AM - 11:30 AM CT

Flipping the Script What if Your Threat Data Could Neutralize an Attack Before it Began?

We collect billions of indicators, yet we often remain one step behind the adversary, reacting to breaches that have already occurred. To truly secure the enterprise, we must stop treating threat intelligence as a historical record and start using it as a predictive weapon. In this session, we explore the transition from “consuming” threat data to “operationalizing” adversary intelligence. We will dive into how organizations can deconstruct the TTPs of specific Advanced Persistent Threats to preemptively harden infrastructure and disrupt the attack lifecycle at the earliest possible stage.

  • Discover why “high-fidelity” data so often fails to stop successful intrusions?
  • Move beyond simple Indicators of Compromise to understand the underlying “why” and “how” of an APT
  • Dynamically reconfigure defenses based on real-time intelligence
Dallas,2026,Cyber Resilience

Chris Wysopal,

Chief Security Evangelist, Veracode

11:30 AM - 12:00 PM CT

The Human Equation: How Do We Turn a Workforce into a Firewall?

But in a world where social engineering and identity-based attacks dominate the threat landscape, simply “patching” people with annual compliance training isn’t enough. It’s time to move beyond awareness and toward true behavioral change. In this expert fireside chat, we bring together security leaders to discuss the shift from passive training to active risk reduction. We will explore the psychology of human error, the data required to measure it, and the cultural shifts necessary to turn every employee into a proactive line of defense.

  • Which behavioral metrics actually correlate to a reduction in risk?
  • How do we move away from “shame-based” security to an environment where reporting an error is incentivized?
  • How is generative AI lowering the barrier for social engineering, and can we use that same tech to defend the human layer?
mitcheal veenstra

Mitcheal Veenstra,

Director of Technology and ISO, ACH Child & Family Services

cecil pineda

Cecil Pineda,

CISO and Senior VP, R1 RCM

12:00 PM - 12:30 PM CT

Unseen Dangers: Navigating the Cyber Security Risks of Dark Data

While copious amounts of threat intelligence are at organizations’ disposal, many find themselves ill-equipped with the security tools needed to harness this vital information, relegating essential insights to the realm of dark data. In this session, we delve into vital technological advancements that empower organizations to embark on threat hunting within the vast expanses of dark data.

  • Understand the intricacies of dark data in the cybersecurity landscape
  • Dive into the latest advancements, such as AI and EDR systems, for effective threat hunting
  • Learn about practical applications, challenges, and strategies for navigating the complexities of dark data and threat intelligence
Dallas,2026,Cyber Resilience

Chris Young,

Cybersecurity Enterprise Account Executive, OpenText

12:30 PM - 1:30 PM CT

Lunch

01:30 PM - 02:00 PM CT

Seizing the Initiative: What Does it Take to Neutralize a Threat Before It Becomes an Incident?

Waiting for an alert to fire gives the initiative to the adversary. True cyber resilience means moving away from reactive firefighting and toward a model of Proactive Cyber Operations. In this fireside chat session, our expert, together with our moderator, outlines the roadmap for evolving your security posture from a passive recipient of alerts to an active hunter of threats. We will examine how to leverage advanced operational capabilities—such as continuous threat exposure management and automated deception—to identify and neutralize malicious activity before it reaches your critical assets.

  • The Response Paradox: Why is “fast response” no longer enough to stop modern, automated attack chains?
  • Defining Preemption: What specific technical indicators allow us to identify an attack in the “pre-incident” phase?
  • The Proactive Toolkit: How do we integrate threat hunting and vulnerability prioritization into a seamless, daily operational loop?
  • Operationalizing Intelligence: How can we turn raw threat data into “preventative maneuvers” rather than just static blocklists?
  • Measuring Proactivity: How do we shift our success metrics from “Time to Respond” to “Number of Potential Incidents Averted”?
mignona cote

Mignona Coté,

SVP CISO, Infor

leslie saravia

Leslie Saravia,

Director, IT Security & Compliance, Overhead Door Corporation

02:00 PM - 02:30 PM CT

SASE and Zero Trust Done Right: How to Protect and Accelerate Everything to Everywhere

However, doing so across traditional network security architectures has revealed security gaps, performance limitations, and excessive complexity. Secure Access Service Edge (SASE) can address these challenges with a simplified platform that delivers advanced security and optimized connectivity, but it’s important to choose the right platform to do it all.

  • Hear the challenges holding back digital transformation and the effectiveness of the modern enterprise
  • See how SASE can enable organizations to address some of their most important security and networking projects
  • Find a comprehensive, converged SASE platform that delivers zero trust security
Dallas,2026,Cyber Resilience

Tim Hill

VP, Software Engineering, Rocket Software

02:30 PM - 03:00 PM CT

From Perimeter to Policy: A Zero Trust Implementation Case Study

In this session, we look into a real-world journey of adopting a Zero Trust security framework. Join us to explore the challenges, strategies, and successes encountered during a comprehensive transition from a legacy security posture to a robust, policy-driven Zero Trust architecture.

  • Understanding the compelling reasons and business drivers that necessitate a shift to Zero Trust.
  • See how network segmentation, IAM, and device trust can be re-imagined.
  • Navigate common pitfalls, integrate new technologies, and manage organizational change
jayaprakash cheenepalli

Jayaprakash Cheenepalli,

Global Director, Cyber Defense, Threat and Vulnerability Management, Cencora

1:25 PM - 2:10 PM CT

Lunch

03:10 PM - 03:30 PM CT

The Velocity Shift: Outpacing Adversaries via AI-Driven Operations

In this session, we examine the transition from human-led, tool-assisted security to AI-driven operations. We will explore how to integrate ML and GenAI into the fabric of the SOC to automate high-volume triage, predict adversary movement, and execute defensive maneuvers at a speed that traditional workflows simply cannot match.

  • Allow AI to handle the “cognitive load” of Tier-1 analysis, allowing humans to focus on high-value hunting
  • Achieve greater efficiency in identifying the “signals in the noise” before a full-scale breach occurs
  • See what autonomous response looks like, and how much “human-in-the-loop” is actually required for safety
Dallas,2026,Cyber Resilience

Scott Tenenbaum

Head of Claims, North America, Resilience

Dallas,2026,Cyber Resilience

David Anderson

CIPP/US, Vice President, Cyber, Woodruff Sawyer - A Gallagher Company

Dallas,2026,Cyber Resilience

Kimberly Pack

Counsel, Thompson Hine LLP

03:30 PM - 04:00 PM CT

Networking Break

04:00 pm - 04:40 pm ct

Roundtables

T1. How Do We Get Ready for Quantum?
T2. Can We Rely on Defense-in-Depth for the Cloud?
T3. How Should We Govern Data in the Age of AI?
T4. How Do We Manage Stress and Burnout in Cybersecurity?

Dallas,2026,Cyber Resilience

Vincent Stoffer,

Field CTO, Corelight, Inc

04:40 pm - 05:20 pm ct

Security vs Resilience: Are We Focusing Too Much on 'If' and Not Enough on 'When' We Will Get Breached?

Yet even the most sophisticated defenses can be bypassed. The critical question facing modern leadership is no longer just how to prevent an intrusion, but how to ensure the business continues to function while under fire.

In this expert panel discussion, we bring together industry leaders to debate the balance between Cybersecurity (the art of prevention) and Cyber Resilience (the art of survival).

  • Has our obsession with being “unhackable” actually made us more vulnerable to a total system collapse?
  • How do we architect systems that allow for localized failures without compromising the entire enterprise?
  • How do we train executives and boards to view a breach not as a binary failure of IT, but as a manageable business risk?
jody cantello

Jody Cantello,

Director of Information Technology and Security, Trajus

bhavesh advani

Bhavesh Advani,

Head of CIRT, Cenlar FSB

catherine wiles

Catherine Wiles,

Director of Infrastructure and Security, Farmer Brothers Coffee

4:35 PM - 5:05 PM CT

Uncovering Insider Threats with Behavioral Analytics​

Behavioral analytics offers a powerful tool for identifying subtle activity changes that could indicate malicious actions or unintentional risks before they evolve into serious breaches.
 
This session will dive into advanced methods for applying behavioral analytics to insider threat detection, including leveraging machine learning, anomaly detection algorithms, and seamless integration with existing security tools. Through real-world examples, CISOs will explore how this technology can uncover suspicious access patterns and unusual data transfers, delivering proactive defenses against insider threats.
 
Key Technical Takeaways:
  • Machine Learning for Behavioral Insights: How to train models that pinpoint deviations in user activity across diverse systems.
  • Real-Time Detection: Implementing anomaly detection techniques to identify irregularities as they occur.
  • Integration with SIEM and SOAR: Using behavioral data to enhance automation and incident response workflows.
  • Case Studies: Technical analysis of successful behavioral analytics implementations, emphasizing reduced false positives and operational gains.
 
Dallas,2026,Cyber Resilience

Aaron Jensen,

Director of Solutions Engineering, Delphix

05:20 PM CT

Closing Comments

Don’t miss your chance to attend this dynamic impactful event

@ ISMG_News    #ISMGSummits

Register

CPE Credits

ISMG Summits offer Continuing Professional Education Credits. Learn informative and engaging content created specifically for security professionals.

The Summit Experience

Upcoming ISMG Events

CS4CA APAC

April 1-2, 2026

CS4CA USA

March 10 - 11, 2026

Implications of AI

February 24, 2026 | Virtual

Nullcon GOA

February 25 - March 1, 2026

ManuSec Europe

February 26 - 27, 2026

Upcoming ISMG Events

CS4CA APAC

April 1-2, 2026

CS4CA USA

March 10 - 11, 2026

Implications of AI

February 24, 2026 | Virtual