Highlight Topics
- Critical Infrastructure
- Incidence Response
- Supply Chain Threats and Response
- Cyber Attacks
- Zero Trust
ISMG Summits feature carefully curated agendas delivering keynotes from industry luminaries, case-based learning, solution room workshops, private roundtable discussions, one-to-one networking and more. Our geo-targeted, industry-specific, and topic-driven events provide actionable education for security leaders’ top priorities and challenges.
View our ISMG Event Experience video to see what your peers are saying about their participation.
85 West Street at Albany Street
New York, NY 10006
NOTE: All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats
Although all employees share the responsibility for cybersecurity, Chief Information Security Officers, Chief Risk Officers, and other senior security leaders are at the forefront, confronting cyber threats directly. Simply put, these essential responsibilities can no longer be regarded as back-office functions; these roles have gained strategic importance due to the growing sophistication of cybercriminals, their advanced tools, and the significant financial implications at stake.
Key Discussion Points:
Matanda Doss, Executive Director, Cybersecurity and
Technology Controls, JPMorganChase
Erika Dean, CSO, Robinhood Markets
Eric Boateng, CISO, MassMutual
Joanna Huisman, SVP Strategic Insights & Research, KnowBe4
This session will equip CISOs with the latest analysis on the global threat landscape, the ways in which bad actors are leveraging emerging technologies to exploit traditional weaknesses, and bold strategies for combatting new and evolving threats. Key takeaways will include:
Anthony Scarola, SVP; Director of IT Governance, Risk & Compliance,
Apple Bank
Chetan Patel, Senior Vice President – CISO US & UK, Helaba
Join us for a discussion on the best practices to responding to zero-day vulnerability attacks and conducting emergency assessments. We’ll outline what’s required to prepare in advance so you’re ready to execute when the time comes. From establishing solid communication channels to leveraging automation, we’ll cover the necessary steps and considerations for an effective response plan.
Session attendees will learn:
Track A
Panelists will provide a roadmap for CISOs to fully leverage cyber insurance, safeguarding their security while clarifying its scope and debunking common misconceptions about its effectiveness and sustainability.
The discussion will explore key factors that insurers consider during the underwriting process, illustrating how companies can align their cyber insurance strategy with broader risk management objectives. Special attention will be paid to the strategic benefits of pre-breach services such as risk assessments and vulnerability scans, and post-breach services like incident response and claims support, which are pivotal in minimizing the impact of security incidents.
Key Takeaways:
David Anderson, Vice President, Cyber, Woodruff Sawyer
Track B
Ankur Ahuja, CISO, Billtrust
Michael Woodson, Information Security and Privacy Director,
Sonesta Hotels
R&D teams create and scatter secrets across vaults, code, collaboration solutions and more without any oversight or control by security teams. Secret-based breaches are among the top three attack vectors, and they are the most destructive.
What solution is needed to enable organizations to securely utilize non-human identities and secrets? How can you detect, safeguard, and provide context for secrets stored across vaults, source code, collaboration tools, cloud environments, and SaaS platforms?
Introducing Entro – the complete platform for non-human identity & Secrets management.
With Entro, Security teams can finally efficiently oversee and protect non-human identities with automated lifecycle processes and seamless integration, ensuring comprehensive security and compliance through a unified interface.
Sohail Iqbal, CISO, Veracode
Over the last year passkeys as a concept has really gained momentum as consumers and organizations alike are assessing what passkeys are and their benefits. And there is not just one type of passkey. It seems that every other day there is a new type of passkey on the scene ranging from synced passkeys to device-bound passkeys. But which one is right for your organization?
Join this session to learn about:
Josh Cigna, Solutions Architect, Yubico
Organizations spend more than $30 million to combat threats, but traditional methods of identifying, authenticating and authorizing users are fraught with vulnerabilities. It’s time for a more secure and user-friendly model. Join Ping Identity to learn how PingOne Neo, our decentralized identity solution, prevents fraud by proofing and verifying digital identity securely in a shareable way.
Sohail Iqbal, CISO, Veracode
As adversarial activity grows more sophisticated, defenders face escalating challenges compounded by resource constraints. To effectively combat these threats, defenders require advanced tools and capabilities that deliver high-quality intelligence from various sources.
This session will explore:
Itzik Alvas, CEO & Co-founder, Entro Security
Join Fortra, as we explore:
Trevor Foskett, Senior Director, Solutions Engineering, Virtru
In this talk, we’ll explore the challenges of Shadow AI , the balance between speed and security, and the remotion responses individuals and organization face when navigating technological change. Join us to discover strategies for combatting Shadow Ai while driving innovation and learn how industry standards and future AI advancements will shape the next phase of adoption.
Erik Gaston, Vice President, Global Executive Engagement,
Tanium
Unaddressed misalignments mean inconsistent processes, ineffective teams, and underutilized tools, leading to widespread inefficiencies, governance gaps, and increased risks of security breaches. Without clear and unified control over these elements, organizations incur these hidden costs every day. Introducing Ovalix: a unified platform for complete visibility and control over your security landscape. Ovalix bridges the gap between your teams, tools, and processes and ensures every aspect of your security strategy is optimized, helping you reduce risks, close governance gaps, and improve overall efficiency.
Oriel Vaturi, CEO, Ovalix Security
Boris Klyuchnikov, Special Agent, Cyber Crime Task Force, FBI
Seth Rose, Supervisory Special Agent Group 06, U.S. Department of
the Treasury Cyber Investigations Unit
Ryan Roobian, Global Solutions Architect, Google Cloud Security
This session will delve into the mechanics of account takeovers, highlighting how attackers pose as legitimate users to gain prolonged, undetected access to accounts. It will explore:
Anthony Scarola, SVP; Director of IT Governance, Risk &
Compliance, Apple Bank
Chetan Patel, Senior Vice President – CISO US & UK, Helaba
The panel will focus on the importance of establishing a common language across different risk domains and explore how fostering interdisciplinary communication and understanding is crucial for timely and effective threat response, aligning different departments under a unified risk management objective.
Discussion Highlights:
Vlad Brodsky, SVP, Chief Information Security Officer, OTC
Markets Group
Ali Khan, CISO, Better.com
ISMG Summits offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.
RSVP here to attend our events. You can select for multiple or individual tickets.
NOTE: All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.
Upcoming ISMG Events
Upcoming ISMG Events