March 21, 2023

North America East Summit

8:00 PM ET - 5:00 PM ET

Event Overview

ISMG Summits feature carefully curated agendas delivering a Keynote Address from an Industry Luminary, Case-Based Learning, Networking and more. The Summits are geo-targeted, industry-specific, and topic-driven events designed for security leaders.

ISMG’s agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.

Venue

Madison Avenue

Madison Avenue, New York, NY 10017, USA

NOTE: This in an invitation-only event and space is limited. All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.

Highlight Topics

  • Enhancing Your Security Posture
  • Third Party Risk Management
  • Cyber Governance
  • 5G Network Security and Business Opportunities
  • Zero Trust

Agenda

You can now view or download a PDF version of the attendee guide.

Registration & Breakfast

Katie Jenkins

EVP & CISO , Liberty Mutual Insurance

Culture Change: How to Instill a Mindset of Responsible Defense

It’s called “Responsible Defense,” and Katie Jenkins, EVP and CISO of Liberty Mutual Insurance, addresses it in this exclusive keynote. Beyond this cultural shift, she discusses:

  • Partnering with her new CIO to support a tech strategy of “Safeguarding Business Operations”
  • Dealing with the shifting threat landscape and expanded attack surface
  • Addressing the talent gap by championing women, military veterans and other under-represented groups

Esther Christopher

Senior Product Marketing, Manage Engine

Evolving with the changing cyber-threat landscape

Zero Trust is an effective approach to securing access to applications and resources, but it still requires a comprehensive strategy to addressing human-related security threats. UEBA uses machine learning algorithms to detect and respond to anomalous behavior in users and devices, providing an additional layer of security to Zero Trust.
 

Gary Phipps

Vice President Strategy & Business Transformation, GRCP CTPRP, Cyber GRX

Could Generative AI be the key to making better Third-Party Risk decisions faster?

Amidst the excitement, we can’t help but ponder whether Gary crafted this abstract himself or if a mischievous AI is behind the curtain, potentially holding him captive in a closet. Regardless, prepare to dive into the compelling intersection of AI and third-party risk decisions, shedding light on a future where technology and human collaboration reshape the landscape.

Networking & Exhibition Break

Stephen Dougherty

Special Agent, U.S Secret Service

Yoshiko Marinko

Special Agent, U.S. Secret Service

Solution Room Secret Service Panel- Latest Trends in BEC

JT Jacoby

CISO, International Rescue Committee

Grant Schnieder

Senior Director for Cybersecurity Services (Former U.S. federal CISO), Venable LLP

Matanda Doss

Executive Director, Cybersecurity and Technology Controls, Commercial Bank, JPMorgan Chase & Co.

Mike D'Ambrosio

Managing Director, Liberty Strategic Capital

Elizabeth Gossell

AVP Deputy CISO, Cyber Strategy & Programs, Amtrak

Anatomy of a Business Email Compromise Attack and their Mutations (And why they continue to be successful today)

The Solution Room is an interactive and dynamic conference session designed to bring Cybersecurity Leaders together and provide peer-to-peer learning and SME advice on their most pressing challenges. 

At the beginning of The Solution Room session, attendees will be broken into small groups.  In your group, you’ll receive help from your peers, a moderator and a Secret Service Agent as you work through the lifecycle of a Business Email Compromise.

The US Secret Service has extensive experience and expertise in investigating and preventing BEC attacks. They have a proven track record of successfully identifying, disrupting, and prosecuting cybercriminals involved in BEC schemes. 

During this workshop on the anatomy of a BEC attack and its mutations, the US Secret Service will provide attendees the opportunity to learn from the experts and gain a deeper understanding of this type of cybercrime. Participants will hear about the latest forms of BEC attacks, including executive impersonation, invoice fraud, and supplier swindle, and understand the tactics and techniques used by attackers. 

Lunch & Exhibition Break

JT Jacoby

CISO, International Rescue Committee

Grant Schnieder

Senior Director for Cybersecurity Services (Former U.S. federal CISO), Venable LLP

Matanda Doss

Executive Director, Cybersecurity and Technology Controls, Commercial Bank, JPMorgan Chase & Co.

Elizabeth Gossell

AVP Deputy CISO, Cyber Strategy & Programs, Amtrak

Dave Wong

Director, Mandiant Consulting

Prioritizing Security Actions with Insight into Active, Relevant Threat Campaigns

Zero Trust is an effective approach to securing access to applications and resources, but it still requires a comprehensive strategy to addressing human-related security threats. UEBA uses machine learning algorithms to detect and respond to anomalous behavior in users and devices, providing an additional layer of security to Zero Trust. 

In this session you will explore:

  • How UEBA provides insights into user behavior, helping to detect potential threats before they occur.
  • The importance of human insight in cybersecurity and how to effectively incorporate it into your organization’s security strategy.
  • Tools and best practices for monitoring and responding to user behavior in a Zero Trust environment.
  • How to continuously improve your security posture with ongoing monitoring and analysis of user behavior

Irina Tishelman

Solutions Engineer, Sonatype

Solution Showcase - Sonatype Lifecycle Demo

Solutions Showcase

2:55 pm – 3:30 pM ET

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Culture Change: How to Instill a Mindset of Responsible Defense

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

2:55 pm – 3:30 pM ET

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Culture Change: How to Instill a Mindset of Responsible Defense

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

2:55 pm – 3:30 pM ET

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Culture Change: How to Instill a Mindset of Responsible Defense

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

Networking & Exhibition Break

Grant Schneider

Senior Director for Cybersecurity Services, Venable LLP

"But is it Doable?" Analyzing the New U.S. Cybersecurity Strategy

It’s the new U.S. Cybersecurity Strategy released in early March, calling for new levels of critical infrastructure protection and industry accountability for software flaws. Is the ambitious strategy doable in today’s political environment? Former federal CISO Grant Schneider offers his informed opinion and takes audience questions about:
• Defending critical infrastructure
• Targeting threat actors
• Liability for software flaws
 

Tae Andrews

Senior Managing Associate, Pasich LLP

Supercharging Your Cyber Insurance

Cyber insurance, when properly deployed, can help avoid and respond to incidents, as well as reduce the financial impact of such incidents.  This session reviews hot topics in cyber insurance, and provides a road map to maximizing your insurance recovery in the event of a loss.

Key learning objectives:

  • Understanding the underwriting process and how to avoid voiding your coverage; 
  • Integration of your insurance resources into your cybersecurity program; 
  • Avoiding pitfalls during and after an incident that could reduce your recovery.  

Closing Comments

Don’t miss your chance to attend this dynamic impactful event

#ISMGSummit

@ISMG_News

Our Sponsors

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Greg Thompson

VP, CISO, ManuLife

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Greg Thompson

VP, CISO, ManuLife

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Greg Thompson

VP, CISO, ManuLife

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

The Summit Experience

CPE Credits

Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.

Register

RSVP here to attend our events. You can select for multiple or individual tickets. 

Upcoming ISMG Events

January 16, 2025

AI-Driven Insights for Asset Visibility and Streamlined Patch Management

January 22, 2025

Mitigate Risks Through Asset Discovery and Compliance Monitoring

January 28, 2025

Are You Ready for DORA? Strengthening Resilience and Achieving Compliance by 2025

January 30, 2025

The Anatomy of Cyber Resilience: What It Is, What It Isn't, Why It Matters, and How to Achieve It

February 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI

Upcoming ISMG Events

January 16, 2025

AI-Driven Insights for Asset Visibility and Streamlined Patch Management

January 22, 2025

Mitigate Risks Through Asset Discovery and Compliance Monitoring

January 28, 2025

Are You Ready for DORA? Strengthening Resilience and Achieving Compliance by 2025