Arrival, registration & breakfast networking
Introduction from the Network Group & Chairperson
A brief introduction to the event software, SNS — this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximizing networking opportunities. The software designs a personalized agenda & enables attendees to arrange one-to-one meetings with each other. This will be followed by a welcome from the chairperson.
Data Security: Understanding Data-Driven Controls
- Discuss encryption and data safeguards
- DPIA/PIAs and the need to understand where your data resides
- Being prepared for AI initiatives-Data retention and governance
Richard Mendoza, Senior Director, Data Privacy & Regulatory Compliance, Anywhere Real Estate
How the New SEC Cyber Disclosure Rules will Reframe the Role of the CISO
- How to meet the SEC’s disclosure requirements to mitigate any potential risks
- How to successfully collaborate closely with all stakeholders, including executive leadership, legal counsel, and compliance teams.
Amit Basu, CIO & CISO, International Seaways
Panel: A Look at the Cybercrime Landscape in 2024 So Far & What Can We Expect in 2025?
- How has this landscape evolved recently?
- What type of attacks can businesses now be facing?
- How is the rise of cyber threats’ sophistication directly linked with the improved cybersecurity practices and tools within companies and organizations?
Afzal Khan, Global CISO, BioReference
Raj Sharma, CISO, Northern Bank
Coffee break & networking
Workshop 1
Continuous Threat Exposure Management: A Step Change in Vulnerability Management
Workshop 3
Navigating the Impact of DORA: What US Companies should know about the new EU DORA Regulation
11:00 – 13:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- AI Cyber Security
- Zero Trust
Networking lunch
Understanding the Human Aspect of Cyber Security in order to Mitigate the Risk of a Breach
- Importance of training on a realistic level
- Role of AI in increasing the effectiveness of attacks by less sophisticated actors
- Real-world examples of utilities
Shanna Ramirez, Chief Legal & Ethics Officer, General Counsel & Board Secretary, CPS Energy
Data Security: Understanding how Data-Driven Controls Enable Organizations to Dynamically Adapt to Emerging Cyber Threats
- Learn how data-driven controls enable you to adapt to emerging cyber threats by leveraging real-time data analytics
- Discover how the integration of data-driven controls enhances the efficiency of incident detection and minimizing the impact of security incidents
Bhargava Gorty, Senior Director Application Security & Data Protection, Columbia University
Redesigning & Evolving your Cyber Security Strategy to Try & Stay Ahead of Hackers or at Least Keep up with Them
- The essential components underpinning your overall security posture and business agility
- What are the best practices for building an efficient roadmap?
- The 10 measures you can take to mitigate internal and external data breaches
Afzal Khan, Global CISO, BioReference
Irene Thong, Chief Security Officer, Printpack
Jonathan Chan, Head of Global IT & Security, Episource
Developing a Culture of Cyber Strength: Nurturing Human Factors in Cybersecurity
- Encouraging a responsible cybersecurity culture within the organization
- Creating a security awareness program tailored for different group
Irene Thong, Chief Security Officer, Printpack
Coffee break & networking
Workshop 4
Cyber Leadership
Workshop 5
Looking Ahead to 2025: Preparing for Next year’s Cyber Security Challenges
15:25 – 17:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- AI Cyber Security
- Zero Trust
Panel: The Human Factors of Cyber Security
- Best strategies to reduce human-induced risks
- Creating effective cyber training
- Prioritising people solutions to improve cyber resiliency
Irene Thong, Chief Security Officer, Printpack
Shanna Ramirez, Chief Security Officer, CPS Energy
Morning registration & breakfast
Introduction from the Chairperson
Roundtable discussions
Join group discussions with your peers on some of the most challenging & significant information security topics – please confirm attendance prior to the session. Each host will facilitate the discussion & give a short presentation of key findings in the wrap up session.
Ray Malak, VP – Information Security, Flagstar Bank
Brian Peister, SVP- Cyber Security, BNY
Olusegun Opeyemi-Ajayi, CISO, NYC Department of Transportation
Tom Pageler, CISO, Tao Motors
Chuck Golliday, CISO, ELLKAY
Roundtable wrap-up by the Chairperson
Each host gives a short overview of key findings from their discussion & creates an ideas board to be distributed post event with the presentations.
Coffee break & networking
Workshop 6
Vulnerability Management
Workshop 7
Strengthening Digital Trust as part of Cyber Security Policies
Workshop 8
Developing Benchmarks to Monitor the Performance of Security Controls
11:00 – 13:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- AI Cyber Security
- Zero Trust
Networking lunch
Next Generation of Email Phish Filtering
- How are employees targeted with phishing attacks and what vulnerabilities are exposed?
- How can we harmonize organizational protocol with the mitigation of human error?
- What training protocols have worked well? And are there any more tools at our disposal to encourage vigilance?
Keith Dempsey, CISO, ArisGlobal
Understanding the Importance of Security Awareness Training
- What innovative approaches are being employed in SAT programs
- How effective are they in reducing human-related risks?
- What are the most significant cybersecurity threats facing organizations?
Michael Pilch, ISO, University of Delaware
Technology Risk Evolution & Challenges
- Defining what a future state looks like; balancing productivity, risk & investment
- Choosing the core technology implementations best suited to achieve the desired future state.
Ahsan Sheikh, Head of Cyber Security, Data & IT Risk, Societe Generale
Victor Thkifati, Director – Operational Risk & Compliance Lead for Data, Technology & Business Continuity Risk, Societe Generale
Attack Surface Management
- What is attack surface management and why should you care
- Challenges organizations face today with exposure of assets
- Benefits of leveraging attack surface management solutions
- Best practices for continued success
Michael Carpenter, Head of Cyber Security, BASF
Panel: Exploring the Latest Technological Advancements When it Comes to Protecting Your Organization
- Learning from past mistakes – discussing the different approaches and concerns industries need to consider when tackling issues arising from implementing new technologies
- Understanding how AI will soon become a necessary skill for any CISO who wants to stay relevant in the field
- Why investing in new technologies defense is the only way to keep up with the coming wave of AI-powered attacks
Ernest Smiley, CISO, Kingdom Capital
Oleg Gudym, CISO, Securiport