-
08:00AM
Registration & Coffee in the Exhibition Area
-
8:50AM
Chair’s Opening Remarks & Speed Networking
-
9:00AM
PANEL DISCUSSION: Aligning Cybersecurity Governance with Business Objectives
• Establishing effective cybersecurity and AI governance, including frameworks, policies, procedures, training, and incidents response plans
• Monitoring and implementing legal and compliance requirements based on evolving laws and best practices
• Managing and mitigating cybersecurity incident, cross-border transfer, and geopolitical risks
• Translating business priorities into actionable cybersecurity strategies.
• Ensuring executive buy-in and effective communication with the board.
Aaron Katz, Chief Information Security Officer, THE TWC GROUP
Corey Dennis, Chief Privacy Officer & Assistant General Counsel, LEGEND BIOTECH
Alan Halfenger, Chief Compliance Officer, ARCTARIS IMPACT INVESTORS
Emily Milan, Chief Information Security Officer, LEGEND BIOTECH
Moderator: Prof. Dan Haagman, CEO Chaleit, Honorary Professor of Practice, CISO, CHALEIT -
9:40AM
Brand & Executive Impersonation – The Use of AI by Threat Actors.
Paul Pak, Chief Information Security Officer & Privacy Officer, JENNISON ASSOCIATES
-
10:00AM
Cyber Crisis Simulation - Incident Response Management in Action Led by Cytactic
Omer Itzhak, VP of Product, CYTACTIC
Tim Brown, Chief Information Security Officer, SOLARWINDS
Stacey Cameron, Chief Information Security Officer, HALCYON -
10:30AM
Networking Break in the Exhibition Area
-
CISO PROGRAM
-
11:00AM
Spotlight Session - Axonius & Cribl
Jordan Farkas, Principal Sales Engineer, AXONIUS
Senior Representative, CRIBL -
11:10AM
The Future of Risk Management – Adapting to a New Era of Threats
• Bridging the Gap: Why today’s risk management strategies fall short and how to align security with business transformation.
• Emerging Threats: The impact of AI, evolving supply chain risks, and post-quantum security challenges.
• Future-Ready Security: How organizations can redefine their approach to compliance, automation, and proactive defense.
Aaron Katz, Chief Information Security Officer, THE TWC GROUP -
11:30AM
From Compliance to Control: Real-Time Detection and Response Across the Supply Chain
1. Supply Chain Attacks Are Accelerating Faster Than Defenses: Cybercrime is growing exponentially, with attackers increasingly targeting third parties. Supply chain breaches are up 200% year-over-year, highlighting how vulnerable organizations are through their vendor ecosystems.
2. Traditional TPRM Approaches Are Outdated and Reactive: Point-in-time assessments, manual questionnaires, and slow remediation workflows leave companies exposed. Most third-party risk programs lack real-time visibility, making it impossible to detect or respond quickly to emerging threats.
3. TPRM Must Shift from Compliance-Driven to Security-Driven: Organizations spend heavily on GRC, yet most of that effort is reactive and administrative. To keep pace with dynamic threats, security teams need to adopt continuous monitoring, automation, and proactive incident response practices.
4. Supply Chain Security Should Operate Like a SOC Function: The future of third-party risk lies in SOC-aligned operations — combining threat intelligence, early warning systems, and rapid response. Just like with internal environments, companies must extend cybersecurity discipline to the full vendor landscape.
Steve Cobb, Chief Information Security Officer, SECURITYSCORECARD -
11:50AM
PANEL DISCUSSION: AI and Machine Learning in Cybersecurity
• Exploring how AI and machine learning can enhance the efficiency of security teams by automating repetitive tasks and focusing human efforts on complex threats
• How AI tools can assist in containing and mitigating threats in real-time by analyzing vast amounts of data quickly
• Using machine learning to identify anomalies in user behavior and detect insider threats or compromised accounts
• Leveraging machine learning to create dynamic security systems that evolve with new threat patterns and emerging attack vectors
• Discussing the emerging arms race between AI-powered cybersecurity defenses and AI-driven attack methods
Ejona Zeneli, Information Security Officer, UNION BANK ALBANIA
Samrah Kazmi, Expert Chief Information Security Officer, PRIMARY VENTURE PARTNERS
River Nygryn, Chief Information Security Officer, HAMMOND CARE
Paul Pak, Chief Information Security Officer & Privacy Officer, JENNISON ASSOCIATES
Alaa Moussawi, Chief Data Scientist, NEW YORK CITY COUNCIL
Moderator:
Nathan Smolenski, Chief Information Security Officer, CYERA -
12:20PM
Navigating U.S. Privacy Laws in the Cloud
• Understanding CCPA, state-level privacy regulations, and their impact
• Applying controls to safeguard personal data in the cloud
• Mapping compliance requirements to cloud service configurations
Corey Dennis, Chief Privacy Officer & Assistant General Counsel, LEGEND BIOTECH -
12:40PM
Risk, Resilience & Reinvention: A CISO’s Role in Shaping the Future Enterprise
• Why CISOs must evolve from gatekeepers to strategic enablers of innovation
• How to operationalize digital trust, not just talk about it
• Lessons from the intersection of risk, ethics, and emerging tech (including AI, quantum, and sustainability)
Samrah Kazmi, Chief Information Security Officer, PRIMARY VENTURE PARTNERS -
DEVSECOPS & CLOUD PROGRAM
-
11:00AM
Spotlight Session - The Path to Zero Trust
The adoption of the cloud and shift to mobile and remote work drives the ever increasing necessity to shift to zero trust. Understanding what zero trust is, why it is crucial, and how to think about it is essential to limit potential missteps. This session will explore these topics to help avoid pitfalls and enable a smoother zero trust adoption.
Brandon Leiker, Principal Solutions Architect, 11:11 SYSTEMS -
11:10AM
CLOUD FOCUS: Resilience in the Cloud
Cyber-attacks continue to escalate in both frequency and sophistication, creating unprecedented challenges. Malicious actors are focused on inflicting maximum damage to those that fall victim. In a world where it is “not if, but when”, the ability to effectively manage risk using a holistic approach to achieve resilience in the cloud is crucial. This session will explore essential framework aligned functions and outcomes, including how zero trust enables achievement of those outcomes.
Brandon Leiker, Principal Solutions Architect, 11:11 SYSTEMS -
11:30AM
DEVSECOPS FOCUS: FIRESIDE CHAT: Breaking Down Silos: Uniting Risk, Trust & Safety, and Security in the Age of AI
Fraud, identity abuse, misinformation, platform exploitation, and emerging AI-driven threats no longer fit neatly into one team’s charter. Risk, Trust & Safety, and InfoSec leaders are increasingly facing the same adversaries, just from different angles. In this fireside chat, experts will explore why collaboration across these functions is no longer optional, but essential.
Reema Moussa, Associate Attorney, GOODWIN
Alexandra van Nievelt, Senior Manager, Global Marketplace Risk, WALMART -
11:50AM
DEVSECOPS FOCUS: PANEL DISCUSSION: AI in DevSecOps: Hype vs. Reality
• Where AI is truly making an impact in security automation.
• The risks of blindly trusting AI-driven security tools.
• Balancing human expertise and AI-driven decision-making.
Varun Duggal Principal R&D Solutions Architect, AT&T LABS
Robert LaRosa, Information Security Engineer, GELLER
Alexandra van Nievelt, Senior Manager, Global Marketplace Risk, WALMART -
12:20PM
CLOUD FOCUS: Detection Engineering and SecOps Automation in Azure: Leveraging Sentinel, Logic Apps, Workbooks, and Azure Functions
A technical demonstration of how SecOps and DevOps teams can use a powerful mix of Azure technologies to monitor their cloud environment and automate remediation actions for suspicious activity
Felipe G, Cyber Security Engineer, HELABA -
12:40PM
DEVSECOPS FOCUS: Securing the Trade: DevSecOps in High-Frequency Trading Environments
• Balancing Speed and Security – How to integrate security into ultra-low-latency trading systems without impacting performance.
• Automating Threat Detection & Incident Response – Leveraging AI, real-time monitoring, and DevSecOps pipelines to detect and mitigate threats instantly.
• Protecting Market Data & FIX Protocol Communications – Best practices for securing trade execution, preventing data leaks, and ensuring regulatory compliance.
Carl Gordon, DevOps Engineer/Trade Support/Automation, CREDIT SUISSE -
1:00PM
Lunch & Networking Break in the Exhibition Area
-
CISO PROGRAM
-
2:00PM
PANEL DISCUSSION: Leadership in Cybersecurity: Driving Organizational Change
• Aligning Cybersecurity with Business Objectives: Exploring how leaders can integrate cybersecurity into the organization’s strategic goals to ensure it is viewed as a growth enabler, not just a cost center
• The Evolving Role of the CISO: Exploring how CISOs can move from technical specialists to strategic advisors who drive board-level decisions
• How CISOs can lead the adoption of autonomous AI tools while embedding security and governance from day one — avoiding "shadow agents" that operate outside oversight
• Leadership in Zero Trust Environments: How leaders can champion the adoption of Zero Trust models to strengthen organizational security
• How leaders can future-proof their organizations by adopting advanced encryption techniques such as homomorphic encryption to protect sensitive data
Craig Shrader, Chief Information Security Officer & Country Cyber Security Lead – Canada, HSBC
Alan Halfenger, Chief Compliance Officer, ARCTARIS IMPACT INVESTORS
Moderator:
Prof. Dan Haagman, CEO Chaleit, Honorary Professor of Practice, CISO, CHALEIT -
2:30PM
RAG Models for More Secure Guard Rails: From Theory to Application
This talk will cover the fundamentals of AI in an intuitive manner, while diving into the math of basic concepts such as vector embeddings.
This talk aims to explain why hallucinations occur, and how we can better avoid them.
This talk covers how to deploy your very own personalized RAG Model, from A to Z.
Alaa Moussawi, Chief Data Scientist, NEW YORK CITY COUNCIL -
2:50PM
Leading With Empathy & Grace – Secrets to Developing High Performing Teams
In a world where leadership is often measured by metrics, margins, and milestones, Leading with Empathy & Grace offers a timely and transformative perspective. Tammy Klotz—a seasoned cybersecurity executive—delivers a deeply personal and practical blueprint for leading with humanity, humility, and heart.
• Build psychological safety and team resilience by leading with authenticity in high-stakes, high-velocity security environments
• Protect your leadership energy through boundary-setting and intentional self-care to avoid burnout in 24/7 incident response roles
• Leverage empathy and cultural awareness as strategic tools for improving stakeholder alignment, zero-trust adoption, and security-first culture
Tammy Klotz, Chief Information Security Officer, TRINSEO -
3:10PM
The CISO’s Dilemma: Leading Through Chaos, Building for Resilience
• Navigating the dual role of risk manager and business enabler
• Building trust across the board, executive team, and technical ranks
• Evolving the security function from reactive to resilient
Prof. Dan Haagman, CEO Chaleit, Honorary Professor of Practice, CISO, CHALEIT
Tony Gonzalez, Chief Information Security Officer, North America, (former) QBE -
DEVSECOPS & CLOUD PROGRAM
-
2:00PM
CLOUD FOCUS: PANEL DISCUSSION: The Future of Cloud Security: Balancing Innovation, Compliance, and Resilience
• How can organizations innovate rapidly in the cloud without compromising security or regulatory compliance?
• How can businesses design cloud infrastructures to withstand disruptions, ransomware attacks, and evolving threat landscapes?
• What are the best practices for fostering cross-team collaboration and ensuring everyone is invested in secure outcomes?
• How will emerging technologies like AI-driven security analytics, post-quantum cryptography, and zero trust frameworks shape the next generation of cloud security?
Bijit Ghosh, Chief Technology Officer, Global Head of Cloud Product & Engineering & AI/ML, DEUTSCHE BANK
Sean Greenberg, Senior Cloud Security Engineer, Practice Lead Cloud Security, CERBERUS CAPITAL MANAGEMENT
Robert LaRosa, Information Security Engineer, GELLER
Moderator: Pieter Vanlperen, Adjunct Professor – Code Security, Kill Chain, Cloud Application Security, Threat Intel, NEW YORK UNIVERSITY -
2:30PM
DEVSECOPS FOCUS: The Rhythm of Security
• The dot com era was punk rock, Cybersecurity is Heavy Metal
• How to stay ahead of the curve while it is still being defined
• What is the glue that binds Security Programs to the Business?
• How to avoid becoming Noise to the business
Robert LaRosa, Information Security Engineer, GELLER -
2:50PM
CLOUD FOCUS: Enhancing Cloud Security with Mobile Device Management
• Unified Security Posture: Strategies for integrating MDM with cloud security protocols to protect enterprise data.
• Real-World Applications: Examples of successful MDM implementations enhancing security in diverse industries.
Sean Greenberg, Senior Cloud Security Engineer, Practice Lead Cloud Security, CERBERUS CAPITAL MANAGEMENT -
3:10PM
HYBRID FOCUS: Integrating AI and Cloud Security: Strategies for Effective DevSecOps Transformation
• Leveraging AI for DevSecOps Automation
• Architecting Secure Multi-Cloud Environments
• Driving Digital Transformation with DevSecOps
Varun Duggal Principal R&D Solutions Architect, AT&T LABS -
3:30PM
Networking Break in the Exhibition Area
-
4:00PM
PANEL DISCUSSION: My Story – The Journey of the Chief Information Security Officer (CISO)
In this session, hear from some of the top cybersecurity leaders as they share their personal journeys to becoming a Chief Information Security Officer (CISO). Learn about the challenges they faced, the key decisions that shaped their careers, and the skills that helped them succeed in an ever-evolving security landscape. This discussion will offer insights into leadership, risk management, and the future of the CISO role in a rapidly digitizing world.
Tammy Klotz, Chief Information Security Officer, TRINSEO
Aaron Katz, Chief Information Security Officer, THE TWC GROUP
River Nygryn, Chief Information Security Officer, HAMMOND CARE
Moderator: Prof. Dan Haagman, CEO Chaleit, Honorary Professor of Practice, CISO, CHALEIT -
4:40PM
Is Your Cybersecurity Program Ready for AI?
• AI-Powered Threats: The New Attack Landscape
• How cybercriminals are leveraging AI for advanced phishing, deepfakes, and automated attacks
• AI for Defense: Strengthening Your Security Posture
• How AI and machine learning can enhance threat detection, response, and automation
River Nygryn, Chief Information Security Officer, HAMMOND CARE -
5:00PM
Chair's Closing Remarks
-
5:05PM
End of Conference & Networking Drinks
Not Found