Highlight Topics
- Critical Infrastructure
- Incidence Response
- Supply Chain Threats and Response
- Cyber Attacks
- Zero Trust
ISMG Summits feature carefully curated agendas delivering keynotes from industry luminaries, case-based learning, solution room workshops, private roundtable discussions, one-to-one networking and more. Our geo-targeted, industry-specific, and topic-driven events provide actionable education for security leaders’ top priorities and challenges.
View our ISMG Event Experience video to see what your peers are saying about their participation.
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats
Although all employees share the responsibility for cybersecurity, Chief Information Security Officers, Chief Risk Officers, and other senior security leaders are at the forefront, confronting cyber threats directly. Simply put, these essential responsibilities can no longer be regarded as back-office functions; these roles have gained strategic importance due to the growing sophistication of cybercriminals, their advanced tools, and the significant financial implications at stake.
Key Discussion Points:
Kevin Li, CISO, Cohen & Steers
Erika Dean, CSO, Robinhood Markets
Eric Boateng, CISO, MassMutual
But how resilient are your users when it comes to fending off these threats? We looked at 11.9 million users across 55,675 organizations to find out.
In this session, you will learn the following:
Anthony Scarola, SVP; Director of IT Governance, Risk & Compliance,
Apple Bank
Chetan Patel, Senior Vice President – CISO US & UK, Helaba
This session will equip CISOs with the latest analysis on the global threat landscape, the ways in which bad actors are leveraging emerging technologies to exploit traditional weaknesses, and bold strategies for combatting new and evolving threats. Key takeaways will include:
Anthony Scarola, SVP; Director of IT Governance, Risk & Compliance,
Apple Bank
Chetan Patel, Senior Vice President – CISO US & UK, Helaba
Join us for a discussion on the best practices to responding to zero-day vulnerability attacks and conducting emergency assessments. We’ll outline what’s required to prepare in advance so you’re ready to execute when the time comes. From establishing solid communication channels to leveraging automation, we’ll cover the necessary steps and considerations for an effective response plan.
Session attendees will learn:
R&D teams create and scatter secrets across vaults, code, collaboration solutions and more without any oversight or control by security teams. Secret-based breaches are among the top three attack vectors, and they are the most destructive.
What solution is needed to enable organizations to securely utilize non-human identities and secrets? How can you detect, safeguard, and provide context for secrets stored across vaults, source code, collaboration tools, cloud environments, and SaaS platforms?
Introducing Entro – the complete platform for non-human identity & Secrets management.
With Entro, Security teams can finally efficiently oversee and protect non-human identities with automated lifecycle processes and seamless integration, ensuring comprehensive security and compliance through a unified interface.
Sohail Iqbal, CISO, Veracode
Over the last year passkeys as a concept has really gained momentum as consumers and organizations alike are assessing what passkeys are and their benefits. And there is not just one type of passkey. It seems that every other day there is a new type of passkey on the scene ranging from synced passkeys to device-bound passkeys. But which one is right for your organization?
Join this session to learn about:
Sohail Iqbal, CISO, Veracode
Organizations spend more than $30 million to combat threats, but traditional methods of identifying, authenticating and authorizing users are fraught with vulnerabilities. It’s time for a more secure and user-friendly model. Join Ping Identity to learn how PingOne Neo, our decentralized identity solution, prevents fraud by proofing and verifying digital identity securely in a shareable way.
Sohail Iqbal, CISO, Veracode
Track A
Panelists will provide a roadmap for CISOs to fully leverage cyber insurance, safeguarding their security while clarifying its scope and debunking common misconceptions about its effectiveness and sustainability.
The discussion will explore key factors that insurers consider during the underwriting process, illustrating how companies can align their cyber insurance strategy with broader risk management objectives. Special attention will be paid to the strategic benefits of pre-breach services such as risk assessments and vulnerability scans, and post-breach services like incident response and claims support, which are pivotal in minimizing the impact of security incidents.
Key Takeaways:
David Anderson, Vice President, Cyber, Woodruff Sawyer
Track B
Ankur Ahuja, CISO, Billtrust
Michael Woodson, Information Security and Privacy Director, Sonesta
Hotels
Track A
This session will delve into the mechanics of account takeovers, highlighting how attackers pose as legitimate users to gain prolonged, undetected access to accounts. It will explore:
Anthony Scarola, SVP; Director of IT Governance, Risk & Compliance,
Apple Bank
Chetan Patel, Senior Vice President – CISO US & UK, Helaba
Track B
The panel will focus on the importance of establishing a common language across different risk domains and explore how fostering interdisciplinary communication and understanding is crucial for timely and effective threat response, aligning different departments under a unified risk management objective.
Discussion Highlights:
Vlad Brodsky, SVP, Chief Information Security Officer, OTC Markets
Group
Ali Khan, CISO, Better.com
As adversarial activity grows more sophisticated, defenders face escalating challenges compounded by resource constraints. To effectively combat these threats, defenders require advanced tools and capabilities that deliver high-quality intelligence from various sources.
This session will explore:
Itzik Alvas, CEO & Co-founder, Entro Security
Finally, we will explore the broader role of AI and automation in revolutionizing IT operations, from accelerating incident response times to enhancing overall operational efficiency.
Discussion Points
Trevor Foskett, Senior Director, Solutions Engineering, Virtru
Join Fortra, as we explore:
Trevor Foskett, Senior Director, Solutions Engineering, Virtru
Real-time analytics is especially crucial for enterprises in the financial sector. Discover the full Devo stack and how it can support your SOC. See how your team can quickly identify and respond to security events, boost your SOC performance, and augment your analysts with AI – eliminating over 95% of security alerts.
Boris Klyuchnikov, Special Agent, Cyber Crime Task Force, FBI
Seth Rose, Supervisory Special Agent Group 06, U.S. Department of the
Treasury Cyber investigations Unit
TBC
NOTE: All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.
ISMG Summits offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.
RSVP here to attend our events. You can select for multiple or individual tickets.
NOTE: All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.
Upcoming ISMG Events